Accessing protected content in a rights-management architecture

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S026000

Reexamination Certificate

active

08032943

ABSTRACT:
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or “inscribed”); source-signed; and fully-individualized (or “owner exclusive”). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content. The client components include an object which accesses encrypted content, an object that parses the license and enforces the rights in the license, an object which obtains protection software and data that is individualized for the client and/or the persona operating the client, and a script of instructions that provides individualization information to a distributor of content so that the content may be individualized for the client and/or its operating persona. Content is generally protected by encrypting it with a key and then sealing the key into the content in a way that binds it to the meta-data associated with the content. In some instances, the key may also be encrypted in such a way as to be accessible only by the use of individualized protection software installed on the client, thereby binding use of the content to a particular client or set of clients.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4688169 (1987-08-01), Joshi
patent: 4827508 (1989-05-01), Shear
patent: 4924378 (1990-05-01), Hershey et al.
patent: 4977594 (1990-12-01), Shear
patent: 5050213 (1991-09-01), Shear
patent: 5191573 (1993-03-01), Hair
patent: 5222134 (1993-06-01), Waite et al.
patent: 5359659 (1994-10-01), Rosenthal
patent: 5410598 (1995-04-01), Shear
patent: 5509070 (1996-04-01), Schull
patent: 5530235 (1996-06-01), Stefik et al.
patent: 5625693 (1997-04-01), Rohatgi et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5654746 (1997-08-01), McMullan, Jr. et al.
patent: 5666411 (1997-09-01), McCarty
patent: 5675734 (1997-10-01), Hair
patent: 5708709 (1998-01-01), Rose
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5715403 (1998-02-01), Stefik
patent: 5724425 (1998-03-01), Chang et al.
patent: 5734823 (1998-03-01), Saigh et al.
patent: 5734891 (1998-03-01), Saigh
patent: 5742677 (1998-04-01), Pinder et al.
patent: 5765152 (1998-06-01), Erickson
patent: 5784609 (1998-07-01), Kurihara
patent: 5809145 (1998-09-01), Slik et al.
patent: 5845281 (1998-12-01), Benson et al.
patent: 5864620 (1999-01-01), Pettitt
patent: 5883955 (1999-03-01), Ronning
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5940504 (1999-08-01), Griswold
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5949876 (1999-09-01), Ginter et al.
patent: 5970475 (1999-10-01), Barnes et al.
patent: 5982891 (1999-11-01), Ginter et al.
patent: 5983273 (1999-11-01), White et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 5991402 (1999-11-01), Jia et al.
patent: 5999622 (1999-12-01), Yasukawa et al.
patent: 6006332 (1999-12-01), Rabne et al.
patent: 6021492 (2000-02-01), May
patent: 6029046 (2000-02-01), Khan et al.
patent: 6035403 (2000-03-01), Subbiah et al.
patent: 6049612 (2000-04-01), Fielder et al.
patent: 6067582 (2000-05-01), Smith et al.
patent: 6088717 (2000-07-01), Reed et al.
patent: 6199053 (2001-03-01), Herbert et al.
patent: 6226618 (2001-05-01), Downs et al.
patent: 6298446 (2001-10-01), Schreiber et al.
patent: 6331865 (2001-12-01), Sachs et al.
patent: 6385596 (2002-05-01), Wiser et al.
patent: 6425017 (2002-07-01), Dievendorff et al.
patent: 6449645 (2002-09-01), Nash
patent: 6606604 (2003-08-01), Dutta
patent: 6629138 (2003-09-01), Lambert et al.
patent: 6718361 (2004-04-01), Basani et al.
patent: 6970849 (2005-11-01), DeMello et al.
patent: 6996720 (2006-02-01), DeMello et al.
patent: 7047411 (2006-05-01), DeMello et al.
patent: 7243241 (2007-07-01), Katsumata et al.
patent: 7263497 (2007-08-01), Wiser et al.
patent: 7562395 (2009-07-01), DeMello et al.
patent: 7707643 (2010-04-01), DeMello et al.
patent: 2001/0011238 (2001-08-01), Eberhard et al.
patent: 2002/0002611 (2002-01-01), Vange
patent: 2002/0007454 (2002-01-01), Tarpenning et al.
patent: 2002/0069265 (2002-06-01), Bountour et al.
patent: 2002/0129261 (2002-09-01), Cromer et al.
patent: 0778512 (1997-06-01), None
patent: 0795809 (1997-09-01), None
patent: 0843449 (1998-05-01), None
patent: 0778512 (2000-12-01), None
patent: 0795809 (2003-08-01), None
patent: 0843449 (2004-03-01), None
patent: 2-20188 (1990-01-01), None
patent: 7-212355 (1995-08-01), None
patent: 8-125651 (1996-05-01), None
patent: 8-221492 (1996-08-01), None
patent: 8-263440 (1996-10-01), None
patent: 9-288575 (1997-04-01), None
patent: 9-292988 (1997-11-01), None
patent: 10-126406 (1998-05-01), None
patent: 10-214233 (1998-08-01), None
patent: 10-513289 (1998-12-01), None
patent: 11-24916 (1999-01-01), None
patent: 11-96674 (1999-04-01), None
patent: 11-112494 (1999-04-01), None
patent: 11-202765 (1999-07-01), None
patent: 11-203205 (1999-07-01), None
patent: 11-507752 (1999-07-01), None
patent: 11-283327 (1999-10-01), None
patent: 11-284865 (1999-10-01), None
patent: 11-328850 (1999-11-01), None
patent: 2001-517877 (2001-10-01), None
patent: 2003-518282 (2003-06-01), None
patent: WO 96/24092 (1996-08-01), None
patent: WO 96/24092 (1996-10-01), None
patent: WO 96/42041 (1996-12-01), None
patent: WO 98/44402 (1998-10-01), None
patent: WO 98/45768 (1998-10-01), None
patent: WO 98/58306 (1998-12-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 99/26123 (1999-05-01), None
patent: WO 99/45491 (1999-09-01), None
patent: WO 99/55055 (1999-10-01), None
patent: WO 99/63416 (1999-12-01), None
patent: WO 00/08909 (2000-02-01), None
patent: WO 00/21239 (2000-04-01), None
patent: WO 00/08909 (2000-11-01), None
patent: WO 00/75760 (2000-12-01), None
patent: WO 01/44907 (2001-06-01), None
patent: WO 02/01329 (2002-01-01), None
Auchsmith, “Tamper Resistant Software: An Implementation”, First International Workshop, Anderson Ross (ed., ), 1996, 317-333.
Hughes, Jr., “Internet Security”, 1st ed., Impress Corporation, Japan, Feb. 21, 1997, 94-101.
Jaeger et al., “Flexible Control of Downloaded Executable Content”, ACM Transactions on Information and System Security (TISSEC), May 1999, 2(2), 177-228.
Nakamura et al., “Usability Evaluation of Contents Downloading Methods based on IC cards with Electronic Rights to Download Contents”, The Transactions of the Institute of Electronics, Information and Communication Engineers 1999, Communication 2, The Institute of Electronics, Information and Communication Engineers, Mar. 8, 1999, B-7-69, p. 178.
Okamoto, “Cryptographic Technology Aiming at Implementation of Bright Informational Society, 5 Cryptographic Key Distribution Management”, bit, Kyoritsu Shuppan Co., Ltd., Japan, Nov. 1, 1991, 23(12), 51-59.
Riley et al., “Open eBook.TM. Publication Structure 1.0”, Sep. 16, 2000, 1-77.
Shamir et al., “Playing Hide and Seek with Stored Keys”, FC '99 Proceedings of the Third International Conference on Financial Cryptography, Sep. 22, 1998, 118-124.
Sirbu et al., “Distributed Authentication in Kerberos Using Public Key Cryptography”, Network and Distributed System Security, Proceedings on Network and Distributed System Security, San Diego, CA , USA, Feb. 10-11, 1997, 134-141

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Accessing protected content in a rights-management architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Accessing protected content in a rights-management architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Accessing protected content in a rights-management architecture will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4285403

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.