Claims
- 1. A method performed in combination with a host and a peripheral that couples to the host, the peripheral having a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))), the method for the host to securely transmit content to the peripheral and comprising:
the host receiving (PU(PK)) from the peripheral; the host sending (PU(PK)) to the entity, the entity having a private key (PR) corresponding to (PU), applying (PR) to (PU(PK)) to obtain (PK), and sending (PK) back to the host; and the host receiving (PK) from the entity, encrypting at least a portion of the content according to (PK), and transmitting the encrypted content to the peripheral, whereby the peripheral may then decrypt the encrypted content based on (PK).
- 2. The method of claim 1 wherein the host has a public key (PU-H) and a private key (PR-H), the method comprising:
the host sending (PU(PK)) and (PU-H) to the entity, whereby the entity encrypts (PK) according to (PU-H) to result in (PU-H(PK)) and sends same back to the host; and the host receiving (PU-H(PK)) and applying (PR-H) thereto to obtain (PK).
- 3. The method of claim 1 further comprising the host caching (PK) for later use.
- 4. The method of claim 3 comprising:
the host storing (PK) according to (PU(PK)) in a cache of the host; the host again receiving (PU(PK)) from the peripheral; and the host recognizing based on (PU(PK)) that (PK) is stored in the cache, retrieving (PK) from the cache based on such (PU(PK)), encrypting at least a portion of a piece of content according to (PK), and transmitting the encrypted content to the peripheral, whereby the peripheral may then decrypt the encrypted object based on (PK).
- 5. The method of claim 1 wherein the host receives (PK) from the entity, selects a content key (CK) for the content, encrypts at least a portion of the content according to (CK) to result in (CK(content)), encrypts (CK) according to (PK) to result in (PK(CK)), places (PK(CK)) in a digital license, and transmits (CK(content)) and the license including (PK(CK)) to the peripheral, whereby the peripheral may then decrypt the encrypted content by retrieving (PK(CK)) from the license, applying (PK) thereto to obtain (CK), and applying (CK) to (CK(content)) to obtain the content.
- 6. The method of claim 5 comprising the host placing (PK(CK)) and at least one specified limitation in the license, whereby the peripheral is trusted to determine that each limitation in the license is satisfied before obtaining the content.
- 7. The method of claim 5 comprising the host placing (PK(CK)) and at least one specified right in the license, whereby the peripheral is trusted to determine that at least one right in the license allows the peripheral to obtain the content.
- 8. The method of claim 1 comprising the host receiving (PU(PK)) from the peripheral in the form of a digital certificate.
- 9. The method of claim 8 comprising the host receiving (PU(PK)) from the peripheral in the form of a digital certificate that identifies with regard to the peripheral at least one of a type thereof, a manufacturer thereof, a model thereof, and capabilities thereof.
- 10. A method performed in combination with a host and a peripheral that couples to the host, the peripheral having a symmetric peripheral key (PK), a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))), and a symmetric binding key (BK) encrypted according to (PK) ((PK(BK))), the method for the host to securely transmit content to the peripheral and comprising:
the host receiving (PU(PK)) and (PK(BK)) from the peripheral; the host sending (PU(PK)) and (PK(BK)) to the entity, the entity having a private key (PR) corresponding to (PU), applying (PR) to (PU(PK)) to obtain (PK), applying (PK) to (PK(BK)) to obtain (BK), and sending (BK) back to the host; and the host receiving (BK) from the entity, encrypting at least a portion of the content according to (BK), and transmitting the encrypted content to the peripheral, whereby the peripheral may then decrypt the encrypted content based on (BK).
- 11. The method of claim 10 wherein the host has a public key (PU-H) and a private key (PR-H), the method comprising:
the host sending (PU(PK)), (PK(BK)), and (PU-H) to the entity, whereby the entity encrypts (BK) according to (PU-H) to result in (PU-H(BK)) and sends same back to the host; and the host receiving (PU-H(BK)) and applying (PR-H) thereto to obtain (BK).
- 12. The method of claim 10 further comprising the host caching (BK) for later use.
- 13. The method of claim 12 comprising:
the host storing (BK) according to at least (PU(PK)) in a cache of the host; the host again receiving (PU(PK)) from the peripheral; and the host recognizing based on (PU(PK)) that (BK) is stored in the cache, retrieving (BK) from the cache based on such (PU(PK)), encrypting at least a portion of a piece of content according to (BK), and transmitting the encrypted content to the peripheral, whereby the peripheral may then decrypt the encrypted object based on (BK).
- 14. The method of claim 10 wherein the host receives (BK) from the entity, selects a content key (CK) for the content, encrypts at least a portion of the content according to (CK) to result in (CK(content)), encrypts (CK) according to (BK) to result in (BK(CK)), places (BK(CK)) in a digital license, and transmits (CK(content)) and the license including (BK(CK)) to the peripheral, whereby the peripheral may then decrypt the encrypted content by retrieving (BK(CK)) from the license, applying (BK) thereto to obtain (CK), and applying (CK) to (CK(content)) to obtain the content.
- 15. The method of claim 14 comprising the host placing (BK(CK)) and at least one specified limitation in the license, whereby the peripheral is trusted to determine that each limitation in the license is satisfied before obtaining the content.
- 16. The method of claim 14 comprising the host placing (BK(CK)) and at least one specified right in the license, whereby the peripheral is trusted to determine that at least one right in the license allows the peripheral to obtain the content.
- 17. The method of claim 10 comprising the host receiving (PU(PK)) and (PK(BK)) from the peripheral in the form of a digital certificate.
- 18. The method of claim 17 comprising the host receiving (PU(PK)) and (PK(BK)) from the peripheral in the form of a digital certificate that identifies with regard to the peripheral at least one of a type thereof, a manufacturer thereof, a model thereof, and capabilities thereof.
- 19. A method performed in combination with a host and a peripheral that couples to the host, the peripheral having a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))), the method for the peripheral to securely transmit content to the host and comprising:
the host receiving (PU(PK)) from the peripheral; the host sending (PU(PK)) to the entity, the entity having a private key (PR) corresponding to (PU), applying (PR) to (PU(PK)) to obtain (PK), and sending (PK) back to the host; the host receiving (PK) from the entity, selecting a content key (CK) for the content, encrypting (CK) according to (PK) to result in (PK(CK)), placing (PK(CK)) in a digital license, and transmitting the license including (PK(CK)) to the peripheral, whereby the peripheral may then apply (PK) to (PK(CK)) to obtain (CK), encrypt at least a portion of the content according to (CK), and transmit the encrypted content to the host; and the host applying (CK) to the encrypted content to decrypt same.
- 20. The method of claim 19 wherein the host has a public key (PU-H) and a private key (PR-H), the method comprising:
the host sending (PU(PK)) and (PU-H) to the entity, whereby the entity encrypts (PK) according to (PU-H) to result in (PU-H(PK)) and sends same back to the host; and the host receiving (PU-H(PK)) and applying (PR-H) thereto to obtain (PK).
- 21. The method of claim 19 further comprising the host caching (PK) for later use.
- 22. The method of claim 21 comprising:
the host storing (PK) according to (PU(PK)) in a cache of the host; the host again receiving (PU(PK)) from the peripheral; and the host recognizing based on (PU(PK)) that (PK) is stored in the cache and retrieving (PK) from the cache based on such (PU(PK)).
- 23. The method of claim 19 comprising the host placing (PK(CK)) and at least one specified limitation in the license, whereby the peripheral is trusted to determine that each limitation in the license is satisfied before encrypting the content.
- 24. The method of claim 19 comprising the host placing (PK(CK)) and at least one specified right in the license, whereby the peripheral is trusted to determine that at least one right in the license allows the peripheral to encrypt the content.
- 25. The method of claim 19 comprising the host receiving (PU(PK)) from the peripheral in the form of a digital certificate.
- 26. The method of claim 25 comprising the host receiving (PU(PK)) from the peripheral in the form of a digital certificate that identifies with regard to the peripheral at least one of a type thereof, a manufacturer thereof, a model thereof, and capabilities thereof.
- 27. A method performed in combination with a host and a peripheral that couples to the host, the peripheral having a symmetric peripheral key (PK), a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))), and a symmetric binding key (BK) encrypted according to (PK) ((PK(BK))), the method for the peripheral to securely transmit content to the host and comprising:
the host receiving (PU(PK)) and (PK(BK)) from the peripheral; the host sending (PU(PK)) and (PK(BK)) to the entity, the entity having a private key (PR) corresponding to (PU), applying (PR) to (PU(PK)) to obtain (PK), applying (PK) to (PK(BK)) to obtain (BK), and sending (BK) back to the host; and the host receiving (BK) from the entity, selecting a content key (CK) for the content, encrypting (CK) according to (BK) to result in (BK(CK)), placing (BK(CK)) in a digital license, and transmitting the license including (BK(CK)) to the peripheral, whereby the peripheral may then apply (BK) to (BK(CK)) to obtain (CK), encrypt at least a portion of the content according to (CK), and transmit the encrypted content to the host; and the host applying (CK) to the encrypted content to decrypt same.
- 28. The method of claim 27 wherein the host has a public key (PU-H) and a private key (PR-H), the method comprising:
the host sending (PU(PK)) and (PU-H) to the entity, whereby the entity encrypts (BK) according to (PU-H) to result in (PU-H(BK)) and sends same back to the host; and the host receiving (PU-H(BK)) and applying (PR-H) thereto to obtain (BK).
- 29. The method of claim 27 further comprising the host caching (BK) for later use.
- 30. The method of claim 29 comprising:
the host storing (BK) according to at least (PU(PK)) in a cache of the host; the host again receiving (PU(PK)) from the peripheral; and the host recognizing based on (PU(PK)) that (BK) is stored in the cache and retrieving (BK) from the cache based on such (PU(PK)).
- 31. The method of claim 27 comprising the host placing (BK(CK)) and at least one specified limitation in the license, whereby the peripheral is trusted to determine that each limitation in the license is satisfied before encrypting the content.
- 32. The method of claim 19 comprising the host placing (BK(CK)) and at least one specified right in the license, whereby the peripheral is trusted to determine that at least one right in the license allows the peripheral to encrypt the content.
- 33. The method of claim 19 comprising the host receiving (PU(PK)) from the peripheral in the form of a digital certificate.
- 34. The method of claim 25 comprising the host receiving (PU(PK)) from the peripheral in the form of a digital certificate that identifies with regard to the peripheral at least one of a type thereof, a manufacturer thereof, a model thereof, and capabilities thereof.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation in part of U.S. patent application Ser. No. 10/123,479, filed Apr. 16, 2002 and entitled “DIGITAL RIGHTS MANAGEMENT (DRM) ENCRYPTION AND DATA-PROTECTION FOR CONTENT ON A RELATIVELY SIMPLE DEVICE”, hereby incorporated by reference in its entirety.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10123479 |
Apr 2002 |
US |
Child |
10293466 |
Nov 2002 |
US |