×

Interoperable systems and methods for peer-to-peer service orchestration

  • US 9,235,834 B2
  • Filed: 06/03/2010
  • Issued: 01/12/2016
  • Est. Priority Date: 06/05/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of accessing content through a composite web service, comprising:

  • communicating a request for content to a device;

    communicating, by the device, with one or more peer nodes using a service access point of the device, comprising;

    discovering a peer node providing content services,negotiating a trusted relationship with the peer node providing content services,receiving a content object from the peer node providing content services, the content object comprising a content id and an encrypted content item,receiving a license object from a peer node providing license services, the license object comprising;

    a control object including a control program containing instructions for querying an authorization graph for an existence of a first path from a first path node to a second path node and a second path from a third path node to a fourth path node,a contentkey object including an encrypted content key for decrypting the encrypted content item,receiving a digitally signed first link object from a peer node providing link objects;

    evaluating the license object using a DRM engine of the device, comprising;

    verifying, by the DRM engine, the license object,verifying, by the DRM engine, the digitally signed first link object based on a digital signature of the digitally signed first link object,constructing, by the DRM engine, the authorization graph, by processing the digitally signed first link object and one or more additional link objects,generating, by the DRM engine, a chain of keys, by processing the digitally signed first link object and the one or more additional link objects,querying, by the DRM engine, the authorization graph;

    wherein querying comprises the DRM engine executing the control program, and determining, by the control program, the existence of the first path from the first path node to the second path node and the second path from the third path node to the fourth path node, andgenerating, by the DRM engine, a target node key by processing the chain of keys; and

    based on the determined existence of the first path from the first path node to the second path node and the second path from the third path node to the fourth path node;

    generating, by the device, an unencrypted content key by decrypting the encrypted content key using the target node key;

    generating, by the device, a decrypted content item by decrypting the encrypted content item using the unencrypted content key; and

    accessing, by the device, the decrypted content item.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×