Secure transfer and tracking of data using removable non-volatile memory devices
First Claim
1. A computer-implemented method of transferring content, performed on a source device having one or more processors and memory storing one or more programs which when executed by the one or more processors cause performance of the method, the method comprising:
- receiving from a target device, a target device signature;
accessing a content file having encrypted content and a source-specific header allowing only a device having a source device signature access to the encrypted content, wherein the source device comprises a device having non-volatile semiconductor memory storing one or more content files, wherein the source device signature is a serial number of the source device, is a value that is predefined function of the serial number of the source device, or is a set of alpha-numeric characters that identify the source device;
decrypting the encrypted content using a content key;
removing source-specific information from the content;
adding target-specific information to the content, wherein the source-specific information is one or more of a source watermark and source stenographic information, and wherein the target-specific information is one or more of a target watermark and target stenographic information;
creating a new content key;
encrypting the decrypted content with the new content key to create re-encrypted content;
creating for the content file a target-specific header allowing only a device having the target device signature access to the content;
encrypting the target-specific header;
thentransferring to the target device, the content file with the re-encrypted content, the new content key and the encrypted target-specific header.
1 Assignment
0 Petitions
Accused Products
Abstract
A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.
60 Citations
28 Claims
-
1. A computer-implemented method of transferring content, performed on a source device having one or more processors and memory storing one or more programs which when executed by the one or more processors cause performance of the method, the method comprising:
-
receiving from a target device, a target device signature; accessing a content file having encrypted content and a source-specific header allowing only a device having a source device signature access to the encrypted content, wherein the source device comprises a device having non-volatile semiconductor memory storing one or more content files, wherein the source device signature is a serial number of the source device, is a value that is predefined function of the serial number of the source device, or is a set of alpha-numeric characters that identify the source device; decrypting the encrypted content using a content key; removing source-specific information from the content; adding target-specific information to the content, wherein the source-specific information is one or more of a source watermark and source stenographic information, and wherein the target-specific information is one or more of a target watermark and target stenographic information; creating a new content key; encrypting the decrypted content with the new content key to create re-encrypted content; creating for the content file a target-specific header allowing only a device having the target device signature access to the content; encrypting the target-specific header;
thentransferring to the target device, the content file with the re-encrypted content, the new content key and the encrypted target-specific header. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method of transferring content, performed on a target device having one or more processors and memory storing one or more programs which when executed by the one or more processors cause performance of the method, the method comprising:
-
receiving a source public key from the source device; transferring a target public key to the source device; transferring to a source device a target device signature, wherein the target device signature is a serial number of the target device, is a value that is predefined function of the serial number of the target device, or is a set of alpha-numeric characters that identify the target device; receiving, from the source device, an encrypted target-specific header allowing only a device having the target device signature access to a content file having encrypted content, wherein the target device comprises a device having non-volatile semiconductor memory storing one or more content files; wherein the target device signature, is encrypted with the source public key; wherein the received target-specific header is encrypted with the target public key; and wherein the target-specific header is decrypted with a target private key; decrypting the target-specific header; and receiving, from the source device, the content file, the content file including the encrypted content of the content file, wherein the received content file includes the source-specific header, and the storing includes replacing the source-specific header of the content file with the target-specific header, wherein the source-specific information is one or more of a source watermark and source stenographic information, and wherein the target-specific information is one or more of a target watermark and target stenographic information; and storing the received content file and the target-specific header so that the content file is accessible to the target device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system, comprising:
-
one or more processors for executing programs; memory storing one or more programs to be executed by the one or more processors; the one or more programs comprising instructions for; receiving from a target device, a target device signature; accessing a content file having encrypted content and a source-specific header allowing only a device having a source device signature access to the encrypted content, wherein the source device comprises a device having non-volatile semiconductor memory storing one or more content files, wherein the source device signature is a serial number of the source device, is a value that is predefined function of the serial number of the source device, or is a set of alpha-numeric characters that identify the source device; decrypting the encrypted content using a content key; removing source-specific information from the content; adding target-specific information to the content, wherein the source-specific information is one or more of a source watermark and source stenographic information, and wherein the target-specific information is one or more of a target watermark and target stenographic information; creating a new content key; encrypting the decrypted content with the new content key to create re-encrypted content; creating for the content file a target-specific header allowing only a device having the target device signature access to the content; encrypting the target-specific header;
thentransferring to the target device, the content file with the re-encrypted content, the new content key and the encrypted target-specific header. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions that when executed by one or more processors of a device cause performance of a method comprising:
-
receiving from a target device, a target device signature; accessing a content file having encrypted content and a source-specific header allowing only a device having a source device signature access to the encrypted content, wherein the source device comprises a device having non-volatile semiconductor memory storing one or more content files, wherein the source device signature is a serial number of the source device, is a value that is a predefined function of the serial number of the source device, or is a set of alpha-numeric characters that identify the source device; decrypting the encrypted content using a content key; removing source-specific information from the content; adding target-specific information to the content, wherein the source-specific information is one or more of a source watermark and source stenographic information, and wherein the target-specific information is one or more of a target watermark and target stenographic information; creating a new content key; encrypting the decrypted content with the new content key to create re-encrypted content; creating for the content file a target-specific header allowing only a device having the target device signature access to the content; encrypting the target-specific header;
thentransferring to the target device, the content file with the re-encrypted content, the new content key and the encrypted target-specific header. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions that when executed by one or more processors of a device cause performance of a method comprising:
-
transferring to a source device a target device signature, wherein the target device signature is a serial number of the target device, is a value that is a predefined function of the serial number of the target device, or is a set of alpha-numeric characters that identify the target device; receiving, from the source device, an encrypted target-specific header allowing only a device having the target device signature access to a content file having encrypted content, wherein the target device comprises a device having non-volatile semiconductor memory storing one or more content files; wherein the target device signature, is encrypted with the source public key; wherein the received target-specific header is encrypted with the target public key; and wherein the target-specific header is decrypted with a target private key; decrypting the target-specific header; and receiving, from the source device, the content file, the content file including the encrypted content of the content file, wherein the received content file includes the source-specific header, and the storing includes replacing the source-specific header of the content file with the target-specific header, wherein the source-specific information is one or more of a source watermark and source stenographic information, and wherein the target-specific information is one or more of a target watermark and target stenographic information; and storing the received content file and the target-specific header so that the content file is accessible to the target device.
-
Specification