Claims
- 1. A method for modifying content usage conditions during content distribution, comprising the steps of:
receiving protected content, content usage conditions, a message authentication code (MAC) and a key management block (KMB); processing the MAC with a key derived from the KMB; and modifying the content usage conditions.
- 2. The method of claim 1, wherein the MAC comprises an encrypted combination of an existing digest of the content usage conditions and a title key.
- 3. The method of claim 2, wherein the processing step comprises the steps of decrypting the encrypted combination with a key encrypting key;
generating a verification digest of the content usage conditions; and comparing the verification digest to the existing digest.
- 4. The method of claim 1, wherein the key comprises a key encrypting key that is derived from the KMB.
- 5. The method of claim 1, wherein the key is a title key that is recovered with a key encrypting key, and wherein the key encrypting key is derived from the KMB.
- 6. The method of claim 1, further comprising the step of re-calculating the MAC based on the modified content usage conditions.
- 7. The method of claim 1, wherein the content usage conditions are modified by a content service provider.
- 8. The method of claim 1, wherein the content usage conditions are modified by a receiver.
- 9. A method for modifying content usage conditions during broadcast distribution, comprising the steps of:
receiving encrypted content, content usage conditions, an encrypted combination of the content usage conditions and a title key, and a key management block (KMB); determining a key encrypting key based on the KMB; decrypting the encrypted combination using the key encrypting key; and modifying the content usage conditions.
- 10. The method of claim 9, further comprising the steps of:
re-encrypting the decrypted combination; and transmitting the encrypted content, the re-encrypted combination, the content usage conditions, and the KMB to a receiver.
- 11. The method of claim 10, further comprising the steps of:
the receiver receiving the encrypted content, the content usage conditions, the reencrypted combination, and the KMB; the receiver determining the key encrypting key based on the KMB; the receiver decrypting the re-encrypted combination using the key encrypting key; and the receiver changing the modified usage conditions.
- 12. The method of claim 9, wherein the encrypted content, the content usage conditions, the encrypted combination, and the KMB are transmitted in a single data delivery.
- 13. The method of claim 9, wherein the encrypted content, the content usage conditions, the encrypted combination, and the KMB are received by a content service provider from a content owner.
- 14. The method of claim 9, wherein the encrypted content, the content usage conditions, the encrypted combination, and the KMB are received by a receiver from a content service provider.
- 15. The method of claim 9, wherein the encrypted content, the content usage conditions, the encrypted combination, and the KMB are received by a receiver from a content owner.
- 16. A system for modifying content usage conditions during content distribution, comprising:
a system for receiving encrypted content, content usage conditions, a message authentication code (MAC), and a key management block (KMB) from a content source; a system for determining a key encrypting key based on the KMB; a system for processing the MAC using the key encrypting key; and a system for modifying the content usage conditions.
- 17. The system of claim 16, further comprising:
a system for re-calculating the MAC; and a system for transmitting the re-encrypted combination, the re-calculated MAC, the content usage conditions, and the KMB to a receiver.
- 18. The system of claim 16, wherein the encrypted content, the content usage conditions, the MAC, and the KMB are received in a single data delivery.
- 19. The system of claim 16, wherein the content source is selected from the group consisting of a content owner, a content service provider and a receiver.
- 20. A program product stored on a recordable medium for modifying content usage conditions during content distribution, which when executed, comprises:
program code for receiving encrypted content, content usage conditions, an encrypted combination of the content usage conditions and a title key, and a key management block (KMB) from a content source; program code for determining a key encrypting key based on the KMB; program code for decrypting the encrypted combination using the key encrypting key; and program code for modifying the content usage conditions.
- 21. The program product of claim 20, further comprising:
program code for re-encrypting the decrypted combination; and program code for transmitting the re-encrypted combination, the encrypted content, the content usage conditions, and the KMB to a receiver.
- 22. The program product of claim 20, wherein the encrypted content, the content usage conditions, the encrypted combination, and the KMB are received in a single data delivery.
- 23. The program product of claim 20, wherein the content source is selected from the group consisting of a content owner, a content service provider and a receiver.
- 24. A method for encrypting a binding identifier during authorization of a new device in a consumer home network, comprising the steps of:
authorizing a new device to join a consumer home network; and transmitting an encrypted binding identifier to the new device, wherein the encrypted binding identifier is encrypted based on a peer key, and wherein the peer key is based on a media key that is determined from a key management block.
- 25. A method for accepting a proposed key management block (KMB), comprising the steps of:
proposing a KMB to an existing device; authenticating the proposed KMB based on a key; and accepting the proposed KMB if the proposed KMB includes an existing KMB.
- 26. The method of claim 25, wherein the authenticating step comprises the step of authenticating the proposed KMB based on a message authentication code (MAC), and wherein the MAC comprises a combination of a digest of the proposed KMB and a media key, as encrypted with a binding key.
- 27. A method for merging two device clusters in a consumer home network, comprising the steps of:
a device observing that a first device cluster is a subset of a second device cluster; and the device abandoning the first device cluster.
- 28. The method of claim 27 further comprising the step of the device ceasing to abandon the first cluster if the first cluster is no longer a subset of the second cluster.
- 29. A local network of devices having network-accessible storage for exchanging encrypted content, comprising:
a key management block (KMB); and a device authorization table, wherein content is encrypted with a key derived from the KMB and the authorization table.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is related to co-pending U.S. application Ser. No. 09/982,203, filed Oct. 18, 2001 and entitled “Method and System for Digital Rights Management in Content Distribution Applications.”