Protecting content objects with rights management information
First Claim
Patent Images
1. A method for protecting a content object with rights management information, comprising the steps of:
- creating a content object;
assigning permissions to the content object;
generating an encryption key;
cloning a content protection utility;
appending the cloned content protection utility, the encryption key, and the permissions to the content object to create a composite object; and
encrypting the composite object with the encryption key to create a protected content object.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for protecting a content object with rights management information begins by creating a content object. Permissions are assigned to the content object, an encryption key is generated, and a content protection utility is cloned. The cloned content protection utility, the encryption key, and the permissions are appended to the content object to create a composite object. The composite object is encrypted with the encryption key to create a protected content object.
-
Citations
28 Claims
-
1. A method for protecting a content object with rights management information, comprising the steps of:
-
creating a content object;
assigning permissions to the content object;
generating an encryption key;
cloning a content protection utility;
appending the cloned content protection utility, the encryption key, and the permissions to the content object to create a composite object; and
encrypting the composite object with the encryption key to create a protected content object. - View Dependent Claims (2, 3, 4)
-
-
5. A method for manipulating a protected content object, comprising the steps of:
-
extracting a content protection utility from the protected content object;
executing the content protection utility;
authenticating a user to access the protected content object;
decrypting the protected content object to unlock a content object if the user is authenticated; and
manipulating the content object. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for protecting a content object, comprising:
-
a permission indicator for the content object, relating to a level of permitted access to the content object;
an encryption key generator, configured to generate an encryption key;
a content protection utility cloning device, configured to clone a content protection utility; and
an appending device, configured to append the permission indicator, the encryption key, and a cloned copy of the content protection utility to the content object, thereby creating a protected content object. - View Dependent Claims (17, 18, 19)
-
-
20. A content object protected with rights management information, comprising:
-
a cloned copy of a content protection utility;
a permission indicator, relating to a level of permitted access to the content object; and
an encryption key, which is used to encrypt and decrypt the content object. - View Dependent Claims (21, 22, 23)
-
-
24. A content creation device for protecting a content object, the content object including a permission indicator relating to a level of permitted access to the content object, the content creation device comprising:
-
an encryption key generator, configured to generate an encryption key;
a content protection utility cloning device, configured to clone a content protection utility; and
an appending device, configured to append the permission indicator, the encryption key, and a cloned copy of the content protection utility to the content object, thereby creating a protected content object. - View Dependent Claims (25, 26, 27, 28)
-
Specification