Detecting supported digital rights management configurations on a client device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-017/30
H04N-007/16
G06F-021/10
H04L-029/06
H04N-021/45
H04N-021/258
출원번호
US-0610632
(2012-09-11)
등록번호
US-9129092
(2015-09-08)
발명자
/ 주소
Dorwin, David Kimbal
Scherkus, Andrew Martin
출원인 / 주소
Google Inc.
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
5인용 특허 :
108
초록▼
A content protection query module (CPQM) dynamically queries content protection items supported on the client device. The CPQM automatically identifies content protection configurations, based on the results of the queries. Using a variety of business rules and policies, the CPQM may select a conten
A content protection query module (CPQM) dynamically queries content protection items supported on the client device. The CPQM automatically identifies content protection configurations, based on the results of the queries. Using a variety of business rules and policies, the CPQM may select a content protection configuration from the configurations for packaging and providing protected content to the client device. The CPQM may instruct the client device to expect the protected content in the selected configuration, thereby enabling the client device to configure itself, as appropriate, for such configuration. The client device may include a media player that selects based on the instructions which DRM module to employ, providing the DRM module with instructions regarding where to obtain decryption keys/licenses for the content, and even instructing the DRM module which decryption mechanism to employ to decrypt the received protected content.
대표청구항▼
1. A client device, comprising: a network interface card to receive content over a network;a non-transitory computer-readable storage medium storing executable computer program code; andone or more processors configured to execute the computer program code to perform steps, comprising: sending a req
1. A client device, comprising: a network interface card to receive content over a network;a non-transitory computer-readable storage medium storing executable computer program code; andone or more processors configured to execute the computer program code to perform steps, comprising: sending a request for access to protected content over the network;receiving, in response to the request, a content protection query module;executing the content protection query module within the client device to: generate a plurality of queries to the client device about content protection items supported on the client device;receive responses to the plurality of queries from the client device;apply a content protection policy to the responses to the plurality of queries, the content protection policy prioritizing a content protection configuration based on a digital rights management module, container format and decryption key system supported on the client device;select the content protection configuration based on the application of the content protection policy to the responses to the plurality of queries; andinstruct the client device to configure the client device to receive the protected content in the selected content protection configuration;receiving the protected content in the selected content protection configuration; andplaying the received protected content using the selected content protection configuration. 2. The client device of claim 1, wherein the content protection query module is further executable to: automatically generate a structure based on the received responses to the plurality of queries, the structure storing and managing the plurality of content protection items supported on the client device. 3. The client device of claim 1, wherein the plurality of queries comprises separate queries specifically requesting whether the client device supports a particular content protection item. 4. The client device of claim 1, wherein the plurality of queries comprises at least one query requesting the client device to provide information indicating each content protection configuration that the client device supports. 5. The client device of claim 4, wherein the content protection configuration comprises an indication of which digital rights management (DRM) modules are supported by the client device, and for each DRM module, which container format is supported, and which coders/decoders are supported. 6. A network device, comprising: one or more memory storage devices storing executable computer program code; andone or more processors configured to execute the computer program code to perform steps comprising: receiving a request from a client device for protected content;sending to the client device in response to the request, a content protection query module, wherein the content protection query module is adapted to execute on the client device to: generate a plurality of queries to the client device about content protection items supported on the client device;receive responses to the plurality of queries from the client device;apply a content protection policy to the responses to the plurality of queries, the content protection policy prioritizing a content protection configuration based on a digital rights management module, container format and decryption key system supported on the client device;select the content protection configuration based on the application of the content protection policy to the responses to the plurality of queries; andinstruct the client device to configure the client device to receive the protected content in the selected content protection configuration; andsending the protected content in the selected content protection configuration to the client device. 7. The network device of claim 6, wherein the plurality of queries comprises queries using a canPlayType( ) Application Programming Interface. 8. The network device of claim 6, wherein the plurality of queries comprises separate queries specifically requesting whether the client device supports a particular content protection item. 9. The network device of claim 6, wherein the plurality of queries comprises at least one query requesting the client device to provide information indicating each content protection configuration that the client device supports. 10. The network device of claim 6, wherein the selected content protection configuration is stored on the client device. 11. The network device of claim 6, wherein the content protection configuration comprises at least two of a digital rights management module, a container format, a coder/decoder and a decryption type. 12. A method, comprising: sending a request for access to protected content over a network;receiving, in response to the request, a content protection query module;executing the content protection query module within a client device to: generate a plurality of queries to the client device about content protection items supported on the client device;receive responses to the plurality of queries from the client device;apply a content protection policy to the responses to the plurality of queries, the content protection policy prioritizing a content protection configuration based on a digital rights management module, container format and decryption key system supported on the client device;select the content protection configuration based on the application of the content protection policy to the responses to the plurality of queries; andinstruct the client device to configure the client device to receive the protected content in the selected content protection configuration;receiving the protected content in the selected content protection configuration; andplaying the received protected content using the selected content protection configuration. 13. The method of claim 12, wherein the content protection query module is further executable to: automatically generate a structure based on the received responses to the plurality of queries, the structure storing and managing the plurality of content protection items supported on the client device. 14. The method of claim 12, wherein the plurality of queries comprises separate queries specifically requesting whether the client device supports a particular content protection item. 15. The method of claim 12, wherein the plurality of queries comprises at least one query requesting the client device to provide information indicating each content protection configuration that the client device supports. 16. The method of claim 15, wherein the content protection configuration comprises an indication of which digital rights management (DRM) modules are supported by the client device, and for each DRM module, which container format is supported, and which coders/decoders are supported. 17. The method of claim 12, wherein the selected content protection configuration indicates network bandwidth required to transfer the protected content. 18. The method of claim 12, wherein the content protection policy prioritizes a content protection configuration based on a container format that provides a lowest network bandwidth to transfer the protected content. 19. The method of claim 12, wherein the content protection policy prioritizes a content protection configuration based on a fastest decryption provided by a decryption key system supported on the client device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (108)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Koved, Lawrence; Mourad, Magda M.; Munson, Jonathan P.; Pacifici, Giovanni; Pistoia, Marco; Youssef, Alaa S., System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Keohane, Susann M.; McBrearty, Gerald F.; Mullen, Shawn P.; Murillo, Jessica C.; Shieh, Johnny M., Distributed digital rights-managed file transfer and access control.
Keohane, Susann M.; McBrearty, Gerald F.; Mullen, Shawn P.; Murillo, Jessica C.; Shieh, Johnny M., Distributed digital rights-managed file transfer and access control.
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.