Releasing decrypted digital content to an authenticated path

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S051000, C705S057000, C713S166000, C713S162000, C713S193000, C713S188000, C380S277000, C380S043000, C726S004000

Reexamination Certificate

active

07353209

ABSTRACT:
Digital content is released to a rendering application for forwarding by such rendering application to an ultimate destination by way of a path therebetween. The path is defined by at least one module, and the digital content is initially in an encrypted form. An authentication of at least a portion of the path is performed to determine whether each defining module thereof is to be trusted to appropriately handle the digital content passing therethrough. The encrypted digital content is decrypted if in fact each such defining module is to be trusted, and the decrypted digital content is forwarded to the rendering application for further forwarding to the ultimate destination by way of the authenticated path.

REFERENCES:
patent: 3718906 (1973-02-01), Lightner
patent: 4323921 (1982-04-01), Guillou
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4827508 (1989-05-01), Shear
patent: 4916738 (1990-04-01), Chandra et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 4977594 (1990-12-01), Shear
patent: 5050213 (1991-09-01), Shear
patent: 5103392 (1992-04-01), Mori
patent: 5103476 (1992-04-01), Waite et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5117457 (1992-05-01), Comerford et al.
patent: 5193573 (1993-03-01), Chronister
patent: 5222134 (1993-06-01), Waite et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5410598 (1995-04-01), Shear
patent: 5509070 (1996-04-01), Schull
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5673316 (1997-09-01), Auerbach et al.
patent: 5710887 (1998-01-01), Chelliah et al.
patent: 5715403 (1998-02-01), Stefik
patent: 5765152 (1998-06-01), Erickson
patent: 5809144 (1998-09-01), Sirbu et al.
patent: 5809145 (1998-09-01), Slik et al.
patent: 5825879 (1998-10-01), Davis
patent: 5845281 (1998-12-01), Benson et al.
patent: 5926624 (1999-07-01), Katz et al.
patent: 5935248 (1999-08-01), Kuroda
patent: 5949879 (1999-09-01), Berson et al.
patent: 5983350 (1999-11-01), Minear et al.
patent: 6058476 (2000-05-01), Matsuzaki et al.
patent: 6061451 (2000-05-01), Muratani et al.
patent: 6069647 (2000-05-01), Sullivan et al.
patent: 6158011 (2000-12-01), Chen et al.
patent: 6170060 (2001-01-01), Mott et al.
patent: 6230272 (2001-05-01), Lockhart et al.
patent: 6266420 (2001-07-01), Langford et al.
patent: 6374355 (2002-04-01), Patel
patent: 6425081 (2002-07-01), Iwamura
patent: 6772340 (2004-08-01), Peinado et al.
patent: 6799270 (2004-09-01), Bull et al.
patent: 6816596 (2004-11-01), Peinado et al.
patent: 6829708 (2004-12-01), Peinado et al.
patent: 7016498 (2006-03-01), Peinado et al.
patent: 2004/0010684 (2004-01-01), Douglas
patent: 2004/0083289 (2004-04-01), Karger et al.
patent: 2005/0010766 (2005-01-01), Holden et al.
patent: 0 409 397 (1991-01-01), None
patent: 0 715 246 (1996-06-01), None
patent: 0 715 247 (1996-06-01), None
patent: WO93/01550 (1993-01-01), None
patent: WO96/13013 (1996-05-01), None
patent: WO96/24092 (1996-08-01), None
patent: WO96/27155 (1996-09-01), None
patent: WO97/25798 (1997-07-01), None
patent: WO97/43761 (1997-11-01), None
patent: WO98/09209 (1998-03-01), None
patent: WO98/10381 (1998-03-01), None
patent: WO98/21679 (1998-05-01), None
patent: WO98/21683 (1998-05-01), None
patent: WO98/24037 (1998-06-01), None
patent: WO98/37481 (1998-08-01), None
patent: WO98/58306 (1998-12-01), None
“Aladdin Knowledge Systems Partners with Rights Exchange, Inc. to Develop a Comprehensive Solution for Electronic Software Distribution,” Aug. 3, 1998, 5 pages.
Amdur, D., “Metering Online Copyright,” Jan. 16, 1996, 2 pages.
Amdur, D. (ed.), “InterTrust Challenges IBM Digital Content Metering,”Report On Electronic Commerce, Jul. 23, 1996, 3(15), 1-2 and 16-18.
Armati, D., “Tools and standards for protection, control and presentation of data,” Apr. 3, 1996, 17 pages.
Benjamin, R. et al., “Electronic markets and virtual value chains on the information superhighway,”Sloan Management Rev., Winter, 1995, 62-72.
Cassidy, “A Web developers guide to content encapsulation technology,” Apr. 1997, 5 pages.
Clark, T., “Software Secures Digital Content on Web,”Interactive Week, Sep. 25, 1995, 1 page.
Cox, B., “Superdistribution,”Idees Fortes, Sep. 1994, 2 pages.
Cox, B., “What if There Is A Silver Bullet,”J. Object Oriented Programm., Jun. 1992, 8-9 and 76.
Griswold, G.N., “A Method for Protecting Copyright on Networks,”IMA Intell. Property Project Proceedings, Jan. 1994, 1(1), 169-178.
Hauser, R.C., “Does licensing require new access control techniques?”, Aug. 1993, 9 pages.
Hudgins-Bonafield, C. “Selling Knowledge on the Net,”Network Computing, Jun. 1, 1995, 102-109.
“IBM spearheading intellectual property protection technology for information on the Internet,” May 1996, 3 pages.
“Technological Solutions Rise to Complement Law's Small Stick Guarding Electronic Works,”Information Law Alert, Jun. 16, 1995, 3-4 and 7.
Kaplan, M.A., “IBM Cryptolopes—, Super-Distribution and Digital Rights Management,” Dec. 1996, 7 pages.
Kent, S.T., “Protecting externally supplied software in small computers,” Sep. 1980, 1-42 and 250-252.
Kohl, U. et al., “Safeguarding Digital Library Contents and Users; Protecting Documents Rather Than Channels,”D-Lib Magazine, Sep. 1997, 9 pages.
Linn, R.J., “Copyright and Information Services in the Context of the National Research and Education Network,”IMA Intell. Property Project Proceedings, Jan. 1994, 1(1), 1 and 10-20.
McNab, L., “Super-distribution works better in practical applications,” Mar. 2, 1998, 2 pages.
Moeller, M., “NetTrust lets Cyberspace Merchants Take Account,”PC Week, Nov. 20, 1995, 12(48), 1 page.
Moeller, M., “IBM takes charge of E-commerce; Plans client, server apps based on SET,” Apr. 1996, 4 pages.
Pemberton, J., “An ONLINE Interview with Jeff Crigler at IBM InfoMarket,” Jul. 1996, 7 pages.
“LicensIt: kinder, gentler copyright? Copyright management system links content, authorship information,”Seybold Report on Desktop Publishing, 1996, 10(11), 2 pages.
Sibert, O. et al., “The DigiBox: A Self-protecting Container for Information Commerce,”First USENIX Workshop on Electronic Commerce, Jul. 11-12, 1995, 171-183.
Sibert, O. et al., “Securing the Content, Not the Wire, for Information Commerce,” Jul. 1995, 1-11.
Smith, M.G. et al., “A New Set of Rules For Information Commerce,”Electronic Commerce, Nov. 6, 1995, 34-35.
Stefik, M., Trusted Systems, Mar. 1997, 8 pages.
Stefik, M., “Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing,”Technical Perspective, 1997, 137-159.
Tarter, J. (ed.), “The Superdistribution Model,”Soft Trends, Nov. 15, 1996, 13(6), 1-6.
“Rights Management in the Digital Age: Trading in Bits, Not Atoms,” Spring, 1997, 4, 3 pages.
Weber, R., “Digital Rights Management Technology,” Oct. 1995, 1-49.
White, S.R. et al., ABYSS: An Architecture for Software Protection,IEEE Trans. On Software Engineering, Jun. 1990, 16(6), 619-629.
White, S.R. et al., “ABYSS: A trusted architecture for software protection,”IEEE Symposium on Security and Privacy, Apr. 27-29, 1987, 38-51.
“Boxing Up Bytes,” 2 pages.
Ramanujapuram, A. et al., “Digital Content & Intellectual Property Rights: A specification language and tools for rights management,” Dec. 1998, 20-23 and 26.
Choudhury, A.K. et al., “Copyright Protection for Electronic Publishing over Computer Networks”,AT&T Bell Laboratories, Murray Hill, NJ 07974, www.citeseer.nj.nec.com, 18 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Releasing decrypted digital content to an authenticated path does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Releasing decrypted digital content to an authenticated path, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Releasing decrypted digital content to an authenticated path will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2753861

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.