Piracy prevention in digital rights management systems
First Claim
Patent Images
1. A method, comprising:
- obtaining, by a multimedia device comprising a processor,protected content that originates in a first digital rights management system, wherein the protected content has an associated limited exercisable right, wherein the limited exercisable right is controlled by a rights duration clock that specifies a temporal duration during which the limited exercisable right is valid;
sending a hash of the protected content to an anomaly detector coupled to the first digital rights management system and to a second digital rights management system, the anomaly detector adapted to detect an anomaly in the protected content based on the hash of the protected content;
responsive to sending the hash of the protected content, obtaining, from the anomaly detector, an extension of the limited exercisable right for use in the second digital rights management system based on a condition being satisfied; and
associating the rights extension with the protected content.
4 Assignments
0 Petitions
Accused Products
Abstract
A method in a multimedia device (130) including obtaining protected content having a limited exercisable right associated therewith, obtaining an extension of the limited exercisable right when a condition is satisfied, for example, when the device enters a DRM system different than the DRM system from which the protected content originated, wherein the extension of the limited exercisable right is obtained from an entity other than the multimedia device, for example, from an anomaly detector.
-
Citations
25 Claims
-
1. A method, comprising:
-
obtaining, by a multimedia device comprising a processor, protected content that originates in a first digital rights management system, wherein the protected content has an associated limited exercisable right, wherein the limited exercisable right is controlled by a rights duration clock that specifies a temporal duration during which the limited exercisable right is valid; sending a hash of the protected content to an anomaly detector coupled to the first digital rights management system and to a second digital rights management system, the anomaly detector adapted to detect an anomaly in the protected content based on the hash of the protected content; responsive to sending the hash of the protected content, obtaining, from the anomaly detector, an extension of the limited exercisable right for use in the second digital rights management system based on a condition being satisfied; and associating the rights extension with the protected content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium storing computer-executable instructions that, in response to execution, cause a device comprising a processor to perform operations, comprising:
-
obtaining protected content that originates in a first digital rights management system, wherein the protected content has an associated limited exercisable right, wherein the limited exercisable right is controlled by a rights duration clock that indicates a defined time period during which the limited exercisable right is in effect; sending a hash of the protected content to an anomaly detector coupled to the first digital rights management system and to a second digital rights management system, the anomaly detector adapted to detect an anomaly in the protected content based on the hash of the protected content; responsive to sending the hash of the protected content, obtaining, from the anomaly detector, an extension of the limited exercisable right for use in the second digital rights management system based on a condition being satisfied; and associating the rights extension with the protected content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
a memory storing computer executable components; and a processor configured to execute computer executable components stored in the memory, the components comprising; a first component that obtains protected content that originates in a first digital rights management system, wherein the protected content has an associated limited exercisable right, wherein the limited exercisable right is controlled by a rights duration component that defines a duration of time during which the limited exercisable right is valid; a second component that sends a hash of the protected content to an anomaly detector coupled to the first digital rights management system and to a second digital rights management system, the anomaly detector adapted to detect an anomaly in the protected content based on the hash of the protected content; a third component that, responsive to sending the hash of the protected content, obtains an extension of the limited exercisable right for use in the second digital rights management system based on a condition being satisfied; and a fourth component that associates the rights extension with the protected content. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification