Secure streaming container
First Claim
1. A method of providing streaming content, comprising the steps of:
- creating a digital container that includes contents comprising streaming media content and digital rights management (DRM);
selecting one or more executable modules for inclusion in the digital container, the selection of the modules being based on at least one of a type of streaming media content and the DRM;
encrypting the streaming media content of the digital container to produce a secured streaming container (SSC); and
transmitting the SSC containing the encrypted streaming media, DRM and the one or more executable modules to a target device for access of the SSC from the target device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securely streaming encrypted digital media content out of a digital container to a user'"'"'s media player. This streaming occurs after the digital container has been delivered to the user'"'"'s machine and after the user has been authorized to access the encrypted content. The user'"'"'s operating system and media player treat the data stream as if it were a being delivered over the Internet (or other network) from a streaming web server. However, no Internet connection is required after the container has been delivered to the user and the data stream suffers no quality loss due to network traffic or web server access problems. In this process of the invention, the encrypted content files are decrypted and fed to the user'"'"'s media player in real time and are never written to the user'"'"'s hard drive or storage device. This process makes unauthorized copying of the digital content contained in the digital container virtually impossible.
-
Citations
86 Claims
-
1. A method of providing streaming content, comprising the steps of:
-
creating a digital container that includes contents comprising streaming media content and digital rights management (DRM); selecting one or more executable modules for inclusion in the digital container, the selection of the modules being based on at least one of a type of streaming media content and the DRM; encrypting the streaming media content of the digital container to produce a secured streaming container (SSC); and transmitting the SSC containing the encrypted streaming media, DRM and the one or more executable modules to a target device for access of the SSC from the target device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method of creating and accessing streaming content, comprising the steps of:
-
creating a digital container that includes contents comprising at least streaming media content and digital rights management (DRM); selecting one or more executable modules for inclusion in the digital container based on one at least one of a type of streaming media content and the DRM; encrypting the streaming media content and optionally the DRM to produce a secured streaming container (SSC); and transmitting the SSC to a target device accessing the secured streaming container (SSC) using the one or more executable modules contained in the SSC to control playback of the streaming media content. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A computer program product comprising a computer usable medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
create a digital container that includes contents comprising streaming media content and digital rights management (DRM); select one or more executable modules for inclusion in the digital container wherein the selection of the one or more executable modules is based on at least one of a type of streaming media content and the DRM; encrypt the streaming media content of the digital container to produce a secured streaming container (SSC); and transmit the SSC containing the encrypted streaming media, DRM and one or more executable modules to a target device for access of the SSC from the target device. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86)
-
Specification