×

Source identification for unauthorized copies of content

  • US 9,872,067 B2
  • Filed: 03/07/2016
  • Issued: 01/16/2018
  • Est. Priority Date: 03/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining license information that specifies a set of key derivation parameters;

    obtaining encrypted data that comprise multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies;

    using a one-way function to derive, based at least in part on the set of key derivation parameters and a first key, a second key to result in a derived second key, the set of key derivation parameters comprises multiple key derivation parameters and specifies an order in which to use the multiple key derivation parameters to obtain the derived second key;

    using the derived second key to decrypt the portion to result in a decrypted portion; and

    providing the decrypted portion.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×