Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2008-01-08
2008-01-08
Moise, Emmanuel L. (Department: 2137)
Information security
Prevention of unauthorized use of data including prevention...
C713S167000, C705S051000, C380S279000
Reexamination Certificate
active
10375246
ABSTRACT:
A first trusted component on a first computing device performs cryptography, evaluation, and enforcement and is tied thereto, and a first user-machine certificate associated with the first computing device is tied to a user. Correspondingly, a second trusted component on a second computing device performs cryptography, evaluation, and enforcement and is tied thereto, and a second user-machine certificate associated with the second computing device is also tied to the user. The first trusted component obtains the content for rendering on the first computing device by way of the first user-machine certificate and the license, and the second trusted component obtains the content for rendering on the second computing device by way of the second user-machine certificate and the same license.
REFERENCES:
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5699431 (1997-12-01), Van Oorschot et al.
patent: 5715403 (1998-02-01), Stefik
patent: 6002772 (1999-12-01), Saito
patent: 6073124 (2000-06-01), Krishnan et al.
patent: 6226618 (2001-05-01), Downs et al.
patent: 6301660 (2001-10-01), Benson
patent: 6728379 (2004-04-01), Ishibashi et al.
patent: 6898706 (2005-05-01), Venkatesan et al.
patent: 6915425 (2005-07-01), Xu et al.
patent: 6920565 (2005-07-01), Isaacson et al.
patent: 6993137 (2006-01-01), Fransdonk
patent: 7239708 (2007-07-01), England et al.
patent: 2002/0013772 (2002-01-01), Peinado
patent: 2002/0049679 (2002-04-01), Russell et al.
patent: 2002/0099663 (2002-07-01), Yoshino et al.
patent: 2002/0108049 (2002-08-01), Xu et al.
patent: 2002/0184515 (2002-12-01), Oho et al.
patent: 2003/0023564 (2003-01-01), Padhye et al.
patent: 2003/0084306 (2003-05-01), Abburi et al.
patent: 2003/0187801 (2003-10-01), Chase et al.
patent: 2004/0054920 (2004-03-01), Wilson et al.
patent: 2004/0127196 (2004-07-01), Dabbish et al.
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
Evans, P. “DRM: Is the Road to Adoption Fraught with Potholes?”Seybold Reporting Analyzing Publishing Technologies, 2001, 1(14), 32.
Fowler, T.B. “Technology's Changing Role in Intellectual Property Rights”,IT Professional(IEEE), 2002, 4(2), 39-44.
Gable, J. “The Digital Rights Conundrum”,Transform Magazine, 2001, 10(11), 27.
Griswold, G.N. “A Method for Protecting Copyright on Networks”,IMA Intell. Property Project Proceedings, Jan. 1994, 1(1), 169-178.
Gunter, C.A., et al. “Models and Languages for Digital Rights”,Proceedings of the 34thAnnual Hawaii International Conference on System Sciences, 2001, 5.
Kahn, R.E. “Deposit, Registration and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, Jan. 1994, 1(1), 111-120.
Peinado, M. “Digital rights management in a multimedia environment”,SMPTE Journal, 2002, 111(3), 159-163.
Royan, B. Content creation and rights management; experiences of SCRAN(the Scottish Cultural Resources Access Network),Program, 2000, 34(2), 131-142.
Valimaki, M. et al., “Digital rights management on open and semi-open networks”,WIAPP, 2001, 154-155.
Yu, H. “Digital multimedia at home and content rights management”,IEEE, Proceedigns 2002 IEEE 4thInternational Workshop on Networked Appliances, 2002, 49-56.
“Managing digital rights in online publishing”,Information Management&Technology, 2001, 34(4), 168-169.
Hwang, C. et al., “Protection of Digital Contents on Distributed Multimedia Environment”,Proceedings of the IASTED International Conference, Internet and Multimedia Systems and Applications, Nov. 19-23, 2000, Las Vegas, Nevada, USA, pp. 127-132.
Hong, S. et al., “On the construction of a powerful distributed authentication server without additional key management”,Computer Communications, 2000, 23, 1638-1644.
Managing Digital Rights in Online Publishing, “How two publishing houses maintin control of copyright”Information Management&Technology, 2001, 34(4), 168-169.
Jakobsson, M. et al., “Proprietary Certificates”,Topics in Cryptology, 2002, 164-181.
Kumik, P. “Digital Rights Management”,Computers and Law, 2000, 11(4), 14-15.
Torrubia, A. et al., “Cryptography regulations for E-commerce and digital rights management”,Computers&Security, 2001, 20(8), 724-738.
Zwollo, K. “Digital document delivery and digital rights management”,Information Services&Use, 2001, 9-11.
Bourne Steve
DeMello Marco A.
Krishnaswamy Vinay
Malaviarachchi Rushmi U.
Manferdelli John L.
Gergiso Techane J.
Moise Emmanuel L.
Woodcock & Washburn LLP
LandOfFree
Tying a digital license to a user and tying the user to... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Tying a digital license to a user and tying the user to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tying a digital license to a user and tying the user to... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3953899