최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0993597 (1997-12-18) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 541 인용 특허 : 3 |
Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided. Once validated, the trusted player uses the privat
Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided. Once validated, the trusted player uses the private key to decrypt encrypted digital content. The private key is dynamically generated, associated with specific digital content, and communicated in real-time from a server to the trusted player in a secure manner, thereby controlling access to encrypted digital content. The key is wrapped into an executable tamper resistant key module in which the key can only be used by the right trusted player as determined by the server based on user requests and payment. The key module plugs in to the trusted player and executes to validate the player and decrypt the content. The integrity of the trusted player is correlated to its ability to perform a cryptographic operation using an asymmetric key pair in a manner that is tamper resistant, thereby preventing an unencrypted copy of digital content to be made.
[ What is claimed is:] [31.] A system for secure distribution of data comprising:a first system comprising a first processor for executing a first set of programming instructions, and a first storage medium having stored thereon the first set of programming instructions for execution by the first pr
[ What is claimed is:] [31.] A system for secure distribution of data comprising:a first system comprising a first processor for executing a first set of programming instructions, and a first storage medium having stored thereon the first set of programming instructions for execution by the first processor, the first set of programming instructions generating an asymmetric key pair having a public key and a private key, encrypting predetermined data with the generated public key, and building an executable tamper resistant key module, the executable tamper resistant key module including the generated private key and the encrypted predetermined data; anda second system comprising a second processor for executing a second set of programming instructions, and a second storage medium having stored thereon the second set of programming instructions for execution by the second processor, the second set of programming instructions for operating as a trusted player of digital content, for receiving the executable tamper resistant key module from the first system, for executing the executable tamper resistant key module to check the integrity and authenticity of the trusted player, and the integrity of the tamper resistant key module; and for decrypting the encrypted predetermined data with the generated private key when the trusted player is authentic and the trusted player's integrity is validated and the tamper resistant key module is validated.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.