A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurali
A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining whether step, to be prevented from having access is comprised in at least one group of the authorized set.
대표청구항▼
What is claimed is: 1. A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices, each of the plurality of authorized
What is claimed is: 1. A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices, each of the plurality of authorized devices belonging to a plurality of groups and each of the devices being supplied with a plurality of group keys, each of said group keys supplied to a given one of the plurality of authorized devices corresponding to one of the plurality of groups to which the authorized device belongs, at least most of the plurality of authorized devices having a plurality of group keys which is at least partially different from the plurality of group keys of the remaining one of the plurality of authorized devices; and thereafter, when at least one of said plurality of authorized devices is to be denied access to said protected content, sending protected content to said plurality of authorized devices which content is encrypted in a manner such that all group keys supplied to said at least one of said plurality of authorized devices to be denied access to said protected content are unable to enable access to said protected content. 2. A method according to claim 1 and also comprising: utilizing at least some of the group keys for communication of a content decryption key to at least one of the plurality of authorized devices. 3. A method according to claim 2 and wherein the utilizing step comprises, for each of the plurality of authorized devices: obtaining the content decryption key, wherein the obtaining comprises performing no more than a predetermined number of decryptions. 4. A method according to claim 2 and wherein the utilizing step comprises, for each of the plurality of authorized devices: obtaining the content decryption key, wherein the obtaining comprises performing exactly one decryption. 5. A method according to claim 2 and also comprising: at each authorized device having access to the protected content, performing no more than a predetermined number of decryption operations, said predetermined number being the same for all authorized devices, to obtain the content decryption key from an encrypted form thereof, said encrypted form being encrypted with a group key corresponding to a group of which said authorized device is a member. 6. A method according to claim 5 and wherein said predetermined number does not depend on the number of authorized devices. 7. A method according to claim 5 and wherein said predetermined number is equal to 1. 8. A method according to claim 2 and also comprising the step of: at at least one of the authorized devices, using the group key of the set of keys corresponding to the group of which the authorized device is a member. 9. A method according to claim 2 and wherein each group key of the set of keys is assigned an initial value, and said initial value can not be changed. 10. A method according to claim 2 and also comprising: generating each of said group keys as a plurality of independently generated sets of group keys, wherein no group key of any one independently generated set is based, even in part, on any key of any other independently generated set. 11. A method according to claim 2 and also comprising: generating each of said group keys as a plurality of independently generated sets of group keys, wherein each group key is based, at least in part, pseudo-randomly on a source key. 12. A method according to claim 2 and also comprising: dividing the plurality of groups into a hierarchical set of groups, said hierarchical set of groups comprising a plurality of groups comprising at least a first group and a second group, each of said first group and said second group being associated with first and second group key generation information respectively; and generating a least one group key in each of said first group and said second group using said associated group key generation information, wherein said second group key generation information can be derived from said first group key generation information. 13. A method according to claim 12 and wherein said second group is a subgroup of said first group. 14. A method according to claim 12 and wherein said first group key generation information can not be derived from said second group key generation information. 15. A method according to claim 12 and wherein at least one of said first group key generation information and said second group key generation information is embedded in at least one removable security device. 16. A method according to claim 15 and wherein said at least one removable security device comprises, for at least one of said first group and said second group, a plurality of removable security devices. 17. A method according to claim 16 and wherein at least a predetermined portion of said plurality of removable security devices is required for determining the associated group key generation information. 18. A method according to claim 1 and wherein the authorized set comprises a plurality of maximal groups from the set of remaining groups, such that each maximal group is not a subset of any one of the set of remaining groups. 19. A method according to claim 1 wherein the determining whether step comprises receiving an identification of the at least one device. 20. A method according to claim 1 and wherein each two devices of the plurality of authorized devices have at least one group key in common. 21. A method according to claim 1 and wherein at least some of the authorized devices are not in communication with a central authorization facility after an initial manufacturing period. 22. A method for preventing a plurality of devices, chosen from among a plurality of authorized devices, from having access to protected content, the method comprising: distributing a protected content access key independently encrypted with each group key of a set of group keys, wherein none of a plurality of devices to be prevented from having access to protected content are members of any group associated with any of the set of group keys; and thereafter, when at least one of said plurality of authorized devices is to be denied access to said protected content, sending protected content to said plurality of authorized devices which content is encrypted in a manner such that all group keys supplied to said at least one of said plurality of authorized devices to be denied access to said protected content are unable to enable access to said protected content. 23. A method according to claim 22 and wherein each group key of the set of group keys has an initial value, and the, initial value can not be changed. 24. A method according to claim 22 and also comprising: at each authorized device having access to the protected content; performing no more than a predetermined number of decryption operations, said predetermined number being the same for all authorized devices, to obtain the protected content access key from an encrypted form thereof, said encrypted form being encrypted with a group key corresponding to a group of which said authorized device is a member. 25. A method according to claim 24 and wherein said predetermined number does not depend on the number of authorized devices. 26. A method according to claim 25 and wherein said predetermined number is equal to 1. 27. A method according to claim 22 and also comprising: generating each of said group keys as a plurality of independently generated sets of group keys, wherein no group key of any one independently generated set is based, even in part, on any key of any other independently generated set. 28. A method according to claim 22 and also comprising: generating each of said group keys as a plurality of independently generated sets of group keys, wherein each group key is based, at least in part, pseudo-randomly on a source key. 29. A method according to claim 22 and also comprising: dividing the plurality of groups into a hierarchical set of groups, said hierarchical set of groups comprising a plurality of groups comprising at least a first group and a second group, each of said first group and said second group being associated with first and second group key generation information respectively; and generating a least one group key in each of said first group and said second group using said associated group key generation information, wherein said second group key generation information can be derived from said first group key generation information. 30. A system for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the system comprising: key assignment apparatus operative to supply group keys to a plurality of authorized devices, each of the plurality of authorized devices belonging to a plurality of groups and each of the devices being supplied with a plurality of group keys, each of the group keys supplied to a given one of the plurality of groups to which the authorized device belongs, at least most of the plurality of authorized devices having a plurality of group keys which is partially different from the plurality of group keys of the remaining one of the plurality of authorized devices; and a content distributor operative to send protected content to said plurality of authorized devices which content is encrypted in a manner such that all group keys supplied to said at least one of said plurality of authorized devices to be denied access to said protected content are unable to enable access to said protected content when at least one of said plurality of authorized devices is to be denied access to said protected content. 31. A system according to claim 30 and also comprising: utilization apparatus operative to utilize at least some of the group keys for communication of a content decryption key to at least one of the plurality of authorized devices. 32. A method for black box analysis of a device capable of accessing protected content, the method comprising: providing a device to be analyzed; inputting to the device a data item comprising encrypted protected content and a plurality of encrypted versions of a content key for accessing the protected content, each of the plurality of encrypted versions being encrypted in accordance with a different one of a plurality of group keys; receiving, from the device, decrypted content representing a decryption of the protected content; determining whether the received content is one of the following: erroneous; and null, and producing a result; identifying a set of group keys comprising at least one group key which is known to the device based, at least in part, on the result, wherein the data item also comprises at least one invalid content key encrypted in accordance with one of the plurality of group keys, and the protected content is protected in accordance with the following method: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining whether, to be prevented from having access is comprised in at least one group of the authorized set. 33. The method according to claim 32 and also comprising: assigning, to each one of the plurality of authorized devices, a set of keys comprising one group key for each group of which the one device is a member; and utilizing at least some of the group keys for communication of a content decryption key to at least one of the plurality of authorized devices. 34. The method according to claim 33 and wherein the utilizing comprises, for each of the plurality of authorized devices: obtaining the content decryption key, wherein the obtaining comprises performing no more than a predetermined number of decryptions. 35. The method according to claim 33 and wherein the utilizing comprises, for each of the plurality of authorized devices: obtaining the content decryption key, wherein the obtaining comprises performing exactly one decryption. 36. The method according to claim 33 and also comprising: at each authorized device having access to the protected content, performing no more than a predetermined number of decryption operations, said predetermined number being the same for all authorized devices, to obtain the content decryption key from an encrypted form thereof, said encrypted form being encrypted with a group key corresponding to a group of which said authorized device is a member. 37. The method according to claim 36 and wherein said predetermined number does not depend on the number of authorized devices. 38. The method according to claim 36 and wherein said predetermined number is equal to 1. 39. The method according to claim 33 and also comprising: at at least one of the authorized devices, using the group key of the set of keys corresponding to the group of which the authorized device is a member. 40. The method according to claim 33 and wherein each group key of the set of keys is assigned an initial value, and said initial value can not be changed. 41. The method according to claim 33 and also comprising: generating each of said group keys as a plurality of independently generated sets of group keys, wherein no group key of any one independently generated set is based, even in part, on any key of any other independently generated set. 42. The method according to claim 33 and also comprising: generating each of said group keys as a plurality of independently generated sets of group keys, wherein each group key is based, at least in part, pseudo-randomly on a source key. 43. The method according to claim 33 and also comprising: dividing the plurality of groups into a hierarchical set of groups, said hierarchical set of groups comprising a plurality of groups comprising at least a first group and a second group, each of said first group and said second group being associated with first and second group key generation information respectively; and generating a least one group key in each of said first group and said second group using said associated group key generation information, wherein said second group key generation information can be derived from said first group key generation information. 44. The method according to claim 32 and wherein the authorized set comprises a plurality of maximal groups from the set of remaining groups, such that each maximal group is not a subset of any one of the set of remaining groups. 45. The method according to claim 32 wherein the determining whether comprises receiving an identification of the at least one device. 46. The method according to claim 32 and wherein each two devices of the plurality of authorized devices have at least one group key in common. 47. The method according to claim 32 and wherein at least some of the authorized devices are not in communication with a central authorization facility after an initial manufacturing period.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (18)
Bocci Paul M. (Hoffman Estates IL) Sumner Terence E. (Roselle IL) Wojnarowski James R. (Cary IL), Automatic selection of decryption key for multiple-key encryption systems.
Baker Walter J. ; Bator Feliks ; Cordery Robert A. ; Hunter Kevin D. ; Lawton Kathryn V. ; Loglisci Louis J. ; Pauly Steven J. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A. ; H, Cryptographic key management and validation system.
Tatebayashi Makoto,JPX ; Fukushima Yoshihisa,JPX ; Kato Takehisa,JPX ; Endoh Naoki,JPX ; Hirayama Koichi,JPX, Encrypted communication system that limits the damage caused when a secret key has been leaked.
Takaragi Kazuo (Ebina JPX) Susaki Seiichi (Yokohama JPX) Matsumoto Hiroshi (Sagamihara JPX) Nakamura Tsutomu (Takarazuka JPX), Group cipher communication method and group cipher communication system.
Cordery Robert A. (Danbury CT) Braun John F. (Weston CT) D\Ippolito Frank M. (Derby CT) Lawton Kathyrn V. (Branford CT) Pauly Steven J. (New Milford CT) Pintsov Leon A. (West Hartford CT) Ryan ; Jr. , Method of token verification in a key management system.
Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL) Mutzabaugh Dennis M. (Mount Prospect IL) Sgrignoli Gary J. (Mount Prospect IL), Secure data packet transmission system and method.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
West Brett (Two Lookout Point Rd. Ridgefield CT 06877) Gardner John P. (1214 Wood La. Arlington TX 76017), Viewer discretion television program control system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.