Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2007-08-07
2007-08-07
Moazzami, Nasser (Department: 2136)
Information security
Prevention of unauthorized use of data including prevention...
C726S014000, C726S032000, C380S201000
Reexamination Certificate
active
10820673
ABSTRACT:
A computing device has instantiated thereon a protected media path for delivering content from a source to a sink. In the protected media path, a media base provides a protected environment in the computing device and includes a common infrastructure of core components effectuating processing of content from any particular source and delivering the processed content to any particular sink, and also includes a policy engine enforcing policy on behalf of the source. The policy corresponds to the content from the source and includes rules and requirements for accessing and rendering the content, whereby the media base allows content to flow through the computing device in a protected fashion, and allows for arbitrary processing of the protected content in the computing device.
REFERENCES:
patent: 5715403 (1998-02-01), Stefik
patent: 6266480 (2001-07-01), Ezaki et al.
patent: 7120250 (2006-10-01), Candelore
patent: 2002/0023207 (2002-02-01), Olik
patent: 2002/0036991 (2002-03-01), Inoue
patent: 2003/0165241 (2003-09-01), Fransdonk
patent: 2005/0071280 (2005-03-01), Irwin et al.
patent: 2005/0089164 (2005-04-01), Lang et al.
patent: 2005/0123276 (2005-06-01), Sugaya
patent: 2005/0131832 (2005-06-01), Fransdonk
patent: 2005/0265549 (2005-12-01), Sugiyama et al.
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
Hong, S. et al., “On the construction of a powerful distributed authentication server without additional key management”,Computer Communications, 2000, 23, 1638-1644.
Managing Digital Rights in Online Publishing, “How two publishing houses maintain control of copyright”Information Management&Technology, 2001, 34(4), 168-169.
Jakobsson, M. et al., “Proprietary Certificates”,Topics in Cryptology, 2002, 164-181.
Kumik, P. “Digital Rights Management”,Computers and Law, 2000, 11(4), 14-15.
Torrubia, A. et al., “Cryptography regulations for E-commerce and digital rights management”,Computers&Security, 2001, 20(8), 724-738.
Zwollo, K. “Digital document delivery and digital rights management”,Information Services&Use, 2001 , 9-11.
Griswold, G.N. “A Method for Protecting Copyright on Networks”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 169-178.
Kahn, R.E. “Deposit, Registration and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 111-120.
Evans, P. “DRM: Is the Road to Adoption Fraught with Potholes?”Seybold Reporting Analyzing Publishing Technologies, 2001, 1(14), 32.
Fowler, T.B. “Technology's Changing Role in Intellectual Property Rights”,IT Professional(IEEE), 2002, 4(2), 39-44.
Gable, J. “The Digital Rights Conundrum”,Transform Magazine, 2001, 10(11), 27.
Gunter, C.A., et al. “Models and Languages for Digital Rights”,Proceedings of the 34thAnnual Hawaii International Conference on System Sciences, 2001, 1-5.
Peinado, M. “Digital rights management in a multimedia environment”,SMPTE Journal, 2002, 111(3), 159-163.
Royan, B. Content creation and rights management; experiences of SCRAN(the Scottish Cultural Resources Access Network),Program, 2000, 34(2), 131-142.
Valimaki, M. et al., “Digital rights management on open and semi-open networks”,WIAPP, 2001, 154-155.
Yu, H. “Digital multimedia at home and content rights management”,IEEE, Proceedigns 2002 IEEE 4thInternational Workshop on Networked Appliances, 2002, 49-56.
Hwang, C. et al., “Protection of Digital Contents on Distributed Multimedia Environment”,Proceedings of the IASTED International Conference, Internet and Multimedia Systems and Applications, Nov. 19-23, 2000, Las Vegas, Nevada, USA, pp. 127-132.
Castro, M. et al., “Secure Routing for Structured Peer-to-Peer Overlay Networks”,Proceedings of the 5thSymposium on Operating Systems Design and Implementation, 2002, 299-314.
Friend, R., “Making the Gigabit IPsec VPN Architecture Secure”,Computer, 2004, 37(6), 54-60.
Hulicki, Z., Security Aspects in Content Delivery Networks [DVB Networks],6thWorld Multiconference on Systemics, Cybernetics and Informatics. Proceedings, 2002, 10, 135-139.
McGarvey, R., “Abortext: Enabler of Multichannel Publishing”,EContent, 2002, 25(4), 48-49.
Moffett, S. et al., “Contributing and Enabling Technologies for Knowledge Management”,International Journal of Information technology and Management, 2003, 2(1-2)31-49.
Alkove James M.
Dunbar Geoffrey
Knowlton Chadd
Moazzami Nasser
Shiferaw Eleni A.
Woodcock & Washburn LLP
LandOfFree
Protected media path and refusal response enabler does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protected media path and refusal response enabler, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protected media path and refusal response enabler will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3864994