Source identification for unauthorized copies of content
First Claim
1. A computer-implemented method, comprising:
- under the control of one or more computer systems configured with executable instructions,obtaining encrypted data comprising multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies;
deriving, based at least in part on a key selected from a plurality of accessible keys, a second key, wherein deriving the second key includes determining output of a preimage-resistant function and wherein the second key is based at least in part on the output of the preimage-resistant function;
using the derived second key to decrypt the portion; and
providing the decrypted portion.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder'"'"'s ability to decrypt data depends on the key'"'"'s position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content.
212 Citations
21 Claims
-
1. A computer-implemented method, comprising:
under the control of one or more computer systems configured with executable instructions, obtaining encrypted data comprising multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies; deriving, based at least in part on a key selected from a plurality of accessible keys, a second key, wherein deriving the second key includes determining output of a preimage-resistant function and wherein the second key is based at least in part on the output of the preimage-resistant function; using the derived second key to decrypt the portion; and providing the decrypted portion. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. An information processing system, comprising:
-
one or more processors; and memory including instructions executable by the one or more processors to cause the information processing system to at least; obtain an encrypted data set that includes multiple copies of a portion of the data set that are decryptable using different keys; select, from a plurality of keys accessible to the information processing system, a key usable to decrypt a first copy of the multiple copies; generate, based at least in part on the selected key and using output of a preimage-resistant function, a generated key; decrypt, using the generated key, the first copy thereby resulting in a decrypted first copy; and provide the decrypted first copy. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium having stored thereon instructions executable by one or more processors of an information processing system to cause the information processing system to at least:
-
for encrypted data, select, from a plurality of keys accessible to the information processing system, a first key usable to decrypt a first copy of a subset of the data, the first copy being from multiple copies of the subset that are each decryptable using a different key; derive, based at least in part on the first key and using output of a preimage-resistant function, a derived key; decrypt, using the derived key, the first copy thereby resulting in a decrypted first copy; and provide the decrypted first copy. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification