Methods and apparatus for persistent control and protection of content
First Claim
1. A streaming media player providing content protection and digital rights management, including:
- a port configured to receive a digital bit stream, the digital bit stream including;
content which is encrypted at least in part, anda secure container including control information for controlling use of the content, including at least one key suitable for decryption of at least a portion of the content; and
a control arrangement including;
means for opening secure containers and extracting cryptographic keys, and means for decrypting the encrypted portion of the content, andmeans for managing access to, or use of, said content in accordance with said control information.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for protection of streamed media content are disclosed. In one aspect, the system includes control means for governing content streams or objects, decryption means for decrypting content streams or objects, and feedback means for tracking use of content streams or objects. The control means may operate in accordance with rules received in the streamed content or through a side-band channel. The rules may specify allowed uses of the content, including whether the content can be copied or transferred, and whether content may be “checked out” of one device and used in another. The rules may also include budgets, and a requirement that audit information be collected and/or transmitted to server. In another aspect, a media player is disclosed that uses plugins to assist in rendering content. A “trust plugin” is used to enable a media player designed to render unprotected content to render protected content.
-
Citations
26 Claims
-
1. A streaming media player providing content protection and digital rights management, including:
a port configured to receive a digital bit stream, the digital bit stream including; content which is encrypted at least in part, and a secure container including control information for controlling use of the content, including at least one key suitable for decryption of at least a portion of the content; and a control arrangement including; means for opening secure containers and extracting cryptographic keys, and means for decrypting the encrypted portion of the content, and means for managing access to, or use of, said content in accordance with said control information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
Specification