Secure media transmission with incremental decryption
First Claim
Patent Images
1. A method of transmitting data in a network comprising:
- generating a plurality of keys;
dividing the data into portions;
encrypting each of the portions with one of the plurality of keys in a one-to-one relationship; and
transmitting the encrypted portions through the network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer program product, and data storage device for downloading data with variable quality (including audio or video data) from a server in a network to a computer or network-connected storage device is disclosed.
A file is encrypted using multiple keys, such that possessing less than all of the keys allows only a portion of the data to be decrypted. The quality of level of the data read decrypted from the file is dependent upon which keys the downloading party holds. The file is downloaded to a computer or network-connected storage device.
96 Citations
58 Claims
-
1. A method of transmitting data in a network comprising:
-
generating a plurality of keys;
dividing the data into portions;
encrypting each of the portions with one of the plurality of keys in a one-to-one relationship; and
transmitting the encrypted portions through the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, operative in a client, of downloading data from a server, comprising:
-
receiving encrypted data from the server, wherein different portions of the encrypted data are encrypted using different keys;
receiving at least one key corresponding to the encrypted data;
receiving a quality level corresponding to the at least one key;
using the at least one key to decrypt such portions of the encrypted data as can be decrypted using the at least one key; and
assembling the decrypted portions to form decrypted data that conforms to the quality level. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program product in a computer-readable medium for transmitting data in a network comprising instructions for:
-
generating a plurality of keys;
dividing the data into portions;
encrypting each of the portions with one of the plurality of keys in a one-to-one relationship; and
transmitting the encrypted portions through the network. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer program product in a computer-readable medium for downloading data from a server, comprising instructions for:
-
receiving encrypted data from the server, wherein different portions of the encrypted data are encrypted using different keys;
receiving at least one key corresponding to the encrypted data;
receiving a quality level corresponding to the at least one key;
using the at least one key to decrypt such portions of the encrypted data as can be decrypted using the at least one key; and
assembling the decrypted portions to form decrypted data that conforms to the quality level. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A data processing system for transmitting data through a network, comprising:
-
a bus system;
a processing unit, including at least one processor and connected to the bus system;
memory connected to the bus system; and
a set of instructions in the memory, wherein the processing unit executes the set of instructions to perform the acts of;
generating a plurality of keys;
dividing the data into portions;
encrypting each of the portions with one of the plurality of keys in a one-to-one relationship; and
transmitting the encrypted portions through the network. - View Dependent Claims (52, 53)
-
-
54. A data processing system for downloading data from a server, comprising:
-
a bus system;
a processing unit, including at least one processor and connected to the bus system;
memory connected to the bus system; and
a set of instructions in the memory, wherein the processing unit executes the set of instructions to perform the acts of;
receiving encrypted data from the server, wherein different portions of the encrypted data are encrypted using different keys;
receiving at least one key corresponding to the encrypted data;
receiving a quality level corresponding to the at least one key;
using the at least one key to decrypt such portions of the encrypted data as can be decrypted using the at least one key; and
assembling the decrypted portions to form decrypted data that conforms to the quality level. - View Dependent Claims (55, 56, 57, 58)
-
Specification