Systems and methods for disabling software components to protect digital media
First Claim
1. A computer readable medium comprising computer executable instructions for disabling and replacing computing components, said instructions comprising:
- instructions for a policy engine that reads at least one list of computing components that are used in circumventing digital media protection technology, said list identifying at least one computing component for global revocation and a Uniform Resource Locator (“
URL”
) for use in replacing said at least one computing component;
instructions for disabling by said policy engine said at least one computing component on said at least one list of computing components that are used in circumventing digital media protection technology, in response to an attempt to access a digital media object comprising at least one of a movie, song, book, illustration, photograph, or useful collection of data; and
instructions for assisting in replacing the at least one computing component, comprising instructions for accessing said URL in said list of computing components.
2 Assignments
0 Petitions
Accused Products
Abstract
A list of computing components to be disabled can be distributed through a computer readable medium to computing devices. A process on these computing devices can read the list and disable listed components. The components can be permanently disabled, or disabled for a limited purpose. A list or list update may be provided with a digital media object that specifies a more or less stringent revocation policy for that object. A media object may also specify a maximum age for the list. This allows owners of digital media to control the stringency of media protection for their property. The process that accesses the list may prompt updates to the list, informing users of component disabling, and prompt replacement of disabled components. Finally, the invention provides techniques for securely transmitting and storing the list to protect it from alteration by unauthorized entities.
-
Citations
29 Claims
-
1. A computer readable medium comprising computer executable instructions for disabling and replacing computing components, said instructions comprising:
-
instructions for a policy engine that reads at least one list of computing components that are used in circumventing digital media protection technology, said list identifying at least one computing component for global revocation and a Uniform Resource Locator (“
URL”
) for use in replacing said at least one computing component;instructions for disabling by said policy engine said at least one computing component on said at least one list of computing components that are used in circumventing digital media protection technology, in response to an attempt to access a digital media object comprising at least one of a movie, song, book, illustration, photograph, or useful collection of data; and instructions for assisting in replacing the at least one computing component, comprising instructions for accessing said URL in said list of computing components. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for preventing unauthorized access to digital media, comprising:
-
maintaining a list of computing components that are used in circumventing digital media protection technology, said list identifying at least one computing component for global revocation and a Uniform Resource Locator (“
URL”
) for use in replacing said at least one computing component, and identifying at least one computing component for limited revocation, and farther identifying a secure clock time; anddistributing said list of computing components to consumers of digital media objects, wherein said list of computing components is distributed in a computer readable medium. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer readable storage medium, comprising:
-
a digital media object; and a list of computing components, said list being individually associated with said digital media object, wherein at least one computing component on said list is used in circumventing digital media protection technology and is prohibited from executing when said digital media object is accessed on a computer system equipped with a policy engine and secure digital media access platform.
-
-
16. A computer readable storage medium, comprising:
-
a digital media object; and information specifying a maximum age of a list of computing components that are used in circumventing digital media protection technology and are prohibited from executing when said digital media object is accessed on a computer system equipped with a policy engine and secure digital media access platform.
-
-
17. A computer readable storage medium having computer executable instructions for protecting rights in digital media, comprising:
-
instructions for acquiring by a policy engine a list of computing components that are used in circumventing digital media protection technology provided by a digital media access platform; and instructions for disabling at least one computing component on said list of computing components. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method for protecting digital media objects, comprising:
-
receiving by a policy engine a list of computing components that are used in circumventing digital media protections provided by a digital media access platform; revoking at least one computing component identified for global revocation on said list; verifying signatures associated with said computing components, said signatures demonstrating that the computing components are certified; and allowing only certified computing components to operate in connection with a system for rendering digital media objects by revoking any uncertified computing component. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification