Use of licensed content without identification thereof
First Claim
1. A method in connection with a piece of encrypted digital content, the method for a user to obtain a content key (CK) to decrypt the encrypted content and comprising:
- obtaining (CK) encrypted according to a public key of a licensor (PU-L) to result in (PU-L(CK)), and obtaining (PU-L) itself;
selecting a value R;
obscuring (PU-L(CK)) according to (PU-L) and R to result in Obs (PU-L(CK));
sending Obs (PU-L(CK)) to the licensor, the licensor applying a private key (PR-L) corresponding to (PU-L) to Obs (PU-L(CK)) to result in Obs (CK) as an obscured version of (CK);
receiving Obs (CK) from the licensor; and
obtaining (CK) from Obs (CK) based on applying R thereto, whereby the licensor cannot identify from Obs (PU-L(CK)) or from Obs (CK) the encrypted content or the content key (CK) from which the encrypted content may be identified.
2 Assignments
0 Petitions
Accused Products
Abstract
A content key (CK) to decrypt a piece of encrypted content is obtained encrypted according to a public key of a licensor (PU-L) to result in (PU-L(CK)). (PU-L(CK)) is obscured according to (PU-L) and a value R to result in Obs (PU-L(CK)), and Obs (PU-L(CK)) is sent to the licensor, which applies a private key (PR-L) corresponding to (PU-L) to Obs (PU-L(CK)) to result in Obs (CK) as an obscured version of (CK). Obs (CK) is received from the licensor; and (CK) is obtained from Obs (CK) based on applying R thereto. The licensor cannot identify from Obs (PU-L(CK)) or from Obs (CK) the encrypted content or the content key (CK) from which the encrypted content may be identified.
28 Citations
20 Claims
-
1. A method in connection with a piece of encrypted digital content, the method for a user to obtain a content key (CK) to decrypt the encrypted content and comprising:
-
obtaining (CK) encrypted according to a public key of a licensor (PU-L) to result in (PU-L(CK)), and obtaining (PU-L) itself;
selecting a value R;
obscuring (PU-L(CK)) according to (PU-L) and R to result in Obs (PU-L(CK));
sending Obs (PU-L(CK)) to the licensor, the licensor applying a private key (PR-L) corresponding to (PU-L) to Obs (PU-L(CK)) to result in Obs (CK) as an obscured version of (CK);
receiving Obs (CK) from the licensor; and
obtaining (CK) from Obs (CK) based on applying R thereto, whereby the licensor cannot identify from Obs (PU-L(CK)) or from Obs (CK) the encrypted content or the content key (CK) from which the encrypted content may be identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium having stored thereon computer-executable instructions for implementing a method in connection with a piece of encrypted digital content, the method for a user to obtain a content key (CK) to decrypt the encrypted content and comprising:
-
obtaining (CK) encrypted according to a public key of a licensor (PU-L) to result in (PU-L(CK)), and obtaining (PU-L) itself;
selecting a value R;
obscuring (PU-L(CK)) according to (PU-L) and R to result in Obs (PU-L(CK));
sending Obs (PU-L(CK)) to the licensor, the licensor applying a private key (PR-L) corresponding to (PU-L) to Obs (PU-L(CK)) to result in Obs (CK) as an obscured version of (CK);
receiving Obs (CK) from the licensor; and
obtaining (CK) from Obs (CK) based on applying R thereto, whereby the licensor cannot identify from Obs (PU-L(CK)) or from Obs (CK) the encrypted content or the content key (CK) from which the encrypted content may be identified. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification