×

ENSURING AUTHENTICITY IN A CLOSED CONTENT DISTRIBUTION SYSTEM

  • US 20100017627A1
  • Filed: 07/21/2009
  • Published: 01/21/2010
  • Est. Priority Date: 02/07/2003
  • Status: Abandoned Application
First Claim
Patent Images

1. A method comprising:

  • receiving encrypted content at a secure processor, said secure processor having at least some secure individualized information maintained therein, said secure processor being capable of interpreting said content for presentation;

    receiving a license for the content at said secure processor, said license including a first decryption key for said encrypted content and information sufficient to verify that the content is authentic at said secure processor;

    verifying at said secure processor authenticity of the content, using the information sufficient to verify that the content is authentic;

    generating a second decryption key at said secure processor, in response to verifying authenticity of the content, said second decryption key being independent of said first decryption key, wherein the second decryption key is stored in secure memory and is secure against discovery outside said secure processor;

    re-encrypting the content at said secure processor using said second decryption key.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×