Key management system
First Claim
1. A method of managing keys used by an application on a computer system, said method comprising the steps of:
- decrypting encrypted digital content data using a first decrypting key to produce content data, the encrypted content data having been produced by encrypting the content data with a first encrypting key;
re-encrypting the content data using a second encrypting key; and
encrypting a second decrypting key using a third encrypting key to produce an encrypted second decrypting key, wherein the nth decrypting key is used to decrypt data that has been encrypted with the nth encrypting key.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of managing keys is provided. According to one exemplary method, digital content data encrypted with a first encrypting key is decrypted using a first decrypting key, and re-encrypted using a second encrypting key. A second decrypting key is encrypted using a third encrypting key to produce an encrypted second decrypting key. In some embodiments, an encrypted first decrypting key that was encrypted using a fourth encrypting key is received, and the encrypted first decrypting key is decrypted using a fourth decrypting key to reproduce the first decrypting key. An application for use on a computer system is also provided.
-
Citations
20 Claims
-
1. A method of managing keys used by an application on a computer system, said method comprising the steps of:
-
decrypting encrypted digital content data using a first decrypting key to produce content data, the encrypted content data having been produced by encrypting the content data with a first encrypting key;
re-encrypting the content data using a second encrypting key; and
encrypting a second decrypting key using a third encrypting key to produce an encrypted second decrypting key, wherein the nth decrypting key is used to decrypt data that has been encrypted with the nth encrypting key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of managing keys used by an application on a computer system, said method comprising the steps of:
-
creating a first encrypting key and a first decrypting key;
creating a second encrypting key and a second decrypting key;
receiving an encrypted third decrypting key, a third decrypting key having been encrypted with a fourth encrypting key to produce the encrypted third decrypting key;
transferring the encrypted third decrypting key to a site that possesses a fourth decrypting key;
receiving a re-encrypted third decrypting key, the encrypted third decrypting key having been decrypted using the fourth decrypting key and then re-encrypted using the first encrypting key to produce the re-encrypted third decrypting key;
receiving the digital content data, the digital content data having been encrypted with a third encrypting key;
decrypting the re-encrypted third decrypting key using the first decrypting key to reproduce the third decrypting key;
decrypting the content data using the third decrypting key to produce decrypted content data;
watermarking the decrypted content data to produce watermarked content data;
creating a fifth encrypting key and a fifth decrypting key;
encrypting the watermarked content data using the fifth encrypting key;
encrypting the fifth decrypting key using the second encrypting key to produce an encrypted fifth decrypting key;
removing the third decrypting key and the non-encrypted fifth decrypting key from the computer system; and
breaking the second decrypting key into multiple segments and storing each segment separately on the computer system, wherein the nth decrypting key is used to decrypt data that has been encrypted with the nth encrypting key.
-
-
19. An application for use on a computer system, said application comprising:
-
a decrypter that decrypts encrypted digital content data using a first decrypting key so as to produce content data, the encrypted content data having been produced by encrypting the content data with a first encrypting key; and
an encrypter that re-encrypts the content data using a second encrypting key, and that encrypts a second decrypting key using a third encrypting key to produce an encrypted second decrypting key, wherein the nth decrypting key is used to decrypt data that has been encrypted with the nth encrypting key. - View Dependent Claims (20)
-
Specification