METHOD OF SECURING COMMUNICATION
First Claim
1. A method for securing data to be transmitted between a plurality of devices, the method comprising:
- exchanging encryption keys between first and second devices of the plurality of devices;
selecting digital rights management (DRM) features for the data which is to be transmitted from the first device;
encrypting the data to be transmitted and the selected digital rights management features using at least one distinct key;
transmitting the encrypted data and the selected DRM features to the second device and a third device of the plurality of devices; and
decrypting the encrypted data on the second device using the exchanged encryption keys and displaying the data according to the selected DRM features.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for securing data to be transmitted between a plurality of devices which includes exchanging encryption keys between first and second devices of the plurality of devices, selecting digital rights management (DRM) features for the data which is to be transmitted from the first device, encrypting the data to be transmitted and the selected digital rights management features using at least one distinct key, transmitting the encrypted data and the selected DRM features to the second device and a third device, and decrypting the encrypted data on the second device using the exchanged encryption keys and displaying the data according to the selected DRM features.
52 Citations
32 Claims
-
1. A method for securing data to be transmitted between a plurality of devices, the method comprising:
-
exchanging encryption keys between first and second devices of the plurality of devices; selecting digital rights management (DRM) features for the data which is to be transmitted from the first device; encrypting the data to be transmitted and the selected digital rights management features using at least one distinct key; transmitting the encrypted data and the selected DRM features to the second device and a third device of the plurality of devices; and decrypting the encrypted data on the second device using the exchanged encryption keys and displaying the data according to the selected DRM features. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 17, 18, 19, 20, 21, 23, 25, 27)
-
-
13. A method to perform secure communication between a first mobile device and a second mobile device, the method comprising:
-
selecting data using the first mobile device which has a first identification information; selecting the second mobile device having a second identification information from a first memory of the first mobile device; appending the second identification information as read from the first memory to the selected data; sending the selected data with the appended second identification information to the second mobile device, wherein the data is accessible on the second mobile device when the appended second information corresponds with the second identification information as read from a second memory of the second device. - View Dependent Claims (16, 22, 24, 26, 29, 30)
-
-
28. A method to perform secure communication between a first mobile device and a second mobile device, the method comprising:
-
registering the first mobile device having a first identification information with a server as a first authorized user based on the first identification information; generating an encryption key corresponding to rights granted to the first mobile device; storing the encryption key within the server; and determining whether a second identification information of a second mobile device selected by the first mobile device is a second authorized user, wherein the first mobile device is permitted to communicate with the second mobile device when the server determines that both the first and second mobile devices are authorized users.
-
-
31. A method for securing data to be transmitted between a plurality of devices, the method comprising:
-
exchanging distinct encryption keys between first and second devices of the plurality of devices; and selecting data to be transmitted from the first device to the second device, wherein a smart security feature automatically encrypts the selected data when the data contains certain data. - View Dependent Claims (32)
-
Specification