Proximity detection employed in connection with rights...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S026000, C726S027000, C713S168000, C713S193000

Reexamination Certificate

active

07574747

ABSTRACT:
A sink sends a registration request to a source and the source validates same, and the source sends a registration response including a secret to the sink. The source then sends a proximity message including a nonce to the sink and concurrently notes a start time. The sink employs the secret and the nonce to generate a proximity value and sends same to the sources. The source receives the proximity value and concurrently notes an end time, verifies the proximity value based on the secret and the nonce, calculates from the noted start and end times an elapsed time, compares the elapsed time to a predetermined threshold value, decides from the comparison whether the sink satisfies the proximity requirement, and registers the sink as being able to access content from such source if the sink satisfies the proximity requirement.

REFERENCES:
patent: 5715403 (1998-02-01), Stefik
patent: 6133912 (2000-10-01), Montero
patent: 2002/0152393 (2002-10-01), Thoma et al.
patent: 2002/0157002 (2002-10-01), Messerges et al.
patent: 2002/0198846 (2002-12-01), Lao
patent: 2003/0065918 (2003-04-01), Willey
patent: 2004/0098583 (2004-05-01), Weber
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
Hong, S. et al., “On the Construction of a Powerful Distributed Authentication Server without Additional Key Management”,Computer Communications, 2000, 23, 1638-1644.
Managing Digital Rights in Online Publishing, “How Two Publishing Houses Maintain Control of Copyright”Information Management&Technology, 2001, 34(4), 168-169.
Jakobsson, M. et al., “Proprietary Certificates”,Topics in Cryptology, 2002, 164-181.
Kumik, P. “Digital Rights Management”,Computers and Law, 2000, 11(4), 14-15.
Torrubia, A. et al., “Cryptography Regulations for E-commerce and Digital Rights Management”,Computer&Security, 2001, 20(8), 724-738.
Zwollo, K. “Digital Document Delivery and Digital Rights Management”,Information Services&Use, 2001, 9-11.
Griswold, G.N. “A Method for Protecting Copyright on Networks”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 169-178.
Kahn, R.E. “Deposit, Registration and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 111-120.
Evans, P. “DRM: Is the Road to Adoption Fraught with Potholes?”Seybold Reporting Analyzing Publishing Technologies, 2001, 1(14), 32.
Fowler, T.B. “Technology's Changing Role in Intellectual Property Rights”,IT Professional(IEEE), 2002, 4(2), 39-44.
Gable, J. “The Digital Rights Conundrum”,Transform Magazine, 2001, 10(11); 27.
Gunter, C.A., et al. “Models and Languages for Digital Rights”,Proceedings of the 34thAnnual Hawaii International Conference on System Sciences, 2001, 1-5.
Peinado, M. “Digital Rights Management in a Multimedia Environment”,SMPTE Journal, 2002, 111(3), 159-163.
Royan, B. Content Creation and Rights Management; Experiences of SCRAN(the Scottish Cultural Resources Access Network),Program, 2000, 34(2), 131-142.
Valimaki, M. et al., “Digital Rights Management on Open and Semi-Open Networks”,WIAPP, 2001, 154-155.
Yu, H. “Digital Multimedia at Home and Content Rights Management”,IEEE, Proceedings 2002 IEEE 4thInternational Workshop on Networked Appliances, 2002, 49-56.
Hwang, C. et al., “Protection of Digital Contents on Distributed Multimedia Environment”,Proceedings of the LASTED International Conference, Internet and Multimedia Systems and Applications, Nov. 19-23, 2000, Las Vegas, Nevada, USA, pp. 127-132.
Comino, N. et al., “A Novel Data Distribution Technique for Host-Client Type Parallel Applications”,IEEE Transactions on Parallel and Distributed Systems, 2002, 13(2), 97-110.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Proximity detection employed in connection with rights... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Proximity detection employed in connection with rights..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Proximity detection employed in connection with rights... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4082104

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.