Method and system for a recursive security protocol for digital copyright control
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/10
H04L-009/32
H04L-029/06
출원번호
US-0745236
(2013-01-18)
등록번호
US-9710617
(2017-07-18)
발명자
/ 주소
Oxford, William V.
출원인 / 주소
Rubicon Labs, Inc.
대리인 / 주소
Sprinkle IP Law Group
인용정보
피인용 횟수 :
0인용 특허 :
54
초록▼
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.
대표청구항▼
1. A system, comprising: a target device, comprising:a processor,first hardware comprising a one time programmable immutable target unit specific key, wherein the target unit specific key cannot be read by software executing on the target device, andsecond hardware configured to be written with an a
1. A system, comprising: a target device, comprising:a processor,first hardware comprising a one time programmable immutable target unit specific key, wherein the target unit specific key cannot be read by software executing on the target device, andsecond hardware configured to be written with an activation key, wherein the activation key is based on the target unit specific key, and wherein the target device is configured to:receive a first bit stream,obtain a first decryption algorithm associated with the first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key,obtain the target unit specific key and the activation key, anddecrypt the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished utilizing the first decryption algorithm associated with the first bit stream, using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target unit specific key. 2. The system of claim 1, wherein the target unit specific key is associated with a serial number of the target device at a server that provided the first bit stream. 3. The system of claim 1, wherein the target unit specific key is one of a set of keys. 4. The system of claim 3, wherein the target unit specific key is the only one of the set of keys that can be read when the decryption of the first bit stream occurs. 5. The system of claim 1, wherein the target device further comprises decryption hardware, the decryption is performed by the decryption hardware, and the target unit specific key may only be accessed by the decryption hardware. 6. The system of claim 1, wherein the decryption of the first bit stream is done utilizing a key obtained from a server. 7. The system of claim 1, wherein the first decrypted bit stream comprises digital content. 8. A method for digital security, comprising: receiving a first bit stream at a target device;obtaining a first decryption algorithm associated with a first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key;obtaining a one time programmable immutable target unit specific key stored in first hardware on the target device, wherein the target unit specific key cannot be read by software executing on the target device;writing an activation key into second hardware, wherein the activation key is based on the target unit specific key;obtaining the target unit specific key and the activation key; anddecrypting the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target unit specific key. 9. The method of claim 8, wherein the target unit specific key is associated with a serial number of the target device at the server at a server that provided the first bit stream. 10. The method of claim 8, wherein the target unit specific key is one of a set of keys. 11. The method of claim 10, wherein the target unit specific key is the only one of the set of keys that can be read when the decryption of the first bit stream occurs. 12. The method of claim 8, wherein the decryption is performed by decryption hardware and the target unit specific key may only be accessed by the decryption hardware. 13. The method of claim 8, wherein the decryption of the first bit stream is done utilizing a key obtained from a server. 14. The method of claim 8, wherein the first decrypted bit stream comprises digital content. 15. A non-transitory computer readable medium, comprising instructions for: receiving a first bit stream at a target device;obtaining a first decryption algorithm associated with a first bit stream in association with a first digital signature based on the first decryption algorithm and the target unit specific key;obtaining a one time programmable immutable target unit specific key stored in first hardware on the target device, wherein the target unit specific key cannot be read by software executing on the target device;writing an activation key into second hardware, wherein the activation key is based on the target unit specific key;obtaining the target unit specific key and the activation key; anddecrypting the first bit stream to yield a first decrypted bit stream, wherein the decryption of the first bit stream is accomplished using a temporary decryption key generated from the target unit specific key and the activation key, and wherein the decryption of the first bit stream using the first decryption algorithm cannot occur unless the first digital signature of the first decryption algorithm matches a second digital signature calculated by the target device based on the target device specific key. 16. The computer readable medium of claim 15, wherein the target unit specific key is associated with a serial number of the target device at a server that provided the first bit stream. 17. The computer readable medium of claim 15, wherein the target unit specific key is one of a set of keys. 18. The computer readable medium of claim 17, wherein the target unit specific key is the only one of the set of keys that can be read when the decryption of the first bit stream occurs. 19. The computer readable medium of claim 15, wherein the decryption is performed by decryption hardware and the target unit specific key may only be accessed by the decryption hardware. 20. The computer readable medium of claim 15, wherein the decryption of the first bit stream is done utilizing a key obtained from a server. 21. The computer readable medium of claim 15, wherein the first decrypted bit stream comprises digital content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (54)
Onishi Katsuyoshi (Yokohama JPX) Takada Osamu (Sagamihara JPX) Kimura Koichi (Yokohama JPX) Yamaga Mitsuhiro (Kawasaki JPX) Ogura Toshihiko (Ebina JPX) Shibata Yasushi (Hadano JPX), Address filter unit for carrying out address filter processing among plurality of networks and method thereof.
Childs Matthew H. (Arlington TX) Norcross Thomas M. (Arlington TX), Automatic data generation for self-test of cryptographic hash algorithms in personal security devices.
Hideya Akashi JP; Toshio Okochi IE; Toru Shonai JP; Masamori Kashiyama JP, Cache memory control circuit including summarized cache tag memory summarizing cache tag information in parallel processor system.
Steven T. Ansell ; Andrew R. Cherenson ; Mark E. Paley ; Steven B. Katz ; John Michael Kelsey, Jr. ; Bruce Schneier, Copy security for portable music players.
Jakubowski Mariusz H. ; Venkatesan Ramarathnam, Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of.
Baum Richard I. (Poughkeepsie NY) Brent Glen A. (Fishkill NY) Gibson Donald H. (Salt Point NY) Lindquist David B. (Poughkeepsie NY), Database sort and merge apparatus with multiple memory arrays having alternating access.
Mills Robert A. (Gambrills MD) Unkenholz Mark R. (Eldersburg MD) Wilson Mark W. (Columbia MD) Burroughs John E. (Annapolis MD), Device for and method of cryptography that allows third party access.
Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA) Hoskinson John D. (Pacific WA) Maurin Joseph G. (Puyallup WA), Encrypted communication system.
Clifford P. Van Dyke ; Peter T. Brundrett ; Michael M. Swift ; Praerit Garg ; Richard B. Ward, Extensible security system and method for controlling access to objects in a computing environment.
Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
Flusche Frederick O. (Hyde Park NY) Tan Kwang G. (Poughkeepsie NY) Wright Ralph W. (Pleasant Valley NY), Reconfigurable key-in-storage means for protecting interleaved main storage.
Bright Michael W. (Arlington Heights IL) Ziolko Eric F. (Schaumburg IL) Wilson Alan L. (Hoffman Estates IL) Bray Michelle M. (Schaumburg IL) Hennen Harry A. (Woodstock IL) Weiss David L. (Roselle IL), Secure communication system.
Ishibashi,Yoshihito; Oishi,Tateo; Muto,Akihiro; Kitahara,Jun; Shirai,Taizou, Systems and methods for content distribution using one or more distribution keys.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Johnson, Simon P.; Savagaonkar, Uday R.; Scarlata, Vincent R.; McKeen, Francis X.; Rozas, Carlos V., Technique for supporting multiple secure enclaves.
Scarlata, Vincent R.; Johnson, Simon P.; Beker, Vladimir; Walker, Jesse; Rozas, Carlos V.; Santoni, Amy L.; Anati, Ittai; Makaram, Raghunandan; McKeen, Francis X.; Savagaonkar, Uday R., Using authenticated manifests to enable external certification of multi-processor platforms.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.