Method and system for managing authentication and payment for use of broadcast material
First Claim
Patent Images
1. A mobile phone comprising:
- a symmetric key;
a processor; and
control logic executable by the processor and configured to;
receive non-requested encrypted content from a content provider via a broadcast transmission, wherein the encrypted content is received from the content provider using spare broadcast capacity;
send a request to the content provider to access the previously received encrypted content, wherein the request includes a terminal identifier and a result of a cryptographic function having the symmetric key and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the mobile phone;
receive a content key secured by the symmetric key from the content provider if the content provider successfully verifies based on the request that the encrypted content has been correctly received by the mobile phone, the content key secured by the symmetric key being an encrypted content key;
decrypt the encrypted content key using the symmetric key; and
decrypt the encrypted content using the content key.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication system is disclosed. The authentication system includes a content provider configured to distribute encrypted content, wherein the encrypted content is generated using a content key, and a client having a symmetric key and configured to store the encrypted content received from the content provider and issue a request to the content provider, wherein the request includes a cryptographic function configured to have the symmetric key and the encrypted content as input, wherein the content provider is further configured to verify the client via the request to ensure that the client has received the encrypted content.
-
Citations
27 Claims
-
1. A mobile phone comprising:
-
a symmetric key; a processor; and control logic executable by the processor and configured to; receive non-requested encrypted content from a content provider via a broadcast transmission, wherein the encrypted content is received from the content provider using spare broadcast capacity; send a request to the content provider to access the previously received encrypted content, wherein the request includes a terminal identifier and a result of a cryptographic function having the symmetric key and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the mobile phone; receive a content key secured by the symmetric key from the content provider if the content provider successfully verifies based on the request that the encrypted content has been correctly received by the mobile phone, the content key secured by the symmetric key being an encrypted content key; decrypt the encrypted content key using the symmetric key; and decrypt the encrypted content using the content key. - View Dependent Claims (2, 3)
-
-
4. A method operational in a content provider for securely broadcasting content, the method comprising:
-
encrypting content using a content key to generate encrypted content; broadcasting the encrypted content to at least one client without receiving a request for the encrypted content from the client, wherein the encrypted content is broadcast to the client using spare broadcast capacity; receiving a request from the client to access the previously broadcast encrypted content, the request including a terminal identifier and a result of a cryptographic function having a symmetric key associated with the client and the entire encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the client; examining the request to verify that the client has correctly received the encrypted content; and forwarding a content key secured by the symmetric key from the content provider to the client in response to successful verification of the request. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A method operational in a mobile device, comprising:
-
receiving non-requested encrypted content from a content provider at the mobile device via a broadcast transmission, wherein the encrypted content is received from the content provider using spare broadcast capacity; sending a request to the content provider to access the previously received encrypted content, the request including a terminal identifier and a result of a cryptographic function having a symmetric key and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the mobile device; receiving a content key secured by the symmetric key from the content provider if the content provider successfully verifies based on the request that the encrypted content has been correctly received by the mobile device, the content key secured by the symmetric key being an encrypted content key; decrypting the encrypted content key using the symmetric key; and decrypting the encrypted content using the content key. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A mobile device, comprising:
-
means for receiving non-requested encrypted content from a content provider at the mobile device via a broadcast transmission, wherein the encrypted content is received from the content provider using spare broadcast capacity; means for sending a request to the content provider to access the previously received encrypted content, the request including a terminal identifier and a result of a cryptographic function having a symmetric key and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the mobile device; means for receiving a content key secured by the symmetric key from the content provider if the content provider successfully verifies based on the request that the encrypted content has been correctly received by the mobile device, the content key secured by the symmetric key being an encrypted content key; means for decrypting the encrypted content key using the symmetric key; and means for decrypting the encrypted content using the content key. - View Dependent Claims (19)
-
-
20. A computer processor readable medium comprising instructions operational in a mobile device, which when executed by one or more processors causes the processor to:
-
receive non-requested encrypted content from a content provider at the mobile device via a broadcast transmission, wherein the encrypted content is received from the content provider using spare broadcast capacity; send a request to the content provider to access the previously received encrypted content, the request including a terminal identifier and a result of a cryptographic function having a symmetric key and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the mobile device; receive a content key secured by the symmetric key from the content provider if the content provider successfully verifies based on the request that the encrypted content has been correctly received by the mobile device, the content key secured by the symmetric key being an encrypted content key; decrypt the encrypted content key using the symmetric key; and decrypt the encrypted content using the content key.
-
-
21. A content provider comprising:
-
a symmetric key associated with a client; a control logic configured to; encrypt content using a content key to generate encrypted content; broadcast the encrypted content to at least one client without a request being received from the client for the encrypted content, wherein the encrypted content is broadcast to the client using spare broadcast capacity; receive a request from the client to access the previously broadcast encrypted content, the request including a terminal identifier and a result of a cryptographic function having the symmetric key and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the client; examine the request to verify that the client has correctly received the encrypted content; and forward a content key secured by the symmetric key from the content provider to the client in response to successful verification of the request. - View Dependent Claims (22, 23)
-
-
24. A content provider, comprising:
-
means for encrypting content using a content key to generate encrypted content; means for broadcasting the encrypted content to at least one client without a request being received from the client for the encrypted content, wherein the encrypted content is broadcast to the client using spare broadcast capacity; means for receiving a request from the client to access the previously broadcast encrypted content, the request including a terminal identifier and a result of a cryptographic function having a symmetric key associated with the client and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the client; means for examining the request to verify that the client has correctly received the encrypted content; and means for forwarding a content key secured by the symmetric key from the content provider to the client in response to successful verification of the request. - View Dependent Claims (25, 26)
-
-
27. A computer processor readable medium comprising instructions operational in a content provider, which when executed by one or more processors causes the processor to:
-
encrypt content using a content key to generate encrypted content; broadcast the encrypted content to at least one client without a request being received from the client for the encrypted content, wherein the encrypted content is broadcast to the client using spare broadcast capacity; receive a request from the client to access the previously broadcast encrypted content, the request including a terminal identifier and a result of a cryptographic function having a symmetric key associated with the client and the encrypted content as inputs, the terminal identifier allowing the content provider to identify the symmetric key associated with the client; examine the request to verify that the client has correctly received the encrypted content; and forward a content key secured by the symmetric key from the content provider to the client in response to successful verification of the request.
-
Specification