User-based digital rights management
First Claim
1. A content management method comprising:
- receiving into a first mobile station from a mobile telecommunications service provider, during over-the-air provisioning of the first mobile station, an encryption key associated with a user account under which the first mobile station is to be served by the mobile telecommunications service provider;
storing the encryption key in the first mobile station;
thereafter sending from the first mobile station to the mobile telecommunications service provider a request for content, and receiving into the first mobile station from the mobile telecommunications service provider the requested content, wherein the received content is encrypted by the mobile telecommunications service provider with the content encryption key in response to the request for the content;
applying the encryption key in the first mobile station to decrypt only a portion of the received encrypted content so as to produce decrypted content, and using the decrypted content in the first mobile station;
deleting the decrypted content from the first mobile station after use of the decrypted content in the first mobile station; and
retaining the encrypted content in the first mobile station after deleting the decrypted content in the first mobile station.
6 Assignments
0 Petitions
Accused Products
Abstract
A content management system includes a mobile station, a service provider, and a content distribution kiosk. A content encryption key is associated with the mobile station, and a copy of the key is provided to the mobile station. In providing content to the mobile station, the content is first encrypted with the content encryption key, and it is sent to the mobile station in its encrypted form. The mobile station keeps the content in memory in its encrypted form. To make use of the content, the mobile station decrypts the content for use, and deletes the decrypted content once it has been used. The content in its encrypted form remains in memory on the mobile station. Multiple mobile devices may use the same content encryption key, in which case the devices may exchange encrypted content using, for example, a Bluetooth connection. Content may also be retrieved from a content distribution kiosk.
27 Citations
6 Claims
-
1. A content management method comprising:
-
receiving into a first mobile station from a mobile telecommunications service provider, during over-the-air provisioning of the first mobile station, an encryption key associated with a user account under which the first mobile station is to be served by the mobile telecommunications service provider; storing the encryption key in the first mobile station; thereafter sending from the first mobile station to the mobile telecommunications service provider a request for content, and receiving into the first mobile station from the mobile telecommunications service provider the requested content, wherein the received content is encrypted by the mobile telecommunications service provider with the content encryption key in response to the request for the content; applying the encryption key in the first mobile station to decrypt only a portion of the received encrypted content so as to produce decrypted content, and using the decrypted content in the first mobile station; deleting the decrypted content from the first mobile station after use of the decrypted content in the first mobile station; and retaining the encrypted content in the first mobile station after deleting the decrypted content in the first mobile station. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification