Technique for securely communicating programming content
First Claim
1. A method for transferring programming content between devices, comprising:
- defining a first protective layer, devices within the first protective layer transferring programming content to one another pursuant to a first process; and
defining a second protective layer, a first device in the first protective layer transferring selected programming content to a second device in the second protective layer pursuant to a second process which comprises;
authenticating the second device to determine legitimacy of the second device for receiving the selected programming content, the second device being assigned an indicator indicating an extent of security thereof;
transferring to the second device the selected programming content and a set of rules associated with the selected programming content after the second device is authenticated, at least some of the rules in the set being associated with the indicator and indicating an authorization of the second device to transfer the programming content to one or more third devices; and
transferring the selected programming content to the one or more third devices based at least in part on the rules, the third devices being registered to a user of the second device.
7 Assignments
0 Petitions
Accused Products
Abstract
A technique for securely transferring content from a first device in a first layer to a second device in a second layer. In one embodiment, the first device is a device in a trusted domain and the second device is outside of the trusted domain. Transfer of protected content to another device may require authentication of the receiving device. A rights file which specifies the rights of the receiving device to use the protected content, according to its security level is also transferred. These rights may concern, e.g., the number of times the receiving device may transfer the protected content to other devices, the time period within which the receiving device may play the protected content, etc. The higher the security level of the receiving device, the more rights accorded thereto. A minimum security level requirement may be imposed in order for protected content to be transferred to a device.
73 Citations
32 Claims
-
1. A method for transferring programming content between devices, comprising:
- defining a first protective layer, devices within the first protective layer transferring programming content to one another pursuant to a first process; and
defining a second protective layer, a first device in the first protective layer transferring selected programming content to a second device in the second protective layer pursuant to a second process which comprises;
authenticating the second device to determine legitimacy of the second device for receiving the selected programming content, the second device being assigned an indicator indicating an extent of security thereof;
transferring to the second device the selected programming content and a set of rules associated with the selected programming content after the second device is authenticated, at least some of the rules in the set being associated with the indicator and indicating an authorization of the second device to transfer the programming content to one or more third devices; and
transferring the selected programming content to the one or more third devices based at least in part on the rules, the third devices being registered to a user of the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
- defining a first protective layer, devices within the first protective layer transferring programming content to one another pursuant to a first process; and
-
13. A system for transferring programming content between devices, comprising:
- devices within a first protective layer transferring programming content to one another pursuant to a first process; and
a first device in the first protective layer transferring selected programming content to a second device pursuant to a second process, the first and second devices being registered to a single user and the first device including a processor programmed to perform the second process which comprises;
authenticating the second device to determine legitimacy of the second device for receiving the selected programming content, the second device being assigned an indicator indicating an extent of security thereof; and
transferring to the second device the selected programming content and a set of rules associated with the selected programming content after the second device is authenticated, at least some of the rules in the set being associated with the indicator and applicable to the second device with respect to use of the selected programming content;
wherein each of the first and second devices utilizes a decryption key specific to the single user to decrypt the selected programming content. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
- devices within a first protective layer transferring programming content to one another pursuant to a first process; and
-
25. A client device configured to transfer programming content to one or more second devices registered to a same user as said client device, said client device comprising:
-
a storage apparatus configured to store said programming content; and a processor configured to run at least one computer program thereon, said computer program comprising a plurality of instructions which are configured to, when executed; authenticate said one or more second devices to determine legitimacy of said one or more second devices for receiving said programming content, said authentication being based at least in part on respective indicators assigned to respective ones of said one or more second devices and indicating an extent of security thereof; and transfer to said one or more second devices said programming content and a plurality of rules associated with said programming content after said one or more second devices are authenticated, at least some of said plurality of rules being associated with said indicator and applicable to respective ones of said one or more second devices;
with respect to use of said programming content;wherein said client device and said one or more second devices utilize a decryption key specific to said same user to decrypt said programming content. - View Dependent Claims (26, 27, 28)
-
-
29. A method of for transferring programming content from a first device to a second device, said method comprising:
-
authenticating said second device in order to determine legitimacy of said second device for receiving said programming content, said second device being assigned an indicator indicating an extent of security thereof and said authentication being based at least in part on said indicator; and upon completion of said determination, transferring to said second device (i) said programming content, and (ii) one or more rules associated with said programming content, at least a portion of said one or more rules being associated with said indicator and applicable to said second device with respect to use of said programming content; wherein said first and second devices are registered to a single user; and wherein each of the first and second devices utilizes a decryption key specific to said single user to decrypt said programming content. - View Dependent Claims (30, 31, 32)
-
Specification