Secure streaming container
First Claim
1. A method of providing electronic data, the method comprising the steps of:
- providing a secure streaming container (SSC) to a device, the SSC having streaming media content, a container identification and an associated original key;
receiving data unique to the device at a computer;
combining at the computer the received data and the container identification to produce a permission token; and
sending the permission token to the device,wherein the SSC is configured to rekey the original key using the permission token and configured to rekey the streaming media content so that decryption of the streaming media content is locked to the device, and wherein a first portion of the secure streaming media content is accessible for streaming while a second portion of the secure media content remains secure in the SSC.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securely streaming encrypted digital media content out of a digital container to a user'"'"'s media player. This streaming occurs after the digital container has been delivered to the user'"'"'s machine and after the user has been authorized to access the encrypted content. The user'"'"'s operating system and media player treat the data stream as if it were a being delivered over the Internet (or other network) from a streaming web server. However, no Internet connection is required after the container has been delivered to the user and the data stream suffers no quality loss due to network traffic or web server access problems. Encrypted content files are decrypted and fed to the user'"'"'s media player in real time and are never written to the user'"'"'s storage device. This process makes unauthorized copying of the digital content contained in the digital container virtually impossible.
98 Citations
20 Claims
-
1. A method of providing electronic data, the method comprising the steps of:
-
providing a secure streaming container (SSC) to a device, the SSC having streaming media content, a container identification and an associated original key; receiving data unique to the device at a computer; combining at the computer the received data and the container identification to produce a permission token; and sending the permission token to the device, wherein the SSC is configured to rekey the original key using the permission token and configured to rekey the streaming media content so that decryption of the streaming media content is locked to the device, and wherein a first portion of the secure streaming media content is accessible for streaming while a second portion of the secure media content remains secure in the SSC. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a non-transitory computer readable recording medium having readable program code embodied on the medium, the program code when read and executed by a processor performing the following steps:
-
providing a secure streaming container (SSC) to a device, the SSC having streaming media content, a container identification and an associated original key; receiving data unique to the device at a computer; combining at the computer the received data and the container identification to produce a permission token; and sending the permission token to the device, wherein the SSC is configured to rekey the original key using the permission token and configured to rekey the streaming media content so that decryption of the streaming media content is locked to the device, and wherein a first portion of the secure streaming media content is accessible for streaming while a second portion of the secure media content remains secure in the SSC. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification