Secure time source operations for digital rights management
First Claim
Patent Images
1. A computer-implemented method comprising:
- establishing communication between an open computing system and a remote secure time service, wherein the remote secure time service serves as a source for secure time values;
receiving, with the open computing system, one or more time values from the remote secure time service; and
using the one or more time values to make digital rights management (DRM) time-based decisions regarding DRM-protected content that is consumed on the open computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
establishing communication between an open computing system and a remote secure time service, wherein the remote secure time service serves as a source for secure time values; receiving, with the open computing system, one or more time values from the remote secure time service; and using the one or more time values to make digital rights management (DRM) time-based decisions regarding DRM-protected content that is consumed on the open computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method comprising:
-
generating a request for a secure time value, wherein said request is generated by a time source located on a computing device that has been remotely provisioned with digital rights management (DRM) software; sending the request, via the Internet, to a remote secure time service; receiving, from the remote time service, at least one secure time value; storing said at least one secure time value in the time source; and using the secure time value to provide a measure of time that can be used to make DRM-based decisions with regard to DRM-protected content. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computing device comprising:
-
one or more processors; one or more computer-readable media; instructions on the one or more computer-readable media which, when executed, provide one or more partitions one of which comprises a digital rights management (DRM) partition that is remotely provisionable with DRM software; and a hardware time source (212) operatively associated with the DRM partition and configured to serve as a source of secure time values, wherein the hardware time source is configured to communicate with a remote secure time service to receive secure time values that can be used to provide time measures to the DRM partition so that DRM software executing inside the DRM partition can make time-based DRM decisions. - View Dependent Claims (17, 18, 19, 20)
-
Specification