Using Master Key (e.g., Key-encrypting-key) Patents (Class 380/284)
-
Patent number: 7568111Abstract: A system and method is disclosed for providing DRM in a broadcast environment. In accordance with the embodiment, a DRM system distributes encrypted service keys over the mobile telephone network to a mobile terminal. The mobile terminal receives the encrypted service key and uses it to decrypt encrypted content keys received from a DVB set top box. The decrypted content keys are sent to the set box over local link where they are used to decrypt encrypted broadcast content.Type: GrantFiled: November 11, 2003Date of Patent: July 28, 2009Assignee: Nokia CorporationInventors: Jukka Alve, Ari Ikonen, Mauri Kangas, Tapani Heikkilä
-
Patent number: 7565135Abstract: A method and apparatus for performing authentication in a communications system is provided. The method includes receiving a request for authentication from a server, the request for authentication including a first and a second random challenge, and comparing the first random challenge and the second random challenge. The method further includes denying the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge, and transmitting an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is generated based on the first and second random challenge and a key that is not shared with the server.Type: GrantFiled: September 26, 2006Date of Patent: July 21, 2009Assignee: Alcatel-Lucent USA Inc.Inventor: Sarvar M. Patel
-
Publication number: 20090183005Abstract: A method is provided for use in distributing access to a data item. The method includes allowing multiple transfers between computers of a single instance of permission to gain access to the data item, the transfers occurring across data connections and including a first transfer between a first computer and a second computer and a subsequent transfer between the second computer and a third computer, wherein at any one time only one computer retains the instance of permission and is able to use the instance of permission to gain access to the data item.Type: ApplicationFiled: March 16, 2009Publication date: July 16, 2009Inventors: Leonard M. Kawell, JR., Thomas R. Diaz, Mary Ellen Heinen, Roger J. Heinen, JR.
-
Patent number: 7561696Abstract: Various embodiments permit policy updates, such as DRM policy updates, to be delivered and updated for a given piece of protected content. In at least some embodiments, various protocols can be extended to permit policy updates to be represented and carried by the protocol. In one embodiment, Hypertext Transport Protocol or HTTP is utilized to carry the policy updates. In another embodiment, Real Time Streaming Protocol or RTSP is used to carry policy updates.Type: GrantFiled: July 12, 2005Date of Patent: July 14, 2009Assignee: Microsoft CorporationInventors: Eduardo P. Oliveira, James M. Alkove, Anders E. Klemets
-
Patent number: 7548624Abstract: Program materials received from a direct broadcast satellite system are distributed between a host receiver and a client receiver for remote decryption. Using either a same pairing key or different host and client pairing keys, an encrypted media encryption key is received at both the host and client receivers, and the encrypted media encryption key is decrypted at both the host and client receivers using the pairing key. Encrypted program materials are received from the broadcast system at the host receiver, and the encrypted program materials are decrypted at the host receiver using the media encryption key. The encrypted program materials are also transferred from the host receiver to the client receiver, where the encrypted program materials are decrypted at the client receiver using the media encryption key.Type: GrantFiled: January 16, 2004Date of Patent: June 16, 2009Assignee: The DIRECTV Group, Inc.Inventors: Raynold M. Kahn, Ronald P. Cocchi, Gregory J. Gagnon
-
Patent number: 7546468Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.Type: GrantFiled: October 30, 2003Date of Patent: June 9, 2009Assignee: Panasonic CorporationInventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
-
Patent number: 7539312Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.Type: GrantFiled: May 14, 2007Date of Patent: May 26, 2009Assignee: Panasonic CorporationInventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
-
Publication number: 20090122981Abstract: A scramble key generation unit generates scramble keys (individual encryption keys) which are different from one another and which are for encrypting and decrypting distributing data, by subjecting a predetermined initial encryption key at least once to a unidirectional reverse replacement and at least once to a trapdoor-equipped unidirectional replacement. A time key generation unit generates a time key (master encryption key) for regenerating the scramble keys, by subjecting any of the scramble keys generated by the scramble key generation unit at least once to the unidirectional reverse replacement. Thus, it is possible to efficiently and flexibly generate the individual encryption keys for encrypting and decrypting the distribution data, and master encryption key capable of regenerating some of the individual encryption keys.Type: ApplicationFiled: December 9, 2005Publication date: May 14, 2009Inventor: Yuichi Kaji
-
Publication number: 20090116646Abstract: The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is obtained in an electronic device. The encrypted master integrity key is decrypted in the electronic device. At least one session integrity key is formed in the streaming node and in the electronic device using at least the master integrity key and the integrity of at least one content stream is protected between the streaming node and the electronic device using the at least one session integrity key.Type: ApplicationFiled: September 12, 2008Publication date: May 7, 2009Inventor: Sami Pippuri
-
Patent number: 7522727Abstract: A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).Type: GrantFiled: August 31, 2006Date of Patent: April 21, 2009Assignee: Motorola, Inc.Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J. Chater-Lea, Scott J. Pappas, Jason Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson
-
Publication number: 20090099967Abstract: Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring apparatus, second identification information identifying vital sign data, and third identification information identifying the server. The key management server generates the decryption key using the first identification information, and stores fourth identification information identifying a server predetermined as a destination of the decryption key, and fifth identification information indicating the category of the vital sign data in correspondence with the fourth identification information. The key management server transmits the decryption key to the server, when the received third identification information matches the fourth identification information, and the received second identification information matches the fifth identification information.Type: ApplicationFiled: October 10, 2008Publication date: April 16, 2009Inventors: Kaoru Yokota, Masao Nonaka, Yuichi Futa, Natsume Matsuzaki, Shunji Harada
-
Patent number: 7519180Abstract: Copy protection techniques that utilize a watermark and a permission key are disclosed. The copy protection techniques can provide single-copy copy protection in addition to different levels of copy protection. The permission key and the watermark can also permit the invention to yield variable levels of copy protection. In one embodiment, content including a watermark is transmitted to a recipient. The recipient is allowed to read the content but not record the content unless the recipient possesses a permission key.Type: GrantFiled: December 20, 2002Date of Patent: April 14, 2009Assignee: Apple Inc.Inventor: Paul J. Wehrenberg
-
Patent number: 7519999Abstract: A digital subscriber communication terminal includes an adaptive output interface having a device key set, which, along with a subscriber device coupled to the adaptive output interface, determines a “shared secret.” The adaptive output interface uses the “shared secret” to encrypt content and transmits the content to the subscriber device coupled to the adaptive output interface. The digital subscriber communications terminal includes a processor, a memory having an encrypted device key set and an encrypted device key set decryptor stored therein and a secure element having a key decryptor. The secure element is adapted to receive the encrypted device key set decryptor and use the key decryptor to decrypt the encrypted device key set decryptor. The device key set decryptor is provided to the processor, which decrypts the encrypted device key set using the device key set decryptor, and the device key set is loaded into the adaptive output interface.Type: GrantFiled: February 27, 2004Date of Patent: April 14, 2009Assignee: Scientific-Atlanta, Inc.Inventor: David A. Sedacca
-
Patent number: 7519179Abstract: Described herein is an information transmission apparatus for encrypting and transmitting first data and second data, the information transmission apparatus including: encryption element for deriving a second key from a first key by using an irreversible function, encrypting the first data by using the first key to generate encrypted first data and encrypting the second data by using the second key to generate encrypted second data; and transmission element for transmitting the encrypted first data, the encrypted second data and the first key.Type: GrantFiled: May 27, 2004Date of Patent: April 14, 2009Assignee: Sony CorporationInventor: Makoto Shiina
-
Patent number: 7516327Abstract: A method is provided for use in distributing access to a data item. The method includes allowing multiple transfers between computers of a single instance of permission to gain access to the data item, the transfers occurring across data connections and including a first transfer between a first computer and a second computer and a subsequent transfer between the second computer and a third computer, wherein at any one time only one computer retains the instance of permission and is able to use the instance of permission to gain access to the data item.Type: GrantFiled: January 4, 2007Date of Patent: April 7, 2009Assignee: Adobe Systems IncorporatedInventors: Leonard M. Kawell, Jr., Thomas R. Diaz, Mary Ellen Heinen, Roger J. Heinen, Jr.
-
Patent number: 7512798Abstract: A method is employed to propagate rights management (RM) protection to an email and to an attachment thereof comprising an RM-protectable document. The email with the RM-protectable attachment is authored, and a content key (KD) and a bind ID are generated. RM protection is first applied to the RM-protectable attachment of the email based on the generated (KD) and the generated bind ID, and the RM-protected attachment is attached to the email. RM protection is then applied to the email with the attached RM-protected attachment based on the generated (KD) and the generated bind ID. The RM-protected email and the RM-protected attachment thereof thus share the generated (KD) and the generated bind ID such that a license obtained for the RM-protected email and having therein the generated bind ID and the generated (KD) can be applied to render the RM-protected email and also the RM-protected attachment thereof.Type: GrantFiled: June 27, 2003Date of Patent: March 31, 2009Assignee: Microsoft CorporationInventors: Jason Cahill, Chris Graham, Lauren Antonoff, Kevin Brown, Pavel Kouznetsov
-
Patent number: 7512989Abstract: A data loader device is used to convey digital data in a secure manner to another device. The data loader may be fixed (referred to as a Class_A loader) or portable (referred to as a Class_B loader). The data loader encrypts the digital data using a location-identity that permits the digital data to be transferred only if the data loader is disposed at an appropriate location. The fixed data loader remains in a stationary location, and a device to be loaded is brought to the data loader for loading. The portable data loader can be loaded by the fixed data loader, and then transported to another location to load a recipient device. The digital data that is conveyed is unrestricted in nature, and can include keys, navigational information, watermarking parameters, or any other digital content requiring secure delivery. In an embodiment, the data loader device includes a “no-move” system that precludes compromise of data contained therein if the data loader device is moved.Type: GrantFiled: October 22, 2002Date of Patent: March 31, 2009Assignee: Geocodex LLCInventor: Logan Scott
-
Patent number: 7509492Abstract: Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer systems are able to recover them. In one embodiment, the resource keys are encrypted using encryption public keys of the authorized peer systems or the groups to which the authorized peer system are members. In one embodiment, the encryption public keys of individual or groups of authorized peer systems are published for resource publishing peer systems through client and group key files respectively. Group encryption private keys are made available to the group members through published group key files. Further, advanced features including but not limited to resource key file inheritance, password protected publication, obfuscated publication, content signing, secured access via gateways, and secured resource search are supported.Type: GrantFiled: March 27, 2002Date of Patent: March 24, 2009Assignee: Microsoft CorporationInventors: Xavier Boyen, Zhenyu Qian, Dan Teodosiu
-
Patent number: 7499552Abstract: A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key. The cipher method involves a decryption of the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key, a decryption of the verification text with the user data key as decrypted with the decryption key, and a validation/invalidation of a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched/unmatched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text.Type: GrantFiled: January 11, 2006Date of Patent: March 3, 2009Assignee: International Business Machines CorporationInventors: Andrew N. Wilt, Michael J. Kelly
-
Patent number: 7499551Abstract: The disclosure encrypts and decrypts data using public key infrastructure with and allows an authorized third party to access and decrypt the encrypted data as required without requiring private key escrow. The disclosure utilizes a user private key, a user public key, a master private key, a master public key, and a session key generated by the system. The data is encrypted utilizing the session key. The session key is encrypted once utilizing the user public key and again utilizing the master public key. The encrypted data and the encrypted session keys are included in a data packet that is transmitted from one data processing system to another. The session key is decrypted utilizing the user private key. The data is decrypted utilizing the session key. When the authorized third party requires access to the data on the destination processing system, the session key is decrypted with the master private key and the data is decrypted with the session key.Type: GrantFiled: May 14, 1999Date of Patent: March 3, 2009Assignee: Dell Products L.P.Inventor: Philip Jason Mire
-
Patent number: 7493429Abstract: The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire, an unused pin, etc.), whereby these components may communicate without the use of the system bus. The non-bus communication channel may be referred to as “side-band.” The side-band channel may be used to communicate information that might identify the user's hardware (e.g., a public key) or other information that the user may not want to be easily intercepted by the public at large. Communication over the side-band channel may also be used to verify that the participants in a communication are within a defined positional relationship to each other.Type: GrantFiled: January 16, 2004Date of Patent: February 17, 2009Assignee: Microsoft CorporationInventors: John E. Paff, Marcus Peinado, Thekkthalackal Varugis Kurien, Bryan Mark Willman, Paul England, Andrew John Thornton
-
Patent number: 7490242Abstract: A system, method and computer program product are provided for managing authentication information for a user. According to the method, a master digital key is received from the user, and authentication of the user is obtained based on the master digital key. There is received from the user a selection of one identity from among a plurality of identities that are stored for the user. Authentication information for the user is provided into an application or web page based on the one identity selected by the user. In one embodiment, the authentication information is provided by recognizing a web page for which authentication information is stored, and automatically filling the authentication information for the user into appropriate elements of the web page.Type: GrantFiled: February 9, 2004Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: Elias D. Torres, Christopher R. Vincent
-
Patent number: 7477749Abstract: The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is obtained in an electronic device. The encrypted master integrity key is decrypted in the electronic device. At least one session integrity key is formed in the streaming node and in the electronic device using at least the master integrity key and the integrity of at least one content stream is protected between the streaming node and the electronic device using the at least one session integrity key.Type: GrantFiled: May 12, 2004Date of Patent: January 13, 2009Assignee: Nokia CorporationInventor: Sami Pippuri
-
Patent number: 7471796Abstract: A security system for controlling access to encrypted information, comprising: a memory for storing at least one decryption key for use in decrypting an encrypted item of information, the decryption key being associated with a security code which can be used to determine whether the security system is authorized to send encrypted copies of the decryption key to others. If the security system is authorized to send an encrypted copy of the decryption key, it encrypts the decryption key and propagates the encrypted copy of the decryption key. Each time the security system propagates a decryption key, it includes as part of the decryption key an identifier indicating the identity of a sender's key. A user can append a control word against their identity in the decryption key to instruct the security system to initiate a message to them or an agent informing them of the propagation of the key and giving information concerning that propagation.Type: GrantFiled: July 20, 2006Date of Patent: December 30, 2008Assignee: Data Encryption Systems LimitedInventor: David Robin Tomlinson
-
Patent number: 7469050Abstract: A document store delivers a document requested therefrom from a folder having rights information associated therewith. In response to a request for a copy of the document, rights data for the copy of the document is defined based on the rights information of the folder, and the copy of the document and the defined rights data thereof are published to result in a package with the rights data and the copy of the document encrypted according to a content key (KD) to result in (KD(copy)). The formed package is then delivered to the requester. The rights data can be discovered upon the requester attempting to render the package and such discovery triggers a request for a corresponding license based on such rights data. The license includes (KD) therein in a form available to the requester to decrypt (KD(copy)) if the requester satisfies the rights data.Type: GrantFiled: August 1, 2003Date of Patent: December 23, 2008Assignee: Microsoft CorporationInventors: Pavel Kouznetsov, Jason Cahill, Lauren Antonoff, Kevin Brown, Moshe Randall Lutz, Lutz Gerhard, Mark Walker
-
Patent number: 7463739Abstract: Disclosed are a system and a method for transferring with improved security root keys from a key provider system to a customer system via an information network that is other than secure. The key provider provides a secure module having a super-root key stored therein within the customer system. The super-root key is accessible internally to the module only by program code executable on a processor internal to the module, and only in response to a request from a corresponding module of the key provider system. The super-root key is only for use in decrypting encrypted root keys that are provided from the key provider system, which decrypted root keys are stored internally to the secure module.Type: GrantFiled: August 2, 2001Date of Patent: December 9, 2008Assignee: SafeNet, Inc.Inventor: Bruno Couillard
-
Patent number: 7464265Abstract: Disclosed are methods for a client, having established one set of security keys, to establish a new set without having to communicate with an authentication server. When the client joins a group, master session security keys are derived and made known to the client and to the group's access server. From the master session security keys, the access server and client each derive transient session security keys, used for authentication and encryption. To change the transient session security keys, the access server creates “liveness” information and sends it to the client. New master session security keys are derived from the liveness information and the current set of transient session security keys. From these new master session security keys are derived new transient session security keys. This process limits the amount of data sent using one set of transient session security keys and thus limits the effectiveness of any statistical attacker.Type: GrantFiled: May 3, 2002Date of Patent: December 9, 2008Assignee: Microsoft CorporationInventors: Arun Ayyagari, Daniel R. Simon, Bernard D. Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl
-
Patent number: 7461253Abstract: A method and apparatus for providing a key for secure communications is provided herein. During operation a node wishing to join a network, will authenticate with an authentication server and then derive a pairwise key (e.g., a Pair-wise Transient Key (PTK)) used for encryption of unicast traffic. The node will also create its own group transient key (GTK) for use in encrypting multicast or broadcast traffic. Once the GTK is generated, it will be provided to an authenticator as part of an association request message.Type: GrantFiled: November 20, 2006Date of Patent: December 2, 2008Assignee: Motorola, Inc.Inventors: Anthony J. Braskich, Stephen P. Emeott
-
Patent number: 7454021Abstract: Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.Type: GrantFiled: October 29, 2004Date of Patent: November 18, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Prakash Reddy, James Rowson
-
Patent number: 7451926Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: November 3, 2006Date of Patent: November 18, 2008Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Patent number: 7440574Abstract: Methods and apparatus are disclosed for a content encryption scheme using programmable hardware. In one embodiment, a content request is transmitted to a content provider. In response to the content request, a session key is received and programmable hardware is configured using the session key to produce a first configuration. An identification key is generated and the first configuration of the programmable hardware is used to encrypt the identification key. The encrypted identification key is transmitted to the content provider. Encrypted content containing the identification key is then received.Type: GrantFiled: June 11, 2003Date of Patent: October 21, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Darwin Mitchel Hanks, Alexandra Delorme
-
Patent number: 7437567Abstract: Data key actuated devices such as high security doors are modified so that they periodically transmit an identity pattern. An authorized user is provided with a portable access device storing keys for a number of such key actuated devices, with each key associated with an identity pattern for that device. The portable access device has a stored template comprising a fingerprint of the authorized user combined with a verification code. When the authorized user applies their fingerprint to the portable access device the verification code is returned which allows verification of the user. If the access device then receives a key actuated device identifier matching one in storage, the associated access key is retrieved and transmitted to the key actuated device to allow access to the user.Type: GrantFiled: December 6, 2001Date of Patent: October 14, 2008Assignee: Bioscrypt Inc.Inventor: Dennis W. Hollingshead
-
Patent number: 7434052Abstract: In a method for producing an encrypted method payload data stream comprising a header and a block containing encrypted payload data, a payload data key for a payload data encryption algorithm for encrypting payload data is generated. The payload data is encrypted using the generated payload data key and the payload data encryption algorithm to obtain the block containing the encrypted payload data of the payload stream. A part of the payload data stream is processed to deduce information marking the part of the payload data stream. The information is linked with the payload data by means of an invertible logic linkage to obtain a basic value. This basic value is finally encrypted using a key of two keys being different from each other by an asymmetrical encryption method, the two different keys being the public and the private keys respectively for the asymmetrical encryption method to obtain an output value being an encrypted version of the payload data key.Type: GrantFiled: December 15, 1999Date of Patent: October 7, 2008Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.Inventor: Niels Rump
-
Patent number: 7433474Abstract: On a recording medium, first information obtained by enciphering data with the first key and second information obtained by enciphering the first key with each of the predetermined second keys are recorded. A deciphering method is characterized by comprising the steps of inputting the first and second information, deciphering the first key using at least one of the second keys, determining by a specific method that the obtained first key is correct, and then deciphering the data using the first key to obtain the data.Type: GrantFiled: January 4, 2002Date of Patent: October 7, 2008Assignee: Kabushiki Kaisha ToshibaInventors: Takehisa Kato, Naoki Endoh, Hiroaki Unno, Tadashi Kojima, Koichi Hirayama
-
Patent number: 7418474Abstract: Methods and apparatus are described which provide secure interactive communication of text and image information between a central server computer and one or more client computers located at remote sites for the purpose of storing and retrieving files describing and identifying unique products, services, or individuals. Textual information and image data from one or more of the remote sites are stored separately at the location of the central server computer, with the image data being in compressed form, and with the textual information being included in a relational database with identifiers associated with any related image data. Means are provided at the central computer for management of all textural information and image data received to ensure that all information may be independently retrieved. Requests are entered from remote terminals specifying particular subject matter, and the system is capable of responding to multiple simultaneous requests.Type: GrantFiled: October 31, 2006Date of Patent: August 26, 2008Inventor: Barry H. Schwab
-
Patent number: 7415721Abstract: A method includes associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user. A second authentication process is also associated with the content, the second authentication process to protect the content from access by an unauthorized device. The first authentication process and the second authentication process are separate and distinct authentication processes. This enables an authorized user to access the content on an authorized device and prevents the authorized user from accessing the content on the unauthorized device.Type: GrantFiled: February 16, 2005Date of Patent: August 19, 2008Assignee: Entriq, Inc.Inventor: Robert W. Fransdonk
-
Patent number: 7409061Abstract: Methods and Systems for securely distributing software in a subscription-based environment are provided. In an example embodiment, a Game Security Facility (“GSF”) associated with a game server is used to manage secure communications with game clients. The GSF typically manages secure communication of the accounting and billing information and secure communication of game session data. In typical operation, the game client generates a pass-phrase that transparently includes a unique identifier of the machine upon which the subscription software will reside. RSA-type key pairs that are then generated using this pass-phrase will be associated uniquely with both the game player and with the machine upon which the software resides, thus preventing unauthorized copying to another machine or unauthorized use by a third party.Type: GrantFiled: November 29, 2001Date of Patent: August 5, 2008Assignee: Noatak Software LLCInventor: Christopher R. Newcombe
-
Patent number: 7403622Abstract: A symmetric key management process in a communication network comprising a source device furnished with a source of data to be broadcast over the network and at least one receiver device intended to receive the broadcast data. The process comprises: determining and securely transmitting a first symmetric key to a receiver device; the receiver device encrypting the first symmetric key using a second symmetric key and transmitting it to the source device; and the source device recovering and storing it. Before transmitting the data to at least one reception device, the source device encrypts these data with the aid of the first symmetric key, then it transmits these encrypted data, accompanied by the first encrypted symmetric key, to at least one receiver device. The receiver device decrypts the first symmetric key with the aid of the second key which it possesses, then it decrypts the encrypted data with the aid of the first symmetric key thus recovered.Type: GrantFiled: April 18, 2002Date of Patent: July 22, 2008Assignee: Thomson LicensingInventors: Eric Diehl, Jean-Pierre Andreaux
-
Patent number: 7392387Abstract: Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.Type: GrantFiled: February 26, 2007Date of Patent: June 24, 2008Assignee: Xerox CorporationInventors: Dirk Balfanz, Diana Smetters, Paul Stewart, Daniel C. Swinehart
-
Patent number: 7382883Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.Type: GrantFiled: December 14, 2006Date of Patent: June 3, 2008Assignee: Microsoft CorporationInventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
-
Patent number: 7372962Abstract: A storage system 1 includes a channel interface (IF) unit 11 having an interface with a server 3, a disk IF unit 16 having an interface with a hard disk unit 2 , a memory unit 21 for storing data to be read/written from/to the server 3 or the hard disk unit 2 , a switching unit 51, and the hard disk group 2. The channel IF unit 11, the disk IF unit 16, and the memory unit 21 are connected to each other through the switching unit 51, and an encryption and decryption processing unit 201 is provided between a host IF unit 101 and a transfer controller 103 in the channel IF unit 11.Type: GrantFiled: September 29, 2004Date of Patent: May 13, 2008Assignee: Hitachi, Ltd.Inventors: Kazuhisa Fujimoto, Makio Mizuno, Dai Watanabe
-
Patent number: 7359510Abstract: A content including replay condition information is encrypted using first key information while being recorded to a recording medium. The first key information is encrypted using the replay condition information and second key information while being recorded to the recording medium together with the replay condition information. The replay condition information and the first key information are read from the recording medium, and the first key information is decrypted using the replay condition information and the second key information. The content read from the recording medium is decrypted using the decrypted first key information.Type: GrantFiled: February 6, 2003Date of Patent: April 15, 2008Assignee: Kabushiki Kaisha ToshibaInventor: Masahiro Yamada
-
Patent number: 7359517Abstract: A document access control scheme uses digital “skeleton keys” to distribute access permissions for encrypted documents in a manner that does not require that rights management files (RMFs) be associated with each document. Multiple skeleton keys can be issued for the same document. The skeleton keys themselves can be opened by one or more other skeleton keys for different levels of document access.Type: GrantFiled: October 9, 2001Date of Patent: April 15, 2008Assignee: Adobe Systems IncorporatedInventor: Edward R. Rowe
-
Patent number: 7356143Abstract: A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, or over a network, or the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.Type: GrantFiled: February 24, 2006Date of Patent: April 8, 2008Assignee: Widevine Technologies, IncInventor: Glenn A. Morten
-
Patent number: 7349537Abstract: One embodiment of the present invention provides a system that decrypts downstream data in an Ethernet passive optical network (EPON). During operation, the system receives a data frame which is encrypted based on a remote input block and a session key, wherein the remote input block is constructed based on a remote cipher counter and a remote block counter. The system adjusts a local cipher counter based on a received checksum located in a preamble of the data frame, wherein the local cipher counter is substantially synchronized with the remote cipher counter. In addition, the system truncates the local cipher counter by discarding n least significant bits thereof. The system then constructs a local input block based on the truncated cipher counter and a local block counter for the received data frame. Next, the system decrypts the data frame based on the local input block and the session key.Type: GrantFiled: March 10, 2005Date of Patent: March 25, 2008Assignee: Teknovus, Inc.Inventors: Glen Kramer, Lawrence D. Davis, Edward W. Boyd, Ryan E. Hirth, Ngo Thahn Ho
-
Patent number: 7346169Abstract: An information processing device, information processing method and a recording medium are provided. Storage included in the information processing device is operable to store a node key and a leaf key, the leaf key being unique to the information processing device and the node key being unique to each node of a hierarchical network of nodes having a hierarchical tree structure. A decryption processor performs decryption processing to detect whether an encrypted decryption key for decrypting encrypted data is stored in at least one of on the information processing device or on a recording medium. When the encrypted decryption key is detected, the decryption processor is operable to calculate the decryption key by decrypting the encrypted decryption key. However, when the encrypted decryption key is not detected, the decryption processor is operable to calculate the decryption key by decrypting a key block using one of the one or more node keys stored in the storage and the leaf key stored in the storage.Type: GrantFiled: June 21, 2001Date of Patent: March 18, 2008Assignee: Sony CorporationInventors: Tomoyuki Asano, Yoshitomo Osawa, Ryuji Ishiguro, Atsushi Mitsuzawa, Tateo Oishi
-
Patent number: 7346771Abstract: Systems and methods are provided for managing and distributing keys between routers using protocol exchange messages between routers as key distribution vehicles. According to one embodiment of the invention, a router of an autonomous system uses its private key to send cryptographic information associated with another router to a peer router as part of its protocol exchange messages. The peer router is able to extract the cryptographic information and store it in a look-up table. Such protocol exchange messages may occur as part of an Interior Gateway Protocol or an Exterior Gateway Protocol. According to another embodiment of the invention, a chain authentication system is created as boundary routers of autonomous systems having a trust relationship share cryptographic information for other autonomous systems as part of protocol exchange messages for the exterior gateway protocol.Type: GrantFiled: November 13, 2002Date of Patent: March 18, 2008Assignee: Nokia CorporationInventor: Ram Gopal Lakshmi Narayanan
-
Publication number: 20080063209Abstract: A method, system and program are provided for enabling access to encrypted data in a storage cartridge by wrapping the data key used to encrypt the data with one or more encryption keys (e.g., a public key from a public/private key pair) to form one or more encryption encapsulated data keys (EEDKs) and then storing the EEDK(s) on the storage cartridge along with the encrypted data. The encrypted data may be decoded by retrieving the EEDK from the storage cartridge, decrypting the EEDK with a decryption key (e.g., the private key from the public/private key pair) to extract the underlying data key, and then using the extracted data key to decrypt the encrypted data.Type: ApplicationFiled: September 7, 2006Publication date: March 13, 2008Inventors: Glen A. Jaquette, Paul M. Greco, Shai Halevi, Wayne E. Rhoten
-
Patent number: 7337332Abstract: A method and apparatus for transferring electronic content. The method and apparatus include providing electronic content to a first user, providing the first user with a key packet, the key packet including a decryption key and content rights information, transferring the electronic content and the key packet from the first user to a second user and rendering rights of the first user to the electronic content unusable upon transfer of the electronic content and the key packet from the first user to the second user.Type: GrantFiled: July 10, 2001Date of Patent: February 26, 2008Assignee: NDS Ltd.Inventors: Yossi Tsuria, Stephanie Wald
-
Publication number: 20080046732Abstract: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.Type: ApplicationFiled: August 15, 2006Publication date: February 21, 2008Applicant: MOTOROLA, INC.Inventors: Zhi Fu, Donald E. Eastlake, Anthony R. Metke