×

System and method for digital rights management using a secure end-to-end protocol with embedded encryption keys

  • US 8,972,726 B1
  • Filed: 08/26/2009
  • Issued: 03/03/2015
  • Est. Priority Date: 08/26/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • generating, by a digital rights management (DRM) client, an encrypted request to authenticate a client application as a trusted consumer of protected content, the DRM client implemented within the client application, the client application configured to consume content, the request encrypted using an encryption key embedded within a binary representation of the DRM client, the encryption key having been selected from a pool of encryption keys and embedded by a software vendor during a build of the binary representation of the DRM client and being different than one or more encryption keys embedded within one or more other binary representations of the DRM client;

    providing, by the DRM client, the encrypted request to an authentication server;

    receiving, by the DRM client, an encrypted response from the authentication server, the authentication server being remote from the DRM client and using a particular encryption key corresponding to the encryption key of the DRM client to decrypt the encrypted request and to encrypt the encrypted response, the encrypted response including an authentication token;

    decrypting, by the DRM client, the encrypted response; and

    enabling the client application via the DRM client to consume the protected content based at least in part on the authentication token.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×