Digital rights management license identification
First Claim
Patent Images
1. A computer-implemented method of building a digital license for digital rights management executed on an electronic device, the method comprising:
- assigning a decryption content key to the digital license, the electronic device requiring the decryption content key to decrypt content data encrypted by a symmetric encryption cryptographic content key;
assigning a policy in the digital license, the policy including a first portion not affecting rights granted by the policy and a second portion defining circumstances in which the decryption content key is allowed to decrypt the content data, the second portion including indication of when the digital license expires;
applying a deterministic sequence of instructions to the second portion of the policy to return a digital fingerprint based on the second portion of the policy but ignoring the first portion of the policy; and
assigning the digital fingerprint to the digital license as an identifier for the digital license.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital rights management license provides access to a content key that can be used to decrypt an encrypted digital content item. The digital rights management license also includes a policy that defines circumstances in which the content key is allowed to decrypt the encrypted digital content item. Further, the digital rights management license includes a license identifier. The license identifier is a digital fingerprint of at least a portion of the policy of the license.
-
Citations
14 Claims
-
1. A computer-implemented method of building a digital license for digital rights management executed on an electronic device, the method comprising:
-
assigning a decryption content key to the digital license, the electronic device requiring the decryption content key to decrypt content data encrypted by a symmetric encryption cryptographic content key; assigning a policy in the digital license, the policy including a first portion not affecting rights granted by the policy and a second portion defining circumstances in which the decryption content key is allowed to decrypt the content data, the second portion including indication of when the digital license expires; applying a deterministic sequence of instructions to the second portion of the policy to return a digital fingerprint based on the second portion of the policy but ignoring the first portion of the policy; and assigning the digital fingerprint to the digital license as an identifier for the digital license. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method of building a digital license for digital rights management executed on an electronic device, the method comprising:
-
assigning a decryption content key to the digital license, the electronic device requiring the decryption content key to decrypt content data encrypted by a symmetric encryption cryptographic content key; assigning a policy in the digital license, the policy including a first portion not affecting rights grated by the policy and a second portion defining circumstances in which the decryption content key is allowed to decrypt the content data, the second portion including indication of when the digital license expires; applying a hash function to the second portion of the policy to return a digital fingerprint based on the second portion of the policy but ignoring the first portion of the policy; and assigning the digital fingerprint of the portion of the policy to the digital license as an identifier for the digital license. - View Dependent Claims (12)
-
-
13. A computer-implemented method of building a digital license for digital rights management executed on an electronic device, the method comprising:
-
assigning a decryption content key to the digital license, the electronic device requiring the decryption content key to decrypt content data encrypted by a symmetric encryption cryptographic content key; assigning a policy in the digital license, the policy including a first portion not affecting rights granted by the policy and a second portion defining circumstances in which the decryption content key is allowed to decrypt the content data, the second portion including indication of when the digital license expires; applying a hash function to the second portion of the policy to return a digital fingerprint based on the second portion of the policy but ignoring the first portion of the policy; assigning the digital fingerprint to the digital license as an identifier for the digital license; and randomizing the identifier for the digital license responsive to the second portion of the policy granting consumable, cumulative rights. - View Dependent Claims (14)
-
Specification