Reducing time to first encrypted frame in a content stream
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/60
H04W-012/08
출원번호
US-0654271
(2012-10-17)
등록번호
US-9697363
(2017-07-04)
발명자
/ 주소
Dorwin, David Kimbal
출원인 / 주소
Google Inc.
대리인 / 주소
Byrne Poh LLP
인용정보
피인용 횟수 :
3인용 특허 :
107
초록▼
Techniques are described for reducing time to decrypt a next encrypted frame in a content stream by optimizing a license/key acquisition process. When requesting content, a key identifier and/or license identifier may be included within a webpage using a link, script, or similar access point. When a
Techniques are described for reducing time to decrypt a next encrypted frame in a content stream by optimizing a license/key acquisition process. When requesting content, a key identifier and/or license identifier may be included within a webpage using a link, script, or similar access point. When a client device sends a request for content, the loading of the webpage within the client device includes the embedded key identifier. Access to the key/license identifier at the client device then may initiate a key/license acquisition process by the client device. The key/license may be obtained from a key management device in parallel with, or prior to, downloading of at least a portion of the content stream.
대표청구항▼
1. A client device, comprising: a network interface coupled to a network; andone or more processors coupled to the network interface that perform actions, including: sending a request for a webpage that can be used to access a plurality of different content items from the client device to a first ne
1. A client device, comprising: a network interface coupled to a network; andone or more processors coupled to the network interface that perform actions, including: sending a request for a webpage that can be used to access a plurality of different content items from the client device to a first network device, wherein each of the plurality of different content items includes a plurality of encrypted frames, and wherein, for each of the plurality of different content items, one encrypted frame of the content item is presented before all other encrypted frames of the content item;receiving a webpage load at the client device from the first network device, wherein the webpage load includes a plurality of key identifiers each associated with a different one of the plurality of different content items and a plurality of links and/or mechanisms that can each be used to access a different one of the plurality of different content items;receiving a user selection of one of the plurality of links and/or mechanisms, wherein the user selection corresponds to a selected content item from the plurality of different content items;in response to receiving the user selection, requesting the one encrypted frame of the selected content item;prior to receiving the user selection, and prior to receiving the one encrypted frame of the selected content item at the client device, using one of the plurality of key identifiers to request access to a key from a second network device;prior to or concurrent with receiving the one encrypted frame, receiving the key from the second network device; andemploying the key to decrypt the one encrypted frame. 2. The client device of claim 1, wherein the one or more processors perform actions, further including: receiving within the webpage load and prior to or concurrent with receiving an other encrypted frame of the one of the plurality of different content items an other key associated with the other encrypted frame; andemploying the other key to decrypt the other encrypted frame. 3. The client device of claim 1, further comprising a memory device, wherein the client device pre-loads into the memory device and pre-initializes at least a decryption module usable to decrypt the one encrypted frame, wherein the decryption module is loaded prior to or concurrent with receiving of the key. 4. The client device of claim 1, wherein multiple key identifiers are provided to the client device, the multiple key identifiers useable in a key rotation scheme implemented for protecting the one of the plurality of different content items. 5. The client device of claim 1, wherein the one of the plurality of key identifiers is received within the webpage load using a script, or markup language. 6. A computer-based method operating on a client device, comprising: sending a request for a webpage that can be used to access a plurality of different content items from the client device to a first network device, wherein each of the plurality of different content items includes a plurality of encrypted frames, and wherein, for each of the plurality of different content items, one encrypted frame of the content item is presented before all other encrypted frames of the content item;receiving a webpage load at the client device from the first network device, wherein the webpage load includes a plurality of key identifiers each associated with a different one of the plurality of different content items and a plurality of links and/or mechanisms that can each be used to access a different one of the plurality of different content items;receiving a user selection of one of the plurality of links and/or mechanisms, wherein the user selection corresponds to a selected content item from the plurality of different content items;in response to receiving the user selection, requesting the one encrypted frame of the selected content item;prior to receiving the user selection, and prior to receiving the one encrypted frame of the selected content item at the client device, using one of the plurality of key identifiers to request access to a key from a second network device;prior to or concurrent with receiving the one encrypted frame, receiving the key from the second network device; andemploying the key to decrypt the one encrypted frame. 7. The computer-based method of claim 6, wherein the one of the plurality of key identifiers is embedded within a uniform resource locator (URL) useable to identify the one of the plurality of different content items. 8. The computer-based method of claim 6, wherein the one of the plurality of key identifiers is received within the webpage load using a script. 9. The computer-based method of claim 6, wherein multiple key identifiers are provided to the client device, the multiple key identifiers useable in a key rotation scheme implemented for protecting the one of the plurality of different content items. 10. The computer-based method of claim 6, wherein the client device pre-loads into a memory device at least a decryption module usable to decrypt the one encrypted frame, wherein the decryption module is loaded prior to or concurrent with receiving of the key. 11. The computer-based method of claim 6, wherein the second network device is a key management device. 12. A network device, comprising: a memory device for storing key identifiers associated with content; andone or more processors coupled to the memory device that perform actions, including: receiving a request for a webpage that can be used to access a plurality of different content items from a client device, wherein each of the plurality of different content items includes a plurality of encrypted frames, and wherein, for each of the plurality of different content items, one encrypted frame of the content item is presented before all other encrypted frames of the content item;sending a webpage load to the client device, wherein the webpage load includes a plurality of key identifiers each associated with a different one of the plurality of different content items and a plurality of links and/or mechanisms that can each be used to access a different one of the plurality of different content items;receiving a request for the one encrypted frame, from the client device, wherein the request corresponds to a user selection of one of the plurality of links and/or mechanisms, and wherein the user selection corresponds to a selected content item from the plurality of different content items;prior to receiving the request, and prior to sending the one encrypted frame of the selected content item, using one of the plurality of key identifiers to request access to a key from a second network device;prior to or concurrent with sending the one encrypted frame, sending the key to the client device. 13. The network device of claim 12, wherein sending the webpage load includes embedding the one of the plurality of key identifiers within the webpage load using at least a uniform resource locator (URL) associated with the one of the plurality of different content items. 14. The network device of claim 12, wherein sending the webpage load includes embedding the one of the plurality of key identifiers within the webpage load using a script. 15. The network device of claim 12, wherein the actions further including: determining that the one of the plurality of different content items is protected with a key rotation scheme; andproviding a second key identifier to the client device such that the client device initiates a second key request for a second key prior to receipt by the client device of a second portion of the one of the plurality of different content items that is protected by the second key. 16. The network device of claim 12, wherein sending the webpage load includes embedding a plurality of key identifiers usable in a key rotation scheme for the one of the plurality of different content items. 17. The network device of claim 12, wherein receiving a request for the webpage comprises receiving a request for more information about the one of the plurality of different content items. 18. The network device of claim 12, wherein receiving a request for the webpage comprises receiving a request for the one of the plurality of different content items.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (107)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.