摘要:
Various embodiments enable so-called extended data to be added to a signed digital certificate without having a private key of a Certification Authority available. In at least some embodiments, a digital certificate can be issued and signed off line by the Certification Authority, and then later extended data can be added and signed using another key, whose public key was earlier embedded and signed in the certificate.
摘要:
A sequence of content keys are shared between a receiver of pieces of digital content and a computing device upon which the content is to be rendered. The receiver encrypts each piece of content according to a corresponding content key in the sequence and forwards the encrypted content to the computing device and the computing device decrypts the encrypted content according to the corresponding content key. The receiver initially transmits to the computing device an initialization digital license with an initial content key (CK0) therein. Each of the receiver and the computing device derive a new content key (CKx) in the sequence from the initial content key (CK(0)) in the sequence on an as-needed basis and in a coordinated fashion. The initialization license is required only once for the sequence of content keys, and the receiver need not explicitly communicate (CKx) to the computing device for each piece of content.
摘要:
Disclosed are various embodiments for facilitating gift campaigns in a social networking system. An initiator of a gift campaign can select a recipient of a gift campaign as well as participants. Embodiments of the disclosure can facilitate selection of participants, collection of funds for the gift campaign and fulfillment of the gift to the recipient.
摘要:
A method of registering network devices in a digital rights management system (DRMS) includes receiving a digital certificate transmitted by the network device requesting registration and verifying the validity of the certificate. The DRMS may then send cryptographic information to the applying network device. The network device may be authorized for registration via a user interface to the DRMS. The DRMS may conduct a proximity test to determine of the network device is proximate to the DRMS. If the certificate is validated, authorization is received, and the proximity test indicates that the network device is proximate to the DRMS, the network device may be registered. A registered network device is then authorized to play protected digital content.
摘要:
A sink sends a registration request to a source and the source validates same, and the source sends a registration response including a secret to the sink. The source then sends a proximity message including a nonce to the sink and concurrently notes a start time. The sink employs the secret and the nonce to generate a proximity value and sends same to the sources. The source receives the proximity value and concurrently notes an end time, verifies the proximity value based on the secret and the nonce, calculates from the noted start and end times an elapsed time, compares the elapsed time to a predetermined threshold value, decides from the comparison whether the sink satisfies the proximity requirement, and registers the sink as being able to access content from such source if the sink satisfies the proximity requirement.