Method, system, and apparatus for providing secure access to...

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S050000, C705S052000, C705S053000, C705S054000, C705S055000, C705S056000, C705S057000, C705S058000, C705S059000, C380S201000, C707S793000, C707S793000, C713S182000, C713S183000, C713S184000, C713S185000, C713S186000

Reexamination Certificate

active

10161139

ABSTRACT:
A method, system, and apparatus are provided for securely accessing a digital work, such as digital movie, music file, photo, or other type of digital media. Provider contexts, requester contexts, and exporting contexts exchange logic statements as defined by a distributed logic-based programming language. Logic statements may define trust, delegation, and other security relationships. Decisions regarding access to a digital work are made by a provider context based upon locally stored logic statements and other logic statements imported from other contexts. If the logic statements satisfy a security policy, also defined in terms of logic statements, access is granted to the digital work. Otherwise, access to the digital work is denied.

REFERENCES:
patent: 4868877 (1989-09-01), Fischer
patent: 5005200 (1991-04-01), Fischer
patent: 5138712 (1992-08-01), Corbin
patent: 5295266 (1994-03-01), Hinsley et al.
patent: 5335346 (1994-08-01), Fabbio
patent: 5337360 (1994-08-01), Fischer
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5715403 (1998-02-01), Stefik
patent: 6233684 (2001-05-01), Stefik et al.
patent: 6236971 (2001-05-01), Stefik et al.
patent: H03-282733 (1990-03-01), None
Weber, Robert. Digital Rights Management Technologies. Oct. 1995. Retrieved from IDS.
“eXtensible rights Markup Language (XrML) 2.0 Specification, Parts I-V: Primer,” CONTENTGUARD, Nov. 20, 2001, in http://www.xrml.org.
R. Rivest and B. Lampson, “SDSI—A Simple Distributed Security Infrastructure,” Oct. 1996.
“ITU-T Recommendation X.509 | ISO/IEC 9594-8: Information Technology—Open Systems Interconnection—The Directory: Public Key and Attribute Certificate Frameworks,” International Telecommunication Union, pp. 1-162.
J. Ayars, “XMCL—the eXtensible Media Commerce Language”, RealNetworks, Inc., Jun. 2001. In http://www.xmcl.org.
P. Gutmann, “X.509 Style Guide,” Oct. 2000. In http://www.cs.auckland.ac.nz.
“ITU-T, X.680, Series X: Data Networks and Open System Communications, OSI Networking and System Aspects—Abstract Syntax Notation One (ASN.1)”, Dec. 1997.
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Tomas and T. Ylonen, “SPKI Certificate Theory,” The Internet Society, 1999, IETF Network Working Group RFC 1693.
N. Li, G. Grosof and J. Feigenbaum, “A Logic-Based Knowledge Representation for Authorization With Delegation (Extended Abstract),” 12th IEEE Computer Security Foundations Workshop, Jul. 1999, pp. 162-174.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. “Authentication in Distributed Systems: Theory and Practice,” vol. 10, No. 4,ACM Transactions on Computer System, Nov. 1992, pp. 265-310.
X. Orri and J.M. Mas, “SPKI-XML Certificate Structure,” Nov. 2001. IETF Internet Draft, pp. 1-85.
“Open Digital Rights Language (ODRL),” R. Iannella, Editor. In http://ordl.net, pp. 1-56.
D. McDermott and J. Doyle, “Non-Monotonic Logic I,”Artificial Intelligence, vol. 13, No. 1, Apr. 1980, pp. 41-72.
R. Milner,Communicating and Mobile Systems: theπ-Calculus, Cambridge University Press, 1999.
W. F. Clocksin and C.S. Mellish,Programming In Prolog, 3rd Edition, Springer-Verlag Berlin Heidelberg, 1987.
A. W. Appel and E. W. Felton, “Proof-Carrying Authentication,” Secure Internet Programming Laboratory, Department of Computer Science, Princeton University, 1999, pp. 52-62.
T. Jim, “SD3: A Trust Management System with Certified Evaluation,” Proceedings 2001 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society, May 2000, pp. 10-115.
M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized Trust Management,” Proceedings 1996 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, May 1996, pp. 164-173.
J. Biskup, “Achievements of Relational Database Schema Design Theory Revisited,”Semantics in Databases, Springer-Verlag, 1998, pp. 29-54.
M. Abadi, “On SDSI's Linked Local Name Spaces,”Journal of Computer Security, vol. 6, IOS Press, 1998, pp. 3-21.
J. Halpern and R. van der Meyden,, “A Logic for SDSI's Linked Local Name Spaces,” IEEE Computer Security Foundations Workshop, Mordano, Italy, IEEE Computer Society Technical Committee on Security and Privacy, Jun. 1999, pp. 1111-22.
N. Li, B. Grosof and J. Feigenbaum, “A Practically Implementable and Tractable Delegation Logic,” Proceedings 2000 IEEE Symposium on Security and Privacy, Berkely, CA, IEEE Computer Society, May 2000, pp. 27-42.
E. Codd, “A Relational Model of Data for Large Shared Data Banks,”Communications of the ACM,vol. 13, No. 6, Jun. 1970, pp. 377-387.
J. Gray, M.M. Astrahan, M.W. Blasgen, D.D. Chamberlin, K.P. Eswaran, P.P. Griffiths, W.F. King, R.A. Lorie, P.R. McJones, J.W. Mehl, G.R. Putzolu, I.L. Traiger, B.W. Wade and V. Watson, “System R. ACM Transactions on Database Systems 1, 2,”ACM Transactions on Database Systems, vol. 1, No. 2, Jun. 1976, pp. 97137.
M. Ajtai and Y. Gurevich, “Data vs. First-Order Logic,”Journal of Computer and System Sciences, vol. 49, No. 3, Dec. 1994, pp. 562-588.
M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” IEEE Transactions on Software Engineering, Vo. 22, No. 1, Jan. 1996, pp. 6-15.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system, and apparatus for providing secure access to... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system, and apparatus for providing secure access to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, and apparatus for providing secure access to... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3828666

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.