SYSTEM AND METHOD FOR CONTROLLED COPYING AND MOVING OF CONTENT BETWEEN DEVICES AND DOMAINS BASED ON CONDITIONAL ENCRYPTION OF CONTENT KEY DEPENDING ON USAGE STATE
First Claim
1. A method of checking the integrity of a voucher comprising:
- receiving the voucher at a first device from a second device;
computing a cryptographic hashing function over at least part of the voucher;
decrypting an encrypted hash value stored in the voucher with a public key of the second device;
comparing the computed hash value with the stored hash value.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user'"'"'s compliant devices, or all of a family'"'"'s devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
64 Citations
9 Claims
-
1. A method of checking the integrity of a voucher comprising:
-
receiving the voucher at a first device from a second device; computing a cryptographic hashing function over at least part of the voucher; decrypting an encrypted hash value stored in the voucher with a public key of the second device; comparing the computed hash value with the stored hash value. - View Dependent Claims (2, 3)
-
-
4. An article of manufacture comprising:
-
a computer readable medium comprising instructions for; receiving a voucher from a second device; computing a cryptographic hashing function over at least part of the voucher; decrypting an encrypted hash value stored in the voucher with a public key of the second device; comparing the computed hash value with the stored hash value. - View Dependent Claims (5, 6)
-
-
7. An apparatus capable of checking the integrity of a voucher comprising:
-
means for receiving a voucher from a second device; means for computing a cryptographic hashing function over at least part of the voucher; means for decrypting an encrypted hash value stored in the voucher with a public key of the second device; means for comparing the computed hash value with the stored hash value. - View Dependent Claims (8, 9)
-
Specification