Using Master Key (e.g., Key-encrypting-key) Patents (Class 380/284)
  • Patent number: 7568111
    Abstract: A system and method is disclosed for providing DRM in a broadcast environment. In accordance with the embodiment, a DRM system distributes encrypted service keys over the mobile telephone network to a mobile terminal. The mobile terminal receives the encrypted service key and uses it to decrypt encrypted content keys received from a DVB set top box. The decrypted content keys are sent to the set box over local link where they are used to decrypt encrypted broadcast content.
    Type: Grant
    Filed: November 11, 2003
    Date of Patent: July 28, 2009
    Assignee: Nokia Corporation
    Inventors: Jukka Alve, Ari Ikonen, Mauri Kangas, Tapani Heikkilä
  • Patent number: 7565135
    Abstract: A method and apparatus for performing authentication in a communications system is provided. The method includes receiving a request for authentication from a server, the request for authentication including a first and a second random challenge, and comparing the first random challenge and the second random challenge. The method further includes denying the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge, and transmitting an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is generated based on the first and second random challenge and a key that is not shared with the server.
    Type: Grant
    Filed: September 26, 2006
    Date of Patent: July 21, 2009
    Assignee: Alcatel-Lucent USA Inc.
    Inventor: Sarvar M. Patel
  • Publication number: 20090183005
    Abstract: A method is provided for use in distributing access to a data item. The method includes allowing multiple transfers between computers of a single instance of permission to gain access to the data item, the transfers occurring across data connections and including a first transfer between a first computer and a second computer and a subsequent transfer between the second computer and a third computer, wherein at any one time only one computer retains the instance of permission and is able to use the instance of permission to gain access to the data item.
    Type: Application
    Filed: March 16, 2009
    Publication date: July 16, 2009
    Inventors: Leonard M. Kawell, JR., Thomas R. Diaz, Mary Ellen Heinen, Roger J. Heinen, JR.
  • Patent number: 7561696
    Abstract: Various embodiments permit policy updates, such as DRM policy updates, to be delivered and updated for a given piece of protected content. In at least some embodiments, various protocols can be extended to permit policy updates to be represented and carried by the protocol. In one embodiment, Hypertext Transport Protocol or HTTP is utilized to carry the policy updates. In another embodiment, Real Time Streaming Protocol or RTSP is used to carry policy updates.
    Type: Grant
    Filed: July 12, 2005
    Date of Patent: July 14, 2009
    Assignee: Microsoft Corporation
    Inventors: Eduardo P. Oliveira, James M. Alkove, Anders E. Klemets
  • Patent number: 7548624
    Abstract: Program materials received from a direct broadcast satellite system are distributed between a host receiver and a client receiver for remote decryption. Using either a same pairing key or different host and client pairing keys, an encrypted media encryption key is received at both the host and client receivers, and the encrypted media encryption key is decrypted at both the host and client receivers using the pairing key. Encrypted program materials are received from the broadcast system at the host receiver, and the encrypted program materials are decrypted at the host receiver using the media encryption key. The encrypted program materials are also transferred from the host receiver to the client receiver, where the encrypted program materials are decrypted at the client receiver using the media encryption key.
    Type: Grant
    Filed: January 16, 2004
    Date of Patent: June 16, 2009
    Assignee: The DIRECTV Group, Inc.
    Inventors: Raynold M. Kahn, Ronald P. Cocchi, Gregory J. Gagnon
  • Patent number: 7546468
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Grant
    Filed: October 30, 2003
    Date of Patent: June 9, 2009
    Assignee: Panasonic Corporation
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Patent number: 7539312
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Grant
    Filed: May 14, 2007
    Date of Patent: May 26, 2009
    Assignee: Panasonic Corporation
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Publication number: 20090122981
    Abstract: A scramble key generation unit generates scramble keys (individual encryption keys) which are different from one another and which are for encrypting and decrypting distributing data, by subjecting a predetermined initial encryption key at least once to a unidirectional reverse replacement and at least once to a trapdoor-equipped unidirectional replacement. A time key generation unit generates a time key (master encryption key) for regenerating the scramble keys, by subjecting any of the scramble keys generated by the scramble key generation unit at least once to the unidirectional reverse replacement. Thus, it is possible to efficiently and flexibly generate the individual encryption keys for encrypting and decrypting the distribution data, and master encryption key capable of regenerating some of the individual encryption keys.
    Type: Application
    Filed: December 9, 2005
    Publication date: May 14, 2009
    Inventor: Yuichi Kaji
  • Publication number: 20090116646
    Abstract: The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is obtained in an electronic device. The encrypted master integrity key is decrypted in the electronic device. At least one session integrity key is formed in the streaming node and in the electronic device using at least the master integrity key and the integrity of at least one content stream is protected between the streaming node and the electronic device using the at least one session integrity key.
    Type: Application
    Filed: September 12, 2008
    Publication date: May 7, 2009
    Inventor: Sami Pippuri
  • Patent number: 7522727
    Abstract: A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: April 21, 2009
    Assignee: Motorola, Inc.
    Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J. Chater-Lea, Scott J. Pappas, Jason Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson
  • Publication number: 20090099967
    Abstract: Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring apparatus, second identification information identifying vital sign data, and third identification information identifying the server. The key management server generates the decryption key using the first identification information, and stores fourth identification information identifying a server predetermined as a destination of the decryption key, and fifth identification information indicating the category of the vital sign data in correspondence with the fourth identification information. The key management server transmits the decryption key to the server, when the received third identification information matches the fourth identification information, and the received second identification information matches the fifth identification information.
    Type: Application
    Filed: October 10, 2008
    Publication date: April 16, 2009
    Inventors: Kaoru Yokota, Masao Nonaka, Yuichi Futa, Natsume Matsuzaki, Shunji Harada
  • Patent number: 7519180
    Abstract: Copy protection techniques that utilize a watermark and a permission key are disclosed. The copy protection techniques can provide single-copy copy protection in addition to different levels of copy protection. The permission key and the watermark can also permit the invention to yield variable levels of copy protection. In one embodiment, content including a watermark is transmitted to a recipient. The recipient is allowed to read the content but not record the content unless the recipient possesses a permission key.
    Type: Grant
    Filed: December 20, 2002
    Date of Patent: April 14, 2009
    Assignee: Apple Inc.
    Inventor: Paul J. Wehrenberg
  • Patent number: 7519999
    Abstract: A digital subscriber communication terminal includes an adaptive output interface having a device key set, which, along with a subscriber device coupled to the adaptive output interface, determines a “shared secret.” The adaptive output interface uses the “shared secret” to encrypt content and transmits the content to the subscriber device coupled to the adaptive output interface. The digital subscriber communications terminal includes a processor, a memory having an encrypted device key set and an encrypted device key set decryptor stored therein and a secure element having a key decryptor. The secure element is adapted to receive the encrypted device key set decryptor and use the key decryptor to decrypt the encrypted device key set decryptor. The device key set decryptor is provided to the processor, which decrypts the encrypted device key set using the device key set decryptor, and the device key set is loaded into the adaptive output interface.
    Type: Grant
    Filed: February 27, 2004
    Date of Patent: April 14, 2009
    Assignee: Scientific-Atlanta, Inc.
    Inventor: David A. Sedacca
  • Patent number: 7519179
    Abstract: Described herein is an information transmission apparatus for encrypting and transmitting first data and second data, the information transmission apparatus including: encryption element for deriving a second key from a first key by using an irreversible function, encrypting the first data by using the first key to generate encrypted first data and encrypting the second data by using the second key to generate encrypted second data; and transmission element for transmitting the encrypted first data, the encrypted second data and the first key.
    Type: Grant
    Filed: May 27, 2004
    Date of Patent: April 14, 2009
    Assignee: Sony Corporation
    Inventor: Makoto Shiina
  • Patent number: 7516327
    Abstract: A method is provided for use in distributing access to a data item. The method includes allowing multiple transfers between computers of a single instance of permission to gain access to the data item, the transfers occurring across data connections and including a first transfer between a first computer and a second computer and a subsequent transfer between the second computer and a third computer, wherein at any one time only one computer retains the instance of permission and is able to use the instance of permission to gain access to the data item.
    Type: Grant
    Filed: January 4, 2007
    Date of Patent: April 7, 2009
    Assignee: Adobe Systems Incorporated
    Inventors: Leonard M. Kawell, Jr., Thomas R. Diaz, Mary Ellen Heinen, Roger J. Heinen, Jr.
  • Patent number: 7512798
    Abstract: A method is employed to propagate rights management (RM) protection to an email and to an attachment thereof comprising an RM-protectable document. The email with the RM-protectable attachment is authored, and a content key (KD) and a bind ID are generated. RM protection is first applied to the RM-protectable attachment of the email based on the generated (KD) and the generated bind ID, and the RM-protected attachment is attached to the email. RM protection is then applied to the email with the attached RM-protected attachment based on the generated (KD) and the generated bind ID. The RM-protected email and the RM-protected attachment thereof thus share the generated (KD) and the generated bind ID such that a license obtained for the RM-protected email and having therein the generated bind ID and the generated (KD) can be applied to render the RM-protected email and also the RM-protected attachment thereof.
    Type: Grant
    Filed: June 27, 2003
    Date of Patent: March 31, 2009
    Assignee: Microsoft Corporation
    Inventors: Jason Cahill, Chris Graham, Lauren Antonoff, Kevin Brown, Pavel Kouznetsov
  • Patent number: 7512989
    Abstract: A data loader device is used to convey digital data in a secure manner to another device. The data loader may be fixed (referred to as a Class_A loader) or portable (referred to as a Class_B loader). The data loader encrypts the digital data using a location-identity that permits the digital data to be transferred only if the data loader is disposed at an appropriate location. The fixed data loader remains in a stationary location, and a device to be loaded is brought to the data loader for loading. The portable data loader can be loaded by the fixed data loader, and then transported to another location to load a recipient device. The digital data that is conveyed is unrestricted in nature, and can include keys, navigational information, watermarking parameters, or any other digital content requiring secure delivery. In an embodiment, the data loader device includes a “no-move” system that precludes compromise of data contained therein if the data loader device is moved.
    Type: Grant
    Filed: October 22, 2002
    Date of Patent: March 31, 2009
    Assignee: Geocodex LLC
    Inventor: Logan Scott
  • Patent number: 7509492
    Abstract: Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer systems are able to recover them. In one embodiment, the resource keys are encrypted using encryption public keys of the authorized peer systems or the groups to which the authorized peer system are members. In one embodiment, the encryption public keys of individual or groups of authorized peer systems are published for resource publishing peer systems through client and group key files respectively. Group encryption private keys are made available to the group members through published group key files. Further, advanced features including but not limited to resource key file inheritance, password protected publication, obfuscated publication, content signing, secured access via gateways, and secured resource search are supported.
    Type: Grant
    Filed: March 27, 2002
    Date of Patent: March 24, 2009
    Assignee: Microsoft Corporation
    Inventors: Xavier Boyen, Zhenyu Qian, Dan Teodosiu
  • Patent number: 7499552
    Abstract: A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key. The cipher method involves a decryption of the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key, a decryption of the verification text with the user data key as decrypted with the decryption key, and a validation/invalidation of a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched/unmatched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text.
    Type: Grant
    Filed: January 11, 2006
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Andrew N. Wilt, Michael J. Kelly
  • Patent number: 7499551
    Abstract: The disclosure encrypts and decrypts data using public key infrastructure with and allows an authorized third party to access and decrypt the encrypted data as required without requiring private key escrow. The disclosure utilizes a user private key, a user public key, a master private key, a master public key, and a session key generated by the system. The data is encrypted utilizing the session key. The session key is encrypted once utilizing the user public key and again utilizing the master public key. The encrypted data and the encrypted session keys are included in a data packet that is transmitted from one data processing system to another. The session key is decrypted utilizing the user private key. The data is decrypted utilizing the session key. When the authorized third party requires access to the data on the destination processing system, the session key is decrypted with the master private key and the data is decrypted with the session key.
    Type: Grant
    Filed: May 14, 1999
    Date of Patent: March 3, 2009
    Assignee: Dell Products L.P.
    Inventor: Philip Jason Mire
  • Patent number: 7493429
    Abstract: The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire, an unused pin, etc.), whereby these components may communicate without the use of the system bus. The non-bus communication channel may be referred to as “side-band.” The side-band channel may be used to communicate information that might identify the user's hardware (e.g., a public key) or other information that the user may not want to be easily intercepted by the public at large. Communication over the side-band channel may also be used to verify that the participants in a communication are within a defined positional relationship to each other.
    Type: Grant
    Filed: January 16, 2004
    Date of Patent: February 17, 2009
    Assignee: Microsoft Corporation
    Inventors: John E. Paff, Marcus Peinado, Thekkthalackal Varugis Kurien, Bryan Mark Willman, Paul England, Andrew John Thornton
  • Patent number: 7490242
    Abstract: A system, method and computer program product are provided for managing authentication information for a user. According to the method, a master digital key is received from the user, and authentication of the user is obtained based on the master digital key. There is received from the user a selection of one identity from among a plurality of identities that are stored for the user. Authentication information for the user is provided into an application or web page based on the one identity selected by the user. In one embodiment, the authentication information is provided by recognizing a web page for which authentication information is stored, and automatically filling the authentication information for the user into appropriate elements of the web page.
    Type: Grant
    Filed: February 9, 2004
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Elias D. Torres, Christopher R. Vincent
  • Patent number: 7477749
    Abstract: The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is obtained in an electronic device. The encrypted master integrity key is decrypted in the electronic device. At least one session integrity key is formed in the streaming node and in the electronic device using at least the master integrity key and the integrity of at least one content stream is protected between the streaming node and the electronic device using the at least one session integrity key.
    Type: Grant
    Filed: May 12, 2004
    Date of Patent: January 13, 2009
    Assignee: Nokia Corporation
    Inventor: Sami Pippuri
  • Patent number: 7471796
    Abstract: A security system for controlling access to encrypted information, comprising: a memory for storing at least one decryption key for use in decrypting an encrypted item of information, the decryption key being associated with a security code which can be used to determine whether the security system is authorized to send encrypted copies of the decryption key to others. If the security system is authorized to send an encrypted copy of the decryption key, it encrypts the decryption key and propagates the encrypted copy of the decryption key. Each time the security system propagates a decryption key, it includes as part of the decryption key an identifier indicating the identity of a sender's key. A user can append a control word against their identity in the decryption key to instruct the security system to initiate a message to them or an agent informing them of the propagation of the key and giving information concerning that propagation.
    Type: Grant
    Filed: July 20, 2006
    Date of Patent: December 30, 2008
    Assignee: Data Encryption Systems Limited
    Inventor: David Robin Tomlinson
  • Patent number: 7469050
    Abstract: A document store delivers a document requested therefrom from a folder having rights information associated therewith. In response to a request for a copy of the document, rights data for the copy of the document is defined based on the rights information of the folder, and the copy of the document and the defined rights data thereof are published to result in a package with the rights data and the copy of the document encrypted according to a content key (KD) to result in (KD(copy)). The formed package is then delivered to the requester. The rights data can be discovered upon the requester attempting to render the package and such discovery triggers a request for a corresponding license based on such rights data. The license includes (KD) therein in a form available to the requester to decrypt (KD(copy)) if the requester satisfies the rights data.
    Type: Grant
    Filed: August 1, 2003
    Date of Patent: December 23, 2008
    Assignee: Microsoft Corporation
    Inventors: Pavel Kouznetsov, Jason Cahill, Lauren Antonoff, Kevin Brown, Moshe Randall Lutz, Lutz Gerhard, Mark Walker
  • Patent number: 7463739
    Abstract: Disclosed are a system and a method for transferring with improved security root keys from a key provider system to a customer system via an information network that is other than secure. The key provider provides a secure module having a super-root key stored therein within the customer system. The super-root key is accessible internally to the module only by program code executable on a processor internal to the module, and only in response to a request from a corresponding module of the key provider system. The super-root key is only for use in decrypting encrypted root keys that are provided from the key provider system, which decrypted root keys are stored internally to the secure module.
    Type: Grant
    Filed: August 2, 2001
    Date of Patent: December 9, 2008
    Assignee: SafeNet, Inc.
    Inventor: Bruno Couillard
  • Patent number: 7464265
    Abstract: Disclosed are methods for a client, having established one set of security keys, to establish a new set without having to communicate with an authentication server. When the client joins a group, master session security keys are derived and made known to the client and to the group's access server. From the master session security keys, the access server and client each derive transient session security keys, used for authentication and encryption. To change the transient session security keys, the access server creates “liveness” information and sends it to the client. New master session security keys are derived from the liveness information and the current set of transient session security keys. From these new master session security keys are derived new transient session security keys. This process limits the amount of data sent using one set of transient session security keys and thus limits the effectiveness of any statistical attacker.
    Type: Grant
    Filed: May 3, 2002
    Date of Patent: December 9, 2008
    Assignee: Microsoft Corporation
    Inventors: Arun Ayyagari, Daniel R. Simon, Bernard D. Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl
  • Patent number: 7461253
    Abstract: A method and apparatus for providing a key for secure communications is provided herein. During operation a node wishing to join a network, will authenticate with an authentication server and then derive a pairwise key (e.g., a Pair-wise Transient Key (PTK)) used for encryption of unicast traffic. The node will also create its own group transient key (GTK) for use in encrypting multicast or broadcast traffic. Once the GTK is generated, it will be provided to an authenticator as part of an association request message.
    Type: Grant
    Filed: November 20, 2006
    Date of Patent: December 2, 2008
    Assignee: Motorola, Inc.
    Inventors: Anthony J. Braskich, Stephen P. Emeott
  • Patent number: 7454021
    Abstract: Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.
    Type: Grant
    Filed: October 29, 2004
    Date of Patent: November 18, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Prakash Reddy, James Rowson
  • Patent number: 7451926
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: November 18, 2008
    Assignee: Microsoft Corporation
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Patent number: 7440574
    Abstract: Methods and apparatus are disclosed for a content encryption scheme using programmable hardware. In one embodiment, a content request is transmitted to a content provider. In response to the content request, a session key is received and programmable hardware is configured using the session key to produce a first configuration. An identification key is generated and the first configuration of the programmable hardware is used to encrypt the identification key. The encrypted identification key is transmitted to the content provider. Encrypted content containing the identification key is then received.
    Type: Grant
    Filed: June 11, 2003
    Date of Patent: October 21, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Darwin Mitchel Hanks, Alexandra Delorme
  • Patent number: 7437567
    Abstract: Data key actuated devices such as high security doors are modified so that they periodically transmit an identity pattern. An authorized user is provided with a portable access device storing keys for a number of such key actuated devices, with each key associated with an identity pattern for that device. The portable access device has a stored template comprising a fingerprint of the authorized user combined with a verification code. When the authorized user applies their fingerprint to the portable access device the verification code is returned which allows verification of the user. If the access device then receives a key actuated device identifier matching one in storage, the associated access key is retrieved and transmitted to the key actuated device to allow access to the user.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: October 14, 2008
    Assignee: Bioscrypt Inc.
    Inventor: Dennis W. Hollingshead
  • Patent number: 7434052
    Abstract: In a method for producing an encrypted method payload data stream comprising a header and a block containing encrypted payload data, a payload data key for a payload data encryption algorithm for encrypting payload data is generated. The payload data is encrypted using the generated payload data key and the payload data encryption algorithm to obtain the block containing the encrypted payload data of the payload stream. A part of the payload data stream is processed to deduce information marking the part of the payload data stream. The information is linked with the payload data by means of an invertible logic linkage to obtain a basic value. This basic value is finally encrypted using a key of two keys being different from each other by an asymmetrical encryption method, the two different keys being the public and the private keys respectively for the asymmetrical encryption method to obtain an output value being an encrypted version of the payload data key.
    Type: Grant
    Filed: December 15, 1999
    Date of Patent: October 7, 2008
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventor: Niels Rump
  • Patent number: 7433474
    Abstract: On a recording medium, first information obtained by enciphering data with the first key and second information obtained by enciphering the first key with each of the predetermined second keys are recorded. A deciphering method is characterized by comprising the steps of inputting the first and second information, deciphering the first key using at least one of the second keys, determining by a specific method that the obtained first key is correct, and then deciphering the data using the first key to obtain the data.
    Type: Grant
    Filed: January 4, 2002
    Date of Patent: October 7, 2008
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Takehisa Kato, Naoki Endoh, Hiroaki Unno, Tadashi Kojima, Koichi Hirayama
  • Patent number: 7418474
    Abstract: Methods and apparatus are described which provide secure interactive communication of text and image information between a central server computer and one or more client computers located at remote sites for the purpose of storing and retrieving files describing and identifying unique products, services, or individuals. Textual information and image data from one or more of the remote sites are stored separately at the location of the central server computer, with the image data being in compressed form, and with the textual information being included in a relational database with identifiers associated with any related image data. Means are provided at the central computer for management of all textural information and image data received to ensure that all information may be independently retrieved. Requests are entered from remote terminals specifying particular subject matter, and the system is capable of responding to multiple simultaneous requests.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: August 26, 2008
    Inventor: Barry H. Schwab
  • Patent number: 7415721
    Abstract: A method includes associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user. A second authentication process is also associated with the content, the second authentication process to protect the content from access by an unauthorized device. The first authentication process and the second authentication process are separate and distinct authentication processes. This enables an authorized user to access the content on an authorized device and prevents the authorized user from accessing the content on the unauthorized device.
    Type: Grant
    Filed: February 16, 2005
    Date of Patent: August 19, 2008
    Assignee: Entriq, Inc.
    Inventor: Robert W. Fransdonk
  • Patent number: 7409061
    Abstract: Methods and Systems for securely distributing software in a subscription-based environment are provided. In an example embodiment, a Game Security Facility (“GSF”) associated with a game server is used to manage secure communications with game clients. The GSF typically manages secure communication of the accounting and billing information and secure communication of game session data. In typical operation, the game client generates a pass-phrase that transparently includes a unique identifier of the machine upon which the subscription software will reside. RSA-type key pairs that are then generated using this pass-phrase will be associated uniquely with both the game player and with the machine upon which the software resides, thus preventing unauthorized copying to another machine or unauthorized use by a third party.
    Type: Grant
    Filed: November 29, 2001
    Date of Patent: August 5, 2008
    Assignee: Noatak Software LLC
    Inventor: Christopher R. Newcombe
  • Patent number: 7403622
    Abstract: A symmetric key management process in a communication network comprising a source device furnished with a source of data to be broadcast over the network and at least one receiver device intended to receive the broadcast data. The process comprises: determining and securely transmitting a first symmetric key to a receiver device; the receiver device encrypting the first symmetric key using a second symmetric key and transmitting it to the source device; and the source device recovering and storing it. Before transmitting the data to at least one reception device, the source device encrypts these data with the aid of the first symmetric key, then it transmits these encrypted data, accompanied by the first encrypted symmetric key, to at least one receiver device. The receiver device decrypts the first symmetric key with the aid of the second key which it possesses, then it decrypts the encrypted data with the aid of the first symmetric key thus recovered.
    Type: Grant
    Filed: April 18, 2002
    Date of Patent: July 22, 2008
    Assignee: Thomson Licensing
    Inventors: Eric Diehl, Jean-Pierre Andreaux
  • Patent number: 7392387
    Abstract: Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: June 24, 2008
    Assignee: Xerox Corporation
    Inventors: Dirk Balfanz, Diana Smetters, Paul Stewart, Daniel C. Swinehart
  • Patent number: 7382883
    Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: June 3, 2008
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
  • Patent number: 7372962
    Abstract: A storage system 1 includes a channel interface (IF) unit 11 having an interface with a server 3, a disk IF unit 16 having an interface with a hard disk unit 2 , a memory unit 21 for storing data to be read/written from/to the server 3 or the hard disk unit 2 , a switching unit 51, and the hard disk group 2. The channel IF unit 11, the disk IF unit 16, and the memory unit 21 are connected to each other through the switching unit 51, and an encryption and decryption processing unit 201 is provided between a host IF unit 101 and a transfer controller 103 in the channel IF unit 11.
    Type: Grant
    Filed: September 29, 2004
    Date of Patent: May 13, 2008
    Assignee: Hitachi, Ltd.
    Inventors: Kazuhisa Fujimoto, Makio Mizuno, Dai Watanabe
  • Patent number: 7359510
    Abstract: A content including replay condition information is encrypted using first key information while being recorded to a recording medium. The first key information is encrypted using the replay condition information and second key information while being recorded to the recording medium together with the replay condition information. The replay condition information and the first key information are read from the recording medium, and the first key information is decrypted using the replay condition information and the second key information. The content read from the recording medium is decrypted using the decrypted first key information.
    Type: Grant
    Filed: February 6, 2003
    Date of Patent: April 15, 2008
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Masahiro Yamada
  • Patent number: 7359517
    Abstract: A document access control scheme uses digital “skeleton keys” to distribute access permissions for encrypted documents in a manner that does not require that rights management files (RMFs) be associated with each document. Multiple skeleton keys can be issued for the same document. The skeleton keys themselves can be opened by one or more other skeleton keys for different levels of document access.
    Type: Grant
    Filed: October 9, 2001
    Date of Patent: April 15, 2008
    Assignee: Adobe Systems Incorporated
    Inventor: Edward R. Rowe
  • Patent number: 7356143
    Abstract: A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, or over a network, or the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.
    Type: Grant
    Filed: February 24, 2006
    Date of Patent: April 8, 2008
    Assignee: Widevine Technologies, Inc
    Inventor: Glenn A. Morten
  • Patent number: 7349537
    Abstract: One embodiment of the present invention provides a system that decrypts downstream data in an Ethernet passive optical network (EPON). During operation, the system receives a data frame which is encrypted based on a remote input block and a session key, wherein the remote input block is constructed based on a remote cipher counter and a remote block counter. The system adjusts a local cipher counter based on a received checksum located in a preamble of the data frame, wherein the local cipher counter is substantially synchronized with the remote cipher counter. In addition, the system truncates the local cipher counter by discarding n least significant bits thereof. The system then constructs a local input block based on the truncated cipher counter and a local block counter for the received data frame. Next, the system decrypts the data frame based on the local input block and the session key.
    Type: Grant
    Filed: March 10, 2005
    Date of Patent: March 25, 2008
    Assignee: Teknovus, Inc.
    Inventors: Glen Kramer, Lawrence D. Davis, Edward W. Boyd, Ryan E. Hirth, Ngo Thahn Ho
  • Patent number: 7346169
    Abstract: An information processing device, information processing method and a recording medium are provided. Storage included in the information processing device is operable to store a node key and a leaf key, the leaf key being unique to the information processing device and the node key being unique to each node of a hierarchical network of nodes having a hierarchical tree structure. A decryption processor performs decryption processing to detect whether an encrypted decryption key for decrypting encrypted data is stored in at least one of on the information processing device or on a recording medium. When the encrypted decryption key is detected, the decryption processor is operable to calculate the decryption key by decrypting the encrypted decryption key. However, when the encrypted decryption key is not detected, the decryption processor is operable to calculate the decryption key by decrypting a key block using one of the one or more node keys stored in the storage and the leaf key stored in the storage.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: March 18, 2008
    Assignee: Sony Corporation
    Inventors: Tomoyuki Asano, Yoshitomo Osawa, Ryuji Ishiguro, Atsushi Mitsuzawa, Tateo Oishi
  • Patent number: 7346771
    Abstract: Systems and methods are provided for managing and distributing keys between routers using protocol exchange messages between routers as key distribution vehicles. According to one embodiment of the invention, a router of an autonomous system uses its private key to send cryptographic information associated with another router to a peer router as part of its protocol exchange messages. The peer router is able to extract the cryptographic information and store it in a look-up table. Such protocol exchange messages may occur as part of an Interior Gateway Protocol or an Exterior Gateway Protocol. According to another embodiment of the invention, a chain authentication system is created as boundary routers of autonomous systems having a trust relationship share cryptographic information for other autonomous systems as part of protocol exchange messages for the exterior gateway protocol.
    Type: Grant
    Filed: November 13, 2002
    Date of Patent: March 18, 2008
    Assignee: Nokia Corporation
    Inventor: Ram Gopal Lakshmi Narayanan
  • Publication number: 20080063209
    Abstract: A method, system and program are provided for enabling access to encrypted data in a storage cartridge by wrapping the data key used to encrypt the data with one or more encryption keys (e.g., a public key from a public/private key pair) to form one or more encryption encapsulated data keys (EEDKs) and then storing the EEDK(s) on the storage cartridge along with the encrypted data. The encrypted data may be decoded by retrieving the EEDK from the storage cartridge, decrypting the EEDK with a decryption key (e.g., the private key from the public/private key pair) to extract the underlying data key, and then using the extracted data key to decrypt the encrypted data.
    Type: Application
    Filed: September 7, 2006
    Publication date: March 13, 2008
    Inventors: Glen A. Jaquette, Paul M. Greco, Shai Halevi, Wayne E. Rhoten
  • Patent number: 7337332
    Abstract: A method and apparatus for transferring electronic content. The method and apparatus include providing electronic content to a first user, providing the first user with a key packet, the key packet including a decryption key and content rights information, transferring the electronic content and the key packet from the first user to a second user and rendering rights of the first user to the electronic content unusable upon transfer of the electronic content and the key packet from the first user to the second user.
    Type: Grant
    Filed: July 10, 2001
    Date of Patent: February 26, 2008
    Assignee: NDS Ltd.
    Inventors: Yossi Tsuria, Stephanie Wald
  • Publication number: 20080046732
    Abstract: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.
    Type: Application
    Filed: August 15, 2006
    Publication date: February 21, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Zhi Fu, Donald E. Eastlake, Anthony R. Metke