Use of generic (browser) encryption API to do key exchange (for media files and player)
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-021/60
출원번호
US-0712764
(2012-12-12)
등록번호
US-8984285
(2015-03-17)
발명자
/ 주소
Dorwin, David Kimbal
Sleevi, Ryan David
Scherkus, Andrew Martin
출원인 / 주소
Google Inc.
대리인 / 주소
Byrne Poh LLP
인용정보
피인용 횟수 :
5인용 특허 :
103
초록▼
Embodiments are directed towards decrypting encrypted content. A key for decrypting the encrypted content may be provided to a web application executing within a browser. The application may employ a generic cryptography application program interface (GCAPI) to perform actions on the key, including,
Embodiments are directed towards decrypting encrypted content. A key for decrypting the encrypted content may be provided to a web application executing within a browser. The application may employ a generic cryptography application program interface (GCAPI) to perform actions on the key, including, storing the key, decrypting an encrypted key, generating another key, converting the key to a different encryption type, or the like. The GCAPI may or may not be enabled to explicitly share the key with the browser's media engine. In response to receiving encrypted content, the GCAPI may provide the key to the application, explicitly or inexplicitly to the browser's media engine, or the like. The key may be utilized by the application, the browser, the media element, browser's media engine, and/or the GCAPI to decrypt the encrypted content. The decrypted content may be displayed within the browser to a user of a client device.
대표청구항▼
1. A method for managing content with a computing device that is operative to perform actions, comprising: providing a key to an application that is separately operating on a user agent which is executing on the computing device;providing the key to at least one of the user agent and a generic crypt
1. A method for managing content with a computing device that is operative to perform actions, comprising: providing a key to an application that is separately operating on a user agent which is executing on the computing device;providing the key to at least one of the user agent and a generic cryptography application program interface (GCAPI) that is employed by the user agent, which includes: employing the GCAPI to generate another key based on the key;based on a media element, instructing the user agent to utilize a current key stored by the GCAPI, wherein the current key is the other key; andin response to a key request that is both based on the media element and from the user agent to the GCAPI, employing the GCAPI to provide the other key to the user agent;providing encrypted content based on the media element of a markup language that is operatively supported by the user agent;decrypting the encrypted content based on both the other key and the media element; anddisplaying the decrypted content with the user agent. 2. The method of claim 1, wherein employing the GCAPI to provide the other key to the user agent, further includes employing the GCAPI to provide a reference to the other key to the user agent. 3. The method of claim 1, wherein decrypting the encrypted content based on both the other key and the media element, further comprises: employing a media engine of the user agent to perform the decryption of the encrypted content. 4. The method of claim 1, further comprising: employing an encrypted media extension application program interface to access the other key stored by the GCAPI. 5. The method of claim 1, further comprising: enabling the application to provide the encrypted content to the GCAPI;employing the GCAPI to enable decryption of the encrypted content; andenabling the GCAPI to provide the decrypted content to the application. 6. The method of claim 1, further comprising: enabling the application to provide the encrypted content to the GCAPI, wherein the encrypted content includes a stream of content;employing the GCAPI to enable decryption of the encrypted content; andenabling the GCAPI to provide the decrypted content to the media element. 7. The method of claim 1, wherein providing the key to at least one of the user agent and the GCAPI, further comprises: based on the media element, instructing the GCAPI that the other key is associated with the media element; andin response to a key request both based on the media element and from the user agent, employing the GCAPI to determine if the media element is associated with the other key. 8. The method of claim 1, wherein providing the key to at least one of the user agent and the GCAPI, further includes: based on the media element, providing the user agent with a key ID associated with the encrypted content and the other key; andbased on the media element, employing the user agent to request the other key from the GCAPI based on the key ID. 9. The method of claim 1, wherein decrypting the encrypted content based on both the other key and the media element, further comprises: employing the application to perform the decryption of the encrypted content. 10. The method of claim 1, wherein the user agent is a browser application. 11. A computing device for managing content, comprising: a memory for storing data and instructions; anda processor that executes the instructions to enable actions, including: providing a key to an application that is separately operating on a user agent which is executing on the computing device;providing the key to at least one of the user agent and a generic cryptography application program interface (GCAPI) that is employed by the user agent, which includes: employing the GCAPI to generate another key based on the key;based on a media element, instructing the user agent to utilize a current key stored by the GCAPI, wherein the current key is the other key; andin response to a key request that is both based on the media element and from the user agent to the GCAPI, employing the GCAPI to provide the other key to the user agent;providing encrypted content based on the media element of a markup language that is operatively supported by the user agent;decrypting the encrypted content based on both the key and the media element; anddisplaying the decrypted content with the user agent. 12. The computing device of claim 11, wherein providing the key to at least one of the user agent and the GCAPI, further includes providing a reference to the other key to the user agent. 13. The computing device of claim 11, wherein decrypting the encrypted content based on both the other key and the media element, further comprises: employing a media engine of the user agent to perform the decryption of the encrypted content. 14. The computing device of claim 11, further comprising: employing an encrypted media extension application program interface to access the other-key stored by the GCAPI. 15. The computing device of claim 11, further comprising: enabling the application to provide the encrypted content to the GCAPI;employing the GCAPI to enable decryption of the encrypted content; andenabling the GCAPI to provide the decrypted content to the application. 16. The computing device of claim 11, wherein providing the key to at least one of the user agent and the GCAPI, further comprises: based on the media element, instructing the GCAPI that the other key is associated with the media element; andin response to a key request both based on the media element and from the user agent, employing the GCAPI to determine if the media element is associated with the other key. 17. The computing device of claim 11, wherein providing the key to at least one of the user agent and the GCAPI, further includes: based on the media element, providing the user agent with a key ID associated with the encrypted content and the other key; andbased on the media element, employing the user agent to request the other key from the GCAPI based on the key ID. 18. A system for managing content, comprising: a server device that is operative to provide the content over the network;a network device, including: a memory for storing data and instructions;a processor that is operative to execute the instructions that enable actions, including: providing a key to an application that is separately operating on a user agent which is executing on the network device;providing the key to at least one of the user agent and a generic cryptography application program interface (GCAPI) that is employed by the user agent, which includes: employing the GCAPI to generate another key based on the key; andbased on a media element, instructing the user agent to utilize a current key stored by the GCAPI, wherein the current key is the other key; andin response to a key request that is both based on the media element and from the user agent to the GCAPI, employing the GCAPI to provide the other key to the user agent;providing encrypted content based on the media element of a markup language that is operatively supported by the user agent;decrypting the encrypted content based on both the key and the media element; anddisplaying the decrypted content with the user agent. 19. The system of claim 18, wherein decrypting the encrypted content based on both the other key and the media element, further comprises: employing a media engine of the user agent to perform the decryption of the encrypted content. 20. The system of claim 18, further comprising: enabling the application to provide the encrypted content to the GCAPI;employing the GCAPI to enable decryption of the encrypted content; andenabling the GCAPI to provide the decrypted content to the application. 21. The system of claim 18, wherein providing the key to at least one of the user agent and the GCAPI, further comprises: based on the media element, instructing the GCAPI that the other key is associated with the media element; andin response to a key request both based on the media element and from the user agent, employing the GCAPI to determine if the media element is associated with the other key. 22. The system of claim 18, wherein providing the key to at least one of the user agent and the GCAPI, further includes: based on the media element, providing the user agent with a key ID associated with the encrypted content and the other key; andbased on the media element, employing the user agent to request the other key from the GCAPI based on the key ID.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (103)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
※ AI-Helper는 부적절한 답변을 할 수 있습니다.