CONTENT PROTECTION FOR DATA AS A SERVICE (DAAS)
2 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the encrypted data comprising at least content for presentation on the device. For example, the content provider may utilize a secure multiplex transform (SMT) module in a trusted execution environment (TEE) module to generate encoded data from the content and digital rights management (DRM) data and to generate the encrypted data from the encoded data. The device may also comprise a TEE module including a secure demultiplex transform (SDT) module to decrypt the encoded data from the encrypted data and to decode the content and DRM data from the encoded data. The SMT and SDT modules may interact via a secure communication session to validate security, distribute decryption key(s), etc. In one embodiment, a trust broker may perform TEE module validation and key distribution.
-
Citations
50 Claims
-
1-25. -25. (canceled)
-
26. A device configured for content protection, comprising:
-
a communication module to at least receive data encrypted using a first encryption protocol; a user interface (UI) module to at least present content; and a trusted execution environment (TEE) module including at least a secure demultiplex transform (SDT) module to generate the content from the encrypted data. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for content protection, comprising:
-
receiving data encrypted using a first encryption protocol in a device including at least a trusted execution environment (TEE) module; decoding the encrypted data in a secure demultiplex transform (SDT) module in the TEE module; generating content from the decrypted data in the SDT module; and presenting the content. - View Dependent Claims (38, 39, 40, 41, 42, 43)
-
-
44. At least one machine-readable storage medium having stored thereon, individually or in combination, instructions that when executed by one or more processors result in the following operations for content protection, comprising:
-
receiving data encrypted using a first encryption protocol in a device including at least a trusted execution environment (TEE) module; decoding the encrypted data in a secure demultiplex transform (SDT) module in the TEE module; generating content from the decrypted data in the SDT module; and presenting the content. - View Dependent Claims (45, 46, 47, 48, 49, 50)
-
Specification