Method, apparatus and system for use in distributed and parallel decryption
First Claim
1. A method for use in decrypting content, comprising:
- receiving a first content key at a first system for the decryption of a first track of encrypted content;
encrypting the first content key according to a first instance key known at the first system producing a first encrypted content key;
communicating the first encrypted content key over an externally accessible communication link to a second system;
generating the first instance key at the second system independent of the first system;
decrypting the first encrypted content key using the generated first instance key at the second system providing a first unencrypted content key; and
decrypting the first track of encrypted content using the first unencrypted content key at the second system.
1 Assignment
0 Petitions
Accused Products
Abstract
The present embodiments advantageously provide methods and systems for use in decrypting content, and in some preferred embodiments expanding a security environment to distribute the computational processing involved in decryption. In some embodiments, a method for use in decrypting content is provided that receives a first content key at a first system for the decryption of a first track of encrypted content; encrypts the first content key according to a first instance key known at the first system; communicates the first encrypted content key over an externally accessible communication link to a second system; generates the first instance key at the second system independent of the first system; decrypts the first encrypted content key using the generated first instance key at the second system; and decrypts the first track of encrypted content using the first unencrypted content key at the second system.
86 Citations
20 Claims
-
1. A method for use in decrypting content, comprising:
-
receiving a first content key at a first system for the decryption of a first track of encrypted content;
encrypting the first content key according to a first instance key known at the first system producing a first encrypted content key;
communicating the first encrypted content key over an externally accessible communication link to a second system;
generating the first instance key at the second system independent of the first system;
decrypting the first encrypted content key using the generated first instance key at the second system providing a first unencrypted content key; and
decrypting the first track of encrypted content using the first unencrypted content key at the second system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for use in decrypting content, comprising:
-
receiving a first encrypted content key, wherein the first encrypted content key is encrypted by an external system using a first instance key;
generating the first instance key independent of the external system;
decrypting the first encrypted content key using the first generated instance key;
extracting a first content key through the decryption of the first encrypted content key; and
decrypting a first track of encrypted content with the first content key. - View Dependent Claims (11, 12)
-
-
13. A system comprising:
-
a main system coupled with a network to receive a first content key;
a sub-system;
a communication link coupled between the main system and sub-systems;
the main system comprising a first instance key and an encryption circuit such that the encryption circuit encrypts the first content key with the first instance key to produce a first encrypted content key, and the main system communicates the first encrypted content key to the sub-system over the communication link; and
the sub-system comprises a first slot, a decryption circuit coupled with the first slot, and an instance key generator coupled with the decryption circuit, such that the sub-system stores the first encrypted content key in the first slot, the instance key generator generates a first generated instance key independent of the main system such that the first generated instance key is substantially identical to the first instance key of the main system, and the decryption circuit decrypts first encrypted content key with the first generated instance key retrieving the unencrypted first content key and decrypts at least a portion of a first track of encrypted content using the unencrypted first content key. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification