Digital rights management user data transfer
First Claim
Patent Images
1. A method of transferring data subject to digital rights management limitations, the method comprising:
- obtaining data subject to digital rights management limitations from an original terminal at a replacement terminal;
obtaining a transfer module at the replacement terminal from a trusted source;
loading the transfer module onto the replacement terminal;
decrypting the data subject to digital rights management limitations using a key provided by the transfer module; and
encrypting the data subject to digital rights management limitations.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, device, and system use a transfer module that is distributed and used in a controlled manner. This transfer module has sufficient access rights to de-crypt and re-encrypt content to perform the unbinding and binding operations needed to transfer content from one terminal to another. Assuming a back-up copy of relevant data is kept by the user, the back-up copy is encrypted with a key of a trusted party. The encrypted data can be transferred to a new device. The corresponding decryption key is transferred from the trusted party to the new device along with the transfer module.
-
Citations
21 Claims
-
1. A method of transferring data subject to digital rights management limitations, the method comprising:
-
obtaining data subject to digital rights management limitations from an original terminal at a replacement terminal;
obtaining a transfer module at the replacement terminal from a trusted source;
loading the transfer module onto the replacement terminal;
decrypting the data subject to digital rights management limitations using a key provided by the transfer module; and
encrypting the data subject to digital rights management limitations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 11)
-
-
9. A device that transfers data subject to digital rights management limitations, the device comprising:
-
a digital rights management user data transfer module that handles the transfer of user data subject to the digital rights management limitations; and
a digital rights management rights server that manages rights stored on the device by decrypting the data subject to digital rights management limitations using a key from the digital rights management user data transfer module and encrypting the data subject to digital rights management limitations. - View Dependent Claims (10, 12, 13, 17)
-
-
14. A system for transferring data subject to digital rights management limitations, the system comprising:
-
an original terminal having a first rights database containing data subject to digital rights management limitations;
a replacement terminal having an encrypted rights database and a second rights database; and
a trusted entity that communicates a transfer module to the replacement terminal, the transfer module providing a key to enable the replacement terminal to decrypt data subject to digital rights management limitations communicated from the original terminal. - View Dependent Claims (15, 16, 18, 19, 20)
-
-
21. A transfer module configured to facilitate communication of data subject to digital rights management limitations, the transfer module comprising:
-
computer code including identification information; and
a key for decrypting or encrypting data subject to digital rights management limitations on a first terminal, wherein the data is provided, by a second terminal;
wherein the transfer module is loadable onto the second terminal from a trusted source.
-
Specification