Content security system for screening applications
First Claim
1. A method for securing a content, comprising the steps of:
- (A) generating a media key by decrypting a media key block based on a device key unique to a particular player of a plurality of players;
(B) modifying said media key by decryption based on a class key such that said media key is unique for each of a plurality of subscriber classes;
(C) writing an encrypted title key in a media by encrypting a title key based on both said media key after modification and a media identification value unique to said media; and
(D) writing an encrypted content in said media by encrypting said content based on said title key.
10 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a content is disclosed. The method generally includes the steps of (A) generating a media key by decrypting a media key block based on a device key unique to a particular player of a plurality of players, (B) modifying the media key by decryption based on a class key such that the media key is unique for each of a plurality of subscriber classes, (C) writing an encrypted title key in a media by encrypting a title key based on both the media key after modification and a media identification value unique to the media and (D) writing an encrypted content in the media by encrypting the content based on the title key.
64 Citations
26 Claims
-
1. A method for securing a content, comprising the steps of:
-
(A) generating a media key by decrypting a media key block based on a device key unique to a particular player of a plurality of players;
(B) modifying said media key by decryption based on a class key such that said media key is unique for each of a plurality of subscriber classes;
(C) writing an encrypted title key in a media by encrypting a title key based on both said media key after modification and a media identification value unique to said media; and
(D) writing an encrypted content in said media by encrypting said content based on said title key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for playing an encrypted content stored in a media, comprising the steps of:
-
(A) generating a media key by decrypting a media key block based on a device key unique to a particular player of a plurality of players;
(B) modifying said media key by decryption based on a class key such that said media key is unique for each of a plurality of subscriber classes;
(C) generating a title key by decrypting an encrypted title key based on both said media key post modification and a media identification value unique to said media; and
(D) generating a content by decrypting said encrypted content based on said title key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of screening a content, comprising the steps of:
-
(A) generating an encrypted content by encrypting said content based on (i) a media identification value unique to a first media, (ii) a media key generated from a media key block of said first media and (iii) a device key unique to a particular player of a plurality of players;
(B) modifying said media key based on a class key as part of said encrypting such that said media key is unique for each of a plurality of subscriber classes;
(C) transferring said encrypted content via said first media and said class key via a second media to said particular player; and
(D) generating said content by decrypting said encrypted content based on (i) said media identification value, (ii) said media key generated from said media key block, (iii) said device key for said particular player and (iv) said class key. - View Dependent Claims (25, 26)
-
Specification