-
公开(公告)号:US20090006868A1
公开(公告)日:2009-01-01
申请号:US11823685
申请日:2007-06-28
CPC分类号: G06F21/64 , G06F21/10 , G06F21/725 , G06F21/74 , G06F21/78
摘要: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
摘要翻译: 各种实施例利用硬件实施的边界来在开放式计算环境中提供数字版权管理或DRM的各个方面。 在这些硬件实施的边界的背景下,采用DRM配置技术以安全和鲁棒的方式提供诸如密钥和DRM软件代码的东西。 此外,至少一些实施例利用安全时间供应技术来为计算环境提供时间,以及提供鲁棒安全存储的技术。
-
公开(公告)号:US20090006854A1
公开(公告)日:2009-01-01
申请号:US11823594
申请日:2007-06-28
CPC分类号: G06F21/10 , G06F2221/2151
摘要: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
摘要翻译: 各种实施例利用硬件实施的边界来在开放式计算环境中提供数字版权管理或DRM的各个方面。 在这些硬件实施的边界的背景下,采用DRM配置技术以安全和鲁棒的方式提供诸如密钥和DRM软件代码的东西。 此外,至少一些实施例利用安全时间供应技术来为计算环境提供时间,以及提供鲁棒安全存储的技术。
-
公开(公告)号:US08661552B2
公开(公告)日:2014-02-25
申请号:US11823572
申请日:2007-06-28
CPC分类号: G06F21/121 , G06F21/10 , G06F21/6209 , G06F21/74
摘要: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage.
摘要翻译: 各种实施例利用硬件实施的边界来在开放式计算环境中提供数字版权管理或DRM的各个方面。 在这些硬件实施的边界的背景下,采用DRM配置技术以安全和鲁棒的方式提供诸如密钥和DRM软件代码的东西。 此外,至少一些实施例利用安全时间供应技术来为计算环境提供时间,以及提供防篡改存储的技术。
-
公开(公告)号:US08646096B2
公开(公告)日:2014-02-04
申请号:US11823594
申请日:2007-06-28
IPC分类号: H04L29/06
CPC分类号: G06F21/10 , G06F2221/2151
摘要: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
摘要翻译: 各种实施例利用硬件实施的边界来在开放式计算环境中提供数字版权管理或DRM的各个方面。 在这些硬件实施的边界的背景下,采用DRM配置技术以安全和鲁棒的方式提供诸如密钥和DRM软件代码的东西。 此外,至少一些实施例利用安全时间供应技术来为计算环境提供时间,以及提供鲁棒安全存储的技术。
-
公开(公告)号:US09892390B2
公开(公告)日:2018-02-13
申请号:US11954222
申请日:2007-12-12
CPC分类号: G06Q20/1235 , G06Q30/02
摘要: A DRM technique involves packaging an advertisement using a data structure that encapsulates a number of advertising segments along with signed information, such as a table of hashes, associated with some of the advertising segments. In one scenario, the data structure and the signed information are separately protected using public key and/or digital signature cryptographic schemes. The advertisement is delivered to a user of a consumer electronic device (CED) separately from delivery of a digital license, which governs user consumption of the advertisement. The digital license includes keys used in connection with the cryptographic scheme, and references a condition to be satisfied with respect to consumption of the advertisement. As advertising segments are verified and consumed by the user/CED, information is recorded and used to determine whether the license condition was satisfied. Satisfaction of the license condition may result in access to program content or additional licenses.
-
公开(公告)号:US20090157552A1
公开(公告)日:2009-06-18
申请号:US11954222
申请日:2007-12-12
IPC分类号: G06Q10/00
CPC分类号: G06Q20/1235 , G06Q30/02
摘要: A DRM technique involves packaging an advertisement using a data structure that encapsulates a number of advertising segments along with signed information, such as a table of hashes, associated with some of the advertising segments. In one scenario, the data structure and the signed information are separately protected using public key and/or digital signature cryptographic schemes. The advertisement is delivered to a user of a consumer electronic device (CED) separately from delivery of a digital license, which governs user consumption of the advertisement. The digital license includes keys used in connection with the cryptographic scheme, and references a condition to be satisfied with respect to consumption of the advertisement. As advertising segments are verified and consumed by the user/CED, information is recorded and used to determine whether the license condition was satisfied. Satisfaction of the license condition may result in access to program content or additional licenses.
摘要翻译: DRM技术涉及使用封装多个广告段的数据结构以及诸如与一些广告段相关联的诸如散列表的签名信息来打包广告。 在一种情况下,使用公钥和/或数字签名加密方案分别保护数据结构和签名信息。 广告被传送到消费者电子设备(CED)的用户,分发于数字许可证的交付,该数字许可证管理广告的用户消费。 数字许可证包括与密码方案相关的密钥,并且提及关于广告的消费要满足的条件。 随着广告片段被用户/ CED验证和消费,信息被记录并用于确定许可条件是否被满足。 对许可证条件的满意可能导致访问程序内容或附加许可证。
-
公开(公告)号:US20090012805A1
公开(公告)日:2009-01-08
申请号:US11954211
申请日:2007-12-12
申请人: Patrik Schnell , Kevin Lau , James M. Alkove , Alexandre V. Grigorovitch , Ryan A. Haveson , Max G. Morris , Scott A. Plette , Clifford P. Strom , Alexander McKelvey
发明人: Patrik Schnell , Kevin Lau , James M. Alkove , Alexandre V. Grigorovitch , Ryan A. Haveson , Max G. Morris , Scott A. Plette , Clifford P. Strom , Alexander McKelvey
IPC分类号: G06Q10/00
CPC分类号: G06Q30/06 , G06Q50/184
摘要: Portable digital rights for multiple devices is described. In an embodiment, a digital rights management (DRM) system includes a first device with a removable component configured as a token that is associated with a DRM license. The first device also includes a removable memory card that stores protected media content on which the first device can perform actions as permitted by the DRM license. The DRM system also includes a second device that can have the removable component and the removable memory card when removed from the first device and installed in the second device such that the second device can perform the actions on the protected media content as permitted by the DRM license.
摘要翻译: 描述了多个设备的便携式数字版权。 在一个实施例中,数字版权管理(DRM)系统包括具有配置为与DRM许可证相关联的令牌的可移除组件的第一设备。 第一设备还包括可移动存储卡,其存储受保护的媒体内容,第一设备可以在其上执行由DRM许可允许的动作。 DRM系统还包括第二设备,当从第一设备移除并且安装在第二设备中时,可以具有可移动组件和可移动存储卡,使得第二设备可以在DRM所允许的情况下对受保护的媒体内容执行动作 执照。
-
公开(公告)号:US20080294894A1
公开(公告)日:2008-11-27
申请号:US11753403
申请日:2007-05-24
申请人: Kedarnath A. Dubhashi , James M. Alkove , Patrik Schnell , Alexandre V. Grigorovitch , Vikram Mangalore
发明人: Kedarnath A. Dubhashi , James M. Alkove , Patrik Schnell , Alexandre V. Grigorovitch , Vikram Mangalore
CPC分类号: H04L9/0825 , G06F21/10 , G06F2221/0711 , H04L9/0816 , H04L9/0838 , H04L9/3268 , H04L9/3271 , H04L2209/603
摘要: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
摘要翻译: 描述用于将内容许可证绑定到便携式存储设备的系统,方法和/或技术(“工具”)。 关于将内容许可证绑定到便携式存储设备(“存储”),主机可以执行认证协议,其包括生成随机数,向存储发送随机数,以及从存储接收会话密钥与会话密钥 使用随机数生成。 商店可以执行包括从主机接收随机数的认证协议,基于随机数生成随机会话密钥,并将会话密钥发送到主机。
-
公开(公告)号:US08539233B2
公开(公告)日:2013-09-17
申请号:US11753403
申请日:2007-05-24
申请人: Kedarnath A. Dubhashi , James M. Alkove , Patrik Schnell , Alexandre V. Grigorovitch , Vikram Mangalore
发明人: Kedarnath A. Dubhashi , James M. Alkove , Patrik Schnell , Alexandre V. Grigorovitch , Vikram Mangalore
IPC分类号: H04L9/32
CPC分类号: H04L9/0825 , G06F21/10 , G06F2221/0711 , H04L9/0816 , H04L9/0838 , H04L9/3268 , H04L9/3271 , H04L2209/603
摘要: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
摘要翻译: 描述用于将内容许可证绑定到便携式存储设备的系统,方法和/或技术(“工具”)。 关于将内容许可证绑定到便携式存储设备(“存储”),主机可以执行认证协议,其包括生成随机数,向存储发送随机数,以及从存储接收会话密钥与会话密钥 使用随机数生成。 商店可以执行包括从主机接收随机数的认证协议,基于随机数生成随机会话密钥,并将会话密钥发送到主机。
-
公开(公告)号:US08412936B2
公开(公告)日:2013-04-02
申请号:US11753403
申请日:2007-05-24
申请人: Kedarnath A. Dubhashi , James M. Alkove , Patrik Schnell , Alexandre V. Grigorovitch , Vikram Mangalore
发明人: Kedarnath A. Dubhashi , James M. Alkove , Patrik Schnell , Alexandre V. Grigorovitch , Vikram Mangalore
IPC分类号: H04L9/32
摘要: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
-
-
-
-
-
-
-
-
-