Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2007-02-27
2007-02-27
Reagan, James A (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S050000, C705S052000, C705S053000, C705S054000, C705S055000, C705S056000, C705S057000, C705S058000, C705S059000, C380S201000, C707S793000, C707S793000, C713S182000, C713S183000, C713S184000, C713S185000, C713S186000
Reexamination Certificate
active
10161139
ABSTRACT:
A method, system, and apparatus are provided for securely accessing a digital work, such as digital movie, music file, photo, or other type of digital media. Provider contexts, requester contexts, and exporting contexts exchange logic statements as defined by a distributed logic-based programming language. Logic statements may define trust, delegation, and other security relationships. Decisions regarding access to a digital work are made by a provider context based upon locally stored logic statements and other logic statements imported from other contexts. If the logic statements satisfy a security policy, also defined in terms of logic statements, access is granted to the digital work. Otherwise, access to the digital work is denied.
REFERENCES:
patent: 4868877 (1989-09-01), Fischer
patent: 5005200 (1991-04-01), Fischer
patent: 5138712 (1992-08-01), Corbin
patent: 5295266 (1994-03-01), Hinsley et al.
patent: 5335346 (1994-08-01), Fabbio
patent: 5337360 (1994-08-01), Fischer
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5715403 (1998-02-01), Stefik
patent: 6233684 (2001-05-01), Stefik et al.
patent: 6236971 (2001-05-01), Stefik et al.
patent: H03-282733 (1990-03-01), None
Weber, Robert. Digital Rights Management Technologies. Oct. 1995. Retrieved from IDS.
“eXtensible rights Markup Language (XrML) 2.0 Specification, Parts I-V: Primer,” CONTENTGUARD, Nov. 20, 2001, in http://www.xrml.org.
R. Rivest and B. Lampson, “SDSI—A Simple Distributed Security Infrastructure,” Oct. 1996.
“ITU-T Recommendation X.509 | ISO/IEC 9594-8: Information Technology—Open Systems Interconnection—The Directory: Public Key and Attribute Certificate Frameworks,” International Telecommunication Union, pp. 1-162.
J. Ayars, “XMCL—the eXtensible Media Commerce Language”, RealNetworks, Inc., Jun. 2001. In http://www.xmcl.org.
P. Gutmann, “X.509 Style Guide,” Oct. 2000. In http://www.cs.auckland.ac.nz.
“ITU-T, X.680, Series X: Data Networks and Open System Communications, OSI Networking and System Aspects—Abstract Syntax Notation One (ASN.1)”, Dec. 1997.
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Tomas and T. Ylonen, “SPKI Certificate Theory,” The Internet Society, 1999, IETF Network Working Group RFC 1693.
N. Li, G. Grosof and J. Feigenbaum, “A Logic-Based Knowledge Representation for Authorization With Delegation (Extended Abstract),” 12th IEEE Computer Security Foundations Workshop, Jul. 1999, pp. 162-174.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. “Authentication in Distributed Systems: Theory and Practice,” vol. 10, No. 4,ACM Transactions on Computer System, Nov. 1992, pp. 265-310.
X. Orri and J.M. Mas, “SPKI-XML Certificate Structure,” Nov. 2001. IETF Internet Draft, pp. 1-85.
“Open Digital Rights Language (ODRL),” R. Iannella, Editor. In http://ordl.net, pp. 1-56.
D. McDermott and J. Doyle, “Non-Monotonic Logic I,”Artificial Intelligence, vol. 13, No. 1, Apr. 1980, pp. 41-72.
R. Milner,Communicating and Mobile Systems: theπ-Calculus, Cambridge University Press, 1999.
W. F. Clocksin and C.S. Mellish,Programming In Prolog, 3rd Edition, Springer-Verlag Berlin Heidelberg, 1987.
A. W. Appel and E. W. Felton, “Proof-Carrying Authentication,” Secure Internet Programming Laboratory, Department of Computer Science, Princeton University, 1999, pp. 52-62.
T. Jim, “SD3: A Trust Management System with Certified Evaluation,” Proceedings 2001 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society, May 2000, pp. 10-115.
M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized Trust Management,” Proceedings 1996 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, May 1996, pp. 164-173.
J. Biskup, “Achievements of Relational Database Schema Design Theory Revisited,”Semantics in Databases, Springer-Verlag, 1998, pp. 29-54.
M. Abadi, “On SDSI's Linked Local Name Spaces,”Journal of Computer Security, vol. 6, IOS Press, 1998, pp. 3-21.
J. Halpern and R. van der Meyden,, “A Logic for SDSI's Linked Local Name Spaces,” IEEE Computer Security Foundations Workshop, Mordano, Italy, IEEE Computer Society Technical Committee on Security and Privacy, Jun. 1999, pp. 1111-22.
N. Li, B. Grosof and J. Feigenbaum, “A Practically Implementable and Tractable Delegation Logic,” Proceedings 2000 IEEE Symposium on Security and Privacy, Berkely, CA, IEEE Computer Society, May 2000, pp. 27-42.
E. Codd, “A Relational Model of Data for Large Shared Data Banks,”Communications of the ACM,vol. 13, No. 6, Jun. 1970, pp. 377-387.
J. Gray, M.M. Astrahan, M.W. Blasgen, D.D. Chamberlin, K.P. Eswaran, P.P. Griffiths, W.F. King, R.A. Lorie, P.R. McJones, J.W. Mehl, G.R. Putzolu, I.L. Traiger, B.W. Wade and V. Watson, “System R. ACM Transactions on Database Systems 1, 2,”ACM Transactions on Database Systems, vol. 1, No. 2, Jun. 1976, pp. 97137.
M. Ajtai and Y. Gurevich, “Data vs. First-Order Logic,”Journal of Computer and System Sciences, vol. 49, No. 3, Dec. 1994, pp. 562-588.
M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” IEEE Transactions on Software Engineering, Vo. 22, No. 1, Jan. 1996, pp. 6-15.
Merchant & Gould
Reagan James A
LandOfFree
Method, system, and apparatus for providing secure access to... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system, and apparatus for providing secure access to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system, and apparatus for providing secure access to... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3828666