Patent classifications
H04L2463/101
System and method for adjusting the behavior of an application based on the DRM status of the application
A system and method by which an application is capable of accessing its own DRM information stored in a content-agnostic DRM system. By being able to access its own DRM information, the application is able to improve the overall user experience by, among other things, making DRM-related information available to the user and providing potential options to the user which may not have been previously available.
DRM SHARING AND PLAYBACK SERVICE SPECIFICATION SELECTION
Systems and methods for optionally restricting the rendering of particular content items. An example method comprising: receiving a plurality of content rendering options supported by a client device; determining a content item to be rendered, the content item being associated with a restriction attribute; selecting a content rendering option supported by the client device in view of the restriction attribute; generating a token comprising data associated with the selected content rendering option and the content item; receiving a client request from the client device, wherein the client request is associated with the content item and indicates a chosen content rendering option; comparing the data of the token with the chosen content rendering option indicated by the client request to determine a match; and granting the client device access to perform the chosen content rendering option on the content item based on the outcome of the determination of the match.
System and method for rules-based control of custody of electronic signature transactions
Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of electronic signature documents. In one embodiment, an electronic signature document may be associated with custody transfer rules that facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer may results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data. A custody transfer rule may be trigged by the occurrence of a particular event, such as the receipt of an electronic signature.
Location verification and enforcement for content access devices
A system for location verification and enforcement receives an authorization request to access content from a content access device. The authorization request includes and/or is associated with location information obtained from a gateway device via a local area network and determined using multiple communication networks. The location information is compared to a record indicating that the content access device and the gateway device were both present at a location. When the location information matches the record, an authorization is transmitted to the content access device. The content access device may be operative to access the content upon receiving the authorization.
SCALABLE KEY MANAGEMENT FOR ENCRYPTING DIGITAL RIGHTS MANAGEMENT AUTHORIZATION TOKENS
A method and apparatus for providing a license to a client device, the license providing a key for decrypting a content instance. In one embodiment, the method comprises accepting a token request, the token request having client device credentials including a client device identifier (client ID) and a content instance identifier (content ID), deriving a private key according to a token key seed, a token key identifier (token key ID), and the content ID, generating a token having a payload and a token identifier (token ID) and being digitally signed according to the derived private key; transmitting the generated token to the client; and providing the license to the client device according to the generated token.
System and method for automatically managing media content
A method, computer program product and computing device for receiving a request to load at least one new media content item on a personal media device. The size of the at least one new media content item is compared with the amount of storage space remaining on the personal media device to determine if the personal media device has sufficient available storage space. If the personal media device does not have sufficient available storage space, a relative weight associated with at least one old media content item stored on the personal media device is ascertained, the relative weight corresponding to a likelihood that the at least one old media content item will be rendered on the personal media device.
Systems and methods for encoding and sharing content between devices
Systems and methods for sharing content between devices are disclosed. To request a shared piece of media content, a playback device generates and sends a request to content server. The playback device includes information in the request that indicates the playback capabilities of the device. The content server receives the request and determines the playback capabilities of the playback device from the information in the request. The content server then determines the assets that may be used by the playback device to obtain the media content and generates a top level index file for the playback device that includes information about the determined assets. The top level index file is then sent to the playback device that may then use the top level index file to obtain the media content using the indicated assets.
Content recording and group encryption
Systems and methods for managing group encryption are described. In certain methods, a content asset may be encrypted with an asset key. An account key may be determined. Using the account key, an encrypted content asset package may be generated. The asset key may make up at least a portion of the encrypted content asset package. The encrypted content asset package is decryptable with the account key. The encrypted content asset package and an identifier associated with the account key may be transmitted, for example to a playback device.
TOKENIZED MEDIA CONTENT MANAGEMENT
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file.
SYSTEMS AND METHODS FOR ENTITLEMENT MANAGEMENT
Systems and methods for managing data are disclosed. One method can comprise receiving a first request for a service, wherein the first request is associated with a first rights package. The first rights package can be processed to determine access to the service. An evaluation key can be generated, wherein the evaluation key represents the determination of access relating to the processing of the first rights package. A second request for a service can be received, wherein the second request is associated with a second rights package. The second rights package can be processed using the evaluation key.