Invention Grant
US08327145B2 Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method 有权
用于生成权限对象和设备来执行该方法的方法,用于发送权限对象和方法以执行该方法的方法以及用于接收权限对象和设备的方法来执行该方法

  • Patent Title: Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method
  • Patent Title (中): 用于生成权限对象和设备来执行该方法的方法,用于发送权限对象和方法以执行该方法的方法以及用于接收权限对象和设备的方法来执行该方法
  • Application No.: US12406350
    Application Date: 2009-03-18
  • Publication No.: US08327145B2
    Publication Date: 2012-12-04
  • Inventor: Kun-uk Kim
  • Applicant: Kun-uk Kim
  • Applicant Address: KR Seoul
  • Assignee: Pantech Co., Ltd.
  • Current Assignee: Pantech Co., Ltd.
  • Current Assignee Address: KR Seoul
  • Agency: H.C. Park & Associates, PLC
  • Priority: KR10-2008-0027891 20080326
  • Main IPC: H04L29/06
  • IPC: H04L29/06
Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method
Abstract:
A method for transmitting a Rights Object (RO) includes generating a password key by encrypting a password, generating the RO using the password key, and transmitting the RO from a first device to a second device. The second device and the first device share the password and the second device generates the password key using the same encryption method as that used by the first device to generate the password key. The second device decrypts a Message Authentication Code (MAC) key and a Rights Object Encryption Key (REK) using the password key, decrypts a Content Encryption Key (CEK) using the decrypted REK, and verifies integrity of the RO using the decrypted MAC key. The second device can use and/or access content associated with the RO using the decrypted CEK. The CEK may be generated by the first device or may be the CEK from a Rights Issuer.
Information query
Patent Agency Ranking
0/0