Browser/web apps access to secure surface
First Claim
1. A method for managing content with a computing device that is operative to perform actions, comprising:
- obtaining one of a key or a license based on a users authorization to access secure content, the key or the license being configured to enable decryption of the secure content;
obtaining a plurality of content layers to combine into an image for display, whereina first layer of the plurality of content layers includes an area of secure content and an area of unsecure content, at a theoretical secure content layer;
at least one of the plurality of content layers includes an area of unsecure content that overlaps the area of secure content in the first layer,the area of secure content includes at least one client application authorized to access the secure content, the at least one client application configured to receive and playback the secure content, andthe secure content includes multimedia content with restricted access received by the at least one client application and from a content provider server configured to stream the multimedia content;
decrypting the secure content using the key or the license;
splitting the secure content and the unsecure content included in the first layer into a split secure content layer and a split unsecure content layer;
rendering the split secure content layer as a new layer below the plurality of content layers and rendering the split unsecure content layer at the theoretical secure content layer,wherein rendering the split secure content layer as a new layer below the plurality of content layers includes;
determining whether a pixel in the at least one of the plurality of content layers is in the area of unsecure content that overlaps the area of secure content in the first layer; and
in response to determining the pixel is in the area of unsecure content that overlaps the area of secure content in the first layer modifying the pixel to be transparent;
generating the image based on at least combining the plurality of content layers, wherein the area of secure content is visible in the image through each modified pixel; and
enabling the display of the image.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed towards generating an image from a plurality of content layers. The content layers may include secure content that overlaps at least one other content layer. When the image is generated, the secure content may be rendered as a layer below the plurality of content layers. Additionally, each area of content layers that is overlapped by an area of the secure content may be modified to be transparent, where the area of the secure content is visible in the image through each transparently modified area. In some embodiments, an alpha channel value of each pixel in each area of content layers that is overlapped by the secure content may be modified. Secure content and unsecure content at a same layer may be split into different layers, where the unsecure content layer may be rendered at a theoretical secure content layer.
-
Citations
17 Claims
-
1. A method for managing content with a computing device that is operative to perform actions, comprising:
-
obtaining one of a key or a license based on a users authorization to access secure content, the key or the license being configured to enable decryption of the secure content; obtaining a plurality of content layers to combine into an image for display, wherein a first layer of the plurality of content layers includes an area of secure content and an area of unsecure content, at a theoretical secure content layer; at least one of the plurality of content layers includes an area of unsecure content that overlaps the area of secure content in the first layer, the area of secure content includes at least one client application authorized to access the secure content, the at least one client application configured to receive and playback the secure content, and the secure content includes multimedia content with restricted access received by the at least one client application and from a content provider server configured to stream the multimedia content; decrypting the secure content using the key or the license; splitting the secure content and the unsecure content included in the first layer into a split secure content layer and a split unsecure content layer; rendering the split secure content layer as a new layer below the plurality of content layers and rendering the split unsecure content layer at the theoretical secure content layer, wherein rendering the split secure content layer as a new layer below the plurality of content layers includes;
determining whether a pixel in the at least one of the plurality of content layers is in the area of unsecure content that overlaps the area of secure content in the first layer; andin response to determining the pixel is in the area of unsecure content that overlaps the area of secure content in the first layer modifying the pixel to be transparent; generating the image based on at least combining the plurality of content layers, wherein the area of secure content is visible in the image through each modified pixel; and enabling the display of the image. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing device for managing content, comprising:
-
a memory for storing data and instructions; and a processor that executes the instructions to enable actions, including; obtaining one of a key or a license based on a users authorization to access secure content, the key or the license being configured to enable decryption of the secure content; obtaining a plurality of content layers to combine into an image for display, wherein a first layer of the plurality of content layers includes an area of secure content and an area of unsecure content, at a theoretical secure content layer; at least one of the plurality of content layers includes an area of unsecure content that overlaps the area of secure content in the first layer, the area of secure content includes at least one client application authorized to access the secure content, the at least one client application configured to receive and playback the secure content, and the secure content includes multimedia content with restricted access received by the at least one client application and from a content provider server configured to stream the multimedia content; decrypting the secure content using the key or the license; splitting the secure content and the unsecure content included in the first layer into a split secure content layer and a split unsecure content layer; rendering the split secure content layer as a new layer below the plurality of content layers and rendering the split unsecure content layer at the theoretical secure content layer, wherein rendering the split secure content layer as a new layer below the plurality of content layers includes;
determining whether a pixel in the at least one of the plurality of content layers is in the area of unsecure content that overlaps the area of secure content in the first layer; andin response to determining the pixel is in the area of unsecure content that overlaps the area of secure content in the first layer modifying the pixel to be transparent; generating the image based on at least combining the plurality of content layers, wherein the area of secure content is visible in the image through each modified pixel; and enabling the display of the image. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A processor readable non-transitory storage media that includes instructions for managing content, where in the execution of the instructions by a process enables actions, comprising:
-
obtaining one of a key or a license based on a users authorization to access secure content, the key or the license being configured to enable decryption of the secure content; obtaining a plurality of content layers to combine into an image for display, wherein a first layer of the plurality of content layers includes an area of secure content and an area of unsecure content, at a theoretical secure content layer; at least one of the plurality of content layers includes an area of unsecure content that overlaps the area of secure content in the first layer, the area of secure content includes at least one client application authorized to access the secure content, the at least one client application configured to receive and playback the secure content, and the secure content includes multimedia content with restricted access received by the at least one client application and from a content provider server configured to stream the multimedia content; decrypting the secure content using the key or the license; splitting the secure content and the unsecure content included in the first layer into a split secure content layer and a split unsecure content layer; rendering the split secure content layer as a new layer below the plurality of content layers and rendering the split unsecure content layer at the theoretical secure content layer, wherein rendering the split secure content layer as a new layer below the plurality of content layers includes;
determining whether a pixel in the at least one of the plurality of content layers is in the area of unsecure content that overlaps the area of secure content in the first layer; andin response to determining the pixel is in the area of unsecure content that overlaps the area of secure content in the first layer modifying the pixel to be transparent; generating the image based on at least combining the plurality of content layers, wherein the area of secure content is visible in the image through each modified pixel; and enabling the display of the image. - View Dependent Claims (14, 15, 16, 17)
-
Specification