This application is related to commonly-assigned, co-pending U.S. Patent Application Serial No. PCT/US/02/39475, entitled “System and Method for Downloading Data Using A Proxy,” filed on Dec. 10, 2002, which is incorporated by reference herein.
This application generally relates to electronic data transfer, and more specifically to methods for securing electronic information, in a networking environment.
In the delivery of multi-media content via a network operation, a user or content requester (CR) may operate a device, such as a cellular telephone or Personal Data Assistant (PDA), to send a request to a content server (CS) that authorizes the content server to immediately download the requested data, information items, or content. In another aspect, the CR may request the CS to download the requested data, information items, or content at a scheduled time. Still further, the CR may request the data, information items or content be downloaded or delivered to a second device, i.e., a content receiver or consumer (CC), either immediately or at a scheduled time. This latter operation is suitable when the CR device is operating on a low-bandwidth network and lacks sufficient bandwidth to download the required information. For example, a user may use a cellular device operating over a low-speed network to request audio and/or visual (multimedia) information be delivered to a receiving device, such as a home or laptop computer.
However, before the CS provides the requested information the CR and/or CC must be authorized to respectively request and/or receive the desired information.
Accordingly, a need exists for devices that more fully secure media content from unauthorized access as well as for access from unauthorized parties.
A method for descrambling secure content received over a network is disclosed. In one embodiment, the method is operable at a receiving device located at a remote site in communication with a network for receiving a first information item scrambled using an encrypting key known by the remote site, descrambling the first information item using a corresponding decrypting key, wherein the information item includes an access code and a content key, receiving a second information item scrambled using the content encryption key after the server hosting the second information verifies the access code and descrambling the second information item using the content key. In another aspect of the invention, a location of the desired content is included with the first information item. The location may be also encrypted using the key.
It is to be understood that these drawings are solely for purposes of illustrating the concepts of the invention and are not intended as a definition of the limits of the invention. The embodiments shown in
The provided encryption key may itself be scrambled or encrypted using a key that is known to or shared by both CR 110 and CS 120. The use of a shared key, denoted as So and represented by arrow 210, assures CS 120 that CR 110 is authorized to make a request. CR 110 may, in one aspect, be provided with shared key So when registering for the service provided by CS 120. In another aspect, CR 110 may be in communication with CS 120 using a secured link, which may be set up by transmitting a conventional user name and password to CS 120. CS 120 may in response provide shared key So to user CR 10. A reference to the designated CC 150, e.g., Internet Protocol address, or location, etc., may also be contained within the request.
CS 120, after authenticating that CR 110 is authorized to make request 310, creates a Content Access Credential (CAC) or access code for the designated content consumer. The CAC is used to access the requested content by the designated CC 150 at a later time. A notification, represented as arrow 220, is provided to CC 150. Notification 220, in this case, includes the CAC and a content key, referred to as Kc. Key Kc is used to scramble or encrypt the requested content. CAC and Kc are scrambled or encrypted using key Pu, associated with CC 150, which, in this illustrated case, was provided by CR 110. A use-limitation or license, represented as LIC, may also be associated with content key Kc. In this case, license LIC may limit the number of times or a time period that key Kc is rendered valid. Such use-limitation on key Kc provides a means to limit subsequent distribution of the content.
CC 150 decrypts or de-scrambles the notification message to obtain the CAC and key Kcusing the decryption key associated with the key Pu. The CAC is then transmitted to CS 120, shown as arrow 225, to authorize the transmission or downloading of the requested information item. In this illustrated sequence, content downloading is represented by arrow 230. Upon receipt, the information item is de-scrambled or decrypted, represented by arrow 240, using the provided key, Kc. CC 150 is now able to view the de-scrambled content requested by CC 110. As would be recognized by those skilled in the art, key Kcis used to encrypt and decrypt the content provided and may thus be referred to as an encryption key, a decryption key or a content delivery key.
Although the sequence described herein provides for relatively immediate transmission of the requested content, it would be recognized by those skilled in the art that the transmission of CAC from CS 120 may occur at a predetermined time or with a predetermined delay calculated from the time the initial request was made. The transmission of CAC from CC 150 to CS 120 may be performed automatically or manually. In the manual case, a user may initiate an action on CC 150 to cause CAC to be transmitted. Similarly, CS 120 may delay transmission of CAC and content key Kcuntil a known time or after the lapse of a known time offset.
CC 150 may then decrypt the information and transmit the received CCAC to ES 320, as represented by arrow 340. CC 150 may then download the requested or desired content, encrypted using the key Kc, as represented by arrow 230′. CC 150 may then decrypt the received content as previously described. In another aspect of the invention, key Kcmay be associated with a use-limitation license that limits the duration of validity of key Kc.
In one aspect of the invention, the location of the desired content may also be included in the message. The location may be provided in the clear or may be scrambled. In one aspect of the invention, the content location may be known by the CC 150 and, thus, need not be contained in the transmitted message.
At block 540, a determination is made whether the requested content is to be downloaded. If the answer is negative, then the process waits at block 540 until some indication that downloading is desired is received. For example, an indication that downloading is desired may occur at a known time, a known time offset from a requested time, or manually by a user. The known time or known time offset may be provided by the user during the initial request.
When an indication is received, the content access key (CAC or CCAC) is transmitted to the known or specified content location, at block 550. At block 560, the content is received and at block 570 a determination is made whether all the content has been received. If the answer is negative, then processing continues at block 560 to continue receiving the desired content. However, if the answer is in the affirmative, the content is decrypted using the provided content key, i.e., Kc.
However, if the answer is in the affirmative, then a determination is made, at block 620, whether the sender is authorized to request content delivery. If the answer is negative, then the process returns to block 610 to continue waiting for a message. However, if the answer is in the affirmative, then at block 625 the request message is decrypted using a key common to both parties. The message includes information regarding the desired content and may include a desired consumer location if the desired consumer location is not known, prefixed or predetermined, e.g., predesignated address. This information may be sent unencrypted. The consumer public key or other encryption information is sent encrypted.
At block 630 a content access key and a content key, Kc, are generated and are encrypted using the public key or other encryption information provided by the requester or user. The encrypted information is transmitted to the consumer via a notification message at block 640.
At block 650, a determination is made whether the desired content is stored or maintained at a location known to the consumer, i.e., the content location is predefined or predetermined. If the answer is in the affirmative, then processing is completed. However, if the answer is negative, then the location of the content is encrypted using the provided public key or other encryption information at block 660 and transmitted to the consumer at block 665.
At block 670, the content access key or code is encrypted or scrambled using an encryption key known between the content server and the edge server that contains or will contain the desired content. At block 680, the content is encrypted using the content delivery key, Kc. The use of key Kc, to scramble the content is advantageous as the server does not require additional levels of security to prevent unauthorized access to the content. Furthermore, storing the media using the key, Kc, is further advantageous as it stores the content in a form that is transparent to the consumer regardless of whether the content server or an edge server delivers the content. At block 685, the content is transmitted to the location of the consumer or user. It would be recognized by those skilled in the art that the process shown in
Specifically, processing system 710 includes one or more input/output devices 740 that receive data from the illustrated source devices 705 over network 750. The received data is then applied to processor 720, which is in communication with input/output device 740 and memory 730. Input/output devices 740, processor 720 and memory 730 may communicate over a communication medium 725. Communication medium 725 may represent a communication network, e.g., ISA, PCI, PCMCIA bus, one or more internal connections of a circuit, circuit card or other device, as well as portions and combinations of these and other communication media. Processing system 710 and/or processor 720 may be representative of a handheld calculator, special purpose or general purpose processing system, desktop computer, laptop computer, palm computer, or personal digital assistant (PDA) device, etc., as well as portions or combinations of these and other devices that can perform the operations illustrated.
Processor 720 may be a central processing unit (CPU) or dedicated hardware/software, such as a PAL, ASIC, FGPA, operable to execute computer instruction code or a combination of code and logical operations. In one embodiment, processor 720 may include code which, when executed, performs the operations illustrated herein. The code may be contained in memory 730, may be read or downloaded from a memory medium such as a CD-ROM or floppy disk, represented as 783, may be provided by a manual input device 785, such as a keyboard or a keypad entry, or may be read from a magnetic or optical medium (not shown) when needed. Information items provided by input device 783, 785 and/or magnetic medium may be accessible to processor 720 through input/output device 740, as shown. Further, the data received by input/output device 740 may be immediately accessible by processor 720 or may be stored in memory 730. Processor 720 may further provide the results of the processing to display 780, recording device 790 or a second processing unit 795.
As one skilled in the art would recognize, the terms processor, processing system, computer or computer system may represent one or more processing units in communication with one or more memory units and other devices, e.g., peripherals, connected electronically to and communicating with the at least one processing unit. Furthermore, the devices illustrated may be electronically connected to the one or more processing units via internal busses, e.g., serial, parallel, ISA bus, microchannel bus, PCI bus, PCMCIA bus, USB, etc., or one or more internal connections of a circuit, circuit card or other device, as well as portions and combinations of these and other communication media, or an external network, e.g., the Internet and Intranet. In other embodiments, hardware circuitry may be used in place of, or in combination with, software instructions to implement the invention. For example, the elements illustrated herein may also be implemented as discrete hardware elements or may be integrated into a single unit.
As would be understood, the operations illustrated may be performed sequentially or in parallel using different processors to determine specific values. Processing system 710 may also be in two-way communication with each of the sources 705. Processing system 710 may further receive or transmit data over one or more network connections from a server or servers over, e.g., a global computer communications network such as the Internet, Intranet, a wide area network (WAN), a metropolitan area network (MAN), a local area network (LAN), a terrestrial broadcast system, a cable network, a satellite network, a wireless network, or a telephone network (POTS), as well as portions or combinations of these and other types of networks. As will be appreciated, networks 750 and 770 may also be internal networks or one or more internal connections of a circuit, circuit card or other device, as well as portions and combinations of these and other communication media or an external network, e.g., the Internet and Intranet.
While there has been shown, described, and pointed out fundamental novel features of the present invention as applied to preferred embodiments thereof, it will be understood that various omissions and substitutions and changes in the apparatus described, in the form and details of the devices disclosed, and in their operation, may be made by those skilled in the art without departing from the spirit of the present invention. Although the present invention has been disclosed with regard to securing multi-media content, one skilled in the art would recognize that the method and devices described herein may be applied to any information requiring secure transmission and authorized access. It is expressly intended that all combinations of those elements that perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Substitutions of elements from one described embodiment to another are also fully intended and contemplated.
This application is a continuation-in-part of commonly-owned, co-pending U.S. Patent Application Serial No. PCT/US02/39474, entitled “Apparatus and Methods for Delayed Network Information Transfer,” filed on Dec. 10, 2002, which is incorporated by reference herein.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US04/02407 | 1/27/2004 | WO | 2/6/2006 |
Number | Date | Country | |
---|---|---|---|
60494836 | Aug 2003 | US |