Unlock instant, AI-driven research and patent intelligence for your innovation.

Network-based revocation, observance and keys for copy protection systems

A target device and source device technology, applied in the transmission system, program/content distribution protection, instrument, etc., can solve the problems of content owner's income loss, equipment cannot be upgraded, HDCP is not available, etc.

Active Publication Date: 2016-06-22
SONY CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

also, it is difficult to update security software to enforce new compliance rules 12 and 22 to accommodate changing technology and complexity of device interconnections
HDCP is not really patchable due to the large installed base of legacy equipment that cannot be upgraded and will need to be replaced
Delivery to insecure storage or transmission media exposes the content to unintended copying and redistribution and, consequently, results in lost revenue for the content owner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-based revocation, observance and keys for copy protection systems
  • Network-based revocation, observance and keys for copy protection systems
  • Network-based revocation, observance and keys for copy protection systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] While the invention is susceptible to embodiments having different forms, specific embodiments are shown in the drawings and will be described in detail herein, it being understood that the disclosure of such embodiments given is to be considered as examples of principles rather than The invention is not intended to be limited to the particular embodiments shown and described. In the following description, the same reference numerals are used to describe the same, similar or corresponding parts in the several views of the drawings.

[0032] As used herein, the terms "a" or "an" are defined as one or more than one. As used herein, the term "plurality" is defined as two or more than two. As used herein, the terms "comprising" and / or "having" are defined as comprising (ie, open-ended language). As used herein, the term "coupled to" is defined as connected, although not necessarily directly, and not necessarily mechanically. As used herein, the term "program" or "compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating a device. A local connection is established between a local target device and a local source device; at the source device, a credential of the target device is obtained through the local connection; at the source device, the credential is sent to a cloud verification server through a secure communication channel; At the cloud authentication server, the credentials of the target device are checked against a database of known good devices; at the source device, a message is received from the cloud authentication server via a secure communication channel indicating that the target device is authenticated; Transfer content from a source device to a target device under authenticated conditions.

Description

[0001] Copyright and Trademark Notice [0002] Portions of the disclosure of this patent document contain material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of any patent document or patent disclosure that appears in the Patent and Trademark Office's patent files or records, but otherwise reserves all copyrights in all cases. Trademarks are the property of their respective owners. technical field [0003] This application relates to network-based revocation, compliance and keys for copy protection systems, and more particularly to communication methods and content source devices. Background technique [0004] Home networking standards, such as Universal Plug and Play (UPnP) and Digital Living Network Alliance (DLNA), have been developed to facilitate the interconnection of media devices in the home. The UPnP and DLNA specifications and guidelines allow the discovery of content, and the transfer of content fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F7/04
CPCG06F21/445H04L63/0471G06F21/10
Inventor B·L·坎德洛蕾
Owner SONY CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More