SYSTEM AND METHOD FOR DEFINING PROGRAMMABLE PROCESSING STEPS APPLIED WHEN PROTECTING THE DATA
First Claim
1. A computerized encryption system comprising:
- an input data interface module for receiving input data to be protected;
a plurality of encryption functions;
sequencer data that defines a sequence flow of how the encryption functions are executed; and
a sequencer instruction execution module that performs the sequencing of the execution of the encryption functions in the order according to the sequencer data.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for protecting data being sent between a client and a server include the capability of defining programmable processing steps that are applied by the server when protecting the data and the same steps are applied by the client when unprotecting the data. The programmable processing steps can be defined uniquely for each client, and the programmable processing steps are selected from a number of functions using sequencing data that defines the processing steps. The programmable processing steps allow for each client to process encrypted data in a different manner and the programmable processing steps are defined by what is called a digital rights management (DRM) Sequencing Key, and as such the system and method introduces a key-able DRM whereby each DRM message can be processed in a unique (or pseudo unique) manner.
79 Citations
10 Claims
-
1. A computerized encryption system comprising:
-
an input data interface module for receiving input data to be protected; a plurality of encryption functions; sequencer data that defines a sequence flow of how the encryption functions are executed; and a sequencer instruction execution module that performs the sequencing of the execution of the encryption functions in the order according to the sequencer data. - View Dependent Claims (2, 3)
-
-
4. A method of protecting data to be transmitted to a client comprising:
-
receiving input data to be protected; generating sequencer data that describes the order in which selected protection functions will be applied to the input data; executing the selected protection functions upon the input data according to the sequencer data to generate protected output data. transmitting the protected output data to a client; and transmitting the sequencer data to the client. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A computerized system for using encrypted data comprising:
-
an input data interface module to receive protected output data; a plurality of decryption functions; sequencer data that defines a sequence flow of how the decryption functions are executed; and a sequencer instruction execution module for sequencing of the execution of the decryption functions in the order according to the sequencer data. - View Dependent Claims (10)
-
Specification