摘要:
A system and method for returning a rights management object (103) to a rights issuer (102) is provided. The system and method allows a rights issuer (102) to ensure that the rights management object (103) is removed from an electronic device (101) prior to making the refund, while providing the customer with the ability to retrieve the rights management object (103) where the return is unsuccessful. After initiating a return, an electronic device (101) transmits probabilistic data structures (226,228) to the rights issuer (102). The probabilistic data structures (226,228) having indicia therein of rights management objects disposed within the electronic device (101). The electronic device (101) encrypts the rights management object (103), delivers it to the rights issuer (102), and removes it from the electronic device (101). By querying the probabilistic data structures (226,228), which may be Bloom filters, the rights issuer (102) is able to confirm that the rights management object (103) has been deleted from the electronic device (101).
摘要:
A method and system, suitable for using an original entertainment file for playing as a ring tone on a communication device (104), is provided. The method includes decrypting (304) a part of the original entertainment file using an authorization key upon receiving an incoming call signal. The part of the original entertainment file is played (306) until the incoming call signal is acknowledged. The method further includes decrypting (308) a remaining part of the original entertainment file using the authorization key after the incoming call signal is acknowledged. The remaining part of the original entertainment file is then encrypted (310) using a local authorization key to form a second entertainment file. The second entertainment file is then stored (312) in the communication device.
摘要:
A system (100) and method (500) system to authenticate a peer in a peer-to-peer network is provided. The system can include a first peer (110) to locally create a secret key (112) and use the secret key to produce a public-key pair (120) comprising an identifier name (113) and a small public-key (115), and a second peer (160) to locally authenticate the identifier name of the public-key pair by requesting (405) the first peer to produce a unique dataset that does not reveal the secret-key and yet validates that the public-key pair was generated with the secret-key when the large public-key is applied to a portion of the unique dataset without using an external authentication system.
摘要:
A controller (900) for transferring media content rights between media devices comprising a memory (906), a user interface (910) and a transceiver (902). The memory (906) stores a list of media devices (914) capable of receiving the permissions associated with the media content from an originating device and an encryption key (920) that may be used to encrypt the permissions. The user interface (910) detects a user selection of a target device from the list of media devices (914). The transceiver (902) communicates an address (916) associated with the target device and the encryption key (920) to the originating device. Thus, the originating device is able to encrypt the permissions using the encryption key (920) and send the encrypted permissions to the address (916) associated with the target device.
摘要:
A method in a multimedia device (130) including obtaining protected content having a limited exercisable right associated therewith, obtaining an extension of the limited exercisable right when a condition is satisfied, for example, when the device enters a DRM system different than the DRM system from which the protected content originated, wherein the extension of the limited exercisable right is obtained from an entity other than the multimedia device, for example, from an anomaly detector.
摘要:
A method in a multimedia device (130) including obtaining protected content having a limited exercisable right associated therewith, obtaining an extension of the limited exercisable right when a condition is satisfied, for example, when the device enters a DRM system different than the DRM system from which the protected content originated, wherein the extension of the limited exercisable right is obtained from an entity other than the multimedia device, for example, from an anomaly detector.
摘要:
A system and method of transferring digital rights from a first device to a second device. A target rights management object is transferred from the first device to the second device. A probabilistic data structure is created that identifies each of a class of rights management objects that are present on the first device. The probabilistic data structure is employed to determine whether the target rights management object is present on the first device. The target rights management object is utilized on the second device in response to a determination through employment of the probabilistic data structure that the target rights management object is not present on the first device. The target rights management object and its state are returned to the first device in response to a determination through employment of the probabilistic data structure that the target rights management object is present on the first device.
摘要:
A system (100) and method (500) system to authenticate a peer in a peer-to-peer network is provided. The system can include a first peer (110) to locally create a secret key (112) and use the secret key to produce a public-key pair (120) comprising an identifier name (113) and a small public-key (115), and a second peer (160) to locally authenticate the identifier name of the public-key pair by requesting (405) the first peer to produce a unique dataset that does not reveal the secret-key and yet validates that the public-key pair was generated with the secret-key when the large public-key is applied to a portion of the unique dataset without using an external authentication system.
摘要:
A method (100, 200, 300, 400, 600) for sharing values among nodes (processors) (900, 1004, 1006, 1008, 1010) in a network (1000) that includes mobile nodes that is resistant to corruption by faulty nodes. Movement of nodes triggers special messages forwarding processor values to and from nodes that have moved. Movement also triggers initialization of a round counter associated with each message forwarding the processor values in each node that handles the special messages that are triggered in response to movement. The round counter provides additional time for values to be distributed to nodes in the network.
摘要:
A method and system, suitable for using an original entertainment file for playing as a ring tone on a communication device (104), is provided. The method includes decrypting (304) a part of the original entertainment file using an authorization key upon receiving an incoming call signal. The part of the original entertainment file is played (306) until the incoming call signal is acknowledged. The method further includes decrypting (308) a remaining part of the original entertainment file using the authorization key after the incoming call signal is acknowledged. The remaining part of the original entertainment file is then encrypted (310) using a local authorization key to form a second entertainment file. The second entertainment file is then stored (312) in the communication device.