H04L2463/101

ENCRYPTION MANAGEMENT, CONTENT RECORDING MANAGEMENT, AND PLAYBACK MANAGEMENT IN A NETWORK ENVIRONMENT
20170099136 · 2017-04-06 ·

Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location. At or around a time of recording the encrypted content, and on behalf of the user, the service provider initiates storage of the corresponding decryption information that is needed to decrypt the recorded encrypted content. In order to play back the recorded segments of the encrypted content, the subscriber communicates with a server resource to be authenticated. Subsequent to being authenticated, the server resource distributes a copy of decryption information needed to decrypt the previously recorded segments of encrypted content to the subscriber. Accordingly, the service provider retains control of playing back content via controlled distribution of the corresponding copy of decryption information.

Systems and methods of secure data exchange

An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment includes establishing, by a secure exchange facility and managed by an intermediate organizational entity, a procedure that allows a user from a first entity to share access to computer data content with a user from a second entity based on indicated access rights. The method includes transforming the computer data content into DRM protected content, utilizing a DRM engine provided by a separate entity. The method includes granting access to the content to the second user, providing permissioned control to entities utilizing a number of data storage nodes, and managing secure data exchange of the content and metadata, without the secure exchange facility having access to the content. The method includes operations to support content services including data transformation, filtering, analytics, and searching tools for the content.

Access to an electronic asset using content augmentation

Methods, computer program products, and systems are presented and can include for instance: crowdsourcing data from a plurality of users via a computer network, the data including feedback data regarding digital rights click through documents, wherein each of the users is a party to at least one of the digital rights click through documents; storing the data obtained by the crowdsourcing into a digital rights history repository; examining a digital rights click through document of a certain user, wherein the digital rights click through document controls access to a digital asset, wherein the examining includes using at least a portion of the feedback data of the digital rights history repository; and augmenting content of the digital rights click through document based on a result of the examining.

METHODS AND SYSTEMS FOR ENABLING COMMUNICATIONS BETWEEN DEVICES

Methods and systems for selecting and delivering content are provided. More particularly, content can be delivered to an output device from a user device through a device adaptor, such as an over-the-top (OTT) device. The OTT device or devices available to the user device are determined by a communication server. In particular, the OTT device or devices available to the user device are limited to those OTT devices associated with an output device in the user's room, or that the user is otherwise authorized to access.

METHODS AND SYSTEMS FOR ENABLING COMMUNICATIONS BETWEEN DEVICES

Methods and systems for selectively connecting a user device on a first network to a peripheral device on a second network are provided. More particularly, a communication server controls the peripheral devices that are visible to a user device in a discovery process. In addition, the communication server limits the peripheral devices that are available to a user device to those peripheral devices that the user device is authorized to access. The system further enables a user device to operably connect to a visible peripheral device.

System and method for transferring playlists
09609037 · 2017-03-28 · ·

A method, computer program product and computing device for selecting at least one playlist for transfer, the at least one playlist being stored on a first personal media device. The at least one playlist is converted to a common format, thus generating a first common format playlist. Communication is established with a second personal media device. The first common format playlist is transferred to the second personal media device.

Secure and efficient content screening in a networked environment

Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. The authenticity of various devices can be verified through the exchange of certificates that can further enable such devices to ascertain capabilities of one another. Based on the ascertained capabilities, an operational configuration for conducting watermark extraction and content screening can be determined.

Methods and apparatus to distribute media delivery to mobile devices

Methods and apparatus to distribute media content are disclosed. An example method includes receiving a request for media content from a mobile device, determining an identity of at least one of the mobile device or a consumer using the mobile device, comparing the identity to subscription records associated with the distribution of media content to a geographically fixed consumer location; and based on the comparison, determining if the mobile device is authorized to receive the media content.

Information processing apparatus, information processing method, and program

The present invention enables execution of predetermined content usage control processing without depending on a framework of a content playback program (application). Upon content playback processing, a flag which sets information of determination as to whether or not it is necessary to refer to a management information file such as a token or a usage control information file associated with content is recorded in a content file including encrypted content to be stored in a recording medium. Upon the content playback processing, a playback apparatus acquires the content file including the encrypted content stored in the recording medium, refers to a flag recorded in the content file and determines whether or not it is necessary to refer to the management information file based on a setting of the flag. When the setting of the flag indicates that it is necessary to refer to the management information file, it is possible to select a correct management information file based on a content file identifier as a search key.

Providing electronic content in association with a request for physical content

Disclosed systems and methods provide media content through an electronic commerce server. In one implementation, a method for providing electronic content is provided. The method includes receiving an order of a user. The order of the user may comprise a request of the user for a physical copy of media content. The commerce server may determine whether to provide to the user an electronic copy of the media content based at least on the order. Further, a request to access the electronic copy of the media content is received from the user. The method further grants the user access to the electronic copy of the media content based at least on the request to access the electronic copy of the media content.