최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0526290 (2000-03-15) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 380 인용 특허 : 32 |
A digital rights management (DRM) system operates on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device. The computing device has an identifier. A black box performs decryption and encryption functions in the DRM system. The black bo
A digital rights management (DRM) system operates on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device. The computing device has an identifier. A black box performs decryption and encryption functions in the DRM system. The black box includes a key file and an executable. The key file includes at least one black box public key and is expected to include the identifier of the computing device, the black box thus being tied to the computing device by inclusion of such first identifier. A digital license corresponding to the digital content is resident in the DRM system and includes a decryption key for decrypting the encrypted digital content. The decryption key is expected to be encrypted according to a black box public key of the key file of the black box, the license thus being tied to the black box and by extension the computing device. If the identifier of the computing device is in fact different than the identifier in the key file of the black box, a different key file is produced based on the black box public key(s) of the key file and the different identifier of the computing device.
1. A digital rights management (DRM) system operating on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device, the computing device having an identifier, the DRM system comprising a black box for performing decryption and encryption fu
1. A digital rights management (DRM) system operating on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device, the computing device having an identifier, the DRM system comprising a black box for performing decryption and encryption functions in the DRM system, the black box containing a copy of the identifier of the computing device, the black box thus being tied to the computing device. 2. The DRM system of claim 1 wherein the black box also contains at least one black box public key, the DRM system further comprising a digital license corresponding to the digital content, the license including a decryption key for decrypting the encrypted digital content, the decryption key being encrypted according to a black box public key of the black box, the license thus being tied to the black box and by extension the computing device. 3. The DRM system of claim 2 wherein the black box includes a key file and an executable, the key file containing the at least one black box public key. 4. The DRM system of claim 3 wherein the key file of the black box also includes the identifier of the computing device. 5. The DRM system of claim 1 wherein the black box includes a key file and an executable, the key file containing the identifier of the computing device. 6. In combination with the DRM system of claim 1, wherein the computing device is a first computing device, a method comprising:obtaining the identifier in the black box;obtaining the identifier of the first computing device;determining whether the identifier in the black box is the identifier of the first computing device; andprohibiting at least a portion of rendering of the digital content by the DRM system if the identifier in the black box is not the identifier of the first computing device,wherein use of the black box is restricted if such black box is duplicated on a second computing device having an identifier different than the identifier of the first computing device. 7. A method in connection with a digital rights management (DRM) system operating on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device, the computing device having an identifier, the DRM system comprising:a black box for performing decryption and encryption functions in the DRM system, the black box including a key file and an executable, the key file including at least one black box public key and being expected to include the identifier of the computing device, the black box thus being tied to the computing device by inclusion of such first identifier, anda digital license corresponding to the digital content, the license including a decryption key for decrypting the encrypted digital content, the decryption key being expected to be encrypted according to a black box public key of the key file of the black box, the license thus being tied to the black box and by extension the computing device,the method for re-tying the black box and the license to the computing device if the identifier of the computing device is in fact different than the identifier in the key file of the black box, the method comprising:receiving from the computing device the key file of the black box, and also the different identifier of the computing device;producing a different key file having the black box public key(s) of the received key file and the received different identifier of the computing device; andforwarding the different key file to the computing device and the DRM system thereof for appropriate installation thereon. 8. The method of claim 7 wherein producing the different key file comprises altering the received old key file to include the received different identifier of the computing device. 9. The method of claim 7 wherein producing the different key file comprises creating a new key file with the black box public key of the received old key file and the received different identifier of the computing device. 10. The method of claim 7 wherein the key file of the black box is a first key file, the method comprising producing a new black box for the digital rights management (DRM) system, the new black box including a new key file, the new key file having a new set of black box keys and a number of old sets of black box keys from the first key file, the request including the first key file having the old sets of black box keys, and also including the different identifier of the computing device, the method comprising:receiving the first key file, the different identifier of the computing device and the new set of black box keys;extracting the old sets of black box keys from the first key file; andproducing the new key file including the new set of black box keys, the old sets of black box keys, and the different identifier of the computing device as an output based on the extracted old sets of black box keys from the first key file, the received new set of black box keys, and the received different identifier of the computing device; andforwarding the produced new key file to the requesting DRM system. 11. The method of claim 10 wherein the first key file is a previously saved key file. 12. The method of claim 10 wherein the first key file is a current key file. 13. The method of claim 10 wherein the new black box further includes a new executable, the method comprising:receiving a master executable and randomized optimization parameters;producing the new executable based on the received master executable and the received randomized optimization parameters and based on a code optimization/randomization technique; andforwarding the produced new executable to the requesting DRM system. 14. The method of claim 13 wherein producing the new executable comprises producing the new executable with space reserved therein for additional information. 15. The method of claim 14 wherein producing the new executable comprises producing the new executable with space reserved therein for additional information to be injected by an injector. 16. The method of claim 14 wherein producing the new executable comprises injecting the received different identifier of the computing device into at least a portion of the reserved space. 17. The method of claim 13 wherein producing the new executable comprises injecting the received different identifier of the computing device thereinto. 18. The method of claim 13 wherein producing the new executable comprises producing the new executable based at least in part on the received different identifier of the computing device and based on a code optimization/randomization technique. 19. A method in connection with a digital rights management (DRM) system operating on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device, the computing device having an identifier, the DRM system comprising:a black box for performing decryption and encryption functions in the DRM system, the black box including a key file and an executable, the key file including at least one black box public key and being expected to include the identifier of the computing device, the black box thus being tied to the computing device by inclusion of such first identifier, anda digital license corresponding to the digital content, the license including a decryption key for decrypting the encrypted digital content, the decryption key being expected to be encrypted according to a black box public key of the key file of the black box, the license thus being tied to the black box and by extension the computing device,the method for re-tying the black box and the license to the computing device if the decryption key is in fact encrypted according to a black box public key different than any black box key in the key file of the black box, wherein the different black box public key is in a previously saved old key file, the method comprising:receiving from the computing dev ice the previously saved old key file having the different black box public key, and also the identifier of the computing device;producing a different key file having the different black box public key from the received old key file and the received identifier of the computing device; andforwarding the different key file to the computing device and the DRM system thereof for appropriate installation thereon. 20. The method of claim 19 wherein producing the different key file comprises altering the received old key file to include the received identifier of the computing device. 21. The method of claim 19 wherein producing the different key file comprises creating a new key file with the different black box public key of the received old key file and the received identifier of the computing device. 22. The method of claim 19 comprising producing a new black box for the digital rights management (DRM) system, the new black box including a new key file, the new key file having a new set of black box keys and a number of old sets of black box keys from the previously saved old key file, the request including the previously saved old key file having the old sets of black box keys, and also including the identifier of the computing device, the method comprising:receiving the previously saved old key file, the identifier of the computing device and the new set of black box keys;extracting the old sets of black box keys from the previously saved old key file; andproducing the new key file including the new set of black box keys, the old sets of black box keys, and the identifier of the computing device as an output based on the extracted old sets of black box keys from the previously saved key file, the received new set of black box keys, and the received identifier of the computing device; andforwarding the produced new key file to the requesting DRM system. 23. The method of claim 22 wherein the new black box further includes a new executable, the method comprising:receiving a master executable and randomized optimization parameters;producing the new executable based on the received master executable and the received randomized optimization parameters and based on a code optimization/randomization technique; andforwarding the produced new executable to the requesting DRM system. 24. The method of claim 23 wherein producing the new executable comprises producing the new executable with space reserved therein for additional information. 25. The method of claim 24 wherein producing the new executable comprises producing the new executable with space reserved therein for additional information to be injected by an injector. 26. The method of claim 24 wherein producing the new executable comprises injecting the received identifier of the computing device into at least a portion of the reserved space. 27. The method of claim 23 wherein producing the new executable comprises injecting the received identifier of the computing device thereinto. 28. The method of claim 23 wherein producing the new executable comprises producing the new executable based at least in part on the received identifier of the computing device and based on a code optimization/randomization technique. 29. A method in connection with a digital rights management (DRM) system operating on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device, the computing device having an identifier, the DRM system comprising:a black box for performing decryption and encryption functions in the DRM system, the black box including a key file and an executable, the key file including at least one black box public key and the identifier of the computing device, the black box thus being tied to the computing device by inclusion of such first identifier, anda digital license corresponding to the digital content, the license including a decryption key for decrypting the encrypted digital content, the decryption key being expected to be encrypted according to a black box public key of the key file of the black box, the license thus being tied to the black box and by extension the computing device,the method for re-tying the license to the black box and the computing device if the decryption key is in fact encrypted according to a black box public key different than any black box key in the key file of the black box, the method comprising:receiving from the computing device the license and a current black box key of the black box;producing a different license having the decryption key thereof encrypted according to the received current black box public key; andforwarding the different license to the computing device and the DRM system thereof for appropriate installation thereon. 30. The method of claim 29 wherein the different black box public key and a corresponding different black box private key are in a previously saved old key file, the method comprising:receiving from the computing device the previously saved old key file having the different black box public key and the different black box private key, and also the license and a current black box key of the black box;extracting the different black box private key from the received previously saved old key file;extracting from the received license the decryption key encrypted according to the different black box public key;applying the extracted different black box private key to the extracted decryption key encrypted according to the different black box public key to produce the decryption key;encrypting the produced decryption key according to the received current black box public key;producing the different license having the encrypted decryption key; andforwarding the different license to the computing device and the DRM system thereof for appropriate installation thereon. 31. The method of claim 29 comprising performing the receiving, producing, and forwarding steps by a license re-writing device external to the computing device. 32. The method of claim 29 comprising performing the receiving, producing, and forwarding steps by a license re-writing device internal to the computing device. 33. The method of claim 32 comprising performing the receiving, producing, and forwarding steps by the DRM system of the computing device.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.