×

Ensuring authenticity in a closed content distribution system

  • US 9,985,781 B2
  • Filed: 03/31/2017
  • Issued: 05/29/2018
  • Est. Priority Date: 02/07/2003
  • Status: Expired due to Term
First Claim
Patent Images

1. A method executed by a secure processor of a secure player, the secure player comprising secure memory secured against access outside the secure player and insecure memory, the method comprising:

  • receiving encrypted content comprising a plurality of data portions in an encrypted format;

    receiving a license having a first cryptographic key and a plurality of signatures, the first cryptographic key configured to facilitate first decryption of the encrypted content, and each of the plurality of signatures configured to verify validity of at least one of the plurality of data portions, the license;

    performing the first decryption of the encrypted content using the first cryptographic key;

    verifying the validity of the plurality of data portions using the plurality of signatures;

    generating, in response to verifying the validity, a second cryptographic key to facilitate re-encryption of the encrypted content, the second cryptographic key being independent of the first decryption key;

    storing the second cryptographic key in the secure memory;

    performing the re-encryption of the encrypted content using the second cryptographic key to obtain re-encrypted content;

    storing the re-encrypted content in the insecure memory.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×