$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for enhanced piracy protection in a wireless personal communication device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/28
  • H04N-007/16
  • H04N-007/167
  • G06Q-030/00
출원번호 US-0919518 (2001-07-31)
등록번호 US-7257844 (2007-08-14)
발명자 / 주소
  • Woodward,Ernest E.
출원인 / 주소
  • Marvell International Ltd.
인용정보 피인용 횟수 : 26  인용 특허 : 30

초록

A key-sharing scheme is used to control distribution and use of video and audio content in personal digital assistants (PDAs) and other wireless devices. A private key is split into key-shares using a Blakley-Shamir key splitting technique and the key-shares are distributed to various network entiti

대표청구항

What is claimed is: 1. A multiprocessor wireless communication device comprising: a security processor to combine a plurality of key-shares, including at least a first key-share, a second key-share, and a device-dependent key-share, to generate a decryption key to decrypt content for the processing

이 특허에 인용된 특허 (30)

  1. Thomas Francis Johnston GB, Communication security.
  2. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  3. Schell Roger R. ; Kingdon Kevin W. ; Berson Thomas A., Controlled modular cryptography apparatus and method.
  4. Marvit, Maclen; Rosema, Keith David; Ubois, Jeffrey; Marvit, David, Controlling and tracking access to disseminated information.
  5. Yoshida Hideki,JPX ; Segawa Hideo,JPX ; Imai Toru,JPX, Decryption key management scheme for software distribution system.
  6. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  7. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  8. Hardjono Thomas P., Exchanging a secret over an unreliable network.
  9. Leighton Frank Thomsen (15 Charlesden Park Newtonville MA 02160), Failsafe key escrow system.
  10. Park Tae Joon,KRX, Illegal view and copy protection method in digital video system and controlling method thereof.
  11. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  12. Chang, Kenneth Hung-Yi, Management of co-processor information by integrating non-program information with program information.
  13. Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Manipulating rights-to-execute in connection with a software copy protection mechanism.
  14. Weidong Kou CA, Mechanism for secure tendering in an open electronic network.
  15. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  16. Arnold Todd Weston, Method and apparatus for protecting application data in secure storage areas.
  17. Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
  18. Dusse, Steve; King, Peter F.; Schwartz, Bruce V.; Martin, Jr., Bruce K., Method and system facilitating web based provisioning of two-way mobile communications devices.
  19. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  20. Erkkila Marko,FIX ; Peuhu Arto,FIX ; Haavisto Jouko,FIX ; Isotalo Mika,FIX, Modular mobile communication system.
  21. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  22. Bennett Christopher J. (San Diego CA) Harding Michael V. (San Diego CA) Moroney Paul (Cardiff-by-the-Sea CA), Reproduction of secure keys by using distributed key generation data.
  23. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  24. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  25. Experton Bettina, System and method for remotely accessing user data records.
  26. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  27. Mori Ryoichi (Tokyo JPX), System for storing history of use of programs including user credit data and having access by the proprietor.
  28. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  29. Harris Daryl ; Williams Daniel L., User interface card for use with a device.
  30. Braitberg, Michael F.; Volk, Steven B., Writeable medium access control using a medium writeable area.

이 특허를 인용한 특허 (26)

  1. Chastain, Walter Cooper, Apparatus and method for managing security domains for a universal integrated circuit card.
  2. Chastain, Walter Cooper; Chin, Stephen Emille; King, Samuel; Suozzo, Michael; Vondrak, Nicholas; Wane, Ismaila, Apparatus and method for managing use of secure tokens.
  3. Chastain, Walter Cooper; Chin, Stephen Emille; King, Samuel; Suozzo, Michael; Vondrak, Nicholas; Wane, Ismaila, Apparatus and method for managing use of secure tokens.
  4. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure authentication of a communication device.
  5. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure authentication of a communication device.
  6. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure delivery of data from a communication device.
  7. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure delivery of data from a communication device.
  8. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure delivery of data from a communication device.
  9. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure over the air programming of a communication device.
  10. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure over the air programming of a communication device.
  11. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure over the air programming of a communication device.
  12. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure provisioning of a communication device.
  13. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure provisioning of a communication device.
  14. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure provisioning of a communication device.
  15. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for securely managing the accessibility to content and applications.
  16. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for securely managing the accessibility to content and applications.
  17. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for securely managing the accessibility to content and applications.
  18. Kesavan, Vijay Sarathi; Guo, Xiangang; Lortz, Victor B.; Rangarajan, Anand P.; Rathi, Somya, Collecting data from processor-based devices.
  19. Hjelm, Johan; Åström, Michael; Montero Arizmendi, Gerardo, Method and apparatus for provisioning a temporary identity module using a key-sharing scheme.
  20. Bhattacharya, Debojyoti; Chakrabarty, Sugato; Bellur, Bhargav Ramchandra, Method and system of reconstructing a secret code in a vehicle for performing secure operations.
  21. Chastain, Walter Cooper; Campbell, Clifton Ashman; Chin, Stephen Emille; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Methods for provisioning universal integrated circuit cards.
  22. Kline, Paul A.; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L.; Nitin, Sawant, System and method for a commercial multimedia rental and distribution system.
  23. Kline, Paul A.; Nitin, Sawant; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L., System and method for secure commercial multimedia rental and distribution over secure connections.
  24. Chastain, Walter Cooper; Chin, Stephen Emille, System and methods for UICC-based secure communication.
  25. Chastain, Walter Cooper; Chin, Stephen Emille, System and methods for UICC-based secure communication.
  26. Chastain, Walter Cooper; Campbell, Clifton Ashman; Chin, Stephen Emille; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Systems for provisioning universal integrated circuit cards.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로