Persistent license for stored content
First Claim
Patent Images
1. A method comprising:
- forming a request by a client to access encrypted content, wherein;
the request includes a persistent license for communication to a licensing server; and
the persistent license includes a key that is encrypted such that the key is not accessible by the client; and
receiving a license in response to the request, wherein the received license includes the key that is;
accessible by the client; and
for accessing the encrypted content.
2 Assignments
0 Petitions
Accused Products
Abstract
In an implementation, a method includes forming a request by a client for communication to a licensing server. The request is for storing encrypted content by the client. A persistent license is received at the client in response to the request. The persistent license includes a key that is encrypted. The key, when decrypted, provides access to the encrypted content. The key is configured to be decrypted by the licensing server. The client however, is not configured to decrypt the key from the persistent license. The persistent license and the encrypted content are stored by the client.
59 Citations
42 Claims
-
1. A method comprising:
-
forming a request by a client to access encrypted content, wherein;
the request includes a persistent license for communication to a licensing server; and
the persistent license includes a key that is encrypted such that the key is not accessible by the client; and
receiving a license in response to the request, wherein the received license includes the key that is;
accessible by the client; and
for accessing the encrypted content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
forming a request by a client for communication to a licensing server, wherein the request is for storing encrypted content by the client;
receiving a persistent license at the client in response to the request, wherein;
the persistent license includes a key that is encrypted;
the key, when decrypted, provides access to the encrypted content;
the key is configured to be decrypted by the licensing server; and
the client is not configured to decrypt the key from the persistent license;
and storing the persistent license and the encrypted content by the client. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
forming a first request for communication to a licensing server, wherein the first request is for storing encrypted content;
receiving a persistent license in response to the request, wherein the persistent license includes a boundary key;
storing the persistent license and the content;
forming a second request to access the encrypted content, wherein the second request includes the persistent license;
sending the second request to the licensing server;
receiving a boundary license in response to the second request, wherein the boundary license includes the boundary key;
decrypting the boundary license using a session key to obtain the boundary key;
decrypting a content license using the boundary key to obtain a content key; and
decrypting the encrypted content using the content key. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A client comprising:
-
a processor; and
memory configured to maintain;
a persistent license including a key that is encrypted; and
a playback application that is executable on the processor to;
form a request to access encrypted content, wherein the request;
is for communication to a licensing server; and
includes the persistent license;
receive a response to the request that includes the key; and
access the encrypted content utilizing the key. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system comprising:
-
a network;
a client including;
a persistent license having a key that is encrypted; and
a playback application that is executable to;
form a request to access encrypted content, wherein the request includes the persistent license;
receive a response to the request that includes the key; and
access the encrypted content utilizing the key; and
a licensing server including a licensing module that is executable to;
receive the request including the persistent license;
decrypt the persistent license to obtain the key; and
form the response that includes the key for communication to the client over the network. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification