Digital rights management system with diversified content protection process
First Claim
1. A digital rights management (DRM) method for protecting content, the method comprising:
- a) based on a first set of diversity indicia, identifying a first security element for distributing a set of content to a first computer;
b) based on a second set of diversity indicia, identifying a second security element for distributing the set of content to a second computer;
c) based on the identified first security element, protecting the set of content for the first computer; and
d) based on the identified second security element, protecting the set of content for the second computer.
2 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments of the invention provide a digital rights management (DRM) method for distributing content to users over a network. Based on a first set of diversity indicia, the method identifies a first security element for distributing a set of content to a first computer. The set of content includes one or more pieces of content. Based on a second set of diversity indicia, the method identifies a second security element for distributing the set of content to a second computer. Based on the first security element, method protects the set of content for the first computer and sends the protected set of content to the first computer through the network. Based on the second security element, the method protects the set of content for the second computer and sends the protected set of content to the second computer through the network.
-
Citations
68 Claims
-
1. A digital rights management (DRM) method for protecting content, the method comprising:
-
a) based on a first set of diversity indicia, identifying a first security element for distributing a set of content to a first computer;
b) based on a second set of diversity indicia, identifying a second security element for distributing the set of content to a second computer;
c) based on the identified first security element, protecting the set of content for the first computer; and
d) based on the identified second security element, protecting the set of content for the second computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A digital rights management (DRM) system for distributing content, the system comprising:
-
a) a plurality of user computers;
b) a set of DRM computers communicatively coupled to the user computers, the set of DRM computers for receiving requests to access a particular content from a plurality of the user computers;
c) for each particular user computer that requests access to the particular content, the set of DRM computers for 1) identifying a particular security element function for distributing the particular content to the particular user computer based on a set of diversity indicia for the particular user computer;
2) protecting the particular content for the particular user computer, based on the identified security element function; and
3) sending the protected particular content to the particular user computer. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
a. identifying a set of diversity indicia; and
b. based on the identified set of diversity indicia, selecting a particular security element from a plurality of security elements, said particular security element for protecting content. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A computer readable medium storing a computer program executable by at least one processor, the computer program comprising sets of instructions for:
-
a. identifying a set of diversity indicia;
b. based on the identified set of diversity indicia, selecting a particular security element from a plurality of security elements, said particular security element for protecting content. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method for accessing content that is protected by using a security element that is based on a set of diversity indicia, the method comprising:
-
a. identifying a particular access function that is associated with the set of diversity indicia; and
b. accessing the content by using the particular access function. - View Dependent Claims (56, 57, 58, 59, 60, 61)
-
-
62. A computer readable medium storing a computer program for accessing content that is protected by using a security element that is based on a set of diversity indicia, said computer program executable by at least one processor, the computer program comprising sets of instructions for:
-
a. identifying a particular access function that is associated with the set of diversity indicia; and
b. accessing the content by using the particular access function. - View Dependent Claims (63, 64, 65, 66, 67, 68)
-
Specification