System for controlling access and distribution of digital proper

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 9, 380 23, 380 25, 380 49, 380 50, H04L 900

Patent

active

059334983

ABSTRACT:
A method and device are provided for controlling access to data. Portions of the data are protected and rules concerning access rights to the data are determined. Access to the protected portions of the data is prevented, other than in a non-useable form; and users are provided access to the data only in accordance with the rules as enforced by a mechanism protected by tamper detection. A method is also provided for distributing data for subsequent controlled use of those data. The method includes protecting portions of the data; preventing access to the protected portions of the data other than in a non-useable form; determining rules concerning access rights to the data; protecting the rules; and providing a package including: the protected portions of the data and the protected rules. A user is provided controlled access to the distributed data only in accordance with the rules as enforced by a mechanism protected by tamper protection. A device is provided for controlling access to data having protected data portions and rules concerning access rights to the data. The device includes means for storing the rules; and means for accessing the protected data portions only in accordance with the rules, whereby user access to the protected data portions is permitted only if the rules indicate that the user is allowed to access the portions of the data.

REFERENCES:
patent: 3504132 (1970-03-01), Wallace, Jr.
patent: 3764742 (1973-10-01), Abbott et al.
patent: 3798359 (1974-03-01), Feistel
patent: 3878331 (1975-04-01), Morgan et al.
patent: 3906460 (1975-09-01), Halpern
patent: 3911216 (1975-10-01), Bartek et al.
patent: 3944976 (1976-03-01), France
patent: 3958081 (1976-05-01), Ehrsam et al.
patent: 3996449 (1976-12-01), Attanasio et al.
patent: 4004089 (1977-01-01), Richard et al.
patent: 4028678 (1977-06-01), Moran
patent: 4037215 (1977-07-01), Birney et al.
patent: 4074066 (1978-02-01), Ehrsam et al.
patent: 4087856 (1978-05-01), Attanasio
patent: 4120030 (1978-10-01), Johnstone
patent: 4168396 (1979-09-01), Best
patent: 4183085 (1980-01-01), Roberts et al.
patent: 4193131 (1980-03-01), Lennon et al.
patent: 4206315 (1980-06-01), Matyas et al.
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4246638 (1981-01-01), Thomas
patent: 4264782 (1981-04-01), Konheim
patent: 4278837 (1981-07-01), Best
patent: 4281215 (1981-07-01), Atalla
patent: 4306289 (1981-12-01), Lumley
patent: 4319079 (1982-03-01), Best
patent: 4323921 (1982-04-01), Guillou
patent: 4433207 (1984-02-01), Best
patent: 4446519 (1984-05-01), Thomas
patent: 4454594 (1984-06-01), Heffron et al.
patent: 4458315 (1984-07-01), Uchenick
patent: 4465901 (1984-08-01), Best
patent: 4471163 (1984-09-01), Donald et al.
patent: 4529870 (1985-07-01), Chaum
patent: 4558176 (1985-12-01), Arnold et al.
patent: 4646234 (1987-02-01), Tolman et al.
patent: 4658093 (1987-04-01), Hellman
patent: 4757533 (1988-07-01), Allen et al.
patent: 4796181 (1989-01-01), Wiedemer
patent: 4827508 (1989-05-01), Shear
patent: 4924378 (1990-05-01), Hershey et al.
patent: 4932054 (1990-06-01), Chou et al.
patent: 4937863 (1990-06-01), Robert et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 4961142 (1990-10-01), Elliott et al.
patent: 4977594 (1990-12-01), Shear
patent: 5010571 (1991-04-01), Katznelson
patent: 5014234 (1991-05-01), Edwards, Jr.
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5027396 (1991-06-01), Platteter et al.
patent: 5047928 (1991-09-01), Wiedemer
patent: 5050213 (1991-09-01), Shear
patent: 5058162 (1991-10-01), Santon et al.
patent: 5058164 (1991-10-01), Elmer et al.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5113519 (1992-05-01), Johnson et al.
patent: 5146499 (1992-09-01), Geffrotin
patent: 5159182 (1992-10-01), Eisele
patent: 5191193 (1993-03-01), LeRoux
patent: 5204897 (1993-04-01), Wyman
patent: 5222134 (1993-06-01), Waite et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5247575 (1993-09-01), Sprague et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5263157 (1993-11-01), Janis
patent: 5263158 (1993-11-01), Janis
patent: 5291596 (1994-03-01), Mita
patent: 5301231 (1994-04-01), Abraham et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5337357 (1994-08-01), Chou et al.
patent: 5339091 (1994-08-01), Yamazaki et al.
patent: 5345588 (1994-09-01), Greenwood et al.
patent: 5347578 (1994-09-01), Duxbury
patent: 5369702 (1994-11-01), Shanton
patent: 5386469 (1995-01-01), Yearsley et al.
patent: 5386471 (1995-01-01), Bianco
patent: 5388156 (1995-02-01), Blackledge, Jr. et al.
patent: 5392351 (1995-02-01), Hasebe et al.
patent: 5394469 (1995-02-01), Nagel et al.
patent: 5400403 (1995-03-01), Fahn et al.
patent: 5410598 (1995-04-01), Shear
patent: 5432849 (1995-07-01), Johnson et al.
patent: 5438508 (1995-08-01), Wyman
patent: 5442541 (1995-08-01), Hube et al.
patent: 5450489 (1995-09-01), Ostrover et al.
patent: 5473687 (1995-12-01), Lipscomb et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5530235 (1996-06-01), Stefik et al.
patent: 5592549 (1997-01-01), Nagel et al.
patent: 5594491 (1997-01-01), Hodge et al.
patent: 5594936 (1997-01-01), Rebec et al.
patent: 5615264 (1997-03-01), Kazmierczak et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5646992 (1997-07-01), Subler et al.
patent: 5673316 (1997-09-01), Auerbach et al.
Abrams, M. D. et al, "Cyptography", Information Security-An Integrated Collection of Essays, Abrams, M.D. et al eds., IEEE Computer Society Press 1995, pp. 350-384.
Choudhury, A. K. et al, "Copyright Protection for Electronic Publishing Over Computer Networks", IEEE Network, May/Jun. 1995, pp. 12-20.
Ciciora, W. S., "Inside the Set-Top Box", IEEE Spectrum, Apr. 1995, vol. 32, No. 4, pp. 70-75.
Department of Defense Standard, Department of Defense Trusted Computer System Evaluation Criteria, DOD 2500.28-STD, GPO 1986-623-93, 643 0, Dec. 26, 1985.
Graubart, R., "On the Need for a Third Form of Access Control", Proceedings of the 12.sup.th National Computer Security Conference, 1989, pp. 296-303.
K. Brunnstein and P. P. Sint, eds., KnowRight'95, Intellectual Property Rights and New Technologies: Proceedings of the KnowRight'95 Conference, Austrian Computer.
Low, S. H. et al, "Document Marking and Identification using both Line and Word Shifting", 1995 InfoCom Proceedings, IEEE, 1995, pp. 853-860.
McCollum, C. J. et al, "Beyond the Pale of MAC and DAC: Defining New Forms of Access Control", Proceedings of the Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1990, pp. 190-200.
National Institute of Standards and Technology (NIST) and National Security Agency (NSA), Federal Criteria for Information Technology Security: vol. I, Protection Profile Development; vol. II, Registry of Protection Profiles, Version 1.0, Dec. 1992.
Samuelson, P., "Copyright and Digital Libraries", Communications of the AMC, Apr. 1995, vol. 38, No. 3, pp. 15-20 & 110.
Samuelson, P. et al, "A Manifesto Concerning the Legal Protection of Computer Programs", Columbia Law Review, vol. 94, No. 8, pp. 2308-2431.
Sandhu, R. S. "The Typed Access Matrix Model", Proceedings of the Symposium on Research in Security and Provacy, IEEE Computer Society, 1992, pp. 122-136.
Sandhu, R. S. et al, "Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment", Proceedings of the 15th National Computer Security Conference, 1992b, pp. 221-235.
Yee, B., "Using Secure Coprocessors", Carnegie Mellon University, School of Computer Science, CMU-CS-94-149, May 1994, (also available Defense Technical Information Center as AD-A281 255).
Maxem Chuk, N.F., Sep. 1994, "Electronic Document Distribution," AT&T Technical Journal, pp. 73-80.
Weber, R., "Metering Technologies For Digital Intellectual Property," A Report to the Internatinal Federation of Reproduction Rights Organization, Oct. 1994,pp. 1-29.
Clark, P.C. and Hoffman, L.J., "Bits: A Smartcard Protected Operating System," Communications of the ACM, Nov. 1994, vol. 37, No. 11, pp. 66-70, and 94.
Saigh, W.K., Knowledge is Sacred, Video Pocket/Page Reader Systems, Ltd.,

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for controlling access and distribution of digital proper does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for controlling access and distribution of digital proper, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for controlling access and distribution of digital proper will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-856750

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.