×

Media content protection utilizing public key cryptography

  • US 6,550,011 B1
  • Filed: 10/07/1999
  • Issued: 04/15/2003
  • Est. Priority Date: 08/05/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for preventing unauthorized utilization of content, said method comprising the steps of:

  • establishing a plurality of compliant devices ones of which are storage devices and other ones of which are use devices, wherein ones of said plurality of compliant devices meet different levels of compliant operation and all of said plurality of compliant devices meet a minimum operational level of protecting a cryptographic key associated with protected content, and wherein each compliant device of said plurality of compliant devices includes at least one element of the set consisting of a public cryptographic key and an electronic certificate;

    selecting a first cryptographic key to be associated with said content;

    encrypting said content using said first cryptographic key;

    selecting content use information from a set of pre-established content use information to proscribe use of said content;

    protecting said selected content use information from unauthorized alteration;

    identifying ones of said plurality of compliant devices for which utilization of said content is to be authorized to thereby establish an authorized compliant device set, wherein said authorized compliant device set includes only compliant devices of said plurality of compliant devices meeting a desired threshold standard of operation;

    establishing acceptable compliant device information, wherein said acceptable compliant device information includes at least one element of the set consisting of said public cryptographic key and said electronic certificate for each compliant device of said authorized compliant device set;

    associating said first cryptographic key, said protected content use information and said acceptable compliant device information with said encrypted content; and

    storing said first cryptographic key in a secure storage area of a storage device of said authorized compliant device set.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×