LICENSABLE FUNCTION FOR SECURING STORED DATA
First Claim
1. A computer-implemented method for enabling a secure electronic data using a licensable function, the method comprising:
- defining a licensee identifier comprising binary data recorded in a computer memory;
generating a plurality of instructions for implementing a cryptographic permutation function, at least in part by providing the licensee identifier to an instruction-generating algorithm; and
providing at least one of the instructions or an executable function compiled from source code based on the instructions to a licensee identified by the licensee identifier for use in protecting electronic data for one or more devices associated with the licensee identifier.
7 Assignments
0 Petitions
Accused Products
Abstract
For securing content accessed from storage device, the storage device is associated with a licensee identifier. The licensee identifier is provided as input to an algorithm that generates, based on the identifier, a determinate set of instructions for a computer, for example, source code in a coding language, compiled binary code, or pseudo code that is capable of being translated into source code. The code, once compiled to machine-usable form, can be executed by a processor to perform a permutation operation that is unique to the licensee identifier. The output of the permutation operation can be used for protecting data provided by the storage device.
7 Citations
31 Claims
-
1. A computer-implemented method for enabling a secure electronic data using a licensable function, the method comprising:
-
defining a licensee identifier comprising binary data recorded in a computer memory; generating a plurality of instructions for implementing a cryptographic permutation function, at least in part by providing the licensee identifier to an instruction-generating algorithm; and providing at least one of the instructions or an executable function compiled from source code based on the instructions to a licensee identified by the licensee identifier for use in protecting electronic data for one or more devices associated with the licensee identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for enabling a secure electronic data using a licensable function, comprising:
a processor and a memory coupled to the processor, wherein the memory holds instructions that when executed by the processor, cause the apparatus to perform;
defining a licensee identifier comprising binary data recorded in a computer memory, generating a plurality of instructions for implementing a cryptographic permutation function, at least in part by providing the licensee identifier to an instruction-generating algorithm, and providing at least one of the instructions or an executable function compiled from source code based on the instructions to a licensee identified by the licensee identifier for use in protecting electronic data for one or more devices associated with the licensee identifier.- View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
18. A computer-readable medium, encoded with instructions that, when executed by a processor, cause an apparatus to perform:
- enabling a secure electronic data using a licensable function to perform defining a licensee identifier comprising binary data recorded in a computer memory, generating a plurality of instructions for implementing a cryptographic permutation function, at least in part by providing the licensee identifier to an instruction-generating algorithm, and providing at least one of the instructions or an executable function compiled from source code based on the instructions to a licensee identified by the licensee identifier for use in protecting electronic data for one or more devices associated with the licensee identifier.
-
19. An apparatus for enabling a secure electronic data using a licensable function, comprising:
-
means for defining a licensee identifier comprising binary data recorded in a computer memory; means for generating a plurality of instructions for implementing a cryptographic permutation function, at least in part by providing the licensee identifier to an instruction-generating algorithm; and means for providing at least one of the instructions or an executable function compiled from source code based on the instructions to a licensee identified by the licensee identifier for use in protecting electronic data for one or more devices associated with the licensee identifier.
-
-
20. A computer-implemented method for protecting content, the method comprising:
-
storing, by the first node, content that has been protected using a cryptographic key, wherein the cryptographic key is obtainable by a second node at least in part by transforming a first binary data string using a first cryptographic permutation algorithm comprising permutation operations that are defined at least in part by a unique licensee identifier of the second node; and sending the content that is protected by the cryptographic key to the second node. - View Dependent Claims (21, 22, 23, 24)
-
-
25. An apparatus for protecting content, comprising:
a processor and a memory coupled to the processor, wherein the memory holds instructions that when executed by the processor, cause the apparatus to perform storing, by the first node, content that has been protected using a cryptographic key, wherein the cryptographic key is obtainable by a second node at least in part by transforming a first binary data string using a first cryptographic permutation algorithm comprising permutation operations that are defined at least in part by a unique licensee identifier of the second node, and sending the content that is protected by the cryptographic key to the second node. - View Dependent Claims (26, 27, 28, 29)
-
30. A computer-readable medium, encoded with instructions that, when executed by a processor, cause an apparatus for protecting content to perform storing, by the first node, content that has been protected using a cryptographic key, wherein the cryptographic key is obtainable by a second node at least in part by transforming a first binary data string using a first cryptographic permutation algorithm comprising permutation operations that are defined at least in part by a unique licensee identifier of the second node, and sending the content that is protected by the cryptographic key to the second node.
-
31. An apparatus for protecting content, comprising:
means for storing, by the first node, content that has been protected using a cryptographic key, wherein the cryptographic key is obtainable by a second node at least in part by transforming a first binary data string using a first cryptographic permutation algorithm comprising permutation operations that are defined at least in part by a unique licensee identifier of the second node, and sending the content that is protected by the cryptographic key to the second node.
Specification