Method, manufacture, and apparatus for content decryption module
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04N-007/167
G06F-021/10
출원번호
US-0710940
(2012-12-11)
등록번호
US-8891765
(2014-11-18)
발명자
/ 주소
Dorwin, David Kimbal
출원인 / 주소
Google Inc.
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
2인용 특허 :
104
초록▼
A method, apparatus, and manufacture for a content decryption module (CDM) is provided. A user agent loads a web application. The web application gets a license for encrypted media content. The web application instructs a media stack of the user agent to play the encrypted media content. The license
A method, apparatus, and manufacture for a content decryption module (CDM) is provided. A user agent loads a web application. The web application gets a license for encrypted media content. The web application instructs a media stack of the user agent to play the encrypted media content. The license is sent from the web application to the media stack. Next, the license is sent from the media stack to the CDM. The media stack and the CDM are distinct binaries from each other. Encrypted data is sent from the media stack to the CDM. The encrypted data includes at least a portion of the encrypted media content. Next, the CDM provides decrypted data by decrypting the encrypted data.
대표청구항▼
1. A method, comprising: employing a user agent of a client to load a web application;employing the web application to get a license for encrypted media content;employing the web application to instruct a media stack of the user agent to play the encrypted media content;sending the license from the
1. A method, comprising: employing a user agent of a client to load a web application;employing the web application to get a license for encrypted media content;employing the web application to instruct a media stack of the user agent to play the encrypted media content;sending the license from the web application to the media stack;sending the license from the media stack to a content decryption module of the client, wherein the media stack and the content decryption module are distinct binaries from each other;sending encrypted data from the media stack to the content decryption module, wherein the encrypted data includes at least a portion of the encrypted media content; andemploying the content decryption module to provide decrypted data by decrypting the encrypted data. 2. The method of claim 1, further comprising further employing the content decryption module to perform at least one of digital rights management, content protection, decoding, or de-multiplexing. 3. The method of claim 1, wherein the content decryption module is sandboxed. 4. The method of claim 1, wherein the content decryption module is pluggable. 5. The method of claim 1, wherein the content decryption module is at least one of a browser add-on or an extension. 6. The method of claim 1, wherein the content decryption module is a pluggable extension. 7. The method of claim 1, wherein the content decryption module is a browser plug-in. 8. The method of claim 1, wherein the user agent is a web browser. 9. The method of claim 1, wherein the user agent is based on at least one of HyperText Markup Language (HTML) or a markup language that is derived from HTML. 10. The method of claim 1, wherein employing the web application to get the license for the encrypted media content includes at least one of: acquiring the license from a server, retrieving the license from the web application, retrieving the license locally, or acquiring the license from a local network. 11. The method of claim 1, wherein the web application is employed to instruct the media stack to the play the media content after the web application is employed to get the license for the encrypted media content. 12. The method of claim 1, wherein employing the web application to get the license for the encrypted media content occurs after the media stack is instructed to play the media content. 13. The method of claim 1, further comprising: sending a request for a license request from the web application to the media stack;sending the request for the license request from the media stack to content decryption module;in response to the content decryption module receiving the request for the license request, sending a license request from the content decryption module to the media stack;sending the license request from the media stack to the web application, wherein employing the web application to get a license for encrypted media content is performed in response to the web application receiving the license request from the media stack. 14. The method of claim 1, wherein the web application includes at least one of a scripting language, HyperText Markup Language (HTML), or a mark-up language that is derived from HTML. 15. The method of claim 1, further comprising: sending the decrypted data from the content decryption module to the media stack; andemploying the media stack to render the decrypted data. 16. The method of claim 15, further comprising: employing the content decryption module to decode the encrypted data before sending the decrypted data to the media stack. 17. The method of claim 1, further comprising: employing the content decryption module to obtain a content key after the content decryption module receives the license, wherein the decrypting the encrypted data is accomplished employing the content key. 18. The method of claim 17, wherein obtaining the content protection key is accomplished by employing the content decryption module to: employ a secret key to decrypt the license to obtain the content key, wherein the content decryption module is further employed to protect the secret key and the content key. 19. A client device, comprising: a memory component for storing data; anda processing component that is configured to execute data that enables actions, including: employing a user agent of the client device to load a web application;employing the web application to get a license for encrypted media content;employing the web application to instruct a media stack of the user agent to play the encrypted media content;sending the license from the web application to the media stack;sending the license from the media stack to a content decryption module of the client device, wherein the media stack and the content decryption module are distinct binaries from each other;sending encrypted data from the media stack to the content decryption module, wherein the encrypted data includes at least a portion of the encrypted media content; andemploying the content decryption module to provide decrypted data by decrypting the encrypted data. 20. A manufacture, including a tangible processor-readable storage medium having processor-executable code encoded therein, which when executed by one or more processors, enables actions, comprising: employing a user agent of a client to load a web application;employing the web application to get a license for encrypted media content;employing the web application to instruct a media stack of the user agent to play the encrypted media content;sending the license from the web application to the media stack;sending the license from the media stack to a content decryption module of the client, wherein the media stack and the content decryption module are distinct binaries from each other;sending encrypted data from the media stack to the content decryption module, wherein the encrypted data includes at least a portion of the encrypted media content; andemploying the content decryption module to provide decrypted data by decrypting the encrypted data.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (104)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.