Tying a digital license to a user and tying the user to...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S167000, C705S051000, C380S279000

Reexamination Certificate

active

10375246

ABSTRACT:
A first trusted component on a first computing device performs cryptography, evaluation, and enforcement and is tied thereto, and a first user-machine certificate associated with the first computing device is tied to a user. Correspondingly, a second trusted component on a second computing device performs cryptography, evaluation, and enforcement and is tied thereto, and a second user-machine certificate associated with the second computing device is also tied to the user. The first trusted component obtains the content for rendering on the first computing device by way of the first user-machine certificate and the license, and the second trusted component obtains the content for rendering on the second computing device by way of the second user-machine certificate and the same license.

REFERENCES:
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5699431 (1997-12-01), Van Oorschot et al.
patent: 5715403 (1998-02-01), Stefik
patent: 6002772 (1999-12-01), Saito
patent: 6073124 (2000-06-01), Krishnan et al.
patent: 6226618 (2001-05-01), Downs et al.
patent: 6301660 (2001-10-01), Benson
patent: 6728379 (2004-04-01), Ishibashi et al.
patent: 6898706 (2005-05-01), Venkatesan et al.
patent: 6915425 (2005-07-01), Xu et al.
patent: 6920565 (2005-07-01), Isaacson et al.
patent: 6993137 (2006-01-01), Fransdonk
patent: 7239708 (2007-07-01), England et al.
patent: 2002/0013772 (2002-01-01), Peinado
patent: 2002/0049679 (2002-04-01), Russell et al.
patent: 2002/0099663 (2002-07-01), Yoshino et al.
patent: 2002/0108049 (2002-08-01), Xu et al.
patent: 2002/0184515 (2002-12-01), Oho et al.
patent: 2003/0023564 (2003-01-01), Padhye et al.
patent: 2003/0084306 (2003-05-01), Abburi et al.
patent: 2003/0187801 (2003-10-01), Chase et al.
patent: 2004/0054920 (2004-03-01), Wilson et al.
patent: 2004/0127196 (2004-07-01), Dabbish et al.
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
Evans, P. “DRM: Is the Road to Adoption Fraught with Potholes?”Seybold Reporting Analyzing Publishing Technologies, 2001, 1(14), 32.
Fowler, T.B. “Technology's Changing Role in Intellectual Property Rights”,IT Professional(IEEE), 2002, 4(2), 39-44.
Gable, J. “The Digital Rights Conundrum”,Transform Magazine, 2001, 10(11), 27.
Griswold, G.N. “A Method for Protecting Copyright on Networks”,IMA Intell. Property Project Proceedings, Jan. 1994, 1(1), 169-178.
Gunter, C.A., et al. “Models and Languages for Digital Rights”,Proceedings of the 34thAnnual Hawaii International Conference on System Sciences, 2001, 5.
Kahn, R.E. “Deposit, Registration and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, Jan. 1994, 1(1), 111-120.
Peinado, M. “Digital rights management in a multimedia environment”,SMPTE Journal, 2002, 111(3), 159-163.
Royan, B. Content creation and rights management; experiences of SCRAN(the Scottish Cultural Resources Access Network),Program, 2000, 34(2), 131-142.
Valimaki, M. et al., “Digital rights management on open and semi-open networks”,WIAPP, 2001, 154-155.
Yu, H. “Digital multimedia at home and content rights management”,IEEE, Proceedigns 2002 IEEE 4thInternational Workshop on Networked Appliances, 2002, 49-56.
“Managing digital rights in online publishing”,Information Management&Technology, 2001, 34(4), 168-169.
Hwang, C. et al., “Protection of Digital Contents on Distributed Multimedia Environment”,Proceedings of the IASTED International Conference, Internet and Multimedia Systems and Applications, Nov. 19-23, 2000, Las Vegas, Nevada, USA, pp. 127-132.
Hong, S. et al., “On the construction of a powerful distributed authentication server without additional key management”,Computer Communications, 2000, 23, 1638-1644.
Managing Digital Rights in Online Publishing, “How two publishing houses maintin control of copyright”Information Management&Technology, 2001, 34(4), 168-169.
Jakobsson, M. et al., “Proprietary Certificates”,Topics in Cryptology, 2002, 164-181.
Kumik, P. “Digital Rights Management”,Computers and Law, 2000, 11(4), 14-15.
Torrubia, A. et al., “Cryptography regulations for E-commerce and digital rights management”,Computers&Security, 2001, 20(8), 724-738.
Zwollo, K. “Digital document delivery and digital rights management”,Information Services&Use, 2001, 9-11.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Tying a digital license to a user and tying the user to... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Tying a digital license to a user and tying the user to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tying a digital license to a user and tying the user to... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3953899

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.