Technique for securely communicating programming content
First Claim
1. A method for transferring programming content to a device, comprising:
- receiving from the device a request for transfer of the programming content thereto, an extent of security of the device being indicated by an indicator assigned thereto;
in response to the request, authenticating the device to determine legitimacy of the device for receiving the programming content; and
transferring to the device the programming content and a set of rules associated with the programming content after the device is authenticated, at least some of the rules in the set being associated with the indicator and applicable to the device with respect to use of the programming content.
7 Assignments
0 Petitions
Accused Products
Abstract
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc. The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
-
Citations
88 Claims
-
1. A method for transferring programming content to a device, comprising:
-
receiving from the device a request for transfer of the programming content thereto, an extent of security of the device being indicated by an indicator assigned thereto;
in response to the request, authenticating the device to determine legitimacy of the device for receiving the programming content; and
transferring to the device the programming content and a set of rules associated with the programming content after the device is authenticated, at least some of the rules in the set being associated with the indicator and applicable to the device with respect to use of the programming content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for transferring programming content between devices, comprising:
-
defining a first protective layer, devices within the first protective layer transferring programming content to one another pursuant to a first process;
defining a second protective layer, a first device in the first protective layer transferring selected programming content to a second device in the second protective layer pursuant to a second process which comprises;
authenticating the second device to determine legitimacy of the second device for receiving the selected programming content, the second device being assigned an indicator indicating an extent of security thereof; and
transferring to the second device the selected programming content and a set of rules associated with the selected programming content after the second device is authenticated, at least some of the rules in the set being associated with the indicator and applicable to the second device with respect to use of the selected programming content. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for use in a device for receiving protected content, comprising:
-
storing an indicator indicating an extent of security of the device;
sending to an apparatus a request for transferring the protected content to the device;
providing to the apparatus data for validating legitimacy of the device for receiving the protected content from the apparatus; and
receiving from the apparatus the protected content, and a set of rules associated with the protected content, at least some of the rules in the set being associated with the indicator and applicable to the device with respect to use of the protected content. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for use in a module apparatus connectable to a device having programming content, which is encrypted, stored in storage in the device, the method comprising:
-
receiving a request from the device for accessing the programming content, the request including a data package stored in association with the encrypted programming content in the storage;
in response to the request determining that the device is allowed to access the programming content based on information in the first data package; and
providing to the device at least data concerning a cryptographic element for decrypting the encrypted programming content in the storage, thereby providing the device with access to the programming content. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. A method for use in a device connectable to a module apparatus, the device having storage therein, the method comprising:
-
sending to the module apparatus a request for recording selected programming content;
receiving from the module apparatus a response to the request, the response including data concerning a cryptographic element, a data package containing at least a version of the cryptographic element, and a determination that the device is allowed to record the selected programming content based at least one a security measure associated with the selected programming content;
recording the selected programming content based on the determination;
encrypting the recorded programming content with the cryptographic element derived from the data; and
storing the encrypted programming content in association with the data package in the storage. - View Dependent Claims (39, 40, 41, 42, 43, 44)
-
-
45. An apparatus for transferring programming content to a device, comprising:
-
an interface for receiving from the device a request for transfer of the programming content thereto, an extent of security of the device being indicated by an indicator assigned thereto;
a mechanism responsive to the request for authenticating the device to determine legitimacy of the device for receiving the programming content; and
a processor programmed to transfer to the device the programming content and a set of rules associated with the programming content after the device is authenticated, at least some of the rules in the set being associated with the indicator and applicable to the device with respect to use of the programming content. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52)
-
-
53. A system for transferring programming content between devices, comprising:
-
devices within a first protective layer transferring programming content to one another pursuant to a first process; and
a first device in the first protective layer transferring selected programming content to a second device in a second protective layer pursuant to a second process, the first device including a processor programmed to perform the second process which comprises;
authenticating the second device to determine legitimacy of the second device for receiving the selected programming content, the second device being assigned an indicator indicating an extent of security thereof; and
transferring to the second device the selected programming content and a set of rules associated with the selected programming content after the second device is authenticated, at least some of the rules in the set being associated with the indicator and applicable to the second device with respect to use of the selected programming content. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A device for receiving protected content, comprising:
-
storage for storing an indicator indicating an extent of security of the device, a request being sent to an apparatus for transferring the protected content to the device;
a processor programmed to provide to the apparatus data for validating legitimacy of the device for receiving the protected content from the apparatus; and
an interface for receiving from the apparatus the protected content, and a set of rules associated with the protected content, at least some of the rules in the set being associated with the indicator and applicable to the device with respect to use of the protected content. - View Dependent Claims (66, 67, 68, 69, 70)
-
-
71. Module apparatus connectable to a device having programming content, which is encrypted, stored in storage in the device, the apparatus comprising:
-
an interface for receiving a request from the device for accessing the programming content, the request including a data package stored in association with the encrypted programming content in the storage;
a processor configured to determine, in response to the request, that the device is allowed to access the programming content based on information in the first data package; and
a mechanism for providing to the device at least data concerning a cryptographic element for decrypting the encrypted programming content in the storage, thereby providing the device with access to the programming content. - View Dependent Claims (72, 73, 74, 75, 76, 77, 78, 79)
-
-
80. A device connectable to a module apparatus, the device comprising:
-
a processing unit configured to generate a request for recording selected programming content, the request being sent to the module apparatus;
an interface for receiving from the module apparatus a response to the request, the response including data concerning a cryptographic element, a data package containing at least a version of the cryptographic element, and a determination that the device is allowed to record the selected programming content based at least one a security measure associated with the selected programming content, the selected programming content being recorded based on the determination;
a mechanism for encrypting the recorded programming content with the cryptographic element derived from the data; and
storage for storing the encrypted programming content in association with the data package therein. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88)
-
Specification