Selective encryption with coverage encryption
First Claim
1. A method, comprising:
- receiving by one or more processors segments of unencrypted data stream of digital content;
identifying by one or more processors from the received segments, segments for multiple selective DRM encryption based on a critical data selection rule;
generating by one or more processors first DRM encrypted segments and second DRM encrypted segments by parallel encrypting the identified segments using a first encryption method associated with a first DRM and using a second encryption method associated with a second DRM;
creating by one or more processors a coverage key for encryption of the received segments that was not identified for multiple selective DRM encryption via a coverage encryption method;
generating a coverage encrypted content by the one or more processors by encrypting at least portion of the received segments of unencrypted data stream of digital content that was not identified for multiple selective DRM encryption using the coverage encryption method and the coverage key;
generating by one or more processors a first encrypted key and second encrypted key by parallel encrypting the coverage key using a third encryption method associated with the first DRM and using a fourth encryption method associated with the second DRM;
constructing by one or more processors an output digital content stream comprising the first DRM encrypted segments, the second DRM encrypted segments, the first encrypted coverage key, the second encrypted coverage key, and the coverage encrypted content; and
transmitting by the one or more processors, the constructed digital content stream to one or more recipients.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for enabling use of multiple digital rights management scenarios (DRM). Unencrypted data representing digital content is examined to identify at least segments of content for DRM encryption. The identified segments of content are duplicated and then encrypted using a first encryption method associated with a first DRM to produce first encrypted segments. Duplicates are encrypted using a second encryption method associated with a second DRM to produce second encrypted segments. At least a portion of segments not selected for DRM encryption are encrypted using a coverage encryption method. The coverage encryption key is encrypted by each of a third and fourth encryption methods associated with the first and second DRMs respectively. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
-
Citations
29 Claims
-
1. A method, comprising:
-
receiving by one or more processors segments of unencrypted data stream of digital content; identifying by one or more processors from the received segments, segments for multiple selective DRM encryption based on a critical data selection rule; generating by one or more processors first DRM encrypted segments and second DRM encrypted segments by parallel encrypting the identified segments using a first encryption method associated with a first DRM and using a second encryption method associated with a second DRM; creating by one or more processors a coverage key for encryption of the received segments that was not identified for multiple selective DRM encryption via a coverage encryption method; generating a coverage encrypted content by the one or more processors by encrypting at least portion of the received segments of unencrypted data stream of digital content that was not identified for multiple selective DRM encryption using the coverage encryption method and the coverage key; generating by one or more processors a first encrypted key and second encrypted key by parallel encrypting the coverage key using a third encryption method associated with the first DRM and using a fourth encryption method associated with the second DRM; constructing by one or more processors an output digital content stream comprising the first DRM encrypted segments, the second DRM encrypted segments, the first encrypted coverage key, the second encrypted coverage key, and the coverage encrypted content; and transmitting by the one or more processors, the constructed digital content stream to one or more recipients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An encoder device that enables use of multiple digital rights management scenarios (DRM), comprising:
-
one or more processors and a memory connected to said one or more processors, the memory storing instructions that when executed by the one or more processors cause the one or more processors to perform the functions of; receiving by one or more processors segments of unencrypted data stream of digital content; identifying by one or more processors from the received segments, segments for multiple selective DRM encryption based on a critical data selection rule; generating by one or more processors first DRM encrypted segments and second DRM encrypted segments by parallel encrypting the identified segments using a first encryption method associated with a first DRM and using a second encryption method associated with a second DRM; creating by one or more processors a coverage key for encryption of the received segments that was not identified for multiple selective DRM encryption via a coverage encryption method; generating a coverage encrypted content by the one or more processors by encrypting at least portion of the received segments of unencrypted data stream of digital content that was not identified for multiple selective DRM encryption using the coverage encryption method and the coverage key; generating by one or more processors a first encrypted key and second encrypted key by parallel encrypting the coverage key using a third encryption method associated with the first DRM and using a fourth encryption method associated with the second DRM; constructing by one or more processors an output digital content stream comprising the first DRM encrypted segments, the second DRM encrypted segments, the first encrypted coverage key, the second encrypted coverage key, and the coverage encrypted content; and transmitting by the one or more processors, the constructed digital content stream to one or more recipients. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An encoder device that enables use of multiple digital rights management scenarios (DRM), comprising:
-
one or more processors and a memory connected to said one or more processors, the memory storing instructions that when executed by the one or more processors cause the one or more processors to perform the functions of; receiving by one or more processors segments of unencrypted data stream of audio/video (AV) data; identifying by one or more processors from the received segments, segments for multiple selective DRM encryption based on a critical data selection rule; generating by one or more processors first DRM encrypted segments and second DRM encrypted segments by parallel encrypting the identified segments using a first encryption method associated with a first DRM and using a second encryption method associated with a second DRM; creating by one or more processors a coverage key for encryption of the received segments that was not identified for multiple selective DRM encryption via a coverage encryption method; generating a coverage encrypted content by the one or more processors by encrypting at least a portion of the received segments of unencrypted data stream of digital content that was not identified for multiple selective DRM encryption using the coverage encryption method and the coverage key; generating by one or more processors a first encrypted key and second encrypted key by parallel encrypting the coverage key using a third encryption method associated with the first DRM and using a fourth encryption method associated with the second DRM; constructing by one or more processors an output digital content stream comprising the first DRM encrypted segments, the second DRM encrypted segments, the first encrypted coverage key, the second encrypted coverage key, and the coverage encrypted content; and transmitting by the one or more processors, the constructed digital content stream to one or more recipients. - View Dependent Claims (26, 27, 28, 29)
-
Specification