A computing device has encrypted content and a corresponding license having a decryption key for decrypting the content. The license allows the computing device to render the content thereon. The computing device may issue a sub-license based on the license to a portable device. The sub-license allo
A computing device has encrypted content and a corresponding license having a decryption key for decrypting the content. The license allows the computing device to render the content thereon. The computing device may issue a sub-license based on the license to a portable device. The sub-license allows the portable device to render the content thereon and has the decryption key. The portable device has a digital device certificate including information thereon. The computing device receives from the portable device the device certificate thereof, and determines based on rules in the license and the information on the portable device in the device certificate whether the computing device can issue the sub-license to the portable device. If so, the computing device constructs such sub-license to include the decryption key (KD) and transmits the constructed sub-license to the portable device.
대표청구항▼
1. A method in connection with a computing device having encrypted digital content and a license corresponding to the encrypted digital content, the license having a decryption key (KD) for decrypting the encrypted digital content, the license allowing the computing device to render the encrypted di
1. A method in connection with a computing device having encrypted digital content and a license corresponding to the encrypted digital content, the license having a decryption key (KD) for decrypting the encrypted digital content, the license allowing the computing device to render the encrypted digital content thereon, the method for the computing device to issue a sub-license based on the license to a portable device communicatively coupled thereto, the sub-license for allowing the portable device to render the encrypted digital content thereon using the decryption key (KD), the method comprising: receiving, by the computing device, a device certificate from the portable device including information relating to output protection levels assigned to the portable device by an issuer of the device certificate or a third party, the output protection levels assigned to the portable device indicating a level of output protection of the portable device based on the types of outputs provided by the portable device and the security of such outputs, the types of outputs including at least one member of the group comprising compressed and encrypted copying, uncompressed and decrypted copying, uncompressed digital audio output, compressed digital video output, encrypted analog video output, and decrypted analog audio output;determining, by the computing device, from the device certificate an identifier identifying the portable device, wherein the identifier is a globally unique identifier or a class identifier;determining, by the computing device, as required by the license and based on the information relating to the portable device, whether the portable device has one or more assigned output protection levels, wherein each output protection level is indicative of a determined level of security provided to content output by the portable device with respect to a particular type of output thereof;determining, by the computing device, based on the information relating to the portable device, whether each assigned output protection level satisfies an output protection level requirement set within the license;determining, by the computing device, based on rules in the license and also based on the information relating to the portable device as set forth within the device certificate, whether the computing device has the license rights to issue the sub-license to the portable device;determining, by the computing device, from the device certificate whether the portable device has secure metering capabilities for maintaining, by the portable device, state information with respect to a constructed sub-license and for securely storing the maintained state;based on the determination that the computing device has the license rights to issue the sublicense to the portable device, the determination that the assigned output protection level satisfies the output protection level requirement set within the license, and the determination that the portable device has secure metering capabilities, constructing, by the computing device, such sub-license to include the decryption key (KD); andissuing, by the computing device, the sub-license to the portable device by transmitting the constructed sub-license to the portable device. 2. The method of claim 1, further comprising the computing device determining whether the one or more assigned output protection levels relate to compressed and encrypted copying. 3. The method of claim 2, further comprising the computing device determining whether the compressed and encrypted copying level of the portable device satisfies the output protection level requirement set within the license. 4. The method of claim 1, further comprising the computing device determining whether the device certificate has not expired or been revoked and issuing the sub-license to the portable device if the device certificate has not expired or been revoked. 5. The method of claim 1, further comprising the computing device determining from the device certificate whether the portable device has a secure clock that is set correctly and issuing the sub-license to the portable device if the portable device has a secure clock that is set correctly. 6. The method of claim 1, further comprising the computing device determining whether the portable device identifier is on an exclusion list or inclusion list and issuing the sub-license to the portable device if the portable device identifier is not on the exclusion list or if the portable device identifier is on the inclusion list. 7. A computer-readable hardware storage device having stored thereon computer-executable instructions that, when executed by a computer, cause the computer to implement a method in connection with a computing device having encrypted digital content and a license corresponding to the encrypted digital content, the license having a decryption key (KD) for decrypting the encrypted digital content, the license allowing the computing device to render the encrypted digital content thereon, the method for the computing device to issue a sub-license based on the license to a portable device communicatively coupled thereto, the sub-license for allowing the portable device to render the encrypted digital content thereon using the decryption key (KD), the method comprising the steps of: receiving, by the computing device, from the portable device a device certificate including information relating to output protection levels assigned to the portable device by an issuer of the device certificate or a third party, the output protection levels assigned to the portable device indicating a level of output protection of the portable device based on the types of outputs provided by the portable device and the security of such outputs, the types of outputs including at least one member of the group comprising compressed and encrypted copying, uncompressed and decrypted copying, uncompressed digital audio output, compressed digital video output, encrypted analog video output, and decrypted analog audio output;determining, by the computing device, from the device certificate an identifier identifying the portable device, wherein the identifier is a globally unique identifier or a class identifier;determining, by the computing device, as required by the license and based on the information relating to the portable device, whether the portable device has one or more assigned output protection levels, each output protection level indicative of a determined level of security provided to content output by the portable device with respect to a particular type of output thereof;determining, by the computing device, based on the information relating to the portable device, whether each assigned output protection level satisfies an output protection level requirement set within the license;determining, by the computing device, based on rules in the license and also based on the information relating to the portable device as set forth within the device certificate whether the computing device has the license rights to issue the sub-license to the portable device;determining, by the computing device, from the device certificate whether the portable device has secure metering capabilities for maintaining, by the portable device, state information with respect to a constructed sub-license and for securely storing the maintained state;based on the determination that the computing device has the license rights to issue the sublicense to the portable device, the determination that the assigned output protection level satisfies the output protection level requirement set within the license, and the determination that the portable device has secure metering capabilities, constructing, by the computing device, such sub-license to include the decryption key (KD); andissuing, by the computing device, the sub-license to the portable device by transmitting the constructed sub-license to the portable device. 8. The device of claim 7, further comprising instructions that enable the computing device to determine whether the one or more assigned output protection levels relate to compressed and encrypted copying. 9. The device of claim 8, further comprising instructions that enable the computing device to determine whether the compressed and encrypted copying level of the portable device satisfies the output protection level requirement set within the license. 10. The device of claim 7, further comprising instructions that enable the computing device to determine whether the device certificate has not expired or been revoked and to issue the sub-license to the portable device if the device certificate has not expired or been revoked. 11. The device of claim 7, further comprising instructions that enable the computing device to determine from the device certificate whether the portable device has a secure clock that is set correctly and to issue the sub-license to the portable device if the portable device has a secure clock that is set correctly. 12. The device of claim 7, further comprising instructions that enable the computing device to determine whether the portable device identifier is on an exclusion list or inclusion list and to issue the sub-license to the portable device if the portable device identifier is not on the exclusion list or if the portable device identifier is on the inclusion list.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (51)
Butler Theodore ; Wong Marcus, Apparatus and method for encryption key generation.
Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Matyas ; Jr. Stephen Michael ; Johnson Donald Byron, Method and apparatus for establishing an authenticated shared secret value between a pair of users.
Arnold Thomas Andrew ; Pettitt John Philip ; Rendleman ; Jr. Jesse Noel ; Lewis ; Jr. Robert Lincoln, Method and system for delivering digital products electronically.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.