Secure and efficient content screening in a networked environment
First Claim
1. A method, comprising:
- receiving a device authentication certificate at a first device from a second device;
verifying an authenticity of the certificate;
ascertaining capabilities of the second device; and
based on at least the ascertained capabilities of the second device, determining by the first device an operational configuration among one or more of the first device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. The authenticity of various devices can be verified through the exchange of certificates that can further enable such devices to ascertain capabilities of one another. Based on the ascertained capabilities, an operational configuration for conducting watermark extraction and content screening can be determined.
-
Citations
39 Claims
-
1. A method, comprising:
-
receiving a device authentication certificate at a first device from a second device; verifying an authenticity of the certificate; ascertaining capabilities of the second device; and based on at least the ascertained capabilities of the second device, determining by the first device an operational configuration among one or more of the first device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A device, comprising:
-
a processor; and a memory, including processor executable code, the processor executable code when executed by the processor configures the device to; receive a device authentication certificate from a second device; verify an authenticity of the certificate; ascertain capabilities of the second device; and based on at least the ascertained capabilities of the second device, determine an operational configuration among one or more of the device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer program product, embodied on a non-transitory computer readable medium, comprising:
-
program code for receiving a device authentication certificate at a first device from a second device; program code for verifying an authenticity of the certificate; program code for ascertaining capabilities of the second device; and program code for, based on at least the ascertained capabilities of the second device, determining by the first device an operational configuration among one or more of the device, the second device, a trusted delegated device and a trusted slave device for conducting watermark extraction and content screening operations associated with a content, the operational configuration providing an allocation of resources needed to perform the watermark extraction and content screening operations and for fulfillment of a content use policy associated with an extracted watermark payload.
-
Specification