System and method for securely controlling access to device...

Information security – Access control or authentication – Stand-alone

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S021000, C713S166000, C713S324000

Reexamination Certificate

active

07810152

ABSTRACT:
Systems and methods that may securely control access to device functions are disclosed. A request is received to enable a feature of the device. In one embodiment, the device may be a set top box, for example. The device determines whether the feature is disabled, whether the feature can be enabled with authorization and whether a requester is authorized to enable the feature of the device. If the feature is disabled, if the feature can be enabled with authorization and if the requester is authorized to enable the feature of the device, then the feature of the device is enabled.

REFERENCES:
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4864615 (1989-09-01), Bennett et al.
patent: 4897785 (1990-01-01), Zuger
patent: 5148479 (1992-09-01), Bird et al.
patent: 5349249 (1994-09-01), Chiang et al.
patent: 5371499 (1994-12-01), Graybill et al.
patent: 5390317 (1995-02-01), Weiss et al.
patent: 5398285 (1995-03-01), Borgelt et al.
patent: 5412730 (1995-05-01), Jones
patent: 5442704 (1995-08-01), Holtey
patent: 5586185 (1996-12-01), Shibata et al.
patent: 5710816 (1998-01-01), Stork et al.
patent: 5715431 (1998-02-01), Everett et al.
patent: 5737760 (1998-04-01), Grimmer, Jr. et al.
patent: 5813001 (1998-09-01), Bennett
patent: 5883680 (1999-03-01), Nykerk
patent: 5903653 (1999-05-01), Ross et al.
patent: 5937065 (1999-08-01), Simon et al.
patent: 5991197 (1999-11-01), Ogura et al.
patent: 6031391 (2000-02-01), Couts-Martin et al.
patent: 6039247 (2000-03-01), Reccia et al.
patent: 6070243 (2000-05-01), See et al.
patent: 6076149 (2000-06-01), Usami et al.
patent: 6088450 (2000-07-01), Davis et al.
patent: 6118873 (2000-09-01), Lotspiech et al.
patent: 6134628 (2000-10-01), Hamadani
patent: 6185127 (2001-02-01), Myers et al.
patent: 6219790 (2001-04-01), Lloyd et al.
patent: 6240516 (2001-05-01), Vainsencher
patent: 6286104 (2001-09-01), Buhle et al.
patent: 6351814 (2002-02-01), Batinic et al.
patent: 6360260 (2002-03-01), Compliment et al.
patent: 6378072 (2002-04-01), Collins et al.
patent: 6389532 (2002-05-01), Gupta et al.
patent: 6446179 (2002-09-01), Baltar
patent: 6567011 (2003-05-01), Young et al.
patent: 6629047 (2003-09-01), Guliani et al.
patent: 6643781 (2003-11-01), Merriam
patent: 6647434 (2003-11-01), Kamepalli
patent: 6732179 (2004-05-01), Brown et al.
patent: 6742116 (2004-05-01), Matsui et al.
patent: 6754738 (2004-06-01), Brice et al.
patent: 6775281 (2004-08-01), Brown
patent: 6789159 (2004-09-01), Carr et al.
patent: 7058177 (2006-06-01), Trimberger et al.
patent: 7548622 (2009-06-01), Carr
patent: 2003/0046189 (2003-03-01), Asayama
patent: 2004/0268024 (2004-12-01), Carr et al.
patent: 2009/0254744 (2009-10-01), Carr
patent: 0806772 (1997-11-01), None
patent: WO 94/10687 (1994-05-01), None
patent: WO 00/24192 (2000-04-01), None
patent: WO 00/76117 (2000-12-01), None
patent: WO 02/11289 (2002-02-01), None
Bruce Schneier, 1996, “Applied Cryptography”, John Wiley and Sons, 2nd edition, pp. 294-295.
Digital Systems Design II: Synchronous System and Register Transfer Level Design, pp. 189-226, University of Machester: school of Electronics and Electrical Engineering.
“State Diagram”: Wikipedia, 2006.
P.J. Lenior, “Functional Model for the DVB CPCM Framework,” Royal Philips Electronics Presentation, Feb. 2002.
Rowan Vevers, “DVB Sub-Group on Commercial Requirements for Copy Protection Systems Report to the Eighteenth Meeting of the DVB Commercial Module (DVB-CM),” DVB Report, DVB-CP8(00)7, Oct. 2000.
Jeff Carr, “Response to DVB Call for Information, Copy Protection and Digital Rights Management Technologies,” Broadcom Corp., Oct. 2001.
“Call for Proposals for Content Protection & Copy Management Technologies,” DVB, DVB Technical Module Sub-Group on Copy Protection Technologies, DVB CPT rev 1.2, Jul. 2001.
Ji et al., “Open Letter following Proposal DVB-CPY-719,” Feb. 2002.
“SCTE Proposed Standard Head-end Implementation of OpenCAS™,” Society of Cable Telecommunications Engineers, Inc., Engineering Committee, Digital Video Subcommittee, SCTE DVS 278r1, Jul. 2000.
“Data-Over-Cable Interface Specification,” MCNS Holdings, L.P., Security Systems Specification, SP-SSI-I01-970506, 1997.
“DES CBC Packet Encryption,” General Instrument Corp., SCTE DVS/042, Nov. 1996.
“CD-Rom Based Application Software Consumer and SOHO Copying Trends,” Merrill Research Associates, Apr. 2000.
“White Paper—The Ins and Outs of Content Delivery Networks,” Stardust.com inc., Dec. 2000.
“CD-Rom Unauthorized Copying Study Executive Summary,” Merrill Research Associates, Apr. 1999.
“UDAC-M Host Link Specification, Part 1: Overview,” Keitaide-Music Consortium, Ver. 0.9, Dec. 2000.
“Keitaide-Music Technical Specification Part I Overview,” Keitaide-Music Consortium, Ver. 1.0, Dec. 2000.
“EPRS8 White Paper,” SecureMedia, Inc., 2000.
William Raike “Detailed Supplemental Technical Description of the RPK Public-Key Cryptographic System,” 1996.
Joseph M. Winograd, “Audio Watermarking Technologies for Protection of Digital Audio and Video—Presentation to DVD CPTWG,” Verance Corporation, Sep. 2000.
John Paddleford, “Digital Rights Management—Protecting Your Content,” Microsoft Corporation, undated.
“Common Interface Specification For Conditional Access and Other Digital Video Broadcasting Decoder Applications,” DVB, DVB Document A017, May 1996.
“Call for Proposals for Content Protection & Copy Management Technologies,” DVD, DVB Technical Module Sub-Group on Copy Protection Technologies, Rev. 1.2, Jul. 2001.
Bechtolsheim et al., “Responses to DVB-CP Requirements (DVB-CM283) for the OCCAM Open Conditional Content Access Management System,” Cisco Systems, Inc. Oct. 2001.
“NetDRM Technology Response to DVD Call for Proposals for Content Protection & Copy Management Technologies,” DVD, Matsushita Electric Industrial Co., Ltd., Oct. 2001.
“Proposal for Content Protection & Copy Management Technologies submitted to DVB (Digital Video Broadcasting,” Veridian, Oct. 2001.
“Response to the DVB-CPT Call for Proposals for Content Protection & Copy Management Technologies,” Royal Phillips Electronics N.V., Oct. 2001.
Kish et al., “An Information Paper in Response to the Call for Proposals Issued by the DVB Copy Protection Technologies Sub-Group of the DVB Technical Module,” VWM Companies, Oct. 2001.
“Proposals for Content Protection and Copy Management Technologies,” Sony International (Europe), Oct. 2001.
Olsthoorn et al., “Flexcop—A Flexible Copy Protection Framework,” Flexcop, undated.
“Proposals for DVB Content Protection & Copy Management Technologies,” Nokia, Version 1.0, Oct. 2001.
“4C Entity Response to DVB CPT Call for Proposals Regarding Content Protection & Copy Management Technologies—Content Protection System Architecture—A Comprehensive Framework for Content Protection, with CPPM and CPRM Technologies,” 4C Entity, LLC, Oct. 2001.
“SmartRight Answer to the Call for Proposals for Content Protection & Copy Management Technologies,” Thomson Multimedia et al., Oct. 2001.
“Answer to Call for Proposals for Content Protection & Copy Management Technologies,” Thales Communication, Oct. 2001.
“IBM Response to DVB CPT Call for Proposals Regarding Content Protection & Copy Management: xCP Cluster Protocol,” IBM, Oct. 2001.
“Digital Transmission Licensing Administrator's (DTLA) Response to DVB-CPT Call for Proposals Concerning Content Protection & Copy Management Technologies Protected Transport of Commercial Entertainment Content Using DTCP Technology,” DTLA, 2001.
Winograd et al., “Audio Watermarking System for Content Protection within a D

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for securely controlling access to device... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for securely controlling access to device..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for securely controlling access to device... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4164824

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.