Method to protect digital data using the open mobile alliance digital rights management standard
First Claim
1. A method to protect digital data using the OMA DRM standard comprising acts of:
- generating an encryption key and an ID unique to a user assigned by a content provider;
a decryption key corresponding to the encryption key and;
encrypting a digital content into an encrypted object with the encryption key and making the encrypted object available publicly by the content provider;
packaging the ID and the decryption key into a rights object corresponding to the encrypted object by the content provider;
delivering the ID and the encrypted object to the user'"'"'s mobile device through a deliverer;
delivering the rights object to the user'"'"'s mobile device through the deliverer;
verifying ID delivered with the encrypted object and ID in the rights object; and
decrypting the encrypted object.
1 Assignment
0 Petitions
Accused Products
Abstract
A method to protect digital rights using an OMA DRM standard has acts of generating an encryption key and an ID unique to a user and a decryption key, encrypting the digital content using the encryption key into an encrypted object, packaging the ID and the decryption key into a rights object, delivering the ID and the encrypted object to the user'"'"'s mobile device, delivering the rights object to the user'"'"'s mobile device, verifying ID delivered with the encrypted object and ID in the rights object and decrypting the encrypted object. The method replaces assigning a conventional identifier to each digitized content with assigning each user a unique ID. For either the rental service or the purchase service all downloaded content in the user'"'"'s mobile device is accessible based on the same rights object to improve unreasonably receiving so many rights objects for each downloaded digital content.
5 Citations
11 Claims
-
1. A method to protect digital data using the OMA DRM standard comprising acts of:
-
generating an encryption key and an ID unique to a user assigned by a content provider;
a decryption key corresponding to the encryption key and;
encrypting a digital content into an encrypted object with the encryption key and making the encrypted object available publicly by the content provider;
packaging the ID and the decryption key into a rights object corresponding to the encrypted object by the content provider;
delivering the ID and the encrypted object to the user'"'"'s mobile device through a deliverer;
delivering the rights object to the user'"'"'s mobile device through the deliverer;
verifying ID delivered with the encrypted object and ID in the rights object; and
decrypting the encrypted object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification