Conditional access

Cryptography – Video cryptography – Video electric signal modification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S241000, C380S242000

Reexamination Certificate

active

07403618

ABSTRACT:
A transmitter provides receivers conditional access to data transmitted via a network. A content encryptor is used to encrypt the data under control of a same authorization key before it is transmitted to all receivers. The transmitter has a storage with a plurality of device keys. A further encryptor is used for producing a key block with a plurality of entries, where each entry is associated with a respective one of the device keys. At least some of the entries contain a representation of the authorization key encrypted with the associated device key. The transmitter transmits the same key block to all receivers.The receiver has a subset of the device keys. A first decryptor is used to retrieve the authorization key by decrypting at least one entry of the key block that is associated with one of the device keys of the receiver. A second decryptor is used for decrypting the data under control of the authorization key.

REFERENCES:
patent: 5592552 (1997-01-01), Flat
patent: 5712800 (1998-01-01), Aucsmith
patent: 5999623 (1999-12-01), Bowman et al.
patent: 6026165 (2000-02-01), Marino et al.
patent: 6118873 (2000-09-01), Lotspiech et al.
patent: 6167137 (2000-12-01), Marino et al.
patent: 6263435 (2001-07-01), Dondeti et al.
patent: 6542610 (2003-04-01), Traw et al.
patent: 6609116 (2003-08-01), Lotspiech
patent: 6650753 (2003-11-01), Lotspiech et al.
patent: 6880081 (2005-04-01), Itkis
patent: 2003/0194091 (2003-10-01), Wajs
patent: 0641103 (1995-03-01), None
patent: WO-0130018 (2001-04-01), None
D.H. Wallner, E.J. Harder, R.C. Agee, “Key Management for Multicast: Issues and Architectures”, Request for Comments 2627, Jun. 1999.
C.K. Wong, M. Gouda, S. Lam, “Secure Group Communications Using Key Graphs”, Proceedings SIG-COMM 1998, ACM Press, NY, pp. 68-79, IEEE/ACM Transactions on Networking, vol. 8, No. 1, Feb. 2000, pp. 16-30.
“International Search Report for Application No. PCT/EP 00/09866”, (May 1, 2001),3 pgs.
Blundo, C, et al., “Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution”,Advances in cryptology—crypto '96. 16th annual international cryptology conference, XP000626596 German ISBN: 3-540-61512-1, p. 389,(Aug. 18-22, 1996),387-400.
Nakamura, H , et al., “Hierarchical group oriented key management method HGK”,Proceedings of the Sixth Annual Computer Security Applications Conference, IEEE, (1990),44-49.
Shiuh-Jeng Wang, et al., “A hierarchical and dynamic group-oriented cryptographic scheme”,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronic Information and Communication, ENG, Japan, vol. E79-A, No. 1, p. 78, column 2—p. 79, column 1; figure 2,(Jan. 1996),76-85.
“U.S. Appl. No. 10/124,287 Final Office Action mailed Jun. 7, 2006”, 15 pgs.
“U.S. Appl. No. 10/124,287 Non Final Office Action mailed Nov. 30, 2005”, 13 pgs.
“U.S. Appl. No. 10/124,287 Response filed Feb. 28, 2006 to Non Final Office Action mailed Nov. 30, 2005”, 14 pgs.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Conditional access does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Conditional access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Conditional access will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2786029

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.