摘要:
Various embodiments provide content protection interoperability techniques which support secure distribution of content for multiple content protection technologies. In one or more embodiments a source digital rights management (DRM) system can associate trust data with content to be exported to a target digital rights management (DRM) system. The trust data describes a trust state for the content to enable the target DRM system to maintain the trust state for the exported content. In at least some embodiments, the source DRM system can also associate tracing data with the content to, in the event of a breach in the chain of trust, enable an identification to be made of a source of the exported content and/or a party responsible for exporting the content.
摘要:
Various embodiments utilize a third party, such as a trusted third-party, to perform DRM operations such as “move” operations. In at least some embodiments, the trusted third-party is utilized for both “move” operations as well as local content access such as playback and the like. In at least some embodiments, a third-party maintains a database that includes an association of clients, content, and move version numbers. A client—termed a “source client” maintains at least a move version number locally in a secure fashion. The version number is incremented each time the source client performs a move operation. Both the source client and the third-party increment the version number each time a piece of content is moved. When the client attempts to perform a move operation, it contacts the third-party to ascertain the third-party's move version number. If the move version numbers match and the source client owns the license/content, then, in at least some embodiments, a move operation is permitted.
摘要:
This document describes tools capable of renewing an expired license to entertainment content. The tools, in some embodiments, may repeatedly renew a license using very little resources, such as by forgoing retention of the license, encryption keys, or the entertainment content between renewals. The tools, for example, may provide a license to a particular content receiver (e.g., a laptop computer), and, when that license expires, renew the license with as little as a single retained secret. By so doing the tools enable, among other things, fewer computing resources to be used in renewing a license while maintaining the security of that license's entertainment content.
摘要:
Various embodiments utilize a third party, such as a trusted third-party, to perform DRM operations such as “move” operations. In at least some embodiments, the trusted third-party is utilized for both “move” operations as well as local content access such as playback and the like. In at least some embodiments, a third-party maintains a database that includes an association of clients, content, and move version numbers. A client—termed a “source client” maintains at least a move version number locally in a secure fashion. The version number is incremented each time the source client performs a move operation. Both the source client and the third-party increment the version number each time a piece of content is moved. When the client attempts to perform a move operation, it contacts the third-party to ascertain the third-party's move version number. If the move version numbers match and the source client owns the license/content, then, in at least some embodiments, a move operation is permitted.
摘要:
The present invention is a method and apparatus for switching first and second tasks in an operating system. The first and second tasks each have first and second traditional states and first and second extended states, in a processing unit. The method comprises: (a) saving the first traditional and extended states from the processing unit to a buffer; (b) updating the buffer by replacing the first extended state by the second extended state; and (c) restoring the first traditional state and the second extended state in the processing unit from the updated buffer.
摘要:
A system and method for synchronizing disparate processing modes and for providing mutually exclusive access to shared system resources. A processing unit operates in disparate first and second processing modes. In the first processing mode, the computer is under the control of an operating system. In the other processing mode, the computer is under the control of a system management mode interrupt handling routine. To synchronize the two processing modes and allow mutually exclusive access to shared hardware resources, the computer system includes shared memory, which contains an intermodal lock, and a mechanism for allowing each processing mode to signal the other. Before either processing mode can access the shared resource, the processing mode must attempt to acquire the intermodal lock. If the lock is acquired, the processing mode accesses the shared resource. If the lock cannot be acquired, the processing mode sets a pending bit and resumes other tasks until it receives a lock release signal from the other processing mode. When a processing mode has finished accessing the shared resource, it releases the lock and checks to see if the pending bit was set. If so, the processing mode sends a lock release signal to the other mode.
摘要:
A hierarchical data structure is created in dynamic memory that is dynamically expanded or modified during run-time operations of the computer system. Information about the devices is loaded from a definition block into the hierarchical data structure. The information is a byte stream of data that is translated and stored as hierarchical information, such as device objects, data objects, and control method objects. These objects are hierarchically nested within the hierarchical data structure. A device object identifies a corresponding device in the computer system. The hierarchy formed between device objects represents the hierarchical I/O connections within the computer system. A data object identifies configuration and hardware dependency information associated with a corresponding device. A control method object is an executable reference for controlling a corresponding device. The control method object is a sequence of pseudocode instructions interpreted by the operating system providing an abstract, extensible, and portable mechanism for precise control of a device without calling routines from the BIOS.The hierarchical data structure is preferably used by the operating system as a communication tool and reference to identify devices, to identify configuration and power management information about devices, to provide an executable control mechanism that is abstract and extensible to control devices, and to extensibly add functionality to a device.
摘要:
A web-based service which provides a notification such an email to a user to facilitate managing the recording of broadcast content using a personal video recorder (PVR). The user can agree to participate in the service in exchange for emails which can provide information such as a summary of programs recorded over a few days, missed recordings, and scheduling conflicts. The notification can include targeted recommendations, targeted advertising and information about recording habits of members of a social network of the user. A notification can be provided on an urgent basis if program schedule conflicts or hardware or software problems with the user's equipment are detected. The user's equipment can include a PC-based PVR, or a PC which communicates with a separate PVR device. PC-related information such as events thrown can also be reported up to the web service.
摘要:
A web-based service which provides a notification such an email to a user to facilitate managing the recording of broadcast content using a personal video recorder (PVR). The user can agree to participate in the service in exchange for emails which can provide information such as a summary of programs recorded over a few days, missed recordings, and scheduling conflicts. The notification can include targeted recommendations, targeted advertising and information about recording habits of members of a social network of the user. A notification can be provided on an urgent basis if program schedule conflicts or hardware or software problems with the user's equipment are detected. The user's equipment can include a PC-based PVR, or a PC which communicates with a separate PVR device. PC-related information such as events thrown can also be reported up to the web service.
摘要:
Waking a computer from a system state. A wake data structure enables a device to wake the computer from a sleeping state. The lowest system state is identified that allows selected devices to still wake the system based on the contents of the wake data structure for the device. A chosen device power state is selected for each of the devices within the computer system and each device is placed within their respective chosen device power state. Wake devices have a particular chosen device power state that supports that wake device's capability of waking the computer system. Other devices are typically turned off. Finally, the operating system turns off any of power resources within the computer system that are no longer used by any of the devices.