H04L2463/101

Permission information management system, and permission information management method

A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after electronically signing the permission request with a secret encryption key, and acquires, from permission information transmitted from a right-holder terminal, a content decryption key by using a secret decryption key of the second key pair and uses the content. The right-holder terminal stores a third key pair and the content decryption key, verifies the permission request received, and encrypts the content decryption key by using the public encryption key of the second key pair included in the permission request and transmits the permission information including the encrypted content decryption key after electronically signing the permission information with a secret encryption key of the third key pair. The permission request and the permission information are transmitted and received via a blockchain.

Media distribution system with manifest-based entitlement enforcement
11777906 · 2023-10-03 · ·

A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a given client request; sending entitlements to the requesting client securely; handling entitlement information securely on a plurality of client devices at run time; storing entitlement information securely on a plurality of client devices for offline use; and enforcing entitlements on a plurality of client devices. The method employs manipulation of manifest files by a proxy that may be included in the client device or located in the network.

Automation of Sponsor Initiated Content Delivery

A content delivery system includes a computing platform having processing hardware and a system memory storing software code, a user account database, and a content database. The processing hardware executes the software code to receive, from a user device utilized by a user, a request for access to a first content of a plurality of contents, the request including an identifier of a sponsor of the request, to verify, using the identifier, an authorization status of the sponsor, and transmit to the user device, based on verification of the authorization status of the sponsor, content access data enabling access to the first content by the user. The processing further executes the software code to detect that the user is accessing the first content, and to offer, in response to detecting that access, an opportunity to the user to obtain access to the plurality of contents.

System for Thin Client Devices in Hybrid Edge Cloud Systems

Techniques for enhancing security for thin client devices in hybrid edge cloud systems are described. In accordance with various embodiments, the hybrid system includes a cloud computing platform (e.g., the cloud) and an edge device (e.g., the edge). The cloud extracts key(s) for authentication and session establishment. The cloud also utilizes the key(s) to establish a session between the edge and a client device. The cloud additionally authorizes a content request from the client device for a media content item over the session and extracts a content key upon successful authorization. The edge caches the key(s), obtains the content key at the time of receiving the content request from the client device and transmits the content key and the key(s) with the media content item to the client device.

METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED
20230027550 · 2023-01-26 ·

The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files.

SYSTEM AND METHOD FOR AUTOMATICALLY MANAGING MEDIA CONTENT
20220398275 · 2022-12-15 ·

A method, computer program product and computing device for receiving a request to load at least one new media content item on a personal media device. The size of the at least one new media content item is compared with the amount of storage space remaining on the personal media device to determine if the personal media device has sufficient available storage space. If the personal media device does not have sufficient available storage space, a relative weight associated with at least one old media content item stored on the personal media device is ascertained, the relative weight corresponding to a likelihood that the at least one old media content item will be rendered on the personal media device.

System and Method for Authorized Digital Content Distribution
20220394021 · 2022-12-08 ·

A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.

Media Distribution System with Manifest-Based Entitlement Enforcement
20230016777 · 2023-01-19 ·

A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a given client request; sending entitlements to the requesting client securely; handling entitlement information securely on a plurality of client devices at run time; storing entitlement information securely on a plurality of client devices for offline use; and enforcing entitlements on a plurality of client devices. The method employs manipulation of manifest files by a proxy that may be included in the client device or located in the network.

METHOD AND APPARATUS FOR PROTECTING CONFIDENTIAL DATA IN AN OPEN SOFTWARE STACK
20230013112 · 2023-01-19 ·

A method is provided for securely providing data for use in a consumer electronics device having a processor performing instructions defined in a software image. The method includes receiving the data encrypted according to a global key, further encrypting the data according to a device-unique hardware key, storing the further encrypted data in a secure memory of the consumer electronics device, providing the global key to a whitebox encoder for encoding according to a base key to generate a whitebox encoded global key, and transmitting the software image to the consumer electronics device for storage in an operating memory of the consumer electronics device, the software image having a whitebox decoder utility corresponding to the whitebox encoder and the whitebox encoded global key.

Providing media content to content consumers for playback and consumption

Media content items is provided to content consumers for playback by the disclosed system that includes plurality of nodes interacting with each other based on a defined protocol in communication network. A first node associated with a first participant receives a request for playback of a media content from a content consumer. A second node associated with a second participant provides media content rights to the first participant and/or the content consumer. The first node further provides media content metadata to the consumer device for consumption. A plurality of instances of a distributed media rights transaction ledger, associated with respective node, includes a plurality of media content rights transactions which corresponds to an acquisition of the media content rights by the first participant and/or content consumer prior to the consumption of the media content, and are managed by the plurality of nodes in accordance with the defined protocol.