×

Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust

  • US 9,990,473 B2
  • Filed: 12/08/2011
  • Issued: 06/05/2018
  • Est. Priority Date: 12/08/2011
  • Status: Active Grant
First Claim
Patent Images

1. A machine implemented method for operating a first client computing system to securely share content between the first client computing system and a second client computing system, comprising:

  • receiving, by the first client computing system, from a service provider server, content requested by a user and an encrypted license blob associated with the content, the first client computing system having a first general purpose hardware processor and a first hardware security processor that includes first unique and privacy protected information of a first manufacturer of the first client computing system;

    connecting, by the first client computing system, a first sharing agent operated by the first general purpose hardware processor with a second sharing agent operated by a second general purpose hardware processor on the second client computing system, the second client computing system, in addition to the second general purpose hardware processor, further including a second hardware security processor that includes second unique and privacy protected information of a second manufacturer of the second client computing system;

    sending, by the first client computer system, the encrypted license blob and a sub-license request from the first sharing agent operated by the first general purpose hardware processor to the first hardware security processor on the first client computing system;

    creating, by the first sharing agent of the first client computing system in cooperation with the second sharing agent of the second client computing system, a secure session between the first hardware security processor of the first client computing system and the second hardware security processor of the second client computing system, wherein the unique and privacy protected information of the first and second manufacturer provided to the first and second hardware security processors of the first and second client computing systems are used by the first and second client computing systems to build a hardware-based root of trust to establish trust between the first and second client computing systems;

    decrypting, by the first client computing system, using the first hardware security processor, the encrypted license blob, and validating, by the first client computing system, using the first hardware security processor, the sub-license request, and on determination of allowance, creating, by the first client computing system, using the first hardware security processor, a sub-license to allow the second client computing system to play the content;

    sending, by the first client computing system, using the first hardware security processor, the sub-license to the second hardware security processor on the second client computing system, wherein the second hardware security processor encrypts the sub-license and provides the encrypted sub-license to the second sharing agent; and

    on sending the sub-license, providing, by the first client computing system, access to the content to the second client computing system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×