TETHERED DEVICE SYSTEMS AND METHODS
First Claim
Patent Images
1. A method of exporting a license from a host device to a target device, the license for use in governing access to or other use of a piece of electronic content, the method comprising:
- using a pairing key to encrypt a first cryptographic key, the first cryptographic key being configured for decrypting the piece of electronic content;
executing a control program, included in the license, to obtain one or more conditions relating to granting access to the piece of electronic content;
creating a data structure that includes the encrypted first cryptographic key and an indication of the one or more conditions;
digitally signing at least part of the data structure using the pairing key; and
sending the data structure to the target device.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.
35 Citations
21 Claims
-
1. A method of exporting a license from a host device to a target device, the license for use in governing access to or other use of a piece of electronic content, the method comprising:
-
using a pairing key to encrypt a first cryptographic key, the first cryptographic key being configured for decrypting the piece of electronic content; executing a control program, included in the license, to obtain one or more conditions relating to granting access to the piece of electronic content; creating a data structure that includes the encrypted first cryptographic key and an indication of the one or more conditions; digitally signing at least part of the data structure using the pairing key; and sending the data structure to the target device. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
identifying a simple validity statement associated with an encrypted piece of electronic content, the simple validity statement having been derived from a license comprising one or more control programs; using a pairing key to verify a digital signature associated with at least part of the simple validity statement; evaluating one or more conditions expressed in the simple validity statement to determine if the simple validity statement is valid; if the simple validity statement is determined to be valid, using the pairing key to decrypt a content decryption key; and decrypting the encrypted piece of electronic content using the content decryption key. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of managing a tethered device'"'"'s membership in a first domain, the method comprising:
-
obtaining a link object logically connecting a first node representing the tethered device to a second node representing the domain; sending the tethered device a communication operable to set a state object in the tethered device to a predefined value; using the link object to create a link validity statement (LVS) logically connecting the first node to the second node, the LVS containing a condition that indicates that the LVS is only valid if the state object is set to the predefined value; and sending the LVS to the tethered device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of communicating between a first device and a second device, the method comprising:
-
obtaining one or more Universal Serial Bus (USB) descriptors from the second device; parsing the one or more USB descriptors for an indication that the second device supports a predefined extended Small Computer System Interface (SCSI) communication protocol; upon determining that the second device supports the predefined extended SCSI communication protocol, identifying one or more extended SCSI commands recognized by the second device; sending a first communication to the second device using one of said one or more extended SCSI commands, the first communication including a payload that comprises one of a plurality of predefined commands; and receiving a second communication from the second device, the second communication comprising one of said one or more extended SCSI commands, the second communication further comprising a payload that comprises one of the plurality of predefined commands. - View Dependent Claims (21)
-
Specification