Cryptography – Key management – Key distribution
Reexamination Certificate
2007-10-11
2011-11-15
Moazzami, Nasser (Department: 2436)
Cryptography
Key management
Key distribution
C705S071000, C726S001000
Reexamination Certificate
active
08059820
ABSTRACT:
Protecting content. A recipient receives content from a publisher. Some content is managed by an access server. The access server controls the recipient's use of managed content through interaction with a trusted agent at the recipient. The content is encrypted to a content key, and the content is associated with policy information. The policy information includes the content key for decrypting the content. The policy information is encrypted to an access server key allowing the policy information to be decrypted by the access server. The content key is received from the access server. The content key is encrypted to a trusted agent key. The content key is further encrypted to additional factor(s) defining additional content protection beyond that provided by trusted agent. The content key is decrypted using the trusted agent key and the at least one additional factor. The content is decrypted using the content key.
REFERENCES:
patent: 6098056 (2000-08-01), Rusnak et al.
patent: 2003/0023862 (2003-01-01), Yamasaki
patent: 2004/0003268 (2004-01-01), Bourne
patent: 2004/0187018 (2004-09-01), Owen et al.
patent: 2005/0149759 (2005-07-01), Vishwanath et al.
patent: 2005/0228993 (2005-10-01), Silvester et al.
patent: 2005/0278775 (2005-12-01), Ross
patent: 2006/0178997 (2006-08-01), Schneck et al.
patent: 2006/0184787 (2006-08-01), Sandhu et al.
patent: 2006/0235795 (2006-10-01), Johnson et al.
patent: 2006/0253894 (2006-11-01), Bookman et al.
patent: 2007/0011452 (2007-01-01), Marquet et al.
patent: 2007/0022196 (2007-01-01), Agrawal
patent: 2007/0186106 (2007-08-01), Ting et al.
patent: 10-2004-0096493 (2004-11-01), None
patent: 2004-109482 (2004-12-01), None
Lexdon Business Library, “Digital Insight and TriCipher Partner to Enhance Online Banking Security With Multifactor Authentication”, 2 pages, http://www.lexdon.com/article/Digital—Insight—and—TriCipher—Partner/3609.html.
Sourcewire, “RSA San Francisco—Avoco Secure Introduces Solutions that Combine High-Assurance Digital Credentials from IdenTrust and Avoco's secure2 Product Line and announce a New Release of secure2trust, Which Supports Microsoft Office Outlook”, 5 pages, 2006, http://www.sourcewire.com/releases/rel—display.php? relid=29494&hilite=.
Unlu, Vural, et al., “The access-usage-control-matrix: A heuristic tool for implementing a selected level of technical content protection”, Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC'05) 2005 IEEE, http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/10218/32584/01524099.pdf?arnumber=1524099.
Infosecurity A Fanatic Media Publication, “Authentication Multi-Factor Authentication—Part 5 Securing Information With Multi-Layered Security”, Jul. 2007, 2 pages, http://fanaticmedia.com/infosecurity/archive/july07/Authentication%20—%20Part%205.pdf.
Cross David B.
Kamat Mayur
Malaviarachchi Rushmi U.
Lewis Lisa
Microsoft Corporation
Moazzami Nasser
Workman Nydegger
LandOfFree
Multi-factor content protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Multi-factor content protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Multi-factor content protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4308270