Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2007-04-10
2007-04-10
Moazzami, Nasser (Department: 2136)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S007000, C726S031000, C726S032000, C380S201000
Reexamination Certificate
active
09892318
ABSTRACT:
An enforcement architecture and method for implementing roaming digital rights management are disclosed. A license distributed from a license server to a computing device of a user may be uploaded to a license synchronization server, and rebound to other devices registered with the service, thereby enabling access to the licensed content from other computing devices. A second digital license of a second computing device is set to expire prior to a first digital license of a first computing device. Reactivating a decayed first digital license, that is deactivated during transmission of the second digital license, to the second device to access content of the first computing device.
REFERENCES:
patent: 5390297 (1995-02-01), Barber et al.
patent: 6223291 (2001-04-01), Puhl et al.
patent: 6418421 (2002-07-01), Hurtado et al.
patent: 6678665 (2004-01-01), Benson et al.
patent: 6772133 (2004-08-01), Kambayashi et al.
patent: 2002/0007454 (2002-01-01), Tarpenning et al.
patent: 2002/0046181 (2002-04-01), Story et al.
patent: 2002/0065781 (2002-05-01), Hillegass et al.
patent: 2002/0107809 (2002-08-01), Biddle et al.
patent: 2002/0194008 (2002-12-01), Yang et al.
Hauser, R.C., “does licensing require new access control techniques?” Aug. 1993, 9 pages.
Kaplan, M.A., “IBM Cyrptolopes, Super-Distribution and Digital Rights Management,” Dec. 1996, 7 pages.
Kohl, U., et al., “Safeguarding digital library contents and users; protecting documents rather than channels,”D-Lib Magazine, Sep. 1997, 9 pages.
Sibert, O., et al., “Securing the content, not the wire, for information commerce,” Jul. 1995, 1-11.
Stefik, M., “Shifting the possible: How trusted systems and digital property rights challenge us to rethink digital publishing,”Technical Perspective,, 1997, 137-159.
“Rights Management in the Digital Age: trading in bits, not atoms,” Spring, 1997, 4, 3 pages.
Weber. R. “Digital rights management technology,” Oct. 1995, 1-49.
Scanlon, M., “Secure web-based licensing,”C/C++ Users J., www.cuj.com, Nov. 2000, 42-50.
Uda, R., et al., “Software-based music delivery platform,”Facility of Science&Technology, Aug. 2000, 41(8), 2237-2245 (English Abstract).
Vollmer, A., “Security Ics are targeting consumer applications,”Electronic Design, Nov. 6, 2000, 105-153.
U.S. Appl. No. 09/525,206, filed Mar. 15, 2000, Peinado et al.
Abburi Rajasekhar
Alkove James M.
McKune Jeffrey R.
McNeill William P.
Microsoft Corporation
Moazzami Nasser
Shiferaw Eleni
Woodcock & Washburn LLP
LandOfFree
Enforcement architecture and method for digital rights... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Enforcement architecture and method for digital rights..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Enforcement architecture and method for digital rights... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3734873