DIGITAL RIGHTS MANAGEMENT IN A MOBILE ENVIRONMENT
First Claim
1. A method, comprising:
- causing a plurality of virtual-machine instructions to be interpreted for indications of a mobile device'"'"'s hardware identification information, forming a plurality of hardware instruction interpretations;
combining each of the plurality of hardware instruction interpretations and hashing the combination, forming a quasi-hardware device ID;
basing an encryption process on the quasi-hardware device ID and encrypting media using the encryption process;
transferring the encrypted media to the mobile device; and
causing the mobile device to decrypt the media based, at least in part, on the mobile device'"'"'s internal knowledge of the quasi-hardware device ID.
10 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provide a method that causes a plurality of virtual machine instructions to be interpreted for indications of a mobile device'"'"'s hardware identification information, thus forming a plurality of hardware instruction interpretations. The embodiment also combines each of the plurality of hardware instruction interpretations and hashes the combination to form a quasi-hardware device identifier. An encryption process is based on the quasi-hardware encryption device identifier and the media is then encrypted using the encryption process. The encrypted media is transferred to the mobile device wherein the mobile device decrypts the media based at least in part on the mobile device'"'"'s internal knowledge of the quasi-hardware device identification.
987 Citations
5 Claims
-
1. A method, comprising:
-
causing a plurality of virtual-machine instructions to be interpreted for indications of a mobile device'"'"'s hardware identification information, forming a plurality of hardware instruction interpretations; combining each of the plurality of hardware instruction interpretations and hashing the combination, forming a quasi-hardware device ID; basing an encryption process on the quasi-hardware device ID and encrypting media using the encryption process; transferring the encrypted media to the mobile device; and causing the mobile device to decrypt the media based, at least in part, on the mobile device'"'"'s internal knowledge of the quasi-hardware device ID.
-
-
2. A method, comprising:
-
causing a plurality of virtual-machine instructions to be interpreted for indications of a mobile device'"'"'s hardware identification information, forming a plurality of hardware instruction interpretations; combining each of the plurality of hardware instruction interpretations and hashing the combination, forming a quasi-hardware device ID; basing a unique encryption process on at least two factors; the quasi-hardware device ID, and an understanding of what prior encryption process was used in a previous media delivery to the mobile device such that the unique encryption process is different than the prior encryption process; encrypting media using the unique encryption process; transferring the encrypted media to the mobile device; and causing the mobile device to decrypt the media based, at least in part, on the mobile device'"'"'s internal knowledge of the quasi-hardware device ID.
-
-
3. A method, comprising:
-
causing a plurality of virtual-machine instructions to be interpreted for indications of a mobile device'"'"'s hardware identification information, forming a plurality of hardware instruction interpretations; combining each of the plurality of hardware instruction interpretations and hashing the combination, forming a quasi-hardware device ID; basing an encryption process on the quasi-hardware device ID; dividing media into a plurality of blocks; encrypting at least one of the plurality of blocks using the encryption process; scrambling at least one of the remaining blocks from the plurality of blocks based on the quasi-hardware device ID; transferring each of the plurality of blocks to the mobile device; and causing the mobile device to decrypt and unscramble the media based, at least in part, on the mobile device'"'"'s internal knowledge of the quasi-hardware device ID.
-
-
4. A method, comprising:
-
enabling a user to register a plurality of devices, each of the plurality of devices adapted to present media to the user;
at least one of the plurality of devices being a mobile phone;adapting a media delivery platform to deliver encrypted media to each of the plurality of devices based on a knowledge of which of the plurality of devices the encrypted media delivery platform is sending the encrypted media, such that the encrypted media delivery is based on a device specific encryption process; and further adapting the media delivery platform to deliver encrypted media to the mobile phone based on a quasi-hardware mobile device ID, wherein the quasi-hardware mobile device is based on a virtual machine instruction interpretation process on the mobile phone.
-
-
5. A method, comprising:
-
in response to a media delivery request from a television set top box, delivering encrypted media to the television set top based on a set top box encryption process; in response to receiving a pause media request from the television set top box, pausing a play feature of the media on the television set top box; and in response to receiving a resume media request from a mobile phone, delivering the media to the mobile phone based on a quasi-hardware device ID relating to the mobile phone.
-
Specification