New patents are issued by the USPTO on Tuesdays. Both of today's Spotlight Patents concern aspects of digital rights management. Assigned to Microsoft, the first patent addresses techniques for provisioning a computing system for digital rights management. Assigned to Panasonic (JP), the second patent addresses a content reproduction system, information processing terminal, media server, secure device, and server secure device.
9,147,052, "Provisioning a computing system for digital rights management," assigned to Microsoft.
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage.
9,152,770, "Content reproduction system, information processing terminal, media server, secure device, and server secure device," assigned to Panasonic (JP).
A content reproduction system includes an information processing terminal and a secure device. The information processing terminal receives a copyright protection application program from an application distribution server. The copyright protection application program includes a first program having a first execution format executable in the information processing terminal and a second program having a second execution format different from the first execution format and executable in the secure device. The second program is encrypted with a program key held in the secure device. By extracting and executing the first program, the information processing terminal extracts the second program and transmits the second program to the secure device. The secure device receives the second program from the information processing terminal, decrypts the second program using a program key stored in a key storing unit, and executes the second program.