Abstract:
A local area network 14 comprises a master device 18 and a plurality of network devices 16.1 to 16. n. A method of streaming an asset Asset 1 which is protected with a DRM key DRMK 1 within the local area network 14 comprises causing the DRM encrypted asset [Asset 1 ] DRMK1 to be pre-stored on a database 12 in the network. A request for a license to play the asset is forwarded from a network device 16.1 requiring the asset to be streamed to it to a remote central license server 24. A license message comprising the DRM key required to decrypt the protected asset is forwarded from the backend into said network device 16.1. The copy protected asset [Asset 1 ] DRMK1 is streamed from the database 12 to the network device. The key DRMK 1 is used on the network device to play the protected asset on the network device according to the DRM rules.
Abstract:
Mobile device generated sharing of media is disclosed. A user of a first device may obtain transferable limited rights to selected media by initiating transfer of a token from a first digital media service to the first device. The token may then be transferred from the first device to a second device. Upon transfer of the token to the second device a user of the second device may then use the token to access the selected media and direct the streaming of the selected media according to the limited rights included in the token. The limited rights that are transferred may include various limitations on use such as, for example, proximity restrictions on where the first and/or second device must be located for the rights to remain valid, or, restrictions including time or usage limitations. Violations of the restrictions or usage limitations may result in the limited rights being terminated.
Abstract:
A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted with a different key so as to be streamable to a remote device via digital living network alliance (DLNA) or HTTP live streaming protocols. Media segments and identifiers for managing the storage and retrieval of such media segments are compatible with live streaming data structures, obviating the need to re-encrypt data streams.
Abstract:
The present invention discloses a method for encrypting media content, a method for modifying attribute data (13) and a method for decrypting the media content. The method for encrypting media content according to the present invention comprises the steps of replacing and encrypting an attribute data (13) and replacing it with a modified attribute data (27). In another embodiment of the present invention, the method for decrypting the media content comprises the steps of replacing the modified attribute data (27) with the decrypted attribute data (45) and loading the full media content if the password (23) keyed in by the user is correct and the limitation parameter (21) is still within allowable range, whereas if the password (23) is not correct or the limitation parameter (21) is not within the allowable range, the media content will not be displayed in full. A further embodiment of the present invention describes a method which involves modifying the attribute data (13) according to a selected modification type.
Abstract:
Methods and devices for clock roll-back detection in non-secure mobile platforms (510) are disclosed. A first time is received (410) from a secure time source (570). The first time is recorded (420) as a last known good time ("LKGT") (545) in secure storage (540) on the mobile device (510). The LKGT (545) is advanced (430) and stored whenever a triggering event occurs. The mobile device (510) receives a second time from the secure time source (570) and records the second time as a subsequent stored LKGT (545) in secure storage (540).
Abstract:
A system and method for determining unauthorized use of a set top box includes a set top box that receives a profile of weather conditions in a geographic area, generating a weather log, comparing the weather log and the profile and disabling the set top box from receiving signals in response to comparing. A head end and a plurality of other set top boxes may be used to gather the weather data to form the profile.
Abstract:
A system and method for determining unauthorized use of a set top box includes a set top box that receives a profile of weather conditions in a geographic area, generating a weather log, comparing the weather log and the profile and disabling the set top box from receiving signals in response to comparing. A head end and a plurality of other set top boxes may be used to gather the weather data to form the profile.
Abstract:
A current version certificate is stored that includes a corresponding current version identifier. A current instance certificate is received from the certificate authority, wherein the current instance certificate includes the current version identifier of the current version certificate and a current instance public key corresponding to the current instance private key. The current instance certificate is sent to a local station, during a registration with the local station. A request for video content is generated and sent to the local station. First encrypted data is received from the local station, wherein the first encrypted data includes a content key that is encrypted via the current instance public key. Second encrypted data is received from the local station, wherein the second encrypted data includes the video content that is encrypted via the content key.
Abstract:
A device is provided for use with a digital content provider and a content purchaser. The content provider can provide digital content and a first digital key, wherein the digital content has quantified digital rights associated therewith. The device includes a receiving portion, a security portion, a content database, an interface portion and a transmitting portion. The receiving portion can receive the digital content and the first digital key. The security portion can access the digital content with the first digital key. The content database can store the digital content. The interface portion can offer to the content purchaser the digital content and can enable the content purchaser to purchase the digital content in accordance with purchased quantified digital rights. The security portion can further encrypt the digital content with a digital key such that the content purchaser may use the purchased digital content.