摘要:
A stream of content has multiple sub-streams, where each sub-stream comprises a part of the content and is divisible into logical blocks bounded by intrinsic partitions. For each sub-stream, a specification of the logical blocks bounded by the intrinsic partitions is defined and the sub-stream is divided into the logical blocks bounded by the intrinsic partitions. Each divided logical block is encrypted and then divided into one or more portions to produce corresponding pieces of data, and each piece of data is placed into a data packet as a payload thereof. Each data packet is transmitted to a recipient thereof, and the recipient can retrieve the pieces of data from the payloads of the packets, reconstruct the encrypted logical blocks, and manipulate the sub-stream on a per-logical block basis without necessarily decrypting each encrypted logical block.
摘要:
A system that facilitates enhancing a game, game play or playability of a game may include an experience component, a game component and an alteration component. The experience component can collect a portion of data related to a game in which the portion of data indicates at least one of a tip or a tactic for the game. The game component can dynamically incorporate the portion of data into the game during game play to enhance playability of such game for a user with assistance provided by at least one of the tip or the tactic. The alteration component may alter the game during game play.
摘要:
An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise alternations to the original environment to, for example, detect and/or prevent changes to the hardware and/or software intended to allow cheating or undesirable user behavior.
摘要:
Various embodiments provide methods and systems that utilize a protocol which enables media content protection by establishing a secure communication channel and, in some embodiments, a secure data channel, between a device such as a computing device running a protected content playback application, and a downstream component such as an associated driver, such as a graphics driver, of an associated display device such as a monitor, flat panel LCD, television and the like.
摘要:
An application on a computing device to write data to a storage medium associated therewith. The data is to be written to a secure storage area associated with an object on the storage medium, and the secure storage area has a value storage area associated therewith. The application generates a nonce and employs a shared session key (KS) to encrypt the nonce to result in (KS(nonce)). The storage medium receives same and decrypts with (KS) to result in the nonce, locates the value storage area associated with the secure storage area, and stores such nonce in the located value storage area. The application employs the nonce to generate a key (KH), encrypts the data with (KH) to result in (KH(data)), and sends same to the storage medium for storage in the secure storage area. Thus, (KH(data)) is associated with the nonce in the value storage area.
摘要:
In order to ensure that an entertainment access system is enabled to unify and simplify a user's enjoyment of content by managing the user's devices, entertainment content and usage rights, it is important to ensure the user devices, and the services they offer, function in accordance with well-established specifications and standards. Importantly, these specifications need to be the same from one device manufacturer to another. This is needed to ensure that the entertainment access system will be able to provide a consistent, reliable and predictable user experience to its users. In some illustrative examples, a certification program is implemented for user devices that receive and render the entertainment content received from the entertainment access system. The certification program establishes specifications to which the devices are to conform regardless of their manufacturer. The program also establishes a testing protocol to determine if the devices are manufactured in accordance with the specifications. The testing protocol is implemented on devices manufactured by the various manufacturers of the devices. Finally, a certificate is issued to those device manufacturers whose devices are demonstrated to be able to successfully complete the testing protocol. The certificate may also authorize the manufacturers to use a certificate mark on their products' packaging, literature and promotional information.
摘要:
In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate allowing the first device to temporarily consume content bound to the domain. The temporary domain certificate is sent to the first device, allowing the first device to temporarily consume content bound to the domain.
摘要:
A data stream is encrypted to form encryption units that are packetized into RTP packets. Each RTP packet includes an RTP packet header, one or more payloads of a common data stream, and a RTP payload format header for each payload and including, for the corresponding encryption units, a boundary for the payload. The payload can be one or more of the encryption units or a fragment of one of the encryption units. The encryption units are reassembled the using the payloads in the RTP packets and the respective boundary in the respective RTP payload format header. The reassembled of encryption units are decrypted for rendering. Each RTP payload format header can have attributes for the corresponding payload that can be used to render the payload. The RTP packets can be sent server-to-client or peer-to-peer.
摘要:
The claimed subject matter provides a system and/or a method that facilitates enhancing a game, game play or playability of a game. An experience component can collect a portion of data related to a game in which the portion of data indicates at least one of a tip or a tactic for the game. A game component can dynamically incorporate the portion of data into the game during game play to enhance playability of such game for a user with assistance provided by at least one of the tip or the tactic.
摘要:
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage.