Secure communication and real-time watermarking using mutating identifiers
First Claim
1. A method of distributing a content item by a content provider having a first mutating identifier, the method comprising:
- assigning the content item a first label by a function;
creating a request for a key by encrypting the first label with the first mutating identifier;
sending the encrypted request to an authenticator;
receiving a key for the first label and a second mutating identifier from the authenticator;
encrypting the first label with the second mutating identifier;
encrypting the content item with the received key;
sending the encrypted first label to a consumer with an identity and a third mutating identifier;
creating a request for decryption by the consumer by encrypting the received encrypted first label with the third mutating identifier;
sending the request for decryption to the authenticator;
receiving a decryption key and a fourth mutating identifier from the authenticator; and
receiving the encrypted content item from the content provider.
2 Assignments
0 Petitions
Accused Products
Abstract
A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, watermarks, and licenses. The authenticator controls the distribution of mutating IDs, verifies the identity of one or more participating parties, and provides tracking information for mapping service providers and consumers to particular, possibly watermarked, content items.
-
Citations
101 Claims
-
1. A method of distributing a content item by a content provider having a first mutating identifier, the method comprising:
-
assigning the content item a first label by a function;
creating a request for a key by encrypting the first label with the first mutating identifier;
sending the encrypted request to an authenticator;
receiving a key for the first label and a second mutating identifier from the authenticator;
encrypting the first label with the second mutating identifier;
encrypting the content item with the received key;
sending the encrypted first label to a consumer with an identity and a third mutating identifier;
creating a request for decryption by the consumer by encrypting the received encrypted first label with the third mutating identifier;
sending the request for decryption to the authenticator;
receiving a decryption key and a fourth mutating identifier from the authenticator; and
receiving the encrypted content item from the content provider. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of distributing content items, the method comprising:
-
assigning each content item a label;
generating a watermark for each content item;
applying a watermark to each content item to create watermarked content;
requesting from an authenticator a key for each watermarked content;
receiving a key for each watermarked content from the authenticator;
encrypting each watermarked content item with the received key;
sending each encrypted watermarked content to a service provider;
requesting a first mutating identifier having a first part and a key;
encrypting the label and a function of the watermark with the key from the first mutating identifier;
grouping the first part of the first mutating identifier with the previously encrypted label and function of the watermark to create a primary license;
sending the primary license to the service provider;
receiving a request for a content item from a consumer having an identity and a second mutating identifier;
transferring the primary license to the consumer;
verifying the primary license received by the consumer;
if the primary license received by the consumer is verified, sending the encrypted watermarked content from the service provider to the consumer; and
if the primary license received by the consumer is verified, sending a decryption key from the authenticator to the consumer. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of distributing content items, the method comprising:
-
assigning each content item a label;
generating a watermark for each content item;
applying a watermark to each content item to create watermarked content;
requesting from an authenticator a key for each watermarked content;
receiving a key for each watermarked content from the authenticator;
encrypting each watermarked content item with the received key;
sending each encrypted watermarked content to a service provider;
requesting a first mutating identifier having a first part and a key;
encrypting the label and a function of the watermark with the key from the first mutating identifier;
grouping the first part of the first mutating identifier with the previously encrypted label and function of the watermark to create a primary license;
sending the primary license to the service provider;
requesting a second mutating identifier by the service provider having a first part and a key;
encrypting the primary license received from the content provider with the key from the second mutating identifier;
grouping the first part of the second mutating identifier with the previously encrypted primary license to create a distributable license;
receiving a request for a content item from a consumer having an identity and a third mutating identifier;
transferring the distributable license to the consumer;
verifying the distributable license received by the consumer;
if the distributable license received by the consumer is verified, sending the encrypted watermarked content from the service provider to the consumer; and
if the distributable license received by the consumer is verified, sending a decryption key from the authenticator to the consumer. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A method of distributing content items, the method comprising:
-
assigning a content item a label;
requesting a first key for the label from the authenticator;
encrypting the content item with the first requested key;
sending the encrypted content item to a service provider;
generating a watermark;
requesting a first mutating ID having a first part and a key;
encrypting the label and the watermark with the key from the first mutating ID;
grouping the first part of the first mutating ID with the previously encrypted label and watermark to create a first encrypted watermark;
receiving a request for a content item from a consumer having an identity and a second mutating identifier;
transferring the first encrypted watermark to an authenticator;
receiving the label, the watermark, the first requested key, and a second key from the authenticator;
decrypting the encrypted content with the first requested key;
applying the watermark;
encrypting the watermarked content with the second key to create encrypted watermarked content;
requesting a third mutating ID, the third mutating ID having a first part and a key;
encrypting the label and watermark with the key of the third mutating ID;
grouping the first part of the third mutating ID with the encrypted label and watermark previously encrypted with the key of the third mutating ID to create a second encrypted watermark;
transferring the second encrypted watermark to the consumer;
verifying the identity of the consumer;
if the identity of the consumer is verified, sending the encrypted watermarked content from the service provider to the consumer; and
if the identity of the consumer is verified, sending a decryption key from the authenticator to the consumer. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A method of distributing content, the method comprising:
-
assigning a content item a label;
requesting a first key for the label from the authenticator;
encrypting the content item with the first requested key;
sending the encrypted content item to a service provider;
generating a watermark;
requesting a first mutating ID having a first part and a key;
encrypting the label and the watermark with the key from the first mutating ID;
grouping the first part of the first mutating ID with the previously encrypted label and watermark to create a first encrypted watermark;
requesting a second mutating identifier having a first part and a key;
encrypting the encrypted watermark with the key from the second mutating identifier;
grouping the first part of the second mutating identifier with the previously encrypted encrypted watermark to create a first doubly-encrypted watermark;
receiving a request for a content item from a consumer having an identity and a third mutating identifier;
transferring the first doubly-encrypted watermark to an authenticator;
returning the label, the watermark, the first requested key, and a second key;
decrypting the encrypted content with the first requested key;
applying the watermark;
encrypting the watermarked content with the second key to create encrypted watermarked content;
requesting a fourth mutating identifier, the fourth mutating identifier having a first part and a key;
encrypting the encrypted watermark with the key of the fourth mutating identifier;
grouping the first part of the fourth mutating identifier with the encrypted watermark previously encrypted with the key of the fourth mutating identifier to create a second doubly-encrypted watermark;
transferring the second doubly-encrypted watermark to the consumer;
verifying the identity of the consumer;
if the identity of the consumer is verified, sending the encrypted watermarked content from the service provider to the consumer; and
if the identity of the consumer is verified, sending a decryption key from the authenticator to the consumer. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A method of distributing a content item, the method comprising:
-
obtaining a plurality of watermarks;
selecting a watermarking scheme;
generating a plurality of watermarked versions of a content item;
obtaining a plurality of keys for the plurality of watermarked versions of a content item;
assigning each one of the plurality of obtained keys to a single one of the plurality of watermarked versions of a content item;
associating a unique license with each one of the plurality of watermarked versions, where the license is based on a function of one of the plurality of watermarks and a function of the content item;
distributing the unique license to a consumer having an identity;
verifying the identity of the consumer;
distributing the watermarked content to the consumer;
distributing one of the plurality of keys to the consumer; and
mapping the identity of the consumer to a specific watermark. - View Dependent Claims (67, 68, 69)
-
-
70. A system of distributing content, the system comprising:
-
a content provider having content items and one or more mutating identifiers and capable of allocating content items with recognizable characteristics;
a consumer who has a mutating identifier and an identity and capable of generating a request for content items; and
an authenticator who knows the one or more mutating identifiers of the content provider and the mutating identifier of the consumer and configured to associate the content item allocated by the content provider to the consumer. - View Dependent Claims (71, 72, 73, 74, 75, 76)
-
-
77. A method of authorizing a consumer, the method comprising:
-
assigning a random, unrestricted content item a label by a content provider;
creating a request for a key by encrypting the label with a first mutating identifier of the content provider;
sending the request to an authenticator;
receiving the key and second mutating identifier from the authenticator;
encrypting the random, unrestricted content item with the requested key;
encrypting the label with the seconding mutating identifier;
sending the encrypted label to the consumer;
creating a decryption request by the consumer by encrypting the encrypted label with a third mutating identifier;
sending the decryption request to the authenticator;
receiving the decryption key and a fourth mutating identifier from the authenticator;
receiving the encrypted random, unrestricted content item from the content provider;
decrypting the random, unrestricted content item with the decryption key; and
sending the decrypted random, unrestricted content item to the content provider.
-
-
78. A system of distributing content, the system comprising:
-
a content provider having content items and one or more mutating identifiers and is capable of allocating content items with distinct, recognizable characteristics;
a service provider capable of receiving encrypted content items with distinct, recognizable characteristics and requests for content items;
a consumer who has a mutating identifier and an identity and is capable of generating a request for content items; and
an authenticator who knows the mutating identifier of the content provider and the mutating identifier of the consumer and configured to associate the content item allocated by the content provider to the consumer. - View Dependent Claims (79, 80, 81, 82, 83, 84, 85, 86, 87)
-
-
88. A method of verifying the geographic location of a consumer, the method comprising:
-
sending a message encrypted with a mutating identifier of the consumer;
sending the encrypted message to an authenticator; and
verifying that the mutating identifier of the consumer is known to the authenticator.
-
-
89. A method of authenticating a first entity with a second entity of a system the method comprising:
-
encrypting the credentials of the first entity with a first mutating ID;
sending the encrypted credentials to the second entity;
encrypting the received encrypted credentials with a second mutating ID;
sending the doubly-encrypted credentials of the first entity to an authenticator;
decrypting the doubly-encrypted credentials of the first entity;
verifying the credentials of the first entity;
sending the first entity a third mutating identifier and a communication key; and
sending the second entity a fourth mutating identifier and the communication key.
-
-
90. A device for requesting content, the device comprising:
-
an input/output interface capable of displaying content selection options to a user, and receiving selection data from the user; and
a processor configured to generate a request for content based on the selection data from the user, receive a license for the content requested, encrypt the license with a first mutating identifier, send the encrypted license to an authenticator, receive encrypted content, receive a decryption key, and receive a second mutating identifier.
-
-
91. A method of requesting a content item, the method comprising:
-
generating a request for the content item;
sending the request;
receiving a license for the content item;
encrypting the license with a first mutating identifier;
sending the encrypted license;
receiving an encrypted content item;
receiving a decryption key for the encrypted content item; and
receiving a second mutating identifier.
-
-
92. A device for providing content items, the device comprising:
-
an input/output interface capable of displaying content selection options to a content consumer, receiving selection data from the content consumer, and displaying receipts for the content items; and
a processor configured to generate a request for a plurality of mutating identifiers, create a license for each of the plurality of mutating identifiers, send the licenses, and receive receipts for the content items.
-
-
93. A method of providing content, the method comprising:
-
requesting a plurality of mutating identifiers;
creating a license for each of the plurality of mutating identifiers;
sending the licenses; and
receiving receipts for the licenses.
-
-
94. A device for authenticating a content item, the device comprising:
a processor configured to assign a key to the content item, assign a mutating identifier to an entity, receive an encrypted license for the content item, send the key assigned to the content item, and generate a receipt for the content item.
-
95. A method for authenticating a content item, the method comprising:
-
assigning a key to the content item;
assigning a plurality of mutating identifiers to the content item;
receiving an encrypted license for the content item;
sending the key assigned to the content item; and
generating a receipt for the content item.
-
-
96. A system for distributing a content item, the system comprising:
-
means for assigning the content item a label;
means for applying a watermark to the content item to create watermarked content;
means for acquiring a key for the watermarked content item;
means for encrypting the watermarked content item with the key;
means for creating a license for the label with a mutating identifier;
means for distributing the license;
means for authenticating the license;
means for distributing the encrypted watermarked content; and
means for distributing the key.
-
- 97. A method of watermarking using mutating identifiers.
Specification