Systems and methods for controlling media distribution
First Claim
Patent Images
1. A method, comprising:
- receiving, by an application executed on a first mobile device, a selection of a media file, wherein the media file is a picture or video, wherein the first mobile device is associated with an owner of the media file;
receiving, by the application, an intended recipient of the selected media file;
encrypting, by the application, the media file using a media file encryption key to produce an encrypted media file;
encrypting, by the application, the media file encryption key using a public key of the intended recipient;
attaching the encrypted media file encryption key to the encrypted media file; and
transmitting, by the application, the encrypted media file and attached encrypted media file encryption key to the intended recipient;
receiving, by a second application on a second mobile device associated with the intended recipient, the encrypted media file;
decrypting, by the second application, the encrypted media file key using a private key of the intended recipient to produce the media file encryption key;
determining, by the second application, whether the received encrypted media file includes distribution restrictions indicating whether the encrypted media file can be redistributed by the recipient,wherein when the distribution restrictions indicate that the encrypted media file can be redistributed, the method further comprisesreceiving, by the second application, a further intended recipient of the decrypted media file;
encrypting, by the second application, the media file encryption key using a public key of the further intended recipient;
attaching the media file encryption key encrypted using the public key of the further intended recipient to the encrypted media file; and
transmitting, by second application, the encrypted media file with the attached media file encryption key encrypted using the public key of the further intended recipient to the further intended recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
Media file distribution is be controlled by encrypting the media file by an application executed on a mobile device of the media file owner. The media file is encrypted using a media file encryption key. The media file encryption key is then separately encrypted using a public key of each intended recipient, and the encrypted media file encryption key is appended to the encrypted media file. Accordingly, only intended recipients will have the complementary private key to allow decryption of the encrypted media file encryption key, which once decrypted can be used to decrypt the encrypted media file itself.
26 Citations
18 Claims
-
1. A method, comprising:
-
receiving, by an application executed on a first mobile device, a selection of a media file, wherein the media file is a picture or video, wherein the first mobile device is associated with an owner of the media file; receiving, by the application, an intended recipient of the selected media file; encrypting, by the application, the media file using a media file encryption key to produce an encrypted media file; encrypting, by the application, the media file encryption key using a public key of the intended recipient; attaching the encrypted media file encryption key to the encrypted media file; and transmitting, by the application, the encrypted media file and attached encrypted media file encryption key to the intended recipient; receiving, by a second application on a second mobile device associated with the intended recipient, the encrypted media file; decrypting, by the second application, the encrypted media file key using a private key of the intended recipient to produce the media file encryption key; determining, by the second application, whether the received encrypted media file includes distribution restrictions indicating whether the encrypted media file can be redistributed by the recipient, wherein when the distribution restrictions indicate that the encrypted media file can be redistributed, the method further comprises receiving, by the second application, a further intended recipient of the decrypted media file; encrypting, by the second application, the media file encryption key using a public key of the further intended recipient; attaching the media file encryption key encrypted using the public key of the further intended recipient to the encrypted media file; and transmitting, by second application, the encrypted media file with the attached media file encryption key encrypted using the public key of the further intended recipient to the further intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
receiving, by an application executed on a first mobile device, a selection of a media file, wherein the media file is a picture or video, wherein the first mobile device is associated with an owner of the media file; receiving, by the application, an intended recipient of the selected media file; encrypting, by the application, the media file using a media file encryption key to produce an encrypted media file; encrypting, by the application, the media file encryption key using a public key of the intended recipient; attaching the encrypted media file encryption key to the encrypted media file; transmitting, by the application, the encrypted media file and attached encrypted media file encryption key to the intended recipient; receiving, by a second application on a second mobile device associated with the intended recipient, the encrypted media file; decrypting, by the second application, the encrypted media file key using a private key of the intended recipient to produce the media file encryption key; decrypting, by the second application, the encrypted media file using the media file encryption key; and reproducing, by the second application, the decrypted media file on a screen of the second mobile device; receiving, by the application executed on the first mobile device, distribution restrictions for the selected media file; and adding, by the application executed on the first mobile device, the distribution restrictions to the encrypted media file, wherein the distribution restrictions indicate whether the encrypted media file can be redistributed by the recipient, wherein when the distribution restrictions indicate that the encrypted media file can be redistributed, the method further comprises receiving, by the second application, a further intended recipient of the decrypted media file; encrypting, by the second application, the media file encryption key using a public key of the further intended recipient; attaching the media file encryption key encrypted using the public key of the further intended recipient to the encrypted media file; and transmitting, by second application, the encrypted media file with the attached media file encryption key encrypted using the public key of the further intended recipient to the further intended recipient. - View Dependent Claims (14, 15)
-
-
16. A method, comprising:
-
receiving, by a second application executed on a second mobile device from a first application executed on a first mobile device, an encrypted media file, wherein the first mobile device is associated with an owner of the media file, the second mobile device is associated with an intended recipient of the encrypted media file, the media file is encrypted using a media file encryption key, the media file encryption key is encrypted using a public key of intended recipient, and the encrypted media file encryption key is attached to the received encrypted media file; decrypting, by the second application, the encrypted media file key using a private key of the intended recipient to produce the media file encryption key; determining, by the second application, whether the received encrypted media file includes distribution restrictions indicating whether the encrypted media file can be redistributed by the recipient, wherein when the distribution restrictions indicate that the encrypted media file can be redistributed, the method further comprises receiving, by the second application, a further intended recipient of the decrypted media file; encrypting, by the second application, the media file encryption key using a public key of the further intended recipient; attaching the media file encryption key encrypted using the public key of the further intended recipient to the encrypted media file; and transmitting, by second application, the encrypted media file with the attached media file encryption key encrypted using the public key of the further intended recipient to the further intended recipient. - View Dependent Claims (17, 18)
-
Specification