Source identification for unauthorized copies of content
First Claim
1. A computer-implemented method for identifying sources of unauthorized copies of content, comprising:
- under the control of one or more computer systems configured with executable instructions,obtaining a copy of content comprising a plurality of records, each record having a decrypted portion of original content that comprises a plurality of original records where;
each of the plurality of records corresponds to an original record;
a subset of the original records consists of records that each has multiple copies of a portion of the original content that varies among the multiple copies; and
for each record having multiple copies of a corresponding portion of the original content, at least two of the copies are encrypted by different keys at least one of which is part of a key hierarchy used to distribute keys to content processing devices, the key hierarchy comprising a root key and a plurality of subordinate keys;
selecting, from the plurality of records, records that each correspond to a respective original record of the subset of the original records;
generating a key set by at least matching each selected record to a key used to decrypt a corresponding portion of original content to obtain the corresponding decrypted portion of the original content, the generated key set including a particular key that is a subordinate key of the key hierarchy;
matching the generated key set to a set of the content processing devices by at least identifying a set of devices having access to all of the keys in the generated key set, access to the particular key being based at least in part on access to a key between the particular key and the root key on a key path connecting the particular key to the root key; and
providing one or more electronic records that collectively identify at least a subset of the set of the content processing devices.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder'"'"'s ability to decrypt data depends on the key'"'"'s position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content.
-
Citations
24 Claims
-
1. A computer-implemented method for identifying sources of unauthorized copies of content, comprising:
under the control of one or more computer systems configured with executable instructions, obtaining a copy of content comprising a plurality of records, each record having a decrypted portion of original content that comprises a plurality of original records where; each of the plurality of records corresponds to an original record; a subset of the original records consists of records that each has multiple copies of a portion of the original content that varies among the multiple copies; and for each record having multiple copies of a corresponding portion of the original content, at least two of the copies are encrypted by different keys at least one of which is part of a key hierarchy used to distribute keys to content processing devices, the key hierarchy comprising a root key and a plurality of subordinate keys; selecting, from the plurality of records, records that each correspond to a respective original record of the subset of the original records; generating a key set by at least matching each selected record to a key used to decrypt a corresponding portion of original content to obtain the corresponding decrypted portion of the original content, the generated key set including a particular key that is a subordinate key of the key hierarchy; matching the generated key set to a set of the content processing devices by at least identifying a set of devices having access to all of the keys in the generated key set, access to the particular key being based at least in part on access to a key between the particular key and the root key on a key path connecting the particular key to the root key; and providing one or more electronic records that collectively identify at least a subset of the set of the content processing devices. - View Dependent Claims (2, 3, 4, 5)
-
6. A computer-implemented method for identifying a source of data, comprising:
under the control of one or more computer systems configured with executable instructions, identifying, based at least in part on the data, a key set comprising one or more keys used to decrypt original data to obtain the data, the identified key set comprising one or more keys from a multi-level key hierarchy, the multi-level key hierarchy comprising a root key and a plurality of subordinate keys and the identified key set including a particular key that is a subordinate key of the key hierarchy; identifying, based at least in part on the identified key set, one or more devices that are different from other devices at least as a result of having access to the particular key by having access to a key between the particular key and the root key on a key path connecting the particular key to the root key; and providing information identifying the identified one or more devices. - View Dependent Claims (7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18)
-
12. A system, comprising:
-
one or more processors; and memory including instructions that, when executed by the one or more processors, cause the system to; identify, based at least in part on data, a key set comprising one or more keys used to decrypt original data to obtain the data, the identified key set comprising one or more keys from a multi-level key hierarchy, the multi-level key hierarchy comprising a root key and a plurality of subordinate keys and the identified key set including a particular key that is a subordinate key of the key hierarchy; identify, based at least in part on the identified key set, one or more devices that are different from other devices at least as a result of having access to the particular key by having access to a key between the particular key and the root key on a key path connecting the particular key to the root key; and provide information identifying the identified one or more devices.
-
-
19. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed by one or more processors of a computer system, cause the computer system to:
-
identify, based at least in part on data, a key set comprising one or more keys used to decrypt original data to obtain the data, the identified key set comprising one or more keys from a multi-level key hierarchy, the multi-level key hierarchy comprising a root key and a plurality of subordinate keys and the identified key set including a particular key that is a subordinate key of the key hierarchy; identify, based at least in part on the identified key set, one or more devices that are different from other devices at least as a result of having access to the particular key by having access to a key between the particular key and the root key on a key path connecting the particular key to the root key; and provide information identifying the identified one or more devices. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification