New patents are issued by the USPTO on Tuesdays. Today's Spotlight Patents concern aspects of digital rights management. Assigned to Adobe, the first of today's Spotlight Patents addresses techniques for digital rights management leveraging motion or environmental traits. Assigned to Time Warner Cable, the second patent addresses techniques for control of data and content protection mechanisms across a network using a download delivery paradigm.
10,346,594, "Digital rights management leveraging motion or environmental traits," assigned to Adobe.
Abstract
Digital rights management techniques are used to control access to items of content based on motion or environmental traits. Data is collected that describes motion or environmental traits associated with a request to access content, the request received from a user. A determination is made from the data using a digital rights management module embedded as part of the content as to whether the motion or environmental traits meet specified traits of a motion or environmental behavior of a digital rights management policy enforced by the digital rights management module for at least one item of the content. Responsive to a determination that the specified traits are met, access to the at least one item of the content is permitted by the embedded digital rights management module.
10,362,018, "Downloadable security and protection methods and apparatus," assigned to Time Warner Cable Enterprises LLC.
AbstractMethods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure "output" domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.