US 12,169,536 B2
Method and system for secure distribution of selected content to be protected
David H. Sitrick, Pacific Palisades, CA (US); and Russell T. Fling, Naperville, IL (US)
Assigned to OL SECURITY LIMITED LIABILITY COMPANY, Wilmington, DE (US)
Filed by OL SECURITY LIMITED LIABILITY COMPANY, Dover, DE (US)
Filed on Jan. 3, 2024, as Appl. No. 18/403,521.
Application 18/403,521 is a continuation of application No. 17/957,564, filed on Sep. 30, 2022, granted, now 11,868,447.
Application 17/957,564 is a continuation of application No. 17/092,109, filed on Nov. 6, 2020, granted, now 11,461,434, issued on Oct. 4, 2022.
Application 17/092,109 is a continuation of application No. 16/241,835, filed on Jan. 7, 2019, granted, now 11,003,742, issued on May 11, 2021.
Application 16/241,835 is a continuation of application No. 15/619,369, filed on Jun. 9, 2017, granted, now 10,176,305, issued on Jan. 8, 2019.
Application 15/619,369 is a continuation of application No. 15/130,905, filed on Apr. 15, 2016, granted, now 9,679,118, issued on Jun. 13, 2017.
Application 15/130,905 is a continuation of application No. 11/545,889, filed on Oct. 11, 2006, abandoned.
Prior Publication US 2024/0143792 A1, May 2, 2024
Int. Cl. G06F 21/10 (2013.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC G06F 21/10 (2013.01) [G06F 21/602 (2013.01); H04L 9/0863 (2013.01); H04L 9/0866 (2013.01); H04L 63/0435 (2013.01); H04L 63/062 (2013.01); H04L 2209/60 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A memory storing instructions that, when executed by a processor, cause the processor to perform operations comprising:
outputting encrypted content for decryption, at a recipient device, using a production key;
wherein the content comprises data representative of a still image, motion video or audio associated with one or more usage rights enforced using the production key;
wherein the one or more usage rights allow first access to the content, and wherein the operations further comprise:
encrypting a ticket or other file with control data that allows a second different access to the content, the encrypting the ticket or other file using the production key; and
outputting the encrypted ticket or other file for use by a decryption engine;
wherein the production key is created using an identifier generated from an identifying characteristic corresponding to the recipient device indicating at least one feature of the recipient device or an application running at the recipient device and:
a password provided as input to computing device key hash logic used to generate hash values,
a unique ID generated from within the recipient device itself, a hardware serial number or other fixed computing device identification parameter of the recipient device, or
authorization information generated by a system remote from the recipient device following the recipient device identifying itself to the remote system.