Tuesdays the Patent Office issues new patents. Both of today's Spotlight Patents address aspects of digital rights management. Assigned to Cox Communications, the first of today's patents concerns techniques for content protection and digital rights management. Assigned to General Instrument, the second patent concerns techniques for securely transferring content from set-top box to personal media player.
8,413,256, "Content protection and digital rights management (DRM)," assigned to Cox Communications.
An end to end content protection system that includes enhanced digital rights management (DRM). The system provides content delivery to devices over a managed multimedia home network. The system includes a domain manager for receiving content, wherein the domain manager includes a cable card, conditional access component and a MSO security application and a managed client device, coupled to and registered with the domain manager, the managed client device running a security DRM application client, the managed client device communicates with the MSO security application in the domain manager, wherein the MSO security application of the domain manager and the security DRM application client of the managed client instantiate a preferred DRM as an overlay on top of any other content protection scheme.
8,417,937, "System and method for securely transfering content from set-top box to personal media player," assigned to General Instrument Corporation.
A media player is provided for receiving session data from a security socket layer. The session data includes encrypted content data, a content key and digital rights data, wherein the content key and the digital rights data have been encrypted with a SSL session key. The said media player includes a first processor portion and a second processor portion. The first processor portion is arranged to receive the session data, has a second key. The first processor portion and can generate the SSL session key and can decrypt the session data with the SSL session key. The first processor portion can further re-encrypt the decrypted content key with the second key and can output the re-encrypted content key and digital rights data. The second processor portion is arranged to receive the re-encrypted content key and digital rights data. The first processor portion can further decrypt the content, and is externally inaccessible.