×

Source identification for unauthorized copies of content

  • US 9,305,177 B2
  • Filed: 05/20/2014
  • Issued: 04/05/2016
  • Est. Priority Date: 03/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,obtaining encrypted data comprising multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies;

    deriving, based at least in part on a key selected from a plurality of accessible keys, a second key, wherein deriving the second key includes determining output of a preimage-resistant function and wherein the second key is based at least in part on the output of the preimage-resistant function;

    using the derived second key to decrypt the portion; and

    providing the decrypted portion.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×