System And Method For Digital Rights Management With System Individualization
First Claim
1. A system, comprising:
- a memory; and
one or more processors coupled to the memory, wherein the memory comprises program instructions executable by the one or more processors to implement a digital rights management (DRM) component configured to;
generate a request for machine-specific credentials unique to the system, the request comprising unique device information that is unique to one or more components of said system;
receive an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with a machine-specific encryption key generated from said unique device information;
based on said unique device information, generate an encryption key equivalent to said machine-specific encryption key; and
decrypt the encrypted response comprising the machine-specific credentials with the generated encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of a system and method for digital rights management with system individualization are described. In various embodiments, a DRM component may generate a request for machine-specific credentials specific to the system on which the DRM component is implemented. This request may include device information of component(s) of such system. The DRM component may also receive an encrypted response that includes the machine-specific credentials. This encrypted response may be encrypted with a machine-specific encryption key generated from the device information. In various embodiments the response may be generated by an individualization server that verified the request for machine-specific credentials. The DRM component may also, based on the device information of the system on which the DRM component is implemented, generate an encryption key equivalent to the machine-specific encryption key with which the received response is encrypted. The DRM component may decrypt the encrypted response with the generated encryption key.
-
Citations
45 Claims
-
1. A system, comprising:
-
a memory; and one or more processors coupled to the memory, wherein the memory comprises program instructions executable by the one or more processors to implement a digital rights management (DRM) component configured to; generate a request for machine-specific credentials unique to the system, the request comprising unique device information that is unique to one or more components of said system; receive an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with a machine-specific encryption key generated from said unique device information; based on said unique device information, generate an encryption key equivalent to said machine-specific encryption key; and decrypt the encrypted response comprising the machine-specific credentials with the generated encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a memory; and one or more processors coupled to the memory, wherein the memory comprises program instructions executable by the one or more processors to implement an individualization component configured to; receive a request for machine-specific credentials unique to a computer system, the request comprising unique device information that is unique to one or more components of the computer system; based on the unique device information specified by the request, generate a machine-specific encryption key; generate an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with the generated machine-specific encryption key; and provide the response to the computer system. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer-implemented method, comprising:
performing, by one or more computers; generating a request for machine-specific credentials unique to a computer system, the request comprising unique device information that is unique to one or more components of said computer system; receiving an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with a machine-specific encryption key generated from said unique device information; based on said unique device information, generating an encryption key equivalent to said machine-specific encryption key; and decrypting the encrypted response comprising the machine-specific credentials with the generated encryption key. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
24. A computer-implemented method, comprising:
-
receiving a request for machine-specific credentials unique to a computer system, the request comprising unique device information that is unique to one or more components of the computer system; based on the unique device information specified by the request, generating a machine-specific encryption key; generating an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with the generated machine-specific encryption key; and providing the response to the computer system. - View Dependent Claims (25, 26, 27, 28, 29)
-
-
30. A non-transitory computer-readable storage medium, storing program instructions executable on a computer system to implement a DRM component configured to:
-
generate a request for machine-specific credentials unique to the computer system, the request comprising unique device information that is unique to one or more components of said computer system; receive an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with a machine-specific encryption key generated from said unique device information; based on said unique device information, generate an encryption key equivalent to said machine-specific encryption key; and decrypt the encrypted response comprising the machine-specific credentials with the generated encryption key. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A non-transitory computer-readable storage medium, storing program instructions computer-executable to implement an individualization server configured to:
-
receive a request for machine-specific credentials unique to a computer system, the request comprising unique device information that is unique to one or more components of the computer system; based on the unique device information specified by the request, generate a machine-specific encryption key; generate an encrypted response comprising the machine-specific credentials, the encrypted response encrypted with the generated machine-specific encryption key; and provide the response to the computer system. - View Dependent Claims (41, 42, 43, 44, 45)
-
Specification