Method and system for managing authentication and payment for use of broadcast material
First Claim
1. An authentication system comprising:
- a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key; and
a client having a symmetric key and configured to;
store the encrypted content received from the content provider; and
issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input;
wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
-
Citations
32 Claims
-
1. An authentication system comprising:
-
a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key; and
a client having a symmetric key and configured to;
store the encrypted content received from the content provider; and
issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input;
wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A content broadcast system comprising:
-
a broadcast service provider configured to generate encrypted content using a content key and distribute the encrypted content; and
a client having a symmetric key and configured to;
store the encrypted content received from the broadcast service provider; and
issue to the broadcast service provider a request having a cryptographic function configured to have the symmetric key and the encrypted content as input;
wherein the broadcast service provider is further configured to verify the client via the request and, in response to successful verification, generate an encrypted content key for the client using the content key and the symmetric key; and
wherein the client is further configured to decrypt the encrypted content key to derive the content key that is usable to decrypt the encrypted content. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An authentication system comprising:
-
a broadcast service provider having means for generating encrypted content using a content key and distributing the encrypted content; and
a client having a symmetric key and means for;
storing the encrypted content received from the broadcast service provider; and
issuing to the broadcast service provider a request having a cryptographic function configured to have the symmetric key and the encrypted content as input;
wherein the broadcast service provider further includes;
means for verifying the client via the request; and
means for generating an encrypted content key for the client using the content key and the symmetric key and means for forwarding the encrypted content key to the client, in response to successful verification; and
wherein the client further includes means for decrypting the encrypted content key to derive the content key that is usable to decrypt the encrypted content. - View Dependent Claims (15, 16)
-
-
17. A mobile phone comprising:
-
a symmetric key;
a processor; and
control logic executable by the processor and configured to;
store encrypted content received from a content provider;
issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input;
decrypt an encrypted content key received from the content provider using the symmetric key in order to derive a content key, wherein the encrypted content key is encrypted using the symmetric key and issued by the content provider in response to the request; and
decrypt the encrypted content using the content key. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A method for managing authentication between a content provider and a client, the method comprising:
-
encrypting content with a content key at the content provider;
distributing the encrypted content from the content provider to the client;
generating a request at the client, the request having a cryptographic function configured to receive a symmetric key associated with the client and the encrypted content as input;
forwarding the request from the client to the content provider; and
examining the request at the content provider to verify that the client has received the encrypted content. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method for distributing content, the method comprising:
-
distributing encrypted content from a content provider to a client, wherein the encrypted content is generated by the content provider using a content key;
forwarding a request from the client to the content provider, the request having a cryptographic function configured to receive a symmetric key associated with the client and the encrypted content as input;
examining the request at the content provider to verify that the client has received the encrypted content;
forwarding an encrypted content key from the content provider to the client in response to successful verification, wherein the encrypted content is generated by the content provided based on the symmetric key; and
decrypting the encrypted content key at the client to derive the content key. - View Dependent Claims (30, 31, 32)
-
Specification