Method, manufacture, and apparatus for content protection for HTML media elements
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-021/62
G06F-021/10
출원번호
US-0532745
(2012-06-25)
등록번호
US-9183405
(2015-11-10)
발명자
/ 주소
Dorwin, David Kimbal
Scherkus, Andrew
Lacey, Stephen John
Kaiser, Christian
출원인 / 주소
Google Inc.
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
1인용 특허 :
108
초록▼
A method, apparatus, and manufacture for content protection for HTML media elements is provided. A client media player is employed to determine whether media content is protected. The client media player includes an application, and further includes a media engine that is a distinct program from the
A method, apparatus, and manufacture for content protection for HTML media elements is provided. A client media player is employed to determine whether media content is protected. The client media player includes an application, and further includes a media engine that is a distinct program from the application. Upon determining that the media content is protected, the application is employed to get a key and/or a license for the protected media content. The application is employed to instruct the media engine to play the media content. The key and/or the license is sent from the application to the media engine.
대표청구항▼
1. A method, comprising: employing, using a computer, a client media player to determine whether media content is protected, wherein the client media player includes a browser, an application loaded by the browser, and a media engine that is a distinct program from the application;employing, using t
1. A method, comprising: employing, using a computer, a client media player to determine whether media content is protected, wherein the client media player includes a browser, an application loaded by the browser, and a media engine that is a distinct program from the application;employing, using the computer, the application to instruct the media engine to play the media content;employing, using the computer, the media engine to determine whether the media content is protected after the media engine is instructed to play the media content;upon the media engine determining that the media content is protected, employing, using the computer, the media engine to fire an event to the application indicating that the media content is protected, wherein the event fired to the application includes supplemental data specific to protection of the media content, the supplemental data opaque to the application and understood by a network service;upon the media engine firing the event to the application indicating that the media content is protected, employing, using the computer, the application to use the supplemental data with the network service to get a key and/or a license for the protected media content in response to receiving the event from the media engine; andsending, using the computer, the key and/or the license from the application to the media engine. 2. The method of claim 1, wherein employing the application to get the key and/or the license for the protected media content comprises employing the application to get the key and/or the license from a server, or from a local network. 3. The method of claim 1, wherein employing the application to get the key and/or the license for the protected media content includes acquiring the key and/or the license from a server via a digital right management system. 4. The method of claim 1, wherein the media content is at least one of streaming content, content downloaded to the client, content provided by the application, or locally stored content. 5. The method of claim 1, wherein determining whether the media content is protected includes at least one of determining whether the media content is encrypted or determining whether the media content is protected by a license. 6. The method of claim 1, wherein employing the application to get the key and/or the license further includes performing error handling for the process of getting the key and/or the license. 7. The method of claim 1, further comprising: employing the application to instruct the media engine to the play the media content after the application is employed to get the key and/or the license for the protected media content. 8. The method of claim 1, the method further comprising: after the key and/or the license is sent from the application to the media engine, employing the media engine to decode and decrypt the media content. 9. The method of claim 8, wherein the media engine employs at least one content decryption module to decrypt the media content. 10. The method of claim 1, wherein the application is a web application running in a client browser, wherein the web application includes HyperText Markup Language (HTML) and/or a scripting language, and wherein the media engine is a media stack that is part of the client browser. 11. The method of claim 10, wherein the scripting language is JavaScript. 12. The method of claim 10, wherein the media content is accessed via an HTML media element. 13. The method of claim 12, further comprising parsing the web application;if the web application includes an autoplay attribute for the HTML media element, employing the client browser to cause the media stack to play the media content; elseinstructing the media engine to play the media content in a time and manner that is in accordance with web application. 14. The method of claim 12, wherein the HTML media element is at marked by at least one of a tag, an tag, or a tag. 15. A client device, comprising: a memory component for storing processor-executable code; anda processing component that is arranged to execute the processor-executable code to perform actions including: employing a client media player to determine whether media content is protected, wherein the client media player includes a browser, an application loaded by the browser, and a media engine that is a distinct program from the application;employing the application to instruct the media engine to play the media content;employing the media engine to determine whether the media content is protected after the media engine is instructed to play the media content;upon the media engine determining that the media content is protected, employing the media engine to fire an event to the application indicating that the media content is protected, wherein the event fired to the application includes supplemental data specific to protection of the media content, the supplemental data opaque to the application and understood by a network service;upon the media engine firing the event to the application indicating that the media content is protected, employing the application to use the supplemental data with the network service to get a key and/or a license for the protected media content in response to receiving the event from the media engine;andsending the key and/or the license from the application to the media engine. 16. The client device of claim 15, wherein the actions further comprise employing the application to get the key and/or the license for the protected media content from a server from a local network. 17. The client device of claim 15, wherein the actions further comprise employing the application to instruct the media engine to play the media content after the application is employed to get the key and/or the license for the protected media content. 18. A manufacture, including a non-transitory processor-readable storage medium having processor-executable code encoded therein, which when executed by one or more processors causes the one or more processors to perform actions comprising: employing a client media player, wherein the client media player includes a browser, an application loaded by the browser, and a media engine that is a distinct program from the application;employing the application to instruct the media engine to play the media content;employing the media engine to determine whether the media content is protected after the media engine is instructed to play the media content;upon the media engine determining that the media content is protected, employing the media engine to fire an event to the application indicating that the media content is protected, wherein the event fired to the application includes supplemental data specific to protection of the media content, the supplemental data opaque to the application and understood by a network service;upon the media engine firing the event to the application indicating that the media content is protected, employing the application to use the supplemental data with the network service to get a key and/or a license for the protected media content in response to receiving the event from the media engine; andsending the key and/or the license from the application to the media engine. 19. The manufacture of claim 18, the actions further comprising employing the application to get the key and/or the license for the protected media content from a server or from a local network. 20. The manufacture of claim 18, wherein the application is a web application running in a client browser, wherein the web application includes HyperText Markup Language (HTML) and/or a scripting language, and wherein the media engine is a media stack that is part of the client browser. 21. The manufacture of claim 18, wherein the media content is protected using a key rotation scheme and the media engine fires the event to the application a plurality of times during playing of the media content. 22. The manufacture of claim 18, wherein the media engine is part of the browser.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (108)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Koved, Lawrence; Mourad, Magda M.; Munson, Jonathan P.; Pacifici, Giovanni; Pistoia, Marco; Youssef, Alaa S., System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.