Application-driven playback of offline encrypted content with unaware DRM module
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-012/14
G06F-011/30
출원번호
US-0586664
(2012-08-15)
등록번호
US-9110902
(2015-08-18)
발명자
/ 주소
Dorwin, David Kimbal
출원인 / 주소
Google Inc.
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
3인용 특허 :
108
초록▼
Application-driven interceptor module enables offline playback of Digital Rights Management (DRM) protected content to work in a same way as online playback. Communications with the DRM module are intercepted by the application-driven interceptor that is aware of the client device's network connecti
Application-driven interceptor module enables offline playback of Digital Rights Management (DRM) protected content to work in a same way as online playback. Communications with the DRM module are intercepted by the application-driven interceptor that is aware of the client device's network connection status. When the interceptor application determines that the client device is offline, requests for the protected content, and license/key to the protected content may then be managed by the interceptor application. In one embodiment, the interceptor application may retrieve requests for the key/license from a locally protected data store, and provide the key/license to the DRM module. In this manner, the DRM module may be unaware that its messages are being intercepted, and may then operate the same, unaware of whether or not the client device is online or offline.
대표청구항▼
1. A client device, comprising: a network interface to receive content over a network; andone or more processors that perform actions, including: installing onto the client device an interceptor application that is arranged to perform actions, including: monitoring whether the client device is offli
1. A client device, comprising: a network interface to receive content over a network; andone or more processors that perform actions, including: installing onto the client device an interceptor application that is arranged to perform actions, including: monitoring whether the client device is offline or online with respect to network communications with a remote key management device (KMD) that manages content decryption keys and licenses, wherein the client device is offline with the KMD if communications between the client device and the KMD are unable to occur and the client device is online with the KMD if communications between the client device and the KMD are able to occur;when it is determined that the client device is online with the KMD: obtaining a content decryption key or license for protected content from the KMD;selectively providing the content decryption key or license obtained from the KMD to a digital rights management (DRM) module on the client device, such that the DRM module uses the content decryption key or license to decrypt at least a portion of the protected content for play by the client device;securely storing in a local store of the client device the content decryption key or license; andwhen it is determined that the client device is offline to the KMD: intercepting, by the interceptor application, a request for the content decryption key or license from the DRM module to the KMD, the DRM module being unaware whether the client device is offline or online; andselectively providing the stored content decryption key or license to the DRM module from the local store, such that the DRM module uses the content decryption key or license to decrypt at least a portion of the protected content for play by the client device. 2. The client device of claim 1, wherein selectively providing the stored decryption key or license further comprises: determining an integrity of the client device;when it is determined that the integrity of the client device is compromised, inhibiting access to the decryption key or license, such that the DRM module is inhibited from decrypting the portion of protected content; andwhen it is determined that the integrity of the client device is uncompromised, providing access to the decryption key or license to the DRM module responsive to the intercepted request. 3. The client device of claim 1, wherein the interceptor application is arranged to intercept messages and other communications from the DRM module when the client device is offline or online, the DRM module being unaware of whether the messages and other communications are intercepted. 4. The client device of claim 1, wherein interceptor application initiates obtaining the decryption key or license for protected content from the KMD absent a request for the decryption key or license being received from the DRM module, a browser, or a media player. 5. The client device of claim 1, wherein the client device is configured to access the protected content online from a content provider device while the client device is offline to the KMD. 6. The client device of claim 1, wherein the interceptor application is further arranged to perform actions, including: when the client device is online to a content provider, obtaining the protected content over a network; andwhen the client device is offline to the content provider, obtaining the protected content from the local store on the client device. 7. A system, comprising: one or more memory storage devices that store executable components, protected content, and one or more decryption keys or licenses that enable use of the protected content; andone or more processors that execute the stored executable components, the executable components including: a digital rights management (DRM) module that is configured to operate to perform actions, including: sending a request for a content decryption key or license to a remote key management device (KMD) that manages content decryption keys and licenses;receiving the content decryption key or license in response to the request; andemploying the content decryption key or license to decrypt and provide access to the protected content; andan interceptor application configured to intercept messages from the DRM module to the KMD and to provide responses to the messages to the DRM module such that the DRM module is unaware whether the system is offline or online with the KMD, wherein the system is offline with the KMD if communications between the system and the KMD are unable to occur and the system is online with the KMD if communications between the system and the KMD are able to occur, the application further configured to operate to perform actions, including: when it is determined that the system is online with the KMD: intercepting a content decryption key or license for protected content received from the KMD;selectively providing the content decryption key or license received from the KMD to the DRM module, such that the DRM module uses the content decryption key or license to decrypt at least a portion of the protected content for play by the system;securely storing in the system the intercepted decryption key or license; andwhen it is determined that the client device is offline to the KMD: intercepting the request for the content decryption key or license from the DRM to the KMD module, andselectively providing the securely stored content decryption key or license to the DRM module. 8. The system of claim 7, wherein selectively providing the securely stored content decryption key or license further comprises: determining an integrity of the client device;when it is determined that the integrity of the client device is compromised, inhibiting access to the decryption key or license, such that the DRM module is blocked from decrypting the portion of protected content; andwhen it is determined that the integrity of the client device is uncompromised, providing access to the decryption key or license to the DRM module responsive to the intercepted request. 9. The system of claim 7, wherein interceptor application employs a private key to securely store the decryption key or license locally on the system. 10. The system of claim 7, wherein the interceptor application is further arranged to perform actions, including: when the system is online to a content provider, obtaining the protected content over a network; andwhen the system is offline to the content provider, obtaining the protected content from a local store on the system. 11. The system of claim 7, wherein the interceptor application is downloaded from a remote computing device and installed for execution on the system. 12. The system of claim 7, wherein access to the protected content and decryption key or license enables a reduced time to a first frame for playing of the protected content. 13. The system of claim 7, wherein the system is configured to access the protected content online from a content provider device while the system is offline to the KMD. 14. An apparatus comprising a non-transitory computer readable medium, having computer-executable instructions stored thereon, that in response to execution by a client device, cause the client device to perform operations, comprising: installing onto the client device an interceptor application that is arranged to perform actions, including: monitoring whether the client device is offline or online with respect to network communications with a remote key management device (KMD) that manages content decryption keys and licenses, wherein the client device is offline with the KMD if communications between the client device and the KMD are unable to occur and the client device is online with the KMD if communications between the client device and the KMD are able to occur;when it is determined that the client device is online with the KMD: intercepting a content decryption key or license for protected content from the KMD;selectively providing the content decryption key or license intercepted from the KMD to a digital rights management (DRM) module on the client device, such that the DRM module uses the content decryption key or license to decrypt at least a portion of the protected content for play by the client device;securely storing in a local store of the client device the intercepted content decryption key or license; andwhen it is determined that the client device is offline to the KMD: intercepting, by the interceptor application, a request for the content decryption key or license from the DRM module to the KMD, the DRM module being unaware whether the client device is offline or online; andselectively providing the stored content decryption key or license to the DRM module from the local store, such that the DRM module uses the content decryption key or license to decrypt at least a portion of the protected content for play by the client device. 15. The apparatus of claim 14, wherein the interceptor application is further arranged to perform actions, including: when the client device is online to a content provider, obtaining the protected content over a network; andwhen the client device is offline to the content provider, obtaining the protected content from the local store on the client device. 16. The apparatus of claim 14, wherein interceptor application employs a private key to securely store the decryption key or license locally on the client device. 17. The apparatus of claim 14, wherein selectively providing the stored decryption key or license further comprises: determining an integrity of the client device;when it is determined that the integrity of the client device is compromised, inhibiting access to the decryption key or license, such that the DRM module is inhibited from decrypting the portion of protected content; andwhen it is determined that the integrity of the client device is uncompromised, providing access to the decryption key or license to the DRM module responsive to the intercepted request. 18. The apparatus of claim 14, wherein the client device is configured to access the protected content online from a content provider device while the client device is offline to the KMD. 19. The apparatus of claim 14, wherein access to the protected content and decryption key or license enables a reduced time to a first frame for playing of the protected content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (108)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Koved, Lawrence; Mourad, Magda M.; Munson, Jonathan P.; Pacifici, Giovanni; Pistoia, Marco; Youssef, Alaa S., System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Smith, Ned M.; Heldt-Sheller, Nathan; Michelis, Pablo A.; Zimmer, Vincent J.; Wood, Matthew D.; Beckwith, Richard T.; Rothman, Michael A., Content protection for data as a service (DaaS).
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.