Consumption of content
First Claim
Patent Images
1. A method of decrypting encrypted content stored on a terminal, the method comprising the steps of:
- receiving a request to access encrypted content on a terminal;
obtaining a license comprising a content decryption key and a set of binding attributes, the attributes including a public key of an authorized user of the encrypted content;
in response to the request, polling a personal trusted device of said user to digitally sign data with a private key associated with the device;
receiving said digitally signed data from said device;
verifying at the terminal the digitally signed data utilizing the public key; and
wherein the terminal in response to verification of the digitally signed data uses the content decryption key to decrypt the encrypted content;
following said step of receiving said digitally signed data, applying a hashing algorithm to said data and decrypting said digitally signed data; and
comparing results of said application of said hashing algorithm with said decrypted data in said step of verifying.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for consumption of content (1) is described in which a licensor is able to exercise control over consumption based on a personal identity in the form of a set of binding attributes (15). The control may be exercised for a number of consuming terminals (19) including rendering machines such as portable video and audio players.
-
Citations
26 Claims
-
1. A method of decrypting encrypted content stored on a terminal, the method comprising the steps of:
-
receiving a request to access encrypted content on a terminal; obtaining a license comprising a content decryption key and a set of binding attributes, the attributes including a public key of an authorized user of the encrypted content; in response to the request, polling a personal trusted device of said user to digitally sign data with a private key associated with the device; receiving said digitally signed data from said device; verifying at the terminal the digitally signed data utilizing the public key; and
wherein the terminal in response to verification of the digitally signed data uses the content decryption key to decrypt the encrypted content;following said step of receiving said digitally signed data, applying a hashing algorithm to said data and decrypting said digitally signed data; and comparing results of said application of said hashing algorithm with said decrypted data in said step of verifying. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A terminal for accessing encrypted content comprising:
-
a storage storing the encrypted content and a license, the license containing a content decryption key and a set of binding attributes, the attributes including a public key for a licensee of said content; a digital rights management engine configured to; receive a request to access said stored encrypted content from said licensee of said content; generate identity verification data in response to said request; establish, in response to said request, a communication link between the terminal and at least one other local terminal using a personal area network to request the other local terminal to encrypt and digitally sign the identity verification data, generated by said terminal, using a private key stored at the other local terminal and assigned to said licensee of said content, wherein said other terminal is a mobile telephone of said licensee; receive said digitally signed identity verification data from said other local terminal; use said public key to decrypt said encrypted identity verification data; and analyze said decrypted data to verify that the private key stored at the other local terminal corresponds to the public key in the license, and upon successful verification, decrypt the encrypted content using the content decryption key. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of decrypting encrypted content stored on a terminal, the method comprising the steps of:
-
receiving a request to access encrypted content on a terminal; obtaining a license comprising a content decryption key and a set of binding attributes, the attributes including a public key of an authorized user of the encrypted content; in response to the request, polling a personal trusted device of said user to digitally sign data with a private key associated with the device, wherein said personal trusted device is a mobile telephone; receiving said digitally signed data from said device; and verifying at the terminal the digitally signed data utilizing the public key; and
wherein the terminal in response to verification of the digitally signed data uses the content decryption key to decrypt the encrypted content.
-
-
24. A digital rights management system, comprising:
-
a rendering terminal, said rendering terminal including; a memory storing encrypted content and a license, said license including an exposed identity of a licensee to said content and an encrypted decryption content key; a processor configured to receive a request to access said content and, in response to said request, perform the following; transmit a polling request to a personal area network local to the terminal, said polling request requesting that a terminal receiving the request digitally sign test verification data using a private key stored on said terminal, said private key being assigned to said licensee; receive a response to the polling request and determine whether said licensee is within a range of said personal area network, wherein said rendering terminal processor is further configured to generate said test verification data using a hashing algorithm; and a mobile terminal, said mobile terminal including; a memory storing a private key assigned to said licensee; and a controller configured to receive said polling request and digitally sign said test verification data in response to said polling request. - View Dependent Claims (25, 26)
-
Specification