Token passing technique for media playback devices
First Claim
1. A computer enabled method for controlling distribution of media content between a source, a host device, and a player associated with the host device, the method comprising the acts of:
- exchanging authentication data between the player and the host device;
transmitting a request for a token from the host device to the source;
receiving the token at the host device;
sending the token to the player;
sending identification data from the player to the host source including the token; and
receiving at the player, in response to the token, at least one key relating to encryption or decryption of the content to be distributed.
1 Assignment
0 Petitions
Accused Products
Abstract
A digital rights management (DRM) system for distribution of digital content such as audio or video uses a token passing scheme to enhance security of the content from unauthorized access and use, including access by unauthorized players. The token is requested from the central content or DRM server by a host device such as a user'"'"'s computer, using security related information. The token is then passed to a media player associated with the host device, the token being encrypted using a key special to that particular player. Upon receipt of the token, the player transmits back to the server certain related security information confirming receipt of the token and in return receives keys for decryption of the associated digital content. In the absence of proper passing of the token, player access to the content, or further access to other content, is denied. This also allows the player to communicate directly with the server for obtaining the keys.
64 Citations
44 Claims
-
1. A computer enabled method for controlling distribution of media content between a source, a host device, and a player associated with the host device, the method comprising the acts of:
-
exchanging authentication data between the player and the host device; transmitting a request for a token from the host device to the source; receiving the token at the host device; sending the token to the player; sending identification data from the player to the host source including the token; and receiving at the player, in response to the token, at least one key relating to encryption or decryption of the content to be distributed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer enabled method for controlling distribution of media content to a player from a source, the player having an associated host device, the method comprising the acts of:
-
the player exchanging authentication data with the host device; receiving at the player a token originating at the source, via the host device; sending identification data from the player to the source, the data including the token; and receiving at the player, in response to the token, at least one key relating to encryption or decryption of the content to be distributed. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer enabled method for controlling distribution of media content to a host device for playing on an associated player, the method comprising the acts of:
-
the host device exchanging authentication data with the player; transmitting from the host device a request for a token from the host device to the source; receiving the token at the host device; and sending the token from the host device to the player; and thereby the player being enabled to decrypt or encrypt the content to be distributed. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A player for storing and playing media content received from an external source, and having a digital rights management (DRM) portion, the DRM portion comprising:
-
an input/output port adapted to receive the media content and to send and receive DRM information; a storage for an authentication certificate of the player, coupled to the port; a storage for a global identifier of the player, coupled to the port; a storage for a token received from the source, coupled to the port; a key repository, coupled to the port for storing keys for decrypting the media content; a storage for an additional token, coupled to the port; and a processor coupled to the port and to the global identifier storage and to the token storage, and for assembling identification data including the global identifier, the token, a signature of the token, the authentication certificate, and a size of the token signature and a size of the authentication certificate to be transmitted from the port.
-
Specification