Cryptography – Video cryptography – Copy protection or prevention
Reexamination Certificate
2006-08-27
2010-11-09
Moazzami, Nasser (Department: 2436)
Cryptography
Video cryptography
Copy protection or prevention
Reexamination Certificate
active
07831043
ABSTRACT:
A cryptographic authentication system comprises an authentication media key block that comprises media key precursors. The system generates transformed keys by applying a function to a media ID of a media and each of the media key precursors, and generates entries in a binding table by applying an encrypting function to a media key of an encrypted content and each of the transformed keys. To play encrypted content, a media player processes the authentication media key block using a device key to extract a media key precursor, extracts a media key from the binding table using the extracted media key precursor and the media ID, and verifies that the extracted media key matches the media key of the encrypted content, allowing the media device to decrypt and play the encrypted content.
REFERENCES:
patent: 5737421 (1998-04-01), Audebert
patent: 6028933 (2000-02-01), Heer et al.
patent: 2006/0126831 (2006-06-01), Cerruti et al.
patent: 2008/0205652 (2008-08-01), Nakano et al.
patent: 1024626 (2000-08-01), None
Nakamura et al. “Efficient Key Management Based on the Subset Difference Method for Secure Group Communication”, Proceedings of 19th Internation Conference on Advanced Information Networking and Applications, 2005. pp. 1-6.
Lotspiech, “Anonymous Trust: Digital Rights Management Using Broadcast Encryption”, Proceedings of the IEEE vol. 92, No. 6, 2004, pp. 1-12.
Ramkumar, M.et al., “An Efficient Key Predistribution Scheme for Ad Hoc Network Security,” IEEE Journal on Selected Areas in Communications, vol. 23, No. 3, Mar. 2005, pp. 611-621.
Dutta, Pk. et al., “Securing the Deluge Network Programming System,” ISPN '06, Apr. 19-21, 2006, Nashville, Tennessee, USA, pp. 326-333.
Karlof, C. et al., “TinySec: A Link Library Security Architecture for Wireless Sensor Networks,” SenSys '04, Nov. 3-5, 2004, Baltimore, Maryland, USA, 2004, pp. 162-175.
Montenegro, G. et al., “Crypto-Based Identifiers (CBIDs): Concepts and Applications,” ACM Transactions on Information and System Security, vol. 7, No. 1, Feb. 2004, pp. 97-127.
Patiyoot, D. et al., “Cryptographic Security Techniques for Wireless Networks,” ACM SIGOPS Operating Systems Review archive, vol. 33, Issue 2, Apr. 1999, pp. 36-50.
Wallner, D., et al. “Key Management for Multicast: Issues and Architectures,” 1999.
Naor, D., et al. “Revocation and Tracing Schemes for Stateless Receivers,” Jun. 2002.
Fiat, A., et al. “Broadcast Encryption,” CRYPTO '93 Proceedings, Lecture Notes in Computer Science, vol. 773, 1994, pp. 480-491.
Lotspiech, J., “Broadcast Encryption's Bright Future,” IEEE, Aug. 2002, pp. 57-63.
Wong, C.K., “SecureGroupCommunicationsUsingKeyGraphs,” IEEE/ACM Transactions on Networking, vol. 8, No. 1, Feb. 2000, pp. 16-30.
International Business Machines - Corporation
Kassatly Samuel
Lewis Lisa
Moazzami Nasser
Shimokaji & Associates
LandOfFree
System and method for cryptographically authenticating data... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for cryptographically authenticating data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for cryptographically authenticating data... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4248533