Digital rights management in a mobile environment
First Claim
1. A method, comprising:
- interpreting, by a computing device, a plurality of virtual-machine instructions of a virtual machine for detecting data representative of a mobile device'"'"'s hardware identification information, resulting in a plurality of hardware instruction interpretations, the virtual machine executable on an application server that is separate from the mobile device;
combining by the computing device each of the plurality of hardware instruction interpretations forming a quasi-hardware mobile unique device identifier (UUID) based on properties of the virtual machine;
basing an encryption process on the UUID and encrypting media using the encryption process;
transferring by the computing device the encrypted media to the mobile device; and
decrypting at the mobile device the media based, at least in part, on the mobile device'"'"'s internal knowledge of the UUID.
10 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provide a method that causes a plurality of virtual machine instructions to be interpreted for indications of a mobile device'"'"'s hardware identification information, thus forming a plurality of hardware instruction interpretations. The embodiment also combines each of the plurality of hardware instruction interpretations and hashes the combination to form a quasi-hardware device identifier. An encryption process is based on the quasi-hardware encryption device identifier and the media is then encrypted using the encryption process. The encrypted media is transferred to the mobile device wherein the mobile device decrypts the media based at least in part on the mobile device'"'"'s internal knowledge of the quasi-hardware device identification.
-
Citations
6 Claims
-
1. A method, comprising:
-
interpreting, by a computing device, a plurality of virtual-machine instructions of a virtual machine for detecting data representative of a mobile device'"'"'s hardware identification information, resulting in a plurality of hardware instruction interpretations, the virtual machine executable on an application server that is separate from the mobile device; combining by the computing device each of the plurality of hardware instruction interpretations forming a quasi-hardware mobile unique device identifier (UUID) based on properties of the virtual machine; basing an encryption process on the UUID and encrypting media using the encryption process; transferring by the computing device the encrypted media to the mobile device; and decrypting at the mobile device the media based, at least in part, on the mobile device'"'"'s internal knowledge of the UUID. - View Dependent Claims (3, 4)
-
-
2. A method, comprising:
-
interpreting, a plurality of virtual-machine instructions of a virtual machine for detecting data representative of a mobile device'"'"'s hardware identification information, resulting in a plurality of hardware instruction interpretations, the virtual machine executable on an application server that is separate from the mobile device; combining each of the plurality of hardware instruction interpretations forming a quasi-hardware mobile unique device identifier (UUID) based on properties of the virtual machine basing a unique encryption process on at least two factors; the UUID, and an understanding of what prior encryption process was used in a previous media delivery to the mobile device, the unique encryption process being different than the prior encryption process; encrypting by the computing device media using the unique encryption process; transferring by the computing device the encrypted media to the mobile device; and decrypting at the mobile device the media based, at least in part, on the mobile device'"'"'s internal knowledge of the UUID. - View Dependent Claims (5, 6)
-
Specification