Patent application number | Description | Published |
20080294894 | Binding Content Licenses to Portable Storage Devices - Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host. | 11-27-2008 |
20080317292 | AUTOMATIC CONFIGURATION OF DEVICES BASED ON BIOMETRIC DATA - The claimed subject matter relates to an architecture that can obtain biometric data from a user as the user interacts with a device. Based upon the obtained biometric data, the architecture can determine an identity of the user and automatically apply settings associated with that particular user to the device. The settings can relate to a physical configuration of the device (or aspects, features, and/or peripherals of the device), as well as to a data set employed by the device (or components of the device). As such, a user of the device can benefit from enhanced efficiency, utility, and/or convenience. | 12-25-2008 |
20080319851 | Using delegation for distributing protected content - In various embodiments, a content distribution model is provided in which content providers that own content can distribute their content to third-party content distributors who are unaffiliated with the content providers. The content distributors can, in turn, manipulate the content to provide supplemental content, such as advertising and the like, and then distribute the manipulated content to users who are authorized to consume the content. In this way, content providers are relieved of the responsibility of owning or controlling how such other supplemental content is integrated with their protected content. In this manner, manipulation of the content is delegated to third party content distributors. In one or more embodiments, a ticket-based approach is used as a basis to authenticate that third-party distributors are, in fact, authorized to distribute presentations that include the content provider's content. The ticket-based approach can be used for both server-based verification and client-based verification scenarios. | 12-25-2008 |
20080320551 | Controlling access to multiple pieces of content of a presentation - In one or more embodiments, a license associated with a first piece of content can grant rights with respect to a second and/or additional pieces of content. That is, language that is included in a first license can express a policy that is interpreted by a client-side device. This policy can establish rights with respect to additional pieces of content. Accordingly, policy enforcement with respect to licensed content can take place on the client-side device and can establish how different content is to be played relative to one another. | 12-25-2008 |
20090006624 | Entertainment Access Service - This document describes tools capable of managing digital content based on a user's identity. By so doing, the tools free people from the limitations of their storage media and devices. If a user's CD breaks or hard drive fails, the tools permit a user to continuing accessing his content. If a user wants to use a new device or even many new devices, even if those devices play content with a different format than a user's existing devices, the tools may permit him to play his content on those new devices. If a user wants to share content with a friend, the tools may permit it even if the user does not have the content on hand. | 01-01-2009 |
20090006854 | Secure time source operations for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage. | 01-01-2009 |
20090006862 | Provisioning a computing system for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 01-01-2009 |
20090006868 | Secure storage for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage. | 01-01-2009 |
20090007279 | Rights enforcement of unencrypted content - In accordance with one or more aspects of the rights enforcement of unencrypted content, a nameplate associated with unencrypted content is generated. The nameplate includes an identifier of the unencrypted content and an identifier of an authorized user of the unencrypted content. The nameplate is sent to a device of the authorized user for rights enforcement of the unencrypted content on the device. In accordance with one or more other aspects of the rights enforcement of unencrypted content, a nameplate for unencrypted content to be played back on a device is obtained. The nameplate includes an identifier of the unencrypted content and an identifier of an authorized user of the unencrypted content. The device presents, during playback of the unencrypted content on the device, the identifier of the authorized user of the unencrypted content. | 01-01-2009 |
20090097642 | Secure Content Distribution with Distributed Hardware - This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between distributed hardware units. The tools, for example, may distribute content protection in hardware between a policy unit, a transcryption unit, a graphics processing unit, and a playback unit. By so doing the tools enable, among other things, users to select from many graphics cards rather than rely on the graphics capabilities of an integrated (e.g., SOC) hardware solution. | 04-16-2009 |
20090135849 | RTP Payload Format - A data stream is encrypted to form encryption units that are packetized into RTP packets. Each RTP packet includes an RTP packet header, one or more payloads of a common data stream, and a RTP payload format header for each payload and including, for the corresponding encryption units, a boundary for the payload. The payload can be one or more of the encryption units or a fragment of one of the encryption units. The encryption units are reassembled the using the payloads in the RTP packets and the respective boundary in the respective RTP payload format header. The reassembled of encryption units are decrypted for rendering. Each RTP payload format header can have attributes for the corresponding payload that can be used to render the payload. The RTP packets can be sent server-to-client or peer-to-peer. | 05-28-2009 |
20100138647 | ENCRYPTION SCHEME FOR STREAMED MULTIMEDIA CONTENT PROTECTED BY RIGHTS MANAGEMENT SYSTEM - A stream of content has multiple sub-streams, where each sub-stream comprises a part of the content and is divisible into logical blocks bounded by intrinsic partitions. For each sub-stream, a specification of the logical blocks bounded by the intrinsic partitions is defined and the sub-stream is divided into the logical blocks bounded by the intrinsic partitions. Each divided logical block is encrypted and then divided into one or more portions to produce corresponding pieces of data, and each piece of data is placed into a data packet as a payload thereof. Each data packet is transmitted to a recipient thereof, and the recipient can retrieve the pieces of data from the payloads of the packets, reconstruct the encrypted logical blocks, and manipulate the sub-stream on a per-logical block basis without necessarily decrypting each encrypted logical block. | 06-03-2010 |
20100161985 | Methods and Systems for Protecting Media Content - Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel and, in some embodiments, a secure data channel, between a device such as a computing device running a protected content playback application, and a downstream component such as an associated driver, such as a graphics driver, of an associated display device such as a monitor, flat panel LCD, television and the like. | 06-24-2010 |
20100223656 | TRUSTED ENTITY BASED ANTI-CHEATING MECHANISM - An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise alternations to the original environment to, for example, detect and/or prevent changes to the hardware and/or software intended to allow cheating or undesirable user behavior. | 09-02-2010 |
20100280954 | EXTENSIBLE MEDIA RIGHTS - A DRM System. A DRM system comprising a service provider, a CE device coupled to the service provider, and an XMR license disposed upon the CE device. | 11-04-2010 |
20120306920 | AUGMENTED REALITY AND FILTERING - A system (and corresponding method) that can enhance a user experience by augmenting real-world experiences with virtual world data to is provided. The augmented reality system discloses various techniques to personalize real-world experiences by overlaying or interspersing virtual capabilities (and data) with real world situations. The innovation can also filter, rank, modify or ignore virtual-world information based upon a particular real-world class, user identity or context. | 12-06-2012 |