Managing access to content
First Claim
Patent Images
1. A method comprising:
- receiving, from a device, a content referral request; and
sending to the device, in response to the content referral request, both an identifier of a source of the content and one or more keys that allow the device to decrypt the content.
2 Assignments
0 Petitions
Accused Products
Abstract
Content access management allows a content request to be received from a device. In response to the content request, both an identifier of a source of the content and one or more keys that allow the device to decrypt the content are sent to the device. The device is then able to retrieve, as it desires, the content from the source and decrypt and use the content.
-
Citations
62 Claims
-
1. A method comprising:
-
receiving, from a device, a content referral request; and
sending to the device, in response to the content referral request, both an identifier of a source of the content and one or more keys that allow the device to decrypt the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method comprising:
-
maintaining a record of where a plurality of content packages are stored;
maintaining a record of a plurality of keys, wherein each of the plurality of keys can be used to decrypt at least one of the plurality of content packages; and
restricting, for a particular one of the plurality of content packages, which of a plurality of requesting devices can receive an indication of where the content package is stored as well as one of the plurality of keys, wherein the one of the plurality of keys can be used to decrypt the content package. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to:
-
maintain a record of a plurality of locations where content is stored;
maintain a record of a key that can be used to decrypt the content;
receive, from a device, a request for a referral to the content; and
send, to the device, both the key that can be used to decrypt the content and an identifier of one of the plurality of locations where the content is stored. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. One or more computer readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a device, causes the one or more processors to:
-
send, to a remote device, a request for a referral to a source of a piece of content;
receive, from the remote device, both a key that can be used to decrypt the piece of content and an identifier of the source of the piece of content;
retrieve, from the source, the piece of content;
decrypt the piece of content using the key; and
save the piece of content locally on the device. - View Dependent Claims (49, 50, 51, 52, 53, 54)
-
-
55. A method, implemented in a computing device, the method comprising:
-
receiving a request for content from a game console, wherein the computing device was identified to the game console by another device; and
sending the requested content to the game console, wherein the requested content is encrypted using a key communicated to the game console by the other device. - View Dependent Claims (56)
-
-
57. A system comprising:
-
a selection module configured to receive a request for a piece of content from a device;
a verification module configured to determine whether the device has permission to access the piece of content; and
wherein the selection module is further configured to pass to the device, if the verification module determines that the device has permission to access the piece of content, both a source of the piece of content and one or more keys that allow the device to decrypt the piece of content. - View Dependent Claims (58, 59, 60, 61)
-
-
62. A system comprising:
-
means for receiving a content referral request from a device;
means for determining whether the device has permission to access the content; and
the means for receiving the request further comprising means for passing to the device, if the means for determining determines that the device has permission to access the content, both a source of the content and one or more keys that allow the device to decrypt the content.
-
Specification