On Thursdays the USPTO publishes new pending patent applications. Both of today's Spotlight Applications concern aspects of Digital Rights Management. Assigned to Verizon, the first application discloses techniques for peer-to-peer content distribution with digital rights management. Assigned to Cyberlink (TW), the second application discloses techniques for the secure execution of code using a hardware protection module.
20100250704, "Peer-to-peer content distribution with digital rights management," assigned to Verizon.
A method for peer-to-peer sharing may be performed by one or more devices within a subscription multimedia network, such as a closed distribution network. The method includes broadcasting a content reference of digital content available on a peer device within the subscription multimedia network, the content reference including digital rights management restrictions for the digital content associated with the content reference. The method also includes receiving, from a requesting media client using the subscription multimedia network, a selection of the content reference; and obtaining credentials of the requesting media client. The method further includes determining whether the credentials are acceptable for receiving the digital content based on the digital rights management restrictions; and providing, to the requesting media client using the subscription multimedia network, a decryption key for the digital content if the credentials are acceptable.
20100241855, "Systems and Methods for Secure Execution of Code Using a Hardware Protection Module," assigned to Cyberlink (TW).
Systems and methods for securely executing digital rights management software comprising content code are described. One method comprises receiving encrypted multimedia content and content code from a storage medium by a host processor, wherein the content code provides restricted content distribution by examining an environment in which a player application resides. Based on functions defined within the content code, the host processor partitions the content code into portions. Based on whether the functions corresponding to the portions are related to computations involving confidential data, commands and parameters related to the portions of the content code are generated and forwarded to a secure processor for decrypting the encrypted multimedia content.