Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
First Claim
1. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
- detecting transfers of amounts of data above a predetermined amount, wherein the detected transfers are presumably initiated by a content thief attempting to steal the content; and
responding to the detected transfers in a manner designed to frustrate the presumed attempt of the content thief to steal the content,wherein rendering of the content occurs on a processor having an amount of capacity, and wherein responding comprises reserving an amount of the capacity of the processor above a predetermined amount for rendering, the reserved capacity not being available to the content thief for use in stealing the content.
1 Assignment
0 Petitions
Accused Products
Abstract
Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
37 Citations
8 Claims
-
1. A method of preventing theft of decompressed digital content as the content is being rendered, the method comprising:
detecting transfers of amounts of data above a predetermined amount, wherein the detected transfers are presumably initiated by a content thief attempting to steal the content; and responding to the detected transfers in a manner designed to frustrate the presumed attempt of the content thief to steal the content, wherein rendering of the content occurs on a processor having an amount of capacity, and wherein responding comprises reserving an amount of the capacity of the processor above a predetermined amount for rendering, the reserved capacity not being available to the content thief for use in stealing the content. - View Dependent Claims (2, 3, 4, 8)
-
5. A computer-readable medium having computer-executable instructions thereon for preventing theft of decompressed digital content as the content is being rendered, the instructions being organized into modules including:
-
a first module for detecting transfers of amounts of data above a predetermined amount, wherein the detected transfers are presumably initiated by a content thief attempting to steal the content; and a second module for responding to the detected transfers in a manner designed to frustrate the presumed attempt of the content thief to steal the content, wherein rendering of the content occurs on a processor having an amount of capacity, and wherein the second module reserves an amount of the capacity of the processor above a predetermined amount for rendering, the reserved capacity not being available to the content thief for use in stealing the content. - View Dependent Claims (6, 7)
-
Specification