Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
First Claim
1. A computer system for receiving encrypted compressed content and for producing decrypted decompressed content based on the received encrypted compressed content, the system comprising:
- a decryption element for decrypting the content based at least in part on a content key; and
a decompression element for decompressing the content based at least in part on the content key, wherein the content key is employed to decrypt the content and also to decompress the content.
3 Assignments
0 Petitions
Accused Products
Abstract
Encrypted compressed content is produced by encrypting content based at least in part on a content key, and compressing the content based at least in part on the content key. Thus, the content key is employed to encrypt the content and also to compress the content. Similarly, decrypted decompressed content is produced from the encrypted compressed content by decrypting the content based at least in part on a content key, and decompressing the content based at least in part on the content key. Thus, the content key is employed to decrypt the content and also to decompress the content.
-
Citations
33 Claims
-
1. A computer system for receiving encrypted compressed content and for producing decrypted decompressed content based on the received encrypted compressed content, the system comprising:
-
a decryption element for decrypting the content based at least in part on a content key; and
a decompression element for decompressing the content based at least in part on the content key, wherein the content key is employed to decrypt the content and also to decompress the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for receiving content and for producing encrypted compressed content based on the received content, the system comprising:
-
an encryption element for encrypting the content based at least in part on a content key; and
a compression element for compressing the content based at least in part on the content key, wherein the content key is employed to encrypt the content and also to compress the content. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for receiving encrypted compressed content and for producing decrypted decompressed content based on the received encrypted compressed content, the method comprising:
-
decrypting the content based at least in part on a content key; and
decompressing the content based at least in part on the content key, wherein the content key is employed to decrypt the content and also to decompress the content. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method for receiving content and for producing encrypted compressed content based on the received content, the method comprising:
-
encrypting the content based at least in part on a content key; and
compressing the content based at least in part on the content key, wherein the content key is employed to encrypt the content and also to compress the content. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A computer-readable medium having computer-executable instructions thereon for receiving encrypted compressed content and for producing decrypted decompressed content based on the received encrypted compressed content, the instructions being organized into modules including:
-
a first module for decrypting the content based at least in part on a content key; and
a second module for decompressing the content based at least in part on the content key, wherein the content key is employed to decrypt the content and also to decompress the content. - View Dependent Claims (25, 26, 27, 28)
-
-
29. A computer-readable medium having computer-executable instructions thereon for receiving content and for producing encrypted compressed content based on the received content, the method comprising:
-
a first module for encrypting the content based at least in part on a content key; and
a second module for compressing the content based at least in part on the content key, wherein the content key is employed to encrypt the content and also to compress the content. - View Dependent Claims (30, 31, 32, 33)
-
Specification