TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN
3 Assignments
0 Petitions
Accused Products
Abstract
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the invention. In an illustrative embodiment, the trusted domain includes a device associated with a user which receives content from the cable TV network. The content may be encrypted using a content key in accordance, e.g., with a 3DES encryption algorithm before it is stored in the device. In addition, a first encrypted content key version and a second encrypted content key version are generated by respectively encrypting the content key with a public key associated with the device and another public key associated with the user, in accordance with public key cryptography. The first and second encrypted content key versions are stored in association with the encrypted content in the device storage. The encrypted content can be migrated from a first device to a second device, and can be decrypted in the second device in the second device is associated with the same user, and also provided with the second encrypted content key version.
36 Citations
69 Claims
-
1-49. -49. (canceled)
-
50. Apparatus to securely transmit content to a device in a network, said apparatus comprising:
-
an interface configured to connect to said network; a memory comprising an encrypted content file; a processor configured to execute at least one computer program, said at least one computer program comprising a plurality of instructions which are configured to, when executed, cause said apparatus to; receive a request from said device for a copy of said encrypted content file, said request comprising a public key of said device; retrieve a first encrypted content key from said memory; retrieve a private key associated with said apparatus from said memory; decrypt said first encrypted content key to reveal said content key; encrypt said content key with said public key of said device to form said second encrypted content key; and transmit said second encrypted content key and said copy of said encrypted content file to said device. - View Dependent Claims (51, 52, 53, 54, 55, 56)
-
-
57. A method for use in an apparatus for decrypting encrypted content in a device remote from said apparatus, said encrypted content in said device being decrypted using a content key, said method comprising:
-
receiving from said device a first encrypted content key; searching a database for a first cryptographic element which is associated with a user of said device; using said first cryptographic element to decrypt said first encrypted content key, thereby recovering said content key; using a second cryptographic element which is associated with said device to encrypt said recovered content key, thereby generating a second encrypted content key; and providing said second encrypted content key to said device where said content key is recoverable based on at least said second encrypted content key. - View Dependent Claims (58, 59, 60, 61, 62, 63)
-
-
64. A computer-readable apparatus comprising media configured to store a computer program thereon, said computer program comprising a plurality of instructions which are configured to, when executed by a processor:
-
receive from a device remote from an apparatus configured to decrypt encrypted content a first encrypted content key; search a database for a first cryptographic element which is associated with a user of said device; use said first cryptographic element to decrypt said first encrypted content key, and therefore recover a content key configured to decrypt said encrypted content; use a second cryptographic element which is associated with said device to encrypt said recovered content key, and therefore generate a second encrypted content key; and provide said second encrypted content key to said device where said content key is recoverable based on at least said second encrypted content key. - View Dependent Claims (65, 66, 67, 68, 69)
-
Specification