Method and system for a recursive security protocol for digital copyright control
First Claim
Patent Images
1. A system, comprising:
- a target device, comprising;
a processor,first hardware comprising a one time programmable immutable target unit specific key, wherein the target unit specific key cannot be read by software executing on the target device, andsecond hardware configured to be written with an activation key, wherein the activation key is based on the target unit specific key, and wherein the target device is configured to;
receive a first bit stream,obtain a first decryption algorithm associated with the first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key,obtain the target unit specific key and the activation key, anddecrypt the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished utilizing the first decryption algorithm associated with the first bit stream, using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target unit specific key.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.
93 Citations
21 Claims
-
1. A system, comprising:
-
a target device, comprising; a processor, first hardware comprising a one time programmable immutable target unit specific key, wherein the target unit specific key cannot be read by software executing on the target device, and second hardware configured to be written with an activation key, wherein the activation key is based on the target unit specific key, and wherein the target device is configured to; receive a first bit stream, obtain a first decryption algorithm associated with the first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key, obtain the target unit specific key and the activation key, and decrypt the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished utilizing the first decryption algorithm associated with the first bit stream, using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target unit specific key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for digital security, comprising:
-
receiving a first bit stream at a target device; obtaining a first decryption algorithm associated with a first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key; obtaining a one time programmable immutable target unit specific key stored in first hardware on the target device, wherein the target unit specific key cannot be read by software executing on the target device; writing an activation key into second hardware, wherein the activation key is based on the target unit specific key; obtaining the target unit specific key and the activation key; and decrypting the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target unit specific key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium, comprising instructions for:
-
receiving a first bit stream at a target device; obtaining a first decryption algorithm associated with a first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key; obtaining a one time programmable immutable target unit specific key stored in first hardware on the target device, wherein the target unit specific key cannot be read by software executing on the target device; writing an activation key into second hardware, wherein the activation key is based on the target unit specific key; obtaining the target unit specific key and the activation key; and decrypting the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target device specific key. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification