System for denying access to content generated by a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S030000, C380S239000

Reexamination Certificate

active

07076661

ABSTRACT:
A method for forwarding messages containing cryptographic keys from a conditional access system that controls a population of set-top boxes to an encryption renewal system. The method includes storing a fictitious address of a virtual set-top box; generating a message based on the fictitious address, the message containing a cryptographic key; and forwarding the message to the fictitious address of the virtual set-top box. The encryption renewal system has information regarding the virtual set-top box, and is the recipient of the message. In addition, the encryption renewal system is for controlling access to pre-encrypted content generated by an encryption device. The system includes software instructions for receiving a request to retrofit an entitlement control message that allows a home device to access pre-encrypted content; and software instructions for retrofitting the entitlement control message only after verifying that the pre-encrypted content was generated prior to or contemporaneous with an authorized timestamp.

REFERENCES:
patent: 6005938 (1999-12-01), Banker et al.
patent: 6415031 (2002-07-01), Colligan et al.
patent: 6813358 (2004-11-01), Di Crescenzo et al.
patent: 6898285 (2005-05-01), Hutchings et al.
patent: 6937729 (2005-08-01), Akins et al.
Hwang M. et al, “An access control scheme based on Chinese remainder theorem and time stamp concept”, 1996, Computer & Security, vol. 15, No. 1, pp. 73-81, Retrieved from the Internet on Apr. 29, 2006: <URL: http://www.sciencedirect.com/science?—ob=Mlmg&—imagekey=B6V8G-3VW1CRV-7-1&—cdi=5870&—user=2502287&—orig=search&—coverDate=12%2F31%2F1996&—qd=1&>.
Kehne A. et al, “Multiple Authentications With a Nonce-Based Protocol Using Generalized Timestamps”, 1992, Proc.\ ICCC '92, Retrieved from the Internet on Apr. 29, 2006: <URL: http://citeseer.ist.psu.edu/cache/papers/cs/622/http:zSzzSzwww.ibr.cs.tu-bs.dezSz˜schoenwzSzpaperszSziccc-92.pdf/multiple-authentications-with-a.pdf>.
MacKenzie, “Networked cryptographic devices resilient to capture”, May 2001, Security & Privacy 2001 Proceeding, pp. 12-15, Retrieved from the Internet on Apr. 29, 2006: <URL: http://ieeexplore.ieee.org/iel5/7367/19992/00924284.pdf?tp=&arnumber=924284&isnumber=19992>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for denying access to content generated by a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for denying access to content generated by a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for denying access to content generated by a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3575064

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.