IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0232903
(2011-09-14)
|
등록번호 |
US-8397070
(2013-03-12)
|
발명자
/ 주소 |
- MacKay, Michael K.
- Maher, David P.
|
출원인 / 주소 |
- Intertrust Technologies Corp.
|
대리인 / 주소 |
Finnegan, Henderson, Farabow, Garrett & Dunner LLP
|
인용정보 |
피인용 횟수 :
2 인용 특허 :
43 |
초록
▼
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file sys
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content.
대표청구항
▼
1. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor on a first computer system, are configured to cause the first computer system to perform a method for controlling the operation of a first digital rights management system on the first comput
1. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor on a first computer system, are configured to cause the first computer system to perform a method for controlling the operation of a first digital rights management system on the first computer system, the method comprising: receiving, at a control application located on the first computer system, a request from the first digital rights management system to access a piece of electronic content;receiving, at the control application, a first keyshare from the first digital rights management system;receiving, at the control application, a second keyshare from a second digital rights management system located on the first computer system, the second digital rights management system being operable to send the second keyshare only if one or more conditions are satisfied;using the first keyshare and the second keyshare to enable the control application to retrieve a piece of content-access information from protected storage on the first computer system; andusing the piece of content-access information to enable the first digital rights management system to access the piece of electronic content. 2. The non-transitory computer-readable storage medium of claim 1, in which the first keyshare and the second keyshare comprise portions of a first cryptographic key, the first cryptographic key being used to decrypt the piece of content-access information, the piece of content-access information comprising a second cryptographic key. 3. The non-transitory computer-readable storage medium of claim 2, in which the second cryptographic key is used by the second digital rights management system to decrypt the piece of electronic content. 4. The non-transitory computer-readable storage medium of claim 2, in which the second cryptographic key is sent to the first digital rights management system, the first digital rights management system being operable to use the second cryptographic key to decrypt the piece of electronic content. 5. The non-transitory computer-readable storage medium of claim 4, in which the decrypted piece of the electronic content comprises content protected in accordance with the encoding format of the first digital rights management system. 6. The non-transitory computer-readable storage medium of claim 1, further including instructions that, when executed by the processor, are configured to cause the first computer system to perform a method further comprising: determining that the first digital rights management system is not functioning properly; andsending control information to the second digital rights management system, the control information being operable to cause the second digital rights management system to deny access to the second keyshare when the first digital rights management system, or a process acting on its behalf, requests access to the second keyshare. 7. The non-transitory computer-readable storage medium of claim 1, further including instructions that, when executed by the processor, are configured to cause the first computer system to perform a method further comprising: receiving first control information at the second digital rights management system, the first control information causing at least one of said conditions to not be satisfied, thereby inhibiting the second digital rights management system from sending the second keyshare. 8. The non-transitory computer-readable storage medium of claim 7, further including instructions that, when executed by the processor, are configured to cause the first computer system to perform a method further comprising: receiving second control information at the second digital rights management system, the second control information causing said at least one condition to be satisfied, thereby enabling the second digital rights management system to send the second keyshare. 9. The non-transitory computer-readable storage medium of claim 1, in which the first keyshare is different from the second keyshare. 10. The non-transitory computer-readable storage medium of claim 1, further including instructions that, when executed by the processor, are configured to cause the first computer system to perform a method further comprising: the first digital rights management system receiving a request to access the piece of electronic content from a rendering application. 11. The non-transitory computer-readable storage medium of claim 1, in which the one or more conditions include a condition that the first digital rights management comply with a set of security requirements. 12. The non-transitory computer-readable storage medium of claim 1, in which the one or more conditions include a condition that the first digital rights management system is not known to have been compromised.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.