Method, content owner device, computer program, and computer program product for distributing content items to authorized users
First Claim
1. A method for distributing content items to authorized users, the method comprising:
- a content owner device (COD) obtaining a first content item;
the COD obtaining a first tag associated with the first content item;
the COD obtaining a first content key (CK1) for said first content item;
the COD encrypting the first content item using CK1, thereby producing a first encrypted content item;
the COD using at least the first tag and a key derivation function (KDF) to derive a first derived key (DK1);
the COD encrypting CK1 using DK1, thereby producing a first encrypted content key (ECK1);
the COD transmitting information to a content server, the information comprising;
the first encrypted content item and the first tag;
the COD receiving, from a communication device of a user, a first content item identifier for identifying the first content item and a keyword;
the COD, in response to receiving the first content item identifier, determining whether or not the user is authorized to obtain the first content item identified by the first content item identifier; and
the COD, in response to determining that the user is authorized to obtain the first content item, transmitting to the communication device of the user, DK1 and/or CK1.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is, among other things, a method for distributing content items to authorized users. The method comprising: a content owner device (190), COD, obtaining a first content item (196a); the COD (190) obtaining a first tag associated with the first content item (196a); the COD (190) obtaining a first content key, CK1, for said first content item (196a); the COD (190) encrypting the first content item (196a) using CK1, thereby producing a first encrypted content item; the COD (190) using at least the first tag and a key derivation function, KDF, to derive a first derived key, DK1; the COD (190) encrypting CK1 using the DK1, thereby producing a first encrypted content key, ECK1; and the COD (190) transmitting information to a content server (108), the information comprising: the first encrypted content item and the first tag.
106 Citations
18 Claims
-
1. A method for distributing content items to authorized users, the method comprising:
-
a content owner device (COD) obtaining a first content item; the COD obtaining a first tag associated with the first content item; the COD obtaining a first content key (CK1) for said first content item; the COD encrypting the first content item using CK1, thereby producing a first encrypted content item; the COD using at least the first tag and a key derivation function (KDF) to derive a first derived key (DK1); the COD encrypting CK1 using DK1, thereby producing a first encrypted content key (ECK1); the COD transmitting information to a content server, the information comprising;
the first encrypted content item and the first tag;the COD receiving, from a communication device of a user, a first content item identifier for identifying the first content item and a keyword; the COD, in response to receiving the first content item identifier, determining whether or not the user is authorized to obtain the first content item identified by the first content item identifier; and the COD, in response to determining that the user is authorized to obtain the first content item, transmitting to the communication device of the user, DK1 and/or CK1. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A content owner device (COD) for distributing content items to authorized users, the COD comprising a processor and a non-transitory computer readable medium (CRM), said CRM containing computer readable instructions executable by said processor, wherein said COD is operative to:
-
obtain a first content item; obtain a first tag associated with the first content item; obtain a first content key (CK1) for said first content item; encrypt the first content item using CK1, thereby producing a first encrypted content item; use at least the first tag and a key derivation function to derive a first derived key (DK1); encrypt CK1 using DK1, thereby producing a first encrypted content key (ECK1); transmit information to a content server, the information comprising;
the first encrypted content item and the first tag;receive from a communication device of a user, a first content item identifier identifying the first content item; in response to receiving the first content item identifier, determine whether or not the user is authorized to obtain the first content item identified by the first content item identifier; and in response to determining that the user is authorized to obtain the first content item, transmit to the communication device of the user, DK1 and/or CK1. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer readable medium storing computer readable instructions which, when run on a content owner device (COD), causes the COD to:
-
obtain a first content item; obtain a first tag associated with the first content item; obtain a first content key (CK1) for said first content item; encrypt the first content item using CK1, thereby producing a first encrypted content item; use at least the first tag and a key derivation function to derive a first derived key (DK1); encrypt CK1 using DK1, thereby producing a first encrypted content key (ECK1); and transmit information to a content server, the information comprising;
the first encrypted content item and the first tag, whereinthe computer readable instructions cause the COD to, in response to receiving from a communication device of a user a first content item identifier for identifying the first content item and a keyword, determine whether or not the user is authorized to obtain the first content item identified by the first content item identifier.
-
-
18. A content owner device (COD) for distributing content items to authorized users, the COD comprising:
-
a transmitter; a memory; and a processor coupled to the memory and the transmitter, wherein the COD is configured to; obtain a first tag associated with a first content item; obtain a first content key (CK1) for said first content item; encrypt the first content item using CK1, thereby producing a first encrypted content item; use at least the first tag and a key derivation function to derive a first derived key (DK1); encrypt CK1 using DK1, thereby producing a first encrypted content key (ECK1); employ the transmitter to transmit information to a content server, the information comprising;
the first encrypted content item and the first tag;in response to receiving from a communication device of a user, a first content item identifier for identifying the first content item and a keyword, determine whether or not the user is authorized to obtain the first content item identified by the first content item identifier; and in response to determining that the user is authorized to obtain the first content item, transmit to the communication device of the user, DK1 and/or CK1.
-
Specification