SECURE LOCAL UPDATE OF CONTENT MANAGEMENT SOFTWARE
First Claim
Patent Images
1. A method comprising:
- receiving a software update at a computing device having an existing software application, the existing software application having an historic public/private key pair including an historic private key and an historic public key, the historic private key usable by the existing software application to access historic protected content, the historic protected content previously protected using the historic public key and the existing software application; and
applying the software update to the existing software application to provide an updated software application, applying the software update including;
retaining the historic private key for use by the updated software application to access the historic protected content, the historic private key not usable to access new protected content, the new protected content protected by a new public key and the updated software application; and
generating a new public/private key pair locally at the computing device, the new public/private key pair including the new public key and a new private key, the new public key usable to protect content to provide the new protected content, the new private key usable by the updated software application to access the new protected content.
2 Assignments
0 Petitions
Accused Products
Abstract
This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys without the use of a key server.
78 Citations
20 Claims
-
1. A method comprising:
-
receiving a software update at a computing device having an existing software application, the existing software application having an historic public/private key pair including an historic private key and an historic public key, the historic private key usable by the existing software application to access historic protected content, the historic protected content previously protected using the historic public key and the existing software application; and applying the software update to the existing software application to provide an updated software application, applying the software update including; retaining the historic private key for use by the updated software application to access the historic protected content, the historic private key not usable to access new protected content, the new protected content protected by a new public key and the updated software application; and generating a new public/private key pair locally at the computing device, the new public/private key pair including the new public key and a new private key, the new public key usable to protect content to provide the new protected content, the new private key usable by the updated software application to access the new protected content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
selecting one or more historic symmetric keys associated with an existing software application on a remote computing device, the historic symmetric keys for decrypting one or more encrypted historic private keys stored at the remote computing device to provide one or more historic private keys for accessing historic protected content previously protected using the existing software application; and sending a software update to the remote computing device, the software update including a new symmetric key and the one or more historic symmetric keys and capable, once applied to the existing software application by the remote computing device, of providing an updated software application, the new symmetric key for encrypting a new private key generated at the remote computing device, the new private key for accessing new protected content protected using the updated software application. - View Dependent Claims (16, 17)
-
-
18. One or more tangible computer-readable media having stored thereon computer-executable instructions that, if executed by a computing device, cause the computing device to perform a method comprising:
-
receiving a software update at the computing device, the computing device including an existing software application having an historic public/private key pair including an historic private key and an historic public key, the historic private key usable by the existing software application to access historic protected content, the historic protected content previously protected using the historic public key and the existing software application; and applying the software update to the existing software application to provide an updated software application, applying the software update including; retaining the historic private key for use by the updated software application to access the historic protected content, the historic private key not usable to access new protected content, the new protected content protected by a new public key and the updated software application; and generating a new public/private key pair locally at the computing device, the new public/private key pair including the new public key and a new private key, the new public key usable to protect content to provide the new protected content, the new private key usable by the updated software application to access the new protected content. - View Dependent Claims (19, 20)
-
Specification