Managing unprotected and protected content in private networks
First Claim
1. A method for managing unprotected and protected content in a private network, the method including the steps of:
- receiving content;
retrieving metadata associated with the received content;
determining whether the received content is unprotected or protected based on the associated metadata;
for unprotected content, allowing the unprotected content to be selectively stored, managed and distributed in the private network based on the associated metadata;
for protected content, identifying a content protection system associated with the protected content based on the associated metadata, and performing at least one of;
displaying information to a user of the private network facilitating retrieval of one or more hardware/software components required by the associated content protection system;
retrieving the one or more required hardware/software components;
verifying that the one or more required hardware/software components are present in the private network,before allowing the protected content to be selectively stored, managed and distributed in the private network based on the associated metadata.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for managing unprotected and protected content in a private network, the method including the steps of: receiving content; retrieving metadata associated with the received content; determining whether the received content is unprotected or protected based on the associated metadata; for unprotected content, allowing the unprotected content to be selectively stored, managed and distributed in the private network based on the associated metadata; for protected content, identifying a content protection system associated with the protected content based on the associated metadata, and performing at least one of: displaying information to a user of the private network facilitating retrieval of one or more hardware/software components required by the associated content protection system; retrieving the one or more required hardware/software components; verifying that the one or more required hardware/software components are present in the private network, before allowing the protected content to be selectively stored, managed and distributed in the private network based on the associated metadata.
27 Citations
14 Claims
-
1. A method for managing unprotected and protected content in a private network, the method including the steps of:
-
receiving content; retrieving metadata associated with the received content; determining whether the received content is unprotected or protected based on the associated metadata; for unprotected content, allowing the unprotected content to be selectively stored, managed and distributed in the private network based on the associated metadata; for protected content, identifying a content protection system associated with the protected content based on the associated metadata, and performing at least one of; displaying information to a user of the private network facilitating retrieval of one or more hardware/software components required by the associated content protection system; retrieving the one or more required hardware/software components; verifying that the one or more required hardware/software components are present in the private network, before allowing the protected content to be selectively stored, managed and distributed in the private network based on the associated metadata. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A processor program product stored in a processor readable storage device, the processor program product having processor instructions for causing at least one processor to:
-
receive content; retrieve metadata associated with the received content; determine whether the received content is unprotected or protected based on the associated metadata; for unprotected content, allow the unprotected content to be selectively stored, managed and distributed in the private network based on the associated metadata; for protected content, identify a content protection system associated with the protected content based on the associated metadata, and perform at least one of; display information to a user of the private network facilitating retrieval of one or more hardware/software components required by the associated content protection system; retrieve the one or more required hardware/software components; verify that the one or more required hardware/software components are present in the private network, before the protected content is allowed to be selectively stored, managed and distributed in the private network based on the associated metadata.
-
-
11. A system for managing unprotected and protected content in a private network, the system including:
-
one or more processors connected to the private network; processor instructions for causing the one or more processors to; receive content; retrieve metadata associated with the received content; determine whether the received content is unprotected or protected based on the associated metadata; for unprotected content, allow the unprotected content to be selectively stored, managed and distributed in the private network based on the associated metadata; for protected content, identify a content protection system associated with the protected content based on the associated metadata, and perform at least one of; display information to a user of the private network facilitating retrieval of one or more hardware/software components required by the associated content protection system; retrieve the one or more required hardware/software components; verify that the one or more required hardware/software components are present in the private network, before the protected content is allowed to be selectively stored, managed and distributed in the private network based on the associated metadata; and one or more processor readable storage devices connected to the one or more processors to store the processor instructions, the received content, the associated metadata and the one or more hardware/software components required by the associated content protection system. - View Dependent Claims (12, 13)
-
-
14-15. -15. (canceled)
Specification