TETHERED DEVICE SYSTEMS AND METHODS
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.
6 Citations
41 Claims
-
1-21. -21. (canceled)
-
22. A method of exporting a license from a host device to a target device, the license for use in governing access to or other use of a piece of electronic content, the method comprising:
-
using a pairing key to encrypt a first cryptographic key, the first cryptographic key being configured for decrypting the piece of electronic content; executing a control program, included in the license, to obtain one or more conditions relating to granting access to the piece of electronic content; creating a data structure that includes the encrypted first cryptographic key and an indication of the one or more conditions; digitally signing at least part of the data structure using the pairing key; and sending the data structure to the target device. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor of a host device, cause the processor to perform a method for exporting a license from a host device to a target device, the license for use in governing access to or other use of a piece of electronic content, the method comprising:
-
using a pairing key to encrypt a first cryptographic key, the first cryptographic key being configured for decrypting the piece of electronic content; executing a control program, included in the license, to obtain one or more conditions relating to granting access to the piece of electronic content; creating a data structure that includes the encrypted first cryptographic key and an indication of the one or more conditions; digitally signing at least part of the data structure using the pairing key; and sending the data structure to the target device. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification