DEVICE AUTHENTICATION IN COLLABORATIVE CONTENT SCREENING
First Claim
1. A method for content screening comprising:
- providing source and sink devices for receiving content; and
the sink device verifying that the source device is capable and trusted to provide the correct content credential and content use policy needed for the sink device to determine whether content screening should be performed and what content screening operation should be performed.
1 Assignment
0 Petitions
Accused Products
Abstract
Content screening operations, which can include watermark extraction and the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted by different devices that are connected via connectors such as HDMI (High-Definition Multimedia Interface (HDMI), analog composite video, DVI (Digital Visual Interface), SDI (Serial Digital Interface), DisplayPort, or networked via Ethernet or wireless. Authentication and encryption methods are disclosed that can be used to establish the trust and secure communication between devices that conduct collaborative content screening. Delegation architecture may be based on ascertained screening capabilities of the sink device wherein the source device verifies that the sink device is capable and trusted to perform partial or whole screening operations delegated by the source. Alternatively, delegation architecture may be based on ascertained screening capabilities of the source device wherein the sink device verifies that the source device is capable and trusted to provide correct content credential and content use policy (“content credential”) that is needed for the sink device to determine whether content screening should be performed, and if yes, what content screening operations should be performed.
-
Citations
10 Claims
-
1. A method for content screening comprising:
-
providing source and sink devices for receiving content; and the sink device verifying that the source device is capable and trusted to provide the correct content credential and content use policy needed for the sink device to determine whether content screening should be performed and what content screening operation should be performed. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
receiving content from a source at a sink device; determining, using the sink device, the content protection status of the content; defining a reserved bit in a Cinavia watermark payload to be a Source Authentication bit, wherein source authentication is required for playback over link protection; establishing a list of content protection systems that are source authentication compliant technologies; embedding in content by a broadcaster a watermark having a payload that includes the Source Authentication bit; and distributing the embedded content by a broadcaster in a distribution system that comprises at least one of;
SACT, TS/NoSA in TSMAT distribution, NIR, or unwatermarked otherwise. - View Dependent Claims (6, 7, 8, 9, 10)
-
Specification