Movatterモバイル変換


[0]ホーム

URL:


US20140289525A1 - System and method for decentralized management of keys and policies - Google Patents

System and method for decentralized management of keys and policies
Download PDF

Info

Publication number
US20140289525A1
US20140289525A1US12/550,264US55026409AUS2014289525A1US 20140289525 A1US20140289525 A1US 20140289525A1US 55026409 AUS55026409 AUS 55026409AUS 2014289525 A1US2014289525 A1US 2014289525A1
Authority
US
United States
Prior art keywords
packaging
key
content
computer system
encrypted content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/550,264
Other versions
US8831228B1 (en
Inventor
Sunil C. Agrawal
Katherine K. Nadell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Adobe Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US12/550,264priorityCriticalpatent/US8831228B1/en
Assigned to ADOBE SYSTEMS INCORPORATEDreassignmentADOBE SYSTEMS INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: AGRAWAL, SUNIL C.
Assigned to ADOBE SYSTEMS INCORPORATEDreassignmentADOBE SYSTEMS INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: NADELL, KATHERINE K.
Application grantedgrantedCritical
Publication of US8831228B1publicationCriticalpatent/US8831228B1/en
Publication of US20140289525A1publicationCriticalpatent/US20140289525A1/en
Assigned to ADOBE INC.reassignmentADOBE INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: ADOBE SYSTEMS INCORPORATED
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Various embodiments of a system and method for decentralized management of keys and policies are described. Various embodiments may include a computer system configured to receive a request from a remote computer system associated with a recipient of content. Such request may include an encrypted content encryption key that is encrypted with a packaging key utilized by a packaging entity. The request may also include an identifier identifying the packaging entity. In some embodiments, the request may also include policy information specifying one or more usage rights of the content. The computer system may be configured to, in response to determining the recipient is authorized to access the content, generate the packaging key based on the identifier and a secret root seed, utilize the generated packaging key to decrypt the encrypted content encryption key, and provide the decrypted content encryption key to the remote computer system.

Description

Claims (43)

What is claimed is:
1-45. (canceled)
46. A computer-implemented method, comprising:
receiving, by a licensing system, an encrypted content encryption key from a remote computer system and a packaging entity identifier, wherein the packaging entity identifier identifies a packaging entity providing encrypted content to a content recipient associated with the remote computer system, wherein the encrypted content encryption key is encrypted by the packaging entity using a packaging key;
generating, by the licensing system, the packaging key based on the packaging entity identifier and a secret root seed, wherein the secret root seed is inaccessible to the remote computer system and the packaging entity;
decrypting, by the licensing system, the encrypted content encryption key with the generated packaging key to generate a decrypted content encryption key; and
providing, by the licensing system, the decrypted content encryption key to the remote computer system for decrypting the encrypted content.
47. The method ofclaim 46, further comprising:
accessing a policy provided by the packaging entity and included in a request received from the remote computer system to decrypt the encrypted content encryption key, wherein the policy is signed by the packaging entity with a digital signature;
verifying, based on the digital signature, an absence of tampering with the policy as provided by the packaging entity; and
determining that the content recipient is authorized to access the encrypted content using the policy.
48. The method ofclaim 46, further comprising:
receiving a policy from the remote computer system specifying at least one usage right;
generating a content license restricting use of the encrypted content based on the at least one usage right, wherein the at least one usage right comprises at least one of restricting use of the encrypted content to a specified time period and restricting actions that can be performed with respect to the encrypted content; and
providing the content license to the remote computer system.
49. The method ofclaim 46, further comprising:
receiving a policy from the remote computer system specifying at least one first usage right;
obtaining a policy update from the packaging entity, wherein the policy update replaces the at least one first usage right with at least one second usage right;
modifying the policy using the policy update to reflect the at least one second usage right;
generating a content license restricting use of the encrypted content based on the at least one second usage right specified by the policy as modified; and
providing the content license to the remote computer system.
50. The method ofclaim 46, wherein providing the encrypted content encryption key to the remote computer system comprises:
encrypting a message including the encrypted content encryption key as decrypted by the packaging key, the message encrypted with an encryption key that corresponds to a decryption key accessible to the remote computer system; and
providing the encrypted message to the remote computer system.
51. The method ofclaim 46, wherein the method further comprises authenticating the content recipient.
52. The method ofclaim 46, further comprising:
assigning, by the licensing system, the packaging entity identifier to the packaging entity;
generating, by the licensing system, the packaging key based on the secret root seed and the packaging entity identifier, wherein the secret root seed is unknown to the packaging entity; and
providing, by the licensing system, the packaging entity identifier and the packaging key to the packaging entity.
53. The method ofclaim 52, further comprising:
assigning, by the licensing system, an additional packaging entity identifier that is different from the packaging entity identifier to an additional packaging entity different from the packaging entity;
generating, by the licensing system, an additional packaging key that is different from the packaging key based on the secret root seed and the additional packaging entity identifier;
providing, by the licensing system, the additional packaging entity identifier and the additional packaging key to the additional packaging entity.
54. The method ofclaim 52, wherein the packaging entity identifier and the packaging key are provided to the packaging entity prior to receiving a request from the remote computer system to decrypt the encrypted content encryption key.
55. The method ofclaim 52, wherein the packaging entity identifier and the packaging key are provided to the packaging entity via secure communication using a one- time network connection.
56. The method ofclaim 52, further comprising deleting, by the licensing system, the packaging key from a memory of the licensing system after providing the packaging entity identifier and the packaging key to the packaging entity, wherein the packaging key is regenerated by the licensing system after receiving a request from the remote computer system to decrypt the encrypted content encryption key.
57. A licensing system comprising:
a memory; and
at least one processor coupled to the memory, wherein the at least one processor is configured to execute program instructions stored in the memory, wherein the program instructions are configured for:
receiving an encrypted content encryption key from a remote computer system and a packaging entity identifier, wherein the packaging entity identifier identifies a packaging entity providing encrypted content to a content recipient associated with the remote computer system, wherein the encrypted content encryption key is encrypted by the packaging entity using a packaging key,
generating the packaging key based on the packaging entity identifier and a secret root seed, wherein the secret root seed is inaccessible to the remote computer system and the packaging entity,
decrypting the encrypted content encryption key with the generated packaging key to generate a decrypted content encryption key, and
providing the decrypted content encryption key to the remote computer system for decrypting the encrypted content.
58. The licensing system ofclaim 57, wherein the decrypted content encryption key is a symmetric key for decrypting the encrypted content.
59. The licensing system ofclaim 57, wherein the program instructions are further configured for:
accessing a policy provided by the packaging entity and included in a request received from the remote computer system to decrypt the encrypted content encryption key, wherein the policy is signed by the packaging entity with a digital signature;
verifying, based on the digital signature, an absence of tampering with the policy as provided by the packaging entity; and
determining that the content recipient is authorized to access the encrypted content using the policy.
60. The licensing system ofclaim 57, wherein the program instructions are further configured for:
receiving a policy from the remote computer system specifying at least one usage right;
generating a content license restricting use of the encrypted content based on the at least one usage right, wherein the at least one usage right comprises at least one of restricting use of the encrypted content to a specified time period and restricting actions that can be performed with respect to the encrypted content; and
providing the content license to the remote computer system.
61. The licensing system ofclaim 57, wherein the program instructions are further configured for:
receiving a policy from the remote computer system specifying at least one first usage right;
obtaining a policy update from the packaging entity, wherein the policy update replaces the at least one first usage right with at least one second usage right;
modifying the policy using the policy update to reflect the at least one second usage right;
generating a content license restricting use of the encrypted content based on the at least one second usage right specified by the policy as modified; and
providing the content license to the remote computer system.
62. The licensing system ofclaim 57, wherein generating the packaging key comprises performing a cryptographic hash function on the packaging entity identifier and the secret root seed to generate a result, wherein the generated packaging key is the result of the cryptographic hash function.
63. The licensing system ofclaim 57, wherein utilizing the generated packaging key to decrypt the encrypted content encryption key comprises utilizing the generated packaging key as a symmetric key to decrypt the encrypted content encryption key according to a symmetric decryption process.
64. The licensing system ofclaim 57, wherein providing the encrypted content encryption key to the remote computer system comprises:
encrypting a message including the encrypted content encryption key as decrypted by the packaging key, the message encrypted with an encryption key that corresponds to a decryption key accessible to the remote computer system; and
providing the encrypted message to the remote computer system.
65. The licensing system ofclaim 57, wherein the encrypted content is an encrypted electronic mail message.
66. The licensing system ofclaim 57, wherein the program instructions are further configured for authenticating the content recipient.
67. The licensing system ofclaim 57, wherein the program instructions are further configured for:
assigning the packaging entity identifier to the packaging entity;
generating, by the licensing system, the packaging key based on the secret root seed and the packaging entity identifier, wherein the secret root seed is unknown to the packaging entity; and
providing, by the licensing system, the packaging entity identifier and the packaging key to the packaging entity.
68. The licensing system ofclaim 67, wherein the program instructions are further configured for:
assigning an additional packaging entity identifier that is different from the packaging entity identifier to an additional packaging entity different from the packaging entity;
generating, by the licensing system, an additional packaging key that is different from the packaging key based on the secret root seed and the additional packaging entity identifier;
providing, by the licensing system, the additional packaging entity identifier and the additional packaging key to the additional packaging entity.
69. The licensing system ofclaim 67, wherein the packaging entity identifier and the packaging key are provided to the packaging entity prior to receiving a request from the remote computer system to decrypt the encrypted content encryption key.
70. The licensing system ofclaim 67, wherein the packaging entity identifier and the packaging key are provided to the packaging entity via secure communication using a one-time network connection.
71. The licensing system ofclaim 67, wherein the program instructions are further configured for deleting the packaging key from the memory of the licensing system after providing the packaging entity identifier and the packaging key to the packaging entity, wherein the packaging key is regenerated by the licensing system after receiving a request from the remote computer system to decrypt the encrypted content encryption key.
72. The licensing system ofclaim 67, wherein the licensing system comprises a trusted group of licensing servers, wherein the secret root seed is accessible to each licensing server of the trusted group of licensing servers, wherein the trusted group includes a licensing server having the memory and the at least one processor in a first geographic area and an additional licensing server having an additional memory and at least one additional processor in a second geographic area, wherein the at least one additional processor is configured to execute program instructions stored in the additional memory, wherein the program instructions are further configured for:
receiving the encrypted content encryption key,
generating the packaging key based on the packaging entity identifier and the secret root seed accessible to the licensing server and the additional licensing server;
decrypting the encrypted content encryption key with the generated packaging key to generate the decrypted content encryption key; and
providing the decrypted content encryption key to the remote computer system for decrypting the encrypted content.
73. A non-transitory computer-readable medium storing program instructions computer-executable on a computer system, the program instructions comprising:
program instructions for receiving an encrypted content encryption key from a remote computer system and a packaging entity identifier, wherein the packaging entity identifier identifies a packaging entity providing encrypted content to a content recipient associated with the remote computer system, wherein the encrypted content encryption key is encrypted by the packaging entity using a packaging key;
program instructions for receiving generating the packaging key based on the packaging entity identifier and a secret root seed, wherein the secret root seed is inaccessible to the remote computer system and the packaging entity;
program instructions for receiving decrypting the encrypted content encryption key with the generated packaging key to generate a decrypted content encryption key; and
program instructions for receiving providing the decrypted content encryption key to the remote computer system for decrypting the encrypted content.
74. The non-transitory computer-readable medium ofclaim 73, wherein the decrypted content encryption key is a symmetric key for decrypting the encrypted content.
75. The non-transitory computer-readable medium ofclaim 73, further comprising:
program instructions accessing a policy provided by the packaging entity and included in a request received from the remote computer system to decrypt the encrypted content encryption key, wherein the policy is signed by the packaging entity with a digital signature;
program instructions for verifying, based on the digital signature, an absence of tampering with the policy as provided by the packaging entity; and
program instructions for determining that the content recipient is authorized to access the encrypted content using the policy.
76. The non-transitory computer-readable medium ofclaim 73, further comprising:
program instructions for receiving a policy from the remote computer system specifying at least one usage right;
program instructions for generating a content license restricting use of the encrypted content based on the at least one usage right, wherein the at least one usage right comprises at least one of restricting use of the encrypted content to a specified time period and restricting actions that can be performed with respect to the encrypted content; and
program instructions for providing the content license to the remote computer system.
77. The non-transitory computer-readable medium ofclaim 73, further comprising:
program instructions for receiving a policy from the remote computer system specifying at least one first usage right;
program instructions for obtaining a policy update from the packaging entity, wherein the policy update replaces the at least one first usage right with at least one second usage right;
program instructions for modifying the policy using the policy update to reflect the at least one second usage right;
program instructions for generating a content license restricting use of the encrypted content based on the at least one second usage right specified by the policy as modified; and
program instructions for providing the content license to the remote computer system.
78. The non-transitory computer-readable medium ofclaim 73, wherein generating the packaging key comprises performing a cryptographic hash function on the packaging entity identifier and the secret root seed to generate a result, wherein the generated packaging key is the result of the cryptographic hash function.
79. The non-transitory computer-readable medium ofclaim 73, wherein utilizing the generated packaging key to decrypt the encrypted content encryption key comprises utilizing the generated packaging key as a symmetric key to decrypt the encrypted content encryption key according to a symmetric decryption process.
80. The non-transitory computer-readable medium ofclaim 73, wherein providing the encrypted content encryption key to the remote computer system comprises:
encrypting a message including the encrypted content encryption key as decrypted by the packaging key, the message encrypted with an encryption key that corresponds to a decryption key accessible to the remote computer system; and
providing the encrypted message to the remote computer system.
81. The non-transitory computer-readable medium ofclaim 73, wherein the encrypted content is an encrypted electronic mail message.
82. The non-transitory computer-readable medium ofclaim 73, further comprising program instructions for authenticating the content recipient.
83. The non-transitory computer-readable medium ofclaim 73, further comprising:
program instructions for assigning the packaging entity identifier to the packaging entity;
program instructions for generating the packaging key based on the secret root seed and the packaging entity identifier, wherein the secret root seed is unknown to the packaging entity; and
program instructions for providing the packaging entity identifier and the packaging key to the packaging entity.
84. The non-transitory computer-readable medium ofclaim 73, further comprising:
program instructions for assigning an additional packaging entity identifier that is different from the packaging entity identifier to an additional packaging entity different from the packaging entity;
program instructions for generating an additional packaging key that is different from the packaging key based on the secret root seed and the additional packaging entity identifier;
program instructions for providing the additional packaging entity identifier and the additional packaging key to the additional packaging entity.
85. The non-transitory computer-readable medium ofclaim 73, wherein the packaging entity identifier and the packaging key are provided to the packaging entity prior to receiving a request from the remote computer system to decrypt the encrypted content encryption key.
86. The non-transitory computer-readable medium ofclaim 73, wherein the packaging entity identifier and the packaging key are provided to the packaging entity via secure communication using a one-time network connection.
87. The non-transitory computer-readable medium ofclaim 86, further comprising program instructions for deleting the packaging key from a memory after providing the packaging entity identifier and the packaging key to the packaging entity, wherein the packaging key is regenerated by the licensing server after receiving a request from the remote computer system to decrypt the encrypted content encryption key.
US12/550,2642009-08-282009-08-28System and method for decentralized management of keys and policiesActive2031-02-03US8831228B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/550,264US8831228B1 (en)2009-08-282009-08-28System and method for decentralized management of keys and policies

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US12/550,264US8831228B1 (en)2009-08-282009-08-28System and method for decentralized management of keys and policies

Publications (2)

Publication NumberPublication Date
US8831228B1 US8831228B1 (en)2014-09-09
US20140289525A1true US20140289525A1 (en)2014-09-25

Family

ID=51455281

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US12/550,264Active2031-02-03US8831228B1 (en)2009-08-282009-08-28System and method for decentralized management of keys and policies

Country Status (1)

CountryLink
US (1)US8831228B1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9171138B1 (en)*2014-06-182015-10-27Storagecraft Technology CorporationSoftware activation and revalidation
US20150358297A1 (en)*2014-06-062015-12-10Dropbox, Inc.Secure peer-to-peer data sychronization
DE102016207441A1 (en)*2016-04-292017-11-02Siemens Aktiengesellschaft Method and device for controlling safety measures in automation, control and / or control systems
DE102016207635A1 (en)*2016-05-032017-11-09Siemens Aktiengesellschaft Method and device for securing device access
US20210072815A1 (en)*2016-02-262021-03-11Fornetix LlcPolicy-enabled encryption keys having complex logical operations
US11018866B2 (en)*2015-07-162021-05-25Cisco Technology, Inc.Dynamic second factor authentication for cookie-based authentication
US11038948B2 (en)*2018-05-242021-06-15Cisco Technology, Inc.Real time updates and predictive functionality in block chain
US20210209236A1 (en)*2018-06-272021-07-08At&T Intellectual Property I, L.P.Multi-phase digital content protection
US11470086B2 (en)2015-03-122022-10-11Fornetix LlcSystems and methods for organizing devices in a policy hierarchy
US11924345B2 (en)2015-03-132024-03-05Fornetix LlcServer-client key escrow for applied key management system and process

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
BR112014007398B1 (en)*2011-09-282022-04-05Hewlett-Packard Development Company, L.P Method performed by an electronic device and electronic device
JP6242036B2 (en)*2011-11-172017-12-06ソニー株式会社 Information processing apparatus, information storage apparatus, information processing system, information processing method, and program
US10015542B2 (en)*2013-03-152018-07-03Arris Enterprises LlcMethod and apparatus for secure storage and retrieval of live off disk media programs
US9008310B2 (en)2013-07-012015-04-14Disney Enterprises, Inc.Implementing encrypted content in a game
US9124430B2 (en)*2013-09-232015-09-01Venafi, Inc.Centralized policy management for security keys
US9369279B2 (en)2013-09-232016-06-14Venafi, Inc.Handling key rotation problems
US9559840B2 (en)*2013-10-182017-01-31Globalfoundries Inc.Low-bandwidth time-embargoed content disclosure
ITUB20152708A1 (en)*2015-07-312017-01-31St Microelectronics Srl PROCEDURE FOR OPERATING A CRITTOGRAPHY WITH SENSITIVE DATA MASKING, CRITTOGRAPHY AND CORRESPONDENT COMPUTER PRODUCT
CN106549926B (en)*2015-09-232019-12-10腾讯科技(深圳)有限公司method, device and system for authorizing account use permission
US10969748B1 (en)2015-12-282021-04-06Disney Enterprises, Inc.Systems and methods for using a vehicle as a motion base for a simulated experience
US10376776B2 (en)2016-01-202019-08-13Disney Enterprises, Inc.Systems and methods for providing a video game using information stored by physical objects
US11524242B2 (en)2016-01-202022-12-13Disney Enterprises, Inc.Systems and methods for providing customized instances of a game within a virtual space
JP7076819B2 (en)2016-09-152022-05-30ナッツ・ホールディングス、エルエルシー Move and store encrypted user data
WO2018053511A1 (en)2016-09-192018-03-22Ntt Innovation Institute, Inc.Threat scoring system and method
US11757857B2 (en)*2017-01-232023-09-12Ntt Research, Inc.Digital credential issuing system and method
US10970560B2 (en)2018-01-122021-04-06Disney Enterprises, Inc.Systems and methods to trigger presentation of in-vehicle content
US10841632B2 (en)2018-08-082020-11-17Disney Enterprises, Inc.Sequential multiplayer storytelling in connected vehicles
US12406283B2 (en)2018-11-132025-09-02Disney Enterprises, Inc.Systems and methods to present in-vehicle content based on characterization of products
US10785621B1 (en)2019-07-302020-09-22Disney Enterprises, Inc.Systems and methods to provide an interactive space based on vehicle-to-vehicle communications
US11076276B1 (en)2020-03-132021-07-27Disney Enterprises, Inc.Systems and methods to provide wireless communication between computing platforms and articles
KR20230021642A (en)2020-04-092023-02-14너츠 홀딩스 엘엘씨 Knots: Flexible hierarchical object graphs
US10873852B1 (en)2020-04-102020-12-22Avila Technology, LLCPOOFster: a secure mobile text message and object sharing application, system, and method for same
US11151229B1 (en)2020-04-102021-10-19Avila Technology, LLCSecure messaging service with digital rights management using blockchain technology
US12406185B1 (en)2020-07-152025-09-02Ntt Research, Inc.System and method for pruning neural networks at initialization using iteratively conserving synaptic flow
US12340371B2 (en)2021-07-282025-06-24Disney Enterprises, Inc.Systems and methods to adjust in-vehicle content based on digital assets
US12211031B2 (en)2021-08-112025-01-28Disney Enterprises, Inc.Systems and methods to compilate an experience summary based on real-world experiences
US12367484B2 (en)2021-11-302025-07-22Disney Enterprises, Inc.Systems and methods for effectuating real-world outcomes based on digital assets of users
CN114978694B (en)*2022-05-232024-07-23深圳云创数安科技有限公司Data volume generation method, device, equipment and storage medium based on digital signature
US12141791B2 (en)2022-11-072024-11-12Disney Enterprises, Inc.Systems and methods to adjust a unit of experience based on digital assets of users

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6049612A (en)*1997-03-102000-04-11The Pacid GroupFile encryption method and system
US20070206799A1 (en)*2005-09-012007-09-06Qualcomm IncorporatedEfficient key hierarchy for delivery of multimedia content
US20080020707A1 (en)*2004-06-282008-01-24Sony CorporationCommunication System And Communication Device
US20080189213A1 (en)*2007-02-052008-08-07Curtis BlakeSystem and method for digital rights management with license proxy for mobile wireless platforms
US20080310628A1 (en)*2005-01-312008-12-18Matsushita Electric Industrial Co., LtdBackup Management Device, Backup Management Method, Computer Program, Recording Medium, Integrated Circuit, and Backup System

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101398871B (en)1995-02-132011-05-18英特特拉斯特技术公司Systems and methods for secure transaction management and electronic rights protection
US20070156587A1 (en)2000-01-062007-07-05Super Talent Electronics Inc.Content Protection Using Encryption Key Embedded with Content File
US7237123B2 (en)2000-09-222007-06-26Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US20030014630A1 (en)2001-06-272003-01-16Spencer Donald J.Secure music delivery
GB2386710A (en)2002-03-182003-09-24Hewlett Packard CoControlling access to data or documents
US7174021B2 (en)2002-06-282007-02-06Microsoft CorporationSystems and methods for providing secure server key operations
KR100636150B1 (en)2004-07-012006-10-19삼성전자주식회사 Multimedia device including encryption module
EP1635545B1 (en)2004-09-142013-04-10Sony Ericsson Mobile Communications ABMethod and system for transferring of digital rights protected content using USB or memory cards
US7567671B2 (en)2005-06-102009-07-28Aniruddha GupteEncryption method and apparatus for use in digital distribution system
WO2008139335A1 (en)2007-05-132008-11-20Nds LimitedTransferring digital data
US8549278B2 (en)2007-10-202013-10-01Blackout, Inc.Rights management services-based file encryption system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6049612A (en)*1997-03-102000-04-11The Pacid GroupFile encryption method and system
US20080020707A1 (en)*2004-06-282008-01-24Sony CorporationCommunication System And Communication Device
US20080310628A1 (en)*2005-01-312008-12-18Matsushita Electric Industrial Co., LtdBackup Management Device, Backup Management Method, Computer Program, Recording Medium, Integrated Circuit, and Backup System
US20070206799A1 (en)*2005-09-012007-09-06Qualcomm IncorporatedEfficient key hierarchy for delivery of multimedia content
US20080189213A1 (en)*2007-02-052008-08-07Curtis BlakeSystem and method for digital rights management with license proxy for mobile wireless platforms

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20150358297A1 (en)*2014-06-062015-12-10Dropbox, Inc.Secure peer-to-peer data sychronization
US9171138B1 (en)*2014-06-182015-10-27Storagecraft Technology CorporationSoftware activation and revalidation
US11470086B2 (en)2015-03-122022-10-11Fornetix LlcSystems and methods for organizing devices in a policy hierarchy
US11924345B2 (en)2015-03-132024-03-05Fornetix LlcServer-client key escrow for applied key management system and process
US11018866B2 (en)*2015-07-162021-05-25Cisco Technology, Inc.Dynamic second factor authentication for cookie-based authentication
US20210072815A1 (en)*2016-02-262021-03-11Fornetix LlcPolicy-enabled encryption keys having complex logical operations
US11537195B2 (en)*2016-02-262022-12-27Fornetix LlcPolicy-enabled encryption keys having complex logical operations
DE102016207441A1 (en)*2016-04-292017-11-02Siemens Aktiengesellschaft Method and device for controlling safety measures in automation, control and / or control systems
DE102016207635A1 (en)*2016-05-032017-11-09Siemens Aktiengesellschaft Method and device for securing device access
US11038948B2 (en)*2018-05-242021-06-15Cisco Technology, Inc.Real time updates and predictive functionality in block chain
US20210209236A1 (en)*2018-06-272021-07-08At&T Intellectual Property I, L.P.Multi-phase digital content protection

Also Published As

Publication numberPublication date
US8831228B1 (en)2014-09-09

Similar Documents

PublicationPublication DateTitle
US8831228B1 (en)System and method for decentralized management of keys and policies
US8578157B2 (en)System and method for digital rights management with authorized device groups
US9805211B2 (en)System and method for multipronged authentication
US8707404B2 (en)System and method for transparently authenticating a user to a digital rights management entity
US20110185179A1 (en)System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component
US20130132733A1 (en)System And Method For Digital Rights Management With System Individualization
US9225520B2 (en)System and method for deterministic generation of a common content encryption key on distinct encryption units
US8959346B2 (en)System and method for a single request—single response protocol with mutual replay attack protection
US8527769B2 (en)Secure messaging with read-undeniability and deletion-verifiability
US8938619B2 (en)System and method for decrypting content samples including distinct encryption chains
US8527750B2 (en)System and method for generating multiple protected content formats without redundant encryption of content
US8359473B1 (en)System and method for digital rights management using digital signatures
US8972726B1 (en)System and method for digital rights management using a secure end-to-end protocol with embedded encryption keys
US9450748B2 (en)Decryption of content including partial-block discard
US8687809B2 (en)System and method for decryption of content including disconnected encryption chains
US10528753B2 (en)Portable document format file custom field
US20130124849A1 (en)System And Method For Individualizing Content For A Consumer
US9311492B2 (en)Media storage structures for storing content, devices for using such structures, systems for distributing such structures
EP3340559A1 (en)Method and system for facilitating secure communication between two or more devices
WO2020044095A1 (en)File encryption method and apparatus, device, terminal, server, and computer-readable storage medium
US9124422B2 (en)System and method for digital rights management with secure application-content binding
CN106603244B (en)A kind of digital literary property protection method and device
Mata et al.Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish)
MaCPSec DLP: Kernel‐Level Content Protection Security System of Data Leakage Prevention
Mistry et al.Access Control Mechanism for Cloud Data Using Block Chain and Proxy Re-Encryption

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:ADOBE SYSTEMS INCORPORATED, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AGRAWAL, SUNIL C.;REEL/FRAME:023167/0556

Effective date:20090828

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ASAssignment

Owner name:ADOBE SYSTEMS INCORPORATED, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NADELL, KATHERINE K.;REEL/FRAME:033464/0239

Effective date:20090828

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment:4

ASAssignment

Owner name:ADOBE INC., CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:ADOBE SYSTEMS INCORPORATED;REEL/FRAME:048525/0042

Effective date:20181008

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp