Secure communication and real-time watermarking using mutating identifiers
First Claim
Patent Images
1. A method of distributing content items, the method comprising:
- obtaining encrypted content at a first entity, the encrypted content including a content item encrypted with a first encryption key;
requesting, at the first entity, a first mutating identifier having a first part and a first key from an authenticator;
encrypting, at the first entity, a watermark with the first key from the first mutating identifier to create a first encrypted label;
grouping, at the first entity, the first part of the first mutating identifier with the first encrypted label to create a first encrypted watermark;
receiving, at the first entity, a request for a content item from a second entity having an identity and a second mutating identifier over a communication link;
generating a decryption key request at the first entity;
transferring the decryption key request from the first entity to the authenticator over a communication link;
receiving, at the first entity, the first decryption key and a second encryption key from the authenticator over a communication link;
decrypting, at the first entity, the encrypted content with the first decryption key to obtain the content item;
applying, at the first entity, the watermark to the content item to obtain watermarked content;
encrypting, at the first entity, the watermarked content with the second encryption key to create encrypted watermarked content;
transferring the first encrypted watermark from the first entity to the second entity over a communication link;
verifying, at the authenticator, the identity of the second entity;
based on verifying the identity of the second entity, sending the encrypted watermarked content from the first entity to the second entity over a communication link; and
based on verifying the identity of the second entity, sending a second decryption key from the authenticator to the second entity over a communication link.
2 Assignments
0 Petitions
Accused Products
Abstract
A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, watermarks, and licenses. The authenticator controls the distribution of mutating IDs, verifies the identity of one or more participating parties, and provides tracking information for mapping service providers and consumers to particular, possibly watermarked, content items.
-
Citations
48 Claims
-
1. A method of distributing content items, the method comprising:
-
obtaining encrypted content at a first entity, the encrypted content including a content item encrypted with a first encryption key; requesting, at the first entity, a first mutating identifier having a first part and a first key from an authenticator; encrypting, at the first entity, a watermark with the first key from the first mutating identifier to create a first encrypted label; grouping, at the first entity, the first part of the first mutating identifier with the first encrypted label to create a first encrypted watermark; receiving, at the first entity, a request for a content item from a second entity having an identity and a second mutating identifier over a communication link; generating a decryption key request at the first entity; transferring the decryption key request from the first entity to the authenticator over a communication link; receiving, at the first entity, the first decryption key and a second encryption key from the authenticator over a communication link; decrypting, at the first entity, the encrypted content with the first decryption key to obtain the content item; applying, at the first entity, the watermark to the content item to obtain watermarked content; encrypting, at the first entity, the watermarked content with the second encryption key to create encrypted watermarked content; transferring the first encrypted watermark from the first entity to the second entity over a communication link; verifying, at the authenticator, the identity of the second entity; based on verifying the identity of the second entity, sending the encrypted watermarked content from the first entity to the second entity over a communication link; and based on verifying the identity of the second entity, sending a second decryption key from the authenticator to the second entity over a communication link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of distributing content, the method comprising:
-
obtaining encrypted content at a first entity, the encrypted content including a content item encrypted with a first encryption key; obtaining a first encrypted watermark at the first entity, the first encrypted watermark including a watermark encrypted with a first key of a first mutating identifier; requesting from the authenticator, at the first entity, a second mutating identifier having a second part and a second key; encrypting, at the first entity, the first encrypted watermark with the second key from the second mutating identifier to create a second encrypted watermark; grouping, at the first entity, the second part of the second mutating identifier with the second encrypted watermark to create a first doubly-encrypted watermark; receiving, at the first entity, a request for a content item from a second entity having an identity and a third mutating identifier over a communication link; generating a decryption key request at the first entity; transferring the decryption key request from the first entity to the authenticator over a communication link; receiving, at the first entity, the watermark, a first decryption key, and a second encryption key from the authenticator over a communication link; decrypting, at the first entity, the encrypted content with the first decryption key to obtain the content item; applying, at the first entity, the watermark to the content item to create watermarked content; encrypting, at the first entity, the watermarked content with the second encryption key to create encrypted watermarked content; transferring the first doubly-encrypted watermark to the second entity from the first entity over a communication link; verifying, at the authenticator, the identity of the second entity; based on verifying the identity of the second entity, sending the encrypted watermarked content from the first entity to the second entity a communication link; and based on verifying the identity of the second entity, sending a second decryption key from the authenticator to the second entity over a communication link. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification