FILE SYSTEM OPERATION AND DIGITAL RIGHTS MANAGEMENT (DRM)
First Claim
1. A system for file operations and digital rights management (DRM), the system comprising:
- a first application that is capable of requesting one or more files that are protected by at least one DRM content control;
a second application that is also capable of requesting the one or more files that are protected by the at least one DRM content control; and
one or more file system components that are capable of responding to requests from the first and second applications for the one or more files, the one or more file system components adapted to interact with DRM functionality to cause files of the one or more files with no complex DRM content controls to be decrypted and to provide the decrypted files to the first and second applications, the one or more file system components configured to create an identity-context-based cache of DRM-protected files so that a file that has been decrypted on behalf of and provided to the first application may be provided to the second application without additional interaction with the DRM functionality on behalf of the second application if the first and second applications each correspond to a joint user context.
1 Assignment
0 Petitions
Accused Products
Abstract
A file system is configured for use with files protected by digital rights management (DRM) content controls and to interact both with applications that are, and are not, DRM aware. The file system may be configured for use by two applications, in a manner that may provide the second application with protected files if the first application was previously allowed access. In one example, a user context cache of DRM-protected files is created. The files in the cache may have been decrypted in response to a request(s) from the first application. Subsequent requests from the second application may be received for files within the user context cache of DRM-protected files. At least one of the files within the user context cache of DRM-protected files may be provided to the second application if the second application has a joint user context with the first application.
-
Citations
20 Claims
-
1. A system for file operations and digital rights management (DRM), the system comprising:
-
a first application that is capable of requesting one or more files that are protected by at least one DRM content control; a second application that is also capable of requesting the one or more files that are protected by the at least one DRM content control; and one or more file system components that are capable of responding to requests from the first and second applications for the one or more files, the one or more file system components adapted to interact with DRM functionality to cause files of the one or more files with no complex DRM content controls to be decrypted and to provide the decrypted files to the first and second applications, the one or more file system components configured to create an identity-context-based cache of DRM-protected files so that a file that has been decrypted on behalf of and provided to the first application may be provided to the second application without additional interaction with the DRM functionality on behalf of the second application if the first and second applications each correspond to a joint user context. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to operate a file system, defined in a system memory, to provide digital rights management (DRM), the method comprising:
-
executing software defined in the system memory with a processing unit; receiving a request, from a first application, to create one or more files in the file system defined in system memory that are protected by at least one DRM content control; determining which of the one or more files lack complex DRM content controls; decrypting at least one file determined to have no complex DRM content controls; maintaining a user context cache for validating a user of the first application and obtaining licenses for DRM-controlled content on behalf of the validated user; receiving a second request to open the decrypted file, from a second application, the second application being validated by the user context cache; and opening at least one file indicted by the second request, if indicated by the validation by the user context cache. - View Dependent Claims (9, 10, 11, 12, 13, 14, 17)
-
-
15. A computer readable media, defining computer-executable instructions, the instructions configured to provide digital rights management (DRM) and comprising instructions for:
-
initiating a callout, upon receiving a first request from a first application, for creation of one or more files within the file system defined in system memory, the one or more files having protection of at least one DRM content control; distinguishing, within the at least one DRM content control, DRM content controls that are complex from those that are not complex; decrypting one or more files with no complex DRM content controls in response to the first application; validating the first application as DRM trusted if the one or more files have complex DRM content controls; maintaining a user context cache for validating a user of the first application and providing DRM privileges to a second application indicated by the user context cache; receiving a second request from the second application regarding at least one file, the second request being validated by the user context cache; and saving the at least one file indicted by the second request, if indicated by the validation. - View Dependent Claims (16, 18, 19, 20)
-
Specification