Mobile telephony content protection
First Claim
1. A content management method, comprising:
- receiving, from a mobile device, a combined hash associated with digital content;
determining a user identifier associated with the mobile device;
selecting a service provider key from among a plurality of service provider keys, the selection being made based on the user identifier, wherein the service provider key is the same for different user identifiers, and wherein the service provider key is unknown to a user of the mobile device;
generating a benchmark hash by hashing together at least the user identifier and the service provider key;
making a determination of whether the benchmark hash is the same as the combined hash;
if the determination is that the benchmark hash is the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is authorized to use the content; and
if the determination is that the benchmark hash is not the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is not authorized to use the content.
6 Assignments
0 Petitions
Accused Products
Abstract
In a digital content management system, a mobile device determines whether it is authorized to use digital content by sending, to a service provider, a hash value that has been pre-stored in the mobile device and that is associated with the digital content. The hash value is generated by combining a user identifier, among other data, into a combined hash. The other data included in the combined hash may be, for example, a service provider key unknown to the user, and a hash of the protected content. A telecommunications service provider, such as a service provider of a CDMA wireless network, determines whether the hash value is valid and, accordingly, whether the mobile device is authorized to use the digital content.
57 Citations
8 Claims
-
1. A content management method, comprising:
-
receiving, from a mobile device, a combined hash associated with digital content; determining a user identifier associated with the mobile device; selecting a service provider key from among a plurality of service provider keys, the selection being made based on the user identifier, wherein the service provider key is the same for different user identifiers, and wherein the service provider key is unknown to a user of the mobile device; generating a benchmark hash by hashing together at least the user identifier and the service provider key; making a determination of whether the benchmark hash is the same as the combined hash; if the determination is that the benchmark hash is the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is authorized to use the content; and if the determination is that the benchmark hash is not the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is not authorized to use the content. - View Dependent Claims (2, 3, 4)
-
-
5. A content management method, comprising:
-
receiving, from a mobile device, a combined hash associated with digital content; generating a content hash from the digital content; determining a user identifier associated with the mobile device; selecting a service provider key from among a plurality of service provider keys, the selection being made based on the user identifier, wherein the service provider key is the same for different user identifiers, and wherein the service provider key is unknown to a user of the mobile device; generating a benchmark hash by hashing together the user identifier, the service provider key, and the content hash; making a determination of whether the benchmark hash is the same as the combined hash; if the determination is that the benchmark hash is the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is authorized to use the content; and if the determination is that the benchmark hash is not the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is not authorized to use the content.
-
-
6. A content management method, comprising:
-
receiving, from a mobile device, a combined hash associated with digital content; determining a user identifier associated with the mobile device; selecting a service provider key from among a plurality of service provider keys, the selection being made based on the user identifier, wherein the service provider key is the same for different user identifiers, and wherein the service provider key is unknown to a user of the mobile device; generating a benchmark hash by hashing together the user identifier, the service provider key, and the digital content; making a determination of whether the benchmark hash is the same as the combined hash; if the determination is that the benchmark hash is the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is authorized to use the content; and if the determination is that the benchmark hash is not the same as the combined hash, then, directly in response to the determination, reporting to the mobile device that the user is not authorized to use the content.
-
-
7. A content management method, comprising:
-
a service provider delivering digital content to a mobile device having an associated user identifier, the service provider including a network interface; selecting a service provider key from among a plurality of service provider keys, the selection being made based on the user identifier, wherein the service provider key is the same for different user identifiers, and wherein the service provider is unknown to a user of the mobile device; the service provider generating a combined hash based upon the (i) the digital content, (ii) the user identifier, and (iii) the service provider key, and the service provider delivering the generated combined hash to the mobile device; the network interface subsequently receiving the combined hash from the mobile device as part of a request from the mobile device for authorization to use the digital content; the service provider making a determination of whether the received combined hash is valid by carrying out a process comprising (i) determining the user identifier associated with the mobile device, (ii) generating a benchmark hash based upon the digital content, the determined user identifier, and the service provider key, and (iii) determining whether the received combined hash is the same as the benchmark hash; if the determination is that the benchmark hash is the same as the combined hash, then, directly in response to the determination, the service provider reporting to the mobile device that the user is authorized to use the content; and if the determination is that the benchmark hash is not the same as the combined hash, then, directly in response to the determination, the service provider reporting to the mobile device that the user is not authorized to use the content.
-
-
8. A content management system, comprising:
-
a network interface; network connection logic; and service provider authentication logic, wherein the network interface executes logic stored in a non-transitory computer readable medium to deliver to a mobile device having an associated user identifier (i) digital content and (ii) a combined hash generated based on the digital content, the user identifier, and a service provider key, wherein the network interface further operates to receive from the mobile device, subsequent to the delivering, the combined hash as part of a request from the mobile device for authorization to use the digital content, wherein the network connection logic operates to determine the user identifier, and wherein the service provider authentication logic operates (i) to select the service provider key from among a plurality of service provider keys, the selection being made based on the user identifier, wherein the service provider key is the same for different user identifiers, and wherein the service provider key is unknown to a user of the mobile device, (ii) to generate a benchmark hash based upon the digital content, the determined user identifier, and the service provider key, (iii) to make a determination of whether the received combined hash is the same as the benchmark hash, (iv) if the determination is that the benchmark hash is the same as the combined hash, then, directly in response to the determination, to report to the mobile device via the network interface that the user is authorized to use the content, and (v) if the determination is that the benchmark hash is not the same as the combined hash, then, directly in response to the determination, to report to the mobile device via the network interface that the user is not authorized to use the content.
-
Specification