H04N21/835

Content rights management for mobile devices
11490161 · 2022-11-01 · ·

An electronic device for providing geolocation independent content rights management includes a non-transitory storage medium and a processing unit. The processing unit executes instructions stored in the non-transitory storage medium to receive a request for content from a content access device and, if the content access device is registered to an account associated with a geolocation, provides access to the content. In some implementations, the processing unit may determine if the content access device is registered using a token corresponding to the request. In various implementations, the processing unit may verify that one or more digital rights management and/or persistence policies allow the access, such as where access may be provided to one copy of the content at a time.

Distributed white list for security renewability

To provide for security and robustness in distribution of high value video content such as UHD video, a white list is provided that does not grant default access to content like a revocation listing does, but rather forces a software update on potentially compromised devices to bring them back into copy protection compliance, eliminating, e.g., the use of certain outputs that have been compromised. Prior to outputting content, a source device determines whether the receiving device is on a white list, whether the output is still valid, whether the version number of the receiving device is still valid, and that the receiving device does not have insecure outputs on which it could re-output content.

Distributed white list for security renewability

To provide for security and robustness in distribution of high value video content such as UHD video, a white list is provided that does not grant default access to content like a revocation listing does, but rather forces a software update on potentially compromised devices to bring them back into copy protection compliance, eliminating, e.g., the use of certain outputs that have been compromised. Prior to outputting content, a source device determines whether the receiving device is on a white list, whether the output is still valid, whether the version number of the receiving device is still valid, and that the receiving device does not have insecure outputs on which it could re-output content.

Technologies for selective content licensing and secure playback

Technologies for selectively licensing segments of source content are described. In some embodiments the technologies enable a user of a client device to select, license, and use one or more segments of source content, without the need to obtain a license to the source content as a whole. Systems, methods, and computer readable media utilizing such technologies are also described. In some embodiments, the technologies can enable digital rights management or other restrictions imposed on a content segment to be enforced, even when the content segment is incorporated into diverse content such as a content mashup. The technologies may also enable independent tracking of information regarding the use and/or payback of content segments, even when such segments are included in diverse content.

Transmission of digital content to select devices

Disclosed herein are a method and device for transmitting digital content. A selection of at least one device authorized to receive digital content is detected. It is identified whether each selected device contains a session key that corresponds to a local session key. Digital content is transmitted to each device whose session key corresponds to the local key. Digital content is prevented from transmission to unselected devices not having a corresponding session key.

Transmission of digital content to select devices

Disclosed herein are a method and device for transmitting digital content. A selection of at least one device authorized to receive digital content is detected. It is identified whether each selected device contains a session key that corresponds to a local session key. Digital content is transmitted to each device whose session key corresponds to the local key. Digital content is prevented from transmission to unselected devices not having a corresponding session key.

Method and system for encrypting multimedia streams

A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one embodiment, one or more data packets are selected from an incoming multimedia stream. Further, one or more of a header portion and a payload portion are selected within the one or more data packets. Furthermore, one or more regions in the selected one or more of the header portion and the payload portion are encrypted using an encryption algorithm.

Method and system for encrypting multimedia streams

A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one embodiment, one or more data packets are selected from an incoming multimedia stream. Further, one or more of a header portion and a payload portion are selected within the one or more data packets. Furthermore, one or more regions in the selected one or more of the header portion and the payload portion are encrypted using an encryption algorithm.

Anonymous server based user settings protection

Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.

Anonymous server based user settings protection

Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.