Multimedia network system with content importation, content exportation, and integrated content management
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/10
G06F-017/30
H04N-021/218
H04N-021/254
H04N-021/258
H04N-021/2747
H04N-021/414
H04N-021/4227
H04N-021/4402
H04N-021/4408
H04N-021/4415
H04N-021/488
H04N-021/61
H04N-021/6334
H04N-021/6377
H04N-021/84
H04N-019/156
H04N-019/164
H04N-021/239
H04N-021/2662
H04N-021/6379
H04L-029/06
G06F-021/62
H04L-009/08
H04L-009/14
H04L-012/24
H04L-029/08
H04N-021/41
H04N-021/43
H04N-021/4363
H04W-084/12
H04N-021/2389
H04N-021/433
H04N-021/4367
H04N-021/472
H04N-021/63
H04W-004/00
H04N-021/2347
H04N-021/266
H04N-021/8352
H04N-019/70
H04W-088/02
출원번호
US-0887490
(2015-10-20)
등록번호
US-9600640
(2017-03-21)
발명자
/ 주소
Drope, Philip
출원인 / 주소
DIGITAL MEDIA TECHNOLOGIES, INC.
대리인 / 주소
McClure, Qualey & Rodack, LLP
인용정보
피인용 횟수 :
0인용 특허 :
41
초록▼
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determ
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determine the license status of content and update the license status of content which was previously provided by that provider. The external content can be accessed in real time or downloaded and stored within the system for later access at the convenience of the user. The usage of some content is controlled by the use of encryption and other protection methods. The system allows for storage of live video by storing the digitized video and allowing the user to control how, when and where the content is viewed. The system makes available multiple multimedia services to all users in the network or connected via the internet.
대표청구항▼
1. A system comprising: at least one computing device; andat least one application executable in the at least one computing device, the at least one computing device being configured by the at least one application to:receive an update from the at least one application, the at least one application
1. A system comprising: at least one computing device; andat least one application executable in the at least one computing device, the at least one computing device being configured by the at least one application to:receive an update from the at least one application, the at least one application comprising an old public key/private key pair including an old private key and an old public key;access old protected content via the old private key, the old protected content being previously protected via the old public key; andapply the update to provide an updated application,wherein, in response to application of the update results, the at least one computing device is further configured to:retain the old private key to access the old protected content;generate a new public key/private key pair locally at the at least one computing device to access a new protected content, the new public key/private key pair including a new public key and a new private key;access the new protected content protected by the new public key and the updated application;employ the new public key to provide the new protected content;employ the new private key to access the new protected content;remove the old public key in the old public key/private key pair from local storage at the at least one computing device; andin an event that one or more retained old private keys are unused, remove from the local storage at the at least one computing device the one or more retained old private keys that are unused;wherein generating the new public key/private key pair includes altering one or more cryptographic algorithms using device-specific information unique to the at least one computing device; andwherein altering the one or more cryptographic algorithms includes setting an initialization vector of at least one of the cryptographic algorithms using the device-specific information. 2. The system of claim 1, wherein the at least one computing device is further configured by the updated application to: submit a request for content to a content provider, the request including the new public key;receive the content that is requested from the content provider, the content that is requested being protected via the new public key; andaccess the content using the new private key. 3. The system of claim 2, wherein the content is at least one of an audio file or a video file. 4. The system of claim 1, wherein the at least one computing device is further configured by the application to encrypt the new private key with a symmetric key included in the update to create an encrypted private key. 5. The system of claim 4, wherein the at least one computing device is further configured by the application to: store the encrypted private key within a key file located at the at least one computing device; andaccess the new private key by decrypting the encrypted private key using the symmetric key. 6. The system of claim 4, wherein the at least one computing device is further configured by the application to remove one or more old private keys that are unused and one or more symmetric keys to access the one or more old private keys that are unused. 7. The system of claim 4, wherein the update includes an old symmetric key and the key file includes the old private key in an encrypted form that can be decrypted with the old symmetric key. 8. The system of claim 4, wherein the at least one computing device is further configured by the application to retain an old symmetric key and the key file includes the old private key in an encrypted form that can be decrypted with the old symmetric key. 9. The system of claim 1, wherein an original installation of the application has an associated symmetric key and at least one sub-version associated with a plurality of other symmetric keys; wherein a particular sub-version of the at least one sub-version is selected based at least in part on device-specific information associated with the at least one computing device;wherein the update is one of a plurality of updates, each of the plurality of updates being associated with the at least one sub-version of the original installation of the application; andwherein the update and the symmetric key are associated with the particular sub-version. 10. The system of claim 1, wherein the new public key/private key pair is created via a key seed, the key seed altering one or more cryptographic algorithms. 11. The system of claim 10, wherein the key seed is included as part of the update. 12. The system of claim 1, wherein device-specific information includes one or more of: a serial number associated with one or more hardware components of the at least one computing device, a hardware identifier associated with the one or more hardware components of the at least one computing device, a media-access-control (MAC) address associated with a network adapter of the at least one computing device, or a globally-unique-identifier (GUID) associated with the at least one computing device. 13. The system of claim 1, wherein the at least one computing device is further configured by the application to: decrypt old protected content using the old private key; andre-encrypt old protected content using the new public key. 14. The system of claim 13, wherein the at least one computing device is further configured by the application to designate the re-encrypted old protected content using the new public key as new protected content. 15. The system of claim 1, wherein the at least one computing device comprises at least one of: a digital video recorder, a satellite television receiver, a cable television receiver, a television, a game console box, a computer, a content storage device, a radio receiver, a smartphone, a digital versatile disc player, and a digital media player. 16. A computer-implemented method comprising: receiving, via a computing device, an update from at least one application, the at least one application comprising an old public key/private key pair including an old private key and an old public key;accessing, via the computing device, old protected content via the old private key, the old protected content being previously protected via the old public key;applying, via the computing device, the update to provide an updated application;retaining, via the computing device, the old private key to access the old protected content;generating, via the computing device, a new public key/private key pair locally at the at least one computing device to access a new protected content, the new public key/private key pair including a new public key and a new private key;accessing, via the computing device, the new protected content protected by the new public key an the updated application;employing, via the computing device, the new public key to provide the new protected content;employing, via the computing device, the new private key to access the new protected content;removing, via the computing device, the old public key in the old public key/private key pair from local storage at the computing device; andin an event that one or more retained old private keys are unused, removing, via the computing device, from the local storage at the computing device the one or more retained old private keys that are unused;wherein generating the new public key/private key pair includes altering one or more cryptographic algorithms using device-specific information unique to the computing device; andwherein altering the one or more cryptographic algorithms includes setting an initialization vector of at least one of the cryptographic algorithms using the device-specific information. 17. The method of claim 16, further comprising: submitting, via the computing device, a request for content to a content provider, the request including the new public key;receiving, via the computing device, the requested content from the content provider, the requested content protected using the new public key; andaccessing, via the computing device, the requested content using the new private key. 18. The method of claim 17, wherein the content is an audio or video file. 19. The method of claim 16, further comprising: encrypting, via the computing device, the new private key with a symmetric key included in the update to create an encrypted private key. 20. The method of claim 19, further comprising: storing, via the computing device, the encrypted private key within a key file located at the at least one computing device; andaccessing, via the computing device, the new private key by decrypting the encrypted private key using the symmetric key. 21. The method of claim 19, further comprising removing, via the computing device, one or more old private keys that are unused and one or more symmetric keys to access the one or more old private keys that are unused. 22. The method of claim 19, wherein the update includes an old symmetric key and the key file includes the old private key in an encrypted form that can be decrypted with the old symmetric key. 23. The method of claim 19, further comprising retaining, via the computing device, an old symmetric key and the key file includes the old private key in an encrypted form that can be decrypted with the old symmetric key. 24. The method of claim 16, wherein an original installation of the application has an associated symmetric key and at least one sub-version associated with a plurality of other symmetric keys; wherein a particular sub-version of the at least one sub-version is selected based at least in part on device-specific information associated with the computing device;wherein the update is one of a plurality of updates, each of the plurality of updates being associated with the at least one sub-version of the original installation of the application; andwherein the update and the symmetric key are associated with the particular sub-version. 25. The method of claim 16, wherein the new public key/private key pair is created via a key seed, the key seed altering one or more cryptographic algorithms. 26. The method of claim 25, wherein the key seed is included as part of the update. 27. The method of claim 16, wherein device-specific information includes one or more of: a serial number associated with one or more hardware components of the computing device, a hardware identifier associated with the one or more hardware components of the computing device, a media-access-control (MAC) address associated with a network adapter of the computing device, or a globally-unique-identifier (GUID) associated with the computing device. 28. The method of claim 16, further comprising: decrypting, via the computing device, old protected content using the old private key; andre-encrypting, via the computing device, old protected content using the new public key. 29. The method of claim 28, further comprising designating, via the computing device, the re-encrypted old protected content using the new public key as new protected content. 30. The method of claim 16, wherein the computing device comprises at least one of: a digital video recorder, a satellite television receiver, a cable television receiver, a television, a game console box, a computer, a content storage device, a radio receiver, a smartphone, a digital versatile disc player, and a digital media player.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (41)
Zhang,Qian; Zhu,Wenwu; Zhang,Ya Qin; Yang,Fan, Architecture and related methods for streaming media content through heterogeneous networks.
Moriai,Shinsuke, Data terminal device capable of continuing to download encrypted content data and a license or reproduce encrypted content data with its casing in the form of a shell closed.
Dinh, Hung T.; Lakhdhir, Mansoor A.; Pham, Phong A., Distributing group of images associated with web page via number of data connections less than number of images in group.
Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
Jellinek,Herbert D.; Rudy,Stephen M., Performing server actions using template with field that can be completed without obtaining information from a user.
Alexander ; Jr. Cedell Adam ; Smith Timothy James ; Verrilli Colin Beaton ; Yedavalli Rama Mohan, Redundancy mechanisms for classical internet protocol over asynchronous transfer mode networks.
Revital, Dan; Epstein, Steve; Tsuria, Yossi; Zucker, Arnold; Simkin, Steven, Secure digital content delivery system and method over a broadcast network.
Sull, Sanghoon; Kim, Hyeokman; Chung, Min Gyo; Yoon, Ja Cheon; Choi, Hyungseok, System and method for indexing, searching, identifying, and editing portions of electronic multimedia files.
Morino, Harumi; Okayama, Masataka; Tanaka, Akira, System for managing license for protecting content, server for issuing license for protecting content, and terminal for using content protected by license.
Lennon,Alison Joan; Anderson,Michael Peter; Wan,Ernest Yiu Cheong; Yap,Sue Ken, Transferring a media browsing session from one device to a second device by transferring a session identifier and a session key to the second device.
Cohen Solal,Eric, User attention-based adaptation of quality level to improve the management of real-time multi-media content delivery and distribution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.