Distributed digital rights management system and method
First Claim
Patent Images
1. A digital rights management system, comprising:
- an authentication module that is operative to retrieve authentication information for protected content and to reduce power after the authentication information is retrieved,the authentication module further operative to store the authentication information in memory prior to reducing power, the memory being powered independently of the authentication module; and
a decryption module that is operative to receive and decrypt the protected content based on the authentication information, the decryption module being operative to receive and decrypt the protected content while power of the authentication module is reduced.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital rights management system includes an authentication module and a decryption module. If desired, the modules can be implemented in separate integrated circuits. The authentication module retrieves authentication information for protected content and powers down after the authentication information is retrieved. The decryption module decrypts the protected content based on the authentication information while the authentication module is powered down.
11 Citations
20 Claims
-
1. A digital rights management system, comprising:
-
an authentication module that is operative to retrieve authentication information for protected content and to reduce power after the authentication information is retrieved, the authentication module further operative to store the authentication information in memory prior to reducing power, the memory being powered independently of the authentication module; and a decryption module that is operative to receive and decrypt the protected content based on the authentication information, the decryption module being operative to receive and decrypt the protected content while power of the authentication module is reduced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 20)
-
-
10. A digital rights management method, comprising:
-
retrieving, with an authentication module, authentication information for a protected content; storing the authentication information in memory that is powered independently of the authentication module; reducing power of the authentication module after the authentication information is retrieved; and providing the authentication information to a decryption module while power of the authentication module is reduced; decrypting the protected content based on the authentication information while power to the authentication module is reduced. - View Dependent Claims (11, 12, 13)
-
-
14. A device, comprising:
-
a first circuit that comprises; an authentication module that is operative to retrieve authentication information for a protected content and to reduce power after the authentication information is retrieved; a memory; a power management module that is operative to selectively power up and reduce power to the authentication module independently of the memory, the authentication module being operative to store the authentication information in the memory prior to reducing power; and a communication module that is operative to wirelessly transmit a request for the authentication information and to wirelessly receive the authentication in response to the request; and a second circuit that comprises; a decryption module that is operative to both retrieve the authentication information and decrypt the protected content based on the authentication information while power of the first circuit is reduced; and a media module that is operative to provide media output information based on the protected content. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method of managing digital rights content, comprising:
-
retrieving, with an authentication module, authentication information for protected content; storing the authentication information in memory that is powered independently of the authentication module; reducing power of the authentication module after the authentication information is retrieved; providing the authentication information to a decryption module while power of the authentication module is reduced, and decrypting the protected content based on the authentication information while power of the authentication module is reduced.
-
Specification