×

Interoperable systems and methods for peer-to-peer service orchestration

  • US 9,317,843 B2
  • Filed: 10/27/2011
  • Issued: 04/19/2016
  • Est. Priority Date: 06/05/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of accessing content according to a DRM policy, comprising:

  • receiving, by a service access point of a device, from one or more web services agents;

    an encrypted content item,a control program containing executable code,an encrypted content key for decrypting the encrypted content item,a first link object digitally-signed by a link key, the first link object representing a relationship between a first node object and a second node object and comprising references to first node attributes included in the first node object and second node attributes included in the second node object, anda certificate for validating the link key, the certificate comprising a constraint program, the constraint program imposing link conditions on use of the link key to digitally sign link objects, and the link conditions depending on the first node attributes and the second node attributes;

    determining, by the device, authorization to access the encrypted content item, comprising;

    validating the first link object, comprising executing the constraint program and determining by the constraint program satisfaction of the link conditions based on the first node attributes and the second node attributes referenced by the first link object, verifying the certificate based on satisfaction of the link conditions, validating the use of the link key to digitally sign the first link object based on verification of the certificate, and validating the first link object based on validation of the use of the link key to digitally sign the first link object,constructing an authorization graph by processing two or more link objects, including the validated first link object;

    generating a chain of keys by processing the two or more link objects, including the validated first link object;

    querying the authorization graph by executing the executable code contained in the control program, andgenerating a target node key by processing the chain of keys; and

    based on a result of querying the authorization graph, generating by the device a decrypted version of the encrypted content key by decrypting the encrypted content key using the target node key, generating by the device a decrypted content item by decrypting the encrypted content item using the decrypted version of the encrypted content key, and accessing by the device the decrypted content item.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×