Techniques for accessing controlled media objects
First Claim
1. A method for managing media objects, the method comprising:
- providing an algorithm configured to generate an identifier (ID) based on content of a first media object; and
generating the ID for the first media object, wherein the ID allows the first device to identify the first media object to a second device, wherein the second device is configured to use the ID to determine if a second media object associated with the ID is accessible to the second device, the first media object and second media object including substantially identical content, wherein the determination is made notwithstanding source information for the first and second media objects or digital rights restrictions imposed on the first and second media objects.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for managing media objects are provided. The techniques include providing an algorithm configured to generate an identifier (ID) based on content of a first media object. The ID is then generated for the first media object. The ID allows the first device to identify the first media object to a second device. The second device is configured to use the ID to determine if a second media object associated with the ID is accessible to the second device. Also, the determination is made notwithstanding source information for the first and second media objects or digital rights restrictions imposed on the first and second media objects, where the first media object and second media object include substantially identical content.
55 Citations
42 Claims
-
1. A method for managing media objects, the method comprising:
-
providing an algorithm configured to generate an identifier (ID) based on content of a first media object; and generating the ID for the first media object, wherein the ID allows the first device to identify the first media object to a second device, wherein the second device is configured to use the ID to determine if a second media object associated with the ID is accessible to the second device, the first media object and second media object including substantially identical content, wherein the determination is made notwithstanding source information for the first and second media objects or digital rights restrictions imposed on the first and second media objects. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for managing media objects, the method comprising:
-
determining an input identifier (ID), using a reader, for an input media object, the input ID generated based on content of the input media object; comparing the input ID to reader IDs for the one or more media objects to determine if the input ID matches a reader ID, each reader ID generated based on the content of a media object in the one or more media objects; and if the input ID corresponds to a reader ID, determining a media object used to generate the reader ID. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for managing media objects, the method comprising:
-
generating an ID for a first media object at a first device based on content of the first media object; and transferring the ID to a second device, wherein the second device is configured to use the ID to determine if a second media object associated with the ID is accessible to the second device, the first media object and second media object including substantially identical content, wherein the determination is made notwithstanding source information for the first and second media objects and digital rights restrictions imposed on the first and second media objects. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A method for providing digital rights management for media objects, the method comprising:
-
generating an ID based on unencrypted content of the media object and an encryption key based on the unencrypted content; receiving a request using the ID from a device; encrypting the media object using the encryption key; and sending the encrypted media object encrypted by the encryption key to the device, wherein the device can only decrypt the encrypted media object if the device previously had access to the media object that can be decrypted by the encryption key. - View Dependent Claims (42)
-
Specification