METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL
First Claim
Patent Images
1. A system, comprising:
- a target device, comprising;
a processor, andhardware comprising a target unit specific key, wherein the target unit specific key cannot be read by software executing on the target device, andwherein the target is configured to;
receive a first bit stream,obtain a first decryption algorithm associated with the first bit stream,obtain the target unit specific key, anddecrypt the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is done utilizing the first decryption algorithm associated with the first bit stream and the target unit specific key.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.
14 Citations
21 Claims
-
1. A system, comprising:
a target device, comprising; a processor, and hardware comprising a target unit specific key, wherein the target unit specific key cannot be read by software executing on the target device, and wherein the target is configured to; receive a first bit stream, obtain a first decryption algorithm associated with the first bit stream, obtain the target unit specific key, and decrypt the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is done utilizing the first decryption algorithm associated with the first bit stream and the target unit specific key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method for digital security, comprising:
-
receiving a first bit stream at a target device; obtaining a first decryption algorithm associated with a first bit stream; obtaining a target unit specific key stored in hardware on the target device, wherein the target unit specific key cannot be read by software executing on the target device; and decrypting the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is done utilizing the first decryption algorithm associated with the first bit stream and the target unit specific key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium, comprising instructions for:
-
receiving a first bit stream at a target device; obtaining a first decryption algorithm associated with a first bit stream; obtaining a target unit specific key stored in hardware on the target device, wherein the target unit specific key cannot be read by software executing on the target device; and decrypting the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is done utilizing the first decryption algorithm associated with the first bit stream and the target unit specific key. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification