Digital rights management (DRM) encryption and...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S179000, C726S029000, C705S056000

Reexamination Certificate

active

07395438

ABSTRACT:
A device renders content on a medium by obtaining a table from the medium, obtaining a device key (DK) of the device and an index value of such (DK), indexing into an entry of the table based on the obtained index value, selecting an encrypted secret from the indexed-into entry, applying the obtained device key (DK) to the selected encrypted secret to expose the secret, and applying the exposed secret to render the content.

REFERENCES:
patent: 5715403 (1998-02-01), Stefik
patent: 6236988 (2001-05-01), Aldred
patent: 6832319 (2004-12-01), Bell et al.
patent: 6880081 (2005-04-01), Itkis
patent: 6912634 (2005-06-01), Ripley et al.
patent: 7010808 (2006-03-01), Leung et al.
patent: 7088822 (2006-08-01), Asano
patent: 7152166 (2006-12-01), Strom et al.
patent: 2002/0123968 (2002-09-01), Okayama et al.
patent: 2002/0152387 (2002-10-01), Asano
patent: 2004/0003267 (2004-01-01), Strom et al.
patent: 2004/0093495 (2004-05-01), Engel
patent: 2007/0006314 (2007-01-01), Costa et al.
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
C. Brendan S. Traw, Protecting Digital Content within the Home, IEEE Journal, vol. 34, Issue 10, Oct. 2001 pp. 42-47.
Griswold, G.N. “A Method for Protecting Copyright on Networks”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 169-178.
Kahn, R.E. “Deposit, Registration and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 111-120.
Molotkov, S.N. et al., “On the key generation for N users in quantum cryptography”,JETP Letters, 1995, 62(12), 959-964.
Rivest, R.L. “The RC5 encryption algorithm”,Dr. Dobb's Journal, 1995, 20(1), 146-148.
Wheeler, D.J. “A bulk data encryption algorithm”,Cambridge Security Workshop. Fast Software Encryption, Dec. 9-11, 1993, Publication Date 1994, 127-134, Inspec Abstract No. C9502-6130S-023.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Digital rights management (DRM) encryption and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Digital rights management (DRM) encryption and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital rights management (DRM) encryption and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2759261

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.