Abstract:
PROBLEM TO BE SOLVED: To provide a method for distributing content over a network. SOLUTION: In the method, a media storage structure including a first content section for storing first pieces of encrypted content and a second content section for storing second pieces of encrypted content includes a first key section and a second key section for storing the first and second keys, respectively for making the first and second pieces of encrypted content plain text. The media storage structure is distributed from a computer different from one or a plurality of computers for distributing first and second keys, and the first and second keys are inserted into first and second key sections in the media storage structure. Based on the keys, either or both pieces of encrypted content between two pieces of content in the media storage structure are made into plain text to make the content accessible. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for distributing contents over a network.SOLUTION: A media storage structure includes pieces of first and second encrypted contents. Provided are a set of keys for obtaining plaintexts of the pieces of the contents which can be accessed based upon whether access to the piece of the first content is allowed, whether access to the piece of the second content is allowed, or whether access to the both is allowed. The provided set of keys include one or a plurality of keys for obtaining a plaintext of only one of the pieces of the two encrypted contents. Based upon the provided set of keys, a device converts one of the pieces of the two contents in the media storage structure or the pieces of both the encrypted contents in the media storage structure into plaintexts to attain access.
Abstract:
PROBLEM TO BE SOLVED: To provide a method of distributing contents.SOLUTION: A media storage structure 900 including a first content section which stores part of a first enciphered content and a second content section which stores part of a second enciphered content also includes first and second key sections which store first and second keys for deciphering the first and second enciphered contents into plaintexts, and distributes the media storage structure with the parts of the first and second enciphered contents from a computer different from a computer which distributes the first and second keys. The first and second keys are inserted into the first and second key sections. A device deciphers one or both of pieces of the two contents in the media storage structure into plaintexts based upon the keys, and enables access.
Abstract:
Distributing a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to a network. The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the device is provided with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. Based on the provided set of keys, the device can decrypt and access either one of the two pieces of content in the media storage structure or both pieces of encrypted content in the media storage structure.
Abstract:
For digital rights management (DRM) of e.g. digitally delivered music or video, a technique to make the decryption keys more secure. The technique fragments a message (song or video or other) into a number of portions, and uses a different decryption key for each portion. Each of the various keys is a function of the preceding key, in one version. In another version, each key is a function of a seed value and of the particular portion of the material with which the key is associated.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.
Abstract:
Distributing a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to a network. The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the device is provided with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. Based on the provided set of keys, the device can decrypt and access either one of the two pieces of content in the media storage structure or both pieces of encrypted content in the media storage structure.
Abstract:
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary to re-encrypt data for transmission from an originator to a message receiver without revealing the data (message) or the cipher to the intermediary. This method uses a composition of two ciphers for re-encrypting the message at the intermediary, without revealing the plain text message or either cipher to the intermediary.
Abstract:
A method and associated apparatus for use in a data distribution process to allow an untrusted intermediary to re-encrypt data for transmission from an originator to a message receiver without revealing the data (message) or the cipher to the intermediary. This method uses a composition of two ciphers for re-encrypting the message at the intermediary, without revealing the plain text message or either cipher to the intermediary.
Abstract:
Un procedimiento para descifrar contenido cifrado, que comprende las etapas de: proporcionar el contenido cifrado; comprendiendo el contenido cifrado una pluralidad de fragmentos que proporcionan un valor inicial de clave (CK0); dividir cada fragmento del contenido cifrado en una pluralidad de partes; generar una primera clave usando el valor inicial de clave; descifrar una primera de dichas partes, usando la primera clave; generar una segunda clave usando el valor inicial de clave, difiriendo la segunda clave de la primera; y descifrar una segunda de dichas partes, usando la segunda clave, en donde, en la partición, la pluralidad de partes difieren en longitud, según lo determinado por un algoritmo de fragmentación, y en donde el algoritmo de fragmentación varía entre fragmentos del contenido cifrado, de modo tal que distintos fragmentos del contenido se fragmenten de maneras distintas.