×

Controlled sharing of media data that are retrievable over a public computer network

  • US 8,649,515 B1
  • Filed: 02/08/2010
  • Issued: 02/11/2014
  • Est. Priority Date: 02/08/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for controlled sharing of media data, the method comprising:

  • adding a digital signature to a media data;

    encrypting the media data into an encrypted media data using a session key, the media data to be shared by an owner of the media data with a first user and a second user;

    encrypting the session key into a first encrypted session key by using a public key of the first user;

    encrypting the session key into a second encrypted session key using a public key of the second user;

    providing the encrypted media data from an encrypted media storage to a first client computer employed by the first user and to a second client computer employed by the second user by way of a web page hosted by a media sharing platform;

    decrypting the first encrypted session key back into the session key using a first private key of the first user, the first public key and the first private key forming an asymmetric key pair;

    decrypting the encrypted media data using the session key in the first client computer employed by the first user to receive the encrypted media data and the first encrypted session key;

    rendering the media data in the first client computer;

    decrypting the second encrypted session key back into the session key using a second private key of the second user, the second public key and the second private key forming an asymmetric key pair;

    decrypting the encrypted media data using the session key in the second client computer employed by the second user to receive the encrypted media data and the second encrypted session key;

    rendering the media data in the second client computer;

    in response to an instruction from an owner of the media data to stop sharing the media data with the first user but not with the second user, preventing the first client computer from further receiving the first encrypted session key while continually allowing the second client computer to receive the second encrypted session key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×