Patent application number | Description | Published |
20080255994 | Content Preview - Techniques enable creation of a preview license for digital content. In some instances, the preview license indicates that it allows a content-consuming device to consume less than all of the content. This preview license may create a list specifying multiple portions of the digital content that the content-consuming device may consume. These techniques may also present to a device user an offer to purchase rights to consume all of the digital content after consumption of the preview-licensed portion(s). In other instances, a content server may embed the preview license into a content package that contains the digital content, allowing the server to distribute the package to multiple devices. In still other instances, the preview license may be bound to a domain rather than to individual devices. This allows member devices to share the digital content and the preview license, such that each member device may enjoy the preview experience. | 10-16-2008 |
20080256341 | Data Processing Pipeline Selection - Strategies for automatically selecting the most appropriate processing pipeline (or runtime) for a particular data item are described. In one embodiment, a media playing application automatically selects the most appropriate media processing pipeline for a media data item from multiple available processing pipelines, or candidates. In this regard, the application makes this selection by utilizing heuristic techniques to identify which available pipeline provides the most enhanced playback experience to a user with respect to certain attributes such as supported playback features and security. These heuristic techniques can take one or more criteria into account and can be implemented in any suitable way. By way of example and not limitation, in one embodiment, a selection process is used wherein potential pipeline candidates are ordered and sequentially evaluated. | 10-16-2008 |
20080256539 | Fault Tolerant and Hang Resistant Media Processing Applications - Techniques for playing a media file in a multimedia application include launching a multimedia application as one process and automatically launching a pipeline of one or more media processing components as one or more isolated processes. In this manner, any untrustworthy components can be executed in an isolated process that is separate from the execution process of the multimedia application, thereby improving fault tolerance and hang resistance. | 10-16-2008 |
20080256592 | Managing Digital Rights for Multiple Assets in an Envelope - Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of these assets may be assigned a policy that may be different than the policy assigned to the first asset. This envelope, or a collection of envelopes, may then be provided to a content-consuming device to consume the assets in accordance with each asset's specified policy. | 10-16-2008 |
20080294894 | Binding Content Licenses to Portable Storage Devices - Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host. | 11-27-2008 |
20080319851 | Using delegation for distributing protected content - In various embodiments, a content distribution model is provided in which content providers that own content can distribute their content to third-party content distributors who are unaffiliated with the content providers. The content distributors can, in turn, manipulate the content to provide supplemental content, such as advertising and the like, and then distribute the manipulated content to users who are authorized to consume the content. In this way, content providers are relieved of the responsibility of owning or controlling how such other supplemental content is integrated with their protected content. In this manner, manipulation of the content is delegated to third party content distributors. In one or more embodiments, a ticket-based approach is used as a basis to authenticate that third-party distributors are, in fact, authorized to distribute presentations that include the content provider's content. The ticket-based approach can be used for both server-based verification and client-based verification scenarios. | 12-25-2008 |
20080320551 | Controlling access to multiple pieces of content of a presentation - In one or more embodiments, a license associated with a first piece of content can grant rights with respect to a second and/or additional pieces of content. That is, language that is included in a first license can express a policy that is interpreted by a client-side device. This policy can establish rights with respect to additional pieces of content. Accordingly, policy enforcement with respect to licensed content can take place on the client-side device and can establish how different content is to be played relative to one another. | 12-25-2008 |
20090006854 | Secure time source operations for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage. | 01-01-2009 |
20090006862 | Provisioning a computing system for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 01-01-2009 |
20090006868 | Secure storage for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage. | 01-01-2009 |
20090012805 | Portable Digital Rights for Multiple Devices - Portable digital rights for multiple devices is described. In an embodiment, a digital rights management (DRM) system includes a first device with a removable component configured as a token that is associated with a DRM license. The first device also includes a removable memory card that stores protected media content on which the first device can perform actions as permitted by the DRM license. The DRM system also includes a second device that can have the removable component and the removable memory card when removed from the first device and installed in the second device such that the second device can perform the actions on the protected media content as permitted by the DRM license. | 01-08-2009 |
20090097642 | Secure Content Distribution with Distributed Hardware - This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between distributed hardware units. The tools, for example, may distribute content protection in hardware between a policy unit, a transcryption unit, a graphics processing unit, and a playback unit. By so doing the tools enable, among other things, users to select from many graphics cards rather than rely on the graphics capabilities of an integrated (e.g., SOC) hardware solution. | 04-16-2009 |
20090157552 | DIGITAL CONTENT PACKAGING, LICENSING AND CONSUMPTION - A DRM technique involves packaging an advertisement using a data structure that encapsulates a number of advertising segments along with signed information, such as a table of hashes, associated with some of the advertising segments. In one scenario, the data structure and the signed information are separately protected using public key and/or digital signature cryptographic schemes. The advertisement is delivered to a user of a consumer electronic device (CED) separately from delivery of a digital license, which governs user consumption of the advertisement. The digital license includes keys used in connection with the cryptographic scheme, and references a condition to be satisfied with respect to consumption of the advertisement. As advertising segments are verified and consumed by the user/CED, information is recorded and used to determine whether the license condition was satisfied. Satisfaction of the license condition may result in access to program content or additional licenses. | 06-18-2009 |
20090183010 | Cloud-Based Movable-Component Binding - This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic function. By so doing the mobile computing device may request access to content and receive permission to use the content quickly and in a cryptographically robust way. | 07-16-2009 |
20090323818 | ASYNCHRONOUS MEDIA FOUNDATION TRANSFORM - This disclosure describes methods, systems, and programming interfaces for more efficiently processing media data in a media pipeline. In one embodiment, media flow in a media system is coordinated using a media foundation transform supported by a programming interface. The programming interface generates input and output events to the requisite media system thereby permitting the media foundation transform control over when input frames are requested and received and output frames are retrieved. | 12-31-2009 |
20090327059 | DIGITAL RIGHTS MANAGEMENT SUPPORT FOR METERING IN ADVERTISING SCENARIOS - DRM support for metering in advertising scenarios is provided by an arrangement in which metering requests are included along with usage policies in licenses that grant rights to a presentation that comprises multiple pieces of metered media content that are sourced from different providers. A DRM runtime environment on a computing device such as a PC or mobile device will report metering data to locations specified in the metering requests while also enforcing the policies. The metering requests passed in the license enable each piece of media content in the presentation to be individually metered and the metering data sent to different entities at different locations. The DRM runtime environment on the computing device can prevent third parties from requesting that metering data be sent to other locations. The policies may be configured to block or restrict playback of media content if metering data is not submitted. | 12-31-2009 |
20100131765 | ANONYMOUS VERIFIABLE PUBLIC KEY CERTIFICATES - The anonymity of a user at a client computer may be preserved when authenticating with an on-line service or content provider through the use of an anonymous and verifiable (i.e., “blind”) certificate set that is created by a certificate authority from a fixed-size set of PKI key pairs. The certificate authority randomly selects a subset of PKI key pairs to generate the blind certificate set where each certificate in the set includes a respective public key from the PKI key pair subset. The certificate authority also sends the private keys from the PKI key pair subset to the user. During authentication, the client computer is configured to randomly select a subset of one or more certificates from the set to present to the provider. The provider will encrypt content using the public keys in the subset of certificates and the client will decrypt the content with the corresponding private keys. | 05-27-2010 |
20140173750 | Provisioning a Computing System for Digital Rights Management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 06-19-2014 |