Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant
Reexamination Certificate
2006-05-02
2006-05-02
Darrow, Justin T. (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Tamper resistant
C713S193000, C380S240000, C380S284000
Reexamination Certificate
active
07039816
ABSTRACT:
To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.
REFERENCES:
patent: 4222068 (1980-09-01), Thompson
patent: 4521852 (1985-06-01), Guttag
patent: 4521853 (1985-06-01), Guttag
patent: 4613901 (1986-09-01), Gilhousen et al.
patent: 4634808 (1987-01-01), Moerder
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4696034 (1987-09-01), Wiedemer
patent: 4827508 (1989-05-01), Shear
patent: 4887296 (1989-12-01), Horne
patent: 5029207 (1991-07-01), Gammie
patent: 5146575 (1992-09-01), Nolan, Jr.
patent: 5237610 (1993-08-01), Gammie et al.
patent: 5375240 (1994-12-01), Grundy
patent: 5436621 (1995-07-01), Macko et al.
patent: 5442704 (1995-08-01), Holtey
patent: 5592552 (1997-01-01), Fiat
patent: 5594869 (1997-01-01), Hawe et al.
patent: 5619247 (1997-04-01), Russo
patent: 5677953 (1997-10-01), Dolphin
patent: 5701343 (1997-12-01), Takashima et al.
patent: 5754647 (1998-05-01), Hsu
patent: 5757919 (1998-05-01), Herbert et al.
patent: 5764762 (1998-06-01), Kazmierczak et al.
patent: 5774546 (1998-06-01), Handelman et al.
patent: 5784460 (1998-07-01), Blumenthal et al.
patent: 5799080 (1998-08-01), Padmanabhan et al.
patent: 5802274 (1998-09-01), Dorak et al.
patent: 5809140 (1998-09-01), Rubin et al.
patent: 5818933 (1998-10-01), Kambe et al.
patent: 5825878 (1998-10-01), Takahashi et al.
patent: 5835595 (1998-11-01), Fraser et al.
patent: 5852290 (1998-12-01), Chaney
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5923759 (1999-07-01), Lee
patent: 5982899 (1999-11-01), Probst
patent: 5999623 (1999-12-01), Bowman et al.
patent: 6009177 (1999-12-01), Sudia
patent: 6041412 (2000-03-01), Timson et al.
patent: 6044155 (2000-03-01), Thomlinson et al.
patent: 6049608 (2000-04-01), Ablowitz et al.
patent: 6069957 (2000-05-01), Richards
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6266420 (2001-07-01), Langford et al.
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6330671 (2001-12-01), Aziz
patent: 6373948 (2002-04-01), Wool
patent: 6393128 (2002-05-01), Rix et al.
patent: 6728379 (2004-04-01), Ishibashi et al.
patent: 0837383 (1998-04-01), None
patent: 0858184 (1998-08-01), None
patent: 0866613 (1998-09-01), None
patent: 0915580 (1999-05-01), None
patent: 0936814 (1999-08-01), None
patent: WO 97/14085 (1997-04-01), None
patent: WO 98/07255 (1998-02-01), None
patent: WO 99/19822 (1999-04-01), None
Blundo et al, “Trade-Offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution” Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp 387-400, Aug. 18, 1996.
Blom, Rolf, “An Optimal Class of Symmetric Key Generation Systems”, Ericsson Radio Systems AB, Stockholm, Sweden, pp 335-338, Sep. 4, 1984.
*Chor, B., et al. “Tracing Traitors”, Advances in Cryptology-CRYPTO '94 (Springer-Verag, 1994), pp. 256-270 (Cambridge, United Kingdom).
*“H' Cards and You: The ‘H’ Card Hacking FAQ”, By an Anonymous Member of TCUP, revision date Aug. 10, 1998, world wide web at Http://www.dr7.com/faqs/dsstechfaq.html.
*Kommerling, O. and Kuhn, M., “Design Principles for Tamper-Resistant Smartcard Processors,” USENIX Workshop on Smartcard Technology, May 10-11, 1999, USENIX Association, pp. 1-12, 9-20, ISBN 1-1880446-34-0 (Cambridge, United Kingdom).
*McCormac, J., “European Scrambling Systems,” (Circuits, Tactics and Techniques. 5) Waterford University Press 1996 (Waterford, Ireland).
Jaffe Joshua M.
Jun Benjamin C.
Kocher Paul C.
Cryptography Research, Inc.
Darrow Justin T.
Sonnenschein Nath & Rosenthal LLP
LandOfFree
Using smartcards or other cryptographic modules for enabling... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Using smartcards or other cryptographic modules for enabling..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using smartcards or other cryptographic modules for enabling... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3639787