Abstract:
A technique for controlling a download (110) of an electronic service guide (ESG) for media content distribution services to a user device (102) is proposed. First, a user behaviour related to the user device is monitored. Second, a ranking of fragments of the electronic service guide to be downloaded interactively onto the user device is determined, based on the monitoring. The download of one or more of the fragments to the user device is then initiated based on the ranking. This technique is particularly useful when a transmission capacity available for downloading fragments of the ESG is limited.
Abstract:
A technique for controlling a play-out of a media data stream at a receiving device is provided. The media data stream comprises one or more programs, and each program comprises one or more program components. In a method implementation of the technique, a zone description is defined. The zone description is defined for a media zone for at least one program or at least one program component in the media stream and identifies the media zone for the at least one program or the at least one program component. In a next step, the zone description is associated to a program specific information data segment. The program specific information data segment is part of the media stream and comprises data specifying information at least regarding to the at least one program or at least one program component. The method also comprises transmitting the media data stream towards the receiving device.
Abstract:
A technique for protecting media content that is to be accessible via multiple media tracks of a media file is provided. A method implementation of this technique comprises the step of providing a set of one or more first layer data items that are to be accessible via a first media track, with each first layer data item being decodable to be rendered as a portion of the media content. Moreover, a set of one or more second layer data items is provided that are to be accessible via at least one second media track, with each second layer data item being decodable to be rendered in combination with at least one decoded first layer data item as an enhanced portion of the media content. With each second layer data item a track reference index is associated that allows to identify the first media track via which the first layer data items are accessible. Then, in a next step, the second layer data items and the associated track reference indices (plus optionally the first layer data items) are encrypted for being transmitted to a content recipient.
Abstract:
A content sharing group node of a content sharing group is disclosed. The content sharing node is arranged to receive a sharing right comprising boundaries of redistribution of the sharing right and content sharing group membership restrictions to further content sharing group nodes of the content sharing group, arranged to access the content according to the combined restrictions of the sharing right and a usage right, and arranged to re-distribute the sharing right within the boundaries of re-distribution of the sharing right and to restrict its content sharing group membership according to the sharing right, wherein the content sharing group is defined as the sharing right is redistributed. Methods and computer programs for content sharing are also disclosed.
Abstract:
Disclosed is a DRM device and method for providing secure linking to a user identity. A first request is sent to a subscriber identity module. A message is received from the subscriber identity module via a secure authenticated channel. The message comprises at least a a master key identifier, a random number, and a derived key. In response to the message, a second request is sent to a DRM server. The second request comprises at least a master key identifier, the device identifier, and a random number. Also disclosed is a DRM server and method for providing secure linking to a user identity. A first request is received from a DRM device. The first request comprises at least master key identifier, a device identifier, and a random number. The DRM device is authenticated. A second request for an application specific key is sent to a trusted key management server. The second request comprises at least a master key identifier. At least a key is received from the trusted key management server. A derived key is determined from the key received from the trusted key management server based at least on the device identifier and the random number. A challenge/response scheme is used to determine whether the derived key of the DRM server matches a derived key of the DRM device.
Abstract:
Se describe un método para controlar la transmisión de un flujo continuo de medios que comprende una pluralidad de elementos de flujo continuo consecutivos. El método comprende el paso de obtener (32) una descripción de medios en el flujo continuo de medios, la descripción de medios indicando un elemento inicial de los elementos de flujo continuo. Una petición para el elemento de flujo continuo inicial es enviada (34) y un procedimiento de control de sesión es iniciado (36) para una sesión. El flujo continuo de medios está asociado (38) con la sesión en el procedimiento de control de sesión. La transmisión del elemento subsiguiente de los elementos de flujo continuo es controlada de conformidad con una regla de control de la sesión. También se describen dispositivos y métodos adicionales que modalizan la invención.
Abstract:
A technique for registering a device (10) with a rights issuer system (12) in a digital rights management (DRM) context is described. The device (10) is provided with DRM registration information that is required to use protected content. The DRM registration information is generated from rights issuer information on the one hand and device information on the other hand. The DRM registration technique described herein does not require an interactive registration protocol between a rights issuer server (12) and the device (10). Rather, the DRM registration information may be generated and transferred to the device (10) even if the device (10) is offline, inactive or switched-off.