Methods and apparatus for secure distribution of program content
First Claim
1. An apparatus operable to receive an encrypted program, comprising:
- a network interface operable to provide communication with a network such that (i) at least some identification information related to the apparatus may be transmitted over the network to an administrator, and (ii) an encrypted decryption key may be received over the network from the administrator in response to the at least some identification information;
a decryption device operable to decrypt the encrypted decryption key, to decrypt the encrypted program using the decryption key, and to re-encrypt the program using at least some of the identification information; and
a first storage device operable to store the identification information and the re-encrypted program.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus in accordance with the present invention are operable to carry out certain functions including: receiving an encrypted program at a processing apparatus; transmitting at least some identification information related to the processing apparatus over a network to an administrator; receiving an encrypted decryption key at the processing apparatus over the network from the administrator in response to the at least some identification information; decrypting the encrypted decryption key; decrypting the encrypted program using the decryption key; re-encrypting the program using at least some of the identification information; and storing the identification information and the re-encrypted program in a first storage device.
71 Citations
88 Claims
-
1. An apparatus operable to receive an encrypted program, comprising:
-
a network interface operable to provide communication with a network such that (i) at least some identification information related to the apparatus may be transmitted over the network to an administrator, and (ii) an encrypted decryption key may be received over the network from the administrator in response to the at least some identification information;
a decryption device operable to decrypt the encrypted decryption key, to decrypt the encrypted program using the decryption key, and to re-encrypt the program using at least some of the identification information; and
a first storage device operable to store the identification information and the re-encrypted program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus operable to receive an encrypted program, comprising:
-
a storage medium interface operable to receive an encrypted first decryption key from a storage medium produced by an administrator;
a network interface operable to provide communication with a network such that (i) at least some identification information related to the apparatus may be transmitted over the network to the administrator, and (ii) an encrypted second decryption key may be received over the network from the administrator in response to the at least some identification information;
a decryption device operable to decrypt the encrypted second decryption key, to decrypt the encrypted first decryption key using the second decryption key, to decrypt the encrypted program using the first decryption key, and to re-encrypt the program using at least some of the identification information; and
a first storage device operable to store the identification information and the re-encrypted program. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method, comprising:
-
receiving an encrypted program at a processing apparatus;
transmitting at least some identification information related to the processing apparatus over a network to an administrator;
receiving an encrypted decryption key at the processing apparatus over the network from the administrator in response to the at least some identification information;
decrypting the encrypted decryption key;
decrypting the encrypted program using the decryption key;
re-encrypting the program using at least some of the identification information; and
storing the identification information and the re-encrypted program in a first storage device. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A method, comprising:
-
receiving an encrypted program at a processing apparatus;
receiving an encrypted first decryption key at the processing apparatus;
transmitting at least some identification information related to the processing apparatus over a network to an administrator;
receiving an encrypted second decryption key at the processing apparatus over the network from the administrator in response to the at least some identification information;
decrypting the encrypted second decryption key;
decrypting the encrypted first decryption key using the second decryption key;
decrypting the encrypted program using the first decryption key;
re-encrypting the program using at least some of the identification information; and
storing the identification information and the re-encrypted program in a first storage device. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
61. An apparatus, comprising:
-
a network interface operable to provide communication with a network such that respective identification information, each being related to a respective processing apparatus, may be received over the network from the processing apparatus;
a database operable to store respective registration information, each corresponding with a respective one of the processing apparatus and including the identification information thereof; and
a data processor operable to search the database for registration information containing identification information matching any received identification information, wherein;
the network interface is further operable to facilitate the transmission of an encrypted decryption key to the processing apparatus over the network in response to the received identification information, and the decryption key may be used to decrypt an encrypted program located at the processing apparatus. - View Dependent Claims (62, 63, 64, 65, 66, 67)
-
-
68. A method, comprising:
-
receiving respective identification information, each being related to a respective processing apparatus, over a network from the processing apparatus;
storing in a database respective registration information, each corresponding with a respective one of the processing apparatus and including the identification information thereof;
searching the database for registration information containing identification information matching any received identification information;
transmitting an encrypted decryption key over the network to the processing apparatus in response to the received identification information, where the decryption key may be used to decrypt an encrypted program located at the processing apparatus. - View Dependent Claims (69, 70, 71, 72, 73, 74)
-
-
75. An apparatus, comprising:
-
a network interface operable to provide communication with a network such that respective identification information, each being related to a respective processing apparatus, may be received over the network from the processing apparatus;
a database operable to store respective registration information, each corresponding with a respective one of the processing apparatus and including the identification information thereof; and
a data processor operable to search the database for registration information containing identification information matching any received identification information, wherein;
the network interface is further operable to facilitate the transmission of an encrypted second decryption key to the processing apparatus over the network in response to the received identification information, and the second decryption key may be used to decrypt an encrypted first decryption key, which may be used to decrypt an encrypted program located at the processing apparatus. - View Dependent Claims (76, 77, 78, 79, 80, 81)
-
-
82. A method, comprising:
-
receiving respective identification information, each being related to a respective processing apparatus, over a network from the processing apparatus;
storing in a database respective registration information, each corresponding with a respective one of the processing apparatus and including the identification information thereof;
searching the database for registration information containing identification information matching any received identification information;
transmitting an encrypted second decryption key over the network to the processing apparatus in response to the received identification information, where the second decryption key may be used to decrypt and encrypted first decryption key, which may be used to decrypt an encrypted program located at the processing apparatus. - View Dependent Claims (83, 84, 85, 86, 87, 88)
-
Specification