Proximity based digital rights management
First Claim
1. One or more non-transitory computer-readable media having computer-executable instructions embodied thereon that, when executed, perform a method of sharing protected content for a period of time, the method comprising:
- receiving, at a first network device, a request to share content with at least one other network device;
identifying available content on the first network device;
generating a list of the available content;
transmitting, to the at least one other network device, the list of the available content;
receiving a selection of at least one of the available content on the list;
generating a temporary key for the at least one other network device, to interact with the at least one of the available content included in the selection; and
transmitting the at least one of the available content included in the selection and the temporary key to the at least one other network device, wherein the temporary key expires when the first network device and the other network device are outside of a proximity range and the temporary key includes an identifier of the access point shared by the first network device and the at least one other network device.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and medium are provided for sharing content among network devices. The system includes at least one base station and network devices that are part of a wireless network. The base station is configured to receive a request for content from a network device. The content may be available on a second network device proximate to the first network device. The base station may generate a temporary key that allows the first network device to access the content available on the second network device while proximity between the first network device and the second network device is maintained. The base station, in turn, transmits the temporary key to the first network device.
46 Citations
17 Claims
-
1. One or more non-transitory computer-readable media having computer-executable instructions embodied thereon that, when executed, perform a method of sharing protected content for a period of time, the method comprising:
- receiving, at a first network device, a request to share content with at least one other network device;
identifying available content on the first network device;
generating a list of the available content;
transmitting, to the at least one other network device, the list of the available content;
receiving a selection of at least one of the available content on the list;
generating a temporary key for the at least one other network device, to interact with the at least one of the available content included in the selection; and
transmitting the at least one of the available content included in the selection and the temporary key to the at least one other network device, wherein the temporary key expires when the first network device and the other network device are outside of a proximity range and the temporary key includes an identifier of the access point shared by the first network device and the at least one other network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- receiving, at a first network device, a request to share content with at least one other network device;
-
9. A computer-implemented method of providing content temporarily to a network device having a Machine-to-Machine (M2M) component, the method comprising:
- receiving a request for content from a first network device, wherein the content is available on a second network device proximate to the first network device;
identifying a location of the first network device;
identifying a location of the second network device;
generating a temporary key that allows the first network device to unlock the content while the first network device is within a range of the location of the second network device; and
transmitting the temporary key and the content to the first network device, wherein the temporary key expires when the first network device and the second network device are not within a proximity range and the temporary key includes an identifier of the access point shared by the first network device and the second network device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
- receiving a request for content from a first network device, wherein the content is available on a second network device proximate to the first network device;
-
16. A communication system, the system comprising:
- a base station configured with storage and a processor that receive a request for content from a first network device, wherein the content is available on a second network device proximate to the first network device, identify a location of the first network device, identify a location of the second network device, generate a temporary key that allows the first network device to unlock the content while the first network device is within a range of the location of the first network device and the location of the second network device, and transmit the temporary key and the content to the first network device such that the content is inaccessible by the first network device when the first network device is outside of the range for the location of the first network device and the location of the second network device, wherein the temporary key includes an identifier of an access point shared by the first network device and the second network device and the temporary key expires when the first network device and the second network device are not within a proximity range.
- View Dependent Claims (17)
Specification