×

Interoperable systems and methods for peer-to-peer service orchestration

  • US 9,466,054 B1
  • Filed: 07/27/2007
  • Issued: 10/11/2016
  • Est. Priority Date: 06/05/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computing device comprising:

  • one or more processors, anda non-transitory computer readable memory containing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including;

    operating a host application, a computing device node application that communicates with a gateway device, a digital rights management engine (DRM engine), and a cryptographic services module distinct from the DRM engine;

    receiving, by the computing device node application from the gateway device, a license for an encrypted content object comprising license instructions, the encrypted content object, an encrypted cryptographic key for decrypting the encrypted content object, and a set of link objects;

    querying an authorization graph by executing, using the DRM engine, the license instructions and determining an existence of a first path on the authorization graph from the computing device node application to an authorization node by processing two or more link objects from the set of link objects;

    decrypting the encrypted cryptographic key for decrypting the encrypted content object using the DRM engine and the cryptographic services module, decryption comprising;

    processing, using the DRM engine, a chain of link objects, from the set of link objects, connecting the computing device node application to a target node through a second path on the authorization graph that includes an intermediate node, and retrieving encrypted cryptographic keys contained in the link objects of the chain of link objects, the encrypted cryptographic keys including an encrypted cryptographic key of the intermediate node and an encrypted cryptographic key of the target node,decrypting, using the cryptographic services module interacting with the DRM engine, the encrypted cryptographic key of the intermediate node using a cryptographic key of the computing device node application,decrypting, using the cryptographic services module interacting with the DRM engine, the encrypted cryptographic key of the target node using the cryptographic key of the intermediate node, andbased on a result of querying the authorization graph;

    decrypting, using the cryptographic services module interacting with the DRM engine, the encrypted cryptographic key for decrypting the encrypted content object using the cryptographic key of the target node,providing, by the DRM engine to the host application, the cryptographic key for decrypting the encrypted content object,decrypting, using the cryptographic services module interacting with the host application, the encrypted content object using the cryptographic key for decrypting the encrypted content object, andaccessing the content object using the host application interacting with the cryptographic services module.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×