System and method for accessing protected content in a rights-management architecture
First Claim
1. A computing device adapted to communicate via a network infrastructure, comprising:
- a long-term storage device;
a user interface adapted to interact with the computing device and for launching a rendering application; and
a management module, separate from said rendering application and interfaceable to any of a plurality of rendering applications that include said rendering application, that receives a communication from the rendering application to access first information stored on the long-term storage device,wherein the first information is stored in an encrypted format and wherein the management module returns first data which enables the use of said first information by said rendering application, wherein said first data includes said first information in an unencrypted format.
3 Assignments
0 Petitions
Accused Products
Abstract
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or “inscribed”); source-signed; and fully-individualized (or “owner exclusive”). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content. The client components include an object which accesses encrypted content, an object that parses the license and enforces the rights in the license, an object which obtains protection software and data that is individualized for the client and/or the persona operating the client, and a script of instructions that provides individualization information to a distributor of content so that the content may be individualized for the client and/or its operating persona. Content is generally protected by encrypting it with a key and then sealing the key into the content in a way that binds it to the meta-data associated with the content. In some instances, the key may also be encrypted in such a way as to be accessible only by the use of individualized protection software installed on the client, thereby binding use of the content to a particular client or set of clients.
-
Citations
4 Claims
-
1. A computing device adapted to communicate via a network infrastructure, comprising:
-
a long-term storage device; a user interface adapted to interact with the computing device and for launching a rendering application; and a management module, separate from said rendering application and interfaceable to any of a plurality of rendering applications that include said rendering application, that receives a communication from the rendering application to access first information stored on the long-term storage device, wherein the first information is stored in an encrypted format and wherein the management module returns first data which enables the use of said first information by said rendering application, wherein said first data includes said first information in an unencrypted format.
-
-
2. A computing device adapted to communicate via a network infrastructure, comprising:
-
a long-term storage device; a user interface adapted to interact with the computing device and for launching a rendering application; and a management module, separate from said rendering application and interfaceable to any of a plurality of rendering applications that include said rendering application, that receives a communication from the rendering application to access first information stored on the long-term storage device, wherein the first information is stored in an encrypted format and wherein the management module returns first data which enables the use of said first information by said rendering application, wherein second information pertaining a user or a transaction is returned by the management module to the rendering application for usage on the computing device, and wherein said second information is selected from the group consisting of;
a name, a credit card number, and a receipt number.
-
-
3. A computing device adapted to communicate via a network infrastructure, comprising:
-
a long-term storage device; a user interface adapted to interact with the computing device and for launching a rendering application; and a management module, separate from said rendering application and interfaceable to any of a plurality of rendering applications that include said rendering application, that receives a communication from the rendering application to access first information stored on the long-term storage device, wherein the first information is stored in an encrypted format and wherein the management module returns first data which enables the use of said first information by said rendering application, and wherein said management module is interfaceable with a secure repository receivable via said network infrastructure, wherein said secure repository applies a key to second data. - View Dependent Claims (4)
-
Specification