Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
First Claim
1. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
- detecting a requested slow-down of the rendering of the content, wherein the detected requested slow-down is presumably initiated by a content thief attempting to steal the content; and
responding to the detected requested slow-down in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
2 Assignments
0 Petitions
Accused Products
Abstract
Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
-
Citations
58 Claims
-
1. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
-
detecting a requested slow-down of the rendering of the content, wherein the detected requested slow-down is presumably initiated by a content thief attempting to steal the content; and
responding to the detected requested slow-down in a manner designed to frustrate the presumed attempt of the content thief to steal the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
-
detecting transfers of relatively large amounts of data, wherein the detected transfers are presumably initiated by a content thief attempting to steal the content; and
responding to the detected transfers in a manner designed to frustrate the presumed attempt of the content thief to steal the content. - View Dependent Claims (11, 12, 13, 14, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 27, 28, 29)
-
-
15. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
-
detecting a re-compressor-based requested slow-down of the rendering of the content, wherein the detected requested slow-down is presumably initiated by a content thief attempting to steal and re-compress the content; and
responding to the detected requested slow-down in a manner designed to frustrate the presumed attempt of the content thief to steal and re-compress the content.
-
-
26. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
-
detecting a re-compressor re-compressing the content, wherein the detected re-compressor is presumably operated by a content thief attempting to steal and re-compress the content; and
responding to the detected re-compressor in a manner designed to frustrate the presumed attempt of the content thief to steal and re-compress the content.
-
-
30. A computer-readable medium having computer-executable instructions thereon for preventing theft of decompressed digital content as the content is being rendered, the instructions being organized into modules including:
-
a first module for detecting a requested slow-down of the rendering of the content, wherein the detected requested slow-down is presumably initiated by a content thief attempting to steal the content; and
a second module for responding to the detected requested slow-down in a manner designed to frustrate the presumed attempt of the content thief to steal the content. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 40, 41, 42, 43)
-
-
39. A computer-readable medium having computer-executable instructions thereon for preventing theft of decompressed digital content as the content is being rendered, the instructions being organized into modules including:
-
a first module for detecting transfers of relatively large amounts of data, wherein the detected transfers are presumably initiated by a content thief attempting to steal the content; and
a second module for responding to the detected transfers in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
-
-
44. A computer-readable medium having computer-executable instructions thereon for preventing theft of decompressed digital content as the content is being rendered, the instructions being organized into modules including:
-
a first module for detecting a re-compressor-based requested slow-down of the rendering of the content, wherein the detected requested slow-down is presumably initiated by a content thief attempting to steal and re-compress the content; and
a second module for responding to the detected requested slow-down in a manner designed to frustrate the presumed attempt of the content thief to steal and re-compress the content. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 56, 57, 58)
-
-
55. A computer-readable medium having computer-executable instructions thereon for preventing theft of decompressed digital content as the content is being rendered, the instructions being organized into modules including:
-
a first module for detecting a re-compressor re-compressing the content, wherein the detected re-compressor is presumably operated by a content thief attempting to steal and re-compress the content; and
a second module for responding to the detected re-compressor in a manner designed to frustrate the presumed attempt of the content thief to steal and re-compress the content.
-
Specification