IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0752276
(2007-05-22)
|
등록번호 |
US-8347098
(2013-01-01)
|
발명자
/ 주소 |
- Farrugia, Augustin J.
- Fasoli, Gianpaolo
- Toublet, Bertrand Mollinier
- Ciet, Mathieu
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
3 인용 특허 :
54 |
초록
▼
Some embodiments of the invention provide a content-distribution system for distributing content under a variety of different basis. For instance, in some embodiments, the content-distribution system distributes device-restricted content and device-unrestricted content. Device-restricted content is
Some embodiments of the invention provide a content-distribution system for distributing content under a variety of different basis. For instance, in some embodiments, the content-distribution system distributes device-restricted content and device-unrestricted content. Device-restricted content is content that can only be played on devices that the system associates with the particular user. Device-unrestricted content is content that can be played on any device without any restrictions. However, for at least one operation or service other than playback, device-unrestricted content has to be authenticated before this operation or service can be performed on the content. In some embodiments, the system facilitates this authentication by specifying a verification parameter for a piece of device-unrestricted content. The content-distribution system of some embodiments has a set of servers that supply (1) media storage structures that store content, (2) cryptographic keys that are needed to decrypt device-restricted content, and (3) verification parameters that are needed to verify device-unrestricted content. In some embodiments, the device that receives the media storage structure inserts the received cryptographic key or verification parameter in the received media storage structure. In some embodiments, the set of servers also supply cryptographic content keys for the device-unrestricted content. These keys are used to decrypt the content upon arrival, upon first playback, or at some other time. However, some embodiments do not store these cryptographic keys in the media storage structures for the device-unrestricted content.
대표청구항
▼
1. A non-transitory computer readable medium of a device storing a program comprising sets of instructions for: receiving, from a first set of computers, a first structure with a device-restricted first content piece, the first structure comprising a slot for holding a first content key for decrypti
1. A non-transitory computer readable medium of a device storing a program comprising sets of instructions for: receiving, from a first set of computers, a first structure with a device-restricted first content piece, the first structure comprising a slot for holding a first content key for decrypting the first content piece each time the first content piece is accessed;receiving, from the first set of computers, a second structure with a device-unrestricted second content piece, the second structure having a similar format to the first structure, the second structure comprising a slot for holding a verification parameter for authenticating the second content piece;receiving, from a second set of computers, (i) the first content key, (ii) the verification parameter, and (iii) a second content key for decrypting the second content piece;inserting the first content key in the slot of the received first structure;decrypting the second content piece using the second content key and subsequently discarding the second content key;inserting the verification parameter in the slot of the received second structure;storing the first and second structures in a storage of the device;receiving a request to perform an operation on the second content piece; andallowing the performance of the operation only if the second content piece is authenticated by using the verification parameter to verify that the second content piece originated from a particular source, wherein when the second content piece does not have its associated verification parameter in the second structure, the operation cannot be performed as the second content piece cannot be authenticated. 2. The non-transitory computer readable medium of claim 1, wherein the program further comprises a set of instructions for requesting the second content piece, wherein the second structure, the verification parameter, and the second content key are received in response to the request. 3. The non-transitory computer readable medium of claim 1, wherein the program further comprises a set of instructions for authenticating the second content piece with the verification parameter. 4. The non-transitory computer readable medium of claim 1, wherein the verification parameter is signed by the particular source. 5. The non-transitory computer readable medium of claim 1, wherein the verification parameter identifies the particular source. 6. The non-transitory computer readable medium of claim 1, wherein the verification parameter comprises data that is cryptographically tied to the second content piece. 7. The non-transitory computer readable medium of claim 1, wherein the verification parameter comprises data that includes a hash signature of at least one part of the second content piece. 8. The non-transitory computer readable medium of claim 1, wherein the received second structure holds a plurality of device-unrestricted content pieces and comprises a plurality of slots for holding a plurality of verification parameters, each verification parameter for authenticating a different device-unrestricted content piece in the second structure. 9. The non-transitory computer readable medium of claim 8, wherein the program further comprises sets of instructions for: receiving the plurality of verification parameters from the second set of computers; andinserting each of the received verification parameters into a different slot of the received second structure. 10. The non-transitory computer readable medium of claim 1, wherein the first piece of content is encrypted in the first structure. 11. The non-transitory computer readable medium of claim 1, wherein the program further comprises sets of instructions for receiving a third structure with a third content piece, the third structure having a similar format to the first and second structures, the third structure comprising an empty slot. 12. The non-transitory computer readable medium of claim 11, wherein the third structure is received from a different source than the first and second structures. 13. For an electronic device that accesses content, a method comprising: receiving, from a first set of computers, a first structure with a device-restricted first content piece, the first structure comprising a slot for holding a first content key for decrypting the first content piece each time the first content piece is accessed;receiving, from the first set of computers, a second structure with a device-unrestricted second content piece, the second structure having a similar format to the first structure, the second structure comprising a slot for holding a verification parameter for authenticating the second content piece;receiving, from a second set of computers, (i) the first content key, (ii) the verification parameter, and (iii) a second content key for decrypting the second content piece;inserting the first content key in the slot of the received first structure;decrypting the second content piece using the second content key and subsequently discarding the second content key;inserting the verification parameter in the slot of the received second structure;storing the first and second structures in a storage of the device;receiving a request to perform an operation on the second content piece; andallowing the performance of the operation only if the second content piece is authenticated by using the verification parameter to verify that the second content piece originated from a particular source, wherein when the second content piece does not have its associated verification parameter in the second structure, the operation cannot be performed as the second content piece cannot be authenticated. 14. The method of claim 13 further comprising requesting the second content piece, wherein the second structure, the verification parameter, and the second content key are received in response to the request. 15. The method of claim 13 further comprising authenticating the second content piece with the verification parameter. 16. The method of claim 13, wherein the verification parameter is signed by the particular source. 17. The method of claim 13, wherein the verification parameter identifies the particular source. 18. The method of claim 13, wherein the verification parameter comprises data that is cryptographically tied to the second content piece. 19. The method of claim 13, wherein the verification parameter comprises data that includes a hash signature of at least one part of the second content piece. 20. The method of claim 13, wherein the received second structure holds a plurality of device-unrestricted content pieces and comprises a plurality of slots for holding a plurality of verification parameters, each verification parameter for authenticating a different device-unrestricted content piece in the second structure. 21. The method of claim 20 further comprising: receiving the plurality of verification parameters from the second set of computers; andinserting each of the received verification parameters into a different slot of the received second structure. 22. The method of claim 13, wherein the first piece of content is encrypted in the first structure. 23. The method of claim 13 further comprising receiving a third structure with a third content piece, the third structure having a similar format to the first and second structures, the third structure comprising an empty slot. 24. The method of claim 23, wherein the third structure is received from a different source than the first and second structures.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.