Patent application number | Description | Published |
20090150293 | SYSTEM AND METHOD FOR DELIVERING LICENSES TO A PLAYBACK DEVICE - Dynamic assignment of rights to content, such as in a closed distribution system. Noting state information generated by an item of current content, and modifying state or rights of new content in response. Preloading or dynamically sending new content to the owner of the current content, with rights being enabled only at a later time, in the playback device, with predetermined conditions. In response to current state information, dynamically sending a license for new content from a server. Conditional or dynamic licenses to new content, including a set of rights associated with a class of possible sets of state information. Assignment of limited rights to a content, with support in a secure player to enforce them; for purposes of rental, bonus content, trials and other business models. | 06-11-2009 |
20100017501 | CONTENT MANAGEMENT AND METHOD - A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides the runtime state to that or another playback device upon request. A playback device constructed according to the technique may include a content state recovery engine for recovering runtime state that was previously stored externally to the playback device. A method according to the technique may include generating the runtime state locally, storing the runtime state externally, and re-acquiring the runtime state. | 01-21-2010 |
20100017627 | ENSURING AUTHENTICITY IN A CLOSED CONTENT DISTRIBUTION SYSTEM - A technique for maintaining encrypted content received over a network in a secure processor without exposing a key used to decrypt the content in the clear is disclosed. | 01-21-2010 |
20100031035 | BLOCK-BASED MEDIA CONTENT AUTHENTICATION - A technique for security and authentication on block-based media includes involves the use of protected keys, providing authentication and encryption primitives. A system according to the technique may include a secure device having a security kernel with protected keys. A disk drive security mechanism may support authentication of data, secrecy, and ticket validation using the security kernel and, for example, a ticket services module (e.g., a shared service that may or may not be used by other storage devices like flash). | 02-04-2010 |
20100091988 | PROGRAMMING ON-CHIP NON-VOLATILE MEMORY IN A SECURE PROCESSOR USING A SEQUENCE NUMBER - An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process. | 04-15-2010 |
20100095125 | CERTIFICATE VERIFICATION - An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process. | 04-15-2010 |
20100095134 | PROGRAMMING NON-VOLATILE MEMORY IN A SECURE PROCESSOR - An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process. | 04-15-2010 |
20110271088 | OPERATING SYSTEM CONTEXT SWITCHING - A technique for quickly switching between a first operating system (OS) and a second OS involves deactivating the first OS and booting the second OS from memory. The technique can include inserting a context switching layer between the first OS and a hardware layer to facilitate context switching. It may be desirable to allocate memory for the second OS and preserve state of the first OS before deactivating the first OS and booting the second OS from memory. | 11-03-2011 |
20130212413 | Cloud Remote Wakeup - A technique for leveraging cloud resources includes maintaining a resource index for a user for resources that are available from a connected standby device. The resource index can store an identification of resources for an entity (e.g., a user or enterprise) that is stored on a connected standby device. The resource index can include resources of other devices, as well. A connected standby device will generally have at least three power states, online, offline, and connected standby. When a device is online, a processor of the device is powered up and capable of handling, e.g., remote requests for resources. When a device is offline, the device may or may not be off, but is in any case not responsive to remote access. When a device is on connected standby, a processor of the device is powered down, but the device is responsive to a wakeup packet, enabling the device to respond to a resource request, typically after a short delay while the processor powers up. | 08-15-2013 |
20130232327 | Operating System Context Switching - A technique for quickly switching between a first operating system (OS) and a second OS involves deactivating the first OS and booting the second OS from memory. The technique can include inserting a context switching layer between the first OS and a hardware layer to facilitate context switching. It may be desirable to allocate memory for the second OS and preserve state of the first OS before deactivating the first OS and booting the second OS from memory. | 09-05-2013 |
20140141720 | Cloud Service for making Social Connections - A cloud service for making social connections includes a remote computer storing user accounts, each account including user information and an anonymous ID bound to the user information. A first mobile device transmits an anonymous ID using a limited range wireless signal module and a second mobile device receives the anonymous ID using a limited range wireless signal module of the second mobile device. The second mobile device transmits the received anonymous ID to a remote computer using an Internet connection module and receives the user information bound to the anonymous ID from the remote computer. | 05-22-2014 |
20140325240 | PROGRAMMING ON-CHIP NON-VOLATILE MEMORY IN A SECURE PROCESSOR USING A SEQUENCE NUMBER - An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process. | 10-30-2014 |