Media transport protocol extensions for system integrity and robustness, and applications thereof
First Claim
1. A method for exchanging system and protocol integrity information between an initiator and a responder operating under a data transfer protocol, comprising:
- opening a session between an initiator and a responder;
exchanging one or more of device and system information between the initiator and the responder; and
sending an event from the responder to the initiator upon detecting code or data tampering of objects or upon detecting code or data tampering of digital rights management (DRM) licenses stored on the responder.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and computer program products to implement extensions of the Media Transport Protocol (MTP) are provided herein. The methods include opening a session between an initiator and a responder, exchanging one or more of device and system information and sending one of an operation or event based on media player application features. The operation includes one or more of a dataset, response code, operation parameter and response parameter. In an embodiment, the extensions enable the initiator and responder to manage connections efficiently between devices, send media player application information to a media player device, exchange device and system information, manage digital rights, monitor system security and specify properties within one or more extensions of MTP. These extensions may be in the form of one or more of an operation, an event, a dataset or property code.
52 Citations
29 Claims
-
1. A method for exchanging system and protocol integrity information between an initiator and a responder operating under a data transfer protocol, comprising:
-
opening a session between an initiator and a responder; exchanging one or more of device and system information between the initiator and the responder; and sending an event from the responder to the initiator upon detecting code or data tampering of objects or upon detecting code or data tampering of digital rights management (DRM) licenses stored on the responder. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for exchanging system and protocol integrity information between an initiator and a responder operating under a data transfer protocol, comprising:
-
opening a session between an initiator and a responder; exchanging one or more of device and system information between the initiator and the responder; sending an operation from the initiator to command the responder to perform a sequence of steps to determine protocol integrity of the responder; and sending an event from the responder to the initiator upon detecting code or data tampering of objects or upon detecting code or data tampering of digital rights management (DRM) licenses stored on the responder. - View Dependent Claims (9, 10)
-
-
11. A method for managing Digital Rights Management (DRM) between an initiator and a responder operating under a Media Transport Protocol (MTP), comprising:
-
opening a session between an initiator and a responder; exchanging one or more of device and system information between the initiator and the responder; and sending an event from the initiator to the responder to check an integrity of objects stored on the responder. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification