Method and apparatus for confirming and revoking trust in a multi-level content distribution system
First Claim
1. A method of protecting content material comprising:
- providing a first certificate to a providing device at a first level of a device hierarchy, receiving a subordinate revocation list corresponding to a subset of receiving devices at a subordinate level of the device hierarchy from the providing device, in dependence upon whether the first certificate is included in a first revocation list at the providing device corresponding to the first level of the device hierarchy, validating a second certificate of a receiving device at the subordinate level of the device hierarchy including;
determining an authenticity of the second certificate, and determining whether the second certificate of the receiving device has been revoked, in dependence upon whether the second certificate is included in the subordinate revocation list, and communicating the content material to the receiving device in dependence upon the validation of the second certificate.
2 Assignments
0 Petitions
Accused Products
Abstract
A hierarchical arrangement of revocation lists, corresponding to a hierarchy of content processing and rendering devices is used to optimize the processing and storage of revocation lists. At each level of the hierarchy, an access device provides its certification to an access device at a higher level in the device hierarchy. The higher level device compares the lower level device'"'"'s certification to a revocation list corresponding to devices at the lower level. If the certificate has not been revoked, the higher level device provides a lower level revocation list to the lower level access device. The lower level access device uses this lower level revocation list to verify the status of devices to which it communicates content material. Because each list is limited to devices at each level of a conventional hierarchy of consumer devices, the lists provide an optimization at each device, by providing revocations only for devices that are expected to be used at the particular hierarchy level.
56 Citations
15 Claims
-
1. A method of protecting content material comprising:
-
providing a first certificate to a providing device at a first level of a device hierarchy, receiving a subordinate revocation list corresponding to a subset of receiving devices at a subordinate level of the device hierarchy from the providing device, in dependence upon whether the first certificate is included in a first revocation list at the providing device corresponding to the first level of the device hierarchy, validating a second certificate of a receiving device at the subordinate level of the device hierarchy including;
determining an authenticity of the second certificate, and determining whether the second certificate of the receiving device has been revoked, in dependence upon whether the second certificate is included in the subordinate revocation list, and communicating the content material to the receiving device in dependence upon the validation of the second certificate. - View Dependent Claims (2, 3, 4, 5)
determining the authenticity of the second certificate includes: receiving the second certificate from the receiving device, applying a public key of a trusted authority to the second certificate to produce a verification parameter.
-
-
3. The method of claim 2, further including
encrypting the content material for communicating to the receiving device, via an encryption key that is based on the verification parameter. -
4. The method of claim 1, further including
receiving a third revocation list from the providing device, corresponding to devices at a third level of the device hierarchy, and communicating the third revocation list to the receiving device in dependence upon the validation of the second certificate. -
5. The method of claim 1, further including
receiving a plurality of revocation lists from the providing device, and communicating at least one of the plurality of revocation lists to the receiving device in dependence upon the validation of the second certificate.
-
6. An access control device for protecting content material comprising:
-
an upper level interface device that is configured to provide communications with an upper level access device at an upper level of a device hierarchy, a lower level interface device that is configured to provide communications with a lower level access device at a lower level of the device hierarchy, and a verifier, operably coupled to the upper level interface device and the lower level interface device, that is configured to gate the communications with the lower level access device in dependence upon a lower level revocation list that is received from the upper level access device, wherein the upper level interface device is further configured to communicate a first certificate to the upper level access device, and to receive the lower level revocation list, in dependence upon a verification of the first certificate based on an upper level revocation list at the upper level access device, the lower level revocation list being substantially disjoint from the upper level revocation list, and the lower level interface device is further configured to receive a lower level certificate from the lower level access device, and the verifier is configured to prevent subsequent communications to the lower level access device, in dependence upon whether the second certificate corresponds to an entry in the lower level revocation list. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
the verifier is further configured to determine the authenticity of the second certificate based on a public key of a trusted authority. -
8. The access control device of claim 6, wherein
the communications to the lower level access device include the content material. -
9. The access control device of claim 8, further including
an encrypter that is configured to encrypt the content material for communication to the lower level access device, based on a public key that is associated with the lower level access device. -
10. The access control device of claim 9, wherein
the encrypter is configured to encrypt the content material by encrypting a decryption key that facilitates a decryption of the content material. -
11. The access control device of claim 6, wherein
the upper level interface device is further configured to receive a third revocation list associated with a third level of the device hierarchy, and the verifier is further configured to allow communication of the third revocation list to the lower level access device, via the lower level interface device, in dependence upon whether the second certificate corresponds to an entry in the lower level revocation list. -
12. The access control device of claim 6, further including:
a storage device that is configured to store the content material for subsequent transmission to the lower level access device.
-
13. The access control device of claim 6, wherein
the content material is stored in an encrypted form, and the access control device further includes a decrypter that is configured to decrypt the content material based on a private key that is associated with the access control device. -
14. The access control device of claim 13, wherein
the decrypter is configured to decrypt the content material by decrypting, via the private key, a decryption key that facilitates a subsequent decryption of the content material. -
15. The access control device of claim 6, further including
a rendering device that is configured to render the content material.
-
Specification