CONTENT PROTECTION INTEROPERRABILITY
First Claim
1. A computer-implemented method comprising:
- ascertaining a trust state corresponding to content received from a content source for use with a source content protection technology;
mapping the trust state to a target content protection technology using trust data to define the trust state; and
exporting the content having the trust data to enable the trust state to be maintained in the target content protection technology.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments provide content protection interoperability techniques which support secure distribution of content for multiple content protection technologies. In one or more embodiments a source digital rights management (DRM) system can associate trust data with content to be exported to a target digital rights management (DRM) system. The trust data describes a trust state for the content to enable the target DRM system to maintain the trust state for the exported content. In at least some embodiments, the source DRM system can also associate tracing data with the content to, in the event of a breach in the chain of trust, enable an identification to be made of a source of the exported content and/or a party responsible for exporting the content.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
ascertaining a trust state corresponding to content received from a content source for use with a source content protection technology; mapping the trust state to a target content protection technology using trust data to define the trust state; and exporting the content having the trust data to enable the trust state to be maintained in the target content protection technology. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable storage media storing instructions that, when executed by a computing device, cause the computing device to:
-
ascertain a trust state for content received from a content source employing a source content protection technology based upon trust data associated by the content source with the content; and maintain the established trust state for interaction with content at the computing device using a target content protection technology. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
one or more processors; one or more computer-readable storage media; one or more program modules embodied on the one or more computer-readable storage media and configured to; generate trust data for content to transfer a trust assertion corresponding to a source content protection technology to a target content protection technology; associate the content with tracing data configured to facilitate tracking of the trust assertion; and output the content having the trust data and the tracing data to enable protected interaction with the content through operation of the target content protection technology. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification