发明名称 SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT
摘要 Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder's ability to decrypt data depends on the key's position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content.
申请公布号 US2016191993(A1) 申请公布日期 2016.06.30
申请号 US201615063331 申请日期 2016.03.07
申请人 Amazon Technologies, Inc. 发明人 Roth Gregory B.;Barbour Marc R.;Behm Bradley Jeffery;Ilac Cristian M.;Brandwine Eric Jason
分类号 H04N21/4405;H04N21/4627;H04L9/08 主分类号 H04N21/4405
代理机构 代理人
主权项 1. A computer-implemented method, comprising: under the control of a computer system configured with executable instructions, obtaining license information that specifies a set of key derivation parameters;obtaining encrypted data that comprise multiple copies of a portion of the encrypted data, each copy of the multiple copies being decryptable using a different key and being distinguishable from at least one other copy of the multiple copies;deriving, based at least in part on the set of key derivation parameters and a first key, a second key to result in a derived second key;using the derived second key to decrypt the portion to result in a decrypted portion; andprovide the decrypted portion.
地址 Seattle WA US