CA2590172A1 - Method and system for securing content in media systems - Google Patents

Method and system for securing content in media systems Download PDF

Info

Publication number
CA2590172A1
CA2590172A1 CA002590172A CA2590172A CA2590172A1 CA 2590172 A1 CA2590172 A1 CA 2590172A1 CA 002590172 A CA002590172 A CA 002590172A CA 2590172 A CA2590172 A CA 2590172A CA 2590172 A1 CA2590172 A1 CA 2590172A1
Authority
CA
Canada
Prior art keywords
key
content
encryption element
encryption
media content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002590172A
Other languages
French (fr)
Other versions
CA2590172C (en
Inventor
William Helms
John Carlucci
James William Fahrny
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NGNA LLC
Original Assignee
William Helms
John Carlucci
James William Fahrny
Ngna, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by William Helms, John Carlucci, James William Fahrny, Ngna, Llc filed Critical William Helms
Publication of CA2590172A1 publication Critical patent/CA2590172A1/en
Application granted granted Critical
Publication of CA2590172C publication Critical patent/CA2590172C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Abstract

A method and system for securing transfer, storage, and playback of media content. The method and system relate to securing transfer, storage, and playback of all types of media content, including television, music, electronic games, and other types of electronic data.

Claims (39)

1. A method of securing transfer, storage, and playback of media content stored on a first media access control point having a first security processor (SP) and a media content recorder (MCR), the first media access control point receiving media content from a content provider and delivering at least a portion of the received media content to the first SP, the first SP encrypting the media content for storage on the MCR and decrypting the stored media content for playback from the MCR, the method comprising:
encrypting the media content with a final content key, the final content key being determined by the first SP;
encrypting the final content key with a first SP public encryption key to create a first secured content key such that the final content key is recoverable by decrypting the first secured content key with a first SP private encryption key, the first SP public and first SP private encryption keys being associated with the first SP and stored thereon; and destroying the final content key such that the encrypted media content is undecryptable unless the first secured content key is decrypted with the first SP
private encryption key stored on the SP.
2. The method of claim 1 further comprising enhancing security of the final content key by creating the final content key based on a pre-content key and a metadata hash, the first SP creating the pre-content key from a random data generator, the SP hashing metadata associated with the media content to create the metadata hash.
3. The method of claim 2 further comprising creating the final content key by exclusive-ORing the pre-content key and the metadata hash.
4. The method of claim 2 wherein the random data generator comprises a random number generator.
5. The method of claim 2 wherein the random data generator comprises a random seed data generator.
6. The method of claim 1 further comprising associating the first secured content key with metadata associated with the media content to create a first security package having the first secured content key and the metadata.
7. The method of claim 6 further comprising enhancing security of the first security package by signing the first security package to create a first secured content group, wherein the first secured content group is associated with the first SP.
8. The method of claim 7 further comprising signing the first security package by hashing the first security package and encrypting the hashed first security package with a first SP private authentication key, wherein the first SP
private authentication key is associated with the first SP.
9. The method of claim 7 further comprising storing the first secured content group and the encrypted media content on the MCR.
10. The method of claim 9 further comprising receiving a request for playback of the encrypted media content stored on the MCR, locating the first secured content group associated with the requested media content, and providing the associated first secured content group to the first SP for decryption and recovery of the final content key for decrypting the requested media content.
11. The method of claim 10 further comprising authenticating the first secured content group prior to recovering the final content key with a first SP
public authentication key to ensure the metadata associated therewith is unaltered, wherein the first SP public authentication key is associated with the first SP
private authentication key.
12. The method of claim 11 further comprising recovering the final content key by decrypting the first secured content key included in the first security package with the first SP private encryption key.
13. The method of claim 10 further comprising decrypting the media content with the recovered final content key, the decrypted media content being sufficient for output to a media output device for viewing or playing.
14. The method of claim 9 further comprising receiving a request for playback of encrypted media content stored on the MCR, the request being made for a second media access control point located remotely from the first media access control point and in communication therewith through a network, the second media access control point including a second SP.
15. The method of claim 14 further comprising locating the first secured content group associated with the requested media content and providing the associated first secured content group to the first SP for decryption and recovery of the final content key for decrypting the requested media content.
16. The method of claim 15 further comprising encrypting the recovered final content key with a second SP public encryption key to create a second secured content key such that the final content key is recovered by decrypting the second secured content key with a second SP private encryption key, the second SP public and private encryption key being associated with the second SP.
17. The method of claim 16 further comprising associating the second secured content key with the metadata to create a second security package having the second secured content key and the metadata.
18. The method of claim 17 further comprising enhancing security of the second security package by signing the second security package to create a second secured content group, the second secured content group associated with the second SP.
19. The method of claim 18 further comprising signing the second security package by hashing the second security package and encrypting the hashed second security package with a second SP private authentication key, the second SP
private authentication key associated with the second SP.
20. The method of claim 19 further comprising transporting the second secured content package to the second SP.
21. The method of claim 20 further comprising decrypting the second secured content package with the second SP private encryption key to recover the final content key.
22. The method of claim 20 further comprising authenticating the second secured content group with a second SP public authentication key to ensure the metadata associated therewith is unaltered, wherein the second SP public authentication key is associated with the second SP private authentication key.
23. The method of claim 20 further comprising issuing an acknowledgment message from the second SP to the first SP to indicate successful recovery of the final content key and authentication of the second secured content group.
24. The method of claim 22 further comprising transporting the requested media content to the second SP for decryption with the final content key recovered by the second SP and output to a media output device.
25. A method for securing transfer, storage, and playback of media content provided to a subscriber of a media content provider, the method comprising:
receiving media content at a first security processor (SP);

encrypting the media content with a first encryption element determined from a random data generator of the first SP;
encrypting the first encryption element with a public encryption element of the first SP whereby the encrypted first encryption element is decrypted with a private encryption element of the first SP to recover the first encryption element; and destroying the first encryption element from the first SP such that the encrypted media content is decrypted by decrypting the encrypted first encryption element with the private encryption key of the first SP.
26. The method of claim 25 further comprising outputting the encrypted first encryption element and the encrypted media content to a media content recorder (MCR) for secure storage such that the stored media content is decrypted for playing on a media output device if the encrypted first encryption element stored therewith is decrypted.
27. The method of claim 26 further comprising outputting the stored media content and the encrypted first encryption element over a network such that a network element having the private encryption key of the first SP
decrypts the encrypted first encryption element with the private encryption key to recover the first encryption element and thereby decrypt the stored media content with the recovered first encryption element.
28. The method of claim 26 further comprising re-encrypting the first encryption element with a second public encryption element of a second SP
such that the re-encrypted first encryption element is decrypted with a private encryption element of the second SP to recover the first encryption element, and outputting the stored media content and the associated re-encrypted first encryption element over a network to the second SP.
29. The method of claim 28 wherein re-encrypting the first encryption element includes the first SP receiving the encrypted first encryption element, the first SP decrypting the encrypted first encryption element with the private encryption element to recover the first encryption element and the first SP
re-encrypting the recovered first encryption element with the second public encryption key of the second SP.
30. A security processor (SP) for securing transfer, storage, and playback of media content, the SP comprising:
a random data generator for creating a randomly generated first encryption element; and wherein the SP is configured to:
encrypt the media content with the randomly generated first encryption element;
encrypt the first encryption element with a public encryption key; and destroy the first encryption element such that decryption of the encrypted first encryption element is performed with a private encryption key in order to recover the first encryption element, and recovery of the first encryption element is from the encrypted first encryption element in order to decrypt the encrypted media content.
31. The SP of claim 30 further configured to present the encrypted first encryption element and encrypted media content to a media content recorder (MCR) for storage.
32. The SP of claim 31 further configured to decrypt the encrypted first encryption element with the private encryption key to recover the first encryption element.
33. The SP of claim 32 further configured to decrypt the encrypted media content with the recovered first encryption element and to output the decrypted media content to a media output device for playback.
34. The SP of claim 32 further comprising a secondary public encryption key for a secondary SP and further configured to decrypt the encrypted first encryption element with the private encryption key to recover the first encryption element and to re-encrypt the recovered first encryption element with the secondary public encryption key, wherein the re-encrypted first encryption element is presented by the SP to the secondary SP to secure transmission of the first encryption element from the SP to the secondary SP.
35. A system for securing transfer, storage, and playback of media content, the system comprising:
a first security processor (SP) configured to:
decrypt media content with a first encryption element;
encrypt the first encryption element;
destroy the first encryption element;
decrypt the encrypted first encryption element to recover the first encryption element; and decrypt the media content with the recovered first encryption element.
36. The system of claim 35 further comprising a media content recorder (MCR) in communication with the first SP for storing the encrypted media content and the encrypted first encryption element.
37. The system of claim 36 further comprising a first media output device in communication with the first SP, wherein the first SP is configured to receive the encrypted media content and encrypted first encryption element from the MCR, to decrypt the received first encryption element to recover the first encryption element, to decrypt the received media content with the recovered first encryption element, and to output the decrypted media content to the media output device for playback.
38. The system of claim 36 further comprising a second SP in communication with the first SP, wherein the first SP is configured to receive the encrypted media content and encrypted first encryption element from the MCR, to decrypt the received first encryption element to recover the first encryption element, to re-encrypt the recovered first encryption element with a public encryption element of the second SP, and to output the re-encrypted first encryption element to the second SP to secure transmission of the first encryption element from the first SP
to the second SP.
39. The system of claim 38 wherein the second SP is configured to decrypt the re-encrypted first encryption element to recover the first encryption element, to decrypt the received media content with the recovered first encryption element, and to output the decrypted media content to the media output device for playback.
CA2590172A 2004-12-08 2005-12-07 Method and system for securing content in media systems Active CA2590172C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/006,864 US8099369B2 (en) 2004-12-08 2004-12-08 Method and system for securing content in media systems
US11/006,864 2004-12-08
PCT/US2005/044078 WO2006062953A2 (en) 2004-12-08 2005-12-07 Method and system for securing content in media systems

Publications (2)

Publication Number Publication Date
CA2590172A1 true CA2590172A1 (en) 2006-06-15
CA2590172C CA2590172C (en) 2013-10-29

Family

ID=36575564

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2590172A Active CA2590172C (en) 2004-12-08 2005-12-07 Method and system for securing content in media systems

Country Status (4)

Country Link
US (1) US8099369B2 (en)
EP (1) EP1820292A4 (en)
CA (1) CA2590172C (en)
WO (1) WO2006062953A2 (en)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060031873A1 (en) * 2004-08-09 2006-02-09 Comcast Cable Holdings, Llc System and method for reduced hierarchy key management
US7383438B2 (en) * 2004-12-18 2008-06-03 Comcast Cable Holdings, Llc System and method for secure conditional access download and reconfiguration
US7933410B2 (en) * 2005-02-16 2011-04-26 Comcast Cable Holdings, Llc System and method for a variable key ladder
US20060200412A1 (en) * 2005-02-23 2006-09-07 Comcast Cable Holdings, Llc System and method for DRM regional and timezone key management
US7818350B2 (en) 2005-02-28 2010-10-19 Yahoo! Inc. System and method for creating a collaborative playlist
WO2006123265A1 (en) * 2005-05-19 2006-11-23 Koninklijke Philips Electronics N.V. Authorized domain policy method
US8997246B2 (en) * 2005-10-04 2015-03-31 Disney Enterprises, Inc. System and/or method for authentication and/or authorization via a network
US8306918B2 (en) 2005-10-11 2012-11-06 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US8396922B2 (en) * 2005-11-18 2013-03-12 Aol Inc. Promoting interoperability of presence-based systems through the use of ubiquitous online identities
US8224751B2 (en) 2006-05-03 2012-07-17 Apple Inc. Device-independent management of cryptographic information
KR100781936B1 (en) * 2006-06-20 2007-12-04 삼성전자주식회사 Apparatus and method for controling digital right object in portable terminal
US9178693B2 (en) * 2006-08-04 2015-11-03 The Directv Group, Inc. Distributed media-protection systems and methods to operate the same
US9225761B2 (en) * 2006-08-04 2015-12-29 The Directv Group, Inc. Distributed media-aggregation systems and methods to operate the same
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US8347098B2 (en) * 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US8868463B2 (en) * 2007-06-08 2014-10-21 At&T Intellectual Property I, L.P. System and method of managing digital rights
US7934083B2 (en) * 2007-09-14 2011-04-26 Kevin Norman Taylor Configurable access kernel
US8332885B2 (en) 2008-10-14 2012-12-11 Time Warner Cable Inc. System and method for content delivery with multiple embedded messages
US9245583B2 (en) * 2009-02-06 2016-01-26 International Business Machines Corporation Group control and messaging for digital video playback sessions
US8910198B2 (en) 2010-06-02 2014-12-09 Time Warner Cable Enterprises Llc Multicast video advertisement insertion using routing protocols
US20120060034A1 (en) * 2010-09-02 2012-03-08 General Instrument Corporation Digital information stream communication system and method
US8527472B2 (en) * 2011-03-29 2013-09-03 Kaseya International Limited Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9231930B1 (en) 2012-11-20 2016-01-05 Amazon Technologies, Inc. Virtual endpoints for request authentication
US9444800B1 (en) 2012-11-20 2016-09-13 Amazon Technologies, Inc. Virtual communication endpoint services
US10055491B2 (en) * 2012-12-04 2018-08-21 Sonos, Inc. Media content search based on metadata
US9071429B1 (en) * 2013-04-29 2015-06-30 Amazon Technologies, Inc. Revocable shredding of security credentials
US9537934B2 (en) * 2014-04-03 2017-01-03 Facebook, Inc. Systems and methods for interactive media content exchange
US9703827B2 (en) * 2014-07-17 2017-07-11 Illumina Consulting Group, Inc. Methods and apparatus for performing real-time analytics based on multiple types of streamed data
US9690792B2 (en) * 2014-08-26 2017-06-27 International Business Machines Corporation Access control for unprotected data storage system endpoints
US10613938B2 (en) * 2015-07-01 2020-04-07 Actifio, Inc. Data virtualization using copy data tokens
US10691659B2 (en) 2015-07-01 2020-06-23 Actifio, Inc. Integrating copy data tokens with source code repositories
US9917690B2 (en) * 2015-10-01 2018-03-13 Time Warner Cable Enterprises Llc Encryption management, content recording management, and playback management in a network environment
US11494761B2 (en) * 2015-11-06 2022-11-08 Cable Television Laboratories, Inc. Systems and methods for digital asset security ecosystems
US11941588B2 (en) 2015-11-06 2024-03-26 Cable Television Laboratories, Inc. Systems and methods for blockchain virtualization and scalability
US11330226B2 (en) * 2017-02-01 2022-05-10 Sony Corporation Information processing apparatus, information recording medium and information processing method
US20200013431A1 (en) * 2017-03-24 2020-01-09 Sony Corporation Information processing apparatus, information recording medium, information processing method, and program
WO2019006185A1 (en) * 2017-06-29 2019-01-03 Activevideo Networks, Inc. Systems and methods of orchestrated networked application services
US10715498B2 (en) * 2017-07-18 2020-07-14 Google Llc Methods, systems, and media for protecting and verifying video files
US11416203B2 (en) 2019-06-28 2022-08-16 Activevideo Networks, Inc. Orchestrated control for displaying media
CN116636224A (en) 2020-12-07 2023-08-22 活动视频网络有限公司 System and method for replacing networking application program service

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4712238A (en) 1984-06-08 1987-12-08 M/A-Com Government Systems, Inc. Selective-subscription descrambling
US4860353A (en) 1988-05-17 1989-08-22 General Instrument Corporation Dynamic feedback arrangement scrambling technique keystream generator
US5054067A (en) 1990-02-21 1991-10-01 General Instrument Corporation Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
US5758257A (en) * 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US6246767B1 (en) * 1995-04-03 2001-06-12 Scientific-Atlanta, Inc. Source authentication of download information in a conditional access system
US6424717B1 (en) 1995-04-03 2002-07-23 Scientific-Atlanta, Inc. Encryption devices for use in a conditional access system
US6252964B1 (en) 1995-04-03 2001-06-26 Scientific-Atlanta, Inc. Authorization of services in a conditional access system
US6157719A (en) 1995-04-03 2000-12-05 Scientific-Atlanta, Inc. Conditional access system
US5784095A (en) 1995-07-14 1998-07-21 General Instrument Corporation Digital audio system with video output program guide
US5671276A (en) 1995-07-21 1997-09-23 General Instrument Corporation Of Delaware Method and apparatus for impulse purchasing of packaged information services
US5982363A (en) 1997-10-24 1999-11-09 General Instrument Corporation Personal computer-based set-top converter for television services
US7095852B2 (en) 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6816968B1 (en) * 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
US6898285B1 (en) 2000-06-02 2005-05-24 General Instrument Corporation System to deliver encrypted access control information to support interoperability between digital information processing/control equipment
US6976163B1 (en) 2000-07-12 2005-12-13 International Business Machines Corporation Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein
US7069452B1 (en) 2000-07-12 2006-06-27 International Business Machines Corporation Methods, systems and computer program products for secure firmware updates
US6851055B1 (en) 2000-09-30 2005-02-01 Keen Personal Technologies, Inc. Digital video recorder for encrypting/decrypting video programs in segments to facilitate trick play features
US7577846B2 (en) 2000-10-04 2009-08-18 Nagravision Sa Mechanism of matching between a receiver and a security module
US20020118837A1 (en) * 2000-12-21 2002-08-29 Hamilton Jon W. Method and system for digital image authentication center
DE60143452D1 (en) 2000-12-22 2010-12-23 Irdeto Eindhoven B V SYSTEM WITH CONDITIONAL ACCESS
US20020101990A1 (en) 2001-02-01 2002-08-01 Harumi Morino Data receiving apparatus and data reproducing apparatus
US7046805B2 (en) 2001-03-20 2006-05-16 Digeo, Inc. System and method for efficiently storing and processing multimedia content
US7139398B2 (en) * 2001-06-06 2006-11-21 Sony Corporation Time division partial encryption
US7065213B2 (en) 2001-06-29 2006-06-20 Scientific-Atlanta, Inc. In a subscriber network receiving digital packets and transmitting digital packets below a predetermined maximum bit rate
BR0117132A (en) 2001-09-25 2004-10-13 Thomson Licensing Sa Ca system for broadcast dtv using multiple keys for different service providers and service areas
US6865555B2 (en) * 2001-11-21 2005-03-08 Digeo, Inc. System and method for providing conditional access to digital content
DE60213650T2 (en) 2001-12-10 2007-08-09 International Business Machines Corp. ACCESS TO ENCRYPTED ROUND END
US20030123667A1 (en) 2001-12-28 2003-07-03 Cable Television Laboratories, Inc. Method for encryption key generation
CN100479455C (en) 2002-04-05 2009-04-15 松下电器产业株式会社 Content using system
JP4447821B2 (en) 2002-04-15 2010-04-07 ソニー株式会社 Information processing apparatus and method
US6748080B2 (en) 2002-05-24 2004-06-08 Scientific-Atlanta, Inc. Apparatus for entitling remote client devices
US7634659B2 (en) 2002-09-20 2009-12-15 Cable Television Laboratories, Inc. Roaming hardware paired encryption key generation
US20040098591A1 (en) 2002-11-15 2004-05-20 Fahrny James W. Secure hardware device authentication method
US7305711B2 (en) * 2002-12-10 2007-12-04 Intel Corporation Public key media key block
US20040177369A1 (en) 2003-03-06 2004-09-09 Akins Glendon L. Conditional access personal video recorder
US7620179B2 (en) 2004-01-29 2009-11-17 Comcast Cable Holdings, Llc System and method for security processing media streams
US20060031873A1 (en) 2004-08-09 2006-02-09 Comcast Cable Holdings, Llc System and method for reduced hierarchy key management
US7383438B2 (en) 2004-12-18 2008-06-03 Comcast Cable Holdings, Llc System and method for secure conditional access download and reconfiguration
US7933410B2 (en) 2005-02-16 2011-04-26 Comcast Cable Holdings, Llc System and method for a variable key ladder
US20060200412A1 (en) 2005-02-23 2006-09-07 Comcast Cable Holdings, Llc System and method for DRM regional and timezone key management

Also Published As

Publication number Publication date
EP1820292A4 (en) 2013-12-25
US20060122946A1 (en) 2006-06-08
US8099369B2 (en) 2012-01-17
EP1820292A2 (en) 2007-08-22
WO2006062953A3 (en) 2007-08-23
WO2006062953A2 (en) 2006-06-15
CA2590172C (en) 2013-10-29

Similar Documents

Publication Publication Date Title
CA2590172A1 (en) Method and system for securing content in media systems
JP3929075B2 (en) Method and apparatus for operating a transaction server in an owned database environment
US7596692B2 (en) Cryptographic audit
KR101318461B1 (en) System and method for providing authorized access to digital content
EP1839405B1 (en) Network security system
US6549626B1 (en) Method and apparatus for encoding keys
US10417392B2 (en) Device-independent management of cryptographic information
JPH1195659A (en) Method of recovering ciphered session key and device therefor
JPH118620A (en) System and method for efficiently executing authentication of communication channel and facilitating detection of illegal forgery
US20030210791A1 (en) Key management
CA2714196A1 (en) Information distribution system and program for the same
CN101262332A (en) Method and system for mutual authentication between mobile and host devices
JP2005245010A5 (en)
KR20030001409A (en) System and process for storing securely secret information, apparatus and server to be used in such a system and method for distribution of a digital content
CN101394398B (en) Content protecting method and system oriented to terminal digital interface
US8479020B2 (en) Method and apparatus for providing an asymmetric encrypted cookie for product data storage
JP2000115154A5 (en) Data processing equipment and methods, and data decoding processing equipment and methods
CN1822165B (en) Secure pre-recorded digital medium and descrambling and providing method of encrypted content
WO2014196850A1 (en) Non-repudiable log entries for file retrieval with semi-trusted server
US10521564B2 (en) Operating a device for forwarding protected content to a client unit
JPH11346210A (en) Encryption method and device, decoding method and device, record medium recording encryption program, record medium recording decoding program, method for electronic signature and method for authenticating electronic signature
JP2002374240A5 (en)
KR100977498B1 (en) Method for Digital Rights Management
JP5110942B2 (en) Information protection system
JP2003078517A (en) Encrypting/decoding system, encrypting device, decoding device and key managing device

Legal Events

Date Code Title Description
EEER Examination request