Tuesdays the PTO issues new patents. Both of today's Spotlight Patents concern aspects of digital rights management. Assigned to Broadcom, the first patent addresses techniques for using a digital rights management metafile, management protocol and applications thereof. Assigned to Western Digital, the second patent addresses a digital rights management system and methods for provisioning content to an intelligent storage.
8,832,467, "Digital rights management metafile, management protocol and applications thereof," assigned to Broadcom.
Abstract
Methods, systems and computer program products to create and manage encapsulated Digital Rights Management (DRM) metafiles, also referred to as objects, are provided herein. Each object comprises a file header section, an encrypted webpage metadata section, an encrypted preferences section, an encrypted tracking section, an encrypted license section, a media file section and an encrypted file trailer section. Each section comprises multiple attributes. A metabase is provided herein to catalog objects, sections and attributes. Instructions are provided herein to allow for setting a current object, section or attribute; retrieving an object, section or attribute; and enumerating objects, sections and attributes in a device memory.8,831,218, "Digital rights management system and methods for provisioning content to an intelligent storage," assigned to Western Digital Technologies, Inc.
Abstract
The present invention relates to digital rights management (DRM) for content that downloaded and saved to a storage device. The storage may be a disk drive, or network attached storage. In addition, the storage device performs cryptographic operations and provides a root of trust. The DRM employs a binding key, a content key, and an access key. The binding key binds the content to a specific storage and is based on a key that is concealed on the storage. The binding key is not stored on the storage device with the content. The content key is a key that has been assigned to the content. The access key is determined based on a cryptographic combination of the content key and the binding key. In one embodiment, the content is provisioned based on the access key and stored in encrypted form in the storage device.