×

APPARATUS AND ASSOCIATED METHODOLOGY FOR MANAGING CONTENT CONTROL KEYS

  • US 20120063597A1
  • Filed: 09/15/2010
  • Published: 03/15/2012
  • Est. Priority Date: 09/15/2010
  • Status: Abandoned Application
First Claim
Patent Images

1. A method of creating and exchanging secret session keys for symmetric secret key encryption between a sending device and a receiving device without transmitting the actual secret session keys between the sending and receiving devices, the method comprising:

  • providing the receiving device with a unique device number, a unique user keycode number, and a symmetric secret key encryption algorithm;

    providing the sending device with the symmetric secret key encryption algorithm, a seed value and a non-system randomizer to generate a predetermined number of pseudo-random bit data based on the seed value, the pseudo-random bit data being arranged into a random number table stored in an electronic memory of the sending device;

    transmitting from the receiving device to the sending device through secured communication both the unique device number and the unique user keycode number;

    assigning, at the sending device, the random number table to the unique device number and unique user keycode number, the assignment being stored in a secret index in the electronic memory of the sending device;

    selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table;

    assigning, at the sending device, a start pointer corresponding to a start point of the subset of pseudo-random bit data and an end pointer corresponding to an end point of the subset of pseudo-random bit data;

    determining selected properties identifying length and location of the subset of pseudo-random bit data in the random number table, the subset of pseudo-random bit data being the secret session key;

    storing the selected properties and the start and end pointers of the secret session key in a secret session key properties descriptor buffer of the sending device;

    copying into a secret session key buffer at the sending device the secret session key corresponding to the selected properties of the secret session key from within the predetermined number of pseudo-random bit data in the random number table stored at the sending device index, by utilizing the start and end pointers to locate the secret session key;

    transforming the contents of the secret session key properties descriptor buffer into mangled secret session key properties;

    storing the data to be transmitted to the receiving device in an input/output buffer of the sending device;

    encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content;

    appending, at the sending device, the unique device number and the mangled secret session key properties as a header of the encrypted content;

    creating a connection between the sending device and the receiving device;

    transmitting the encrypted content with the appended header from the sending device to the receiving device;

    verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content;

    extracting, at the receiving device, the mangled secret session key properties when the receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device;

    restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key;

    utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device;

    decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when the receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; and

    securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween, the secure communication between the sending and receiving devices of encrypted content being maintained until termination of the communication is initiated by at least one of the sending and receiving devices.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×