×

SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT

  • US 20140258732A1
  • Filed: 05/20/2014
  • Published: 09/11/2014
  • Est. Priority Date: 03/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,obtaining encrypted data comprising multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies;

    deriving, based at least in part on a key selected from a plurality of accessible keys, a second key;

    using the derived second key to decrypt the portion; and

    provide the decrypted portion.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×