Beyond proprietary protocols: a new era of content key security