Abstract:
Certains modes de réalisation de l'invention mettent à disposition un procédé de gestion numérique des droits (DRM) destiné à distribuer un contenu à des utilisateurs (1) sur un réseau (120). Sur la base d'un premier ensemble d'indices de diversité, le procédé identifie un premier élément de sécurité (SE) destiné à distribuer un ensemble de contenu à un premier ordinateur (115). L'ensemble de contenu comporte un ou plusieurs éléments de contenu. Sur la base d'un second ensemble d'indices de diversité, le procédé identifie un second élément de sécurité (SE) destiné à distribuer l'ensemble de contenu à un second ordinateur (115). Sur la base du premier élément de sécurité. (SE), le procédé protège l'ensemble de contenu pour le premier ordinateur (115) et envoie l'ensemble de contenu protégé au premier ordinateur (115) au travers du réseau (120). Sur la base du second élément de sécurité (SE), le procédé protège l'ensemble de contenu pour le second ordinateur (115) et envoie l'ensemble de contenu protégé au second ordinateur (115) au travers du réseau (120).
Abstract:
Système DRM basé sur un compte destiné à distribuer des contenus. Le système comporte plusieurs dispositifs qui sont associés à un compte particulier. Le système comporte également un ensemble d'ordinateurs DRM qui reçoit une demande d'accès à un contenu particulier sur les dispositifs associés au compte particulier. L'ensemble d'ordinateurs DRM génère ensuite plusieurs clés pour les dispositifs, où chaque clé particulière de chaque dispositif particulier permet au dispositif particulier d'accéder au contenu particulier sur le dispositif particulier. Par l'intermédiaire d'un réseau, l'ensemble d'ordinateurs DRM de certains modes de réalisation envoie le contenu particulier et des clés générées aux dispositifs associés au compte particulier. Le réseau est un réseau local d'entreprise, un réseau étendu, ou un réseau des réseaux, tel que l'Internet. Dans certains de ces modes de réalisation, l'ensemble d'ordinateurs DRM envoie les contenus et les clés à un dispositif (par exemple, un ordinateur), qui est utilisé pour distribuer les contenus et la ou les clé(s) aux autres dispositifs associés au compte. Dans certains modes de réalisation, l'ensemble d'ordinateurs DRM crypte individuellement chaque clé dans un format qui est utilisé au cours de son transport vers son dispositif associé et au cours de son utilisation sur ce dispositif.
Abstract:
There is provided a method of a user receiving permission to access media content comprising receiving a unitary media storage structure with a plurality of protected media portions, receiving from a license authority a key for each protected media portion that the user has permission to access, and using the respective key to access each protected media portion that the user has permission to access.
Abstract:
In a Digital Rights Management (DRM) system, cryptographic keys for decrypting distributed assets (such as audio or video media) are distributed using an offline (e.g., non-Internet) method for distribution of the key generation process, with an implicit authorization to use the distributed key generation process. This is used to update an asset key for use by a client such as a media player when a key formula for generating the key for decrypting an asset has been compromised, such as by hackers.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.
Abstract:
Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly access encrypted data in memory in a playback device when the data is decrypted during playback and momentarily stored in digital form. This hacking is defeated here by methodically 'poisoning' the encrypted data so that it is no longer playable by a standard decoder. The poisoning involves deliberate alteration of certain bit values. On playback, the player invokes a special secure routine that provides correction of the poisoned bit values, for successful playback.
Abstract:
A digital rights management (DRM) system for distribution of digital content such as audio or video uses a token passing scheme to enhance security of the content from unauthorized access and use, including access by unauthorized players. The token is requested from the central content or DRM server by a host device such as a user's computer, using security related information. The token is then passed to a media player associated with the host device, the token being encrypted using a key special to that particular player. Upon receipt of the token, the player transmits back to the server certain related security information confirming receipt of the token and in return receives keys for decryption of the associated digital content. In the absence of proper passing of the token, player access to the content, or further access to other content, is denied. This also allows the player to communicate directly with the server for obtaining the keys.
Abstract:
An integrity verification process is described to detect tampering or alteration to computer files, being especially useful for detection of tampepng by hackers trying to plant malicious code in software Each computer file to be protected is first selected using a rule and is partitioned into vapable length portions, the lengths varying in an unpredictable manner Each portion has its checksum or hash value computed A vepfication file is created which includes a vector for each portion including the portion's start address in memory, length, and computed checksum or hash value When the code is executed, the vepfication file is conventionally read and each portion is vepfied by computing its checksum or hash value again, and compapng that to the value in the associated vepfication file vector Lack of a match in the two values indicates tampepng, so execution of the code can be halted