About
Experienced innovator and leader of cross-functional software teams. Have built teams…
Activity
-
Twenty five years at Amazon was a good run, and now it's time to call it a day. I never expected to spend almost the full sum of my career at a…
Twenty five years at Amazon was a good run, and now it's time to call it a day. I never expected to spend almost the full sum of my career at a…
Liked by Patrik Schnell
-
As part of becoming Honorary Doctor of Technology, Jensen Huang founder and CEO of NVIDIA, took the stage in Norrköping for an exclusive Fireside…
As part of becoming Honorary Doctor of Technology, Jensen Huang founder and CEO of NVIDIA, took the stage in Norrköping for an exclusive Fireside…
Liked by Patrik Schnell
-
Last week my role was eliminated in Microsoft’s latest restructuring. Saying goodbye isn’t easy, but I’m proud of what our team delivered over 18…
Last week my role was eliminated in Microsoft’s latest restructuring. Saying goodbye isn’t easy, but I’m proud of what our team delivered over 18…
Liked by Patrik Schnell
Experience
Education
-
Linköpings universitet
-
Activities and Societies: LinAOS, Dala Nation
Master Thesis: Evaluation of ABR Control Loops for ATM Networks.
-
- Present
Patents
-
Content preview
Issued US 11,257,099
Techniques enable creation of a preview license for digital content. In some instances, the preview license indicates that it allows a content-consuming device to consume less than all of the content. This preview license may create a list specifying multiple portions of the digital content that the content-consuming device may consume. These techniques may also present to a device user an offer to purchase rights to consume all of the digital content after consumption of the preview-licensed…
Techniques enable creation of a preview license for digital content. In some instances, the preview license indicates that it allows a content-consuming device to consume less than all of the content. This preview license may create a list specifying multiple portions of the digital content that the content-consuming device may consume. These techniques may also present to a device user an offer to purchase rights to consume all of the digital content after consumption of the preview-licensed portion(s). In other instances, a content server may embed the preview license into a content package that contains the digital content, allowing the server to distribute the package to multiple devices. In still other instances, the preview license may be bound to a domain rather than to individual devices. This allows member devices to share the digital content and the preview license, such that each member device may enjoy the preview experience.
-
Generating requests for streaming media
Issued US 11,190,566
Disclosed are various embodiments for a client application for streaming media. The client application estimates the bandwidth of the client and the latency between the client and a media distribution service. A bit rate for a media stream is determined using the latency, a buffer state, and the estimated bandwidth. A time to send the request is determined using the estimated bandwidth and latency.
-
Generating requests for streaming media
Issued US 10,708,331
Disclosed are various embodiments for a client application for streaming media. The client application estimates the bandwidth of the client and the latency between the client and a media distribution service. A bit rate for a media stream is determined using the latency, a buffer state, and the estimated bandwidth. A time to send the request is determined using the estimated bandwidth and latency.
-
Bit rate selection for streaming media
Issued US 10,666,698
Disclosed are various embodiments for a service for selecting the bandwidth of a media stream. The service correlates the buffer state of a client with previously communicated portions of the stream. The service then determines a bit rate for subsequent portions of the stream. A manifest may be generated indicating a source for content at the determined bit rate.
-
Combining encoded video streams
Issued US 10,666,903
Techniques are described by which multiple, independently encoded video streams may be combined into a single decodable video stream. These techniques take advantage of existing features of commonly used video codecs that support the independent encoding of different regions of an image frame (e.g., H.264 slices or HEVC tiles). Instead of including different parts of the same image, each region corresponds to the encoded image data of the frames of one of the independent video streams.
-
Live stream manifests for on demand content
Issued US 10,609,104
Disclosed are various embodiments for selecting fragments of a media item. An estimated bandwidth for a client is calculated. A confidence score for the estimated bandwidth is determined. When the confidence score falls below a threshold, the estimated bandwidth is modified. A fragment for the media item is selected using the modified estimated bandwidth.
-
Combining Encoded Video Streams
Issued US 10,397,518
Techniques are described by which multiple, independently encoded video streams may be combined into a single decodable video stream. These techniques take advantage of existing features of commonly used video codecs that support the independent encoding of different regions of an image frame (e.g., H.264 slices or HEVC tiles). Instead of including different parts of the same image, each region corresponds to the encoded image data of the frames of one of the independent video streams.
-
Decrypting Content Protected With Initialization Vector Manipulation
Issued US 10,102,386
Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded in an initialization vector corresponding to an encrypted sample. Upon decryption of encrypted content, the content type is identified and an action taken based upon the detected content type.
-
Live Stream Manifests For On Demand Content
Issued US 9,992,249
Disclosed are various embodiments for requesting fragments of a media item. A latency to a media distribution service and bandwidth for a client are estimated. A time to request a subsequent fragment from the media item is determined. Sources for the fragment are scored and one of the sources is selected. The fragment is requested from the selected source.
-
Digital Content Packaging, Licensing and Consumption
Issued US 9,892,390
A DRM technique involves packaging an advertisement using a data structure that encapsulates a number of advertising segments along with signed information, such as a table of hashes, associated with some of the advertising segments. In one scenario, the data structure and the signed information are separately protected using public key and/or digital signature cryptographic schemes. The advertisement is delivered to a user of a consumer electronic device (CED) separately from delivery of a…
A DRM technique involves packaging an advertisement using a data structure that encapsulates a number of advertising segments along with signed information, such as a table of hashes, associated with some of the advertising segments. In one scenario, the data structure and the signed information are separately protected using public key and/or digital signature cryptographic schemes. The advertisement is delivered to a user of a consumer electronic device (CED) separately from delivery of a digital license, which governs user consumption of the advertisement. The digital license includes keys used in connection with the cryptographic scheme, and references a condition to be satisfied with respect to consumption of the advertisement. As advertising segments are verified and consumed by the user/CED, information is recorded and used to determine whether the license condition was satisfied. Satisfaction of the license condition may result in access to program content or additional licenses.
Other inventors -
Trusted Entity Based Anti-cheating Mechanism
Issued US 9,805,196
An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise…
An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise alternations to the original environment to, for example, detect and/or prevent changes to the hardware and/or software intended to allow cheating or undesirable user behavior.
-
Content Preview
Issued US 9,805,374
Techniques enable creation of a preview license for digital content. In some instances, the preview license indicates that it allows a content-consuming device to consume less than all of the content. This preview license may create a list specifying multiple portions of the digital content that the content-consuming device may consume. These techniques may also present to a device user an offer to purchase rights to consume all of the digital content after consumption of the preview-licensed…
Techniques enable creation of a preview license for digital content. In some instances, the preview license indicates that it allows a content-consuming device to consume less than all of the content. This preview license may create a list specifying multiple portions of the digital content that the content-consuming device may consume. These techniques may also present to a device user an offer to purchase rights to consume all of the digital content after consumption of the preview-licensed portion(s). In other instances, a content server may embed the preview license into a content package that contains the digital content, allowing the server to distribute the package to multiple devices. In still other instances, the preview license may be bound to a domain rather than to individual devices. This allows member devices to share the digital content and the preview license, such that each member device may enjoy the preview experience.
-
Delivering Media Content to Achieve a Consistent User Experience
Issued US 9,712,860
Techniques for delivering content are described that vary the bit rate with which the content is delivered to achieve a consistent level of quality from the user's perspective. This is achieved through the use of quality metrics associated with content fragments that guide decision making in selecting from among the different size fragments that are available for a given segment of the content. Fragment selection attempts to optimize quality within one or more constraints.
Other inventorsSee patent -
Live Stream Manifests for On Demand Content
Issued US 9,686,332
This patent relates to selecting the highest quality fragment corresponding to a segment of a video that will successfully download in time for viewing. A media distribution service receives a state of a client’s video buffer and calculates an estimation of the bandwidth and latency of a communications channel to the client. The media distribution service determines how likely each fragment is to arrive on time for viewing, and selects a fragment based on those likelihoods. A manifest of…
This patent relates to selecting the highest quality fragment corresponding to a segment of a video that will successfully download in time for viewing. A media distribution service receives a state of a client’s video buffer and calculates an estimation of the bandwidth and latency of a communications channel to the client. The media distribution service determines how likely each fragment is to arrive on time for viewing, and selects a fragment based on those likelihoods. A manifest of selected fragments are sent to the client.
Other inventorsSee patent -
Protecting Content With Initialization Vector Manipulation
Issued US 9,665,696
Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded in an initialization vector corresponding to an encrypted sample. Upon decryption of encrypted content, the content type is identified and an action taken based upon the detected content type.
Other inventorsSee patent -
Secure Key Provisioning
Issued US 9,479,328
Some examples include provisioning secret material onto an electronic device. For instance, an electronic device may be provided with a provisioning key that can be used for provisioning other secret material on the electronic device. The provisioning key may be encrypted at a secure location using an on-chip key that is also sent to a processor manufacturer. The encrypted provisioning key may subsequently be decrypted by an electronic device having a processor installed that includes the…
Some examples include provisioning secret material onto an electronic device. For instance, an electronic device may be provided with a provisioning key that can be used for provisioning other secret material on the electronic device. The provisioning key may be encrypted at a secure location using an on-chip key that is also sent to a processor manufacturer. The encrypted provisioning key may subsequently be decrypted by an electronic device having a processor installed that includes the on-chip key. The provisioning key is saved to the device and may then be used for securely provisioning other secret material onto the electronic device, such as one or more keys, one or more digital certificates, or other digital rights management information. Accordingly, the provisioning key provides the device manufacture with the ability to securely install secret material to the electronic device using a key that is never shared outside of a secure environment.
-
Network Layer Claims Based Access Control
Issued US 9,344,432
Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in…
Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
-
Segmented Media Content Rights Management
Issued US 9,245,127
Segmented media content rights management is described. A media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected media content that are sequenced to render the protected media content for viewing. A file header object can be instantiated in a file header of the media content file, where the file header object…
Segmented media content rights management is described. A media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected media content that are sequenced to render the protected media content for viewing. A file header object can be instantiated in a file header of the media content file, where the file header object includes DRM-associated features, such as one or more DRM licenses, properties, and/or attributes that correspond to the media content file to provision all of the segments of the protected media content together.
-
Provisioning a computing system for digital rights management
Issued US 9,147,052
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide…
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage.
-
Trusted Intermediary For Network Layer Claims-Enabled Access Control
Issued US 8,918,856
Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the…
Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information.
-
Cloud-Based Movable-Component Binding
Issued US 8,850,230
This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic function. By so doing the mobile computing device may request access to content and receive permission to use the content quickly and in a cryptographically robust way.
-
Secure Content Distribution with Distributed Hardware
Issued US 8,837,722
This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between distributed hardware units. The tools, for example, may distribute content protection in hardware between a policy unit, a transcryption unit, a graphics processing unit, and a playback unit. By so doing the tools enable, among other things, users to select from many graphics cards rather than rely on…
This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between distributed hardware units. The tools, for example, may distribute content protection in hardware between a policy unit, a transcryption unit, a graphics processing unit, and a playback unit. By so doing the tools enable, among other things, users to select from many graphics cards rather than rely on the graphics capabilities of an integrated (e.g., SOC) hardware solution.
-
File Format for Media Distribution and Presentation
Issued US 8,775,566
A file format supports distribution, presentation, and storage of media presentations ("MPs"). A sequence of a MP is composed of segments of media data referred to by segmentIDs. Segments are defined as movie fragments, pursuant to the "ISO base media file format". Multiple instances of a segment, each having a unique instanceID, are created by encoding the media data based on different encoding characteristics, referred to as encodingIDs. A sequence map box ("SMB") stores the arrangement of a…
A file format supports distribution, presentation, and storage of media presentations ("MPs"). A sequence of a MP is composed of segments of media data referred to by segmentIDs. Segments are defined as movie fragments, pursuant to the "ISO base media file format". Multiple instances of a segment, each having a unique instanceID, are created by encoding the media data based on different encoding characteristics, referred to as encodingIDs. A sequence map box ("SMB") stores the arrangement of a sequence's segmentIDs-to-instanceIDs, including encodingIDs. The SMB is distributed to a client-side media processing unit ("MPU"). Information regarding an instance selected for distribution to the MPU is encapsulated in an instance identifier box ("IIB"), along with the arrangement of instanceIDs for the segment, and distributed to the MPU. At the time of distribution and/or playback of the MP, the MPU interchange instances based on the contents of the SMB and/or the IIB.
-
Protecting Content with Initialization Vector Manipulation
Issued US 8,769,306
Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded in an initialization vector corresponding to an encrypted sample. Upon decryption of encrypted content, the content type is identified and an action taken based upon the detected content type.
-
Provisioning a computing system for digital rights management
Issued US 8,661,552
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide…
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage.
-
Secure time source operations for digital rights management
Issued US 8,646,096
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide…
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
-
Secure storage for digital rights management
Issued US 8,689,010
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide…
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
-
Portable Digital Rights for Multiple Devices
Issued US 8,639,627
Portable digital rights for multiple devices is described. In an embodiment, a digital rights management (DRM) system includes a first device with a removable component configured as a token that is associated with a DRM license. The first device also includes a removable memory card that stores protected media content on which the first device can perform actions as permitted by the DRM license. The DRM system also includes a second device that can have the removable component and the…
Portable digital rights for multiple devices is described. In an embodiment, a digital rights management (DRM) system includes a first device with a removable component configured as a token that is associated with a DRM license. The first device also includes a removable memory card that stores protected media content on which the first device can perform actions as permitted by the DRM license. The DRM system also includes a second device that can have the removable component and the removable memory card when removed from the first device and installed in the second device such that the second device can perform the actions on the protected media content as permitted by the DRM license.
-
Binding Content Licenses to Portable Storage Devices
Issued US 8,539,233
Systems, methods, and/or techniques ("tools") for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices ("stores"), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from…
Systems, methods, and/or techniques ("tools") for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices ("stores"), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
-
Managing Digital Rights for Multiple Assets in an Envelope
Issued US 8,539,543
Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of…
Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of these assets may be assigned a policy that may be different than the policy assigned to the first asset. This envelope, or a collection of envelopes, may then be provided to a content-consuming device to consume the assets in accordance with each asset's specified policy.
-
Hardware-based Ouput Protection of Multiple Video Streams
Issued US 8,393,008
Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content of secure data are provided. Initially, the secure data is recognized as being carried by a media stream being communicated from a media-reading device. One or more protected target segments and protected target segments are instantiated, where these protected memory segments are protected from illicit access by hardware-based rules…
Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content of secure data are provided. Initially, the secure data is recognized as being carried by a media stream being communicated from a media-reading device. One or more protected target segments and protected target segments are instantiated, where these protected memory segments are protected from illicit access by hardware-based rules. Regions of hardware memory are dynamically allocated to hold these protected memory segments and the secure data is iteratively written thereto. The protected source segments are associating with the media stream based on a license attached thereto, while the protected target segments are associating with presentation devices based on a standard of output protection supported thereby. Accordingly, the protected source segments are mapped to the protected target segments according to whether the license encompasses the standard of the output protection.
-
Segmented Media Content Rights Management
Issued US 8,387,150
Segmented media content rights management is described. In embodiment(s), a media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected media content that are sequenced to render the protected media content for viewing. A file header object can be instantiated in a file header of the media content file, where the file…
Segmented media content rights management is described. In embodiment(s), a media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected media content that are sequenced to render the protected media content for viewing. A file header object can be instantiated in a file header of the media content file, where the file header object includes DRM-associated features, such as one or more DRM licenses, properties, and/or attributes that correspond to the media content file to provision all of the segments of the protected media content together.
-
Mixed-media service collections for multimedia platforms
Issued US 7,480,701
A mixed-media service collection for multimedia platforms allows simultaneous access to various mixed-media services for rendering multimedia content, depending on current client conditions. In one implementation, in response to the client accessing a service collection, for example, by changing channels, only some of the mixed-media services in the service collection are simultaneously actuated based on client conditions. The client conditions may include the availability of subsystems to…
A mixed-media service collection for multimedia platforms allows simultaneous access to various mixed-media services for rendering multimedia content, depending on current client conditions. In one implementation, in response to the client accessing a service collection, for example, by changing channels, only some of the mixed-media services in the service collection are simultaneously actuated based on client conditions. The client conditions may include the availability of subsystems to implement services and the client's authorization to receive services. If client conditions do not allow some services in the service collection to be actuated, then other services in the service collection are available to be actuated instead.
-
Method and System for Gap Based Anti-piracy
Filed US 20100186095
In order to achieve a more robust level of piracy protection, a gap protection scheme is utilized. This protection scheme may utilize the notion of a gap, which may comprise any entity or component that is withheld from a distribution that is required in order to run or execute a software title or is required in order to play and enjoy any other type of protected asset.
-
Key Escrow Service
Filed US 20090327702
A key escrow service is described. In embodiment(s), the key escrow service maintains an escrow license that includes an escrow content key that is associated with protected media content which is distributed from a content distributor to a media device. A content key that is associated with the protected media content can be received from the content distributor, and the content key can then be encrypted with a public escrow key to generate the escrow content key. The escrow license can be…
A key escrow service is described. In embodiment(s), the key escrow service maintains an escrow license that includes an escrow content key that is associated with protected media content which is distributed from a content distributor to a media device. A content key that is associated with the protected media content can be received from the content distributor, and the content key can then be encrypted with a public escrow key to generate the escrow content key. The escrow license can be generated to include the escrow content key, and the escrow content key can then be communicated back to the content distributor that provides a digital rights management (DRM) license to the media device. The DRM license can include both the escrow content key and the content key encrypted with a public key that corresponds to the media device.
-
Temporary Domain Membership for Content Sharing
Filed US 20090307759
In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate allowing the first device to temporarily consume content bound to the domain. The temporary domain certificate is sent to the first device, allowing the first device to temporarily…
In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate allowing the first device to temporarily consume content bound to the domain. The temporary domain certificate is sent to the first device, allowing the first device to temporarily consume content bound to the domain.
-
Parameter-based Interpretation of DRM License Policy
Filed US 20080271165
To enforce content access restrictions, a license associated with protected content is generated. This license may have at least one evolving parameter. That is, the parameter value may change; e.g., depending upon content access, copying, etc. For example, each successive generation of a license may have an incremented value in an evolving "generation" parameter. The license may also have evolving rules that describe different content access rules for different values in the evolving parameter.
-
Managing Digital Rights in a Member-Based Domain Architecture
Filed US 20080256646
Techniques enable seamless movement and consumption of licensed digital content amongst multiple devices. In some embodiments, these techniques allow establishment of a domain capable of having multiple member devices. Each member device of the domain typically comprises a content-consuming device such as a personal computer, a portable media player, or the like. These techniques enable a license associated with digital content to bind to a domain rather than an individual device. As such, each…
Techniques enable seamless movement and consumption of licensed digital content amongst multiple devices. In some embodiments, these techniques allow establishment of a domain capable of having multiple member devices. Each member device of the domain typically comprises a content-consuming device such as a personal computer, a portable media player, or the like. These techniques enable a license associated with digital content to bind to a domain rather than an individual device. As such, each member device of the domain may contain a domain identity and, with the identity, may consume the content with use of the license and in accordance with policy described in the license. These tools may also enable a member device to join multiple domains and to contain an identification of each of these multiple domains.
Languages
-
English
Native or bilingual proficiency
-
Swedish
Native or bilingual proficiency
-
German
Elementary proficiency
Organizations
-
Digital Video Broadcasting Project (DVB)
Chairman of DVB-IPI, Member of DVB-MHP, DVB-SI, Architectural board
-Inaugural chair of DVB-IPI, the technical working group within the DVB technical module (DVB-TM) focused on streaming video over IP. Participant in the DVB-MHP technical working group developing DVB-HTML, a specification for HTML applications for TV. Member of the DVB architecural board developing the architecture for DVB 2.0.
More activity by Patrik
-
My latest piece for Fortune takes a look at Udit Madan, the 38-year-old global head of operations/supply chain at Amazon. Madan was elevated to Andy…
My latest piece for Fortune takes a look at Udit Madan, the 38-year-old global head of operations/supply chain at Amazon. Madan was elevated to Andy…
Liked by Patrik Schnell
-
When the Covid pandemic upended Amazon’s operations, Udit Madan was tasked with a crucial side job: to figure out how to acquire hundreds of…
When the Covid pandemic upended Amazon’s operations, Udit Madan was tasked with a crucial side job: to figure out how to acquire hundreds of…
Liked by Patrik Schnell
-
Careers are partly about momentum. Rising stars get known as such and talked about. Then everyone thinks of them first for the next big challenge…
Careers are partly about momentum. Rising stars get known as such and talked about. Then everyone thinks of them first for the next big challenge…
Liked by Patrik Schnell
-
Very fortunate to support brilliant leaders like Udit Madan in Making History. Congratulations Udit on the promotion! #amazon #careergrowth #Day1
Very fortunate to support brilliant leaders like Udit Madan in Making History. Congratulations Udit on the promotion! #amazon #careergrowth #Day1
Liked by Patrik Schnell
-
Udit is a remarkable leader and I’m delighted to see this recognition.
Udit is a remarkable leader and I’m delighted to see this recognition.
Liked by Patrik Schnell
-
Cube Cloud was just named the #1 vendor in Dresner Advisory Services’ first-ever Semantic Layer Market Study—recognized for leadership in data…
Cube Cloud was just named the #1 vendor in Dresner Advisory Services’ first-ever Semantic Layer Market Study—recognized for leadership in data…
Liked by Patrik Schnell
-
Hi everyone — after almost 20 incredible years at Walmart, including 7 years as a Staff Product Manager leading high-impact data and platform…
Hi everyone — after almost 20 incredible years at Walmart, including 7 years as a Staff Product Manager leading high-impact data and platform…
Liked by Patrik Schnell
-
After an incredible year of “pre-tirement,” I’ve come full circle—returning to Microsoft this January! I couldn’t pass up the opportunity to help…
After an incredible year of “pre-tirement,” I’ve come full circle—returning to Microsoft this January! I couldn’t pass up the opportunity to help…
Liked by Patrik Schnell
-
Sam Walton believed in service— to customers, to associates, and to the communities we call home. And while the world keeps changing, Walmart’s core…
Sam Walton believed in service— to customers, to associates, and to the communities we call home. And while the world keeps changing, Walmart’s core…
Liked by Patrik Schnell
-
On the heels of the grand opening of the Marriott AC Hotel Bentonville, today we announced the second batch of retailers coming to the Walmart Home…
On the heels of the grand opening of the Marriott AC Hotel Bentonville, today we announced the second batch of retailers coming to the Walmart Home…
Liked by Patrik Schnell
-
This week is my two year anniversary with #EBS (Enterprise Business Services) at Walmart! It's been a fun ride and we've achieved a lot. First…
This week is my two year anniversary with #EBS (Enterprise Business Services) at Walmart! It's been a fun ride and we've achieved a lot. First…
Liked by Patrik Schnell
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More