METHOD AND APPARATUS FOR PROTECTING DRM CONTENTS
First Claim
1. An apparatus for preventing access to content protected by digital rights management (DRM) comprising:
- an agent for checking whether an identification card is registered at a mobile communication server, the identification card having a unique identification value; and
a DRM core for creating a first key pair, using the unique identification stored on the identification card, and a second key pair using a random value, and storing the first or second key pair,wherein the agent transfers the unique identification to the DRM core if the identification card is registered at the mobile communication server and the random value to the DRM core if the identification card is not registered at the mobile communication server.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for limiting access to content protected by digital rights management (DRM) technology is disclosed. In accordance with the method, when a key pair for a license to reproduce DRM content is created, a determination is made as to whether an identification card is registered at a mobile communication server. If the identification card is registered at the mobile communication server, a first key pair is created using an unique identification stored on the identification card as a seed value. If the identification card is not registered at the mobile communication server, a second key pair is created using a random value as a seed value.
-
Citations
18 Claims
-
1. An apparatus for preventing access to content protected by digital rights management (DRM) comprising:
-
an agent for checking whether an identification card is registered at a mobile communication server, the identification card having a unique identification value; and a DRM core for creating a first key pair, using the unique identification stored on the identification card, and a second key pair using a random value, and storing the first or second key pair, wherein the agent transfers the unique identification to the DRM core if the identification card is registered at the mobile communication server and the random value to the DRM core if the identification card is not registered at the mobile communication server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, operable in a portable terminal, for limiting access to content protected by digital rights management (DRM), comprising:
-
checking whether an identification card is registered at a mobile communication server, the identification card including a unique identification value; creating, if the identification card is registered at the mobile communication server, a first key pair using the unique identification value; creating, if the identification card is not registered at the mobile communication server, a second key pair using a random value; and storing the created one of the first key pair and the second key pair. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A portable terminal comprising:
a processor in communication with a memory, the memory including code which when accessed by processor causes the processor to; determine whether an identification module associated with the portable terminal is registered at a remote site; determine a key pair as one of;
a unique identification obtained from the identification module when the identification module is determined to be registered and a random value when the identification module is determined not to be registered, andaccess the DRM content when the selected key pair is valid and a license associated with the DRM content is available. - View Dependent Claims (17, 18)
Specification