Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2008-04-29
2008-04-29
Hewitt, II, Calvin Loyd (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S050000, C705S051000, C705S059000
Reexamination Certificate
active
07366701
ABSTRACT:
A copyright protection scheme downloads data from a server, typically over the World Wide Web to a client for presentation to a user. The downloaded data is cryptographically protected, by encryption and hashing. When displayed by the client, storing and copying functions are selectively disabled in respect of the data, in order to prevent unauthorized copying.
REFERENCES:
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5398285 (1995-03-01), Borgelt et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5563946 (1996-10-01), Cooper et al.
patent: 5745568 (1998-04-01), O'Connor et al.
patent: 5809145 (1998-09-01), Slik et al.
patent: 5819293 (1998-10-01), Comer et al.
patent: 5841978 (1998-11-01), Rhoads
patent: 5982899 (1999-11-01), Probst
patent: 5983348 (1999-11-01), Ji
patent: 6014651 (2000-01-01), Crawford
patent: 6055314 (2000-04-01), Spies et al.
patent: 6092192 (2000-07-01), Kanevsky et al.
patent: 6122403 (2000-09-01), Rhoads
patent: 6173332 (2001-01-01), Hickman
patent: 6182142 (2001-01-01), Win et al.
patent: 6212640 (2001-04-01), Abdelnur et al.
patent: 6216173 (2001-04-01), Jones et al.
patent: 6253193 (2001-06-01), Ginter et al.
patent: 714204 (1996-05-01), None
patent: A-0718761 (1996-06-01), None
patent: WO-A-9407204 (1994-03-01), None
Parker, Dana J. CD-ROM Professional, Wilton: Dec. 1996, Vol. 9, Iss. 12; p. 89, 2 pgs.
Journalist's SIG, Feb. 8, 1997, pp. 1-2.
Imprimatur: Special Interest Group Manual, 1997, pp. 1-20.
Koblin et al., “The Imprimatur Multimedia IPR Management System”, TELES AG (1997).
Imprimatur: “Protection of Technological Measures”, Institute for Information Law, Amsterdam, Nov. 1998, pp. 1-74.
Kobielus, “Buyers Guide, Gotcha!” from Network World Journal, p. 45.
Yordon E., “Java, the Web, and Software Development”, Computer, vol. 29, No. 8.
Bender W. et al., “Techniques for Data Hiding”, IBM Systems Journal, vol. 35, No. 3, pp. 313-335.
Dean et al., “Java Security: From HotJava to Netscape and Beyond”, Proc. of the 1996 IEEE symposium on security and privacy, Oakland, CA., pp. 190-200.
M. Satyanarayanan, Coda: A Highly Available File System for a Distributed Workstation Environment, IEEE, pp. 114-117, Dec. 1989.
M. Satyananarayanan, et al., A Highly Available File System for a Distributed Workstation Environment, IEEE, pp. 447-459, Apr. 1990.
Tobbicke, Distributed File Systems: Focus on Andrew File System/Distributed File Service (AFS/DFS), Dec. 1994.
Gupta et al., Reliable Garage Collection in Distributed Object Oriented System, Proceedings COMPSAC 88: The 12the Inter Computer Software and Applications Conference, Oct. 5-7, 1988, pp. 324-328.
Bramhill Ian Duncan
Sims Matthew Robert Charles
British Telecommunications public limited company
Hewitt II Calvin Loyd
Nixon & Vanderhye P.C.
LandOfFree
Copy protection of data does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Copy protection of data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Copy protection of data will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2796320