H04L2463/101

Secure application processing systems and methods

Systems and methods are described for securely and efficiently processing electronic content. In one embodiment, a first application running on a first computing system establishes a secure channel with a second computing system, the secure channel being secured by one or more cryptographic session keys. The first application obtains a license from the second computing system via the secure channel, the license being encrypted using at least one of the one or more cryptographic session keys, the license comprising a content decryption key, the content decryption key being further encrypted using at least one of the one or more cryptographic session keys or one or more keys derived therefrom. The first application invokes a second application to decrypt the license using at least one of the one or more cryptographic session keys, and further invokes the second application to decrypt the content decryption key using at least one of the one or more cryptographic session keys or one or more keys derived therefrom, and to decrypt a piece of content using the content decryption key. The first application then provides access to the decrypted piece of content in accordance with the license.

Mobile machine
10412557 · 2019-09-10 · ·

A system for providing mobile content to a mobile communication device includes a first computing system including one or more servers to provide, via a communications network, a graphical user interface at a second computing system, the graphical user interface (i) enabling the user of the second computing system to edit a digital file to create the mobile content and (ii) prompting and enabling a user of the second computing system to provide a phone number associated with the mobile communication device, the mobile communication device being separate and remote from the first computing system and the second computing system. The first computing system receives, from the second computing system via the communications network, the mobile content and the phone number associated with the mobile communication device. The first computing system uses a the phone number received from the second computing system to cause the delivery of the mobile content to the mobile communication device via a wireless data network in a format compatible with one or more operational parameters of the mobile communication device, the one or more operational parameters including at least one of a mobile communication device type and a software platform type, wherein the using of the received phone number to cause the delivery of the mobile content to the mobile communication device is performed without the mobile communication device identifying the one or more operational parameters to the first computing system or the second computing system.

Control word protection method for conditional access system

Disclosed herein is a control word protection method for a conditional access system. There is provided a method for allowing a chipset of a receiver to securely obtain control words for descrambling scrambled content transmitted from a content delivery network.

SYSTEMS AND METHODS FOR ENTITLEMENT MANAGEMENT
20190272357 · 2019-09-05 ·

Systems and methods for managing data are disclosed. One method can comprise receiving a first request for a service, wherein the first request is associated with a first rights package. The first rights package can be processed to determine access to the service. An evaluation key can be generated, wherein the evaluation key represents the determination of access relating to the processing of the first rights package. A second request for a service can be received, wherein the second request is associated with a second rights package. The second rights package can be processed using the evaluation key.

System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state

A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.

Invitations for establishing relationships

Techniques for invitations for establishing relationships are described. In at least some embodiments, an architecture is implemented which provides simple and integrated ways for establishing relationships between various entities. The architecture includes invitations that can be used to invite users to establish relationships with entities. A user that receives an invitation can interact with the invitation, such as to accept or decline an invitation to establish a relationship with an entity. If a user accepts an invitation, a relationship can be established between the user and an inviting entity. In at least some embodiments, the relationship can enable the user to perform various actions and/or access resources associated with the entity.

Systems and Methods for Encoding and Sharing Content between Devices
20190268394 · 2019-08-29 · ·

Systems and methods for sharing content between devices are disclosed. To request a shared piece of media content, a playback device generates and sends a request to content server. The playback device includes information in the request that indicates the playback capabilities of the device. The content server receives the request and determines the playback capabilities of the playback device from the information in the request. The content server then determines the assets that may be used by the playback device to obtain the media content and generates a top level index file for the playback device that includes information about the determined assets. The top level index file is then sent to the playback device that may then use the top level index file to obtain the media content using the indicated assets.

Key Derivation for Secure Communications
20190260720 · 2019-08-22 ·

A security system is disclosed in which a device-specific key value is provided to a security processing device, and then used to derive additional derived keys for use in secured communications. In response to identifying a compromise of the derived keys, the system can be instructed to derive new or replacement derived keys for use in the secured communications. In some embodiments, the security system can be used in a video reception device, to decrypt encrypted video content.

ACCESS TO AN ELECTRONIC ASSET USING CONTENT AUGMENTATION
20190255719 · 2019-08-22 ·

Methods, computer program products, and systems are presented and can include for instance: crowdsourcing data from a plurality of users via a computer network, the data including feedback data regarding digital rights click through documents, wherein each of the users is a party to at least one of the digital rights click through documents; storing the data obtained by the crowdsourcing into a digital rights history repository; examining a digital rights click through document of a certain user, wherein the digital rights click through document controls access to a digital asset, wherein the examining includes using at least a portion of the feedback data of the digital rights history repository; and augmenting content of the digital rights click through document based on a result of the examining.

Systems and Methods for Content Security
20190258778 · 2019-08-22 ·

Systems and methods are for content security may comprise transmitting a request for authorization to access secured content. A content key for the secured content may be received and stored to a restricted region of a memory. A device security module may have access to the restricted region and may decrypt, based on satisfaction of a use condition and using the content key, the secured content. An encryption key associated with a secure media system authorized to access the secured content may be received. The device security module may encrypt, using the encryption key, the secured content and route the secured content to the secure media system.