Multimedia network system with content importation, content exportation, and integrated content management
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/10
G06F-017/30
H04N-021/254
H04N-021/258
H04N-021/414
H04N-021/422
H04N-021/239
H04N-021/2747
H04N-021/4402
H04L-029/06
H04W-004/80
H04N-021/218
H04N-021/4227
H04N-021/4408
H04N-021/4415
H04N-021/488
H04N-021/61
H04N-021/6334
H04N-021/6377
H04N-021/84
H04N-019/156
H04N-019/164
H04N-021/2662
H04N-021/6379
G06F-021/62
H04L-009/08
H04L-009/14
H04L-012/24
H04L-029/08
H04N-021/41
H04N-021/43
H04N-021/4363
H04W-084/12
H04N-021/2389
H04N-021/433
H04N-021/4367
H04N-021/472
H04N-021/63
H04N-021/2347
H04N-021/266
H04N-021/8352
H04N-019/70
H04W-088/02
출원번호
US-0713832
(2017-09-25)
등록번호
US-10127363
(2018-11-13)
발명자
/ 주소
Drope, Philip
출원인 / 주소
DIGITAL MEDIA TECHNOLOGIES, INC.
대리인 / 주소
McClure, Qualey & Rodack, LLP
인용정보
피인용 횟수 :
0인용 특허 :
115
초록▼
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determ
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determine the license status of content and update the license status of content which was previously provided by that provider. The external content can be accessed in real time or downloaded and stored within the system for later access at the convenience of the user. The usage of some content is controlled by the use of encryption and other protection methods. The system allows for storage of live video by storing the digitized video and allowing the user to control how, when and where the content is viewed. The system makes available multiple multimedia services to all users in the network or connected via the internet.
대표청구항▼
1. A multimedia system, comprising: at least one control server configured to receive a first request for content from at least one client device via a network;at least one content server configured to send the content to the at least one client device via the network; andat least one license server
1. A multimedia system, comprising: at least one control server configured to receive a first request for content from at least one client device via a network;at least one content server configured to send the content to the at least one client device via the network; andat least one license server configured to:receive a request from the at least one client device for a content license, via the network, the content license comprising at least a decryption key, the decryption key being an input parameter of a decryption algorithm associated with the content, the request being based upon a determination by the at least one client device that the content is protected and requires a content license, the request further comprising a public key associated with the at least one client device;receive information from the at least one client device via the network, the information comprising a user authorization and a device authorization, wherein the device authorization corresponds to a security rating of the at least one client device, the security rating of the at least one client device being based on security specifications of software and hardware of the at least one client device;evaluate the information according to at least one predetermined criterion;encrypt the content license with the public key; andsend, after being encrypted using the public key, the content license to the at least one client device via the network. 2. The multimedia system of claim 1, wherein: the at least one client device has an interactive program guide with a graphical user interface; andthe interactive program guide is configured to display the content available in a consolidated format and to provide a search to locate the content. 3. The multimedia system of claim 1, wherein the decryption algorithm comprises at least one additional input parameter, the at least one additional input parameter being at least one of: a content identifier, a serial number associated with one or more hardware components of the at least one client device, a hardware identifier associated with the one or more hardware components of the at least one client device, a key seed, a timestamp, a media access control address associated with a network adapter of the at least one client device, a globally unique identifier associated with the at least one client device, a key identifier associated with the content license, a session key, a token, a content key, another key, or a security certificate. 4. The multimedia system of claim 1, wherein the at least one client device contains a secure system clock configured to prevent altering of system time by the user. 5. The multimedia system of claim 4, wherein the at least one client device has access to at least one enhanced capability after a confirmation of the presence of the secure system clock. 6. The multimedia system of claim 1, wherein the at least one client device contains a security algorithm which uses data within at least one of: the software or the hardware, for use in determination of the user authorization and the device authorization. 7. The multimedia system of claim 1, wherein the at least one client device uses a security algorithm with data from at least one of: the software or the hardware, of the at least one client device, to derive information used to implement the content usage parameters. 8. The multimedia system of claim 1, wherein at least one security certificate is used for communication of information related to the at least one of: content key, a session key, a token, content usage parameters, a user authorization, device authorization, status of content previously sent, content owned or purchased by user, or a status of the content requested. 9. The multimedia system of claim 1, wherein the content license comprises at least one content key and at least one content usage parameter. 10. The multimedia system of claim 1, wherein at least one content key is embedded with the content. 11. The multimedia system of claim 1, wherein at least one content usage parameter is embedded with the content. 12. The multimedia system of claim 1, wherein at least one communication between the at least one client device and the license server is encrypted. 13. The multimedia system of claim 12, wherein the at least one communication is encrypted via asymmetrical encryption. 14. The multimedia system of claim 13, wherein the asymmetrical encryption employs public key-private key encryption. 15. The multimedia system of claim 1, wherein the at least one client device is at least one of: a game console, a digital video recorder, a television, a satellite television receiver, a cable television receiver, a digital camera, a computer, a content storage device, a radio receiver, a telephony device, an optical storage device, a set-top box, or a digital media player. 16. The multimedia system of claim 1, wherein the user authorization specifies at least one of: information related to content previously sent to the user, user subscription information, information related to user authorization for additional content, or at least one user permission related to content access. 17. The multimedia system of claim 1, wherein the device authorization specifies at least one of: the at least one client device has a proper security rating and is registered to a valid user domain, the at least one client device has a proper security rating and contains a secure system clock, or the at least one client device has a proper security rating and is registered to the user. 18. The multimedia system of claim 1, wherein the content is at least one of: data, audio, or video. 19. The multimedia system of claim 1, wherein the at least one client device comprises a computing device and a software executable configured to graphically display the content. 20. The multimedia system of claim 1, wherein the at least one client device comprises a computing device configured to store content, the content being transmitted via a network, from a source located locally or remotely. 21. The multimedia system of claim 20, wherein the computing device is configured to store the content license, the content license being transmitted via a network, from a source located locally or remotely. 22. The multimedia system of claim 21, wherein the computing device is further configured to allow detachment from the network after the content and content license are stored on the computing device. 23. The multimedia system of claim 22, wherein the computing device is further configured to allow content usage, while detached from the network, based at least upon at least one usage parameter. 24. The multimedia system of claim 1, wherein a content provider updates data within at least one of: the software and the hardware, of the at least one client device. 25. The multimedia system of claim 24, wherein the content provider sends the data to update the public/private key pair associated with the at least one client device. 26. The multimedia system of claim 25, wherein the at least one client device uses at least one algorithm to calculate at least one public key-private key encryption pair for the at least one client device based upon at least one of: a time that data is sent from the content provider, a predetermined schedule, or at least one security requirement. 27. The multimedia system of claim 1, wherein the content further comprises at least one of: content that is purchased by a user, content that is rented by the user, or content that is part of a subscription associated with the user. 28. The multimedia system of claim 1, wherein the control server is further configured to authorize a user with data received from the at least one client device, the data comprising at least one of: radio frequency identification information related to the user, alphanumeric information related to the user, combined alphanumeric and password information related to the user, or biometric information related to the user. 29. The multimedia system of claim 18, wherein the video is previously recorded video. 30. The multimedia system of claim 18, wherein the video is at least one of: a movie or a television program. 31. The multimedia system of claim 1, wherein the decryption key is a content key configured to decrypt the content by the at least one client device. 32. The multimedia system of claim 1, wherein at least one communication between the at least one client device and the content server is encrypted. 33. The multimedia system of claim 32, wherein the content is encrypted via symmetrical encryption. 34. The multimedia system of claim 1, wherein the network is a wide area network. 35. The multimedia system of claim 1, wherein the at least one control server is further configured to authenticate a user with data received from the at least one client device, the data comprising at least one of: a radio frequency identification device, alphanumeric input received from a user, alphanumeric and password input received from a user, or biometric information related to a user. 36. A method, comprising: receiving, in at least one control server, a first request for content from at least one client device via a network;transmitting, by the at least one content server, the content to the at least one client device via the network;receiving, in the at least one license server, a request for a content license from the at least one client device via the network, the content license comprising at least a decryption key, the decryption key being an input parameter for a decryption algorithm associated with the content, the request being based upon a determination by the at least one client device that the content is protected and requires a content license, the request further comprising a public key associated with the at least one client device;receiving, in the at least one license server, information from the at least one client device via the network, the information comprising a user authorization and a device authorization, wherein the device authorization corresponds to a security rating of the at least one client device, the security rating of the at least one client device being based on security specifications of software and hardware of the at least one client device;evaluating, in the at least one license server, the information according to predetermined criteria;encrypting, in the at least one license server, the content license with a public key associated with the at least one client device;transmitting, by the at least one license server, the encrypted content license to the at least one client device via the network;decrypting, in the at least one client device, the content license using a private key associated with the at least one client device; anddecrypting, in the at least one client device, the content using the at least one decryption key as at least one input parameter for a decryption algorithm. 37. The method of claim 36, wherein the first request for content is selected on the at least one client device, via an interactive program guide, utilizing a graphical user interface, which is configured to display the content available in a consolidated format, wherein at least some of the content available is searchable using a search requested via the at least one client device. 38. The method of claim 36, wherein the decryption algorithm comprises at least one of: a content identifier, a serial number associated with one or more hardware components of the at least one client device, a hardware identifier associated with the one or more hardware components of the at least one client device, a key seed, a timestamp, a media access control address associated with a network adapter of the at least one client device, a globally unique identifier associated with the at least one client device, a key identifier associated with the content license, a session key, a token, a content key, another key, or a security certificate. 39. The method of claim 36, wherein the at least one client device contains a secure system clock configured to prevent altering of system time by the user. 40. The method of claim 39, wherein the at least one client device has access to at least one enhanced capability after a confirmation of the presence of the secure system clock. 41. The method of claim 36, wherein the at least one client device contains a security algorithm which uses data within at least one of: the software or the hardware, for use in determination of the user authorization and the device authorization. 42. The method of claim 36, wherein the at least one client device uses a security algorithm with data from at least one of: the software or the hardware, of the at least one client device, to derive information used to implement the content usage parameters. 43. The method of claim 36, wherein at least one security certificate is used for communication of information related to the at least one of: content key, a session key, a token, content usage parameters, a user authorization, device authorization, status of content previously sent, content owned or purchased by user, or a status of the content requested. 44. The method of claim 36, wherein at least one content key is embedded with the content. 45. The method of claim 36, wherein at least one content usage parameter is embedded with the content. 46. The method of claim 36, wherein the decryption key is a content key which the at least one client device uses to decrypt the content. 47. The method of claim 36, wherein the content further comprises at least one of: content that is purchased by a user, content that is rented by the user, or content that is part of a subscription associated with the user. 48. The method of claim 36, wherein the at least one client device is at least one of: a game console, a digital video recorder, a television, a satellite television receiver, a cable television receiver, a digital camera, a computer, a content storage device, a radio receiver, a telephony device, an optical storage device, a set-top box, or a digital media player. 49. The method of claim 36, wherein the user authorization specifies at least one of: user subscription information, information related to content previously sent to the user, information related to user authorization for additional content, or at least one user permission related to content access. 50. The method of claim 36, wherein the device authorization specifies at least one of: the at least one client device has a proper security rating and is registered to a valid user domain, the at least one client device has a proper security rating and contains a secure system clock, or the at least one client device has a proper security rating and is registered to the user. 51. The method of claim 36, wherein the network is a wide area network. 52. The method of claim 36, wherein the at least one control server is further configured to authenticate a user with data received from the at least one client device, the data comprising at least one of: a radio frequency identification device, alphanumeric input received from a user, alphanumeric and password input received from a user, or biometric information related to a user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (115)
Yi, Byung K.; Subramanya, Srikantia R., Apparatus and method for receiving and reproducing multimedia entertainment content.
Moriai,Shinsuke, Data terminal device capable of continuing to download encrypted content data and a license or reproduce encrypted content data with its casing in the form of a shell closed.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
Dinh, Hung T.; Lakhdhir, Mansoor A.; Pham, Phong A., Distributing group of images associated with web page via number of data connections less than number of images in group.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
Jellinek,Herbert D.; Rudy,Stephen M., Performing server actions using template with field that can be completed without obtaining information from a user.
Alexander ; Jr. Cedell Adam ; Smith Timothy James ; Verrilli Colin Beaton ; Yedavalli Rama Mohan, Redundancy mechanisms for classical internet protocol over asynchronous transfer mode networks.
Revital, Dan; Epstein, Steve; Tsuria, Yossi; Zucker, Arnold; Simkin, Steven, Secure digital content delivery system and method over a broadcast network.
Sull, Sanghoon; Kim, Hyeokman; Chung, Min Gyo; Yoon, Ja Cheon; Choi, Hyungseok, System and method for indexing, searching, identifying, and editing portions of electronic multimedia files.
Rosenblatt, Michael; Lin, Gloria; Mikhak, Amir Mahmood; Nakajima, Taido Lantz; Mayo, Sean Anthony; Hodge, Andrew; Fadell, Anthony Michael; Lee, Jeffrey Theodore; Ellis, Shawn A.; Wood, Policarpo; Cannistraro, Alan Christopher, System and method for placeshifting media playback.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
Morino, Harumi; Okayama, Masataka; Tanaka, Akira, System for managing license for protecting content, server for issuing license for protecting content, and terminal for using content protected by license.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Lennon,Alison Joan; Anderson,Michael Peter; Wan,Ernest Yiu Cheong; Yap,Sue Ken, Transferring a media browsing session from one device to a second device by transferring a session identifier and a session key to the second device.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
Cohen Solal,Eric, User attention-based adaptation of quality level to improve the management of real-time multi-media content delivery and distribution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.