Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
First Claim
1. In combination with a digital rights management (DRM) system operating on a computing device, the DRM system requiring a black box for performing decryption and encryption functions, a method of obtaining the black box by the DRM system from a black box server, the method comprising:
- requesting, by the DRM system, a first black box from the black box, server;
generating, by the black box server, the first black box, such generated first black box being unique and having a public/private key pair and electronic code for employing the key pair within the DRM system on the computing device;
delivering, by the black box server, the generated first black box to the DRM system; and
installing, by the DRM system, the delivered first black box in such DRM system,the DRM system further providing code for periodically determining whether the first black box is current or not current and for upgrading at least the public/private key pair in the first black box from the black box server to result in a second black box when the first black box is not current.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital rights management (DRM) system operates on a computing device and requires a black box for performing decryption and encryption functions. To obtain the black box from a black box server, the DRM system requests such black box from such black box server. The black box server in response generates the black box, where such black box is unique and has a public/private key pair. The black box server then delivers the generated black box to the DRM system and the DRM system installs the delivered black box in such DRM system.
139 Citations
76 Claims
-
1. In combination with a digital rights management (DRM) system operating on a computing device, the DRM system requiring a black box for performing decryption and encryption functions, a method of obtaining the black box by the DRM system from a black box server, the method comprising:
-
requesting, by the DRM system, a first black box from the black box, server; generating, by the black box server, the first black box, such generated first black box being unique and having a public/private key pair and electronic code for employing the key pair within the DRM system on the computing device; delivering, by the black box server, the generated first black box to the DRM system; and installing, by the DRM system, the delivered first black box in such DRM system, the DRM system further providing code for periodically determining whether the first black box is current or not current and for upgrading at least the public/private key pair in the first black box from the black box server to result in a second black box when the first black box is not current. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. In combination with a digital rights management (DRM) system operating on a computing device, the DRM system requiring a black box for performing description and encryption functions, a method of obtaining the black box by the DRM system, the method comprising:
-
requesting a first black box from a black box server, the black box server thereafter generating the first black box, such first generated black box being unique and having a public/private key pair and electronic code for employing the key pair within the DRM system on the computing device; receiving the generated first black box from the black box server; and installing the received first black box in such DRM system, the DRM system further providing code for periodically determining whether the first black box is current or not current and for upgrading at least the public/private key pair in the first black box from the black box server to result in a second black box when the first black box is not current. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. In combination with a digital right management (DRM) system operating on a computing device, the DRM system requiring a black box for performing decryption and encryption functions, a method of providing the black box by a black box server, the method comprising:
-
receiving a request for a first black box from the DRM system; generating the first black box, such generated first black box being unique and having a public/private key pair and electronic code for employing the key pair within the DRM system on the computing device; and delivering the generated first black box to the DRM system, the delivered first black box being installed by the DRM system in such DRM system, the DRM system further providing code for upgrading at least the public/private key the first black box is current or not current and for upgrading at least the public/private key pair in the first black box from the black box server to result in a second black box when the first black box is not current. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A computer-readable medium having computer-executable instructions thereon for performing a method in combination with a digital rights management (DRM) system operating on a computing device, the DRM system requiring a black box for performing, decryption and encryption functions, the method for obtaining the black box by the DRM system and comprising:
-
requesting a first black box from a black box server, the black box server thereafter generating the first black box, such first generated black box being unique and having a public/private key pair and electronic code for employing the key pair within the DRM system on the computing device; receiving the generated first black box from the black box server; and installing the received first black box in such DRM system, the DRM system further providing code for periodically determining whether the first black box is current or not current and for upgrading at least the public/private key pair in the first black box from the black box server to result in a second black box when the first black box is not current. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. A computer-readable medium having computer executable instructions thereon for performing a method in combination with a digital rights management (DRM) system operating on a computing device, the DRM system requiring a black box for performing decryption and encryption functions, the method for providing the black box by a black box server and comprising:
-
receiving a request for a first black box from the DRM system; generating the first black box, such generated first black box being unique and having a public/private key pair and electronic code for employing the key pair within the DRM system on the computing device; and delivering the generated first black box to the DRM system, the delivered first black box being installed by thc DRM system in such DRM system, the DRM system further providing code for periodically determining whether the first black box is current or not current and for upgrading at least the public/private key pair in the first black box from the black box server to result in a second black box when the first black box is not current. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
Specification