Method and Apparatus for Secure Content Recording
First Claim
Patent Images
1. A method comprising:
- establishing a secure tunnel with a content acquisition processor that acquires encrypted content from a content source and decrypts the encrypted content to obtain content, the content acquisition processor not being trusted for providing digital rights management; and
transmitting a request through the secure tunnel to the content acquisition processor to re-encrypt the content with a content encryption key so that re-encrypted content is generated and store the re-encrypted content on a storage medium, the request including the content encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided that establishes a secure tunnel with a content acquisition processor that acquires encrypted content from a content source and decrypts the encrypted content to obtain content. The content acquisition processor is not trusted for providing digital rights management. Further, the method transmits a request through the secure tunnel to the content acquisition processor to re-encrypt the content with a content encryption key so that re-encrypted content is generated and stores the re-encrypted content on a storage medium. The request includes the content encryption key.
32 Citations
20 Claims
-
1. A method comprising:
-
establishing a secure tunnel with a content acquisition processor that acquires encrypted content from a content source and decrypts the encrypted content to obtain content, the content acquisition processor not being trusted for providing digital rights management; and transmitting a request through the secure tunnel to the content acquisition processor to re-encrypt the content with a content encryption key so that re-encrypted content is generated and store the re-encrypted content on a storage medium, the request including the content encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
establishing a secure tunnel with a digital rights management processor that is trusted for maintaining a digital rights management system; receiving encrypted content from a content source; decrypting the encrypted content to obtain content; and receiving, from the digital rights management processor through the secure tunnel, a request to re-encrypt the content with a content encryption key and store the re-encrypted content on a storage medium, the request including the content encryption key. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method comprising:
-
establishing a secure tunnel between a digital rights management processor that is trusted for maintaining a digital rights management system and a content acquisition processor that is not trusted for maintaining the digital rights management system; receiving, at the content acquisition processor, encrypted content from a content source; decrypting, at the content acquisition processor, the encrypted content to obtain content; and transmitting a request from the digital rights management processor through the secure tunnel to the content acquisition processor, the request being to re-encrypt the content with a content encryption key and store the re-encrypted content on a storage medium, the request including the content encryption key. - View Dependent Claims (20)
-
Specification