×

System and method for delivering encrypted information in a communication network using location indentity and key tables

DC
  • US 8,472,627 B2
  • Filed: 11/20/2006
  • Issued: 06/25/2013
  • Est. Priority Date: 10/30/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for controlling access to content data, comprising:

  • a receiver device, anda distributor device comprising a memory, a cryptographic engine adapted to perform encryption and decryption functions, and a processor operatively coupled to the memory and the cryptographic engine, the processor of the distributor device being adapted to communicate with the receiver device via a communications network, wherein the processor of the distributor device is further adapted to;

    (a) enable the cryptographic engine of the distributor device to use a data encrypting/decrypting key to encrypt the content data;

    (b) enable the cryptographic engine of the distributor device to use a key encrypting/decrypting key to encrypt both the data encrypting/decrypting key and at least one content-owner constraint; and

    (c) send the encrypted content data, the encrypted data encrypting/decrypting key and the at least one encrypted content-owner constraint to the receiver device via the communications network;

    wherein the receiver device comprises a memory, a cryptographic engine adapted to perform encryption and decryption functions, and a processor operatively coupled to the memory and the cryptographic engine, the processor of the receiver device being adapted to communicate with the communications network, wherein the processor of the receiver device is further adapted to;

    (a) receive via the communications network the encrypted content data, the encrypted data encrypting/decrypting key and the at least one encrypted content-owner constraint;

    (b) enable the cryptographic engine of the receiver device to decrypt both the encrypted data encrypting/decrypting key and the at least one encrypted content-owner constraints;

    (c) decrypt the encrypted content data if the at least one content-owner constraint is satisfied, and(d) enable the cryptographic engine of the receiver device to use a second key encrypting/decrypting key to re-encrypt the data encrypting/decrypting key and to send the encrypted content data and the re-encrypted data encrypting/decrypting key to at least one other receiver device via the communications network, wherein the second key encrypting/decrypting key is different from the first key encrypting/decrypting key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×