Secure digital content reproduction using biometrically derived hybrid encryption techniques
First Claim
Patent Images
1. A secure digital content reproduction method, comprising:
- (a) identifying an individual user at a first CE appliance with at least one repeatable biometric signature linked to the individual user;
(b) from the biometric signature, generating a private-public cryptographic key pair;
(c) providing the public key to one or more sources of digital content;
(d) receiving at the first CE appliance digital content secured with the public key;
(e) applying the private key, thereby permitting rendering of the secured digital content.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure digital content reproduction method includes generating a private-public cryptographic key pair from a biometric signature. The public key is provided to one or more sources of digital content. A CE appliance receives the digital content secured with the public key. By applying the corresponding private key, rendering of the secured digital content is permitted.
143 Citations
72 Claims
-
1. A secure digital content reproduction method, comprising:
-
(a) identifying an individual user at a first CE appliance with at least one repeatable biometric signature linked to the individual user;
(b) from the biometric signature, generating a private-public cryptographic key pair;
(c) providing the public key to one or more sources of digital content;
(d) receiving at the first CE appliance digital content secured with the public key;
(e) applying the private key, thereby permitting rendering of the secured digital content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
21. The method of claim 20, wherein securely providing the private key comprises biometrically regenerating the private key at the second CE appliance.
- 22. The method of claim 20, wherein securely providing the private key comprises receiving a temporary key pair generated at a second CE appliance, encrypting the private key with the temporary public key, sending the private key to the second CE appliance which is decryptable there with the temporary private key.
- 24. The method of claim 20, further comprising configuring the first and second CE appliances within a network.
-
26. The method of claim 20, wherein the first CE appliance approximately simultaneously receives the content broadcast from an outside source along with the second CE appliance.
-
27. The method of claim 20, further comprising biometrically regenerating a key pair on successive uses of digital content.
-
28. The method of claim 20, further comprising identifying one or more of the CE appliances with a serial number unique to each CE appliance.
-
29. The method of claim 20, wherein providing the private key comprises repeating the key pair generating for each of the one or more other CE appliances.
-
30. The method of claim 20, further comprising generating a passphrase from the biometric signature linked to the individual user for actuating the private key.
-
31. The method of claim 20, further comprising rendering said digital content on a content-specific playback subsystem.
-
32. A digital content copyright policing method, comprising:
-
(a) receiving a public key from a CE appliance;
(b) digitally signing digital content with the private key of the content provider;
(c) sending the digital content to the CE appliance secured with the public key of the CE appliance and signed with the private key of the content provider, and (d) wherein the content is decryptable at the CE appliance with the private key complement of said public key, and is auditable by checking the content for the digital signing. - View Dependent Claims (33, 34, 35, 36)
-
-
37. One or more processor readable storage devices having processor readable code embodied thereon, said processor readable code for programming one or more processors to perform a method of secure reproduction of digital content, the method comprising:
-
(a) identifying an individual user at a first CE appliance with at least one repeatable biometric signature linked to the individual user;
(b) from the biometric signature, generating a private-public cryptographic key pair;
(c) providing the public key to one or more sources of digital content;
(d) receiving at the first CE appliance digital content secured with the public key;
(e) applying the private key, thereby permitting rendering of the secured digital content. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. One or more processor readable storage devices having processor readable code embodied thereon, said processor readable code for programming one or more processors to perform a method of secure reproduction of digital content, the method comprising:
-
(a) from the repeatable biometric signature of an individual user, generating a private-public cryptographic key pair;
(b) providing the public key to one or more sources of digital content;
(c) receiving at a first CE appliance digital content secured with the public key;
(d) applying the private key, thereby permitting rendering of the secured digital content; and
(e) securely providing the private key to a second CE appliance so that the digital content is decryptable there upon receipt. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
-
68. One or more processor readable storage devices having processor readable code embodied thereon, said processor readable code for programming one or more processors to perform a method of secure reproduction of digital content, the method comprising:
-
(a) receiving a public key from a CE appliance;
(b) digitally signing digital content with the private key of the content provider;
(c) sending the digital content to the CE appliance secured with the public key of the CE appliance and signed with the private key of the content provider, and (d) wherein the content is decryptable at the CE appliance with the private key complement of said public key, and is auditable by checking the content for the digital signing. - View Dependent Claims (69, 70, 71, 72)
-
Specification