Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-07-11
2006-07-11
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C726S030000, C380S239000
Reexamination Certificate
active
07076661
ABSTRACT:
A method for forwarding messages containing cryptographic keys from a conditional access system that controls a population of set-top boxes to an encryption renewal system. The method includes storing a fictitious address of a virtual set-top box; generating a message based on the fictitious address, the message containing a cryptographic key; and forwarding the message to the fictitious address of the virtual set-top box. The encryption renewal system has information regarding the virtual set-top box, and is the recipient of the message. In addition, the encryption renewal system is for controlling access to pre-encrypted content generated by an encryption device. The system includes software instructions for receiving a request to retrofit an entitlement control message that allows a home device to access pre-encrypted content; and software instructions for retrofitting the entitlement control message only after verifying that the pre-encrypted content was generated prior to or contemporaneous with an authorized timestamp.
REFERENCES:
patent: 6005938 (1999-12-01), Banker et al.
patent: 6415031 (2002-07-01), Colligan et al.
patent: 6813358 (2004-11-01), Di Crescenzo et al.
patent: 6898285 (2005-05-01), Hutchings et al.
patent: 6937729 (2005-08-01), Akins et al.
Hwang M. et al, “An access control scheme based on Chinese remainder theorem and time stamp concept”, 1996, Computer & Security, vol. 15, No. 1, pp. 73-81, Retrieved from the Internet on Apr. 29, 2006: <URL: http://www.sciencedirect.com/science?—ob=Mlmg&—imagekey=B6V8G-3VW1CRV-7-1&—cdi=5870&—user=2502287&—orig=search&—coverDate=12%2F31%2F1996&—qd=1&>.
Kehne A. et al, “Multiple Authentications With a Nonce-Based Protocol Using Generalized Timestamps”, 1992, Proc.\ ICCC '92, Retrieved from the Internet on Apr. 29, 2006: <URL: http://citeseer.ist.psu.edu/cache/papers/cs/622/http:zSzzSzwww.ibr.cs.tu-bs.dezSz˜schoenwzSzpaperszSziccc-92.pdf/multiple-authentications-with-a.pdf>.
MacKenzie, “Networked cryptographic devices resilient to capture”, May 2001, Security & Privacy 2001 Proceeding, pp. 12-15, Retrieved from the Internet on Apr. 29, 2006: <URL: http://ieeexplore.ieee.org/iel5/7367/19992/00924284.pdf?tp=&arnumber=924284&isnumber=19992>.
Chen Annie On-yee
Tang Lawrence W.
Wakabayashi Akiko
Barron Jr. Gilberto
Dinh Minh
General Instrument Corporation
Marley Robert P.
LandOfFree
System for denying access to content generated by a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System for denying access to content generated by a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for denying access to content generated by a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3575064