×

Technique for securely communicating programming content

  • US 9,973,798 B2
  • Filed: 04/11/2016
  • Issued: 05/15/2018
  • Est. Priority Date: 07/20/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for protecting data content within a trusted domain, comprising:

  • receiving one or more protected data content from a device of a first domain that is outside of the trusted domain, the one or more protected data content associated with a minimum security level of compliance of the first domain that is outside of the trusted domain, where the first domain comprises a first multi-layered rights arrangement, and the trusted domain comprises a second multi-layered rights arrangement different from the first multi-layered rights arrangement of the first domain, the minimum security level of compliance comprising a set of rights selected from a plurality of sets of rights of the first multi-layered rights arrangement;

    invoking a mutual authentication process, the mutual authentication process comprising registering with a trusted network entity, the trusted network entity being known commonly to (i) the device of the first domain that is outside of the trusted domain and (ii) a first device of the trusted domain;

    causing a creation of a rights file indicating an extent of sharing permissions within the trusted domain, the causing the creation of the rights file being based at least on the minimum security level of compliance assigned to the device of the first domain that is outside of the trusted domain; and

    responsive to receiving a request to transfer the one or more protected data content within the trusted domain;

    verifying that the request to transfer the one or more protected data content complies with the extent of sharing permissions and with the minimum security level of compliance assigned to the device of the first domain; and

    based at least on successful completion of the verifying, causing transmitting of the one or more protected data content;

    wherein all devices of the trusted domain are configured to enable consumption of the one or more protected data content within the extent of sharing permissions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×