Patent application number | Description | Published |
20080256539 | Fault Tolerant and Hang Resistant Media Processing Applications - Techniques for playing a media file in a multimedia application include launching a multimedia application as one process and automatically launching a pipeline of one or more media processing components as one or more isolated processes. In this manner, any untrustworthy components can be executed in an isolated process that is separate from the execution process of the multimedia application, thereby improving fault tolerance and hang resistance. | 10-16-2008 |
20090006862 | Provisioning a computing system for digital rights management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 01-01-2009 |
20090142044 | Systems and Methods for Enhancing a User's DVD Experience - Methods, systems and architectures for enhancing a user's DVD experience are described. In one embodiment, the physical structure (e.g. titles and chapters) of a DVD is ascertained and a playlist structure shell that represents the DVD's physical structure is built. Metadata associated with the DVD is acquired and used to populate the playlist structure shell. In some embodiments, the metadata can be acquired from a metadata source external to the DVD and/or remote from a computing device on which the DVD is being played. Remote locations can include, without limitation, those that are network- or Internet-accessible. Once the playlist structure shell is populated, it can be used to render a playlist associated with the DVD's video in an area of a user interface display. In some embodiments, a DVD's video can be rendered in a first area of the user interface display and the playlist can be rendered in a second area of the user interface display during at least some of the time that the DVD's video is rendered in the first area. | 06-04-2009 |
20090158036 | PROTECTED COMPUTING ENVIRONMENT - A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the secure process, periodically checking the security state of the kernel, and notifying the secure process when the security state of the kernel has changed. | 06-18-2009 |
20090257597 | Protocol for Protecting Third Party Cryptographic Keys - A protocol is provided that permits a third-party key issuing entity to have its issued keys protected by an unrelated key protecting entity. In at least some embodiments, a trusted key protecting entity is injected, in a sense, in a conversation between the third-party key issuing entity and a client to which one or more keys are distributed. The trusted key protecting entity is able to apply various protections which, in at least some embodiments are unknown to the key issuing entity, to a distributed key which can then be used by the client to access protected content. | 10-15-2009 |
20090271319 | Embedded Licenses for Content - In accordance with one or more aspects, a license for content is retrieved, the license having been previously embedded in the content. A requested action is allowed to be performed with the content only if a standalone license, or both a leaf license and a root license, indicate that the action with the content is permissible. Leaf licenses and/or standalone licenses can be embedded by a source of the content and/or by a target device that receives the content. Additionally, licenses can include one or more rules indicating where a target device that receives the content is to store the licenses. | 10-29-2009 |
20090307254 | Translating DRM System Requirements - Various embodiments provide a mapping layer to translate DRM system requirements from one DRM system, such as a source system, to another DRM system, such as a target system. In at least some embodiments, DRM system requirement translation is performed using a signed data structure that maps DRM system requirements from one DRM system to one or more other DRM systems. By mapping DRM system requirements from one system to another, licenses associated with DRM-protected content and associated content can be safely transferred between systems. | 12-10-2009 |
20140173750 | Provisioning a Computing System for Digital Rights Management - Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage. | 06-19-2014 |