Method, manufacture, and apparatus for protection of media objects from the web application environment
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/00
G06F-017/22
H04L-029/06
출원번호
US-0708573
(2012-12-07)
등록번호
US-9697185
(2017-07-04)
발명자
/ 주소
Dorwin, David Kimbal
Scherkus, Andrew Martin
출원인 / 주소
Google Inc.
대리인 / 주소
McDermott Will & Emery LLP
인용정보
피인용 횟수 :
0인용 특허 :
138
초록▼
A method, apparatus, and manufacture for content protection for protecting some objects is provided. A content protection operation or license operation is performed for at least one media object of a web application. Some or all of the objects are then marked as protected. When an operation is perf
A method, apparatus, and manufacture for content protection for protecting some objects is provided. A content protection operation or license operation is performed for at least one media object of a web application. Some or all of the objects are then marked as protected. When an operation is performed that accesses a protected object, a user agent determines whether to deny the operation, to allow the operation and mark data exported by the operation and objects storing the exported data as protected objects, or to allow the operation and not mark data exported by the operation and objects storing the exported data as protected objects.
대표청구항▼
1. A method, comprising: receiving, by a user agent, a web application comprising a document object model (DOM);performing, at the user agent, an operation for at least one media object of the web application, wherein the operation is at least one of a content protection operation or a license opera
1. A method, comprising: receiving, by a user agent, a web application comprising a document object model (DOM);performing, at the user agent, an operation for at least one media object of the web application, wherein the operation is at least one of a content protection operation or a license operation, and wherein the at least one media object includes at least one of a hypertext markup language (HTML) video element, an HTML audio element, or an HTML media element;marking, based on the operation at the user agent, at least a portion of a plurality of objects within the DOM as protected objects; andwhen another operation performed by the web application, based on an HTML canvas element of the web application, initiates access to a protected object of the DOM, employing the user agent to make a determination as to whether to deny said another operation, to allow said another operation and mark data exported by said another operation and objects storing data exported by said another operation as protected objects, or to allow said another operation and not mark data exported by said another operation and objects storing data exported by said another operation as protected objects. 2. The method of claim 1, wherein marking the at least the portion of the plurality of objects as protected objects is accomplished by setting a Boolean flag for each object that is marked as a protected object. 3. The method of claim 1, wherein marking at least the portion of the plurality of objects as protected objects includes marking each of the plurality of objects. 4. The method of claim 1, wherein marking at least the portion of the plurality of objects as protected objects includes marking each of media elements, video elements, and audio elements in the plurality of objects. 5. The method of claim 1, wherein marking at least the portion of the plurality of objects as protected objects includes marking one or more of media elements, video elements, and audio elements in the plurality of objects. 6. The method of claim 1, further comprising tracking the protected objects and tracking code that acts on objects in the plurality of objects. 7. The method of claim 1, further comprising detecting code that is capable of accessing the protected objects. 8. The method of claim 1, wherein making the determination as to whether to enable protection is based, at least in part, on whether at least one of a browser add-on or a browser extension is present. 9. The method of claim 1, wherein making the determination as to whether to enable protection is based, at least in part, on a determination as to whether potentially adversarial behavior, scripts, or elements are present in the plurality of objects. 10. The method of claim 1, wherein making the determination as to whether to enable protection is based, at least in part, on whether the plurality of objects originate from more than one origin. 11. The method of claim 1, further comprising: identifying, by the user agent, a reference to media content;determining the identified media content is encrypted; andmarking the at least the portion of the plurality of objects within the DOM in response to determining that the identified media content is encrypted. 12. The method of claim 1, wherein the plurality of objects comprises the at least one media object. 13. The method of claim 1, wherein the at least one media element is an HTML5 element. 14. A client device, comprising: a hardware memory storing instructions; anda hardware processing component arranged to execute the instructions to enable actions, including: receiving, by a user agent, a web application comprising a document object model (DOM);performing, at the user agent, an operation for at least one media object of the web application, wherein the operation is at least one of a content protection operation or a license operation, and wherein the at least one media object includes at least one of a hypertext markup language (HTML) video element, an HTML audio element, or an HTML media element;marking, based on the operation at the user agent, at least a portion of a plurality of objects within the DOM as protected objects; andwhen another operation performed by the web application, based on an HTML canvas element of the web application, initiates access to a protected object of the DOM, employing the user agent of the client device to make a determination as to whether to deny said another operation, to allow said another operation and mark data exported by said another operation and objects storing data exported by said another operation as protected objects, or to allow said another operation and not mark data exported by said another operation and objects storing data exported by said another operation as protected objects. 15. The client device of claim 14, wherein the actions further include: identifying, by the user agent, a reference to media content;determining the identified media content is encrypted; andmarking the at least the portion of the plurality of objects within the DOM in response to determining that the identified media content is encrypted. 16. The client device of claim 14, wherein the plurality of objects comprises the at least one media object. 17. A non-transitory computer readable storage media having processor-executable code encoded therein, which when executed by one or more processors, enables actions, comprising: receiving, by a user agent, a web application comprising a document object model (DOM);performing, at the user agent, an operation for at least one media object of the web application, wherein the operation is at least one of a content protection operation or a license operation, and wherein the at least one media object includes at least one of a hypertext markup language (HTML) video element, an HTML audio element, or an HTML media element;marking, based on the operation at the user agent, at least a portion of a plurality of objects within the DOM as protected objects; andwhen another operation performed by the web application, based on an HTML canvas element of the web application, initiates access to a protected object of the DOM, employing the user agent to make a determination as to whether to deny said another operation, to allow said another operation and mark data exported by said another operation and objects storing data exported by said another operation as protected objects, or to allow said another operation and not mark data exported by said another operation and objects storing data exported by said another operation as protected objects. 18. The non-transitory computer readable storage media of claim 17, wherein the actions further comprise: identifying, by the user agent, a reference to media content;determining the identified media content is encrypted; andmarking the at least the portion of the plurality of objects within the DOM in response to determining that the identified media content is encrypted. 19. The non-transitory computer readable storage media of claim 17, wherein the plurality of objects comprises the at least one media object. 20. The non-transitory computer readable storage media of claim 17, wherein the at least one media element is an HTML5 element.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (138)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Spies Terrence R. (Redmond WA) Spelman Jeffrey F. (Duvall WA) Simon Daniel R. (Redmond WA), Cryptography system and method for providing cryptographic services for a computer application.
Spies, Terrence R.; Spelman, Jeffrey F.; Simon, Daniel R., Cryptography system and method for providing cryptographic services for a computer application.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
Chawla, Jitendra; Knight, David; Wong, Edward; Kumar, Manish; Farshchi, Shawn; Montoya, Eric, Methods and apparatuses for monitoring attention of a user during a conference.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Koved, Lawrence; Mourad, Magda M.; Munson, Jonathan P.; Pacifici, Giovanni; Pistoia, Marco; Youssef, Alaa S., System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
※ AI-Helper는 부적절한 답변을 할 수 있습니다.