Patents Examined by Emmanuel Moise
-
Patent number: 7646871Abstract: The invention is directed to a source device and a method for encrypting digital contents at the source device. According to an embodiment, the method includes performing an addition operation by using a first source internal key and an identifier (ID), the first source internal key being associated with the source device, the ID being associated with at least one of a target device and a storage medium of the target device, and the target device being connected to the source device; generating a source encryption key based on an output of the addition operation and a second source internal key by using a predetermined encryption algorithm, the second source internal key being associated with the source device; encrypting the digital content using the source encryption key; and transmitting the encrypted digital content without the source encryption key to the target device.Type: GrantFiled: July 6, 2009Date of Patent: January 12, 2010Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7643635Abstract: A device and method for decrypting re-encrypted digital contents are discussed. According to an embodiment, the method includes receiving the re-encrypted digital content without a source encryption key from a source device connected to the target device, wherein the re-encrypted digital content is generated at the source device by: 1) decrypting an encrypted digital content which is previously encrypted in an external device, and 2) re-encrypting the decrypted digital content with the source encryption key; performing an addition operation by using a first target internal key and an identifier (ID); generating a target encryption key based on an output of the addition operation and a second target internal key by using a predetermined encryption algorithm, the second target internal key being associated with the target device; and decrypting the re-encrypted digital content using the target encryption key.Type: GrantFiled: July 20, 2009Date of Patent: January 5, 2010Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7639811Abstract: The invention is directed to a source device and a method for encrypting digital contents at the source device. According to an embodiment, the method includes performing a first addition operation by using a first source internal key and an identifier (ID), the first source internal key being associated with the source device, the ID being associated with at least one of a target device and a storage medium of the target device, and the target device being connected to the source device; generating a source encryption key based on an output of the first addition operation and a second source internal key by using a predetermined encryption algorithm, wherein the second source internal key is associated with the source device; encrypting the digital content using the source encryption key; and transmitting the encrypted digital content without the source encryption key to the target device.Type: GrantFiled: July 6, 2009Date of Patent: December 29, 2009Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7639810Abstract: The invention is directed to a source device and a method for encrypting digital content at the source device. According to an embodiment, the method includes authenticating a target device connected to the source device using an identifier (ID) associated with at least one of the target device and a storage medium of the target device; performing an addition operation by using a source internal key and the ID, the source internal key being associated with the source device; generating a source encryption key based on an output of the addition operation; encrypting the digital content using the source encryption key; and transmitting the encrypted digital content without the source encryption key to the target device.Type: GrantFiled: July 6, 2009Date of Patent: December 29, 2009Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7639814Abstract: A device and method for decrypting digital contents are discussed. According to an embodiment, a method for decrypting digital content at a target device, includes receiving the digital content without a source encryption key from a source device connected to the target device, the digital content having been encrypted with the source encryption key in the source device; performing an addition operation by using a first target internal key and an identifier (ID), the first target internal key being associated with the target device, and the ID being associated with at least one of the target device and a storage medium of the target device; generating a target encryption key based on an output of the addition operation and a second target internal key by using a predetermined encryption algorithm, the second target internal key being associated with the target device; and decrypting the encrypted digital content using the target encryption key.Type: GrantFiled: July 20, 2009Date of Patent: December 29, 2009Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7639815Abstract: A device and method for decrypting digital contents are discussed. According to an embodiment, a method for decrypting digital content at a target device, includes receiving the digital content without a source encryption key from a source device connected to the target device, the digital content having been encrypted with the source encryption key in the source device, wherein the source device is configured to perform an authenticating operation with the target device by using an identifier (ID) associated with at least one of the target device and a storage medium of the target device; performing a first addition operation by using a first target internal key and the ID; generating a target encryption key based on an output of the first addition operation and a second target internal key by using a predetermined encryption algorithm; and decrypting the encrypted digital content using the target encryption key.Type: GrantFiled: July 20, 2009Date of Patent: December 29, 2009Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7639813Abstract: A device and method for decrypting digital contents are discussed. According to an embodiment, a method for decrypting digital content at a target device, includes receiving the digital content without a source encryption key from a source device connected to the target device, the digital content having been encrypted with the source encryption key in the source device, wherein the source device is configured to perform an authenticating operation with the target device by using an identifier (ID) associated with at least one of the target device and a storage medium of the target device; performing an addition operation by using a target internal key and the ID, the target internal key being associated with the target device; generating a target encryption key based on an output of the addition operation; and decrypting the encrypted digital content by using the target encryption key.Type: GrantFiled: July 20, 2009Date of Patent: December 29, 2009Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7639812Abstract: The invention is directed to a source device and a method for encrypting digital contents at the source device. According to an embodiment, the method includes receiving digital content from an external device, the digital content being encrypted using a first encryption algorithm in the external device; decrypting the received digital content; performing an addition operation by using a first source internal key and an identifier (ID), the ID being associated with at least one of a target device and a storage medium of the target device; generating a source encryption key based on an output of the addition operation and a second source internal key by using a second encryption algorithm; re-encrypting the decrypted digital content using the source encryption key; and transmitting the re-encrypted digital content without the source encryption key to the target device.Type: GrantFiled: July 6, 2009Date of Patent: December 29, 2009Assignee: LG Electronics Inc.Inventors: Young-Soon Cho, Myeong-Joon Kang, Jae-Young Kim, Han Jung
-
Patent number: 7376828Abstract: A method and apparatus for using a service provider network that supports point-to-point channels is disclosed. One or more encryption parameters are associated with a channel from among a set of one or more predefined point-to-point channels provided by the service provider to connect customer points for a customer different than the service provider. Payloads for a particular flow of one or more data packets directed through the channel are encrypted at a first customer point, using the set of encryption parameters associated with the particular channel, to generate a set of one or more encrypted payloads. The encrypted payloads are inserted in the particular flow sent through the channel of the service provider network. The encrypted payloads are decrypted at a second customer point connected to the first customer point by the channel.Type: GrantFiled: July 1, 2002Date of Patent: May 20, 2008Assignee: Cisco Technology, Inc.Inventors: Eric Voit, Pratima Sethi, Jan Vilhuber
-
Patent number: 7370364Abstract: Content resources are managed. A request is received from a user for access to a source of content resources. It is determined that the user is authorized for access to the source. A portal Web page is generated based on a set of content element data applicable to the subscriber. The portal Web page is returned to the user. A system for use in managing content resources has a switch for receiving requests from Web browsers, a content resource management engine in communication with the switch, and a billing system in communication with the content resource management engine.Type: GrantFiled: July 31, 2001Date of Patent: May 6, 2008Assignee: Ellacoya Networks, Inc.Inventors: Kurt A. Dobbins, Jason P. Poirier, Wouter Johan Weiss, Andre C. Boutin, Justin William Haddad, Stephen G. Delahunty, David L. Cullerot, Mark Thomas Sexton, Adam Michael Lederman, Christopher Lawrence Cheetham, David Ruffen
-
Patent number: 7369660Abstract: Methods and an apparatus for distributing digital content via a host receiver (e.g., direct-to-home satellite host receiver) are disclosed. The disclosed techniques include transmission of a host identifier and a client identifier from a host receiver and a client device to a satellite transmission station. The identifiers are used by the transmission station to lookup unique encryption keys associated with the host receiver and client device. The transmission station then transmits one or more encrypted keys to the host and/or client. In addition, the transmission station transmits encrypted content to the host. In turn, the host decrypts the content using one encryption key, re-encrypts the content using another encryption key, and passes the content along to the client device. By using the smart card, tuner, and/or storage device of the host receiver, the client device need not include a smart card, tuner, and/or storage device.Type: GrantFiled: May 20, 2003Date of Patent: May 6, 2008Assignee: The DIRECTV Group, Inc.Inventors: Raynold M. Kahn, Gregory J. Gagnon
-
Patent number: 7360091Abstract: A smart card and a settlement terminal are provided by which, when common-key cryptography is used for value transfer between smart cards, the security of the whole system can be improved by enabling easy updating of a cryptographic key used for the value transfer. A smart card transmits/receives value data to/from another smart card. The smart card includes an information accumulating unit for accumulating value data, a transfer key used to update the value data, and an update key used to update the transfer key; a communication unit for receiving a transfer key encrypted by use of the update key, the transfer key being transmitted from another smart card; and an arithmetic processing unit for decrypting the encrypted transfer key by use of the update key to update the transfer key accumulated in the information accumulating unit by use of the decrypted transfer key.Type: GrantFiled: June 25, 2003Date of Patent: April 15, 2008Assignee: Hitachi, Ltd.Inventors: Makoto Aikawa, Yutaka Takami, Shinichiro Fukushima
-
Patent number: 7353543Abstract: A contents supply apparatus supplies sub-content that relates to main content. A DVD-ROM stores a bind key unique to the DVD-ROM and main content that is a digital work. A main player reads the bind key from the DVD-ROM, acquires sub-content that relates to the main content stored on the DVD-ROM, generates encrypted sub-content by encrypting the acquired sub-content based on the read bind key, and writes the generated encrypted content to an SD memory card. A sub-player reads the bind key from the DVD-ROM, reads the encrypted sub-content from the SD memory card, generates sub-content by decrypting the read encrypted sub-content based on the bind key, and plays back the generated sub-content.Type: GrantFiled: January 10, 2003Date of Patent: April 1, 2008Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Motoji Ohmori, Masataka Minami, Masaya Yamamoto
-
Patent number: 7340775Abstract: A system, method and computer program product are provided for preventing writes to critical files. Initially, factors associated with a computer are identified. Then, requests to write to files on the computer are monitored. The writes to the files on the computer are conditionally prevented based on the factors to prevent virus proliferation. In use, the factors are altered based on the monitoring of the requests.Type: GrantFiled: December 20, 2001Date of Patent: March 4, 2008Assignee: McAfee, Inc.Inventors: Lee Codel Lawson Tarbotton, Daniel J. Wolff, Neil A. Cowie
-
Patent number: 7340059Abstract: A scrambler circuit for digital telephony equipment receives a sequence of input bits, generates the sequence of output bits based on the input bits and stores the sequence of output bits. The generating of the sequence of output bits includes selecting at least one of the stored output bits in accordance with contents of a mask register, and applying a logic operation to a current input bit and the selected at least one stored output bit to provide a current output bit.Type: GrantFiled: June 17, 2003Date of Patent: March 4, 2008Assignee: Intel CorporationInventors: Ronald D. Olsen, Jon C. Melnik
-
Patent number: 7200227Abstract: A shared-key encryption scheme that uses identically keyed block-cipher calls, low additional overhead, supports the encryption of arbitrary-length strings, produces a minimal-length-ciphertext, and is fully parallelizable. In one embodiment, “OCB”, a key shared between communicating parties is mapped to a key variant using the block cipher. The key variant is mapped into a sequence of basis offsets using shifts and conditional xors. To encrypt a message using a nonce, a nonce-dependent base offset is formed, and then a sequence of offsets is constructed by starting with the base offset and then xoring, for each offset, an appropriate basis offset. The message is partitioned into message blocks of the same length as the block length of the block cipher, along with a message fragment that may be shorter. Each message block is combined with a corresponding offset, enciphered, and then combined again with the offset, yielding a ciphertext block.Type: GrantFiled: July 18, 2005Date of Patent: April 3, 2007Inventor: Phillip Rogaway
-
Patent number: 7200549Abstract: A cryptographic method and equipment decrypting a cryptographic key by generating an auxiliary code based on a randomly determined numeric key and including a result of encryption into a cryptogram. Upon decryption, the cryptographic key is restored using the numeric key restored according to the entire cryptogram. A cryptographic method and equipment scrambles and encrypts physical characteristic information, and descrambles a result of a decryption, thereby enabling any alteration to a cryptogram to be detected because even a minor alteration thereto changes the result of the decryption. A remote identification system encrypts physical characteristic information using a password as a cryptographic key, and fluctuation of the physical characteristic information, authenticating information represented as a different bit pattern at each identifying processing is generated and sent to a transmission medium.Type: GrantFiled: May 31, 2000Date of Patent: April 3, 2007Assignee: Fujitsu LimitedInventors: Yusaku Fujii, Takashi Shinzaki
-
Patent number: 7065657Abstract: A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward- and backward-chaining using rules. Also provided are sensors, which communicate with the analysis engine using a meta-protocol in which the data packet comprises a 4-tuple. A configuration discovery mechanism locates host system files and communicates the locations to the analysis engine. A file processing mechanism matches contents of a deleted file to a directory or filename, and a directory processing mechanism extracts deallocated directory entries from a directory, creating a partial ordering of the entries. A signature checking mechanism computes the signature of a file and compares it to previously computed signatures. A buffer overflow attack detector compares access times of commands and their associated files.Type: GrantFiled: August 30, 2000Date of Patent: June 20, 2006Assignee: Symantec CorporationInventor: Douglas B. Moran
-
Patent number: 7054443Abstract: A digital rights management (DRM) distribution architecture produces and distributes digital goods (e.g., software, audio, video, and other content) in a fashion that renders the digital goods resistant to many known forms of attacks. The DRM distribution architecture protects digital goods by automatically and randomly manipulating portions of the code using multiple protection techniques. Applying a mixture protection techniques in random fashion makes it extremely difficult for pirates to create illicit copies that go undetected as legitimate copies. In addition, the architecture also supports a quantitative unit that allows a producer to specify how much protection may be added to the digital good.Type: GrantFiled: March 27, 2000Date of Patent: May 30, 2006Assignee: Microsoft CorporationInventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan, Saurabh Sinha
-
Patent number: 7035404Abstract: A shuffle with proof having a method for proof generating with small computational resources proportionate to the number of input encrypted messages and a corresponding method for verification. Shuffle is represented by a generalized transformation. Combining a proof that the transformation information is retained and a proof of a condition under which the transformation is met constitute the proof for shuffle. The two proofs are short proportional to the number of input encrypted messages. Transformation information retention is proved in such a manner that, since the response is generated from challenge value in dependency upon transformation, the condition under which the transformation is met is reflected in the response-challenge value relation. If the condition under which the transformation corresponding to the shuffle is selected as the condition for proof, the two proofs may constitute the proof for shuffle.Type: GrantFiled: March 2, 2001Date of Patent: April 25, 2006Assignee: NEC CorporationInventor: Jun Furukawa