(19)
(11)EP 2 294 527 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
26.06.2019 Bulletin 2019/26

(21)Application number: 09747176.7

(22)Date of filing:  04.05.2009
(51)International Patent Classification (IPC): 
G06F 21/10(2013.01)
G06F 1/32(2019.01)
(86)International application number:
PCT/US2009/042670
(87)International publication number:
WO 2009/140090 (19.11.2009 Gazette  2009/47)

(54)

DISTRIBUTED DIGITAL RIGHTS MANAGEMENT SYSTEM AND METHOD

VERTEILTES DIGITALES RECHTEVERWALTUNGSSYSTEM UND VERFAHREN

SYSTÈME ET PROCÉDÉ DE GESTION DE DROITS NUMÉRIQUES DISTRIBUÉS


(84)Designated Contracting States:
AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

(30)Priority: 15.05.2008 US 121558

(43)Date of publication of application:
16.03.2011 Bulletin 2011/11

(73)Proprietors:
  • Advanced Micro Devices, Inc.
    Santa Clara, CA 95054 (US)
  • ATI Technologies ULC
    Markham, Ontario L3T 7X6 (CA)

(72)Inventors:
  • DOS REMEDIOS, Alwyn
    Vaughan Ontario L6A 3X2 (CA)
  • SCHERER, Stephan
    Ottawa Ontario K2E 6R7 (CA)
  • BAPST, Mark
    South Barrington IL 60010 (US)
  • PATNE, Satyajit
    Irvine CA 92620 (US)

(74)Representative: Robinson, David Edward Ashdown et al
Marks & Clerk LLP 1 New York Street
Manchester M1 4HD
Manchester M1 4HD (GB)


(56)References cited: : 
EP-A- 1 496 660
US-A1- 2008 072 070
US-A1- 2008 022 108
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    FIELD



    [0001] The present disclosure generally relates to digital rights management, and more particularly, to reducing power consumption of devices that employ digital rights management.

    BACKGROUND



    [0002] Digital content has gained widespread popularity due to mobile handheld devices and the ease of distribution and storage of such content. Such digital content can include, for example, games, ring tones, photos, music clips, video clips, streaming media, and other suitable content. In order to help reduce unauthorized copying and/or access to such content, various digital rights management (DRM) specifications have been developed such as, for example, Open Mobile Alliance (OMA) DRM. However, in order to utilize DRM for protected content, extra processing is required which increases power consumption of mobile devices.

    [0003] Furthermore, some mobile devices such as mobile phones, include a primary processor that handles primary functions of the device (e.g. telecommunication functions) and a secondary processor that handles digital content. As such, the power consumption is further increased by utilizing two separate processors.

    [0004] Because many of the mobile devices to utilize DRM protected content are often battery powered it is desirable, among other things, to reduce power consumption in order to increase battery life.

    [0005] Patent Application US2008/072070 describes a power management able to power down unused resources until needed.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0006] The disclosure will be more readily understood in view of the following description when accompanied by the below figures, wherein like reference numerals represent like elements:

    Figure 1 is an exemplary diagram of the digital rights management distribution system;

    Figure 2 is an exemplary block diagram of a digital rights management system according to the present disclosure;

    Figure 3 is a flowchart depicting exemplary steps they can be taken by the digital rights management system; and

    Figure 4 is an exemplary block diagram of an alternative embodiment of the digital rights management system.


    DETAILED DESCRIPTION



    [0007] The invention is set out in the appended set of claims.

    [0008] In one example, a digital rights management system includes an authentication module and a decryption module. If desired, the modules may be implemented in separate integrated circuits. The authentication module retrieves authentication information for protected content and powers down after the authentication information is retrieved. The decryption module decrypts the protected content based on the authentication information while the authentication module is powered down. A related method is also disclosed.

    [0009] Among other advantages, the digital rights management system and method consume less power than known digital rights management systems and methods. In one example, the digital rights management system distributes a digital rights management agent between a host processing circuit and a media processing circuit so that the host processing circuit (or portions thereof) can be powered down after obtaining authentication information. Accordingly, by powering down the host processing circuit (or portions thereof), the digital rights management system consumes less power than known digital rights management systems and methods. Other advantages will be recognized by those of ordinary skill in the art.

    [0010] In one example, the authentication module stores the authentication information in memory prior to powering down. The decryption module retrieves the authentication information from the memory. A media module provides media output information based on the protected content.

    [0011] In one example, the digital rights management system includes a power management module. The power management module selectively powers up and powers down the authentication module. For example, the power management module powers up the authentication module in response to an authentication request from the decryption module. Also, the power management module powers down the authentication module when the decryption module is decrypting the protected content.

    [0012] In one example, the digital rights management system includes a communication module. The communication module transmits a request for the authentication information, receives the authentication in response to the request and is operative to power down after receiving the authentication information.

    [0013] A device includes the digital rights management system and may be a wireless handheld device or any suitable device.

    [0014] As used herein, the term "circuit" and/or "module" can include an electronic circuit, one or more processors (e.g., shared, dedicated, or group of processors such as but not limited to microprocessors, DSPs, or central processing units) and memory, that execute one or more software or firmware programs, combinational logic circuits, an ASIC, and/or other suitable components that provide the described functionality. A "circuit" or "module" can be "powered down" by reducing power to a desired reduced power level including to a level rendering it inoperative. Likewise, a "circuit" or "module" can be "powered up" by increasing its supply power to a level rendering it operative. Additionally, as will be appreciated by those of ordinary skill in the art, the operation, design, and organization, of a "circuit" or "module" can be described in a hardware description language such as Verilog™, VHDL, or other suitable hardware description languages.

    [0015] Referring now to Figure 1, an exemplary diagram of a digital rights management distribution system 100 is depicted. The digital rights management distribution system 100 includes a device 102 such as a handheld mobile media device, a cellular phone, and or other suitable mobile device. The digital rights management distribution system 100 also includes a rights issuer 104 as known in the art and a content issuer 106 as known in the art. Although depicted separately in this example, the rights issuer 104 and the content issuer 106 can be combined into a single rights/content issuer if desired. The rights issuer 104 and the content issuer 106 are in communication with the device 102 via a network 108. The network 108 can be any known network such as a wireless cellular network, a wireless LAN, a packet switched network, a PSTN network, and/or any other suitable network.

    [0016] The device 102 includes a digital rights management (DRM) system 110. The DRM system 110 acquires authentication information (e.g. a rights object or other suitable authentication information) for protected content (e.g. games, ring tones, photos, music clips, video clips, streaming media, and other suitable protected content) and decrypts the protected content based on the authentication information. For example, the DRM system 110 can request protected content 112 from the content issuer 106 and authentication information 114 for the protected content 112 from the rights issuer 104. The DRM system 110 can then subsequently decrypt the protected content 112 based on the authentication information 114. The DRM system 110 reduces power consumption of the device 102 by selectively powering up and powering down portions of the DRM system 110 as needed.

    [0017] Referring now to Figure 2, an exemplary diagram of the DRM system 110 is depicted. The DRM system 110 includes a host processing circuit 200 and a media processing circuit 202. The host processing circuit 200 includes a communication module 204, a power management module 206, and an authentication module 208. The power management module 206 is operatively coupled to the communication module 204 and the authentication module 208. The authentication module 208 is operatively coupled to the communication module 204.

    [0018] As will be discussed in more detail below, the power management module 206 selectively powers up and powers down the authentication module 208, and/or the communication module 204 in order to reduce power consumption. In some embodiments, the power management module 206 can selectively power up and power down other circuits 209 of the host processing module 200 as needed in order to further reduce power consumption. In addition, in some embodiments, the power management module 206 can be external to the host processing module 206 and can selectively power up and power down the host processing circuit 200 to further reduce power consumption.

    [0019] The communication module 204 communicates with the rights issuer 104 and the content issuer 106 via the network 108 in order to retrieve the authentication information 114 and/or the protected content 106. For example, the communication module 204 can transmit a request for the authentication information 114 in response to an authentication request from the authentication module 208 via path 210. The communication module 204 can then subsequently receive the authentication information 114 in response to the request. The communication module 204 includes circuitry commonly known in the art to retrieve digital rights management authentication information and/or protected content. In this example, the device 100 is a wireless handheld device and therefore communicates with the network 108 wirelessly using an antenna 212.

    [0020] The media processing circuit 202 includes a media module 214 and a decryption module 216. The media module 214 provides media output information 218 (e.g. audio and/or video output) based on the protected content 112. As such, the media module 214 can be any suitable media player known in the art that is capable of providing media output information based on digital media content. In some embodiments, the DRM system 110 can also include a display 220 to provide an image based on the media output information 218 and/or a speaker 222 to provide audio based on the media output information 218.

    [0021] The authentication module 208 and the decryption module 216 operate collectively as a DRM agent 224 and communicate via path 225 (e.g. an IPC path). As such, the DRM agent 224 is distributed (e.g. split) between the host processing circuit 200 and the media processing circuit 202. By splitting the DRM agent 224 between the host processing circuit 200 and the media processing circuit 202, reduced power consumption can be realized by selectively powering up and down the host processing circuit 200 or portions thereof.

    [0022] In addition, the DRM agent 224 also includes a rights management module 227. The rights management module 227 is operative to manage permissions (e.g. obtained from a rights object) associated with a protected content 112. The rights management module 227 can be included in either the host processing circuit 200 or the media processing circuit 202. For example, if the permissions limit access to protected content based on the number of times that it is accessed (e.g. the number of times the protected content is played), the rights management module 227 can be included in the media processing circuit 202. However, if for example, the permissions limit access to protected content based on time, the rights management module 227 can be located in the host processing circuit 200 (e.g. assuming the host processing circuit includes a real-time clock and the media processing circuit 202 does not). In this example, the rights management module 227 is included in the media processing circuit 202. However, as noted above, the rights management module 227 could be included within the host processing circuit 200 if desired.

    [0023] The DRM system 110 also includes memory 226 that stores the authentication information 114 and the protected content 112. The memory 226 can be any suitable storage medium such as, for example, volatile memory, nonvolatile memory, or other suitable storage medium. Although not shown, those having ordinary skill in the art will appreciate that the memory 226 can also store other permissions associated with a rights object.

    [0024] During operation, the authentication module 208 retrieves the authentication information 114 for the protected content 112 from the rights issuer 104 via the network 108. In addition, the authentication module 208 can retrieve the protected content 112. The authentication module 208 stores the authentication information 114 (and/or protected content 112) in the memory 226 prior to powering down. More specifically, the power management module 206 determines whether the authentication module 208 is in use (e.g. obtaining authentication information) and selectively powers down the authentication module 200 based thereon. For example, the power management module 206 can power down the authentication module 208 after the authentication module 208 has retrieved and stored the authentication information 114 (and/or protected content 112). In addition, the power management module 206 can also power down the communication module 204 when not in use.

    [0025] The decryption module 216 retrieves the authentication information 114 (and/or protected content 112) from the memory 226. Once retrieved, the decryption module 216 decrypts the protected content 112 based on the authentication information 114 and provides unencrypted content 228 to the media module 214. Because the authentication information 114 has already been obtained by the authentication module 208, the decryption module 216 can independently decrypt the protected content 112 while the authentication module 208 is powered down. As such, power consumption of the DRM system 110 can be reduced.

    [0026] The media module 214 receives the unencrypted content 228 and provides the media output information 218 based thereon. As previously noted, the media module 214 can provide the media output information 218 to the display 220 and/or the speaker 222 if desired.

    [0027] In some embodiments, the decryption module 216 can communicate with the power management module 206 via path 230 in order to selectively power up and power down the authentication module 208. For example, the decryption module 216 can request that the power management module 206 power down the authentication module 208 when the decryption module 216 decrypting the protected content 112. In addition, the decryption module 216 can request that the power management module power up the authentication module 208 when authentication information is required for protected content. Furthermore, the decryption module 216 can request that the power management module 206 power up the authentication module 208 in order to obtain timing information from the authentication module 208 (or host processing circuit 200). In other embodiments, the power management module 206 can monitor the authentication module 208, the host processing circuit 200 (or portions thereof) and/or the decryption module 216 in order to selectively power up and power down the authentication module 208 and/or the host processing circuit 200 (or portions thereof).

    [0028] Referring now to Figure 3, exemplary steps that can be taken by the DRM system 110 are generally identified at 300. The process starts in step 302. In step 304, the authentication module 208 retrieves the authentication information 114 for the protected content 112. In some embodiments, the authentication module 208 can retrieve the authentication information 114 in response to a request from the decryption module 216. In step 306, the power management module 206 powers down the authentication module 218 after the authentication information 114 is retrieved. In step 308, the decryption module 216 decrypts the protected content 112 based on the authentication information 114 while the authentication module 208 is powered down. As such, power consumption of the DRM system 110 can be reduced by powering down authentication module 208 while the decryption module 216 is decrypting the protected content 112. The process ends in step 310.

    [0029] Referring now to Figure 4, an exemplary block diagram of an alternate embodiment of the DRM system 110 is depicted. In this example, the host processing circuit 200 and the media processing circuit 202 both include a complete DRM agent 400 and 402, respectively. Each DRM agent 400, 402 includes an authentication module 404, 406, respectively, a decryption module 408, 410, respectively, and, a rights management module 412, 414, respectively. However, since the decryption module 408 of DRM agent 400 and the authentication module 406 of DRM agent 402 are redundant, the power management module 206 can power them down during operation to reduce power consumption. In addition, the power management module 206 can also power down one of the rights management modules 412 or 414 in order to reduce power consumption. As such, the authentication module 404 can operate as the authentication module 208 of Figure 2, the decryption module 410 can operate as the decryption module 216 of Figure 2, and one of the rights management modules 412 or 411 can operate as the rights management module 227 of Figure 2 to further reduce power consumption of the DRM system 110.

    [0030] As noted above, among other advantages, a digital rights management system and method is provided that consumes less power than known digital rights management systems. The digital rights management system distributes a digital rights management agent between a host processing circuit and a media processing circuit so that the host processing circuit (or portions thereof) can be powered down after obtaining authentication information. Accordingly, by powering down the host processing circuit (or portions thereof), the digital rights management system consumes less power than known digital rights management systems. Other advantages will be recognized by those of ordinary skill in the art.

    [0031] Also, integrated circuit design systems (e.g., work stations) are known that create integrated circuits based on executable information stored on a computer readable memory such as but not limited to CDROM, RAM, other forms of ROM, hard drives, distributed memory etc. The information may include data representing (e.g., compiled or otherwise represented) any suitable language such as, but not limited to, hardware descriptor language or other suitable language. As such, the circuits and/or modules described herein may also be produced as integrated circuits by such systems. For example, an integrated circuit may be created for use in a display using information stored on a computer readable medium that when executed cause the integrated circuit design system to create an integrated circuit that includes an authentication module and a decryption module. The authentication module is operative to retrieve authentication information for protected content. The authentication module is operative to powers down after the authentication information is retrieved. The decryption module is operative to decrypt the protected content based on the authentication information while the authentication module is powered down. Integrated circuits having a circuit and/or module that performs other operations described herein may also be suitable produced.

    [0032] While this disclosure includes particular examples, it is to be understood that the disclosure is not so limited. Numerous modifications, changes, variations, substitutions, and equivalents will occur to those skilled in the art without departing from the scope of the present disclosure upon a study of the drawings, the specification, and the following claims.


    Claims

    1. A digital rights management system, comprising:

    an authentication module (208) that is operative to retrieve authentication information for protected content and to reduce power after the authentication information is retrieved;

    the authentication module further operative to store the authentication information in memory (226) prior to reducing power, the memory being powered independently of the authentication module; and a decryption module (216) that is operative to retrieve and decrypt the protected content based on the authentication information, the decryption module being operative to receive the authentication information and decrypt the protected content while power of the authentication module is reduced.


     
    2. The digital rights management system of claim 1 wherein the decryption module is operative to retrieve the authentication information from the memory.
     
    3. The digital rights management system of claim 1, further comprising a media module that is operative to provide media output information based on the protected content.
     
    4. The digital rights management system of claim 1, further comprising a power management module that is operative to selectively power up and reduce power of the authentication module.
     
    5. The digital rights management system of claim 4, wherein the power management module is operative to power up the authentication module in response to an authentication request from the decryption module.
     
    6. The digital rights management system of claim 4, wherein the power management module is operative to reduce power of the authentication module when the decryption module is decrypting the protected content.
     
    7. The digital rights management system of claim 1, further comprising a communication module that is operative to transmit a request for the authentication information and to receive the authentication in response to the request.
     
    8. The digital rights management system of claim 7, wherein the communication module is operative to reduce power after receiving the authentication information.
     
    9. A device comprising the digital rights management system of claim 1.
     
    10. A digital rights management method, comprising:

    retrieving, with an authentication module, authentication information for a protected content;

    storing the authentication information in memory that is powered independently of the authentication module;

    reducing power of the authentication module after the authentication information is retrieved;

    retrieving the authentication information by a decryption module while power of the authentication module is reduced; and

    decrypting the protected content based on the authentication information while power to the authentication module is reduced.


     
    11. The digital rights management method of claim 10, further comprising:

    retrieving the stored authentication information prior to decrypting the protected content; and

    providing media output information based on the protected content.


     
    12. The digital rights management method of claim 10, further comprising selectively powering up and reducing power of the authentication module.
     
    13. The digital rights management method of claim 12, further comprising:

    powering up the authentication module in response to an authentication request; and

    reducing power of the authentication module when the decryption module is decrypting the protected content.


     
    14. A device according to claim 9, comprising:
    a first circuit that comprises:

    the authentication module;

    a memory;

    a power management module that is operative to selectively power up and reduce power to the authentication module independently of the memory; and

    a communication module that is operative to wirelessly transmit a request for the authentication information and to wirelessly receive the authentication information in response to the request; and

    a second circuit that comprises:

    the decryption module; and

    a media module that is operative to provide media output information based on the protected content.


     
    15. The device according to claim 14, wherein the first circuit comprises a first processor, and the second circuit comprises a second processor.
     
    16. The device of claim 14, wherein the decryption module is operative to retrieve the authentication information from the memory.
     
    17. The device of claim 14, wherein the power management module is operative to power up the authentication module in response to an authentication request from the decryption module and to reduce power of the authentication module when the decryption module is decrypting the protected content.
     
    18. The device of claim 14, further comprising at least one of:

    a display that is operative to provide an image based on the media output information; and

    a speaker that is operative to provide audio based on the media output information.


     
    19. The device of claim 14, wherein the communication module is powered up while power of the authentication module is reduced.
     


    Ansprüche

    1. Digitales Rechteverwaltungssystem, Folgendes umfassend:

    ein Authentifizierungsmodul (208), das dazu betrieben werden kann, Authentifizierungsinformationen für einen geschützten Inhalt zu entnehmen und Leistung zu reduzieren, nachdem die Authentifizierungsinformationen entnommen sind;

    wobei das Authentifizierungsmodul ferner dazu betrieben werden kann, die Authentifizierungsinformationen in einem Speicher (226) zu speichern, bevor die Leistung reduziert wird, wobei der Speicher unabhängig von dem Authentifizierungsmodul mit Leistung versorgt wird; und

    ein Entschlüsselungsmodul (216), das dazu betrieben werden kann, den geschützten Inhalt auf Grundlage der Authentifizierungsinformationen zu entnehmen und zu entschlüsseln, wobei das Entschlüsselungsmodul dazu betrieben werden kann, die Authentifizierungsinformationen zu empfangen und den geschützten Inhalt zu entschlüsseln, während die Leistung des Authentifizierungsmoduls reduziert ist.


     
    2. Digitales Rechteverwaltungssystem nach Anspruch 1, wobei das Entschlüsselungsmodul dazu betrieben werden kann, die Authentifizierungsinformationen aus dem Speicher zu entnehmen.
     
    3. Digitales Rechteverwaltungssystem nach Anspruch 1, ferner ein Medienmodul umfassend, das dazu betrieben werden kann, Medienausgangsinformationen auf Grundlage des geschützten Inhalts bereitzustellen.
     
    4. Digitales Rechteverwaltungssystem nach Anspruch 1, ferner ein Leistungsverwaltungsmodul umfassend, das dazu betrieben werden kann, das Authentifizierungsmodul selektiv hochzufahren oder dessen Leistung zu reduzieren.
     
    5. Digitales Rechteverwaltungssystem nach Anspruch 4, wobei das Leistungsverwaltungsmodul dazu betrieben werden kann, das Authentifizierungsmodul als Reaktion auf eine Authentifizierungsanfrage von dem Entschlüsselungsmodul hochzufahren.
     
    6. Digitales Rechteverwaltungssystem nach Anspruch 4, wobei das Leistungsverwaltungsmodul dazu betrieben werden kann, die Leistung des Authentifizierungsmoduls zu reduzieren, wenn das Entschlüsselungsmodul den geschützten Inhalt entschlüsselt.
     
    7. Digitales Rechteverwaltungssystem nach Anspruch 1, ferner ein Kommunikationsmodul umfassend, das dazu betrieben werden kann, eine Anfrage für die Authentifizierungsinformationen zu übertragen und die Authentifizierung als Reaktion auf die Anfrage zu empfangen.
     
    8. Digitales Rechteverwaltungssystem nach Anspruch 7, wobei das Kommunikationsmodul dazu betrieben werden kann, die Leistung zu reduzieren, nachdem die Authentifizierungsinformationen empfangen wurden.
     
    9. Vorrichtung, die das digitale Rechteverwaltungssystem nach Anspruch 1 umfasst.
     
    10. Digitales Rechteverwaltungsverfahren, Folgendes umfassend:

    Entnehmen, mit einem Authentifizierungsmodul, von Authentifizierungsinformationen für einen geschützten Inhalt;

    Speichern der Authentifizierungsinformationen in einem Speicher, der unabhängig von dem Authentifizierungsmodul mit Leistung versorgt wird;

    Reduzieren von Leistung des Authentifizierungsmoduls, nachdem die Authentifizierungsinformationen entnommen sind;

    Entnehmen der Authentifizierungsinformationen durch ein Entschlüsselungsmodul, während die Leistung des Authentifizierungsmoduls reduziert ist; und

    Entschlüsseln des geschützten Inhalts auf Grundlage der Authentifizierungsinformationen, während die Leistung des Authentifizierungsmoduls reduziert ist.


     
    11. Digitales Rechteverwaltungsverfahren nach Anspruch 10, ferner Folgendes umfassend:

    Entnehmen der gespeicherten Authentifizierungsinformationen vor dem Entschlüsseln des geschützten Inhalts; und

    Bereitstellen von Medienausgangsinformationen auf Grundlage des geschützten Inhalts.


     
    12. Digitales Rechteverwaltungsverfahren nach Anspruch 10, ferner das selektive Hochfahren und das selektive Reduzieren von Leistung des Authentifizierungsmoduls umfassend.
     
    13. Digitales Rechteverwaltungsverfahren nach Anspruch 12, ferner Folgendes umfassend:

    Hochfahren des Authentifizierungsmoduls als Reaktion auf eine Authentifizierungsanfrage; und

    Reduzieren von Leistung des Authentifizierungsmoduls, wenn das Entschlüsselungsmodul den geschützten Inhalt entschlüsselt.


     
    14. Vorrichtung nach Anspruch 9, Folgendes umfassend:
    eine erste Schaltung, die Folgendes umfasst:

    das Authentifizierungsmodul;

    einen Speicher;

    ein Leistungsverwaltungsmodul, das dazu betrieben werden kann, das Authentifizierungsmodul unabhängig von dem Speicher hochzufahren oder dessen Leistung zu reduzieren; und

    ein Kommunikationsmodul, das dazu betrieben werden kann, drahtlos eine Anfrage für die Authentifizierungsinformationen zu übertragen und drahtlos die Authentifizierungsinformationen als Reaktion auf die Anfrage zu empfangen; und

    eine zweite Schaltung, die Folgendes umfasst:

    das Entschlüsselungsmodul; und

    ein Medienmodul, das dazu betrieben werden kann, Medienausgangsinformationen auf Grundlage des geschützten Inhalts bereitzustellen.


     
    15. Vorrichtung nach Anspruch 14, wobei die erste Schaltung einen ersten Prozessor umfasst und die zweite Schaltung einen zweiten Prozessor umfasst.
     
    16. Vorrichtung nach Anspruch 14, wobei das Entschlüsselungsmodul dazu betrieben werden kann, die Authentifizierungsinformationen aus dem Speicher zu entnehmen.
     
    17. Vorrichtung nach Anspruch 14, wobei das Leistungsverwaltungsmodul dazu betrieben werden kann, das Authentifizierungsmodul als Reaktion auf eine Authentifizierungsanfrage von dem Entschlüsselungsmodul hochzufahren und die Leistung des Authentifizierungsmoduls zu reduzieren, wenn das Entschlüsselungsmodul den geschützten Inhalt entschlüsselt.
     
    18. Vorrichtung nach Anspruch 14, ferner mindestens eines der Folgenden umfassend:

    eine Anzeige, die dazu betrieben werden kann, ein Bild auf Grundlage der Medienausgabeinformationen bereitzustellen; und

    einen Lautsprecher, der dazu betrieben werden kann, Audio auf Grundlage der Medienausgabeinformationen bereitzustellen.


     
    19. Vorrichtung nach Anspruch 14, wobei das Kommunikationsmodul hochgefahren wird, während die Leistung des Authentifizierungsmoduls reduziert ist.
     


    Revendications

    1. Système de gestion de droits numériques comprenant :

    un module d'authentification (208) opérationnel pour extraire des informations d'authentification pour un contenu protégé et réduire la puissance une fois que les informations d'authentification ont été extraites ;

    le module d'authentification étant en outre opérationnel pour stocker les informations d'authentification dans une mémoire (226) avant de réduire la puissance, la mémoire étant alimentée indépendamment du module d'authentification ; et un module de déchiffrement (216) opérationnel pour extraire et déchiffrer le contenu protégé sur la base des informations d'authentification, le module de déchiffrement étant opérationnel pour recevoir les informations d'authentification et déchiffrer le contenu protégé tandis que la puissance du module d'authentification est réduite.


     
    2. Système de gestion de droits numériques selon la revendication 1, dans lequel le module de déchiffrement est opérationnel pour extraire les informations d'authentification de la mémoire.
     
    3. Système de gestion de droits numériques selon la revendication 1, comprenant en outre un module multimédia opérationnel pour fournir des informations de sortie multimédia sur la base du contenu protégé.
     
    4. Système de gestion de droits numériques selon la revendication 1, comprenant en outre un module de gestion de puissance opérationnel pour mettre sous tension et réduire sélectivement la puissance du module d'authentification.
     
    5. Système de gestion de droits numériques selon la revendication 4, dans lequel le module de gestion de puissance est opérationnel pour mettre sous tension le module d'authentification en réponse à une demande d'authentification provenant du module de déchiffrement.
     
    6. Système de gestion de droits numériques selon la revendication 4, dans lequel le module de gestion de puissance est opérationnel pour réduire la puissance du module d'authentification lorsque le module de déchiffrement déchiffre le contenu protégé.
     
    7. Système de gestion de droits numériques selon la revendication 1, comprenant en outre un module de communication opérationnel pour transmettre une demande d'informations d'authentification et recevoir l'authentification en réponse à la demande.
     
    8. Système de gestion de droits numériques selon la revendication 7, dans lequel le module de communication est opérationnel pour réduire la puissance après la réception des informations d'authentification.
     
    9. Dispositif comprenant le système de gestion de droits numériques de la revendication 1.
     
    10. Procédé de gestion de droits numériques, comprenant :

    l'extraction, avec un module d'authentification, d'informations d'authentification pour un contenu protégé ;

    le stockage des informations d'authentification dans une mémoire alimentée indépendamment du module d'authentification ;

    la réduction de la puissance du module d'authentification après l'extraction des informations d'authentification ;

    l'extraction des informations d'authentification par un module de déchiffrement tandis que la puissance du module d'authentification est réduite ; et

    le déchiffrement du contenu protégé sur la base des informations d'authentification tandis que la puissance du module d'authentification est réduite.


     
    11. Procédé de gestion de droits numériques selon la revendication 10, comprenant en outre :

    l'extraction des informations d'authentification stockées avant le déchiffrement du contenu protégé ; et

    la fourniture d'informations de sortie multimédia sur la base du contenu protégé.


     
    12. Procédé de gestion de droits numériques selon la revendication 10, comprenant en outre la mise sous tension et la réduction de la puissance sélectives du module d'authentification.
     
    13. Procédé de gestion de droits numériques selon la revendication 12, comprenant en outre :

    la mise sous tension du module d'authentification en réponse à une demande d'authentification ; et

    la réduction de la puissance du module d'authentification lorsque le module de déchiffrement déchiffre le contenu protégé.


     
    14. Dispositif selon la revendication 9, comprenant : un premier circuit comprenant :

    le module d'authentification ;

    une mémoire ;

    un module de gestion de puissance opérationnel pour mettre sous tension et réduire sélectivement la puissance du module d'authentification indépendamment de la mémoire ; et

    un module de communication opérationnel pour transmettre sans fil une demande d'informations d'authentification et recevoir sans fil les informations d'authentification en réponse à la demande ; et

    un second circuit comprenant :

    le module de déchiffrement ; et

    un module multimédia opérationnel pour fournir des informations de sortie multimédia sur la base du contenu protégé.


     
    15. Dispositif selon la revendication 14, dans lequel le premier circuit comprend un premier processeur et le second circuit comprend un second processeur.
     
    16. Dispositif selon la revendication 14, dans lequel le module de déchiffrement est opérationnel pour extraire les informations d'authentification de la mémoire.
     
    17. Dispositif selon la revendication 14, dans lequel le module de gestion de puissance est opérationnel pour mettre sous tension le module d'authentification en réponse à une demande d'authentification provenant du module de déchiffrement et réduire la puissance du module d'authentification lorsque le module de déchiffrement déchiffre le contenu protégé.
     
    18. Dispositif selon la revendication 14, comprenant en outre au moins l'un :

    d'un écran opérationnel pour fournir une image sur la base des informations de sortie multimédia ; et

    d'un haut-parleur opérationnel pour fournir un son sur la base des informations de sortie multimédia.


     
    19. Dispositif selon la revendication 14, dans lequel le module de communication est mis sous tension tandis que la puissance du module d'authentification est réduite.
     




    Drawing

















    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description