Patent classifications
G06F21/1073
Controlling delivery of encrypted media assets
The invention relates to a computer guard system for controlling delivery of encrypted media assets in a service which governs the delivery of a set of media assets to a group of authorized users comprising: an administrator interface configured to receive configuration data from an administrator to define at least one environment defining how media assets in that service are to be delivered to authorized users, wherein the configuration data defines, for each environment, (a) multiple DRM technologies for decrypting the same asset at multiple end user platforms, each DRM technology being associated with its own set of default license properties; (b) at least one software plug-in to be instantiated to perform a verification method to verify if an end user request for delivery of an asset is valid; a store for holding defined environments with respective environment identifiers; a key server module having an interface connectable to an encryption module and configured to: exchange (i) an asset identifier, which identifies an asset to be encrypted, (ii) a secret key for use in encrypting the asset, and (iii) a key identifier which is to be located in the encrypted asset and which identifies the secret key; execute a set of rules to compare a characteristic associated with the asset with multiple environments to associate at least one environment with the asset wherein the characteristic represents the service for which the asset is provided; and store an association between the asset and at least one determined environment, whereby multiple assets for the same service intended for delivery on different end users platforms are associated with a single environment, and wherein the configuration data for each environment identifies the default license properties and software plug-in to be applied to the asset, in dependence on the DRM technology used at the end user platform to enable the computer system to automatically respond to end user requests to play out an asset.
TETHERED DEVICE SYSTEMS AND METHODS
Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.
System and method for securing and monetizing peer-to-peer digital content
A system and method to select, secure, and monetize shared digital content by authenticating peers across digital networks and platforms, and independently controlling and monetizing access to said shared digital content with others across the same platforms from their mobile devices. Authors may privately control and authorize user mobile access to shared digital content according to device, location, behavior, time and knowledge authentication contexts and independently secure and monetize said content with one or more of those peers in real-time across any messaging or communication network, either by value or by reference. Recipients may perform required authentication and may execute required P2P payments to sender to gain access to said shared digital content on their mobile device.
Accessing content at a device
A method for accessing content at a device, wherein the device is arranged to execute a digital rights management (DRM) client of a DRM system and wherein the device is arranged to receive a broadcast signal comprising a plurality of encrypted portions of content for an item of content, each encrypted portion being packaged in a format of a conditional access system and being decryptable using a corresponding decryption key, wherein the method comprises an application executing on the device performing the steps of: for each of one or more of the encrypted portions: converting said encrypted portion from being packaged in the format of the conditional access system to being packaged in a format of the DRM system; providing said encrypted portion is packaged in the format of the DRM system to the DRM client; and either (a) providing a rights object according to the DRM system to the DRM client or (b) triggering the DRM client to obtain a rights object according to the DRM system; wherein the rights object corresponds to said encrypted portion by comprising decryption key data for use by the DRM client to obtain the decryption key corresponding to said encrypted portion.
METHOD AND SYSTEM FOR PERSISTING FILES
- Benjamin M. Schultz ,
- Balaji Balasubramanyan ,
- Giridhar Viswanathan ,
- Ankit SRIVASTAVA ,
- Margarit Simeonov Chenchev ,
- Hari R. Pulapaka ,
- Nived Kalappuraikal Sivadas ,
- Raphael Gianotti Serrano Dos Santo ,
- Narasimhan Ramasubramanian ,
- Frederick Justus Smith ,
- Matthew David Kurjanowicz ,
- Prakhar Srivastava ,
- Jonathan Schwartz
Securely performing file operations. A method includes determining a licensing characteristic assigned to a file. When the licensing characteristic assigned to the file meets or exceeds a predetermined licensing condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the guest operating system. When the licensing characteristic assigned to the file does not meet or exceed the predetermined licensing condition, then the method includes performing the file operation on the file in the guest operating system while preventing the file operation from being performed directly in the host operating system.
Library upgrade method, apparatus, and system
A method and apparatus are disclosed for upgrading libraries in a source code program by evaluating libraries in the source code program for predetermined selection criteria specifying library performance limitations to identify at least a first library which does not meet the plurality of predetermined selection criteria and then identifying a first alternative library that is suitable for substitution for the first library so that the source code program may be automatically modified to replace the first library with the first alternative library, thereby generating a modified source code program having an upgraded library functionality.
Software recognition using tree-structured pattern matching rules for software asset management
A method for software identification in a software asset management system is provided. The method comprises receiving software inventory data from a user terminal and processing the software inventory data, wherein processing the software inventory data comprise identifying software information based on the software inventory data. Thereby the software characteristics are identified.
Efficient access to user-related data for determining usage of enterprise resource systems
An example embodiment may involve a method performed by a software application executable on a central enterprise resource planning (ERP) client of a plurality of ERP clients. The ERP clients may be contained within a managed network. Each ERP client may be associated with one or more computing devices of the managed network on which ERP software is executable. Each ERP client may include a database that stores user-related data for individual users of the managed network whom are authorized to access the ERP client. The method may involve communicating with other ERP clients of the plurality of ERP clients to retrieve the user-related data stored in databases of the other ERP clients, storing the user-related data from the other ERP clients, and transmitting the user-related data to a computing device of a computational instance contained in a remote network management platform associated with the managed network.
Information processing apparatus, for storing consensus information among copyright holders in a blockchain
An information processing apparatus, an information processing method, and an information processing program configured to manage the copyright-related information of content appropriately. The information processing apparatus includes control circuitry to acquire, when there is a plurality of copyright holders relating to one piece of content, consensus information indicating an agreement on a share of respective copyrights of the plurality of copyright holders, and create a transaction for recording the acquired consensus information on a blockchain system.
DIGITAL RIGHTS MANAGEMENT FOR HTTP-BASED MEDIA STREAMING
Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in accordance with a designated key exchange protocol. A license for an encrypted media content item corresponding with the requested content decryption key may be identified at the media application. Based on information included in the license, encrypted key material may be decrypted to create the requested content decryption key via a processor at the computing device. The requested content decryption key may be provided to the media content player.