Abstract:
In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate allowing the first device to temporarily consume content bound to the domain. The temporary domain certificate is sent to the first device, allowing the first device to temporarily consume content bound to the domain.
Abstract:
Systems, methods, and/or techniques ("tools") for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices ("stores"), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
Abstract:
The described embodiments relate to data security. One exemplary system includes a first component (126) associated with data on which an action can be performed and a second component (124) configured to perform the action on the data. The system also includes a third component (120) configured to ascertain the action and determine, as a function of the action, at least one policy to be implemented prior to allowing the second component (124) to access the data.
Abstract:
This document describes tools capable of managing digital content from multiple content providers based on a user's identity. By so doing, the tools may free people from the limitations of their storage media and devices. The tools may perform these and other actions through an indirect relationship with users, such as when third-party content providers use the tools but provide their own direct interface with users.
Abstract:
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the secure process, periodically checking the security state of the kernel, and notifying the secure process when the security state of the kernel has changed.
Abstract:
An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise alternations to the original environment to, for example, detect and/or prevent changes to the hardware and/or software intended to allow cheating or undesirable user behavior.
Abstract:
Systems and/or methods ("tools") are described that enable encrypted media files to be sent without revocation lists while permitting the encrypted media files to be passed to trusted entities. The tools may also ensure continuation of protection when media files are passed between different protection systems.
Abstract:
Embedded within at least some Real-Time Control Protocol (RTCP) messages sent from a media content source to a recipient is a session description message (186) that describes a media presentation (186) being streamed to the recipient (102). The session description message (186) can be associated, for example, with one of a plurality of pieces of media content in a play list of media content (186) being streamed from the device (104) to the recipient (102). In accordance with certain aspects, an RTCP message that embeds a session description message (186) includes at least three fields: a first field containing data identifying the RTCP message as being a type that embeds a session description message (186); a second field containing data that is the session description message (186) for a media presentation; and a third field containing data identifying a length of the RTCP message, generated by summing the length of the first, second, and third fields.
Abstract:
A computing device has instantiated thereon a protected media path for delivering content from a source to a sink. In the protected media path, a media base provides a protected environment in the computing device and includes a common infrastructure of core components effectuating processing of content from any particular source and delivering the processed content to any particular sink, and also includes a policy engine enforcing policy on behalf of the source. The policy corresponds to the content from the source and includes rules and requirements for accessing and rendering the content, whereby the media base allows content to flow through the computing device in a protected fashion, and allows for arbitrary processing of the protected content in the computing device.
Abstract:
In a protected media path for delivering content from a source to a sink, a source authority (SOTA) on behalf of the source decides with regard to a policy corresponding to the content that a particular type of action with the content is to be refused, and provides a particular enabler to an application. The provided enabler includes information and methods necessary for the application to obtain data necessary to respond to the refusal. The application receives the enabler at an interface thereof and the interface applies a common interaction procedure to run the enabler to obtain the data necessary to respond to the refusal.