File system operation and digital rights management (DRM)
First Claim
1. A system for file operations and digital rights management (DRM), the system comprising:
- memory;
one or more processors;
a first application stored in the memory and executable by the one or more processors to request one or more files that are protected by at least one DRM content control;
a second application stored in the memory and executable by the one or more processors to request the one or more files that are protected by the at least one DRM content control; and
one or more file system components stored in the memory and executable by the one or more processors to respond to requests from the first and second applications for the one or more files, the one or more file system components configured to cause files of the one or more files with no complex DRM content controls to be decrypted and to provide the decrypted files to the first and second applications, the one or more file system components configured to create an identity-context-based cache of DRM-protected files so that a file that has been decrypted on behalf of and provided to the first application may be provided to the second application in response to determining that the first and second applications each correspond to a joint user context.
1 Assignment
0 Petitions
Accused Products
Abstract
A file system is configured for use with files protected by digital rights management (DRM) content controls and to interact both with applications that are, and are not, DRM aware. The file system may be configured for use by two applications, in a manner that may provide the second application with protected files if the first application was previously allowed access. In one example, a user context cache of DRM-protected files is created. The files in the cache may have been decrypted in response to a request(s) from the first application. Subsequent requests from the second application may be received for files within the user context cache of DRM-protected files. At least one of the files within the user context cache of DRM-protected files may be provided to the second application if the second application has a joint user context with the first application.
-
Citations
20 Claims
-
1. A system for file operations and digital rights management (DRM), the system comprising:
-
memory; one or more processors; a first application stored in the memory and executable by the one or more processors to request one or more files that are protected by at least one DRM content control; a second application stored in the memory and executable by the one or more processors to request the one or more files that are protected by the at least one DRM content control; and one or more file system components stored in the memory and executable by the one or more processors to respond to requests from the first and second applications for the one or more files, the one or more file system components configured to cause files of the one or more files with no complex DRM content controls to be decrypted and to provide the decrypted files to the first and second applications, the one or more file system components configured to create an identity-context-based cache of DRM-protected files so that a file that has been decrypted on behalf of and provided to the first application may be provided to the second application in response to determining that the first and second applications each correspond to a joint user context. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a request, from a first application, to create one or more files in a file system defined in a system memory that are protected by at least one digital rights management (DRM) content control; determining, by one or more processors, whether at least one file of the one or more files lacks complex DRM content controls; decrypting the at least one file in response to determining that the at least one file lacks complex DRM content controls; maintaining a user context cache for validating a user of the first application and obtaining licenses for DRM-controlled content on behalf of the user; receiving a second request to open the at least one file from a second application, the second application being validated by the user context cache; and opening the at least one file associated with the second request, if indicated by the user context cache. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable memory, defining computer-executable instructions, the instructions configured to provide digital rights management (DRM) and comprising instructions for:
-
upon receiving a first request from a first application, creating one or more files within a file system, the one or more files having protection of at least one DRM content control; distinguishing, within the at least one DRM content control, DRM content controls that are complex from those that are not complex; validating the first application as a trusted DRM application in response to determining that the one or more files have DRM content controls that are complex; maintaining a user context cache for validating a user of the first application and providing decrypted files to a second application indicated by the user context cache; receiving a second request from the second application regarding at least one file, the second request being validated by the user context cache; and saving the at least one file, if indicated by the validation. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification