Method and apparatus for simultaneous decryption and re-encryption of publicly distributed content via stream ciphers
First Claim
Patent Images
1. A method comprising:
- receiving encrypted streamed content encrypted with a first key;
generating a first key stream of a first stream cipher based on the first key and a second key;
generating a second key stream of a second stream cipher based on the first and second keys; and
simultaneously decrypting and re-encrypting the encrypted streamed content using a combination of the first and second key streams to produce re-encrypted streamed content encrypted with the second key.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure communication from one encryption domain to another using a trusted module. In one embodiment, the invention includes receiving encrypted streamed content encrypted with a first key, generating a substitution key stream based on the first key and a second key, generating a transposition key stream based on the first and second keys, and simultaneously decrypting and re-encrypting the encrypted streamed content using a combination of the substitution and transposition streams to produce re-encrypted streamed content encrypted with the second key.
-
Citations
36 Claims
-
1. A method comprising:
-
receiving encrypted streamed content encrypted with a first key; generating a first key stream of a first stream cipher based on the first key and a second key; generating a second key stream of a second stream cipher based on the first and second keys; and simultaneously decrypting and re-encrypting the encrypted streamed content using a combination of the first and second key streams to produce re-encrypted streamed content encrypted with the second key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An article comprising:
- a machine-accessible medium having stored thereon data representing sequences of instructions which, when executed by a machine, cause the machine to perform the operations of
receiving encrypted streamed content encrypted with a first key; generating a first key stream of a first stream cipher based on the first key and a second key; generating a second key stream of a second stream cipher based on the first and second keys; and simultaneously decrypting and re-encrypting the encrypted streamed content using a combination of the first and second key streams to produce re-encrypted streamed content encrypted with the second key. - View Dependent Claims (14, 15, 16, 17, 18, 19)
- a machine-accessible medium having stored thereon data representing sequences of instructions which, when executed by a machine, cause the machine to perform the operations of
-
20. An apparatus comprising:
-
a content interface to receive encrypted streamed content encrypted with a first key; a computing device to generate a first key stream of a first stream cipher based on the first key and a second key, to generate a second key stream of a second stream cipher based on the first and second keys, and to simultaneously decrypt and re-encrypt the encrypted streamed content using a combination of the first and second key streams to produce re-encrypted streamed content encrypted with the second key; and a sink device interface to communicate the re-encrypted streamed content to a sink device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system comprising:
-
a sales server to send a first key and a second key over at least one secure authenticated channel; an authoring module to encrypt content into encrypted content using the first key and to send the encrypted content; and a receiving device to receive the first key from the sales server, to receive the encrypted content from the authoring module, to generate a first key stream of a first stream cipher based on the first key and the second key, to generate a second key stream of a second stream cipher based on the first and second keys, and to simultaneously decrypt and re-encrypt the encrypted content using a combination of the first and second key streams to produce re-encrypted content encrypted with the second key. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
Specification