Patents Examined by Emmanuel Moise
  • Patent number: 7646871
    Abstract: The invention is directed to a source device and a method for encrypting digital contents at the source device. According to an embodiment, the method includes performing an addition operation by using a first source internal key and an identifier (ID), the first source internal key being associated with the source device, the ID being associated with at least one of a target device and a storage medium of the target device, and the target device being connected to the source device; generating a source encryption key based on an output of the addition operation and a second source internal key by using a predetermined encryption algorithm, the second source internal key being associated with the source device; encrypting the digital content using the source encryption key; and transmitting the encrypted digital content without the source encryption key to the target device.
    Type: Grant
    Filed: July 6, 2009
    Date of Patent: January 12, 2010
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7643635
    Abstract: A device and method for decrypting re-encrypted digital contents are discussed. According to an embodiment, the method includes receiving the re-encrypted digital content without a source encryption key from a source device connected to the target device, wherein the re-encrypted digital content is generated at the source device by: 1) decrypting an encrypted digital content which is previously encrypted in an external device, and 2) re-encrypting the decrypted digital content with the source encryption key; performing an addition operation by using a first target internal key and an identifier (ID); generating a target encryption key based on an output of the addition operation and a second target internal key by using a predetermined encryption algorithm, the second target internal key being associated with the target device; and decrypting the re-encrypted digital content using the target encryption key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: January 5, 2010
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7639811
    Abstract: The invention is directed to a source device and a method for encrypting digital contents at the source device. According to an embodiment, the method includes performing a first addition operation by using a first source internal key and an identifier (ID), the first source internal key being associated with the source device, the ID being associated with at least one of a target device and a storage medium of the target device, and the target device being connected to the source device; generating a source encryption key based on an output of the first addition operation and a second source internal key by using a predetermined encryption algorithm, wherein the second source internal key is associated with the source device; encrypting the digital content using the source encryption key; and transmitting the encrypted digital content without the source encryption key to the target device.
    Type: Grant
    Filed: July 6, 2009
    Date of Patent: December 29, 2009
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7639810
    Abstract: The invention is directed to a source device and a method for encrypting digital content at the source device. According to an embodiment, the method includes authenticating a target device connected to the source device using an identifier (ID) associated with at least one of the target device and a storage medium of the target device; performing an addition operation by using a source internal key and the ID, the source internal key being associated with the source device; generating a source encryption key based on an output of the addition operation; encrypting the digital content using the source encryption key; and transmitting the encrypted digital content without the source encryption key to the target device.
    Type: Grant
    Filed: July 6, 2009
    Date of Patent: December 29, 2009
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7639814
    Abstract: A device and method for decrypting digital contents are discussed. According to an embodiment, a method for decrypting digital content at a target device, includes receiving the digital content without a source encryption key from a source device connected to the target device, the digital content having been encrypted with the source encryption key in the source device; performing an addition operation by using a first target internal key and an identifier (ID), the first target internal key being associated with the target device, and the ID being associated with at least one of the target device and a storage medium of the target device; generating a target encryption key based on an output of the addition operation and a second target internal key by using a predetermined encryption algorithm, the second target internal key being associated with the target device; and decrypting the encrypted digital content using the target encryption key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: December 29, 2009
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7639815
    Abstract: A device and method for decrypting digital contents are discussed. According to an embodiment, a method for decrypting digital content at a target device, includes receiving the digital content without a source encryption key from a source device connected to the target device, the digital content having been encrypted with the source encryption key in the source device, wherein the source device is configured to perform an authenticating operation with the target device by using an identifier (ID) associated with at least one of the target device and a storage medium of the target device; performing a first addition operation by using a first target internal key and the ID; generating a target encryption key based on an output of the first addition operation and a second target internal key by using a predetermined encryption algorithm; and decrypting the encrypted digital content using the target encryption key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: December 29, 2009
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7639813
    Abstract: A device and method for decrypting digital contents are discussed. According to an embodiment, a method for decrypting digital content at a target device, includes receiving the digital content without a source encryption key from a source device connected to the target device, the digital content having been encrypted with the source encryption key in the source device, wherein the source device is configured to perform an authenticating operation with the target device by using an identifier (ID) associated with at least one of the target device and a storage medium of the target device; performing an addition operation by using a target internal key and the ID, the target internal key being associated with the target device; generating a target encryption key based on an output of the addition operation; and decrypting the encrypted digital content by using the target encryption key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: December 29, 2009
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7639812
    Abstract: The invention is directed to a source device and a method for encrypting digital contents at the source device. According to an embodiment, the method includes receiving digital content from an external device, the digital content being encrypted using a first encryption algorithm in the external device; decrypting the received digital content; performing an addition operation by using a first source internal key and an identifier (ID), the ID being associated with at least one of a target device and a storage medium of the target device; generating a source encryption key based on an output of the addition operation and a second source internal key by using a second encryption algorithm; re-encrypting the decrypted digital content using the source encryption key; and transmitting the re-encrypted digital content without the source encryption key to the target device.
    Type: Grant
    Filed: July 6, 2009
    Date of Patent: December 29, 2009
    Assignee: LG Electronics Inc.
    Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
  • Patent number: 7376828
    Abstract: A method and apparatus for using a service provider network that supports point-to-point channels is disclosed. One or more encryption parameters are associated with a channel from among a set of one or more predefined point-to-point channels provided by the service provider to connect customer points for a customer different than the service provider. Payloads for a particular flow of one or more data packets directed through the channel are encrypted at a first customer point, using the set of encryption parameters associated with the particular channel, to generate a set of one or more encrypted payloads. The encrypted payloads are inserted in the particular flow sent through the channel of the service provider network. The encrypted payloads are decrypted at a second customer point connected to the first customer point by the channel.
    Type: Grant
    Filed: July 1, 2002
    Date of Patent: May 20, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Eric Voit, Pratima Sethi, Jan Vilhuber
  • Patent number: 7370364
    Abstract: Content resources are managed. A request is received from a user for access to a source of content resources. It is determined that the user is authorized for access to the source. A portal Web page is generated based on a set of content element data applicable to the subscriber. The portal Web page is returned to the user. A system for use in managing content resources has a switch for receiving requests from Web browsers, a content resource management engine in communication with the switch, and a billing system in communication with the content resource management engine.
    Type: Grant
    Filed: July 31, 2001
    Date of Patent: May 6, 2008
    Assignee: Ellacoya Networks, Inc.
    Inventors: Kurt A. Dobbins, Jason P. Poirier, Wouter Johan Weiss, Andre C. Boutin, Justin William Haddad, Stephen G. Delahunty, David L. Cullerot, Mark Thomas Sexton, Adam Michael Lederman, Christopher Lawrence Cheetham, David Ruffen
  • Patent number: 7369660
    Abstract: Methods and an apparatus for distributing digital content via a host receiver (e.g., direct-to-home satellite host receiver) are disclosed. The disclosed techniques include transmission of a host identifier and a client identifier from a host receiver and a client device to a satellite transmission station. The identifiers are used by the transmission station to lookup unique encryption keys associated with the host receiver and client device. The transmission station then transmits one or more encrypted keys to the host and/or client. In addition, the transmission station transmits encrypted content to the host. In turn, the host decrypts the content using one encryption key, re-encrypts the content using another encryption key, and passes the content along to the client device. By using the smart card, tuner, and/or storage device of the host receiver, the client device need not include a smart card, tuner, and/or storage device.
    Type: Grant
    Filed: May 20, 2003
    Date of Patent: May 6, 2008
    Assignee: The DIRECTV Group, Inc.
    Inventors: Raynold M. Kahn, Gregory J. Gagnon
  • Patent number: 7360091
    Abstract: A smart card and a settlement terminal are provided by which, when common-key cryptography is used for value transfer between smart cards, the security of the whole system can be improved by enabling easy updating of a cryptographic key used for the value transfer. A smart card transmits/receives value data to/from another smart card. The smart card includes an information accumulating unit for accumulating value data, a transfer key used to update the value data, and an update key used to update the transfer key; a communication unit for receiving a transfer key encrypted by use of the update key, the transfer key being transmitted from another smart card; and an arithmetic processing unit for decrypting the encrypted transfer key by use of the update key to update the transfer key accumulated in the information accumulating unit by use of the decrypted transfer key.
    Type: Grant
    Filed: June 25, 2003
    Date of Patent: April 15, 2008
    Assignee: Hitachi, Ltd.
    Inventors: Makoto Aikawa, Yutaka Takami, Shinichiro Fukushima
  • Patent number: 7353543
    Abstract: A contents supply apparatus supplies sub-content that relates to main content. A DVD-ROM stores a bind key unique to the DVD-ROM and main content that is a digital work. A main player reads the bind key from the DVD-ROM, acquires sub-content that relates to the main content stored on the DVD-ROM, generates encrypted sub-content by encrypting the acquired sub-content based on the read bind key, and writes the generated encrypted content to an SD memory card. A sub-player reads the bind key from the DVD-ROM, reads the encrypted sub-content from the SD memory card, generates sub-content by decrypting the read encrypted sub-content based on the bind key, and plays back the generated sub-content.
    Type: Grant
    Filed: January 10, 2003
    Date of Patent: April 1, 2008
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Motoji Ohmori, Masataka Minami, Masaya Yamamoto
  • Patent number: 7340775
    Abstract: A system, method and computer program product are provided for preventing writes to critical files. Initially, factors associated with a computer are identified. Then, requests to write to files on the computer are monitored. The writes to the files on the computer are conditionally prevented based on the factors to prevent virus proliferation. In use, the factors are altered based on the monitoring of the requests.
    Type: Grant
    Filed: December 20, 2001
    Date of Patent: March 4, 2008
    Assignee: McAfee, Inc.
    Inventors: Lee Codel Lawson Tarbotton, Daniel J. Wolff, Neil A. Cowie
  • Patent number: 7340059
    Abstract: A scrambler circuit for digital telephony equipment receives a sequence of input bits, generates the sequence of output bits based on the input bits and stores the sequence of output bits. The generating of the sequence of output bits includes selecting at least one of the stored output bits in accordance with contents of a mask register, and applying a logic operation to a current input bit and the selected at least one stored output bit to provide a current output bit.
    Type: Grant
    Filed: June 17, 2003
    Date of Patent: March 4, 2008
    Assignee: Intel Corporation
    Inventors: Ronald D. Olsen, Jon C. Melnik
  • Patent number: 7200227
    Abstract: A shared-key encryption scheme that uses identically keyed block-cipher calls, low additional overhead, supports the encryption of arbitrary-length strings, produces a minimal-length-ciphertext, and is fully parallelizable. In one embodiment, “OCB”, a key shared between communicating parties is mapped to a key variant using the block cipher. The key variant is mapped into a sequence of basis offsets using shifts and conditional xors. To encrypt a message using a nonce, a nonce-dependent base offset is formed, and then a sequence of offsets is constructed by starting with the base offset and then xoring, for each offset, an appropriate basis offset. The message is partitioned into message blocks of the same length as the block length of the block cipher, along with a message fragment that may be shorter. Each message block is combined with a corresponding offset, enciphered, and then combined again with the offset, yielding a ciphertext block.
    Type: Grant
    Filed: July 18, 2005
    Date of Patent: April 3, 2007
    Inventor: Phillip Rogaway
  • Patent number: 7200549
    Abstract: A cryptographic method and equipment decrypting a cryptographic key by generating an auxiliary code based on a randomly determined numeric key and including a result of encryption into a cryptogram. Upon decryption, the cryptographic key is restored using the numeric key restored according to the entire cryptogram. A cryptographic method and equipment scrambles and encrypts physical characteristic information, and descrambles a result of a decryption, thereby enabling any alteration to a cryptogram to be detected because even a minor alteration thereto changes the result of the decryption. A remote identification system encrypts physical characteristic information using a password as a cryptographic key, and fluctuation of the physical characteristic information, authenticating information represented as a different bit pattern at each identifying processing is generated and sent to a transmission medium.
    Type: Grant
    Filed: May 31, 2000
    Date of Patent: April 3, 2007
    Assignee: Fujitsu Limited
    Inventors: Yusaku Fujii, Takashi Shinzaki
  • Patent number: 7065657
    Abstract: A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward- and backward-chaining using rules. Also provided are sensors, which communicate with the analysis engine using a meta-protocol in which the data packet comprises a 4-tuple. A configuration discovery mechanism locates host system files and communicates the locations to the analysis engine. A file processing mechanism matches contents of a deleted file to a directory or filename, and a directory processing mechanism extracts deallocated directory entries from a directory, creating a partial ordering of the entries. A signature checking mechanism computes the signature of a file and compares it to previously computed signatures. A buffer overflow attack detector compares access times of commands and their associated files.
    Type: Grant
    Filed: August 30, 2000
    Date of Patent: June 20, 2006
    Assignee: Symantec Corporation
    Inventor: Douglas B. Moran
  • Patent number: 7054443
    Abstract: A digital rights management (DRM) distribution architecture produces and distributes digital goods (e.g., software, audio, video, and other content) in a fashion that renders the digital goods resistant to many known forms of attacks. The DRM distribution architecture protects digital goods by automatically and randomly manipulating portions of the code using multiple protection techniques. Applying a mixture protection techniques in random fashion makes it extremely difficult for pirates to create illicit copies that go undetected as legitimate copies. In addition, the architecture also supports a quantitative unit that allows a producer to specify how much protection may be added to the digital good.
    Type: Grant
    Filed: March 27, 2000
    Date of Patent: May 30, 2006
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan, Saurabh Sinha
  • Patent number: 7035404
    Abstract: A shuffle with proof having a method for proof generating with small computational resources proportionate to the number of input encrypted messages and a corresponding method for verification. Shuffle is represented by a generalized transformation. Combining a proof that the transformation information is retained and a proof of a condition under which the transformation is met constitute the proof for shuffle. The two proofs are short proportional to the number of input encrypted messages. Transformation information retention is proved in such a manner that, since the response is generated from challenge value in dependency upon transformation, the condition under which the transformation is met is reflected in the response-challenge value relation. If the condition under which the transformation corresponding to the shuffle is selected as the condition for proof, the two proofs may constitute the proof for shuffle.
    Type: Grant
    Filed: March 2, 2001
    Date of Patent: April 25, 2006
    Assignee: NEC Corporation
    Inventor: Jun Furukawa