US20180139194A1 - Secure sharing of user annotated subscription media with trusted devices - Google Patents

Secure sharing of user annotated subscription media with trusted devices Download PDF

Info

Publication number
US20180139194A1
US20180139194A1 US15/792,044 US201715792044A US2018139194A1 US 20180139194 A1 US20180139194 A1 US 20180139194A1 US 201715792044 A US201715792044 A US 201715792044A US 2018139194 A1 US2018139194 A1 US 2018139194A1
Authority
US
United States
Prior art keywords
media content
decrypted
encrypted
secure
annotation information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/792,044
Inventor
Rajesh Poornachandran
Saurabh Dadu
Ned M. Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US15/792,044 priority Critical patent/US20180139194A1/en
Publication of US20180139194A1 publication Critical patent/US20180139194A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • G06F17/241
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/169Annotation, e.g. comment data or footnotes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Definitions

  • the present disclosure relates to secure sharing of subscription media content, and more particularly, to secure sharing of subscription media content and user annotations with trusted devices.
  • Subscription media content for example an audio/video stream of a sporting event, is typically subject to copyright protections that prohibit subscribers from sharing any or all portions of the content with other people.
  • Security systems such as Digital Rights Management (DRM) systems, may be employed by the subscription content providers to prevent such sharing, even if the parties involved in the sharing are all subscribers.
  • DRM Digital Rights Management
  • One illustrative scenario is where a group of friends are watching the same live sporting event, for example on televisions, at different physical locations. During the game, one of them may have a comment about a particular play or actions of a player that he would like to share with the group. That person's options for doing this are generally limited to texting, calling, emailing or posting the comment on a social media site, with no ability to include the relevant subscription content along with the message. This limits the quality of the viewing and sharing experience for the group, even though all group members may be legitimate content subscribers.
  • FIG. 1 illustrates a top level system diagram of an example embodiment consistent with the present disclosure
  • FIG. 2 illustrates an example image composition in accordance with an embodiment consistent with the present disclosure
  • FIG. 3 illustrates a block diagram of one example embodiment consistent with the present disclosure
  • FIG. 4 illustrates a block diagram of another example embodiment consistent with the present disclosure
  • FIG. 5 illustrates a block diagram of another example embodiment consistent with the present disclosure
  • FIG. 6 illustrates a flowchart of operations of one example embodiment consistent with the present disclosure
  • FIG. 7 illustrates a flowchart of operations of another example embodiment consistent with the present disclosure.
  • FIG. 8 illustrates a system diagram of a platform of another example embodiment consistent with the present disclosure.
  • the system may receive the subscribed media content from a content server, for example in an encrypted form, after authentication of the user and/or receiving device by a license server.
  • the system may include a trusted execution environment (TEE) with a secure processor and secure memory to decrypt and securely store the subscribed media content.
  • TEE trusted execution environment
  • the system may be configured to play the media content and allow the user to specify snapshot frames and provide annotations to accompany the snapshots.
  • the annotations may include, for example, text, drawings, labels and/or pictures.
  • the system may further be configured to overlay the annotations on the snapshots and securely share them with other trusted devices associated with other subscribed users.
  • FIG. 1 illustrates a top level system diagram 100 of one example embodiment consistent with the present disclosure.
  • a license server 102 and a media content server 104 are shown connected to a network 106 .
  • the content server 104 may be configured to provide media content including premium or subscription media content, such as for example, sporting events.
  • the license server 102 may be configured to authenticate subscribed users and/or devices that are licensed to receive the subscription media content.
  • Any number of trusted user devices 110 , 112 , 114 may also be connected to network 106 .
  • the trusted user devices may be configured for secure sharing of the subscription media, as described herein. The secure sharing may comply with Digital Rights Management DRM requirements.
  • a user may have both a set-top device 108 , (e.g., for use with a television), and a mobile platform 110 configured to function in coordination with each other to provide secure sharing of subscription media.
  • Functional elements of the system maybe incorporated in either or both of the set-top box 108 and the user device 110 , as appropriate.
  • the license server 102 and the content server 104 may be incorporated in the same server platform and may sometimes be referred to herein simply as “server” for convenience.
  • FIG. 2 illustrates an example image composition 200 in accordance with an embodiment consistent with the present disclosure.
  • a simplified illustration of a snapshot 202 is shown to include, for example, four players involved in a sporting event. The user may wish to make a comment, for example about how one of the players should have moved into a gap to receive the ball. This may be expressed as shown in the simplified example illustration of user annotations 204 which includes arrows and a text label “Pass.”
  • a composite overlay 206 is shown where the snapshot 202 and the user annotations 204 are overlaid into a composite image which provides a convenient visual indication of the annotating user's intention that player 206 a should move down and to the right while player 206 b should pass the ball toward that location.
  • annotations may include any type of visual or graphical information that may be entered by the user, including, for example, text, drawings, labels, pictures and/or clipart. It will be understood, of course, that the methods and systems described herein are not limited to media content that depicts sporting events and may be applied to any media content including television shows, movies, etc.
  • the composite overlay image 206 thus includes a mixture of subscription content (e.g., the snapshot), which need to be handled securely, and user annotations.
  • the composite overlay image 206 must therefore also be handled securely during both processing and sharing/distribution.
  • FIG. 3 illustrates a block diagram 300 of one example embodiment consistent with the present disclosure.
  • the trusted device 108 / 110 is shown to include a host processor 302 , a storage device 304 , a graphics (GFX) engine 310 , a display element 314 , a platform trusted execution environment (TEE) 306 , non-volatile memory 308 , a graphical user interface (GUI) module 316 and protected memory 312 .
  • the storage device 304 may be configured as a hard disk drive (HDD) or a solid state drive (SSD).
  • the trusted device 108 / 110 may be a set-top device (e.g., a digital video recorder (DVR) or cable TV decoder), or a computer or mobile platform (e.g., a tablet or smartphone) or a combination thereof.
  • a set-top device e.g., a digital video recorder (DVR) or cable TV decoder
  • a computer or mobile platform e.g., a tablet or smartphone
  • the host processor 302 may be configured to arrange a secure session (secure channel) with the subscription media content server 104 and the platform TEE 306 .
  • the host processor 302 may communicate with the network 106 through a network interface (not shown).
  • Arrangement of the secure session may include providing a license token from the TEE 306 to the license server 102 to validate the trusted device 108 / 110 , and obtaining a content encryption key (CEK) from the license server 102 for provision to the platform TEE 306 .
  • CEK content encryption key
  • the host processor 302 may also be configured to receive subscription media content from the content server 104 in an encrypted or otherwise secured format.
  • the encrypted subscription media content may be stored on storage device 304 .
  • the GUI 316 may be configured to receive annotation information from the user and generate an overlay image based on the annotation information.
  • the annotation information may be associated with a frame of the media content, for example as it is being played or streamed to the user.
  • the GFX engine 310 may be configured to composite the media content and the overlay image for rendering on display element 314 and for secure provisioning, over the network 106 , to other users/devices 112 , 114 , as will be described in greater detail below.
  • FIG. 4 illustrates a block diagram 400 of one example embodiment consistent with the present disclosure.
  • the TEE 306 is shown in greater detail to include an authentication module 408 , a media decryption module 402 , a media re-encryption module 404 and an overlay encryption module 406 .
  • the TEE 306 may include a secure independent processor or co-processor and associated secure storage to perform the functions described herein.
  • the authentication module 408 may be configured to authenticate the trusted device 108 / 110 with the license server, for example, by providing a validation key or license token to demonstrate the existence of a valid subscription to the protected media in accordance with a licensing policy enforced by the license server.
  • a trust anchor (configured to provide the capability for the remote license server to attest/validate the client platform prior to streaming of subscription content) may be provisioned in NVM 308 or other platform hardware by the manufacturer in a manner that is resistant to user tampering. The trust anchor may be used during the authentication/validation process.
  • the media decryption module 402 may be configured to decrypt and store the subscription media in a protected and/or isolated region of the device (e.g., protected memory 312 ) that is tamper resistant and not directly accessible by the host processor 302 or other external entities. The decryption may be accomplished using the CEK associated with the subscription media, obtained from the license server 102 after authentication.
  • Media re-encryption module 404 may be configured to re-encrypt the decrypted media prior to transmission to the GFX over a secure channel between the TEE and the GFX. This re-encryption may be performed using a different encryption key, such as, for example a Protected Audio/Video Path (PAVP) key managed by the device.
  • PAVP Protected Audio/Video Path
  • Overlay encryption module 406 may be configured to obtain the overlay image including user annotations, for example from GUI module 316 , and encrypt it prior to transmission to the GFX over a secure channel between the TEE and the GFX. This overlay encryption may also be performed using a different encryption key, such as, for example the PAVP key.
  • the TEE and the GFX engine may be hosted on different platforms.
  • the TEE may be included in the set-top box 108 while the GFX engine may be included in the user's trusted device (e.g., a mobile platform) 110 .
  • the secure channel between the TEE and the GFX may be a local area network (LAN) connection.
  • the encryption performed by modules 404 and 406 may prevent unauthorized access to the protected media content during this transmission.
  • the TEE 306 may be configured to provide security and isolation from other entities on the device 108 / 110 that are outside the TEE, such as, for example, software or applications executing on the host processor 302 .
  • the isolation may prevent external entities from exercising control over, or obtaining access to, cryptographic keys, licenses and decrypted media content.
  • the TEE may comprise separate physical hardware, for example an integrated circuit (IC) that is separate from an IC associated with the host processor 302 .
  • the TEE may comprise a separate controller or processor within an IC that is shared with other components of the device, including, for example, an Intel Converged Security Engine (CSE).
  • CSE Intel Converged Security Engine
  • the TEE may comprise a separate domain within a controller or processor that is shared with the device.
  • Various techniques may be employed to securely isolate the TEE including situations where hardware is being shared between the TEE and the device. These techniques may include privileged execution modes associated with the processors, access protection mechanisms associated with memory and/or the use of firmware to prevent unintended access. These may include, for example, use of the Intel Software Guard Extension (SGX), Virtualization Technology Extension (VT-x) or System Management Mode (SMM).
  • SGX Intel Software Guard Extension
  • VT-x Virtualization Technology Extension
  • SMM System Management Mode
  • Additional non-volatile memory 308 may be provided to securely store authentication information, cryptographic keys and/or other data that the trusted device needs to maintain within the TEE.
  • FIG. 5 illustrates a block diagram 500 of one example embodiment consistent with the present disclosure.
  • the GFX engine 310 is shown in greater detail to include media decryption module 502 a, overlay decryption module 502 b, decoder modules 504 a/b, GFX rendering module 506 , display engine 508 and composite encryption module 510 .
  • the media decryption module 502 a may be configured to decrypt the media content provided by the TEE and the overlay decryption module 502 b may be configured to decrypt the overlay image(s) provided by the TEE.
  • Decoder modules 504 a and 504 b may be configured to decode the video from a compressed format, such as, for example, any of the Moving Picture Experts Group (MPEG) formats to a decompressed format.
  • the GFX rendering module 506 may be configured to generate a composite of the decrypted and decoded media with the decrypted and decoded overlay image and to render the composite into frame buffers from which the display engine 508 may drive the display element 314 for viewing by a user of the device.
  • the display element 314 may be a television screen or a display element associated with a computer or mobile platform.
  • Multiple playing options may be provided to the user including real-time play, stop (pause or freeze frame), fast forward and rewind operations. These playing options may be controlled by the user, for example, through GUI 316 . Additionally, the user may specify the frame of media content to be associated with the annotations, during any of these playing options.
  • the playing option that is in use, as well as a timestamp may also be captured, for example as metadata, and included with the overlay content. Such information may be useful, for example, to indicate a media segment of particular interest that may be rewound and replayed several times.
  • overlay channel 502 b, 504 b While only one overlay channel 502 b, 504 b is shown in this illustration, for simplicity, in practice any number of overlay channels may be implemented to provide multiple layers of overlay images.
  • Composite encryption module 510 may be configured to re-encrypt the composite image rendered by module 506 prior to transmission (e.g., through the host processor and/or network interface) to other devices for sharing with other users.
  • the encryption may be performed using the CEK or a key derived from the CEK.
  • the content may remain protected, and other users will require an appropriate decryption key to view the content (and overlays) which may be obtained, for example, with a subscription through the license server.
  • the transmission may be directed to a social media site to facilitate sharing, although the content remains encrypted to restrict viewing to subscribed users on trusted devices.
  • the overlay may be encoded as a separate package of metadata or instructions for construction of the overlay.
  • multiple overlays which may be contributed by multiple users during the sharing process, may be more easily distinguished, separated and/or removed as desired by any particular user. For example, a user may wish to remove the current overlay before adding their own overlay.
  • the associated media snapshot remains secure and may not be otherwise modified.
  • the graphics engine (GFX) 310 may be a secure graphics engine working in coordination with the TEE 306 and protected memory 312 .
  • the GFX may include its own TEE 512 to protect, for example, the Media decryption modules 502 a, 502 b and/or the composite encryption module 510 .
  • the GFX may implement Software Guard Extension (SGX) or other suitable technology, to isolate execution of threads to provide this protection.
  • SGX Software Guard Extension
  • the TEE module 306 may be configured to perform the authentication function (module 408 ) and provide the CEK to the GFX engine 310 .
  • the GFX 310 may be configured to directly receive the encrypted subscription media content from the host processor and decrypt it locally (in the GFX) using the CEK.
  • the GUI 316 may be incorporated in the GFX 310 .
  • FIG. 6 illustrates a flowchart of operations 600 of another example embodiment consistent with the present disclosure.
  • the operations provide a method for secure sharing of user annotated subscription media content.
  • a request for secure content playback is received from the user, then at operation 604 , a remote authentication with the license server is performed to obtain a content license.
  • the secure content is decrypted, decoded and played using a key associated with the content license.
  • a determination is made, at operation 608 , as to whether the user wants a snapshot taken at any point during the content playback. If so, then at operation 610 , the user specifies a frame for the snapshot and provides any desired overlay features such as text, labels, drawings, etc.
  • a graphics processor e.g., GFX engine securely generates a composition of the snapshot frame and the overlay features.
  • the graphics processor encrypts the composition, for example using the content license key.
  • the encrypted composition is transmitted to remote trusted devices for sharing.
  • FIG. 7 illustrates a flowchart of operations 700 of another example embodiment consistent with the present disclosure.
  • the operations provide a method for secure sharing of subscription media content.
  • subscribed media content received from a content server, is decrypted.
  • the decrypted subscribed media content is played to a display element of a user device.
  • a snapshot request is received from the user.
  • the snapshot is associated with a frame of the decrypted subscribed media content.
  • annotation information is received from the user.
  • an overlay image is generated based on the annotation information.
  • a composite image of the overlay image and snapshot is generated and encrypted.
  • the encrypted composite image is shared with other users.
  • FIG. 8 illustrates a system diagram 800 of one example embodiment consistent with the present disclosure.
  • the system 800 may be a mobile platform 810 or computing device such as, for example, a smart phone, smart tablet, personal digital assistant (PDA), mobile Internet device (MID), convertible tablet, notebook or laptop computer, or any other suitable device.
  • PDA personal digital assistant
  • MID mobile Internet device
  • the system 800 may be a workstation or desktop computer.
  • the device may generally present various interfaces to a user via a display element 314 such as, for example, a touch screen, liquid crystal display (LCD) or any other suitable display type.
  • LCD liquid crystal display
  • the system 800 is shown to include host processor 302 that may further include any number of processors or processor cores and associated memory 830 .
  • processors or cores
  • These processors may be any type of processor, such as, for example, a micro-processor, an embedded processor, a digital signal processor (DSP), a network processor, a field programmable gate array or other device configured to execute code.
  • the processors may be multithreaded cores in that they may include more than one hardware thread context (or “logical processor”) per core.
  • the memory 830 may be coupled to the host processors.
  • the memory 830 may be any of a wide variety of memories (including various layers of memory hierarchy and/or memory caches) as are known or otherwise available to those of skill in the art.
  • processors and memory may be configured to store, host and/or execute one or more user applications or other software modules.
  • applications may include, but not be limited to, for example, any type of computation, communication, data management, data storage and/or user interface task.
  • these applications may employ or interact with any other components of the mobile platform 810 .
  • System 800 is also shown to include network interface module 820 which may include wireless communication capabilities, such as, for example, cellular communications, Wireless Fidelity (WiFi), Bluetooth®, and/or Near Field Communication (NFC).
  • wireless communication capabilities such as, for example, cellular communications, Wireless Fidelity (WiFi), Bluetooth®, and/or Near Field Communication (NFC).
  • WiFi Wireless Fidelity
  • Bluetooth® Bluetooth®
  • NFC Near Field Communication
  • the wireless communications may conform to or otherwise be compatible with any existing or yet to be developed communication standards including past, current and future version of Bluetooth®, Wi-Fi and mobile phone communication standards.
  • System 800 is also shown to include a storage device 304 , display element 314 , graphics engine 310 , TEE 306 , NVM 308 , GUI 316 and protected memory 312 configured to operate as described previously for secure sharing of subscription media content.
  • the various components of the system 800 may be combined in a system-on-a-chip (SoC) architecture.
  • the components may be hardware components, firmware components, software components or any suitable combination of hardware, firmware or software.
  • Embodiments of the methods described herein may be implemented in a system that includes one or more storage mediums having stored thereon, individually or in combination, instructions that when executed by one or more processors perform the methods.
  • the processor may include, for example, a system CPU (e.g., core processor) and/or programmable circuitry.
  • a system CPU e.g., core processor
  • programmable circuitry e.g., programmable circuitry.
  • operations according to the methods described herein may be distributed across a plurality of physical devices, such as, for example, processing structures at several different physical locations.
  • the method operations may be performed individually or in a subcombination, as would be understood by one skilled in the art.
  • the present disclosure expressly intends that all subcombinations of such operations are enabled as would be understood by one of ordinary skill in the art.
  • the storage medium may include any type of tangible medium, for example, any type of disk including floppy disks, optical disks, compact disk read-only memories (CD-ROMs), compact disk rewritables (CD-RWs), digital versatile disks (DVDs) and magneto-optical disks, semiconductor devices such as read-only memories (ROMs), random access memories (RAMs) such as dynamic and static RAMs, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), flash memories, magnetic or optical cards, or any type of media suitable for storing electronic instructions.
  • ROMs read-only memories
  • RAMs random access memories
  • EPROMs erasable programmable read-only memories
  • EEPROMs electrically erasable programmable read-only memories
  • flash memories magnetic or optical cards, or any type of media suitable for storing electronic instructions.
  • Circuitry may include, for example, singly or in any combination, hardwired circuitry, programmable circuitry, state machine circuitry, and/or firmware that stores instructions executed by programmable circuitry.
  • An app may be embodied as code or instructions which may be executed on programmable circuitry such as a host processor or other programmable circuitry.
  • a module as used in any embodiment herein, may be embodied as circuitry.
  • the circuitry may be embodied as an integrated circuit, such as an integrated circuit chip.
  • the present disclosure provides systems, devices, methods and computer readable media for secure sharing of subscription media content.
  • the following examples pertain to further embodiments.
  • Example 1 there is provided a system for secure sharing of user annotated subscription media content.
  • the system may include: a host processor configured to arrange a secure session with a subscription media server and to receive the subscription media content from the server in an encrypted format; a trusted execution environment (TEE) including a secure processor and secure storage configured to decrypt and store the subscription media content, the decryption based on a content encryption key obtained from the server; a graphical user interface module configured to receive a snapshot frame request of the decrypted media content and associated annotation information from a user of the system; and a secure graphics engine configured to: generate a composite image including the snapshot frame and an overlay image, the overlay image based on the annotation information; and to encrypt the composite image for sharing with other users.
  • TEE trusted execution environment
  • Example 2 may include the subject matter of Example 1, and further including a display element and the secure graphics engine is further configured to play the decrypted media content to the display element.
  • Example 3 may include the subject matter of any of Examples 1 and 2, and the host processor is further configured to share the encrypted composite image with other users.
  • Example 4 may include the subject matter of any of Examples 1-3, and the sharing further includes transmitting the encrypted composite image over a network.
  • Example 5 may include the subject matter of any of Examples 1-4, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 6 may include the subject matter of any of Examples 1-5, and the encryption of the composite image is based on the content encryption key.
  • Example 7 may include the subject matter of any of Examples 1-6, and the secure graphics engine is further configured to receive the user specified frame during real-time playing of the decrypted media content, during a rewind search of the decrypted media content, during a fast forward search of the decrypted media content or during a pause of the decrypted media content.
  • Example 8 may include the subject matter of any of Examples 1-7, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • Example 9 may include the subject matter of any of Examples 1-8, and the secure graphics engine is further configured to stream the decrypted media content to a computing device or mobile platform.
  • Example 10 may include the subject matter of any of Examples 1-9, and at least a portion of the system is incorporated in a television system.
  • Example 11 may include the subject matter of any of Examples 1-10, and at least a portion of the system is incorporated in a television system set-top box.
  • Example 12 may include the subject matter of any of Examples 1-11, and at least a portion of the system is incorporated in a mobile platform.
  • Example 13 may include the subject matter of any of Examples 1-12, and the mobile platform is one of a smart phone, a smart tablet, a personal digital assistant (PDA), a mobile Internet device (MID), a convertible tablet, a notebook or a laptop computer.
  • PDA personal digital assistant
  • MID mobile Internet device
  • Example 14 there is provided at least one computer-readable storage medium having instructions stored thereon which when executed by a processor result in the following operations for secure sharing of user annotated subscription media content.
  • the operations may include: decrypting the subscribed media content received from a content server; playing the decrypted subscribed media content to a display element of a user device; receiving a snapshot request from the user, the snapshot associated with a frame of the decrypted subscribed media content; receiving annotation information from the user; generating an overlay image based on the annotation information; encrypting a composite image of the overlay image and the snapshot; and sharing the encrypted composite image with other users.
  • Example 15 may include the subject matter of Example 14, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 16 may include the subject matter of any of Examples 14 and 15, and further including the operation of receiving a content encryption key for the subscribed media from a license server based on an authentication of the user device.
  • Example 17 may include the subject matter of any of Examples 14-16, and the decrypting of the subscribed media content is based on the content encryption key.
  • Example 18 may include the subject matter of any of Examples 14-17, and the encrypting of the composite image is based on the content encryption key.
  • Example 19 may include the subject matter of any of Examples 14-18, and the sharing further includes the operation of transmitting the encrypted composite image over a network.
  • Example 20 may include the subject matter of any of Examples 14-19, and the snapshot request is received during real-time playing of the media content, during a rewind search of the media content, during a fast forward search of the media content or during a pause of the media content.
  • Example 21 may include the subject matter of any of Examples 14-20, and the playing further includes the operation of streaming the decrypted subscribed media content to a computing device or mobile platform.
  • Example 22 may include the subject matter of any of Examples 14-21, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • Example 23 there is provided a method for secure sharing of user annotated subscription media content.
  • the method may include: decrypting the subscribed media content received from a content server; playing the decrypted subscribed media content to a display element of a user device; receiving a snapshot request from the user, the snapshot associated with a frame of the decrypted subscribed media content; receiving annotation information from the user; generating an overlay image based on the annotation information; encrypting a composite image of the overlay image and the snapshot; and sharing the encrypted composite image with other users.
  • Example 24 may include the subject matter of Example 23, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 25 may include the subject matter of any of Examples 23 and 24, further including receiving a content encryption key for the subscribed media from a license server based on an authentication of the user device.
  • Example 26 may include the subject matter of any of Examples 23-25, and the decrypting of the subscribed media content is based on the content encryption key.
  • Example 27 may include the subject matter of any of Examples 23-26, and the encrypting of the composite image is based on the content encryption key.
  • Example 28 may include the subject matter of any of Examples 23-27, and the sharing further includes transmitting the encrypted composite image over a network.
  • Example 29 may include the subject matter of any of Examples 23-28, and the snapshot request is received during real-time playing of the media content, during a rewind search of the media content, during a fast forward search of the media content or during a pause of the media content.
  • Example 30 may include the subject matter of any of Examples 23-29, and the playing further includes streaming the decrypted subscribed media content to a computing device or mobile platform.
  • Example 31 may include the subject matter of any of Examples 23-30, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • Example 32 there is provided a system for secure sharing of user annotated subscription media content.
  • the system may include: means for decrypting the subscribed media content received from a content server; means for playing the decrypted subscribed media content to a display element of a user device; means for receiving a snapshot request from the user, the snapshot associated with a frame of the decrypted subscribed media content; means for receiving annotation information from the user; means for generating an overlay image based on the annotation information; means for encrypting a composite image of the overlay image and the snapshot; and means for sharing the encrypted composite image with other users.
  • Example 33 may include the subject matter of Example 32, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 34 may include the subject matter of any of Examples 32 and 33, further including means for receiving a content encryption key for the subscribed media from a license server based on an authentication of the user device.
  • Example 35 may include the subject matter of any of Examples 32-34, and the decrypting of the subscribed media content is based on the content encryption key.
  • Example 36 may include the subject matter of any of Examples 32-35, and the encrypting of the composite image is based on the content encryption key.
  • Example 37 may include the subject matter of any of Examples 32-36, and the sharing further includes means for transmitting the encrypted composite image over a network.
  • Example 38 may include the subject matter of any of Examples 32-37, and the snapshot request is received during real-time playing of the media content, during a rewind search of the media content, during a fast forward search of the media content or during a pause of the media content.
  • Example 39 may include the subject matter of any of Examples 32-38, and the playing further includes means for streaming the decrypted subscribed media content to a computing device or mobile platform.
  • Example 40 may include the subject matter of any of Examples 32-39, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

Generally, this disclosure provides systems, methods and computer readable media for secure sharing of user annotated subscription media content with trusted devices. The shared content may include user specified snapshots of the media along with user supplied annotations. The system may include a host processor configured to arrange a secure session with a server and to receive the subscription media content from the server in an encrypted format. The system may also include a trusted execution environment (TEE) comprising a secure processor and secure storage configured to decrypt and store the media content, based on a content encryption key obtained from the server. The system may further be configured to: receive a snapshot frame request and annotations from the user; generate a composite image of the snapshot and an overlay including the annotations; and encrypt the composite image for sharing with other users.

Description

    FIELD
  • The present disclosure relates to secure sharing of subscription media content, and more particularly, to secure sharing of subscription media content and user annotations with trusted devices.
  • BACKGROUND
  • Subscription media content, for example an audio/video stream of a sporting event, is typically subject to copyright protections that prohibit subscribers from sharing any or all portions of the content with other people. Security systems, such as Digital Rights Management (DRM) systems, may be employed by the subscription content providers to prevent such sharing, even if the parties involved in the sharing are all subscribers.
  • One illustrative scenario is where a group of friends are watching the same live sporting event, for example on televisions, at different physical locations. During the game, one of them may have a comment about a particular play or actions of a player that he would like to share with the group. That person's options for doing this are generally limited to texting, calling, emailing or posting the comment on a social media site, with no ability to include the relevant subscription content along with the message. This limits the quality of the viewing and sharing experience for the group, even though all group members may be legitimate content subscribers.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Features and advantages of embodiments of the claimed subject matter will become apparent as the following Detailed Description proceeds, and upon reference to the Drawings, wherein like numerals depict like parts, and in which:
  • FIG. 1 illustrates a top level system diagram of an example embodiment consistent with the present disclosure;
  • FIG. 2 illustrates an example image composition in accordance with an embodiment consistent with the present disclosure;
  • FIG. 3 illustrates a block diagram of one example embodiment consistent with the present disclosure;
  • FIG. 4 illustrates a block diagram of another example embodiment consistent with the present disclosure;
  • FIG. 5 illustrates a block diagram of another example embodiment consistent with the present disclosure;
  • FIG. 6 illustrates a flowchart of operations of one example embodiment consistent with the present disclosure;
  • FIG. 7 illustrates a flowchart of operations of another example embodiment consistent with the present disclosure; and
  • FIG. 8 illustrates a system diagram of a platform of another example embodiment consistent with the present disclosure.
  • Although the following Detailed Description will proceed with reference being made to illustrative embodiments, many alternatives, modifications, and variations thereof will be apparent to those skilled in the art.
  • DETAILED DESCRIPTION
  • Generally, this disclosure provides systems, devices, methods and computer readable media for secure sharing of subscription media content with trusted devices. The system may receive the subscribed media content from a content server, for example in an encrypted form, after authentication of the user and/or receiving device by a license server. The system may include a trusted execution environment (TEE) with a secure processor and secure memory to decrypt and securely store the subscribed media content. The system may be configured to play the media content and allow the user to specify snapshot frames and provide annotations to accompany the snapshots. The annotations may include, for example, text, drawings, labels and/or pictures. The system may further be configured to overlay the annotations on the snapshots and securely share them with other trusted devices associated with other subscribed users.
  • FIG. 1 illustrates a top level system diagram 100 of one example embodiment consistent with the present disclosure. A license server 102 and a media content server 104 are shown connected to a network 106. The content server 104 may be configured to provide media content including premium or subscription media content, such as for example, sporting events. The license server 102 may be configured to authenticate subscribed users and/or devices that are licensed to receive the subscription media content. Any number of trusted user devices 110, 112, 114 may also be connected to network 106. The trusted user devices may be configured for secure sharing of the subscription media, as described herein. The secure sharing may comply with Digital Rights Management DRM requirements. In some embodiments, a user may have both a set-top device 108, (e.g., for use with a television), and a mobile platform 110 configured to function in coordination with each other to provide secure sharing of subscription media. Functional elements of the system, as described below, maybe incorporated in either or both of the set-top box 108 and the user device 110, as appropriate. In some embodiments the license server 102 and the content server 104 may be incorporated in the same server platform and may sometimes be referred to herein simply as “server” for convenience.
  • FIG. 2 illustrates an example image composition 200 in accordance with an embodiment consistent with the present disclosure. A simplified illustration of a snapshot 202 is shown to include, for example, four players involved in a sporting event. The user may wish to make a comment, for example about how one of the players should have moved into a gap to receive the ball. This may be expressed as shown in the simplified example illustration of user annotations 204 which includes arrows and a text label “Pass.” A composite overlay 206 is shown where the snapshot 202 and the user annotations 204 are overlaid into a composite image which provides a convenient visual indication of the annotating user's intention that player 206a should move down and to the right while player 206b should pass the ball toward that location. In some embodiments, annotations may include any type of visual or graphical information that may be entered by the user, including, for example, text, drawings, labels, pictures and/or clipart. It will be understood, of course, that the methods and systems described herein are not limited to media content that depicts sporting events and may be applied to any media content including television shows, movies, etc.
  • The composite overlay image 206 thus includes a mixture of subscription content (e.g., the snapshot), which need to be handled securely, and user annotations. The composite overlay image 206 must therefore also be handled securely during both processing and sharing/distribution.
  • FIG. 3 illustrates a block diagram 300 of one example embodiment consistent with the present disclosure. The trusted device 108/110 is shown to include a host processor 302, a storage device 304, a graphics (GFX) engine 310, a display element 314, a platform trusted execution environment (TEE) 306, non-volatile memory 308, a graphical user interface (GUI) module 316 and protected memory 312. In some embodiments, the storage device 304 may be configured as a hard disk drive (HDD) or a solid state drive (SSD). The trusted device 108/110 may be a set-top device (e.g., a digital video recorder (DVR) or cable TV decoder), or a computer or mobile platform (e.g., a tablet or smartphone) or a combination thereof.
  • The host processor 302, which may include one or more processing cores, may be configured to arrange a secure session (secure channel) with the subscription media content server 104 and the platform TEE 306. The host processor 302 may communicate with the network 106 through a network interface (not shown). Arrangement of the secure session may include providing a license token from the TEE 306 to the license server 102 to validate the trusted device 108/110, and obtaining a content encryption key (CEK) from the license server 102 for provision to the platform TEE 306. The host processor 302 may also be configured to receive subscription media content from the content server 104 in an encrypted or otherwise secured format. The encrypted subscription media content may be stored on storage device 304.
  • The GUI 316 may be configured to receive annotation information from the user and generate an overlay image based on the annotation information. The annotation information may be associated with a frame of the media content, for example as it is being played or streamed to the user. The GFX engine 310 may be configured to composite the media content and the overlay image for rendering on display element 314 and for secure provisioning, over the network 106, to other users/ devices 112, 114, as will be described in greater detail below.
  • FIG. 4 illustrates a block diagram 400 of one example embodiment consistent with the present disclosure. The TEE 306 is shown in greater detail to include an authentication module 408, a media decryption module 402, a media re-encryption module 404 and an overlay encryption module 406. The TEE 306 may include a secure independent processor or co-processor and associated secure storage to perform the functions described herein.
  • The authentication module 408 may be configured to authenticate the trusted device 108/110 with the license server, for example, by providing a validation key or license token to demonstrate the existence of a valid subscription to the protected media in accordance with a licensing policy enforced by the license server. In some embodiments, a trust anchor (configured to provide the capability for the remote license server to attest/validate the client platform prior to streaming of subscription content) may be provisioned in NVM 308 or other platform hardware by the manufacturer in a manner that is resistant to user tampering. The trust anchor may be used during the authentication/validation process.
  • The media decryption module 402 may be configured to decrypt and store the subscription media in a protected and/or isolated region of the device (e.g., protected memory 312) that is tamper resistant and not directly accessible by the host processor 302 or other external entities. The decryption may be accomplished using the CEK associated with the subscription media, obtained from the license server 102 after authentication. Media re-encryption module 404 may be configured to re-encrypt the decrypted media prior to transmission to the GFX over a secure channel between the TEE and the GFX. This re-encryption may be performed using a different encryption key, such as, for example a Protected Audio/Video Path (PAVP) key managed by the device.
  • Overlay encryption module 406 may be configured to obtain the overlay image including user annotations, for example from GUI module 316, and encrypt it prior to transmission to the GFX over a secure channel between the TEE and the GFX. This overlay encryption may also be performed using a different encryption key, such as, for example the PAVP key.
  • In some embodiments, the TEE and the GFX engine may be hosted on different platforms. For example the TEE may be included in the set-top box 108 while the GFX engine may be included in the user's trusted device (e.g., a mobile platform) 110. The secure channel between the TEE and the GFX may be a local area network (LAN) connection. The encryption performed by modules 404 and 406 may prevent unauthorized access to the protected media content during this transmission.
  • In some embodiments, the TEE 306 may be configured to provide security and isolation from other entities on the device 108/110 that are outside the TEE, such as, for example, software or applications executing on the host processor 302. The isolation may prevent external entities from exercising control over, or obtaining access to, cryptographic keys, licenses and decrypted media content. In some embodiments, the TEE may comprise separate physical hardware, for example an integrated circuit (IC) that is separate from an IC associated with the host processor 302. In some embodiments, the TEE may comprise a separate controller or processor within an IC that is shared with other components of the device, including, for example, an Intel Converged Security Engine (CSE). In some embodiments, the TEE may comprise a separate domain within a controller or processor that is shared with the device. Various techniques may be employed to securely isolate the TEE including situations where hardware is being shared between the TEE and the device. These techniques may include privileged execution modes associated with the processors, access protection mechanisms associated with memory and/or the use of firmware to prevent unintended access. These may include, for example, use of the Intel Software Guard Extension (SGX), Virtualization Technology Extension (VT-x) or System Management Mode (SMM).
  • Additional non-volatile memory 308 may be provided to securely store authentication information, cryptographic keys and/or other data that the trusted device needs to maintain within the TEE.
  • FIG. 5 illustrates a block diagram 500 of one example embodiment consistent with the present disclosure. The GFX engine 310 is shown in greater detail to include media decryption module 502 a, overlay decryption module 502 b, decoder modules 504 a/b, GFX rendering module 506, display engine 508 and composite encryption module 510.
  • The media decryption module 502 a may be configured to decrypt the media content provided by the TEE and the overlay decryption module 502 b may be configured to decrypt the overlay image(s) provided by the TEE. Decoder modules 504 a and 504 b may be configured to decode the video from a compressed format, such as, for example, any of the Moving Picture Experts Group (MPEG) formats to a decompressed format. The GFX rendering module 506 may be configured to generate a composite of the decrypted and decoded media with the decrypted and decoded overlay image and to render the composite into frame buffers from which the display engine 508 may drive the display element 314 for viewing by a user of the device.
  • In some embodiments, the display element 314 may be a television screen or a display element associated with a computer or mobile platform. Multiple playing options may be provided to the user including real-time play, stop (pause or freeze frame), fast forward and rewind operations. These playing options may be controlled by the user, for example, through GUI 316. Additionally, the user may specify the frame of media content to be associated with the annotations, during any of these playing options. The playing option that is in use, as well as a timestamp, may also be captured, for example as metadata, and included with the overlay content. Such information may be useful, for example, to indicate a media segment of particular interest that may be rewound and replayed several times.
  • While only one overlay channel 502 b, 504 b is shown in this illustration, for simplicity, in practice any number of overlay channels may be implemented to provide multiple layers of overlay images.
  • Composite encryption module 510 may be configured to re-encrypt the composite image rendered by module 506 prior to transmission (e.g., through the host processor and/or network interface) to other devices for sharing with other users. In some embodiments, the encryption may be performed using the CEK or a key derived from the CEK. Thus, the content may remain protected, and other users will require an appropriate decryption key to view the content (and overlays) which may be obtained, for example, with a subscription through the license server. In some embodiments, the transmission may be directed to a social media site to facilitate sharing, although the content remains encrypted to restrict viewing to subscribed users on trusted devices.
  • In some embodiments, the overlay may be encoded as a separate package of metadata or instructions for construction of the overlay. In this way, multiple overlays which may be contributed by multiple users during the sharing process, may be more easily distinguished, separated and/or removed as desired by any particular user. For example, a user may wish to remove the current overlay before adding their own overlay. The associated media snapshot, however, remains secure and may not be otherwise modified.
  • The graphics engine (GFX) 310 may be a secure graphics engine working in coordination with the TEE 306 and protected memory 312. In some embodiments, the GFX may include its own TEE 512 to protect, for example, the Media decryption modules 502 a, 502 b and/or the composite encryption module 510. In some embodiments, the GFX may implement Software Guard Extension (SGX) or other suitable technology, to isolate execution of threads to provide this protection.
  • In an alternative embodiment, the TEE module 306 may be configured to perform the authentication function (module 408) and provide the CEK to the GFX engine 310. In this embodiment, the GFX 310 may be configured to directly receive the encrypted subscription media content from the host processor and decrypt it locally (in the GFX) using the CEK. In some embodiments, the GUI 316 may be incorporated in the GFX 310.
  • FIG. 6 illustrates a flowchart of operations 600 of another example embodiment consistent with the present disclosure. The operations provide a method for secure sharing of user annotated subscription media content. At operation 602, if a request for secure content playback is received from the user, then at operation 604, a remote authentication with the license server is performed to obtain a content license. At operation 606, the secure content is decrypted, decoded and played using a key associated with the content license. A determination is made, at operation 608, as to whether the user wants a snapshot taken at any point during the content playback. If so, then at operation 610, the user specifies a frame for the snapshot and provides any desired overlay features such as text, labels, drawings, etc. At operation 612, a graphics processor (e.g., GFX engine) securely generates a composition of the snapshot frame and the overlay features. At operation 614, the graphics processor encrypts the composition, for example using the content license key. At operation 616, the encrypted composition is transmitted to remote trusted devices for sharing.
  • FIG. 7 illustrates a flowchart of operations 700 of another example embodiment consistent with the present disclosure. The operations provide a method for secure sharing of subscription media content. At operation 710, subscribed media content, received from a content server, is decrypted. At operation 720, the decrypted subscribed media content is played to a display element of a user device. At operation 730, a snapshot request is received from the user. The snapshot is associated with a frame of the decrypted subscribed media content. At operation 740, annotation information is received from the user. At operation 750, an overlay image is generated based on the annotation information. At operation 760, a composite image of the overlay image and snapshot is generated and encrypted. At operation 770, the encrypted composite image is shared with other users.
  • FIG. 8 illustrates a system diagram 800 of one example embodiment consistent with the present disclosure. The system 800 may be a mobile platform 810 or computing device such as, for example, a smart phone, smart tablet, personal digital assistant (PDA), mobile Internet device (MID), convertible tablet, notebook or laptop computer, or any other suitable device. It will be appreciated, however, that embodiments of the system described herein are not limited to mobile platforms, and in some embodiments, the system 800 may be a workstation or desktop computer. The device may generally present various interfaces to a user via a display element 314 such as, for example, a touch screen, liquid crystal display (LCD) or any other suitable display type.
  • The system 800 is shown to include host processor 302 that may further include any number of processors or processor cores and associated memory 830. These processors (or cores) may be any type of processor, such as, for example, a micro-processor, an embedded processor, a digital signal processor (DSP), a network processor, a field programmable gate array or other device configured to execute code. The processors may be multithreaded cores in that they may include more than one hardware thread context (or “logical processor”) per core. The memory 830 may be coupled to the host processors. The memory 830 may be any of a wide variety of memories (including various layers of memory hierarchy and/or memory caches) as are known or otherwise available to those of skill in the art. It will be appreciated that the processors and memory may be configured to store, host and/or execute one or more user applications or other software modules. These applications may include, but not be limited to, for example, any type of computation, communication, data management, data storage and/or user interface task. In some embodiments, these applications may employ or interact with any other components of the mobile platform 810.
  • System 800 is also shown to include network interface module 820 which may include wireless communication capabilities, such as, for example, cellular communications, Wireless Fidelity (WiFi), Bluetooth®, and/or Near Field Communication (NFC). The wireless communications may conform to or otherwise be compatible with any existing or yet to be developed communication standards including past, current and future version of Bluetooth®, Wi-Fi and mobile phone communication standards.
  • System 800 is also shown to include a storage device 304, display element 314, graphics engine 310, TEE 306, NVM 308, GUI 316 and protected memory 312 configured to operate as described previously for secure sharing of subscription media content.
  • It will be appreciated that in some embodiments, the various components of the system 800 may be combined in a system-on-a-chip (SoC) architecture. In some embodiments, the components may be hardware components, firmware components, software components or any suitable combination of hardware, firmware or software.
  • Embodiments of the methods described herein may be implemented in a system that includes one or more storage mediums having stored thereon, individually or in combination, instructions that when executed by one or more processors perform the methods. Here, the processor may include, for example, a system CPU (e.g., core processor) and/or programmable circuitry. Thus, it is intended that operations according to the methods described herein may be distributed across a plurality of physical devices, such as, for example, processing structures at several different physical locations. Also, it is intended that the method operations may be performed individually or in a subcombination, as would be understood by one skilled in the art. Thus, not all of the operations of each of the flow charts need to be performed, and the present disclosure expressly intends that all subcombinations of such operations are enabled as would be understood by one of ordinary skill in the art.
  • The storage medium may include any type of tangible medium, for example, any type of disk including floppy disks, optical disks, compact disk read-only memories (CD-ROMs), compact disk rewritables (CD-RWs), digital versatile disks (DVDs) and magneto-optical disks, semiconductor devices such as read-only memories (ROMs), random access memories (RAMs) such as dynamic and static RAMs, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), flash memories, magnetic or optical cards, or any type of media suitable for storing electronic instructions.
  • “Circuitry”, as used in any embodiment herein, may include, for example, singly or in any combination, hardwired circuitry, programmable circuitry, state machine circuitry, and/or firmware that stores instructions executed by programmable circuitry. An app may be embodied as code or instructions which may be executed on programmable circuitry such as a host processor or other programmable circuitry. A module, as used in any embodiment herein, may be embodied as circuitry. The circuitry may be embodied as an integrated circuit, such as an integrated circuit chip.
  • Thus, the present disclosure provides systems, devices, methods and computer readable media for secure sharing of subscription media content. The following examples pertain to further embodiments.
  • According to Example 1 there is provided a system for secure sharing of user annotated subscription media content. The system may include: a host processor configured to arrange a secure session with a subscription media server and to receive the subscription media content from the server in an encrypted format; a trusted execution environment (TEE) including a secure processor and secure storage configured to decrypt and store the subscription media content, the decryption based on a content encryption key obtained from the server; a graphical user interface module configured to receive a snapshot frame request of the decrypted media content and associated annotation information from a user of the system; and a secure graphics engine configured to: generate a composite image including the snapshot frame and an overlay image, the overlay image based on the annotation information; and to encrypt the composite image for sharing with other users.
  • Example 2 may include the subject matter of Example 1, and further including a display element and the secure graphics engine is further configured to play the decrypted media content to the display element.
  • Example 3 may include the subject matter of any of Examples 1 and 2, and the host processor is further configured to share the encrypted composite image with other users.
  • Example 4 may include the subject matter of any of Examples 1-3, and the sharing further includes transmitting the encrypted composite image over a network.
  • Example 5 may include the subject matter of any of Examples 1-4, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 6 may include the subject matter of any of Examples 1-5, and the encryption of the composite image is based on the content encryption key.
  • Example 7 may include the subject matter of any of Examples 1-6, and the secure graphics engine is further configured to receive the user specified frame during real-time playing of the decrypted media content, during a rewind search of the decrypted media content, during a fast forward search of the decrypted media content or during a pause of the decrypted media content.
  • Example 8 may include the subject matter of any of Examples 1-7, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • Example 9 may include the subject matter of any of Examples 1-8, and the secure graphics engine is further configured to stream the decrypted media content to a computing device or mobile platform.
  • Example 10 may include the subject matter of any of Examples 1-9, and at least a portion of the system is incorporated in a television system.
  • Example 11 may include the subject matter of any of Examples 1-10, and at least a portion of the system is incorporated in a television system set-top box.
  • Example 12 may include the subject matter of any of Examples 1-11, and at least a portion of the system is incorporated in a mobile platform.
  • Example 13 may include the subject matter of any of Examples 1-12, and the mobile platform is one of a smart phone, a smart tablet, a personal digital assistant (PDA), a mobile Internet device (MID), a convertible tablet, a notebook or a laptop computer.
  • According to Example 14 there is provided at least one computer-readable storage medium having instructions stored thereon which when executed by a processor result in the following operations for secure sharing of user annotated subscription media content. The operations may include: decrypting the subscribed media content received from a content server; playing the decrypted subscribed media content to a display element of a user device; receiving a snapshot request from the user, the snapshot associated with a frame of the decrypted subscribed media content; receiving annotation information from the user; generating an overlay image based on the annotation information; encrypting a composite image of the overlay image and the snapshot; and sharing the encrypted composite image with other users.
  • Example 15 may include the subject matter of Example 14, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 16 may include the subject matter of any of Examples 14 and 15, and further including the operation of receiving a content encryption key for the subscribed media from a license server based on an authentication of the user device.
  • Example 17 may include the subject matter of any of Examples 14-16, and the decrypting of the subscribed media content is based on the content encryption key.
  • Example 18 may include the subject matter of any of Examples 14-17, and the encrypting of the composite image is based on the content encryption key.
  • Example 19 may include the subject matter of any of Examples 14-18, and the sharing further includes the operation of transmitting the encrypted composite image over a network.
  • Example 20 may include the subject matter of any of Examples 14-19, and the snapshot request is received during real-time playing of the media content, during a rewind search of the media content, during a fast forward search of the media content or during a pause of the media content.
  • Example 21 may include the subject matter of any of Examples 14-20, and the playing further includes the operation of streaming the decrypted subscribed media content to a computing device or mobile platform.
  • Example 22 may include the subject matter of any of Examples 14-21, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • According to Example 23 there is provided a method for secure sharing of user annotated subscription media content. The method may include: decrypting the subscribed media content received from a content server; playing the decrypted subscribed media content to a display element of a user device; receiving a snapshot request from the user, the snapshot associated with a frame of the decrypted subscribed media content; receiving annotation information from the user; generating an overlay image based on the annotation information; encrypting a composite image of the overlay image and the snapshot; and sharing the encrypted composite image with other users.
  • Example 24 may include the subject matter of Example 23, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 25 may include the subject matter of any of Examples 23 and 24, further including receiving a content encryption key for the subscribed media from a license server based on an authentication of the user device.
  • Example 26 may include the subject matter of any of Examples 23-25, and the decrypting of the subscribed media content is based on the content encryption key.
  • Example 27 may include the subject matter of any of Examples 23-26, and the encrypting of the composite image is based on the content encryption key.
  • Example 28 may include the subject matter of any of Examples 23-27, and the sharing further includes transmitting the encrypted composite image over a network.
  • Example 29 may include the subject matter of any of Examples 23-28, and the snapshot request is received during real-time playing of the media content, during a rewind search of the media content, during a fast forward search of the media content or during a pause of the media content.
  • Example 30 may include the subject matter of any of Examples 23-29, and the playing further includes streaming the decrypted subscribed media content to a computing device or mobile platform.
  • Example 31 may include the subject matter of any of Examples 23-30, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • According to Example 32 there is provided a system for secure sharing of user annotated subscription media content. The system may include: means for decrypting the subscribed media content received from a content server; means for playing the decrypted subscribed media content to a display element of a user device; means for receiving a snapshot request from the user, the snapshot associated with a frame of the decrypted subscribed media content; means for receiving annotation information from the user; means for generating an overlay image based on the annotation information; means for encrypting a composite image of the overlay image and the snapshot; and means for sharing the encrypted composite image with other users.
  • Example 33 may include the subject matter of Example 32, and the annotation information includes one or more of text, drawings, labels and pictures.
  • Example 34 may include the subject matter of any of Examples 32 and 33, further including means for receiving a content encryption key for the subscribed media from a license server based on an authentication of the user device.
  • Example 35 may include the subject matter of any of Examples 32-34, and the decrypting of the subscribed media content is based on the content encryption key.
  • Example 36 may include the subject matter of any of Examples 32-35, and the encrypting of the composite image is based on the content encryption key.
  • Example 37 may include the subject matter of any of Examples 32-36, and the sharing further includes means for transmitting the encrypted composite image over a network.
  • Example 38 may include the subject matter of any of Examples 32-37, and the snapshot request is received during real-time playing of the media content, during a rewind search of the media content, during a fast forward search of the media content or during a pause of the media content.
  • Example 39 may include the subject matter of any of Examples 32-38, and the playing further includes means for streaming the decrypted subscribed media content to a computing device or mobile platform.
  • Example 40 may include the subject matter of any of Examples 32-39, and the overlay image further includes metadata associated with the playing of the decrypted media content, the metadata indicating one of real-time play, rewind, fast forward or pause.
  • The terms and expressions which have been employed herein are used as terms of description and not of limitation, and there is no intention, in the use of such terms and expressions, of excluding any equivalents of the features shown and described (or portions thereof), and it is recognized that various modifications are possible within the scope of the claims. Accordingly, the claims are intended to cover all such equivalents. Various features, aspects, and embodiments have been described herein. The features, aspects, and embodiments are susceptible to combination with one another as well as to variation and modification, as will be understood by those having skill in the art. The present disclosure should, therefore, be considered to encompass such combinations, variations, and modifications.

Claims (24)

What is claimed is:
1. A system for secure sharing of user annotated subscription media content, said system comprising:
a secure graphics engine comprising a TEE, wherein the secure graphics engine is configured to:
receive an encrypted snapshot frame of decrypted media content and encrypted annotation information associated with the encrypted snapshot frame via a secure channel;
decrypt said encrypted snapshot frame within said TEE to obtain a decrypted snapshot frame;
decrypt said encrypted annotation information within said TEE to obtain decrypted annotation information;
generate a composite image with said TEE by overlaying an overlay image on said decrypted snapshot frame, wherein said overlay image is based on said decrypted annotation information; and
encrypt said composite image for sharing.
2. The system of claim 1, further comprising a host processor, wherein said encrypted annotation information is received from a first user, and the host processor is configured to share said encrypted composite image with other users.
3. The system of claim 2, wherein said host processor is configured to share said encrypted composite image with other users at least in part by causing the transmission of said encrypted composite image over a network.
4. The system of claim 1, wherein said decrypted annotation information comprises one or more of text, drawings, labels and pictures.
5. The system of claim 1, wherein said secure graphics engine is to encrypt said composite image with a content encryption key associated with said decrypted media content.
6. The system of claim 1, wherein said secure graphics engine is further configured to receive said encrypted snapshot frame during real-time playback of said decrypted media content, during a rewind search of said decrypted media content, during a fast forward search of said decrypted media content, or during a pause of said decrypted media content.
7. The system of claim 1, wherein said overlay image further comprises metadata associated with playback of decrypted media content, said metadata indicating one or more of real-time play, rewind, fast forward or pause of said decrypted media content.
8. The system of claim 1, wherein said secure graphics engine is further configured to stream said decrypted media content to a computing device or mobile platform.
9. The system of claim 1, wherein at least a portion of said system is incorporated in a television.
10. The system of claim 1, wherein at least a portion of said system is incorporated in a mobile device.
11. At least one non-transitory computer-readable storage medium having instructions stored thereon which when executed by a processor result in the following operations for secure sharing of annotated media content, said operations comprising:
with a secure graphics engine:
receiving an encrypted snapshot frame of decrypted media content and encrypted annotation information associated with the encrypted snapshot frame via a secure channel;
decrypting said encrypted snapshot frame within said first TEE to obtain a decrypted snapshot frame;
decrypting said encrypted annotation information within said first TEE to obtain decrypted annotation information;
generating a composite image with said first TEE by overlaying an overlay image on said decrypted snapshot frame, wherein said overlay image is based on said decrypted annotation information; and
encrypting said composite image for sharing.
12. The non-transitory computer-readable storage medium of claim 11, wherein said decrypted annotation information comprises one or more of text, drawings, labels and pictures.
13. The non-transitory computer-readable storage medium of claim 11, wherein said instructions when executed by said processor further result in the performance of the following operations comprising:
receiving encrypted media content; and
receiving a content encryption key associated with said encrypted media content from a license server.
14. The non-transitory computer-readable storage medium of claim 13, wherein said instructions when executed by said processor further result in the performance of the following operations comprising:
decrypting said encrypted media content with said content encryption key to obtain said decrypted media content.
15. The non-transitory computer-readable storage medium of claim 11, wherein said sharing comprises transmitting said encrypted composite image over a network.
16. The non-transitory computer-readable storage medium of claim 11, wherein said instructions when executed by said processor further result in the performance of the following operations comprising:
receiving, with said secure graphics engine, said encrypted snapshot frame during real-time playback of said decrypted media content, during a rewind search of said decrypted media content, during a fast forward search of said decrypted media content, or during a pause of said decrypted media content.
17. The non-transitory computer-readable storage medium of claim 11, wherein said instructions when executed by said processor further result in the performance of the following operations comprising:
streaming said decrypted media content to a computing device or mobile platform.
18. The non-transitory computer-readable storage medium of claim 11, wherein said overlay image further comprises metadata associated with said playing of said decrypted media content, said metadata indicating one of real-time play, rewind, fast forward or pause of said decrypted media content.
19. A method for secure sharing of annotated media content, comprising: with a secure graphics engine:
receiving an encrypted snapshot frame of decrypted media content and encrypted annotation information associated with the encrypted snapshot frame via a secure channel;
decrypting said encrypted snapshot frame within said first TEE to obtain a decrypted snapshot frame;
decrypting said encrypted annotation information within said first TEE to obtain decrypted annotation information;
generating a composite image with said first TEE by overlaying an overlay image on said decrypted snapshot frame, wherein said overlay image is based on said decrypted annotation information; and
encrypting said composite image for sharing.
20. The method of claim 19, wherein said decrypted annotation information comprises one or more of text, drawings, labels and pictures.
21. The method of claim 20, further comprising:
receiving encrypted media content; and
receiving a content encryption key for said encrypted media content from a license server.
22. The method of claim 21, further comprising decrypting said encrypted media content with said content encryption key to obtain said decrypted media content.
23. The method of claim 19, further comprising receiving, with said secure graphics engine, said encrypted snapshot frame during real-time playback of said decrypted media content, during a rewind search of said decrypted media content, during a fast forward search of said decrypted media content, or during a pause of said decrypted media content.
24. The method of claim 19, further comprising streaming said decrypted media content to a computing device or mobile platform.
US15/792,044 2014-11-06 2017-10-24 Secure sharing of user annotated subscription media with trusted devices Abandoned US20180139194A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/792,044 US20180139194A1 (en) 2014-11-06 2017-10-24 Secure sharing of user annotated subscription media with trusted devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/534,476 US9800561B2 (en) 2014-11-06 2014-11-06 Secure sharing of user annotated subscription media with trusted devices
US15/792,044 US20180139194A1 (en) 2014-11-06 2017-10-24 Secure sharing of user annotated subscription media with trusted devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/534,476 Continuation US9800561B2 (en) 2014-11-06 2014-11-06 Secure sharing of user annotated subscription media with trusted devices

Publications (1)

Publication Number Publication Date
US20180139194A1 true US20180139194A1 (en) 2018-05-17

Family

ID=55913150

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/534,476 Expired - Fee Related US9800561B2 (en) 2014-11-06 2014-11-06 Secure sharing of user annotated subscription media with trusted devices
US15/792,044 Abandoned US20180139194A1 (en) 2014-11-06 2017-10-24 Secure sharing of user annotated subscription media with trusted devices

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/534,476 Expired - Fee Related US9800561B2 (en) 2014-11-06 2014-11-06 Secure sharing of user annotated subscription media with trusted devices

Country Status (1)

Country Link
US (2) US9800561B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11528128B2 (en) * 2015-10-01 2022-12-13 Time Warner Cable Enterprises Llc Encryption management, content recording management, and playback management in a network environment
US11836276B2 (en) * 2018-06-29 2023-12-05 Microsoft Technology Licensing, Llc Peripheral device with resource isolation
US11921911B2 (en) 2018-10-19 2024-03-05 Microsoft Technology Licensing, Llc. Peripheral device

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9924130B2 (en) * 2013-07-15 2018-03-20 Allego Inc. Computer based training techniques for geographically distributed individuals
US10013410B2 (en) * 2016-07-22 2018-07-03 Conduent Business Services, Llc Methods and systems for managing annotations within applications and websites
KR20180071679A (en) 2016-12-20 2018-06-28 삼성전자주식회사 User terminal apparatus and controlling method of thereof
US10484354B2 (en) * 2017-02-15 2019-11-19 Telefonaktiebolaget Lm Ericsson (Publ) Data owner restricted secure key distribution
CN107465504A (en) * 2017-08-15 2017-12-12 上海与德科技有限公司 A kind of method and device for improving key safety
CN112995109B (en) * 2019-12-17 2023-05-26 阿里巴巴集团控股有限公司 Data encryption system, data encryption method, data processing device and electronic equipment
CN111262889B (en) * 2020-05-06 2020-09-04 腾讯科技(深圳)有限公司 Authority authentication method, device, equipment and medium for cloud service
CN115086428B (en) * 2021-03-11 2024-06-28 中国电信股份有限公司 Network request sending method and device and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020018449A1 (en) * 1999-06-18 2002-02-14 Digital Island, Inc. On-demand overlay routing for computer-based communication networks
US20030222994A1 (en) * 2002-05-28 2003-12-04 Sony Electronics Inc. Method and apparatus for synchronizing dynamic graphics
US20060161960A1 (en) * 2005-01-20 2006-07-20 Benoit Brian V Network security system appliance and systems based thereon
US7298849B2 (en) * 2001-06-29 2007-11-20 Intel Corporation Method and apparatus for simultaneous encryption and decryption of publicly distributed media
US7802277B2 (en) * 2006-02-15 2010-09-21 Att Knowledge Ventures, L.P. Inserting data objects into encrypted video streams
US20140015987A1 (en) * 2012-07-13 2014-01-16 Todd Harple Context based management for secure augmented reality applications
US20140021492A1 (en) * 2012-07-20 2014-01-23 3M Innovative Properties Company Structured lamination transfer films and methods
US20150086011A1 (en) * 2013-09-20 2015-03-26 Anthony Kozaczuk Wireless sharing of content between computing devices
US20160070932A1 (en) * 2014-09-10 2016-03-10 Vincent J. Zimmer Providing A Trusted Execution Environment Using A Processor

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3677001B2 (en) * 1999-12-03 2005-07-27 三洋電機株式会社 Data distribution system and recording device used therefor
US20060165233A1 (en) * 2003-12-17 2006-07-27 Masao Nonaka Methods and apparatuses for distributing system secret parameter group and encrypted intermediate key group for generating content encryption and decryption deys
US7693280B2 (en) * 2005-04-22 2010-04-06 Microsoft Corporation Rights management system for streamed multimedia content
US9277295B2 (en) * 2006-06-16 2016-03-01 Cisco Technology, Inc. Securing media content using interchangeable encryption key
EP2232365A4 (en) * 2007-12-10 2013-07-31 Deluxe Digital Studios Inc Method and system for use in coordinating multimedia devices
KR101172793B1 (en) * 2008-12-19 2012-08-10 주식회사 디지캡 Master terminal device for registering and managing the terminal device included in personal using scope, method and system for using the same
US9282289B2 (en) * 2010-12-23 2016-03-08 Citrix Systems, Inc. Systems, methods, and devices for generating a summary document of an online meeting
US9129258B2 (en) * 2010-12-23 2015-09-08 Citrix Systems, Inc. Systems, methods, and devices for communicating during an ongoing online meeting
US9269072B2 (en) * 2010-12-23 2016-02-23 Citrix Systems, Inc. Systems, methods, and devices for facilitating navigation of previously presented screen data in an ongoing online meeting
US20120287219A1 (en) * 2011-05-12 2012-11-15 Sreekanth Ravi Wireless network device configuration using image capture
US8968103B2 (en) * 2011-11-02 2015-03-03 Andrew H B Zhou Systems and methods for digital multimedia capture using haptic control, cloud voice changer, and protecting digital multimedia privacy
US9418209B2 (en) * 2012-10-02 2016-08-16 Google Technology Holdings LLC Systems and methods for manipulating sensitive information in a secure mobile environment
US9742559B2 (en) * 2013-01-22 2017-08-22 Qualcomm Incorporated Inter-module authentication for securing application execution integrity within a computing device
US8990303B2 (en) * 2013-01-31 2015-03-24 Paramount Pictures Corporation System and method for interactive remote movie watching, scheduling, and social connection
US9424443B2 (en) * 2013-08-20 2016-08-23 Janus Technologies, Inc. Method and apparatus for securing computer mass storage data
US20150269229A1 (en) * 2014-03-18 2015-09-24 Nurep, Inc. Virtual Pointer and Annotations Through Real Time Communications
US20160105388A1 (en) * 2014-10-09 2016-04-14 Footspot, Inc. System and method for digital media capture and related social networking

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020018449A1 (en) * 1999-06-18 2002-02-14 Digital Island, Inc. On-demand overlay routing for computer-based communication networks
US7298849B2 (en) * 2001-06-29 2007-11-20 Intel Corporation Method and apparatus for simultaneous encryption and decryption of publicly distributed media
US20030222994A1 (en) * 2002-05-28 2003-12-04 Sony Electronics Inc. Method and apparatus for synchronizing dynamic graphics
US20060161960A1 (en) * 2005-01-20 2006-07-20 Benoit Brian V Network security system appliance and systems based thereon
US7802277B2 (en) * 2006-02-15 2010-09-21 Att Knowledge Ventures, L.P. Inserting data objects into encrypted video streams
US20140015987A1 (en) * 2012-07-13 2014-01-16 Todd Harple Context based management for secure augmented reality applications
US20140021492A1 (en) * 2012-07-20 2014-01-23 3M Innovative Properties Company Structured lamination transfer films and methods
US20150086011A1 (en) * 2013-09-20 2015-03-26 Anthony Kozaczuk Wireless sharing of content between computing devices
US20160070932A1 (en) * 2014-09-10 2016-03-10 Vincent J. Zimmer Providing A Trusted Execution Environment Using A Processor

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11528128B2 (en) * 2015-10-01 2022-12-13 Time Warner Cable Enterprises Llc Encryption management, content recording management, and playback management in a network environment
US11836276B2 (en) * 2018-06-29 2023-12-05 Microsoft Technology Licensing, Llc Peripheral device with resource isolation
US11921911B2 (en) 2018-10-19 2024-03-05 Microsoft Technology Licensing, Llc. Peripheral device

Also Published As

Publication number Publication date
US20160134602A1 (en) 2016-05-12
US9800561B2 (en) 2017-10-24

Similar Documents

Publication Publication Date Title
US9800561B2 (en) Secure sharing of user annotated subscription media with trusted devices
US10754930B2 (en) Remotely managed trusted execution environment for digital rights management in a distributed network with thin clients
US12052343B2 (en) Systems and methods for content security
JP5756567B2 (en) Method and apparatus for dynamic and real-time advertisement insertion based on metadata within a hardware-based trust route
CN106104542B (en) Content protection for data as a service (DaaS)
KR101824484B1 (en) System and method for controlling access to protected content
CN107660286B (en) Techniques for selective content licensing and secure playback
US10455286B2 (en) Protected media decoding system supporting metadata
CN103999090B (en) Improve the startup time of streaming digital media playback
US9990473B2 (en) Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust
US9100693B2 (en) Methods and apparatuses for securing playback content
US20140123320A1 (en) Processor, processor control method, and information processing device
US10581815B2 (en) Technologies for secure mediated reality content publishing
WO2018086566A1 (en) Pvr protection method and system
EP3317796B1 (en) Remotely managed trusted execution environment for digital-rights management in a distributed network with thin clients
Mohanty et al. Media data protection during execution on mobile platforms–A review
KR101512241B1 (en) Method and system for providing contents to digital video recorder using personal virtualization based on cloud
Mikityuk et al. Digital rights management and its evolution in the context of IPTV platforms in the web domain
KR20130101627A (en) Apparatus and method for processing secure data
JP2015186227A (en) Content transmission/reception system, content transmitter, content receiver, and program

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION