•Approach:
–distribute content in a virtual
lockbox
–only authorized player devices
can unlock it
–authorized player devices
enforce limits on use
•Typical implementation:
–distribute content in encrypted
form
–authorized player knows
decryption key
•Can enforce any limits on usage