Method and apparatus for using DRM content while roaming
First Claim
Patent Images
1. A method of using Digital Rights Management (DRM) content while roaming, the method comprising:
- issuing disposable authentication information to a mobile device;
receiving a request for remote authentication along with the authentication information from an unauthorized device included in a remote domain;
transmitting a query for the remote authentication to the unauthorized device;
receiving a response to the query; and
transmitting data approving authentication of the unauthorized device to the unauthorized device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of using digital rights management (DRM) content while roaming is provided. The method includes issuing disposable authentication information to a mobile device; receiving a request for remote authentication along with the authentication information from an unauthorized device included in a remote domain; transmitting a query for the remote authentication to the unauthorized device; receiving a response to the query; and transmitting data approving authentication of the unauthorized device to the unauthorized device.
39 Citations
18 Claims
-
1. A method of using Digital Rights Management (DRM) content while roaming, the method comprising:
-
issuing disposable authentication information to a mobile device; receiving a request for remote authentication along with the authentication information from an unauthorized device included in a remote domain; transmitting a query for the remote authentication to the unauthorized device; receiving a response to the query; and transmitting data approving authentication of the unauthorized device to the unauthorized device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of using Digital Rights Management (DRM) content while roaming, the method comprising:
-
issuing disposable authentication information from a device of a source domain to a mobile device; requesting remote authentication to an unauthorized device of a remote domain using the disposable authentication information; receiving a result approving remote authentication from the unauthorized device; and transmitting a temporary rights object to the unauthorized device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of using Digital Rights Management (DRM) content while roaming, the method comprising:
-
receiving a message requesting remote authentication from a mobile device; transmitting a remote-authentication request message, which comprises a device identifier of a source domain expressed in the message, to a device of a remote domain; receiving a query for remote authentication from the device of the remote domain; transmitting a response to the query to the device of the remote domain; and receiving data approving authentication from the device of the remote domain. - View Dependent Claims (14, 15)
-
-
16. A method of using Digital Rights Management (DRM) content while roaming, the method comprising:
-
receiving a message requesting remote authentication from an unauthorized device; sending a request for remote authentication to a first device of a source domain expressed in the message, and receiving a query for remote authentication from a second device of a remote domain; transmitting the query to the unauthorized device, and receiving a response to the query from the unauthorized device; transmitting the response to the first device of the source domain; and receiving data approving authentication from the first device of the source domain, and transmitting the authentication-approving data to the unauthorized device.
-
-
17. A device comprising:
-
an authentication unit which issues disposable authentication information to a mobile device, a receiving unit which receives a request for remote authentication along with the authentication information from an unauthorized device included in a remote domain; a transmitting unit which transmits a query for authentication to the unauthorized device; and an encoding or decoding unit which encodes or decodes data transmitted and received via the transmitting unit or the receiving unit, wherein the receiving unit receives a response to the query from the unauthorized device, and the transmitting unit transmits data approving authentication of the unauthorized device to the unauthorized device. - View Dependent Claims (18)
-
Specification