CONTENT DISTRIBUTION AND AGGREGATION
First Claim
Patent Images
1. A method for secure publication of content, the method comprising:
- encrypting content with a media key;
providing the encrypted content to a client device associated with a private key and a public key, wherein the private key is stored at the client device;
encrypting the media key with the public key; and
providing the encrypted media key to the client device.
5 Assignments
0 Petitions
Accused Products
Abstract
In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a client device associated with a private key and a public key. The private key may be stored at the client device. The method may also include encrypting the media key with the public key. The method may also include providing the encrypted media key to the client device.
78 Citations
20 Claims
-
1. A method for secure publication of content, the method comprising:
-
encrypting content with a media key; providing the encrypted content to a client device associated with a private key and a public key, wherein the private key is stored at the client device; encrypting the media key with the public key; and providing the encrypted media key to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for aggregating content from a subscriber to a secure publishing system, the method comprising:
-
storing a private key at a client device associated with the subscriber, wherein a corresponding public key is accessible to the secure publishing system; storing a unique identifier associated with the client device at the client device; storing a media key encrypted by the public key at the client device; receiving a selection by the subscriber of client content to upload to the secure publishing system; decrypting the media key using the private key; encrypting the client content using the media key; tagging the encrypted client content with the unique identifier; and uploading the tagged and encrypted client content to the secure publishing system. - View Dependent Claims (18, 19, 20)
-
Specification