System and method for cryptographically authenticating data...

Cryptography – Video cryptography – Copy protection or prevention

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07831043

ABSTRACT:
A cryptographic authentication system comprises an authentication media key block that comprises media key precursors. The system generates transformed keys by applying a function to a media ID of a media and each of the media key precursors, and generates entries in a binding table by applying an encrypting function to a media key of an encrypted content and each of the transformed keys. To play encrypted content, a media player processes the authentication media key block using a device key to extract a media key precursor, extracts a media key from the binding table using the extracted media key precursor and the media ID, and verifies that the extracted media key matches the media key of the encrypted content, allowing the media device to decrypt and play the encrypted content.

REFERENCES:
patent: 5737421 (1998-04-01), Audebert
patent: 6028933 (2000-02-01), Heer et al.
patent: 2006/0126831 (2006-06-01), Cerruti et al.
patent: 2008/0205652 (2008-08-01), Nakano et al.
patent: 1024626 (2000-08-01), None
Nakamura et al. “Efficient Key Management Based on the Subset Difference Method for Secure Group Communication”, Proceedings of 19th Internation Conference on Advanced Information Networking and Applications, 2005. pp. 1-6.
Lotspiech, “Anonymous Trust: Digital Rights Management Using Broadcast Encryption”, Proceedings of the IEEE vol. 92, No. 6, 2004, pp. 1-12.
Ramkumar, M.et al., “An Efficient Key Predistribution Scheme for Ad Hoc Network Security,” IEEE Journal on Selected Areas in Communications, vol. 23, No. 3, Mar. 2005, pp. 611-621.
Dutta, Pk. et al., “Securing the Deluge Network Programming System,” ISPN '06, Apr. 19-21, 2006, Nashville, Tennessee, USA, pp. 326-333.
Karlof, C. et al., “TinySec: A Link Library Security Architecture for Wireless Sensor Networks,” SenSys '04, Nov. 3-5, 2004, Baltimore, Maryland, USA, 2004, pp. 162-175.
Montenegro, G. et al., “Crypto-Based Identifiers (CBIDs): Concepts and Applications,” ACM Transactions on Information and System Security, vol. 7, No. 1, Feb. 2004, pp. 97-127.
Patiyoot, D. et al., “Cryptographic Security Techniques for Wireless Networks,” ACM SIGOPS Operating Systems Review archive, vol. 33, Issue 2, Apr. 1999, pp. 36-50.
Wallner, D., et al. “Key Management for Multicast: Issues and Architectures,” 1999.
Naor, D., et al. “Revocation and Tracing Schemes for Stateless Receivers,” Jun. 2002.
Fiat, A., et al. “Broadcast Encryption,” CRYPTO '93 Proceedings, Lecture Notes in Computer Science, vol. 773, 1994, pp. 480-491.
Lotspiech, J., “Broadcast Encryption's Bright Future,” IEEE, Aug. 2002, pp. 57-63.
Wong, C.K., “SecureGroupCommunicationsUsingKeyGraphs,” IEEE/ACM Transactions on Networking, vol. 8, No. 1, Feb. 2000, pp. 16-30.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for cryptographically authenticating data... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for cryptographically authenticating data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for cryptographically authenticating data... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4248533

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.