发明名称 Methods and apparatus for protecting digital content
摘要 A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to receive a digital certificate from a presentation device. The processing system then uses public key infrastructure (PKI) to determine whether the presentation device has been authorized by a certificate authority (CA) to receive protected content. The processing system may also generate a session key and use the session key to encrypt data. The processing system may transmit the encrypted data to the presentation device only if the presentation device has been authorized by the CA to receive protected content. Presentation devices and repeaters may perform corresponding operations, thereby allowing content to be transmitted and presented in a protected manner. Other embodiments are described and claimed.
申请公布号 US8831213(B2) 申请公布日期 2014.09.09
申请号 US201213405819 申请日期 2012.02.27
申请人 Intel Corporation 发明人 Devanand Priyadarsini;Graunke Gary L.
分类号 H04L9/28 主分类号 H04L9/28
代理机构 Trop, Pruner & Hu, P.C. 代理人 Trop, Pruner & Hu, P.C.
主权项 1. A processing system capable of receiving and presenting protected digital content, the processing system comprising: a processor and control logic which, when used by the processor, results in the processing system performing operations comprising: receiving a first master key from a source device during a first session; generating a hash value and using the hash value to generate an encrypted version of the first master key during the first session; providing an identifier for the processing system to the source device during a second session; receiving verification data concerning the first master key from the source device during the second session, the receiving verification data comprising receiving the encrypted version of the first master key; regenerating the hash value and using the hash value to decrypt the encrypted version of the first master key during the second session; and in response to receiving the verification data from the source device, using the first master key to decrypt a session key for the second session.
地址 Santa Clara CA US