Processing device revocation and reinvocation
First Claim
1. A method comprising:
- storing, at a storage location of a system, a first security value;
utilizing, at the system, a first security certificate compatible with the first security value and incompatible with at least a second security value, wherein the first security certificate enables one or more processing features of the system in conjunction with the first security value;
receiving, at the system, a certificate revocation stimulus;
modifying a value at a first bit position of the storage location so as to convert the first security value stored at the storage location to the second security value.
3 Assignments
0 Petitions
Accused Products
Abstract
A method includes storing, at a storage location of a system, a first security value and utilizing, at the system, a first security certificate compatible with the first security value and incompatible with at least a second security value, wherein the first security certificate enables one or more processing features of the system in conjunction with the first security value. The method also includes receiving a certificate revocation stimulus and modifying a value at a first bit position of the storage location so as to convert the first security value stored at the storage location to the second security value. Another method includes receiving multimedia data at a system, wherein the multimedia data is representative of multimedia content including a digital watermark representing one or more system identifiers, and disabling at least one processing feature if the system identifiers includes a unique identifier associated with the system.
135 Citations
50 Claims
-
1. A method comprising:
-
storing, at a storage location of a system, a first security value;
utilizing, at the system, a first security certificate compatible with the first security value and incompatible with at least a second security value, wherein the first security certificate enables one or more processing features of the system in conjunction with the first security value;
receiving, at the system, a certificate revocation stimulus;
modifying a value at a first bit position of the storage location so as to convert the first security value stored at the storage location to the second security value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving multimedia data at a system, wherein the multimedia data is representative of multimedia content and wherein the multimedia content includes a digital watermark representing one or more system identifiers; and
disabling at least one processing feature of the system if the one or more system identifiers includes a unique identifier associated with the system. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A system comprising:
-
a storage location to store a security value;
a certificate storage component to store one or more security certificates;
a multimedia processing module to process multimedia data; and
a security module operably coupled to the storage location and the multimedia processing module, wherein the security module is to;
disable one or more processing features of the multimedia processing module in response to determining an incompatibility between a selected security certificate stored at the certificate storage module and the security value stored at the storage location; and
modify the security value by modifying a value at an identified bit position in response to a certificate revocation stimulus. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system comprising:
-
an input to receive multimedia data representative of multimedia content, wherein the multimedia content includes digital watermark data representative of one or more system unique identifiers; and
a security module to disable at least one processing feature of the system if the one or more system unique identifiers includes a unique identifier associated with the system. - View Dependent Claims (38)
-
-
39. A method comprising:
-
receiving a request to reinvoke one or more processing features of a system, the request comprising a first security value;
generating a first security certificate based on the first security value, wherein the first security certificate enables the one or more processing features of the system in conjunction with the first security value; and
transmitting the first security certificate to the system. - View Dependent Claims (40, 41, 42)
-
-
43. A method comprising:
-
issuing a first security certificate from a certificate authority to a processing device, wherein the first security certificate is compatible with a first security value stored at the processing device and wherein the first security certificate, in conjunction with the first security value, enables one or more processing features of the processing device;
modifying, at the processing device, the stored first security value to generate a second security value in response to a certificate revocation stimulus;
providing, via a communications link, a reinvocation request from the processing device to the certificate authority in response to modifying the stored first security value;
issuing a second security certificate from the certificate authority to the processing device, wherein the second security certificate is compatible with the second security value stored at the processing device and wherein the second security certificate, in conjunction with the second security value, enables the one or more processing features of the processing device. - View Dependent Claims (44, 45, 46, 47)
-
-
48. A system comprising:
-
a processing device comprising;
a storage location to store a security value;
a certificate storage component to store one or more security certificates; and
a security module operably coupled to the storage location, wherein the security module is to;
modify the security value in response to a certificate revocation stimulus to generate a modified security value;
disable one or more processing features of the processing device in response to determining an incompatibility between a selected first security certificate stored at the certificate storage module and the security value stored at the storage location; and
transmit, via a communications link, a reinvocation request in response to disabling the one or more processing features;
a certificate authority coupled to the processing device via the communications link, wherein the certificate authority is to;
generate a second security certificate in response to the reinvocation request, wherein the second security certificate is compatible with the modified security value; and
issue the second security certificate to the processing device for implementation at the processing device. - View Dependent Claims (49, 50)
-
Specification