System and method for managing first party rights to content captured by third parties
First Claim
1. A non-transitory computer-readable medium comprising a computer executable software product for use in a digital rights management (DRM) compliance system that when executed, directs a computing device to:
- access content and metadata associated with the content;
determine, based on the metadata, a unique identifier associated with the device that captured the content and capture time data, the capture time data indicating when the content was captured by a capture device;
query a rights management database using the unique identifier and capture time data;
receive DRM policy implementation data associated with the captured content;
decrypt the content; and
convert the content to a DRM-compatible form based on the DRM policy implementation data.
2 Assignments
0 Petitions
Accused Products
Abstract
A DRM compliance system can include one or more DRM servers, capture devices capable of continuously encrypting content at capture, and one or more rights compliance software applications. Methods of ensuring DRM compliance can include registering and verifying capture devices prior to the presentation of protectable content. Unique IDs associated with the capture devices may be stored as DRM liens in a DRM server along with particular time periods an identified DRM policy is in effect. The rights compliance software application can consult a DRM server to determine if encrypted content captured by a device is subject to a DRM policy. The server can make such a determination based on attempting to match data identifying the capture device and time of capture to one or more DRM liens. When matches are found, applicable DRM policies are applied by decrypting the content and then rendering the content in a DRM-compatible form.
56 Citations
4 Claims
-
1. A non-transitory computer-readable medium comprising a computer executable software product for use in a digital rights management (DRM) compliance system that when executed, directs a computing device to:
-
access content and metadata associated with the content; determine, based on the metadata, a unique identifier associated with the device that captured the content and capture time data, the capture time data indicating when the content was captured by a capture device; query a rights management database using the unique identifier and capture time data; receive DRM policy implementation data associated with the captured content; decrypt the content; and convert the content to a DRM-compatible form based on the DRM policy implementation data. - View Dependent Claims (2, 3, 4)
-
Specification