METHOD AND APPARATUS FOR LIMITING THE ABILITY OF A USER DEVICE TO REPLAY CONTENT
First Claim
1. An apparatus in a user device for limiting the ability of the user device to replay protected content, the apparatus comprising:
- at least a first processor configured to perform an algorithm that limits the ability of the user device to use a low-level key to decrypt protected content, wherein the low-level key is valid until at least one predetermined expiration criteria is met and can be used to decrypt protected content while the key is valid, and wherein the low-level key expires and becomes invalid after the at least one predetermined expiration criteria is met and cannot be used to decrypt protected content while the key is invalid;
at least a first memory element accessible by the first processor; and
a decryption component configured to receive a valid low-level key from the first processor and use the valid low-level key to decrypt protected content.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and an apparatus are provided for use in a user device for limiting the ability of the terminal of the user device to replay protected content. The low-level key that is used by the decryption component of the terminal to decrypt content is transient in that it expires if at least one predetermined expiration criteria is met. After they key has expired, it is no longer valid and thus cannot be used by the decryption component to decrypt protected content. Limiting the ability of the terminal to replay protected content is preferably accomplished in a way that does not affect the ability of the terminal to play and replay unprotected content.
-
Citations
30 Claims
-
1. An apparatus in a user device for limiting the ability of the user device to replay protected content, the apparatus comprising:
-
at least a first processor configured to perform an algorithm that limits the ability of the user device to use a low-level key to decrypt protected content, wherein the low-level key is valid until at least one predetermined expiration criteria is met and can be used to decrypt protected content while the key is valid, and wherein the low-level key expires and becomes invalid after the at least one predetermined expiration criteria is met and cannot be used to decrypt protected content while the key is invalid;
at least a first memory element accessible by the first processor; and
a decryption component configured to receive a valid low-level key from the first processor and use the valid low-level key to decrypt protected content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for use in a user device for limiting the ability of the user device to replay protected content, the method comprising:
in a first processor, performing an algorithm that limits the ability of the user device to use a low-level key to decrypt protected content, wherein the low-level key is valid until at least one predetermined expiration criteria is met, wherein the key can be used by a decryption component of the user device to decrypt protected content while the key is valid, and wherein the low-level key expires and becomes invalid after the at least one predetermined expiration criteria is met, and wherein the key cannot be used by the decryption component to decrypt protected content while the key is invalid. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
23. A computer program for execution by a terminal of a user device for limiting the ability of the user device to replay protected content, the program comprising instructions that are stored on a computer-readable medium, the program comprising:
-
instructions for performing an algorithm in a first processor that limits the ability of the user device to use a low-level key to decrypt protected content, wherein the low-level key is valid until at least one predetermined expiration criteria is met and can be used to decrypt protected content while the key is valid, and wherein the low-level key expires and becomes invalid after the at least one predetermined expiration criteria is met and cannot be used to decrypt protected content while the key is invalid; and
instructions for sending a valid low-level key from the first processor to a decryption component for use by the decryption component to decrypt protected content. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification