SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT
First Claim
1. A computer-implemented method, comprising:
- under the control of one or more computer systems configured with executable instructions,obtaining encrypted data comprising multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies;
deriving, based at least in part on a key selected from a plurality of accessible keys, a second key;
using the derived second key to decrypt the portion; and
provide the decrypted portion.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder'"'"'s ability to decrypt data depends on the key'"'"'s position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content.
7 Citations
20 Claims
-
1. A computer-implemented method, comprising:
under the control of one or more computer systems configured with executable instructions, obtaining encrypted data comprising multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies; deriving, based at least in part on a key selected from a plurality of accessible keys, a second key; using the derived second key to decrypt the portion; and provide the decrypted portion. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. An information processing system, comprising:
-
one or more processors; and memory including instructions executable by the one or more processors to cause the information processing system to at least; obtain an encrypted data set that includes multiple copies of a portion of the data set that are decryptable using different keys; select, from a plurality of keys accessible to the information processing system, a key usable to decrypt a copy of the multiple copies; generate, based at least in part on the selected key, a different key; decrypt, using the generated different key, the copy; and provide the decrypted copy. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon instructions executable by one or more processors of an information processing system to cause the information processing system to at least:
-
for encrypted data, select, from a plurality of keys accessible to the information processing system, a key usable to decrypt a copy of a subset of the data, the copy being from multiple copies of the subset that are each decryptable using a different key; derive, based at least in part on the selected key, a different key; decrypt, using the derived different key, the copy; and provide the decrypted copy. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification