We have recognized that there is a strong need to control and maintain the secrecy of the intelligence that may be used by computers to communicate with another, for example, by encrypting the messages that they exchange with one another. Thus, the encryption keys used to encrypt such messages need
We have recognized that there is a strong need to control and maintain the secrecy of the intelligence that may be used by computers to communicate with another, for example, by encrypting the messages that they exchange with one another. Thus, the encryption keys used to encrypt such messages need to be managed in a highly secure manner. Accordingly, we provide an encryption module, which, in accord with an aspect of the invention, generates a unique device encryption key (S.sub.local), a cryptographic key formed from a unique identification key (S.sub.id) and an associated public key (KP.sub.id), and at least one program encryption key, in which the public key is generated as a function of the unique identification key. The module then encrypts the unique identification key and program encryption key using said device encryption key and stores the encrypted result in memory internal to security module, thereby securing the keys against misappropriation. In addition, the module provides a mechanism for using the program encryption key to encrypt information that it receives from an external source and store the encrypted information in memory external to the security module, and responsive to receiving from a requester a request for the program encryption key, encrypting the program encryption key, in accord with an aspect of the invention, using a symmetrical encryption key generated as a function of a public key generated by a security module associated with the requester. The former security module then supplies the encrypted program encryption key to the requester.
대표청구항▼
[ The invention claimed is:] [1.] An information delivery system comprisingan access control system,an information protection system, anda plurality of subscriber terminals, wherein said access control system, said information protection system and said plurality of subscriber terminals each include
[ The invention claimed is:] [1.] An information delivery system comprisingan access control system,an information protection system, anda plurality of subscriber terminals, wherein said access control system, said information protection system and said plurality of subscriber terminals each include a security module formed on an integrated circuit chip, said security module comprisinggenerator comprising means, responsive to receipt of particular stimuli via an input terminal, for generating at least a unique serial number (S.sub.id) that is thereafter directly used to uniquely identify the security module and for generating a public key (KP.sub.id) as a function of said unique serial number, said generator further comprising;means for generating a symmetrical encryption key as a function of said unique serial number and a public key associated with and generated by another security module,means, responsive to receipt of an encrypted program encryption key from said other security module for decrypting said encrypted program encryption key using said symmetrical key,means for generating a device unique key (S.sub.local) and said program encryption key, andmeans for encrypting at least said serial number and said program encryption key using said device unique key and storing the encrypted results in memory internal to the integrated circuit.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (10)
Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA) Martin William C. (Concord NC) Rohland William S., Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors.
Johnson William S. (Jamestown NC) Payne Edward A. (Greensboro NC) Boschker Donald A. (Greensboro NC) Phipps Benita W. (Greensboro NC), Security apparatus and system for retail environments.
Johnson William S. (Jamestown NC) Payne Edward A. (Greensboro NC) Boschker Donald A. (Greensboro NC) Phipps Benita W. (Greensboro NC), Security apparatus and system for retail environments.
Johnson William S. (Jamestown NC) Payne Edward A. (Greensboro NC) Boschker Donald A. (Greensboro NC) Phipps Benita W. (Greensboro NC), Security apparatus and system for retail environments.
Caronni,Germano; Gupta,Amit; Markson,Tom R.; Kumar,Sandeep; Schuba,Christoph L.; Scott,Glenn C., Decoupling access control from key management in a network.
Kahn, Raynold M.; Gagnon, Gregory J.; Curren, Christopher P.; James, Thomas H., Distribution of video content using a trusted network key for sharing content.
Kahn, Raynold M.; Gagnon, Gregory J.; Curren, Christopher P.; James, Thomas H., Distribution of video content using client to host pairing of integrated receivers/decoders.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Nair, Sushil; Zolotusky, Anatol; Charpentier, Claude; Metzger, Brian, High performance data encryption server and method for transparently encrypting/decrypting data.
Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
Kahn, Raynold; Levy, Jordan, Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder.
Gabber Eran ; Wool Avishai, Method and apparatus for detecting the movement of a device that receives a signal broadcast from a relative fixed position.
Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; Cocchi,Ronald P.; James,Thomas H., Method and apparatus for encrypting media programs for later purchase and viewing.
Klauss,Peter M.; Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D., Method and apparatus for ensuring reception of conditional access information in multi-tuner receivers.
Klauss,Peter M.; Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D., Method and apparatus for minimizing conditional access information overhead while ensuring conditional access information reception in multi-tuner receivers.
Wang, Peter S.; Guccione, Louis J.; Terry, Stephen E., Method and apparatus for security protection of an original user identity in an initial signaling message.
Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
Joseph, Boby; Freed, Michael; Borella, Michael S., Method and system for network security capable of doing stronger encryption with authorized devices.
Howard Shelton Lambert GB; James Ronald Lewis Orchard GB, Method for controlling access to electronically provided services and system for implementing such method.
Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems.
Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems.
Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems.
Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program development method, program development supporting system, and program installation method.
Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program development method, program development supporting system, and program installation method.
Joshi, Hetalkumar N.; Maranna, Chandrashekar; Vijayan, Manoj Kumar, Scalable auxiliary copy processing in a data storage management system using media agent resources.
Joshi, Hetalkumar N.; Maranna, Chandrashekar; Vijayan, Manoj Kumar, Scalable auxiliary copy processing in a storage management system using media agent resources.
Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P.; Schlacht, David N.; Basse, Hanno; James, Thomas H., Secure content transfer systems and methods to operate the same.
Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Secure storage and replay of media programs using a hard-paired receiver and storage device.
Kahn, Raynold M.; Gagnon, Gregory J.; James, Thomas H.; Dulac, Stephen P.; Carpenter, Jeffrey D.; Arsenault, Robert G.; Jijina, Aspandyar M., Service activation of set-top box functionality using broadcast conditional access system.
Kahn, Raynold M.; Gagnon, Gregory J.; James, Thomas H.; Dulac, Stephen P.; Carpenter, Jeffrey D.; Arsenault, Robert G.; Jijina, Aspandyar M., Service activation of set-top box functionality using broadcast conditional access system.
Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs with modified conditional access functionality.
Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
Retnamma,Manoj Vijayan; Amarendran,Arun; Kottomtharayil,Rajiv, System and method for combining data streams in pipelined storage operations in a storage network.
Ignatius,Paul; Prahlad,Anand; Tyagarajan,Mahesh; Vijayan Retnamma,Manoj; Amarendran,Arun; Kottomtharayil,Rajiv, System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device.
Ignatius, Paul; Prahlad, Anand; Tyagarajan, Mahesh; Vijayan Retnamma, Manoj; Amarendran, Arun; Kottomtharayil, Rajiv, System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services.
Ignatius, Paul; Prahlad, Anand; Tyagarajan, Mahesh; Vijayan, Manoj Kumar; Amarendran, Arun Prasad; Kottomtharayil, Rajiv, System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services.
Smith, Walt E.; Fisher, Jr., Larry F.; Vargese, Bavan, System and method for securing a base derivation key for use in injection of derived unique key per transaction devices.
Gokhale, Parag; Kottomtharayil, Rajiv; Kavuri, Srinivas; Prahlad, Anand; Reddy, Suresh Parpatakam; Brower, Jr., Robert Keith; Meade, Jared, Systems and methods for remote monitoring in a computer network.
Gokhale, Parag; Kottomtharayil, Rajiv; Kavuri, Srinivas; Prahlad, Anand; Reddy, Suresh Parpatakam; Brower, Jr., Robert Keith; Meade, Jared, Systems and methods for remote monitoring in a computer network.
Gokhale, Parag; Kottomtharayil, Rajiv; Kavuri, Srinivas; Prahlad, Anand; Reddy, Suresh Parpatakam; Brower, Jr., Robert Keith; Meade, Jared, Systems and methods for remote monitoring in a computer network and reporting a failed migration operation without accessing the data being moved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.