Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for an ephemeral trusted device

A technology of equipment and trust level, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as incompatibility

Inactive Publication Date: 2013-05-08
THOMSON LICENSING SA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such security upgrades are difficult to be compatible with fixed solution systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for an ephemeral trusted device
  • Method and apparatus for an ephemeral trusted device
  • Method and apparatus for an ephemeral trusted device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Temporal trust as used here is the concept that the security trustworthiness of a device will change over time and the level of trust will be assessed as required for a particular purpose. Trust of a device involves the design / implementation, configuration and loaded applications of the device. All of these items may change over time and / or be found to be exploitable.

[0019] External content providers should have a way of assessing in real time whether a particular device is allowed to view and / or use their content based on the trust level assessed at that moment. Temporary trust provides a means for a trusted third party to assess the trust level of a device at any given moment, and thus, a decision can be made to allow or deny any type of content, or to allow a downgraded version of the content if it is available. Download to that device. So, for example, if a media device is requesting content from a content provider, the device will seek proof of trust for the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system is performed by a requesting apparatus for accessing protected content from a content provider. The method includes receiving an indication of a level of trust needed to access specific protected content from a content provider, and supplying an identity attestation and an attribute attestation and the received level of trust to a third party evaluator. The evaluator determines if the requesting apparatus meets the level of trust needed to access the protected content. A trust attestation is generated indicating a level of trust of the requesting apparatus and is sent to the requesting device. The trust attestation is evaluated by the requesting device to determine what version of the protected content can be downloaded from a content provider. The requesting apparatus then asks for the protected content if the trust level attestation meets the level of trust needed to access the specific content from the content provider.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to US Provisional Application No. 61 / 382,402, filed September 13, 2010, entitled "Ephemeral Trusted Devices," which is hereby incorporated by reference in its entirety. technical field [0003] The present invention relates to content security, and more particularly to the security of content to be loaded into a media device. Background technique [0004] Content providers typically only deliver their content to authorized recipients. In one existing mode of operation, the content provider and the facility provider agree to design dedicated hardware to maintain the secure transfer of content from the provider to the user. This facility enables content providers to be secure or trusted systems that can deliver content securely and securely to users. A breach of security may result in content becoming available to thieves. Such infringement can significantly degrade the value of the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F21/31G06F21/10
Inventor R.R.奥格尔
Owner THOMSON LICENSING SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products