NETWORK INTEGRITY MAINTENANCE
First Claim
1. A method for maintaining an integrity of a network containing a plurality of devices, the method comprising:
- calculating an integrity check value for network files and network values;
comparing the calculated integrity check value to a saved integrity check value, to determine if any one of the network files and the network values has changed;
calculating an encryption key on the network files and network values; and
decrypting a protected content in the network using the encryption key.
0 Assignments
0 Petitions
Accused Products
Abstract
A device removal system securely removes an item of content or a device from a content-protected home network. An authorization table maintains a list of devices in the content-protected home network in addition to removed devices. The authorization table also maintains a list of deleted content. Through management of various cryptographic keys and techniques, devices and content will not play on a content-protected home network after they have been removed. A secret network ID reduces the possibility of unauthorized playing of content on the content-protected home network. A web server may join the content-protected home network as a device, providing backup for the secret network ID. Otherwise, the device manufacturer will provide the secret network ID in case of a device failure. Storing a verification value in each device ensures integrity of critical cryptographic values. This verification value is compared to network values to ensure network values have not been corrupted.
14 Citations
20 Claims
-
1. A method for maintaining an integrity of a network containing a plurality of devices, the method comprising:
-
calculating an integrity check value for network files and network values; comparing the calculated integrity check value to a saved integrity check value, to determine if any one of the network files and the network values has changed; calculating an encryption key on the network files and network values; and decrypting a protected content in the network using the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for maintaining an integrity of a network containing a plurality of devices, the system comprising:
-
an integrity check value that is calculated for network files and network values; the calculated integrity check value being compared to a saved integrity check value, to determine if any one of the network files and the network values has changed; an encryption key that is calculated on the network files and network values; and a protected content being decrypted in the network using the encryption key. - View Dependent Claims (20)
-
Specification