MEDIA SECURITY THROUGH HARDWARE-RESIDENT PROPRIETARY KEY GENERATION
First Claim
1. A system comprising:
- a host processor;
a first security circuit to re-encrypt a work of authorship protected by an encryption standard using a proprietary key after an authorization module uses an algorithm of the encryption standard to verify that the system has permission to playback the work of authorship;
a system memory to store a proprietary encrypted content generated through the re-encryption process of the first security circuit; and
a second security circuit of a display module to independently generate the proprietary key using an index pointer provided from the first security circuit to the second security circuit through the host processor and to decrypt the proprietary encrypted content of the system memory using the independently generated proprietary key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and apparatus of an author website in a commerce environment are disclosed. In one embodiment, a system includes a host processor; a first security circuit to re-encrypt a work of authorship protected by an encryption standard using a proprietary key after an authorization module uses an algorithm of the encryption standard to verify that the system has permission to playback the work of authorship; a system memory to store a proprietary encrypted content generated through the re-encryption process of the first security circuit; and a second security circuit of a display module to independently generate the proprietary key using an index pointer provided from the first security circuit to the second security circuit through the host processor and to decrypt the proprietary encrypted content of the system memory using the independently generated proprietary key.
-
Citations
20 Claims
-
1. A system comprising:
-
a host processor; a first security circuit to re-encrypt a work of authorship protected by an encryption standard using a proprietary key after an authorization module uses an algorithm of the encryption standard to verify that the system has permission to playback the work of authorship; a system memory to store a proprietary encrypted content generated through the re-encryption process of the first security circuit; and a second security circuit of a display module to independently generate the proprietary key using an index pointer provided from the first security circuit to the second security circuit through the host processor and to decrypt the proprietary encrypted content of the system memory using the independently generated proprietary key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of an authorization module comprising:
-
applying an algorithm of an encryption standard to verify that a playback device has permission to playback the work of authorship; re-encrypting the work of authorship protected by the encryption standard using a first hardware circuit that generates a proprietary key stored only in embedded hardware memory of the first hardware circuit to re-encrypt the work of authorship; and storing a proprietary encrypted content generated through the re-encryption process in a system memory without storing any key information to decrypt the proprietary encrypted content in the system memory. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A playback device comprising:
-
an authentication component to verify that a protected content is authorized to be viewed on the playback device; a media security circuitry to re-encrypt the protected content using a proprietary key after it is authorized to be viewed on the playback device using a secure embedded memory of the media security circuitry; and a display component to receive the re-encrypted content from a system memory and to reference the media security circuitry to provide the proprietary key to decrypt the re-encrypted content. - View Dependent Claims (17, 18, 19, 20)
-
Specification