Method and apparatus for secure content delivery over broadband access networks
First Claim
1. In a system for delivery of a content title to a client system over a computer network, the system including a content server having at least one content title stored thereon in unexecutable form, a method for creating an activator for processing a content title into executable form, comprising:
- providing cryptographic data for decrypting content title data;
embedding the cryptographic data in obfuscated bytecode to inhibit unauthorized extraction of the cryptographic data, wherein the obfuscated bytecode implements executable instructions for decryption; and
storing the activator in the form of the obfuscated bytecode at a location on the computer network accessible by the client system.
6 Assignments
0 Petitions
Accused Products
Abstract
A system for secure delivery of on-demand content over broadband access networks utilizes a pair of servers of security mechanisms to prevent client processes from accessing and executing content without authorization. A plurality of encrypted titles are stored on a content server coupled to the network. An access server also coupled to the network contains the network addresses of the titles and various keying and authorization data necessary to decrypt and execute title. A client application executing on a user'"'"'s local computer system is required to retrieve the address, keying and authorization data from the access server before retrieving a title from the content server and enabling execution of the title on a user'"'"'s local computer system.
157 Citations
4 Claims
-
1. In a system for delivery of a content title to a client system over a computer network, the system including a content server having at least one content title stored thereon in unexecutable form, a method for creating an activator for processing a content title into executable form, comprising:
-
providing cryptographic data for decrypting content title data;
embedding the cryptographic data in obfuscated bytecode to inhibit unauthorized extraction of the cryptographic data, wherein the obfuscated bytecode implements executable instructions for decryption; and
storing the activator in the form of the obfuscated bytecode at a location on the computer network accessible by the client system. - View Dependent Claims (2, 3, 4)
-
Specification