System and method for the propagation of DRM protected content
First Claim
Patent Images
1. A method for providing Digital Rights Management (“
- DRM”
) protected content to one or more devices connected to a network, the method comprising;
generating a request for DRM protected content from a requesting device;
streaming the requested DRM protected content from a content source as a protected DRM stream, wherein the requested DRM protected stream is protected by one or more DRM access controls;
validating the one or more DRM access controls protecting the DRM stream with the content source;
re-encrypting, with a public/private key pair, the protected DRM stream to generate a re-encrypted protected DRM stream;
streaming the re-encrypted protected DRM stream having the DRM protected content therein to the requesting device; and
decrypting the re-encrypted protected DRM stream for playback on the requesting device.
9 Assignments
0 Petitions
Accused Products
Abstract
The present invention may be utilized for the distribution of content items protected according to various digital rights management platforms. According to one embodiment, a method for the propagation of DRM protected content to one or more devices connected to a network comprises generating a request for DRM protected content from a requesting device and streaming the requested DRM protected content from a content source as a protected DRM stream. The protected DRM stream is re-encrypted for streaming to the requesting device. The re-encrypted protected DRM stream is decrypted for playback on the requesting device.
27 Citations
13 Claims
-
1. A method for providing Digital Rights Management (“
- DRM”
) protected content to one or more devices connected to a network, the method comprising;generating a request for DRM protected content from a requesting device; streaming the requested DRM protected content from a content source as a protected DRM stream, wherein the requested DRM protected stream is protected by one or more DRM access controls; validating the one or more DRM access controls protecting the DRM stream with the content source; re-encrypting, with a public/private key pair, the protected DRM stream to generate a re-encrypted protected DRM stream; streaming the re-encrypted protected DRM stream having the DRM protected content therein to the requesting device; and decrypting the re-encrypted protected DRM stream for playback on the requesting device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
- DRM”
-
13. The method of 12 comprising:
-
determining if the private key matches a public key used to re-encrypt the protected DRM stream; and if the private key matches the public key, decrypting the re-encrypted protected DRM stream; and if the private key does not match the public key, generating an error message for display on a client device.
-
Specification