System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
First Claim
Patent Images
1. A method, comprising:
- receiving a voucher at an apparatus from a further apparatus;
computing a cryptographic hashing function over at least part of the voucher;
decrypting an encrypted hash value stored in the voucher with a public key of the further apparatus; and
comparing the computed hash value with the stored hash value,wherein the voucher contains an encrypted content key, a usage state record, and a domain traversal flag, wherein the usage state record enforces play limits,wherein all apparatuses in an authorized domain have ability to decrypt the encrypted content key, andwherein said all apparatuses in the authorized domain are apparatuses of one or more of a user and a family.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user'"'"'s compliant devices, or all of a family'"'"'s devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
-
Citations
9 Claims
-
1. A method, comprising:
-
receiving a voucher at an apparatus from a further apparatus; computing a cryptographic hashing function over at least part of the voucher; decrypting an encrypted hash value stored in the voucher with a public key of the further apparatus; and comparing the computed hash value with the stored hash value, wherein the voucher contains an encrypted content key, a usage state record, and a domain traversal flag, wherein the usage state record enforces play limits, wherein all apparatuses in an authorized domain have ability to decrypt the encrypted content key, and wherein said all apparatuses in the authorized domain are apparatuses of one or more of a user and a family. - View Dependent Claims (2, 3)
-
-
4. A computer program product comprising computer executable program code recorded on a computer readable storage medium, the computer executable program code comprising:
-
code for causing receipt of a voucher at an apparatus from a further apparatus; code for causing computation of a cryptographic hashing function over at least part of the voucher; code for causing decryption of an encrypted hash value stored in the voucher with a public key of the further apparatus; and code for causing comparison of the computed hash value with the stored hash value, wherein the voucher contains an encrypted content key, a usage state record, and a domain traversal flag, wherein the usage state record enforces play limits, wherein all apparatuses in an authorized domain have ability to decrypt the encrypted content key, and wherein said all apparatuses in the authorized domain are apparatuses of one or more of a user and a family.
-
- 5. The computer program product of claim wherein the computer executable program code further comprises code for causing, if the computed hash value does not equal the stored hash value, indication that that the voucher has been tampered with.
-
7. An apparatus, comprising:
-
a processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the processor, cause the apparatus at least to perform; receive a voucher at the apparatus from a further apparatus; compute a cryptographic hashing function over at least part of the voucher; decrypt an encrypted hash value stored in the voucher with a public key of the further apparatus; and compare the computed hash value with the stored hash value wherein the voucher contains an encrypted content key, a usage state record, and a domain traversal flag, wherein the usage state record enforces play limits, wherein all apparatuses in an authorized domain have ability to decrypt the encrypted content key, and wherein said all apparatuses in the authorized domain are apparatuses of one or more of a user and a family. - View Dependent Claims (8, 9)
-
Specification