Method for tracing a security breach in highly distributed content
First Claim
1. A method for tracing content in a highly distributed system, comprising:
- receiving content associated with a content owner;
decrypting the received content;
associating a first set of information with the decrypted content, wherein the first set of information, in part, uniquely identifies an entity decrypting the content; and
providing a second set of information to the content owner, wherein the second set of information enables the content owner to trace the content in the highly distributed system.
5 Assignments
0 Petitions
Accused Products
Abstract
Method and devices are directed to uniquely identifying content in a highly distributed content delivery system such that an origin of unauthorized content use may be more accurately determined. Content received from a content owner is distributed to a persistent security database and a key manager, which manages encryption and decryption keys for content that may be already encrypted. Decrypted content is fingerprinted or watermarked by a fingerprinter/watermarker module such that a recipient of content is identifiable, and saved in a separate database. Information about fingerprinted/watermarked content may be reported back to content owner for tracking purposes. A key wrap module wraps and attaches aggregator'"'"'s encryption key to the content before it is transmitted to downstream service operators or users.
184 Citations
20 Claims
-
1. A method for tracing content in a highly distributed system, comprising:
-
receiving content associated with a content owner;
decrypting the received content;
associating a first set of information with the decrypted content, wherein the first set of information, in part, uniquely identifies an entity decrypting the content; and
providing a second set of information to the content owner, wherein the second set of information enables the content owner to trace the content in the highly distributed system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security device for tracing content in a highly distributed system, comprising:
-
a receiver configured to receive content associated with a content owner;
a fingerprinter-watermarker configured to perform actions including;
determining a self-identifier that uniquely identifies a recipient of the content;
determining a fingerprint based, in part, on the self-identifier; and
watermarking the content employing the fingerprint; and
a forensics interface configured to send information associated with the watermarked content to the content owner. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A modulated data signal having computer executable instructions embodied thereon for delivering content in a highly distributed system, the modulated data signal comprising actions including:
-
transferring content from a market participant to another market participant;
enabling a decryption of the content, if the transferred content is encrypted;
enabling an association of information with the decrypted content, wherein the information uniquely identifies an entity associated with the decryption of the content; and
providing the information concerning the decrypted content to the content owner. - View Dependent Claims (19)
-
-
20. An apparatus for tracing content in a highly distributed system, comprising:
-
a means for receiving content associated with a content owner;
a decryption means for decrypting the received content;
a means for associating a first set of information with the decrypted content, wherein the first set of information, in part, uniquely identifies an entity decrypting the content;
a means for determining a second set of information associated with the decryption of the content; and
a means for providing the second set of information to the content owner.
-
Specification