WO2014059047A2 - Video distribution and playback - Google Patents
Video distribution and playback Download PDFInfo
- Publication number
- WO2014059047A2 WO2014059047A2 PCT/US2013/064175 US2013064175W WO2014059047A2 WO 2014059047 A2 WO2014059047 A2 WO 2014059047A2 US 2013064175 W US2013064175 W US 2013064175W WO 2014059047 A2 WO2014059047 A2 WO 2014059047A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- license
- asset
- player
- content
- audiovisual
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000000034 method Methods 0.000 abstract description 53
- 239000008186 active pharmaceutical agent Substances 0.000 description 19
- 238000007726 management method Methods 0.000 description 19
- 238000010586 diagram Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 11
- 239000000463 material Substances 0.000 description 9
- 238000013500 data storage Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000037406 food intake Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 238000010899 nucleation Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present disclosure relates generally to distribution of audiovisual content over a network. Description of Related Art
- a content distributor generally distributes audiovisual content, such as television shows, movies, or other videos, over a network to compatible and capable devices.
- the content distributor can receive the content from an author or other original source, such as a movie studio, and distribute it to network-connected playback devices configured to retrieve and play such content.
- the network-connected devices can be configured to request a particular audiovisual asset, which can then be transmitted directly to the device and streamed to the user or downloaded to the device and presented after it has been downloaded.
- the content can be encrypted at any point in the chain of delivery from the author to the content distributor to the playback device. An authorized device, then, would be able to decrypt the content and play it back while an unauthorized device would be unable to decrypt the content.
- systems and methods are provided for implementing and managing an audiovisual device over a network.
- the present disclosure also provides for systems and methods for providing a content delivery network with one or more network-connected audiovisual players.
- a content delivery network provider can use the systems and methods provided herein to provide an access module residing within the network-connected audiovisual player wherein the access module can be configured to control the player.
- the access module can be configured to function within a gateway environment on the player such that the gateway environment passes commands from the access module to the firmware or secure module on the player operating in a secure environment.
- each player with the access module can become a part of the content delivery network as the content delivery network provider can control the network- connected audiovisual players.
- a provider of a content delivery network can choose to write an access module (e.g. , a Java application) to function within the gateway environment of a player.
- This application can then pass application program interface ("API") commands to the player, thereby effectively establishing the audiovisual player as a part of their own network.
- API application program interface
- an audiovisual player can be configured to seed content to other audiovisual players or other nodes on the network, such as through peer-to-peer file sharing protocols (e.g., bit- torrent).
- systems and methods are provided for distributing audiovisual content over a network.
- the audiovisual content can be associated with a license that can be modified by each distributor in the distribution chain such that any attempted playback of the audiovisual content is subject to the restrictions in the associated license.
- the audiovisual content can be encrypted along the distribution chain such that only the intended and authorized recipient is able to access the content.
- the key used to decrypt the audiovisual content can itself be encrypted and delivered with the associated license, separate from or together with the audiovisual content.
- An audiovisual player that receives the audiovisual content can be configured to decrypt the license and key to enable decryption of the content.
- an audiovisual asset which has a plurality of associated presentations or versions (e.g., a theatrical cut and a director' s cut of a movie).
- the audiovisual asset can include a plurality of audiovisual clips.
- the asset can include a playlist associated with each presentation which includes a list of one or more of the plurality of audiovisual clips and an order in which to present the clips to provide the associated presentation.
- the playlist can also include a starting point and/or duration of each clip to be presented.
- this can allow a distributor of the audiovisual asset to provide access to multiple versions of the asset without providing each version as a separate digital file, saving on bandwidth, time, computing resources, and cost.
- an authoring tool which receives an audiovisual asset and generates one or more audiovisual clips, one or more presentations, and the one or more playlists associated with each presentation, wherein the playlist includes a list of the one or more audiovisual clips to present and the order in which to present them.
- the authoring tool can be configured to encode the plurality of audiovisual clips into a file format compatible with recipient devices.
- the authoring tool can be configured to generate an author license associated with the audiovisual asset.
- the author license can include access restrictions which limit or prevent access to the audiovisual asset based on included parameters.
- the author license can include a release date which limits or prevents a recipient system from accessing the audiovisual for playback before the release date.
- the authoring tool can encrypt the asset and/or the author license. In certain implementations, the authoring tool can digitally sign the license for security purposes. In some implementations, the authoring tool can receive a modified license from a content distributor and encrypt and/or digitally sign the modified license, which results in a verified license.
- an audiovisual player is provided which is configured to receive an audiovisual asset and one or more associated playlists, and present a version of the audiovisual asset based at least in part on the information provided in the playlist.
- the audiovisual player can be configured to display the presentation when a subset of the clips in the playlist is available on the playback device.
- the audiovisual player can be configured to stream the asset over the network, to playback the asset after a portion of the asset has been transferred to the device, or to playback the asset after the entirety of the asset has been transferred to the device.
- the audiovisual player can be configured to decrypt an encrypted audiovisual asset by first decrypting the license associated with the asset to obtain the asset encryption key. The audiovisual player can then use the asset encryption key to decrypt the asset for playback, if restrictions in the decrypted license are satisfied.
- the audiovisual asset is encrypted using a symmetric key.
- the audiovisual player can receive the encrypted audiovisual asset over a network or through physical ingest (e.g., using a USB drive or other connected non-transitory storage device).
- the audiovisual player can receive an encrypted license associated with the asset, wherein the encrypted license also includes the symmetric key.
- the encrypted license and symmetric key can have multiple layers of encryption.
- the license and symmetric key can be encrypted using asymmetric encryption techniques using public and private key pairs.
- the license and symmetric key can be encrypted using a first public asymmetric key associated with a global private asymmetric key present on compatible playback devices. This results in a first layer of encryption, or a base-encrypted license and symmetric key.
- the base-encrypted license and symmetric key can be encrypted using a second public asymmetric key associated with an intended recipient of the asset, such as an intermediary distributor or a playback device. This results in a target-encrypted license and symmetric key.
- the intended recipient can include the complementary private key to unwrap this second layer of encryption, to decrypt the target-encrypted license and symmetric key.
- this allows an audiovisual asset to be distributed in an encrypted state, limiting access to the asset to authorized recipient machines.
- the associated encryption key can be distributed separate from the asset and be encrypted, along with the license containing access restrictions associated with the asset, all along the chain of distribution until it arrives at an authorized playback device.
- rights management system which receives an asset and a license and encodes the asset and encrypts the license and encoded asset.
- the rights management system can modify the received license to add restrictions.
- the rights management system can digitally sign the license for validation purposes.
- the rights management system can perform multiple layers of encryption. For example, the rights management system can generate a symmetric key and encrypt the asset using this key.
- the rights management system can then encrypt the symmetric key and the modified license using a first public asymmetric key corresponding to a private asymmetric key present on authorized playback devices.
- the rights management system can perform another layer of encryption, using a second public asymmetric key corresponding to a private asymmetric key present on an intended recipient of the license and symmetric key.
- the intended recipient can be a content distributor, a playback device, or another entity in the chain of distribution.
- FIG. 1 illustrates a block diagram representing an example content distribution chain including an asset server, a content distributor, and a plurality of playback devices.
- FIG. 2 illustrates a block diagram of a rights management tool configured to provide a secure license associated with an audiovisual asset.
- FIGS. 3 A and 3B illustrate block diagrams of example distribution chains which encrypt audiovisual assets, licenses, and encryption keys.
- FIG. 4 illustrates a block diagram of multiple layers of encryption configured to limit access to an asset encryption key.
- FIG. 5 illustrates a block diagram of an example player having a gateway environment with an access module and a secure environment in communication with the access module through a library of commands.
- FIG. 6 illustrates an example file format associated with an audiovisual asset which includes a plurality of packages each with one or more playlists.
- FIGS. 7 A and 7B illustrate example playlist files dictating presentation of audiovisual clips associated with a presentation of an audiovisual asset.
- FIG. 8 illustrates example file formats associated with audiovisual clips and audiovisual chunks.
- FIG. 9 illustrates a block diagram showing the flow of data from an authoring tool to an audiovisual playback device.
- FIG. 10 illustrates a flow chart of an example method of securely distributing and playing an audiovisual asset.
- FIG. 11 illustrates a flow chart of an example method of playing an encrypted and licensed audiovisual asset.
- FIG. 12 illustrates a flow chart of an example method of licensing an audiovisual asset.
- a content distribution network can include multiple systems or components for creating audiovisual assets, encrypting the assets, providing licenses for the assets, delivering the assets, accessing the assets, decrypting the assets, and/or displaying or presenting the assets.
- Components of the system can include one or more audiovisual players, access modules on the players, an encoder system, asset servers, encryption and licensing systems, authoring tools, and the like.
- Systems in the content distribution network can be configured to control an audiovisual player through an access module or by providing the audiovisual player commands that are interpreted by the access module residing on the audiovisual player which effectively allows the system in the content distribution network to control aspects of the audiovisual player.
- the access module residing on the audiovisual player can operate in a gateway environment on the player and the access module can provide commands to modules and systems operating in a secure environment through a list of commands, the list of commands being provided in an application program interface ("API").
- API application program interface
- the API can allow a provider in the content distribution network to craft an associated or proprietary access module that provides capabilities according to the provider's desires, network characteristics, distribution model, and the like.
- the access module created by the provider can be configured to be implemented on one or more audiovisual playback devices in the content delivery network.
- FIG. 1 illustrates a block diagram representing an example content distribution chain 100 including a content distributor 105, a plurality of audiovisual players 110, and an asset server 115.
- the plurality of audiovisual players 110 are communicably coupled to a content delivery network 105 through a network connection, such as a local area network ("LAN") or wide area network (“WAN").
- the content distribution chain 100 can include multiple components configured to provide a variety of functionality to the content distributor 105.
- the content distributor 105 can include an encoder module 120, a license modulel30, a key module 140, and a distribution server 150.
- the content delivery system 100 includes one or more players 110 configured to provide or display audiovisual content on a display such as a television, monitor, or the like.
- the player 110 can be a device adapted to deliver video content to a display.
- the video content can be video having a 4096x2160 pixel resolution and a frame rate of about 60 fps.
- the player 110 can have two decoder chips which are configured to output video data with a frame rate of 120 fps and/or 4096x2160 pixel video data in stereoscopic 3D with both chips running at about 60 fps.
- the player 110 can output audio which supports 5.1 channels of 24-bit 48 kHz LPCM audio via one HDMI 1.4 connector.
- the player 110 can be configured to ingest content via a network or connected data storage (e.g., a USB drive).
- the player 110 can be configured to play back ingested content provided a license to that content is on the player 110 or is retrieved from the distributor 105.
- Each player 110 can include an access module 112 configured to receive commands from the content distributor 105. Commands can be received from any system in the content distribution network 100, such as content distributors, third-party systems, or other network-connected players 110, which allows the content distribution network 100 to operate the player 110 as an extension of the network infrastructure.
- the access module 112 can be configured to receive any number of commands from the network 105, interpret them, and send them to a secure module 114 of the player 110 which allows access to internal functionality of the player in a secure environment. In this way, providing access to the functionality of the player 110 does not provide access to the internal firmware and/or software running on the player 110. This reduces security risks associated with pirating audiovisual content.
- the access module 112 can be configured to operate within a gateway environment that is separate from the secure environment operating within the player 110 (e.g. , separate from the environment of the secure module 114).
- the access module 112 can comprise an application that resides within the player hardware, providing access to commands and functionality of the player 110.
- This provides third-party content providers as well as independent distributors access to the access module 112 via APIs or other connected servers.
- a content delivery network provider can have one or more servers that access the player 110 through the access module 112 and a different entity can issue commands to the player 110 through the servers of the content delivery network provider by way of the connection to the access module 112 of the player 110.
- the player 110 can include a playback module 116 configured to display an audiovisual asset.
- the player 110 can be implemented as a standalone device, such as a set-top box, which includes connectivity to a display device, such as a television or computer monitor. Connectivity can be accomplished through wired (e.g., HDMI cables, USB cables, etc.) or wireless means (e.g., wireless display ("WiDi"), wireless network, ("WiFi”), BLUETOOTH®, etc.) and can be unencrypted or encrypted.
- the player 110 can also be implemented as a part of a display device, such as a television.
- the player 110 can be implemented utilizing hardware, software modules, firmware, or any combination of these in an environment within the display device.
- Such hardware can include, for example and without limitation, application-specific integrated circuits ("ASIC”), field programmable gate arrays (“FPGA”), micro-processors, controllers, erasable programmable read-only memory (“EPROM”), any combination of these, or the like.
- ASIC application-specific integrated circuits
- FPGA field programmable gate arrays
- EPROM erasable programmable read-only memory
- the content distributor 105 includes an encoder module 120 configured to prepare, convert, and/or encode audiovisual assets.
- the audiovisual assets can be received from the asset server 115.
- Encoding audiovisual assets can include compressing audiovisual content according to any open or proprietary encoding and/or compression algorithm.
- the audiovisual content can be encoded to have a bit-rate that is at least about 5 Mbps and/or less than or equal to about 30 Mbps, at least about 7 Mbps and/or less than or equal to about 20 Mbps, at least about 10 Mbps and/or less than or equal to about 25 Mbps, or less than or equal to about 10 Mbps. In some embodiments, these bit-rates are achieved for an output video file having at least 4K resolution.
- the content delivery system 100 includes a license module 130 configured to assign restrictions on access to the audiovisual assets generated by the encoder module 120.
- the license module 130 receives a license associated with an audiovisual asset from the asset server 115.
- the license module 130 can modify this received license to add restrictions to the restrictions provided in the original license.
- the license module 130 can use functionality provided by one or more systems in the content distribution network 105 to impose access controls on the asset.
- the license module 130 can impose access restrictions that are general in nature (e.g., those that apply to any player attempting to access the asset) or targeted in nature (e.g., access controls specific to a player 110 or a plurality of players).
- One such access control can be limiting access to the asset during a period of time, after which access to the asset expires.
- the duration of access can depend on a payment from a user, so the license module 130 can create a unique license based on the interaction with a player 110.
- the license can be distributed along with the audiovisual asset or it can be distributed separately from the asset.
- the license module 130 allows the content distributor 105 to provide its own digital restrictions management ("DRM”) delivery platform.
- DRM digital restrictions management
- the encoder module 120 can also be configured to encrypt the audiovisual asset and/or the license using symmetric or asymmetric keys.
- the encoder module 120 can sign the license so that the audiovisual asset and the license are associated with the content distributor 105 and to increase security against piracy of the content.
- another content distributor 105 in the content distribution chain can alter the license to add restrictions on access to the asset, as described in greater detail herein.
- the content distributor 105 includes a key module 140 configured to encrypt the license created by the license module 130 and/or assets created by the encoder module 120. Encryption of the asset, signing of the license, and/or encryption of the license can occur on the key module 140.
- the key system can generate asymmetric keys (e.g., a public and private key pair) or symmetric keys for the purposes of encrypting the asset and/or license.
- the appropriate keys can be distributed to the players 110, distribution server 150, other content distributors in the distribution chain, and/or the asset server 115 for managing access to the unencrypted asset and license. This can allow for the content distribution network 100 to deliver assets to systems within the content distribution network 100 without granting unauthorized access to the asset.
- the key and/or license can be delivered to the requesting player such that the requesting player can decrypt the license and key, check the access restrictions, and decrypt the encrypted asset. If the access restrictions are not satisfied or if the encryption key is not present, the player cannot gain authorized access to the asset. For example, when an asset on a storage disk is ingested in a player, the player can contact the key module 140 to retrieve the associated license which may authorize the player to access the asset. Authorization can include checking the player's credential against the license.
- the content distributor 105 includes a distribution server 150 configured to distribute encoded assets, licenses, and/or encryption keys.
- the distribution server 150 can be configured to utilize API commands to communicate with the access module 112 on the players 110 to control aspects of the players 110 and/or to establish one or more players 110 as nodes within the network of the content distributor 105. This can enable the content distributor 105 to utilize the players 110 as seeds for audiovisual assets by controlling the players 110 to share audiovisual assets through peer-to-peer file sharing protocols (e.g., BitTorrent, Gnutella, FastTrack, etc.).
- peer-to-peer file sharing protocols e.g., BitTorrent, Gnutella, FastTrack, etc.
- a content provider or content distributor 105 can provide audiovisual assets to network connected players 110.
- Content distributors 105 can create their own content delivery networks and digital restrictions management (“DRM”) delivery platform to interface with the access module 112.
- DRM digital restrictions management
- a software development kit (“SDK”) can be provided that includes an API library and license closing tool to manage restrictions for any asset encoded and encrypted with the content distributor's DRM identification.
- FIG. 2 illustrates a block diagram of an example rights management tool 200 configured to provide a secure license 240 associated with an audiovisual asset.
- An author license 205 can be provided from a source of an asset.
- the license 205 can be stored in a license library 210 for later and convenient retrieval.
- the license can be sent to the DRM tool 215 which can add restrictions from a digital rights manager 220.
- the DRM tool can sign the license using the digital certificate 225 and encrypt the signed license using the private key 230.
- the signed license 240 can be then transmitted to the player where it is checked as a player license 245 to allow access to an associated asset.
- the encoding software package used e.g., the authoring tool
- the authoring tool automatically produces and delivers an author license, which gives the Content Distributor permission to distribute the material and sell the rights to play it.
- This author license once received by Content Distributor, can be stored in a database for subsequent use when needed.
- Content Distributor responds to a user purchasing the right to view a movie on a particular player by creating a new license, derived from this stored author license for the selected material, but adding more restrictions (such as locking it to a particular player and time window).
- a DRM tool (which may be provided by the provider of the authoring tool) produces this new license, if fed the appropriate input data: the author license for the selected material, a list of additional restrictions, content distributor's certificate and private key (for signing).
- the output of the DRM tool is the desired license with the specified restrictions, signed by the content distributor. This new license is suitable for sending to the player associated with the license. Later, when the operator of the player attempts to play the content, this license will enable decryption and playback, if all of the restrictions embedded within the license are satisfied. [0042] This restrictions file is created by the content distributor's software for each license it generates, and is fed to the DRM tool in order to provide the appropriate playback restrictions that should be embedded in the license it produces.
- the exact restrictions selected will be determined by the Content Distributor, and will depend on agreements with the content owner and the end-user purchase. If the author license specifies multiple playlists, then the DRM tool supports specifying a restrictions list for each playlist individually. This enables the Content Distributor to provide differing restrictions for each.
- a shared API library that allows third-party participation with a player through access to the access module can be provided.
- the library can include commands and routines that can be used to close the open license that is issued to a content partner for each asset created with the encoder. This can allow the third-parties to apply further DRM restrictions via a network infrastructure.
- a content or network provider can use this shared API library to access a mechanism to close the open license. These transaction-specific restrictions can be sent to and interpreted by the access module.
- the shared library is adapted to run on a variety of operating systems including UNIX, Linux, Windows, Mac OSX, Cent OS, and the like.
- the shared library API can be configured to accept as input information that can be used to create a restrictions. xml file to modify an open license.
- the inputs can include a player ID; a content provider key (e.g., an open license signed to the provider and to be closed by the provider); and an XML List which can be used by the player to execute commands and which the module unpacks and passes to the secure operating environment of the player via a defined API.
- the XML List can include, for example, a UUID of content, a lifespan restriction (e.g., dates where the asset is not valid before and/or not valid after), acceptable or allowable dates/times of play, date restrictions within a valid date range which can negate an old license, playlist creation and execution, chunklist authorization, maximum play count, region, and other limitations.
- the restrictions are verified by the access module.
- the restrictions are verified by the access module and/or the player in the secure operating environment (which can be limited, for example, to start date and time, end date and time, PIN number, and/or number of plays count).
- some checks can be considered soft checks which are required to be backed up by hardware-based checks.
- the shared library API can be configured to have the following outputs: an encrypted package or a closed license; a restriction file which can include a content partner's closed license which in some instances is not encrypted.
- a closed license will contain the original open license and all the new restrictions created.
- the access module can be configured to process commands from the shared library API and to parse the information to provide API gateway commands to the secured operating environment to control the player, command the storage, and/or distribute secondary restriction inputs to the hardware.
- the share library API in conjunction with the access module can be configured to provide analytics, decision lists for when/if a license is sent, disk management of provider-tagged assets, player control from the network, content ingest solutions (e.g., content delivery through a CDN, peer-to-peer methods, through physically attached storage, etc.).
- the content delivery network and the supplied API commands can be used to close open licenses created using the encoder.
- a closed license can contain the original license and any new restrictions created.
- a closed license can be unmodifiable, and modification would invalidate the license.
- the licensing tools and commands are not used to verify the restriction list created by the content provider.
- the access module is configured to receive the closed license and the access module can be configured to verify the restrictions list.
- the access module can be configured to add the asset and license to the player and the player can be configured to authenticate the license and enforce a limited list of restrictions at the hardware level.
- the access module and player can be configured to verify whether the asset is playable during transport control events (e.g., play, pause, stop, etc.).
- FIGS. 3 A and 3B illustrate block diagrams of example distribution chains which encrypt audiovisual assets, licenses, and encryption keys.
- the encoding and encryption process is similar whether the intended recipient of the content is a specific player (represented above as Player 1 325) or a content distributor (represented above as Distributor 1 320) who will later deliver the content to one or more players based on DRM license playback rules defined in the distribution agreement with the content owner.
- the encoding system 315 can generate encoded video files from the asset 305 which is transmitted 307 to the encoding system 315, with selectable, targeted, defined, or desired encoding parameters.
- the encoding system 315 can generate a unique ID associated with the encoded content for identification purposes.
- the encoding system 315 can generate a secret key Kl 308 to encrypt the content.
- the key Kl 308 can be encrypted using a global player public key PK-RR 312a followed by encryption with a public key PK- Dl 313a and/or PK-Pl 311a of an intended recipient.
- the public keys can be stored in a key database 310.
- the encoding/encryption system 315 can transmit the encrypted asset 317a, 317b to the respective player 1 325 and distributor 1 320.
- the encoding/encryption system 315 can transmit the encrypted key and/or license 319a, 319b to the respective player 1 325 and distributor 1 320.
- the distributor 1 320 can use its private key SK-D1 313b to decrypt the last wrapper of the encryption with PK-D1 313a by the encoding/encryption system 315.
- the player 1 325 can use the global player private key SK-RR 312b along with its private key SK-P1 313b to decrypt the license and secret key Kl 308. Using the secret key Kl 308, the player 1 325 can then decrypt the asset 305.
- the encoding system 315 can be configured to provide 2-pass variable bit-rate video encoding and encryption of video and 2-pass variable bit-rate encoding and encryption of 7.1 channel audio using, for example, HD-AAC codec.
- the encoding system 315 can be configured to provide 2-pass variable bit-rate video encoding and encryption of video and 1-pass constant bit-rate encoding of stereo audio using, for example, AAC codec.
- the encoding system 315 can be configured to provide pre-encode crop and scaling of source files.
- the encoding system 315 can be configured to provide noise reduction techniques.
- the encoding system 315 can be configured to create a variety of output file types including, for example and without limitation, .mov QuickTime compatible H.264, .mp4 non-QuickTime H.264, and/or any other proprietary output file format.
- the encoding system 315 can be configured to encrypt media files (e.g., video, audio, subtitles, etc.) using AES128.
- the encoding system 315 can be configured to support public/private key encryption, for example, using a player identification number (e.g., a 9-digit player ID or PIN). This can be used to restrict playback to the player with the appropriate identification number.
- FIG. 3B illustrates a similar encryption and distribution chain with additional levels of distribution.
- the chain includes additional distributors 2 and 3 320b and 320c, with corresponding public keys PK-D2 314a and PK-D3 316a and private keys SK-D2 314b and SK-D3 316b.
- the distribution system also includes additional players 2 and 3 325b, 325c with corresponding public and private keys SK-P2, SK-P3 and PK-P2, PK-P3. Each player has a copy of the global player private key SK-RR 312b.
- the asset 305 is encrypted through every link in the distribution chain.
- Each distributor can receive and transmit the encrypted asset without decrypting and/or encrypting the asset themselves, reducing costs and burdens on the distributors. Multiple distributors can be present in the chain. Also, the asset can be encrypted with the same secret key thereby making one encrypted copy which can be saved and distributed from one or more locations, saving on storage and computation. It should be noted that content and licenses may be distributed separately and at different times.
- Public keys can be generated and disseminated to appropriate links in the chain through a registration process.
- each link in the chain can have access to the intended recipient's public key to allow secure transmission of licenses and secret keys.
- content can be broadcast to multiple players by encrypting the secret key Kl 312b using only the global player public key PK-RR.
- FIG. 4 illustrates a block diagram of multiple layers of encryption configured to limit access to an asset encryption key.
- Content keys Kl, K2 can be encrypted one or more times and are not generally fully unwrapped or decrypted until they are delivered to the target playback device. Because only authorized devices contain the global player private key SK-RR, a content distributor does not generally decrypt the content keys Kl, K2.
- an upstream entity that delivers the keys to the distributor encrypts the messages using the distributor's public key PK-D1. This allows distributor 1 to unwrap one layer of the encrypted content and then re-wrap the encrypted content in an encryption using an intended recipient' s public key.
- a first content key Kl 415 can be encrypted using a global public key PK- RR, creating a first encryption envelope 410.
- This first envelope 410 can be further encrypted using an intended recipient's public key, which in this case can be PK-D1, corresponding to distributor 1 450.
- This generates a second envelope 405.
- a second content key K2 430 can be encrypted in two envelopes 420, 425 using the same public keys.
- These encrypted envelopes 405, 420 can be transmitted to the distributor 1 450 which can use its private key SK-D1 404 to unwrap the outer envelopes 405, 420.
- the distributor can then generate another exterior encryption envelope for each intended recipient player, which entails creating the envelopes 465, 470, 475, and 480 using player l's public key PK-P1 401 for envelopes 465 and 470, player 2's public key PK-P2 402 for envelop 475, and player 3's public key PK-P3 403 for envelop 480.
- each player has corresponding private keys and a global private key SK- RR to allow full unwrapping or decryption of the content keys Kl 415 and K2 430. This can allow players to decrypt corresponding assets encrypted with the symmetric content keys Kl, K2.
- Audiovisual Player with a Gateway Environment and Secure Environment
- FIG. 5 illustrates a block diagram of an example player 500 having a gateway environment 505 with an access module 506 and a secure environment 510 in communication with the access module 506 through a library of commands 508.
- the player 500 can receive an asset and license/key from an asset source 550 (e.g., local storage or over a network).
- the player can include a secure module 520 operating within the secure environment which can decrypt the asset and license received from the asset server.
- the license can be decrypted using the private key SK-P1 513 in the license decrypt module 512. This can allow the player 500 to extract restrictions 511 which act to limit access to the asset.
- the asset key can be decrypted in the key decrypt module 515 using the global private key SK-RR 514. This allows the asset key Kl 516 to be revealed and used in the asset decrypt module 517 to decrypt the asset.
- the asset decrypt module can check the restrictions 511 from the license to verify the player 500 is allowed to access the unencrypted asset. Once decrypted, the asset can be passed to a playback module 525 which generates an audiovisual data stream corresponding to the asset. In some embodiments, the playback module 525 checks the restrictions 511 to verify that the player is permitted to generate the audiovisual data stream. In some embodiments, the generated audiovisual data stream is dictated by the asset, such as through one or more playlists present in the asset, as described herein.
- the player 500 may be designed as an IP network AV server configured to receive, cache, and/or decode videos encoded in .MP4 (e.g., 720p, 1080p), .RED (e.g., 2K or 4K) or .R3D (e.g., 4K , 5K , 6K) file formats, for example.
- Files may be received over Ethernet or 802.11 wireless links, on USB, SSD, SD or CF media, or read from internal SATA or external USB, FireWire or SATA based storage, for example and without limitation.
- Video playback could be progressive scan or interleaved, and can include resolutions ranging from 480i, to 720p, to 1080p, to 4K, to 10K.
- the player 500 can be configured to provide RGB image processing and monitoring; RAW to RGB conversion; video and audio outputs via HDMI; video and audio monitoring outputs via HDMI and/or RCA; internal SATA media port empty or with SSD or other storage device; USB, FireWire 800 and/or e-SATA external storage ports; gigabit Ethernet network/control/key exchange interface; download of media to internal memory or attached storage; 7 .1 channel 24-bit 48 kHz LPCM surround sound output; remote control from, for example, RF4CE wireless controllers, iPad, laptop, smartphone, or other 802.11 WiFi device; and digital rights management.
- the player 500 can be configured to support up to 4K resolution RGB or 4:2:2 video, via four HDMI 1.3 connectors, each operating at up to 2K resolution.
- the player 500 can be configured to support 8 or fewer channels of 24-bit 48 kHz uncompressed LPCM audio on an HDMI 1.4 connector, and two channel analog mix down at consumer line level (- 10 dBv) on RCA connectors.
- the player 500 can be configured to provide instant play capability as soon as enough media has been cached to memory.
- an encrypted media file e.g., with DRM
- the file may be decrypted in real time during playback.
- the player 500 can support a secure boot, executing authentic firmware signed by an authorized source. This can defend against a possibility of altered code being run on the player and can allows for a secure setup of the API that controls access to the security services in the system.
- Encoded content can be fed into the system (through a local drive or over a network, for example) in an encrypted form.
- the system can be configured to extract the content key for decryption which can be transferred to the decryption module, to decrypt the content and send it to the playback module in real time.
- a request by a user to play back content can result in the player 500 requesting a license which is valid for the combination of the asset's identification and the player's identification.
- the license can be downloaded to storage or through the network.
- a license Once a license is obtained for the requested content and player combination, it can be authenticated to exclude false DRM licenses that would permit unauthorized rights.
- Authentication of a license involves verifying its signature. The public key of the specified signer is used to turn the signature into a hash, then that value is compared against the computed value of the hash of the DRM license. A match can indicate that the signature is authentic.
- a DRM license can be signed directly by the DRM provider or by an approved content distributor. The public key or digital certificate from the content distributor, stored on the player 500, can be used to perform license authentication on the player 500. To guard against tampering of certificates, they can also be signed (and so authenticated).
- This process of authenticating a signature, and then repeating the process on the signer's signature (and so on) can be referred to as a "signing chain.”
- the signing chain can lead back to a root of trust, which can be a root public key present on a player. This can provide a hardware mechanism that allows the player 500 to trust all the nodes in a properly signed certificate chain, and therefore to trust the DRM license found at the top of the chain.
- a DRM license Once a DRM license has been authenticated, the rights within the license can be checked against the action requested. This includes checking one or both of allowed first and last play dates/times, and allowed maximum number of play-outs. If multiple licenses are found for a combination of player identification and asset identification, each license can be authenticated and read, as they may provide varying levels of permission on different dates.
- the content key Kl embedded with the license can be extracted. This may be accomplished by decrypting the content key Kl using the private key SK-Pl of the specific player, followed by decrypting using the global private key SK-RR.
- the following commands can be used to communicate with and control a content manager or access module on a player over a network.
- the access module can be configured to support a variety of commands which trigger actions on the player.
- the access module can be configured to support a discovery command configured to utilize a user datagram protocol (“UDP") broadcast for discovery purposes.
- UDP user datagram protocol
- the module can be configured to support an acknowledgement command, wherein the acknowledgement includes an internet protocol (“IP”) address of the player and a Player ID Port.
- IP internet protocol
- the access module can be configured to support a register command which includes a public key, session key (with an associated timeout), event data, and that is configured to encrypt and register a connection into the player.
- the access module can be configured to support an information request, where information can include a PIN number of the player, the player's current state, a player ID, a player port, a player name, system information, disk or storage information, CPU information, memory information, and content information.
- the access module can be configured to support a change of state set of commands which can include, for example, play, pause, stop, rewind, forward, load, etc.
- the access module can be configured to support a content manager set of commands which includes list content, provide content information, provide UUID details of assets, add an asset, read an asset, write an asset to disk, etc.
- the access module can be configured to support a set of display commands that include a request to display information on screen (e.g., display up to about 128 text characters in an on-screen display) and/or display information on a connected device (e.g., display up to about 128 text characters in an iPad or other similar tablet device or smartphone).
- a set of display commands that include a request to display information on screen (e.g., display up to about 128 text characters in an on-screen display) and/or display information on a connected device (e.g., display up to about 128 text characters in an iPad or other similar tablet device or smartphone).
- Accessing and playing an asset on a player can include several APIs. Access and playback of an asset on the player can be accomplished through a remote control and/or through a device connected to a common local area network with the player.
- the player or access module can be configured to query a license system regarding the player's status of rights in relation to the asset. For example, the player can query the access module to check to see if an asset is validated and authorized when requested on the player through the use of a remote control or network-connected controller.
- a mass storage device e.g., physically ingested
- the player can decide whether to accept or reject it.
- the player can be configured to display information about ingest progress.
- An example of physically ingesting an asset can include a user inserting an asset on a USB device in the player.
- the matching license may be on the asset server.
- the access module displays a "Load Console" on the display.
- the OSD asks for confirmation - select 'YES' , I want to add this movie to my library.
- the access module After it finishes writing the Asset to the disk, the access module will get an 'event' from the player firmware, confirming the addition. The access module will check if the asset simply requests its matching key, which could have been generated as a player- specific key or open. Or, if the asset is created in an encoder module by encrypting to a content distributor' s DRM, then the access module will check back to the server to see if a license, associated with that asset is also associated with that player.
- the access module will download it, if there is not a player associated license, the access module will leave it as is and if there is an attempt to player that movie, the User will get and error (OSD) indicating they need to buy authorization to view that movie. [0073] If a matching license for that asset and for that player exists, then the access module will download it into the access module environment which will pull everything from the server and pass commands to the player and it will start playing.
- OSD error
- Access module can be communicating with its home datacenter and will even check as it's playing.
- the access module can be configured to provide a response.
- the access module can talk to the content partner's server. When the system says, 'download this movie,' the access module starts to pull the asset into the player. As downloading begins, the access module tells the player content manager, 'write this,' 'write this,' 'write this,' etc. as it regards the chunks associated with the movie, until it has been downloaded to an acceptable size, (e.g., a partial or entire movie).
- an acceptable size e.g., a partial or entire movie.
- the access module will also communicate with partner's server to say this movie is available for viewing immediately.
- the access module can call home to alert the associated user account that an asset is on the player whether it has been pre-seeded by a content provider or added locally.
- the user can be displayed two icons on any given movie as they browse the content distributor's catalogue. First, they can be shown if an unauthorized asset is already on the player thus requiring only a purchase and small authorization package to be downloaded, and secondly, they can be shown if an already authorized asset is ready to play immediately.
- a movie can be ingested partially over the network and partially through local data storage.
- the access module can begin by reading the chunklist and playlist associated with the package structure. The access module can then communicate to the content partner's server and download the missing chunks associated with the package definition.
- the access module can be configured to respond to a defined command set, in the form of API gateway commands that are sent from a software environment (e.g., a Java Virtual Machine environment) on the player, to the player's secure firmware environment.
- a software environment e.g., a Java Virtual Machine environment
- These commands can be specially-defined binary commands.
- the commands do not utilize the RCP protocol.
- the command set can be provided utilizing an SDK which allows a content delivery provider to manage their own programs, separate from the provider of the player software environment. This can allow providers to improve or optimize communication with players on their network utilizing access modules that are created by the providers. In some embodiments, the providers can design access modules that provide local management of licensing and manage progressive downloads from the content provider' s network.
- FIG. 6 illustrates an example file format associated with an audiovisual asset which includes a plurality of packages 605a, 605b each with one or more playlists.
- Material intended for playback may be formatted into a structure of multiple files, with those files in specific formats.
- Automated authoring tools can be used to author material into a compatible format.
- a package 605a, 605b is a related collection of all files necessary for playback of one or more presentations. Multiple packages can be prepared that relate to the same project (for example, different language localizations of the same movie). To tie these related packages together, each package contains a TitlelD value. Related packages should all refer to the same parent title, by having identical TitlelD values. Note that there is no actual file for the Title Family 600. Most files in packages have identifiers that specify the package (PackagelD) and title (TitlelD) to which the file belongs.
- the manifest is contained in a package 605a, 605b, and can be configured to represent the head of the package and provide its identity, to itemize other files that should be present in the package and the UUID for each, to provide information to authenticate other files in the package, and to be signed by the package creator.
- the manifest can be signed by the content creator, using the authoring tool.
- a verified signature can ensure the contents of the manifest are correct. Since the manifest can also include the hash digest of other assets in the package, then those assets can be authenticated as well.
- Metadata in the package 605a, 605b can represent data associated with a movie or audiovisual asset.
- This file can be included in the list of assets in the manifest, but its hash and size may not be recorded there. This allows a content distributor to provide value-added metadata at the behest of the content owner, after the package has already been authored and uploaded to the content distributor. Because the integrity hash for the metadata file is absent from the package manifest, the metadata file must be signed by the content distributor so it can be authenticated.
- Each package can include one or more playlists.
- Each playlist can be presented to the user as a playable object, and therefore must be given a title that makes it clear to the user what material the playlist presents.
- Each playlist contains multiple tracks, one each for video, audio, and subtitles (if present).
- Each playlist may contain all the information needed to play a complete presentation, using other assets in the package as building blocks. For example, audio, video, and subtitles are stored as separate clips. In some cases, each track may be broken into multiple clips.
- the playlist contains the references to the proper files, including the timing information to allow presentation of the material seamlessly.
- Multiple edits of a movie can be presented simply by including multiple playlists.
- a director's cut could include references to scenes that are deleted (not referenced) in the standard playlist.
- the authoring tool will break the material into clips appropriately to allow the playlists to assemble the required versions from the same building blocks.
- the playlists can reference multiple clips corresponding to video, audio, subtitles, and/or images. By piecing the clips together in the way the playlist indicates, multiple presentations can be created for a single asset.
- Playlist 1 can include clips referenced by Playlist 2, allowing playlist 1 to include all the information from Playlist 1 and at least a portion of Playlist 2.
- Each movie can be broken up into multiple, randomly accessible, video and audio segments (audio clips or chunks) which can be joined together under the direction of a playlist.
- This technique allows multiple versions of a movie to be created by delivering an original movie segment payload, alternate video and audio segments (which may include commercials), and a plurality of playlists. These elements may be delivered at the same time, or a later time as the files representing the original movie.
- movies can be priced according to choice with respect to advertising.
- a pay-per-view choice yields a first price, X, a choice to allow advertising within the movie allows a second price, X - n (which may be free, as is the case in a general broadcast model).
- a movie may be broken up into multiple video and audio segments joined together under the direction of a playlist.
- Content owners could create alternate action segments, which can allow multiple ratings to be assigned to a single movie, hence increasing potential profits by allowing a movie to be targeted to audiences that desire, for example, PG-13 or R ratings, respectively. This might be achieved by replacing scenes that may include offensive language or nudity, with an alternate scene without that content.
- a playlist could therefore be responsible for the selection of the appropriate scenes that should be shown in order to comply with a specific rating.
- a DRM license could be restricted by time and rating or password combination, so that a content owner or consumer could choose to restrict which version of a movie can be shown prior to a time, e.g., allowing only the PG-13 playlist prior to 9 pm and/or only with entry of a password.
- one or more tags may be placed at strategic locations in the movie to provide content- specific advertising opportunities. Each tag could generate, for example, an animated graphic pop up in the lower third of the screen, and point to a commercial stored on the player's internal hard drive.
- a pop up When a pop up is displayed, it could be selected by the viewer and movie playback could be paused while the advert is played, after which the movie could resume playback from the paused location. In certain implementations, if the viewer ignored such a pop-up, the movie could continue to play uninterrupted.
- a tag could call a URL (web site) or location of a streaming video service that could provide a commercial such that the commercials do not have to preexist on the player's hard drive.
- dialog tracks could be removed from the mix, and the remaining effects tracks could be encoded as a separate mix without dialog. Dialog could then be encoded as a separate mix (possibly at a significantly lower data rate due to the spare nature of dialog across the channels) and both encoded files could be delivered to the player. On playback, the two encoded files could be decoded and remixed to re-create a combined effects-and-dialog soundtrack.
- dialog track file can be delivered to the player without additional language tracks.
- audio may be updated straightforwardly and efficiently across a network such as through a network connection (e.g., over the Internet). Additional dialog tracks may be included at the time of original movie distribution, or added as a supplementary download at a later date.
- FIGS. 7 A and 7B illustrate example playlist files dictating presentation of audiovisual clips associated with a presentation of an audiovisual asset.
- playlist files corresponding to a director's cut 705a and a theatrical cut 705b are illustrated.
- the playlist files 705a, 705b include information about video clips 710a, 710b and audio clips 715a, 715b.
- the information included with the video clips includes a duration and starting and endpoints. Because the playlists include different clips, the audiovisual data stream generated will differ between them. For example, the director's cut 705a will play clip vl 720a, followed by clip v2 720b, followed by clip v3 720 while the theatrical cut will omit clip v2 720b.
- FIG. 7B illustrates a preview playlist 705 which again contains video track information 710 and audio track information 715. However, in the preview playlist 710, only a portion of the corresponding clips is shown, such as a portion 725a of clip vl 720 and a portion 725b of clip v3. The portions and duration of the clips are indicated in the video track and audio track information 710, 715.
- Portions of clips can be used in a playlist where each clip portion begins at a sync point of the clip.
- One way to generate the location of a sync point is using an authoring tool to begin a new clip at the location of the desired sync point.
- Clips can be building blocks that make up audio, video, or subtitles of a presentation.
- Video clips can contain a large quantity of data.
- the authoring tool can split these clips into multiple chunks 815, as illustrated in FIG. 8. For example, the video clips can be broken into various sized chunks 815.
- Each video clip can have two files: a clip file 810, which can include metadata about the clip (TitlelD, PackagelD, Clip UUID, A/V parameters, and/or Hash of all chunks), and a chunklist file 805, which describes the chunks that make up the clip and can include a chunk table comprising, for each chunk, a file path, a byte offset/duration for each chunk or portion thereof (e.g., atom), a byte size, and a hash of the particular chunk.
- Other types of clips are not chunked and may therefore have no chunklist file.
- the chunklist file 805 can include chunk information 807 indicating a start, stop, and duration of each chunk making up the associated video clip.
- some of the chunks may be missing from the video clips. This situation may be desirable to conserve storage space or data delivery when portions of the clip are not yet being played. For example, when only a free preview of a movie is viewable, much of the material would not be presented during playback. [0106] Note that the chunklist.xml still refers to the missing chunks to preserve the overall timing information. Portions of the clip that correspond to missing chunks cannot be played.
- Video clips are designed to be straightforwardly transformed into a different set of chunks after authoring has already occurred using the authoring tool or another similar encoding tool.
- FIG. 9 illustrates a block diagram showing the flow of data from an authoring tool 905 to an audiovisual playback device 920 having an access module 922, as described in greater detail herein.
- An authoring tool 905 provided by an authoring provider generates a new asset, creating both an asset and a license.
- the license can be published to a content distributor 910.
- the user device 925 can also receive the asset from the content distributor's network or use an alternative transfer means.
- the content distributor 910 can create its own encrypted version of the license using the licensing tool 915.
- the content distributor 910 can make modifications to add new restrictions specific to the content distributor 910, generating a new restrictions or license file that is passed back to the authoring provider, which generates a new secret public key using their own encryption.
- the user can allow the content distributor 910 to seed the asset and license to the player 920, or simply transfer the asset onto the player 920. Assets can be seeded to the player, with or without the corresponding license.
- a user device 925 or player 920 with an asset can now download the content distributor's version of the license (generated by the content distributor 910 or the authoring provider using the licensing tool 915) which contains the original license from the authoring provider and is then used to decode the asset at the player 920.
- the access module 922 can be configured to decode the content distributor's version of the license, removing the authoring provider's license and add it to the content manager. On play, the access module 922 can be configured to verify authority of player 920 to play the movie asset.
- the access module 922 can be configured to attempt to read the restrictions in the license, and validate everything to be correct.
- the player 920 can be configured to verify the license to allow playback of the movie.
- FIG. 10 illustrates a flow chart of an example method 1000 of securely distributing and playing an audiovisual asset.
- the method can be performed by any appropriate module or system or combination of systems and modules described herein.
- an asset and license are generated. This can be done by an asset author, such as a movie studio.
- the license can be published to a content provider.
- the license can include playback restrictions to which the content distributor can add restrictions in block 1020. If restrictions are added, an authoring tool can be used to generate a new secret key and encrypt the modified license in block 1030. If restrictions are not added, the content distributor can create an encrypted distributor license in block 1025.
- the asset can be transmitted to a player in block 1035.
- the original or modified license can be transmitted to the player. The player can attempt to decrypt the license and verify the authority of the player to access the asset in block 1045. If access is authorized, the player can decrypt and playback the asset in block 1050.
- FIG. 11 illustrates a flow chart of an example method 1100 of playing an encrypted and licensed audiovisual asset.
- the method can be performed by any appropriate module or system or combination of systems and modules described herein.
- a player receives an asset and a license, which both may be encrypted.
- the asset can be encrypted using a symmetric key.
- the license can be encrypted with multiple levels of encryption using public keys resident on the player.
- the player identifies access restrictions which can include decrypting the license and reading the associated restrictions in the license file.
- the player receives a request to access a presentation of the asset. This can include a user generating a request to watch a particular version of an asset, such as a director's cut of a movie. This can also be initiated by a third-party with authorized access to the player through the use of API commands sent to an access module present on the player.
- the player checks whether the player has access to the requested presentation by checking the access restrictions in the license. If access is denied, the player waits for another request to access a presentation.
- the player reads a playlist associated with the requested presentation of the asset in block 1125.
- the playlist can comprise a file which lists a series of audiovisual clips to present which, when presented in the order dictated by the playlist file, provides the requested presentation.
- the player decrypts the asset using the decrypted content key delivered within an encrypted envelope, as described in greater detail herein.
- the player generates an audiovisual data stream to deliver to a display device, such as a television or computer monitor.
- a display device such as a television or computer monitor.
- the player is incorporated into a television and the audiovisual data stream is provided directly to the appropriate display circuitry for display rather than being transported over cables (e.g., HDMI) or wireless (e.g, WiDi).
- FIG. 12 illustrates a flow chart of an example method 1200 of licensing an audiovisual asset.
- the method can be performed by any appropriate module or system or combination of systems and modules described herein.
- the license tool receives an author license associated with an audiovisual asset.
- the license tool receives a restriction list to add to the author license.
- the license tool receives a request to access the asset associated with the modified license.
- the author license is modified to include the restrictions creating a modified license in block 1220.
- the license tool signs the license with a digital certificate or encryption key, as described in greater detail herein.
- the license tool encrypts the license with two layers of encryption, the first being accomplished using a first asymmetric key corresponding to a global private key present on authorized players, and the second being accomplished using a second asymmetric key corresponding to a private key present on an intended recipient system, which can be another distributor in the chain or a player requesting access to the asset.
- the encrypted modified license is transmitted to the requesting system.
- the network 100 can include an encoder module 120.
- the encoder module 120 can be used to provide metadata tags in the asset at the point of encoding.
- the encoder module 120 can take video and audio source files and output a content package with an open license (generated by the license module 130) assigned to a particular content provider or content distributor 105.
- the asset can be configured to be inaccessible to players on the network through this open license.
- the open license for example, can be configured to not include any access restrictions but due in part to its status as an open license, no license module 130 or key module 140 would grant access to the asset when requested by a player 110.
- a content distributor 105 can detect whether a license is open by reading the XML restrictions from this license, and can choose to reject the license.
- the open license can be tagged for a particular content distributor 105 or network provider such that other entities cannot access the assets created with the encoder module 120.
- the open license can be delivered to the network or content distributor 105 and access restrictions can be assigned at a later time, such as at the time of transaction with a player requesting access to the asset.
- the encoder module 120 can be configured to accept as input sequential 16-bit TIFF, or 10-bit log DPX; 48 kHz 2 5.1 channel WAV files; video at about 24 fps or 23.98 fps; and/or select provider DRM options.
- the encoder module 120 can be configured to output a universally unique identifier ("UUID"); an encrypted asset; a manifest (e.g., a file listing the various components of the asset); metadata associated with the asset; a license that can be open and signed as associated with a particular provider; a chunklist (e.g., a list of video and audio clips and their order); playlists (e.g., information related to which video and audio clips to include in a particular version of the asset such as for a director's cut); images (e.g., for an on-screen display); and clips which can include video clips, audio clips, subtitles, or any combination of these.
- UUID universally unique identifier
- an encrypted asset e.g., a file listing the various components of the asset
- metadata associated with the asset e.g., a license that can be open and signed as associated with a particular provider
- a chunklist e.g., a list of video and audio clips and their order
- playlists e.
- an online licensing closing tool can be provided which functions to notarize the addition of network-managed secondary restrictions from a content or network provider.
- the chunks of the asset can be a set size that is not edited.
- the size of the chunk can be made to be configurable.
- the audio data rate is standard, e.g., 48 kHz, to reduce or eliminate synchronization issues.
- a license tool can be provided within this architecture to provide digital rights management functionality and to interact with any DRM systems to control player access to licensed assets.
- At least two mechanisms for delivery of licensed content can be through physical ingest and direct network delivery.
- a license may or may not be included with the content.
- a license can be delivered when a purchase is made.
- pre-seeded content e.g., content delivered to the player prior to any request by an end user
- the license can be delivered once the end user makes a purchase.
- a license tool can provide digital rights management functionality.
- the license tool can act as a mechanism to validate that the license distributed to the access module or player is valid and authorized.
- the access module can use the license to validate rules associated with asset playback and to enforce those rules.
- the license tool can restrict playback of an asset based on the parameters in the license.
- the license tool can operate in the context of the access module or player and asset servers.
- the access module can be a small application that resides on a player.
- the access module can be configured to be responsible for enforcing rights management. This can mean that when new assets are loaded the access module can validate the assets and license and inform the player if it is able to play a requested asset.
- the access module can also be configured to communicate with an asset server to verify the validity of a license, to make sure the restrictions associated with the license have not been modified, and/or to determine if a new license should be issued.
- the access module can be a conduit through which new licenses are distributed from content providers directly to a player.
- the asset servers can acts as a master authority in regard to licenses and handle creation and distribution of licenses.
- the asset server can act as the holder of master records regarding licenses.
- an access module calls home the asset server is responsible for providing a second level of validation to an already distributed license.
- the asset servers can also be responsible for the distribution and creation of licenses.
- the asset server can collect all the new restrictions and generate a new license file with a signature, which can be configured such that only an access module can validate.
- the server has the ability to encrypt the license and distribute it encrypted as an added layer of security. This can mean that only an access module can decrypt the license to add it to the player, or alternatively the access module can be configured to send a request back to the asset servers to gain the ability to decrypt the license.
- the system can be configured to work in conjunction with a website provided by a content provider.
- a content provider When an end user views the content provider's website they may be able to purchase licenses for various pieces of content, depending on the account of the end user and the chosen piece of content.
- the website can be configured to make a request to the asset server to generate a new license and distribute it through the access module to the player.
- the system can be configured to work in conjunction with physically ingesting content or assets at the player such as when a piece of content is placed on a piece of hardware (e.g., a hard drive, flash drive, optical disk, etc.) for distribution.
- the content can be distributed with or without a license. If distributed without a license, the content can be added to the player and playback can be restricted until a license is distributed and validated.
- the access module can validate the license and request an asset server to decrypt and/or validate that the license is still valid. While communicating with the server, the access module can be configured to determine if there has been an update to the license and, if so, to signal the server to generate and distribute a new license.
- the license tool can be configured to sign a license through the use of a key. This can mean that the original license is valid and can be understood by the player and asset server. Signed licenses can be configured to be nested within each other. This can mean that a license can be further restricted and embedded in a new license, then signed a second time to validate that the player, access module, and/or asset server enforce the rules and restrictions.
- the license tool can be configured to encrypt the license. This can mean that the plain text restrictive elements can be encrypted. This adds an additional level of complexity to prevent hacking. This also allows licenses to be distributed in an additional secure method.
- the encryption can be based on the restriction list or can be per player, access module, asset server, etc.
- Each piece of content can be configured to be an independent asset, capable of being accessed and played on its own.
- the asset can be configured to require a valid license in order to be played.
- a license can be used to restrict access to assets.
- the player can play a piece of content tagged for licensing when the license is valid, for example.
- the access module and asset server can be configured to add custom restrictions to a license to prevent a piece of content from being played unless the license is not only valid but meets all the rules associated with the custom restrictions.
- a content distribution system comprising an encoder module configured to receive an asset and to generate an encoded asset; a license module configured to receive an author license and to generate a modified license.
- the system also includes a key module configured to using a symmetric key, encrypt the encoded asset to generate an encrypted asset; using a first asymmetric key, encrypt the modified license and the symmetric key to generate a base-encrypted license and symmetric key; using a second asymmetric key, encrypt the base-encrypted license and symmetric key to generate a target-encrypted license and symmetric key.
- the system also includes a distribution server configured to transmit the encrypted asset and the target-encrypted license and symmetric key to a recipient system.
- the first asymmetric key comprises a public key corresponding to a private key on a playback system.
- the second asymmetric key comprises a public key corresponding to a private key on the recipient system.
- the system of embodiment 2 includes all the elements of embodiment 1, wherein the key module is further configured to generate the symmetric key.
- the system of embodiment 3 includes all the elements of embodiment 2, wherein the key module randomly generates the symmetric key.
- the system of embodiment 4 includes all the elements of any of embodiments 1 to 3, wherein the author license comprises restrictions on access to the asset.
- the system embodiment of 5 includes all the elements of embodiment 4, wherein the modified license comprises restrictions on access to the asset added to the author license.
- the system of embodiment 6 includes all the elements of any of embodiments 1 to 5, wherein the encoded asset comprises a plurality of clips of audiovisual content, and a playlist comprising a list of a subset of the plurality of clips of audiovisual content, and an order in which to present the subset of the plurality of clips of audiovisual content.
- the system of embodiment 7 includes all the elements of any of embodiments 1 to 6, wherein the encoded asset comprises a plurality of clips of audiovisual content, a plurality of versions of an audiovisual presentation, and for each of the plurality of versions of the audiovisual presentation, a playlist comprising a list of a subset of the plurality of clips of audiovisual content, and an order in which to present the subset of the plurality of clips of audiovisual content.
- the system of embodiment 8 includes all the elements of any of embodiments 1 to 7, wherein the playback system is the recipient system.
- the system of embodiment 9 includes all the elements of any of embodiments 1 to 8, wherein the recipient system is a content distributor.
- the system of embodiment 10 includes all the elements of any of embodiments 1 to 9, and further comprises a control system configured to provide commands to the recipient system, the commands being selected from a library of operations on the recipient system.
- the system of embodiment 11 includes all the elements of embodiment 10, wherein the commands are transmitted to the recipient system separate from transmission of the encoded asset.
- the system of embodiment 12 includes all the elements of embodiment 10, wherein the commands are transmitted to the recipient system separate from transmission of the target-encoded license and symmetric key.
- an audiovisual player comprising non- transitory data storage configured to store one or more private encryption keys configured to decrypt information encoded with corresponding public encryption keys; at least one computing device comprising computer hardware and configured to enable operation in at least a first computing environment and a second computing environment, the second computing environment separate from the first computing environment and providing restricted access, the at least one computing device in communication with the data storage and configured, while operating in the first computing environment, to: access a library of operations; receive commands from a content delivery system; and generate operation requests based on the received commands wherein the operation requests are selected from the library of operations; and the at least one computing device further configured, while operating in the second computing environment, to: receive operation requests from the access module; perform tasks corresponding to the received operation requests; and decrypt a license associated with the asset using the one or more private encryption keys to, the license comprising restrictions on access to the asset; and provide an audiovisual data stream corresponding to an asset.
- the audiovisual player of embodiment 14 includes all the elements of embodiment 13, wherein the audiovisual player is incorporated into a television.
- the audiovisual player of embodiment 15 includes all the elements of any of embodiments 13 to
- the audiovisual player is a standalone device configured to deliver the audiovisual data stream to a display device through a wired or wireless connection.
- the audiovisual player of embodiment 16 includes all the elements of any of embodiments 13 to
- the secure module comprises a decryption module configured to use the one or more private encryption keys to decrypt the asset.
- the audiovisual player of embodiment 17 includes all the elements of any of embodiments 13 to 16, wherein the secure module is further configured to analyze the restriction on access to the asset to determine whether an updated license should be requested.
- the audiovisual player of embodiment 18 includes all the elements of any of embodiments 13 to 17, wherein the playback module is further configured to verify whether playback of the asset is permitted based on the restrictions in the license.
- the audiovisual player of embodiment 19 includes all the elements of any of embodiments 13 to 18, wherein the asset comprises a plurality of clips of audiovisual content, a plurality of versions of an audiovisual presentation, and for each of the plurality of versions of the audiovisual presentation, a playlist comprising a list of a subset of the plurality of clips of audiovisual content, and an order in which to present the subset of the plurality of clips of audiovisual content.
- the audiovisual player of embodiment 20 includes all the elements of embodiment 19, wherein the playback module is further configured to read a playlist of the asset such that the audiovisual data stream comprises the subset of the plurality of clips of audiovisual contents provided in the order dictated by the playlist.
- the audiovisual player of embodiment 21 includes all the elements of any of embodiments 13 to 20, wherein the access module is configured to act as a node in a network upon receiving a corresponding command from the content delivery system.
- the audiovisual player of embodiment 22 includes all the elements of embodiment 21, wherein the access module is configured to provide peer-to-peer data transmission to other nodes in the network.
- the audiovisual player of embodiment 23 includes all the elements of embodiment 22, wherein the peer-to-peer data transmission utilizes the bit-torrent protocol.
- the audiovisual player of embodiment 24 includes all the elements of embodiment 22, wherein the playback module is configured to receive the asset over a network.
- the audiovisual player of embodiment 25 includes all the elements of embodiment 24, wherein the playback module is configured to provide the audiovisual data stream corresponding to the asset after the asset has been completely received.
- the audiovisual player of embodiment 26 includes all the elements of embodiment 24, wherein the playback module is configured to provide the audiovisual data stream corresponding to the asset while the asset is being received over the network.
- a method for distributing audiovisual content comprising, by one or more processors comprising digital logic circuitry, receiving an audiovisual asset comprising one or more audiovisual presentations; receiving an author license associated with the audiovisual asset, the author license comprising restrictions on access to the audiovisual asset; generating a plurality of audiovisual clips from the audiovisual asset; generating a playlist for at least one of the one or more audiovisual presentations.
- the playlist includes a list of a subset of the plurality of audiovisual clips, and an order in which to present the subset of the plurality of audiovisual clips.
- the method further includes modifying the author license to include additional restrictions on access to the audiovisual asset to create a modified license; and signing the modified license using a digital certificate to create a signed license.
- the method of embodiment 28 includes all the elements of embodiment 27, and further includes encrypting the audiovisual asset using a symmetric key; generating a base-encrypted license and symmetric key by using a first asymmetric key to encrypt the signed license and symmetric key; generating a target-encrypted license and symmetric key by using a second asymmetric key to encrypt the base-encrypted license and symmetric key; transmitting the encrypted audiovisual asset and the target-encrypted symmetric key and target-encrypted modified license to a recipient system, wherein the first asymmetric key comprises a public key corresponding to a private key on a playback system, and wherein the second asymmetric key comprises a public key corresponding to a private key on the recipient system.
- the method of embodiment 29 includes all the elements of any of embodiments 27 to 28, and further includes generating commands to transmit to the playback system, wherein the commands are selected from a library of commands on the playback system.
- a method of displaying an audiovisual presentation using an audiovisual player comprising, by one or more processors comprising digital logic circuitry, receiving an audiovisual asset wherein the audiovisual asset comprises a plurality of audiovisual clips and one or more playlists corresponding to one or more presentations of the audiovisual asset; receiving a license associated with the audiovisual asset; identifying restrictions in the license associated with the audiovisual asset; receiving a request to access one of the one or more presentations of the audiovisual asset; verifying whether the restrictions in the license allow the audiovisual asset to be accessed; reading a playlist associated with the requested presentation of the audiovisual asset; and if the restrictions in the license allow the audiovisual asset to be accessed, generating an audiovisual stream using the playlist wherein the audiovisual stream comprises a sequence of one or more of the plurality of audiovisual clips, the sequence dictated by the playlist.
- the method of embodiment 31 includes all the elements of embodiment 30, wherein the restrictions in the license comprise at least one of a date restriction, a time restriction, or a restriction on accessible presentations of the audiovisual asset.
- the method of embodiment 32 includes all the elements of any of embodiments 30 to 31, wherein receiving the audiovisual asset comprises receiving a digital file transmitted across a network.
- the method of embodiment 33 includes all the elements of embodiment 32, wherein generating the audiovisual stream occurs after receiving a portion of the audiovisual asset.
- the method of embodiment 34 includes all the elements of embodiment 33, wherein generating the audiovisual stream occurs after receiving the entirety of the audiovisual asset.
- the method of embodiment 35 includes all the elements of any of embodiments 30-34, wherein receiving the audiovisual asset comprises physical ingest of a digital file from a non- transitory storage medium releasably connected to the audiovisual player.
- the method of embodiment 36 includes all the elements of any of embodiments 30-34, further comprising authenticating the received license.
- the method of embodiment 37 includes all the elements of embodiment 36, wherein authenticating the received license comprises checking a digital signature of the received license against a root public key.
- the method of embodiment 38 includes all the elements of any of embodiments 30 to 37, further comprising decrypting the audiovisual asset using a symmetric key.
- the method of embodiment 39 includes all the elements of embodiment 38, and further includes decrypting a target-encrypted symmetric key using a first asymmetric key to obtain a base-encrypted symmetric key; and decrypting the base-encrypted symmetric key using a second asymmetric key to obtain the symmetric key, wherein the first asymmetric key is a private key corresponding to a public key used to generate the target-encrypted symmetric key, and wherein the second asymmetric key is a private key corresponding to a public key used to generate the base-encrypted symmetric key.
- the method of embodiment 40 includes all the elements of any of embodiments 30 to 39, and further includes decrypting a target-encrypted license using a first asymmetric key to obtain a base-encrypted license; and decrypting the base-encrypted license using a second asymmetric key to obtain the license, wherein the first asymmetric key is a private key corresponding to a public key used to generate the target-encrypted license, and wherein the second asymmetric key is a private key corresponding to a public key used to generate the base-encrypted license.
- a licensing system for an audiovisual asset comprising non-transitory data storage configured to store one or more public encryption keys configured to encrypt information to be decoded with corresponding private encryption keys and a content distributor certificate for signing digital licenses; at least one computing device comprising computer hardware and in communication with the data storage, the at least one computing device configured to receive an author license associated with an audiovisual asset, the author license comprising restrictions on access to the audiovisual asset; receive a restrictions list from a digital rights manager of a content distributor; receive a request from a recipient to access the audiovisual asset; generate a new license by adding restrictions to the restrictions in the author license; sign the new license using the stored content distributor certificate; and encrypt the signed license using a public encryption key associated with a recipient of the audiovisual asset.
- a content distribution system comprising a key system comprising one or more computing devices comprising computer hardware, the key system configured to using a symmetric key, encrypt an encoded asset to generate an encrypted asset; using a first asymmetric key, encrypt a modified license and the symmetric key to generate a base-encrypted license and symmetric key, the modified license derived from an author license; using a second asymmetric key, encrypt the base-encrypted license and symmetric key to generate a target-encrypted license and symmetric key; and a distribution server comprising one or more computing devices comprising computer hardware, the distribution system configured to transmit the encrypted asset and the target- encrypted license and symmetric key to a recipient system, wherein the first asymmetric key comprises a public key corresponding to a private key on a playback system, and wherein the second asymmetric key comprises a public key corresponding to a private key on the recipient system.
- the content distribution system of embodiment 43 includes all the elements
- acts, events, or functions of any of the methods described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all described acts or events are necessary for the practice of the method). Moreover, in certain embodiments, acts or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores, rather than sequentially.
- the algorithms disclosed herein can be implemented as routines stored in a memory device, such as on a non-transitory storage medium.
- computer hardware such as one or more physical processors, can be configured to execute the routines.
- the physical processors can include digital logic circuitry. In some embodiments, custom circuitry may be used.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, microcontroller, or state machine.
- a processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
- computing hardware can be used to execute a module implemented using hardware, software, firmware, or any combination of these.
- a software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of computer- readable storage medium known in the art.
- An exemplary storage medium is coupled to a processor such that the processor can read information from, and write information to, the storage medium.
- the storage medium can be integral to the processor.
- the processor and the storage medium can reside in an ASIC.
- the ASIC can reside in a user terminal.
- the processor and the storage medium can reside as discrete components in a user terminal.
- any reference to "one embodiment” or “some embodiments” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment.
- the appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
- Conditional language used herein, such as, among others, “can,” “could,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps.
- the articles “a” or “an” as used in this application and the appended claims are to be construed to mean “one or more” or “at least one” unless specified otherwise.
- a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).
- a phrase referring to "at least one of a list of items refers to any combination of those items, including single members.
- "at least one of: A, B, or C” is intended to cover: A, B, C, A and B, A and C, B and C, and A, B, and C.
- Conjunctive language such as the phrase "at least one of X, Y and Z," unless specifically stated otherwise, is otherwise understood with the context as used in general to convey that an item, term, etc. may be at least one of X, Y or Z. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z each to be present.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015534832A JP2016502295A (en) | 2012-10-10 | 2013-10-09 | Video distribution and playback |
EP13845290.9A EP2870721A4 (en) | 2012-10-10 | 2013-10-09 | Video distribution and playback |
KR1020157010474A KR20150067215A (en) | 2012-10-10 | 2013-10-09 | Video distribution and playback |
CN201380050011.4A CN105075172B (en) | 2012-10-10 | 2013-10-09 | Video distribution and playback |
Applications Claiming Priority (20)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261712172P | 2012-10-10 | 2012-10-10 | |
US201261712174P | 2012-10-10 | 2012-10-10 | |
US201261712175P | 2012-10-10 | 2012-10-10 | |
US201261712182P | 2012-10-10 | 2012-10-10 | |
US201261712185P | 2012-10-10 | 2012-10-10 | |
US201261712189P | 2012-10-10 | 2012-10-10 | |
US201261712184P | 2012-10-10 | 2012-10-10 | |
US201261712152P | 2012-10-10 | 2012-10-10 | |
US61/712,174 | 2012-10-10 | ||
US61/712,184 | 2012-10-10 | ||
US61/712,189 | 2012-10-10 | ||
US61/712,175 | 2012-10-10 | ||
US61/712,182 | 2012-10-10 | ||
US61/712,172 | 2012-10-10 | ||
US61/712,152 | 2012-10-10 | ||
US61/712,185 | 2012-10-10 | ||
US201361809279P | 2013-04-05 | 2013-04-05 | |
US201361809276P | 2013-04-05 | 2013-04-05 | |
US61/809,276 | 2013-04-05 | ||
US61/809,279 | 2013-04-05 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2014059047A2 true WO2014059047A2 (en) | 2014-04-17 |
WO2014059047A3 WO2014059047A3 (en) | 2015-07-16 |
Family
ID=50478057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/064175 WO2014059047A2 (en) | 2012-10-10 | 2013-10-09 | Video distribution and playback |
Country Status (6)
Country | Link |
---|---|
US (1) | US20140196079A1 (en) |
EP (1) | EP2870721A4 (en) |
JP (1) | JP2016502295A (en) |
KR (1) | KR20150067215A (en) |
CN (1) | CN105075172B (en) |
WO (1) | WO2014059047A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2999230A1 (en) * | 2014-09-19 | 2016-03-23 | Comcast Cable Communications, LLC | Video resolution enforcement and optimization in an adaptive bitrate environment |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130041826A1 (en) * | 2007-04-13 | 2013-02-14 | Vringo, Inc. | Content Purchaser Distribution Payment System |
US20080256627A1 (en) * | 2007-04-13 | 2008-10-16 | Heikki Kokkinen | Copyrights with post-payments for p2p file sharing |
TWI533685B (en) * | 2012-10-31 | 2016-05-11 | Inst Information Industry | Scene control system, method and recording medium |
WO2014144531A1 (en) * | 2013-03-15 | 2014-09-18 | General Instrument Corporation | Method and apparatus for secure storage and retrieval of live off disk media programs |
US10749597B2 (en) * | 2013-11-15 | 2020-08-18 | Afl Telecommunications Llc | Wireless inspection solution |
WO2015116855A1 (en) * | 2014-01-29 | 2015-08-06 | Intertrust Technologies Corporation | Secure application processing systems and methods |
US11228427B2 (en) * | 2014-02-11 | 2022-01-18 | Ericsson Ab | System and method for securing content keys delivered in manifest files |
US9706249B2 (en) * | 2014-03-14 | 2017-07-11 | Verizon Patent And Licensing Inc. | Extended, home, and mobile content delivery networks |
US9203612B1 (en) | 2014-06-02 | 2015-12-01 | Atlanta DTH, Inc. | Systems and methods for controlling media distribution |
US9130744B1 (en) * | 2014-09-22 | 2015-09-08 | Envelope, Llc | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary |
US20160316247A1 (en) * | 2015-04-27 | 2016-10-27 | Ericsson Ab | Program and device class entitlements in a media platform |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US10567357B2 (en) * | 2015-10-02 | 2020-02-18 | Zixcorp Systems, Inc. | Secure transmission system with upgraded encryption strength |
US10812543B1 (en) | 2017-02-27 | 2020-10-20 | Amazon Technologies, Inc. | Managed distribution of data stream contents |
US10715498B2 (en) * | 2017-07-18 | 2020-07-14 | Google Llc | Methods, systems, and media for protecting and verifying video files |
US10223447B2 (en) * | 2017-08-02 | 2019-03-05 | Spotify Ab | Playlist trailer |
US20190090005A1 (en) * | 2017-09-21 | 2019-03-21 | Comcast Cable Communications, Llc | Low Latency Adaptive Bitrate Linear Video Delivery System |
US11234059B1 (en) | 2018-09-04 | 2022-01-25 | Amazon Technologies, Inc. | Automatically processing content streams for insertion points |
US10904593B1 (en) | 2018-09-04 | 2021-01-26 | Amazon Technologies, Inc. | Managing content encoding based on detection of user device configurations |
US10951932B1 (en) * | 2018-09-04 | 2021-03-16 | Amazon Technologies, Inc. | Characterizing attributes of user devices requesting encoded content streaming |
US11064237B1 (en) | 2018-09-04 | 2021-07-13 | Amazon Technologies, Inc. | Automatically generating content for dynamically determined insertion points |
US11483364B2 (en) * | 2020-07-19 | 2022-10-25 | Arris Enterprises Llc | UHD HLS streaming trusted client server environment |
CN113259723B (en) * | 2021-06-28 | 2021-09-21 | 杭州海康威视数字技术股份有限公司 | Decentralized video key management method, device and system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007028099A2 (en) | 2005-09-01 | 2007-03-08 | Qualcomm Incorporated | Efficient key hierarchy for delivery of multimedia content |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
JP3994466B2 (en) * | 1997-03-26 | 2007-10-17 | ソニー株式会社 | User terminal and portable playback device |
US6973444B1 (en) * | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US7225333B2 (en) * | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
JP3471654B2 (en) * | 1999-04-06 | 2003-12-02 | 富士通株式会社 | License server, copyright holder system, user system, system, recording medium, and content use control method |
JP2000295208A (en) * | 1999-04-07 | 2000-10-20 | Ntt Communications Kk | Contents transfer/storage method, its device and program recording medium |
SG97852A1 (en) * | 2000-02-25 | 2003-08-20 | Kent Ridge Digital Labs | Method and apparatus for digital content copy protection |
JP4552294B2 (en) * | 2000-08-31 | 2010-09-29 | ソニー株式会社 | Content distribution system, content distribution method, information processing apparatus, and program providing medium |
JP4710132B2 (en) * | 2000-12-26 | 2011-06-29 | ソニー株式会社 | Information processing system, information processing method, and program recording medium |
US7409562B2 (en) * | 2001-09-21 | 2008-08-05 | The Directv Group, Inc. | Method and apparatus for encrypting media programs for later purchase and viewing |
JP3650611B2 (en) * | 2002-06-13 | 2005-05-25 | 一浩 宮本 | Program for encryption and decryption |
US20040022390A1 (en) * | 2002-08-02 | 2004-02-05 | Mcdonald Jeremy D. | System and method for data protection and secure sharing of information over a computer network |
US7305711B2 (en) * | 2002-12-10 | 2007-12-04 | Intel Corporation | Public key media key block |
US20100017627A1 (en) * | 2003-02-07 | 2010-01-21 | Broadon Communications Corp. | Ensuring authenticity in a closed content distribution system |
US20040199471A1 (en) * | 2003-04-01 | 2004-10-07 | Hardjono Thomas P. | Rights trading system |
US7594275B2 (en) * | 2003-10-14 | 2009-09-22 | Microsoft Corporation | Digital rights management system |
US20050091173A1 (en) * | 2003-10-24 | 2005-04-28 | Nokia Corporation | Method and system for content distribution |
US20050187879A1 (en) * | 2004-02-19 | 2005-08-25 | Microsoft Corporation | Persistent license for stored content |
US7617158B2 (en) * | 2004-03-22 | 2009-11-10 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for digital rights management of electronic content |
US20050273629A1 (en) * | 2004-06-04 | 2005-12-08 | Vitalsource Technologies | System, method and computer program product for providing digital rights management of protected content |
US8238554B2 (en) * | 2004-07-22 | 2012-08-07 | Sanyo Electric Co., Ltd. | Method for transmission/reception of contents usage right information in encrypted form, and device thereof |
JP4755189B2 (en) * | 2004-10-12 | 2011-08-24 | 韓国科学技術院 | Content encryption method, network content providing system and method using the same |
KR100636228B1 (en) * | 2005-02-07 | 2006-10-19 | 삼성전자주식회사 | Method for key-managing using hierarchical node topology and method for registering/deregistering a user using the same |
EP1870816A4 (en) * | 2005-02-25 | 2008-08-20 | Sharp Kk | Data management system, data management method, server device, reception device, control program, and computer-readable recording medium containing the same |
US7669219B2 (en) * | 2005-04-15 | 2010-02-23 | Microsoft Corporation | Synchronized media experience |
US20090254997A1 (en) * | 2005-09-21 | 2009-10-08 | Fathy Fouad Yassa | Method and apparatus for content rights management |
US8224751B2 (en) * | 2006-05-03 | 2012-07-17 | Apple Inc. | Device-independent management of cryptographic information |
TW200908740A (en) * | 2007-06-08 | 2009-02-16 | Koninkl Philips Electronics Nv | Vouching for source authorization |
US20090161869A1 (en) * | 2007-12-19 | 2009-06-25 | Nstreams Technologies, Inc. | Method for distributing encrypted digital content |
ES2555852T3 (en) * | 2007-12-20 | 2016-01-11 | Koninklijke Philips N.V. | Device and procedure for digital rights management |
US8621208B1 (en) * | 2009-07-06 | 2013-12-31 | Guoan Hu | Secure key server based file and multimedia management system |
EP2273409A3 (en) * | 2009-07-10 | 2013-01-16 | Disney Enterprises, Inc. | Interoperable keychest |
US8712045B2 (en) * | 2010-01-07 | 2014-04-29 | Microsoft Corporation | Digital rights management for media streams |
WO2012129549A1 (en) * | 2011-03-23 | 2012-09-27 | General Instrument Corporation | System and methods for providing live streaming content using digital rights management-based key management |
WO2013041394A1 (en) * | 2011-09-23 | 2013-03-28 | Koninklijke Kpn N.V. | Secure distribution of content |
US9928350B2 (en) * | 2012-02-17 | 2018-03-27 | Irdeto B.V. | Digital rights management |
-
2013
- 2013-10-09 JP JP2015534832A patent/JP2016502295A/en active Pending
- 2013-10-09 KR KR1020157010474A patent/KR20150067215A/en not_active Application Discontinuation
- 2013-10-09 CN CN201380050011.4A patent/CN105075172B/en not_active Expired - Fee Related
- 2013-10-09 US US14/050,240 patent/US20140196079A1/en not_active Abandoned
- 2013-10-09 EP EP13845290.9A patent/EP2870721A4/en not_active Withdrawn
- 2013-10-09 WO PCT/US2013/064175 patent/WO2014059047A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007028099A2 (en) | 2005-09-01 | 2007-03-08 | Qualcomm Incorporated | Efficient key hierarchy for delivery of multimedia content |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2999230A1 (en) * | 2014-09-19 | 2016-03-23 | Comcast Cable Communications, LLC | Video resolution enforcement and optimization in an adaptive bitrate environment |
US11853402B2 (en) | 2014-09-19 | 2023-12-26 | Comcast Cable Communications, Llc | Video resolution enforcement and optimization in an adaptive bitrate environment |
Also Published As
Publication number | Publication date |
---|---|
EP2870721A2 (en) | 2015-05-13 |
JP2016502295A (en) | 2016-01-21 |
KR20150067215A (en) | 2015-06-17 |
CN105075172A (en) | 2015-11-18 |
US20140196079A1 (en) | 2014-07-10 |
EP2870721A4 (en) | 2016-08-31 |
WO2014059047A3 (en) | 2015-07-16 |
CN105075172B (en) | 2019-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140196079A1 (en) | Video distribution and playback | |
US10754930B2 (en) | Remotely managed trusted execution environment for digital rights management in a distributed network with thin clients | |
JP4511029B2 (en) | Method and apparatus for continuous control and protection of media content | |
US9648022B2 (en) | Digital rights domain management for secure content distribution in a local network | |
US9559845B2 (en) | Systems, methods and apparatuses for the secure transmission of media content | |
US8392959B2 (en) | Portable media asset | |
US7801820B2 (en) | Real-time delivery of license for previously stored encrypted content | |
KR100859612B1 (en) | Method, apparatus and system for remote real-time access of multimedia content | |
US9641323B2 (en) | Security processing system and method for HTTP live streaming | |
KR100930303B1 (en) | Digital media contents protection system and method thereof | |
US20240179361A1 (en) | Systems and methods for managing access to content assets | |
CN110139136B (en) | Method and device for playing network television based on DRM technology | |
Serrão et al. | From OPIMA to MPEG IPMP-X: A standard's history across R&D projects |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201380050011.4 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013845290 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13845290 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase |
Ref document number: 2015534832 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20157010474 Country of ref document: KR Kind code of ref document: A |