Claims
- 1. A method for securely distributing media content from a first entity to a second entity through an intermediate entity, comprising:
(a) generating a studio token, wherein the studio token comprises information utilized to generate a first key; (b) distributing the studio token to the first entity; (c) generating a theater token, wherein the theater token comprises information utilized to generate a second key; (d) distributing the theater token to the second entity; (e) accepting a data file from the first entity, wherein the data file comprises:
(i) the media content encrypted according to the first key generated from the studio token; (ii) an authorization header, wherein the authorization header provides information utilized to generate the second key; (f) further encrypting the data file according to a third key wherein such further encryption comprises adding a new header to the encrypted media content; and (g) distributing the encrypted data file to the second entity.
- 2. The method of claim 1, wherein the studio token further comprises:
credentials; a name of media content; and expiration data.
- 3. The method of claim 1, wherein the first key is a constructive key management (CKM) key.
- 4. The method of claim 1, wherein the second key is a constructive key management (CKM) key.
- 5. The method of claim 1, wherein the studio token further comprises information authorizing the first entity to generate the first key.
- 6. The method of claim 1, wherein the studio token is utilized with a random number generator to generate the first key.
- 7. The method of claim 1, wherein the theater token further comprises information authorizing the second entity to generate the second key.
- 8. The method of claim 1, wherein the theater token is utilized with a random number generator to generate the second key.
- 9. The method of claim 8, wherein information in the authorization header provides properties utilized by the random number generator to generate the second key.
- 10. The method of claim 1, further comprising a dongle at the second entity authenticating a user.
- 11. The method of claim 1, wherein the studio token is distributed to the first entity on a disk.
- 12. The method of claim 1, wherein the first key and second key are discarded subsequent to use.
- 13. The method of claim 1, wherein the new header masks information regarding the media content, the first entity, and the second entity.
- 14. The method of claim 1, wherein the first key and second key are generated at a first location of the first entity and a second location of the second entity.
- 15. A system for securely distributing media content from a first entity to a second entity through an intermediate entity, the system comprising:
(a) a studio token, wherein the studio token comprises information utilized to generate a first key; (b) a theater token, wherein the theater token comprises information utilized to generate a second key; (c) a data file comprising:
(i) media content encrypted according to the first key generated from the studio token; (ii) an authorization header, wherein the authorization header provides information utilized to generate the second key; (d) the intermediate entity configured to:
(i) distribute the studio token to the first entity; (ii) distribute the theater token to the second entity; (iii) accept a data file from the first entity (iv) further encrypt the data file according to a third key wherein such further encryption comprises adding a new header to the encrypted media content; and (v) distribute the encrypted data file to the second entity.
- 16. The system of claim 15, wherein the studio token further comprises:
credentials; a name of media content; and expiration data.
- 17. The system of claim 15, wherein the first key is a constructive key management (CKM) key.
- 18. The system of claim 15, wherein the second key is a constructive key management (CKM) key.
- 19. The system of claim 15, wherein the studio token further comprises information authorizing the first entity to generate the first key.
- 20. The system of claim 15, wherein the studio token is utilized with a random number generator to generate the first key.
- 21. The system of claim 15, wherein the theater token further comprises information authorizing the second entity to generate the second key.
- 22. The system of claim 15, wherein the theater token is utilized with a random number generator to generate the second key.
- 23. The system of claim 22, wherein information in the authorization header provides properties utilized by the random number generator to generate the second key.
- 24. The system of claim 15, further comprising the second entity configured to authenticate a user utilizing a dongle.
- 25. The system of claim 15, wherein the studio token is distributed to the first entity on a disk.
- 26. The system of claim 15, wherein the first key and second key are discarded subsequent to use.
- 27. The system of claim 15, wherein the new header masks information regarding the media content, the first entity, and the second entity.
- 28. The system of claim 15, wherein the first key and second key are generated at a first location of the first entity and a second location of the second entity.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit under 35 U.S.C. §119(e) of the following co-pending and commonly assigned U.S. provisional patent applications which is incorporated by reference herein:
[0002] U.S. Provisional Patent Application Serial No. 60/376,244, filed Apr. 29, 2002, by inventors Ismael Rodriguez and James C. Campanella, entitled “METHOD TO SECURELY DISTRIBUTE LARGE DIGITAL VIDEO/DATA FILES WITH OPTIMUM SECURITY”, attorneys' docket number G&C 147.101-US-P1.
[0003] This application is related to the following co-pending and commonly-assigned patent applications, which applications are incorporated by reference herein:
[0004] U.S. Provisional Patent Application Serial No. 60/376,105, filed Apr. 29, 2002, by inventor Charles F. Stirling, entitled SECURE DATA CONTENT DELIVERY SYSTEM FOR MULTIMEDIA APPLICATIONS UTILIZING BANDWIDTH EFFICIENT MODULATION, attorneys' docket number G&C 147.0068-US-P1; and
[0005] U.S. Provisional Patent Application Serial No. 60/376,243, filed Apr. 29, 2002, by inventors Bernard Mark Gudaitis and William G. Connelly, entitled “ARCHITECTURE CONTAINING EMBEDDED COMPRESSION AND ENCRYPTION ALGORITHMS WITHIN THE DATA FILE”, attorneys' docket number G&C 147.0096-US-P1.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60376244 |
Apr 2002 |
US |