Patents Assigned to Combined Conditional Access Development and Support, LLC.
  • Patent number: 8645691
    Abstract: Systems and methods for securing data are disclosed. A method for securing data can comprise processing a data block to generate a signature, processing the signature to generate a reduced signature, transmitting the data block to a recipient, and transmitting the reduced signature to the recipient.
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: February 4, 2014
    Assignee: Combined Conditional Access Development And Support, LLC
    Inventor: Jon L. Pang
  • Publication number: 20130282807
    Abstract: Aspects of the disclosure relate to a protocol for communication of information. The protocol can be a non-standard universal serial bus (USB) protocol and can guarantee bandwidth and latency for information communication between a USB host and a single USB device. In one aspect, the non-standard USB protocol can employ a repeating message sequence that is fixed, or static, and preconfigured, the sequence comprising alternating transmission of messages between a first device (e.g., a host device) and a second device (e.g., a peripheral device).
    Type: Application
    Filed: April 20, 2012
    Publication date: October 24, 2013
    Applicant: Combined Conditional Access Development and Support, LLC
    Inventors: John Edward Rudy, An Tonthat, Patrick Charles Murray
  • Publication number: 20130185566
    Abstract: Systems and methods for securing data are disclosed. A method for securing data can comprise processing a data block to generate a signature, processing the signature to generate a reduced signature, transmitting the data block to a recipient, and transmitting the reduced signature to the recipient.
    Type: Application
    Filed: January 13, 2012
    Publication date: July 18, 2013
    Applicant: Combined Conditional Access Development and Support, LLC
    Inventor: Jon L. Pang
  • Publication number: 20130129080
    Abstract: Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.
    Type: Application
    Filed: November 21, 2011
    Publication date: May 23, 2013
    Applicant: Combined Conditional Access Development and Support, LLC
    Inventors: Lawrence Tang, Kenneth P. Miller, Christopher J. Bennett
  • Publication number: 20130132722
    Abstract: Systems and methods for authenticating data and timeliness are disclosed. A method for authentication can comprise processing a data block to determine a first secret element, generating a second secret element based upon the first secret element, generating a non-secret element based upon the second secret element, and comparing the non-secret element to a nonce associated with the first secret element to determine authentication.
    Type: Application
    Filed: November 21, 2011
    Publication date: May 23, 2013
    Applicant: Combined Conditional Access Development and Support, LLC
    Inventors: Christopher J. Bennett, Douglas M. Petty, Kenneth P. Miller, Alexander Medvinsky
  • Publication number: 20130129086
    Abstract: An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
    Type: Application
    Filed: November 22, 2011
    Publication date: May 23, 2013
    Applicant: COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLC.
    Inventors: Lawrence W. Tang, Douglas M. Petty, Michael T. Habrat
  • Patent number: 8385555
    Abstract: A content delivery network and method employing a Downloadable Conditional Access System (“DCAS”) includes first and second personalization servers. A unit key list having unique keys is segmented into different blocks. Each block is encrypted with a separate transmission key corresponding to that block such that first and second blocks are respectively encrypted with first and second transmission keys. The encrypted blocks are communicated to the personalization servers. The first transmission key is communicated to the first personalization server without being communicated to another personalization server such that the first server can decrypt the first block using the first transmission key to access the keys of the first block. The second transmission key is communicated to the second personalization server without being communicated to another personalization server such that the second server can decrypt the second block using the second transmission key to access the keys of the second block.
    Type: Grant
    Filed: December 10, 2008
    Date of Patent: February 26, 2013
    Assignee: Combined Conditional Access Development and Support, LLC.
    Inventors: Lawrence W. Tang, Eric E. Berry