摘要:
Digital rights management is described involving a device, a content issuer, and a rights issuer. A content encryption key (CEK) is encrypted using a public key associated with the device to produce an encrypted CEK. The encrypted CEK is encrypted using an issuer encryption key to produce a twice encrypted CEK. The twice encrypted CEK is encrypted using the public key to produce a ciphertext included in a rights object. The rights object is available to the device for decrypting digital content associated with the content issuer. The device can then decrypt the rights object ciphertext using its private key to produce a decrypted rights object ciphertext and decrypt the decrypted rights object ciphertext using an issuer decryption key received from the content issuer to produce an encrypted CEK. The encrypted CEK is decrypted using the private key to obtain the CEK, which is then available for decrypting digital content.
摘要:
A voltage drop compensating circuit is disclosed which compensates for unwanted voltage drops along a DC current conductor connected to an integrated circuit. The compensating circuit includes a differential amplifier connected between a voltage supply and the conductor form the integrated circuit which is marred by the voltage drop. One input terminal of the amplifier is connected to the supply lead and an output terminal of the amplifier is connected to the conductor. A feedback network is connected between another input terminal of the amplifier and the integrated circuit. A potential difference between the two input terminals on the amplifier will lead to the amplifier adjusting a potential on the output terminal until the unwanted voltage drop along the conductor is compensated for.
摘要:
Methods and apparatus for securely streaming multimedia packets, such as RTP packets, are disclosed, in which the payloads of the packets are shuffled. This reordering is performed using a shuffling function that depends on sequence numbers associated with each of the packets, a pre-determined group size N, and a pre-determined initialization value; in some embodiments this shuffling function comprises a cryptographic hashing function or other one-way function. A receiving device may reverse the shuffling, using a similar shuffling function, if the pre-determined group size N and the pre-determined initialization value are known.
摘要:
The invention refers to monitoring usage of digital content provided from a content provider over a network to a client system. In the client system, a logging agent generates and stores information concerning usage of the digital content individually for each usage to be monitored. The generated information is entered in a usage log, either stored in the client system or at a trusted party. The logged usage information is also authenticated allowing identification of the client using the associated digital content. The entries of the log may include a representation of the content, information about usage quality and/or usage time. The logging agent is preferably implemented in a portable tamper-resistant module, e.g. a network subscriber identity module. The module may be pre-manufactured with the logging agent, or the agent can be downloaded thereto.
摘要:
A content sharing group node of a content sharing group is disclosed. The content sharing node is arranged to receive a sharing right comprising boundaries of redistribution of the sharing right and content sharing group membership restrictions to further content sharing group nodes of the content sharing group, arranged to access the content according to the combined restrictions of the sharing right and a usage right, and arranged to re-distribute the sharing right within the boundaries of re-distribution of the sharing right and to restrict its content sharing group membership according to the sharing right, wherein the content sharing group is defined as the sharing right is redistributed. Methods and computer programs for content sharing are also disclosed.
摘要:
This document discloses an advantageous approach to using a digital rights management (DRM) system that is already available to an electronic device, for security and rights management in electronic ticketing transactions. Exploiting the digital rights management system, which may be a pre-existing “standardized” DRM solution, decreases the processing and memory resources needed in an electronic device for implementation of an electronic ticketing application, while advantageously gaining the proven security of established DRM systems.
摘要:
A method and system are described for providing Digital Rights Management-protected (DRM-protected) electronic content to user equipment whose operation is at least in part supported by a platform. When the content is received at a rendering server within the platform, the rendering server requests validation of usage rights associated with the content from a platform DRM module. The DRM module determines whether a DRM content type of the content is associated with a support module in an application domain and, if so, supplies the validation request to the associated support module via an interface with the support module. Otherwise, the validation request is processed at the DRM module. In either case, the content is rendered at the rendering server and made available to the user equipment according to a response to the validation request. The DRM functionality of the support module can be changed by third parties.
摘要:
A display screen, for example a touch-sensitive screen, provides a first type of audible output when a region of the display screen is indicated for possible input, and a second type of audible output when an input is made at a region of the display screen. The display screen may be provided in a communications device such as a mobile phone, with different regions of the screen representing the numeric keys of the phone. Without looking at the screen, the user can then use the audible output indicating that he is touching a region representing a key, to determine the position of his finger on the screen
摘要:
A method and an arrangement for controlling the output voltage (V2) of a DC-to-DC converter (100). The DC-to-DC converter (100) comprises converting means (101) and regulating means (102). The converting means is fed by a first DC-voltage (V1) from the regulating means. The first DC-voltage (V1) is determined by a feed back portion (VDIV) of the output voltage (V2) from the converting means and a reference voltage (VREF). The reference voltage is derived from a pulse train (PT1). The output voltage (V2) depends on both the first DC-voltage (V1) and the pulse train (PT1). The output voltage (V2) from the DC-to-DC converter is kept constant under varying load and the output voltage level can be adjusted in an easy and flexible manner by the pulse train.
摘要:
A method for establishing a secured communication channel, between a first processing component and a second processing component; the method comprising executing a digital rights management agent on a processing unit, the digital rights management agent being configured to enforce permissions associated with digital content based on a digital rights management protection mechanism; receiving, by the digital rights management agent at least a security data item, the security data item including a session key data item; verifying authenticity of the received session key data item by the digital rights management agent using said digital rights management protection mechanism; providing the verified session key data item by the digital rights management agent to at least the second processing component; establishing a secured communication channel between the first and second processing components using at least the provided session key data item.