×

Browser/web apps access to secure surface

  • US 10,102,648 B1
  • Filed: 12/12/2012
  • Issued: 10/16/2018
  • Est. Priority Date: 12/12/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing content with a computing device that is operative to perform actions, comprising:

  • obtaining one of a key or a license based on a users authorization to access secure content, the key or the license being configured to enable decryption of the secure content;

    obtaining a plurality of content layers to combine into an image for display, whereina first layer of the plurality of content layers includes an area of secure content and an area of unsecure content, at a theoretical secure content layer;

    at least one of the plurality of content layers includes an area of unsecure content that overlaps the area of secure content in the first layer,the area of secure content includes at least one client application authorized to access the secure content, the at least one client application configured to receive and playback the secure content, andthe secure content includes multimedia content with restricted access received by the at least one client application and from a content provider server configured to stream the multimedia content;

    decrypting the secure content using the key or the license;

    splitting the secure content and the unsecure content included in the first layer into a split secure content layer and a split unsecure content layer;

    rendering the split secure content layer as a new layer below the plurality of content layers and rendering the split unsecure content layer at the theoretical secure content layer,wherein rendering the split secure content layer as a new layer below the plurality of content layers includes;

    determining whether a pixel in the at least one of the plurality of content layers is in the area of unsecure content that overlaps the area of secure content in the first layer; and

    in response to determining the pixel is in the area of unsecure content that overlaps the area of secure content in the first layer modifying the pixel to be transparent;

    generating the image based on at least combining the plurality of content layers, wherein the area of secure content is visible in the image through each modified pixel; and

    enabling the display of the image.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×