SYSTEM AND METHOD FOR OBFUSCATION INITIATION VALUES OF A CRYPTOGRAPHY PROTOCOL
First Claim
Patent Images
1. A computer-implemented method for determining whether a first computing device has the correct version of a software program, the method comprising:
- computing a private secret value based on at least one initial setup value;
computing a public value based on the private secret value and at least one initial setup value;
sending the public value to the second computing device;
receiving a second public value from the second computing device;
computing a shared secret based on the second public value received from the second computing device and the private secret value;
receiving an encrypted message from the second computing device;
decrypting the encrypted message using the shared secret;
determining whether the message was decrypted correctly; and
if the message was decrypted correctly, causing communications between the first computing device and the second computing device to continue because the first computing device and the second computing device have the same version of the software program;
orif the message was not decrypted correctly, causing communications between the first computing device and the second computing device to terminate because the first computing device and the second computing device do not have the same version of the software program.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client computing device has a secure and approved version of content player software implemented for consuming downloaded copyright media content. With this technique, copyright media content providers are able to ensure that only secure and approved content players are implemented to access the content.
-
Citations
20 Claims
-
1. A computer-implemented method for determining whether a first computing device has the correct version of a software program, the method comprising:
-
computing a private secret value based on at least one initial setup value; computing a public value based on the private secret value and at least one initial setup value; sending the public value to the second computing device; receiving a second public value from the second computing device; computing a shared secret based on the second public value received from the second computing device and the private secret value; receiving an encrypted message from the second computing device; decrypting the encrypted message using the shared secret; determining whether the message was decrypted correctly; and if the message was decrypted correctly, causing communications between the first computing device and the second computing device to continue because the first computing device and the second computing device have the same version of the software program;
orif the message was not decrypted correctly, causing communications between the first computing device and the second computing device to terminate because the first computing device and the second computing device do not have the same version of the software program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing instructions that, when executed by a processing unit, cause the processing unit to determine whether a first computing device has the correct version of a software program, by performing the steps of:
-
computing a private secret value based on at least one initial setup value; computing a public value based on the private secret value and at least one initial setup value; sending the public value to the second computing device; receiving a second public value from the second computing device; computing a shared secret based on the second public value received from the second computing device and the private secret value; receiving an encrypted message from the second computing device; decrypting the encrypted message using the shared secret; and determining whether the message was decrypted correctly, wherein if the message was decrypted correctly, then communications between the first computing device and the second computing device continue because the first computing device and the second computing device have the same version of the software program;
orif the message was not decrypted correctly, then communications between the first computing device and the second computing device terminate because the first computing device and the second computing device do not have the same version of the software program. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A first computing device, comprising:
a processing unit configured to; compute a private secret value based on at least one initial setup value; compute a public value based on the private secret value and on at least one initial setup value; send the public value to the second computing device; receive a second public value from the second computing device; compute a shared secret based on the second public value received from the second computing device and the private secret value; receive an encrypted message from the second computing device; decrypt the encrypted message using the shared secret; and determine whether the message was decrypted correctly, wherein if the message was decrypted correctly, then communications between the first computing device and the second computing device continue because the first computing device has the correct version of a software program, or if the message was not decrypted correctly, then communications between the first computing device and the second computing device terminate because the first computing device does not have the correct version of the software program
Specification