Installation of black box for trusted component for digital rights management (DRM) on computing device
First Claim
1. A system for installing a black box on a computing device, the black box operating in combination with a trusted component on the computing device, the trusted component employing the black box to decrypt encrypted content for being rendered on the computing device only when rights and restrictions specified in a license corresponding to the encrypted content so allow, the system comprising:
- an administrator having access to the computing device for querying same for machine properties thereof; and
a black box server in communication with the administrator, the black box server receiving machine properties of the computing device from the administrator in response to a request for a new black box for the computing device, the black box server constructing the new black box based in part on the received machine properties so as to tie the new black box to the computing device, and the black box server delivering the new black box to the administrator for installation on the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
To install a black box on a computing device, an administrator has access to the computing device and queries same for machine properties thereof. The administrator sends the machine properties of the computing device to a black box server as part of a request for a new black box for the computing device. The black box server in response constructs the new black box based in part on the machine properties so as to tie the new black box to the computing device, and delivers the new black box to the administrator. The administrator thereafter installs the new black box on the computing device. The administrator may include an activation provider running on the computing device and an activation manager in communication with the activation provider. The administrator may also deactivate the black box if it determines that the black box is no longer trustworthy.
24 Citations
21 Claims
-
1. A system for installing a black box on a computing device, the black box operating in combination with a trusted component on the computing device, the trusted component employing the black box to decrypt encrypted content for being rendered on the computing device only when rights and restrictions specified in a license corresponding to the encrypted content so allow, the system comprising:
-
an administrator having access to the computing device for querying same for machine properties thereof; and a black box server in communication with the administrator, the black box server receiving machine properties of the computing device from the administrator in response to a request for a new black box for the computing device, the black box server constructing the new black box based in part on the received machine properties so as to tie the new black box to the computing device, and the black box server delivering the new black box to the administrator for installation on the computing device. - View Dependent Claims (2, 3, 4)
-
-
5. A method for installing a black box on a computing device, the black box operating in combination with a trusted component on the computing device, the trusted component employing the black box to decrypt encrypted content for being rendered on the computing device only when rights and restrictions specified in a license corresponding to the encrypted content so allow, the method employing an administrator with access to the computing device and a black box server in communication with the administrator, the method comprising:
-
the administrator querying the computing device for machine properties thereof and receiving same; the administrator sending the machine properties of the computing device to the black box server as part of a request for a new black box for the computing device; the black box server in response constructing the new black box based in part on the machine properties so as to tie the new black box to the computing device; the black box server delivering the new black box to the administrator; and the administrator installing the new black box on the computing device. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for deactivating a black box on a computing device, the black box operating in combination with a trusted component on the computing device, the trusted component employing the black box to decrypt encrypted content for being rendered on the computing device only when rights and restrictions specified in a license corresponding to the encrypted content so allow, the method employing an activation provider running on the computing device and an activation manager in communication with the activation provider, the method comprising:
-
the activation manager querying the activation provider on the computing device for activation state information relating to a state of the black box on the computing device; the activation provider in response collecting the activation state information from the computing device and reporting same to the activation manger; the activation manager determining based on the activation state information whether the black box on the computing device remains trustworthy; and the activation manager directing the activation provider to deactivate the black box on the computing device if the activation manager determines based on the activation state information that the black box on the computing device does not remain trustworthy. - View Dependent Claims (18, 19, 20, 21)
-
Specification