System, method, and apparatus for securely providing content viewable on a secure device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/32
H04K-001/04
H04L-009/00
출원번호
UP-0319255
(2005-12-27)
등록번호
US-7640435
(2010-01-07)
발명자
/ 주소
Morten, Glenn A.
출원인 / 주소
Widevine Technologies, Inc.
대리인 / 주소
Darby & Darby P.C.
인용정보
피인용 횟수 :
54인용 특허 :
98
초록▼
A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt
A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, and the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.
대표청구항▼
What is claimed as new and desired to be protected by Letters Patent of the United States is: 1. An apparatus for providing a secure content stream for use in a player, the apparatus comprising: a receiver component that is arranged to receive an unencrypted content stream; and a processor componen
What is claimed as new and desired to be protected by Letters Patent of the United States is: 1. An apparatus for providing a secure content stream for use in a player, the apparatus comprising: a receiver component that is arranged to receive an unencrypted content stream; and a processor component that is arranged to perform actions, including: selectively encrypting at least a portion of the unencrypted content stream using a content key; generating a key package comprising the content key; encrypting the key package using a screener key; encrypting the screener key employing a public key bound to the player such that the public key is unique to the player; and embedding the encrypted key package into the selectively encrypted content stream. 2. The apparatus of claim 1, wherein the selectively encrypted content stream is further configured for delivery to another apparatus using a delivery content media technology. 3. The apparatus of claim 2, where the delivery content media technology further comprises a network. 4. The apparatus of claim 1, wherein the encrypted screener key is further configured for delivery over a network. 5. The apparatus of claim 1, wherein selectively encrypting at least a portion of a content stream further comprises: selectively encrypting at least a portion of a video component or an audio component of the unencrypted content stream; and enabling at least another portion of the video component or the audio component of the content stream to remain unencrypted. 6. The apparatus of claim 1, wherein the player is in communications with a cellular phone that is configured to receive at least one of the selectively encrypted content stream or the encrypted screener key. 7. The apparatus of claim 1, wherein the player is configured to employ an identity module to enable access to the encrypted screener key. 8. The apparatus of claim 7, wherein the identity module further comprises enabling access using at least one of a biometric mechanism, a smart card, a user name/password, or a touch-pad code entry mechanism. 9. A computer-readable medium having computer-executable components for use in playing a content stream, the computer-executable components comprising: a content media sub-system that is configured to receive selectively encrypted content that is encrypted using a content key, the content key being subsequently encrypted using a screener key that is in turn subsequently encrypted using a public key; and a decryption engine that is operative to perform actions, including: receiving the selectively encrypted content stream from the content media sub-system; receiving the encrypted screener key; decrypting the screener key using a private key associated with the public key, the private key being constrained to the apparatus; and employing the decrypted screener key to decrypt the content key; and employing the content key to decrypt the selectively encrypted content stream. 10. The computer-readable medium of claim 9, further comprising: an identity module that is configured to enable access to the screener key. 11. The computer-readable medium of claim 10, wherein the identity module employs at least one of biometry, a smart card, or a user name/password to enable access. 12. The computer-readable medium of claim 9, wherein receiving the encrypted screener key further comprises receiving the encrypted screener key over a network. 13. The computer-readable medium of claim 9, wherein the selectively encrypted content is received over a network. 14. The computer-readable medium of claim 9, wherein the computer-executable components are at least one of within or coupled to a cellular phone. 15. The computer-readable medium of claim 9, wherein the selectively encrypted content stream further comprises at least a portion of an elementary stream that is encrypted and another portion of the elementary stream that is unencrypted. 16. A method for securely playing a content stream, comprising: selectively encrypting at least a portion of the content stream using a content key; encrypting the content key using a screener key; and encrypting the screener key using a public key that is associated with a private key, the public key and the private key being bound to a player such that the public key and the private key are unique to the player, wherein the player is in communications with a cellular phone, the cellular phone being configured to receive at least one of the selectively encrypted content stream, an identity module useable to enable access to the screener key, or the encrypted screener key. 17. The method of claim 16, wherein the selectively encrypted content stream is further configured for delivery to another apparatus using a delivery content media technology, wherein the delivery content media technology includes at least one of a DVD, CD, or a network. 18. The method of claim 16, wherein the encrypted screener key is further configured for delivery over a network. 19. The method of claim 16, wherein the encrypted screener key is further configured for delivery using a smart card. 20. The method of claim 16, wherein selectively encrypting at least a portion of a content stream further comprises: selectively encrypting at least a portion of the unencrypted content stream, while at least another portion of the content stream remains unencrypted.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (98)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
Kiefer, Michael George; Grab, Eric William; Braness, Jason, Playback devices and methods for playing back alternative streams of content protected using a common set of cryptographic keys.
Braness, Jason; van der Schaar, Auke Sjoerd; Soroushian, Kourosh, Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol.
Braness, Jason; Soroushian, Kourosh; van der Schaar, Auke Sjoerd, Systems and methods for performing smooth visual search of media encoded for adaptive bitrate streaming via hypertext transfer protocol using trick play streams.
Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for protecting alternative streams in adaptive bitrate streaming systems.
Braness, Jason; Amidei, William David; Srinivasan, Mayur, Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles.
Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata.
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
※ AI-Helper는 부적절한 답변을 할 수 있습니다.