Multicast Patents (Class 713/163)
  • Publication number: 20080016338
    Abstract: The present invention provides methods and devices for a security architecture for use in wireless multi-hop networks. A method for implementing pair-wise encryption key establishment, network node authentication and determining tunnel encryption keys is provided in a following manner. In a multi-hop wireless network including a plurality of network nodes, pair-wise security is established between pairs of neighbouring network nodes of the plurality of network nodes. For example, pair-wise security is established in the form of temporal pair-wise encryption keys. Following establishment of pair-wise security between pairs of neighbouring network nodes, for a pair of network nodes that are not neighbours, tunnel security is established between the pair of network nodes using tunnel encryption keys derived by the pair of network nodes on an ad hoc basis.
    Type: Application
    Filed: July 17, 2007
    Publication date: January 17, 2008
    Inventor: Sheng Sun
  • Publication number: 20080005358
    Abstract: A method and apparatus for synchronizing a content directory service (CDSs) of a Universal Plug and Play (UPnP) device. In the method, a CDS, whose content is modified, generates an event message containing information of the modification of the content, and multicasts the event message to a UPnP network. Other CDSs that receive the event message update their content based on the event message. Accordingly, a control point is not required to initiate and does not intervene in a process of synchronizing a plurality of CDSs, thereby reducing load on a memory or a central processing unit (CPU) of the control point, compared to conventional UPnP synchronization of devices. Further, an action of a CDS need not be repeatedly called, thereby reducing network traffic.
    Type: Application
    Filed: June 26, 2007
    Publication date: January 3, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Won-seok KWON, Joo-yeol Lee, Seung-jae Oh, Dong-shin Jung, Se-hee Han
  • Patent number: 7310730
    Abstract: A method of communicating an encrypted data broadcast to a plurality of virtual private network receivers is disclosed. A first communication channel is established between a first one of the receivers and a network node. A private data stream is communicated to the first receiver on the first channel. A request is received from the first receiver to join a broadcast data stream that is directed to a plurality of receivers by a broadcast server. A second encrypted communication channel is established between the first receiver and the network node for purposes of carrying the broadcast data stream. Decryption information, which the first receiver can use to decrypt information that is sent on the second channel, is sent to the first receiver through the first channel. The broadcast data stream is then communicated to the first receiver on the second channel.
    Type: Grant
    Filed: May 27, 2003
    Date of Patent: December 18, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Jean-Philippe Champagne, Bruce Lueckenhoff, Matthew Gnagy, James Aviani
  • Patent number: 7296158
    Abstract: Given the recent changes in the policy governing Internet content distribution, such as the institution of per listener royalties for Internet radio broadcasters, content distributors now have an incentive to under-report the size of their audience. Previous audience measurement schemes only protect against inflation of audience size. We present the first protocols for audience measurement that protect against both inflation and deflation attempts by content distributors. The protocols trade-off the amount of additional information the service providers must distribute to facilitate audience inference with the amount of infrastructure required and are applicable to Internet radio, web plagiarism, and software license enforcement. The protocols can be applied to other situations, such as auditing website screen scrapers and per-seat licensed software installations.
    Type: Grant
    Filed: November 8, 2002
    Date of Patent: November 13, 2007
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Jessica N. Staddon, Robert T. Johnson
  • Publication number: 20070260878
    Abstract: The method of distributed key control on the basis of the preliminary key distribution scheme, which method including, besides others, the steps of: forming a unique identifier of mesh-network node; recording the unique identifier into a local memory of the mesh-network node; forming an incidence matrix of the KEDYS scheme and an incidence matrix of trivial scheme; generating long-term private keys and recording them together with the corresponding column of the incidence matrix into the local memory of the mesh-network node and also into the local memory of controlling node of distributed center for controlling keys; recording the formed key block of the trivial scheme and a broadcasting key into the local memory of the controlling node of the distributed center for controlling keys; generating a start value of hash-chain and calculating its final value; recording an authenticator into the local memory of the mesh-network node; recording the start value of the hash-chain into the local memory of the controll
    Type: Application
    Filed: April 30, 2007
    Publication date: November 8, 2007
    Inventors: Alexey V. Urivskiy, Andrey L. Chmora
  • Patent number: 7290135
    Abstract: A method for data communication in a cryptographic system containing a plurality of entities is specified, in which the entities are arranged in a hierarchical structure. If a current entity in the structure is altered, those entities which are connected directly to the current entity's hierarchically superordinate entity are notified of the alteration.
    Type: Grant
    Filed: March 29, 2002
    Date of Patent: October 30, 2007
    Assignee: Siemens Aktiengesellschaft
    Inventors: Steffen Fries, Wolfgang Klasen, Gerald Volkmann
  • Patent number: 7284123
    Abstract: Disclosed is an encryption code for encrypting data to be transmitted or received during short-distance communication, namely, an encryption key generator for generating an encryption key, in order to transmit the encryption key to an integrated mobile communication terminal and a service terminal during short-distance secure communication. The two terminals encrypt data using the encryption key and receive or transmit the data, thereby implementing authentication and secure communication.
    Type: Grant
    Filed: January 13, 2004
    Date of Patent: October 16, 2007
    Assignee: Samsung Electroncis Co., Ltd.
    Inventor: Hoe-Won Kim
  • Patent number: 7269728
    Abstract: A method and apparatus for distributing keys in a multicast domain is provided. In a secure multicast domain, a request to join a multicast group for a time period occurs. A key distributor which controls access to the multicast data group determines if the request will be accepted. If the request is accepted the key distributor assigns the member to a virtual channel, wherein each virtual channel is defined by a time period. A data group key is forwarded to the member as is a virtual channel key. The member can then receive and decode events from the data group on the assigned virtual channel.
    Type: Grant
    Filed: September 21, 1999
    Date of Patent: September 11, 2007
    Assignee: Nortel Networks Limited
    Inventor: Yunzhou Li
  • Patent number: 7266687
    Abstract: A method of key distribution includes generating, by a first system device (101), key material and forwarding the key material from the first system device (101) to a second system device (107). It is determined whether a mobile station (401), for which the key material is directed, is active on the system. When the mobile station is active, the key material is forwarded to a base station (115) where the mobile station (401) is active, and the base station (115) forwards the key material to the mobile station (401).
    Type: Grant
    Filed: February 16, 2001
    Date of Patent: September 4, 2007
    Assignee: Motorola, Inc.
    Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J. Chater-Lea, Scott J. Pappas, Jason J. Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson, Glenn Brian Walton
  • Publication number: 20070204152
    Abstract: A method for the distribution of a content, characterised in that an encoded content is received by at least two receivers and is decoded with the aid of data blocks which differ from each other, wherein the encoding of the content is not receiver specific or receiver group specific, and the data blocks, the assignment thereof to the receivers and the procedure of the direct decoding of the content are receiver specific or receiver group specific
    Type: Application
    Filed: January 11, 2007
    Publication date: August 30, 2007
    Applicant: SIA Syncrosoft
    Inventor: Wulf Harder
  • Patent number: 7263611
    Abstract: A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: August 28, 2007
    Assignee: NDS Ltd.
    Inventor: Yevgeny Yakov (Gene) Itkis
  • Patent number: 7263610
    Abstract: Methods, devices and systems for providing content providers with a secure way to multicast their data flows only to legitimate end users. By making a specific decision for each potentially legitimate end user requesting a specific data flow, differing subscriber profiles may be taken into account. Furthermore, end to end encryption is avoided by having a switch and/or router control the specific data flow to a specific end user. Each end user sends a request DTU to the switch and/or router asking for permission to join a multicast group. The switch and/or router extracts identification data from the request data transmission unit (DTU) and determines whether the requesting end user is cleared for the requested specific data flow. This determination may be made by sending a query DTU containing the identification data to a policy server which checks the identification data against preprogrammed criteria in its databases.
    Type: Grant
    Filed: July 30, 2002
    Date of Patent: August 28, 2007
    Assignee: ImagicTV, Inc.
    Inventors: Alistair John Parker, Gino Louis Dion, Sean Gordon Higgins
  • Patent number: 7260716
    Abstract: An approach for managing addition or deletion of nodes in a multicast or broadcast group, which avoids introducing a single point of failure at a group controller, certificate authority, or key distribution center, is disclosed. A central group controller utilizes a binary tree structure to generate and distribute session keys for the establishment of a secure multicast group among multiple user nodes. The central group controller is replicated in a plurality of other group controllers, interconnected in a network having a secure communication channel and connected to a load balancer. The secure communication channel is established using a public key exchange protocol. The load balancer distributes incoming join/leave requests to a master group controller. The master group controller processes the join or leave, generates a new group session key, and distributes the new group session key to all other group controller replicas.
    Type: Grant
    Filed: September 29, 1999
    Date of Patent: August 21, 2007
    Assignee: Cisco Technology, Inc.
    Inventor: Sunil K. Srivastava
  • Patent number: 7257706
    Abstract: An efficient multicast key management is achieved by using seals. A security server generates a seal. In one embodiment, the seal contains a key. In another embodiment, the seal contains information for generating a key. An application server requests the seal from the security server and broadcasts the seal to a plurality of recipients. A recipient wishing to encrypt or decrypt a data stream transmits the received seal to the security server to be opened. If the recipient is authorized, the security server transmits a permit to the authorized recipient. In one embodiment, the recipient generates a key from the permit. In another embodiment, the permit is the key. If the recipient is a sender, the recipient encrypts data using the key and broadcasts the same encrypted data stream to all receivers. If the recipient is a receiver, the recipient decrypts an encrypted data stream using the key. In one embodiment, a seal with a corresponding offset value is sent periodically in a data stream.
    Type: Grant
    Filed: May 6, 2005
    Date of Patent: August 14, 2007
    Assignee: TriStrata Security, Inc.
    Inventor: Daniel F. Zucker
  • Patent number: 7248694
    Abstract: Methods for providing a receiver subsystem with access via a clearing house subsystem to a content item broadcast from a content provider subsystem. A method includes generating the request for access in the receiver subsystem, and employs a content key, a blocking nonce, a public key of a public-private key pair, a public key encrypted content key, and a double encrypted content key. The method may also include, in the receiver subsystem, encrypting the request for access based on the private key of the public-private key pair. Provides apparatus for providing access to a broadcast content item. A receiver subsystem is arranged to generate the request for access. In an example embodiment the receiver subsystem is arranged to encrypt the request for access based on the private key of the public-private key pair. Provides a receiver subsystem, a content provider subsystem, and a clearing house subsystem.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: July 24, 2007
    Assignee: International Business Machines Corporation
    Inventors: Dirk Husemann, Michael Nidd
  • Patent number: 7246232
    Abstract: An application of intrusion tolerant concepts to a software infrastructure for supporting secure group applications. This application is suited for use with network layer protocols such as TBRPF and is particularly adapted for wireless networks, and more specifically mobile ad hoc networks.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: July 17, 2007
    Assignee: SRI International
    Inventor: Bruno Dutertre
  • Patent number: 7246375
    Abstract: The invention concerns a method solving security problems resulting from the addition of a security circuit to a smart card reading terminal by providing said security circuit with means for counting the number of times the security circuit is activated for certain sensitive operations. When the total of said operations reaches a fixed value, the security circuit is prevented from operating until it is re-initialized again. Optionally, the circuit may have to be replaced by another.
    Type: Grant
    Filed: July 8, 1998
    Date of Patent: July 17, 2007
    Assignee: Gemplus
    Inventors: Lionel Jean, Jean-Claude Ouvray
  • Patent number: 7234058
    Abstract: Group key management techniques are applied to generating pair-wise keys for point-to-point secure communication applications. Nodes participating in a secure communication group each receive a group key and associated policy information. When a first node wishes to establish a secure point-to-point connection to a second node, the first node derives a pairwise key from the group key and policy information, for example, by hashing the group key and information identifying the two nodes. As a result, a pairwise key is generated without exchanging negotiation messages among the two nodes and without expensive asymmetric cryptographic computation approaches.
    Type: Grant
    Filed: October 1, 2002
    Date of Patent: June 19, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Baugher, David McGrew, Jan Vilhuber, Brian Weis
  • Patent number: 7231664
    Abstract: A novel system and method for transmitting and receiving secure data in a virtual private group (VPG). In one embodiment, a method for transmitting secure data from a first node to a second node includes accessing a group membership table on the first node, the group membership table having group membership information for each group, including a first group, to which the first node belongs and group security information associated with each group, wherein the first group has two or more members, and checking the group membership table to determine if the second node is a member of the first group. If the second node is a member of the first group, the method further includes encrypting a data packet using the group security information associated with the first group, processing the encrypted data packet, and transmitting the encrypted data packet from the first node to the second node.
    Type: Grant
    Filed: September 4, 2002
    Date of Patent: June 12, 2007
    Assignee: Secure Computing Corporation
    Inventors: Thomas R. Markham, Lynn Marquette Meredith, Robert Otto Hanzlik, Geoffrey A. Lowe
  • Patent number: 7228431
    Abstract: Methods and home agent for building a plurality of individual binding updates in the home agent on behalf of a mobile node. One of the methods and the home agent is directed to receiving an Aggregated Binding Update (ABU) at the home agent from the mobile node, building the plurality of individual binding updates from the ABU and sending from the home agent each of the plurality of individual binding updates toward each of the different destination addresses. Each of the plurality of individual binding updates has a different destination address, which is specified in the ABU. Another of the methods and the home agent is directed to intercepting a plurality of binding acknowledgments destined to the mobile node, building an Aggregated Binding Acknowledgment (ABA) from the plurality of binding acknowledgments and sending the ABA toward the mobile node.
    Type: Grant
    Filed: August 21, 2003
    Date of Patent: June 5, 2007
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Wassim Haddad, Suresh Krishnan
  • Patent number: 7228422
    Abstract: A packets sending/receiving apparatus, comprising: authentication and key exchange means; encryption means for producing an encryption sending data; sending condition setting management means for producing sending condition setting information for setting sending condition of the sending packets; packetization means for producing the sending packets using the encryption sending data; receiving condition setting management means for producing receiving condition setting information for setting receiving condition of the receiving packets; packets reception means for receiving the reception packets; and decoding means for decoding the reception data using the decoding key.
    Type: Grant
    Filed: October 15, 2003
    Date of Patent: June 5, 2007
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Yoshihiro Morioka, Yasushi Ayaki, Hiroshi Mitani, Naoshi Usuki
  • Patent number: 7225243
    Abstract: A method for target device discovery on a network is disclosed. The method includes multicasting a signal from a master initiator over the network. A unicast is received from a new target recently connected to the network where the new target is passive when no multicast signal from the master initiator is received. Then the new target is added to a list of targets connected to the network. The method concludes by sending out a next multicast to other initiators where the next multicast includes information regarding the adding of the new target to the network.
    Type: Grant
    Filed: March 14, 2001
    Date of Patent: May 29, 2007
    Assignee: Adaptec, Inc.
    Inventor: Andrew W. Wilson
  • Patent number: 7222234
    Abstract: A method for key agreement for a cryptographically secured point-to-multipoint connection between a server and a plurality of clients includes altering, as a function of an identifier included in a first server message, a sequence of messages in a handshake initiating a secure socket layer protocol session. The identifier identifies the connection as an IP multicast connection. A MasterKey is generated using the server, the MasterKey being used to generate a session key for encrypting application data. The MasterKey is transmitted to the client.
    Type: Grant
    Filed: July 5, 2001
    Date of Patent: May 22, 2007
    Assignee: Deutsche Telekom AG
    Inventors: Tobias Martin, Joerg Schwenk
  • Patent number: 7212634
    Abstract: In a data distribution system, data is divided into a number of application data units. A sequence of keys is generated systematically, and a different key is used to encrypt each data unit at the source. At the receivers, corresponding keys are generated and used to decrypt the data units to gain access to the data. The constructions used to generate the keys are such that an intrinsically limited subset of the entire sequence of keys is made available to the user by communicating a selected combination of one or more seed values.
    Type: Grant
    Filed: July 20, 2001
    Date of Patent: May 1, 2007
    Assignee: British Telecommunications plc
    Inventor: Robert John Briscoe
  • Patent number: 7209989
    Abstract: Method and apparatus relating to an acknowledgement mechanism in an interconnected subsystem architecture. After a data message is transmitted, the transmitting device may transmit an acknowledge message on a channel undefined by the inter-subsystem communication protocol associated with the interconnection architecture. The undefined channel may be generated using a device-specific identifier on a channel defined to be a broadcast channel. The receiving device may acknowledge the transfer by switching a sideband control signal line.
    Type: Grant
    Filed: September 29, 2004
    Date of Patent: April 24, 2007
    Assignee: Intel Corporation
    Inventor: Peter D. Mueller
  • Patent number: 7194622
    Abstract: A system for providing a Virtual Local Area Network (VLAN) by use of an encryption states or encryption keys for identifying a VLAN. A table of data including a VLAN and an associated encryption state or key is provided for assignment of encryption states or keys, for devices in a wireless local area network.
    Type: Grant
    Filed: December 13, 2001
    Date of Patent: March 20, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: David E. Halasz, Victor J. Griswold, Robert C. Meier, Merwyn B. Andrade, Richard D. Rebo
  • Patent number: 7191332
    Abstract: Licensed multimedia content is distributed to users electronically via an internetwork. An archive stores packaged content files wherein each packaged content file includes encrypted multimedia content and protection identification information, and wherein the encrypted multimedia content can be decrypted using a respective key corresponding to the protection identification information. A multicast server is coupled to the archive for providing multicast streams of the packaged content files to the internetwork. A web server provides announcements corresponding to the packaged content files, each announcement including multicast link information. A digital rights server stores each of the respective keys in association with the protection identification information.
    Type: Grant
    Filed: May 20, 2003
    Date of Patent: March 13, 2007
    Assignee: Sprint Communications Company L.P.
    Inventors: Bejoy Pankajakshan, Benjamin J. Parker
  • Patent number: 7188242
    Abstract: A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: March 6, 2007
    Assignee: NDS Ltd.
    Inventor: Yevgeny Yakov (Gene) Itkis
  • Patent number: 7188253
    Abstract: A wireless authentication protocol. Access to a network is managed by providing a challenge-handshake protocol within the Extensible Authentication Protocol for authentication between a client and the network.
    Type: Grant
    Filed: February 6, 2006
    Date of Patent: March 6, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: David E. Halasz, Glen W. Zorn, Stuart Norman, Douglas Smith
  • Patent number: 7185199
    Abstract: Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.
    Type: Grant
    Filed: August 30, 2002
    Date of Patent: February 27, 2007
    Assignee: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul S. Stewart, Daniel C. Swinehart
  • Patent number: 7181014
    Abstract: An approach for arriving at a shared secret key in a multicast or broadcast group environment is disclosed. The key exchange protocol permits nodes within a multicast or broadcast group to compute a shared secret key in a binary fashion, whereby a shared secret key is generated for a pair of nodes at a time. Once the shared secret key is computed by the pair, the nodes within the pair is viewed as a single entity by a node that is to be joined. This process is iteratively performed until all the nodes within the multicast group attain a common shared secret key. Under this approach, the number of messages exchanged between the nodes for establishing the secured channel is significantly reduced.
    Type: Grant
    Filed: November 17, 2003
    Date of Patent: February 20, 2007
    Assignee: Cisco Technology, Inc.
    Inventor: Sunil K. Srivastava
  • Patent number: 7171001
    Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.
    Type: Grant
    Filed: October 24, 2005
    Date of Patent: January 30, 2007
    Assignee: Microsoft Corporation
    Inventors: Walter Tuvell, Nimisha Asthagiri
  • Patent number: 7167981
    Abstract: A method of transmitting email and a device for transmitting email capable of broadcasting the email including encrypted data effectively. When a personal computer PC1 accepts an instruction to transmit same data to multiple destinations by email, the PC1 generates a session key (S105) and encrypts the data by utilizing the generated session key (S106). Next, the PC1 generates the common key by utilizing a public key generated based on an email address of each destination and the secret key acquired from a center in advance (S107), and encrypts the session key by utilizing the generated common key (S108). The PC1 transmits the email including the encrypted data and the encrypted session key to each destination (S110).
    Type: Grant
    Filed: January 23, 2002
    Date of Patent: January 23, 2007
    Assignee: Murata Kikai Kabushiki Kaisha
    Inventor: Yoshifumi Tanimoto
  • Patent number: 7167979
    Abstract: In a method of invoking mutual anonymity, electing to become a head of a return path in response to receiving a request for information. The information is received at the head of the return path. The information is then forwarded to a peer that transmitted the request.
    Type: Grant
    Filed: April 3, 2002
    Date of Patent: January 23, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Zhichen Xu, Li Xiao
  • Patent number: 7162632
    Abstract: A method for managing static data traffic of at least one light path in an optical network, comprising the steps of achieving load balanced path routing for the at least one light path, assigning wavelengths to demands of the at least one light path, and, switching the at least one light path according to its assigned wavelength. A method for managing dynamic data traffic of at least one light path in an optical network, comprising the steps of routing the K-shortest path, which has the largest interference length (L), and, assigning waveband with a First-Fit network topology based on band/port number restriction and minimum weight.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: January 9, 2007
    Assignee: The Research Foundation of SUNY
    Inventors: Xiaojun Cao, Chunming Qiao, Vishal Anand, Yizhi Xiong
  • Patent number: 7159109
    Abstract: Techniques to manage address translation for secure connections are described. An apparatus may include a secure connection manager. The secure connection manager may comprise a flow module to create a list of identifiers, with each identifier representing a secure flow terminating at a device with an internal address. The secure connection manager may also comprise a translation module to select an internal address for an encrypted packet having an external address and a flow identifier. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 7, 2001
    Date of Patent: January 2, 2007
    Assignee: Intel Corporation
    Inventor: Kjeld B. Egevang
  • Patent number: 7155611
    Abstract: In a method for operating a conditional access system for broadcast applications, the conditional access system comprising a number of subscribers and each subscriber having a terminal including a conditional access module and a secure device for storing entitlements, a source signal is encrypted using a first key (CW). The encrypted source signal is broadcasted for receipt by the terminals, wherein entitlement control messages (ECM's) are sent to the secure devices, the ECM's comprising the first keys (CW) encrypted using a service key (PT). Entitlement management messages (EMM's) are sent to the secure devices providing the service key (PT) required to decrypt encrypted first keys (CW). A cracked secure device which is used in an unauthorized manner is traced by sending different keys required to obtain the first keys to different terminals or groups of terminals and monitoring the key information provided by a pirate.
    Type: Grant
    Filed: December 18, 2000
    Date of Patent: December 26, 2006
    Assignee: Irdeto Access, B.V.
    Inventors: Andrew Augustine Wajs, Robert Fransdonk
  • Patent number: 7134013
    Abstract: A “policy distribution point” (PDP) allows service drivers to be installed remotely and automatically without rebooting the PDP or otherwise interrupting existing network-based services. The exposure of sensitive configuration data to non-secure networks is minimized by placing PDPs close to the devices to be configured. Service drivers on the PDP can be reused to configure multiple devices of the same type. The PDP receives an “activation” and uses a service driver on the PDP to translate the activation into “device-specific instructions.” The device-specific instructions are sent to a device and configure the device to set up the network-based service. One or more PDPs can be used to configure both computing device and networking devices to provide a single service.
    Type: Grant
    Filed: August 19, 2002
    Date of Patent: November 7, 2006
    Assignee: Atreus Systems Corp.
    Inventors: Douglas Bellinger, Richard Burke, Thomas Phillips, Antonino Scaffidi Argentina, Andrea Baptiste, Gaetan Delahousse, Geoff Stewart, Wendy Raoux, Luc Richard, Stephanie Bazin, Scott Brookes, Patrick Rhude
  • Patent number: 7127610
    Abstract: An apparatus and method of implementing multicast security in a given multicast domain, the given multicast domain having one or more network devices, receives multicast traffic that is encrypted with a global key, the global key being available to the given multicast domain and one or more other multicast domains, decrypts the received multicast traffic with the global key to produce decrypted multicast traffic, encrypts the decrypted multicast traffic with a local key to produce local encrypted multicast traffic, the local key being available to the given multicast domain, and forwards the local encrypted multicast traffic to the one or more network devices in the given multicast domain. In a further embodiment, the apparatus and method for implementing multicast security in a given multicast domain first receives a global key message that identifies the global key.
    Type: Grant
    Filed: December 29, 1999
    Date of Patent: October 24, 2006
    Assignee: Nortel Networks Limited
    Inventors: Yunzhou Li, Billy C. Ng, Jyothi Hayes
  • Patent number: 7127742
    Abstract: An external client securely accesses a private corporate network using a communications device, but without the communications device being required to communicate through the private corporate network when communicating with resources external to the private corporate network. The external client establishes a connection with the private corporate network over the public network such as the Internet using, for example, Transmission Control Protocol (TCP). The external client then provides security to the connection by running, for example, the Secure Socket Layer (SSL) protocol over the TCP protocol. During the ensuing session with the private corporate network, the communications device establishes a subsequent connection(s) with the external resource.
    Type: Grant
    Filed: January 24, 2001
    Date of Patent: October 24, 2006
    Assignee: Microsoft Corporation
    Inventors: Michael Kramer, Donald J. Kadyk, Neil S. Fishman
  • Patent number: 7120934
    Abstract: Embodiments of the invention are directed to a detection system, method and apparatus that identifies and eradicates fraudulent requests on a network. Embodiments of the detection system comprise at least one router, a server, and an activity monitoring system. The activity monitoring system comprises a route arbiter and a traffic analyzer, wherein the route arbiter monitors the activity on the router. The route arbiter continuously monitors the router and firewall device to determine if abnormal activity or traffic patterns are emerging. If a determination is made that abnormal activity or abnormal traffic patterns exist, the activity monitoring system responds by blocking the activity or redirecting the traffic.
    Type: Grant
    Filed: March 29, 2001
    Date of Patent: October 10, 2006
    Inventor: Mark M. Ishikawa
  • Patent number: 7120927
    Abstract: An e-mail alias registration system is provided. According to one embodiment, users may register an e-mail address and a password at an alias relay server (102). Then, when a third party attempts to reply to the registered user, the third party will be presented with a sign on screen. Only if the sender is himself or herself a registered user will e-mail be allowed to be sent directly. To ensure that spammers do not abuse the registration system, only a limited number of e-mails will be allowed to be sent by registered users per day. Also, in order to register, a credit card number or other affirmative identification may need to be provided.
    Type: Grant
    Filed: June 9, 1999
    Date of Patent: October 10, 2006
    Assignee: Siemens Communications, Inc.
    Inventors: Cathy Sue Beyda, William J. Beyda, Shmuel Shaffer
  • Patent number: 7103185
    Abstract: An approach for establishing secure multicast communication among multiple multicast proxy service nodes is disclosed. The multicast proxy service nodes, which can be distributed throughout an enterprise domain, are organized in a logical tree that mimics the logical tree arrangement of domains in a directory server system. The attributes of the multicast proxy service nodes include the group session key and the private keys of the multicast proxy service nodes that are members of the multicast or broadcast groups. The private keys provide unique identification values for the multicast proxy service nodes, thereby facilitating distribution of such keys. Because keys as well as key version information are housed in the directory, multicast security can be achieved over any number of network domains across the entire enterprise. Key information is stored in, and the logical tree is supported by, a directory service. Replication of the directory accomplishes distribution of keys.
    Type: Grant
    Filed: December 22, 1999
    Date of Patent: September 5, 2006
    Assignee: Cisco Technology, Inc.
    Inventors: Sunil Srivastava, Jonathan Trostle, Raymond Bell, Ramprasad Golla
  • Patent number: 7096356
    Abstract: A method and apparatus for negotiating a shared secret among members of a multicast group are disclosed. A tree that represents the group is created and stored in a memory. Each node of the tree is associated with a group member. The shared secret is generated by traversing the tree in post-order, and at each node of the tree, recursively generating a partial key value for use in the shared secret and a base value for use in subsequent recursive partial key value generation. At each node, a partial key value is computed by accumulating the exponent portion of the Diffie-Hellman key equation and computing a new base value for use in subsequent computations. If a particular node has a left or right child sub-tree, each sub-tree is also recursively traversed in post-order fashion. When traversal of the entire tree is complete, all nodes have the shared secret key.
    Type: Grant
    Filed: June 27, 2001
    Date of Patent: August 22, 2006
    Assignee: Cisco Technology, Inc.
    Inventors: Shigang Chen, Liman Wei
  • Patent number: 7088821
    Abstract: The present invention presents a public key cryptographic system and method called Absolute Public Key Cryptography that survives private key compromise and offers two-way communication security. Communications are secured even when the private key is revealed. It provides security to the private-to-public side communications and also allows short keys to be used with mobile devices that have low processing power. The system uses keys with two or more components and encrypts a message into the same number of cipher versions. The cipher versions are delivered to the destination in source routing mode, or hop-by-hop routing mode with a small time gap. The recipient performs certain mathematical operations on all the cipher versions and obtains the original message. All the versions are necessary for obtaining the original message. Even a single version missing leads to produce a junk for an attacker.
    Type: Grant
    Filed: May 3, 2001
    Date of Patent: August 8, 2006
    Inventor: Cheman Shaik
  • Patent number: 7082535
    Abstract: Architecture for controlling access by a Light Extensible Authentication Protocol (LEAP)-compatible wireless client to a network that utilizes a challenge/handshake authentication protocol (CHAP). A proxy service is hosted on a network server disposed on the network, and accessed in response to receiving access information from the client. The access information is processed with the proxy service into CHAP-compatible access information, and forwarded to a CHAP-based access control server disposed on the network to determine whether to grant network access to the client.
    Type: Grant
    Filed: April 17, 2002
    Date of Patent: July 25, 2006
    Assignee: Cisco Technology, Inc.
    Inventors: Stuart Norman, David E. Halasz
  • Patent number: 7082200
    Abstract: A trust web keying process provides secure peer networking of computing devices on an open network. A device is initially keyed at distribution to an end user or installer with a device-specific cryptographic key, and programmed to respond only to peer networking communication secured using the device's key. The device-specific key is manually entered into a keying device that transmits a re-keying command secured with the device-specific key to the device for re-keying the device with a group cryptographic key. The device then securely peer networks with other devices also keyed with the group cryptographic key, forming a trust web. Guest devices can be securely peer networked with the trust web devices via a trust web gateway.
    Type: Grant
    Filed: September 6, 2001
    Date of Patent: July 25, 2006
    Assignee: Microsoft Corporation
    Inventors: Bernard D. Aboba, Toby L. Nixon
  • Patent number: 7076654
    Abstract: A multicast system comprises: a sender terminal for transmitting multicast data; a receiver terminal for receiving multicast data; an authentication server processor for managing the sender terminal and the receiver terminal; a first user processor provided in the sender terminal for transmitting a login requirement to the authentication server processor; and a second user processor provided in the receiver terminal for transmitting a login requirement to the authentication server processor, so that a user is identified by individually authenticating the user using a specified authentication server.
    Type: Grant
    Filed: March 14, 2001
    Date of Patent: July 11, 2006
    Assignee: NEC Corporation
    Inventor: Akiko Kawamoto
  • Patent number: 7076666
    Abstract: A PVR is selectively granted access to a hard disk drive. The HDD generates a random number, encrypts it with a key known to the PVR, and sends it to the PVR, which decrypts the number and increments it by one to render a new number. The new number is encrypted with the key and sent back to the HDD, which decrypts the new number, decrements it by one, and compares the result to the original number, granting the PVR access only when a match occurs.
    Type: Grant
    Filed: October 17, 2002
    Date of Patent: July 11, 2006
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventors: Robert Allan Unger, Christopher Jensen Read, Robert L. Hardacker
  • Patent number: 7065643
    Abstract: A secure communications system (100, FIG. 1) with a compromised communications node can quickly recover from the compromised condition by sending re-keying messages using a key encryption key hierarchy (200, FIG. 2). Each communications node (330, FIG. 3) includes a memory (300, FIG. 3) with a list of tier-group specific key encryption keys, and whenever a message arrives that is encrypted with a key encryption key in the list, the communications node decrypts the message. When the message includes a new traffic encryption key, the communications node has been re-keyed. Key encryption keys are managed hierarchically such that many communications nodes can be re-keyed with very few broadcast messages, thereby saving communications resources.
    Type: Grant
    Filed: March 28, 2000
    Date of Patent: June 20, 2006
    Assignee: Motorola, Inc.
    Inventors: Curtis Lee Cornils, Erwin Perry Comer