Patent classifications
H04L2463/101
Method and apparatus for creating and using quantum resistant keys
A system is disclosed for securely communicating between a user device and a target device, which includes a user input receiving user inputs and a user device memory for storing at least one fixed dataset having a plurality of data bits and an inherent entropy. At least one predetermined harvest process is stored in ser device memory, which is operable within a main harvest process to distill the dataset to a predetermined bit length to define a private key of the user at a predetermined key length. A processor operates to execute the main harvest process to receive a unique user Personal Information Number (PIN) acquired by the user and having a plurality of digits associated therewith, and wherein the at least one predetermined harvest process is dependent on the user PIN and the value of at least one of the digits therein, such that the at least one predetermined harvest process is parameterized by the value of the at least one of the digits and operates differently for each value of the at least one of the digits. The processor applies the at least one predetermined harvest process to the dataset to distill the dataset down to the predetermined key length to define the private key, and then stores the private key to the user device. A target device memory and an encryption engine on the target device interface with a proximity-based link. The private key is transferred to the target device via the proximity-based link and an interface on the target device stores the transmitted private key in the target device memory.
Information processing devices and information processing methods
An information processing device, wherein the information processing device includes circuitry configured to: copy, in response to an instruction for play back of a content, encrypted content data; decrypt the copied encrypted content data for obtaining the content data representing the content; and apply a data protection algorithm on the content data to generate protected content data representing protected content, wherein the protected content is played back.
METHOD FOR RECEIVING CONTENT IN USER DEVICE OVER CDN
The method includes the steps, performed by the user device, of: sending an access request to access a content to a content provider system; receiving, from the content provider system, an access token for said content, said access token including an encrypted session key, and a Digital Right Management, DRM, license, including the session key; and transmitting a content request including the received access token to a content delivery network and, in response, receiving from the content delivery network content data of the requested content, in a communication session; wherein the content request further comprises an authentication tag obtained by executing a cryptographic operation, performed by a DRM client module of the user device, of signing and/or encrypting, with the session key of the received DRM license, input data that is based on at least part of the content request.
Distributed license management for a data limited application
The invention is directed towards enabling data volume and data type based licensing of software in a distributed system of a plurality of remote and/or local nodes. The invention enables measuring and optionally restricting the use of software based on one or more provided licenses that restrict the amount and type of data that may be processed by the software. New and older licenses may be added together for a single, bulk entitlement for a given volume of data processing for one or all types of data. Different users in the same enterprise may combine license entitlements too. Also, a new license can be acquired repeatedly, without requiring the issuance of combined licenses by the issuing authority and/or the revocation of prior licenses.
Network resource access control methods and systems using transactional artifacts
Methods and systems are provided for use with digital data processing systems to control or otherwise limit access to networked resources based, at least in part, on transactional artifacts and/or derived artifacts. The transactional artifacts and/or derived artifacts are processed based on transactional relationships between devices within the digital data processing systems.
Method of enabling digital music content to be downloaded to and used on a portable wireless computing device
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc., This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.
Methods and systems for enabling communications between devices
Methods and systems for selecting and delivering content are provided. More particularly, content can be delivered to an output device from a user device through a device adaptor, such as an over-the-top (OTT) device. The OTT device or devices available to the user device are determined by a communication server. In particular, the OTT device or devices available to the user device are limited to those OTT devices associated with an output device in the user's room, or that the user is otherwise authorized to access.
Systems and methods for content security
Systems and methods are for content security may comprise transmitting a request for authorization to access secured content. A content key for the secured content may be received and stored to a restricted region of a memory. A device security module may have access to the restricted region and may decrypt, based on satisfaction of a use condition and using the content key, the secured content. An encryption key associated with a secure media system authorized to access the secured content may be received. The device security module may encrypt, using the encryption key, the secured content and route the secured content to the secure media system.