US 12,278,896 B2
Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
David H. Sitrick, Highland Park, IL (US); and Russell T. Fling, Naperville, IL (US)
Assigned to OL Security Limited Liability Company, Dover, DE (US)
Filed by OL Security Limited Liability Company, Dover, DE (US)
Filed on Apr. 19, 2023, as Appl. No. 18/303,517.
Application 18/303,517 is a continuation of application No. 17/156,516, filed on Jan. 22, 2021, granted, now 11,664,984.
Application 17/156,516 is a continuation of application No. 15/202,532, filed on Jul. 5, 2016, granted, now 10,924,272, issued on Feb. 16, 2021.
Application 15/202,532 is a continuation of application No. 14/217,116, filed on Mar. 17, 2014, granted, now 9,384,333, issued on Jul. 5, 2016.
Application 14/217,116 is a continuation of application No. 11/546,106, filed on Oct. 11, 2006, granted, now 8,719,954, issued on May 6, 2014.
Prior Publication US 2023/0344627 A1, Oct. 26, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/08 (2006.01); G06F 21/10 (2013.01); H04L 9/06 (2006.01)
CPC H04L 9/0869 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0861 (2013.01); H04L 9/0891 (2013.01); G06F 21/107 (2023.08); H04L 2209/60 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A hardware memory storing instructions, the instructions executable by a processor to perform operations comprising:
outputting encrypted content for decryption, at a recipient device, using a production key;
wherein the content comprises data representative of a still image, motion video or audio associated with usage rights defining permitted uses for the data, the usage rights enforced using the production key; and
wherein the production key is generated based at least in part on 1) hash values, a unique ID, or authorization information and 2) a feature of a hardware element of a recipient device or a feature of a software element of the recipient device;
a password provided as input to computing device key hash logic used to generate the hash values,
the unique ID generated from within the recipient device itself, or generated from a fixed computing device identification parameter of the recipient device,
the authorization information generated by a system remote from the recipient device following the recipient device identifying itself to the remote system.