Copy protection of data

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S050000, C705S051000, C705S059000

Reexamination Certificate

active

10435378

ABSTRACT:
A copyright protection scheme downloads data from a server, typically over the World Wide Web to a client for presentation to a user. The downloaded data is cryptographically protected, by encryption and hashing. When displayed by the client, storing and copying functions are selectively disabled in respect of the data, in order to prevent unauthorized copying.

REFERENCES:
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5398285 (1995-03-01), Borgelt et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5563946 (1996-10-01), Cooper et al.
patent: 5745568 (1998-04-01), O'Connor et al.
patent: 5809145 (1998-09-01), Slik et al.
patent: 5819293 (1998-10-01), Comer et al.
patent: 5841978 (1998-11-01), Rhoads
patent: 5982899 (1999-11-01), Probst
patent: 5983348 (1999-11-01), Ji
patent: 6014651 (2000-01-01), Crawford
patent: 6055314 (2000-04-01), Spies et al.
patent: 6092192 (2000-07-01), Kanevsky et al.
patent: 6122403 (2000-09-01), Rhoads
patent: 6173332 (2001-01-01), Hickman
patent: 6182142 (2001-01-01), Win et al.
patent: 6212640 (2001-04-01), Abdelnur et al.
patent: 6216173 (2001-04-01), Jones et al.
patent: 6253193 (2001-06-01), Ginter et al.
patent: 714204 (1996-05-01), None
patent: A-0718761 (1996-06-01), None
patent: WO-A-9407204 (1994-03-01), None
Parker, Dana J. CD-ROM Professional, Wilton: Dec. 1996, Vol. 9, Iss. 12; p. 89, 2 pgs.
Journalist's SIG, Feb. 8, 1997, pp. 1-2.
Imprimatur: Special Interest Group Manual, 1997, pp. 1-20.
Koblin et al., “The Imprimatur Multimedia IPR Management System”, TELES AG (1997).
Imprimatur: “Protection of Technological Measures”, Institute for Information Law, Amsterdam, Nov. 1998, pp. 1-74.
Kobielus, “Buyers Guide, Gotcha!” from Network World Journal, p. 45.
Yordon E., “Java, the Web, and Software Development”, Computer, vol. 29, No. 8.
Bender W. et al., “Techniques for Data Hiding”, IBM Systems Journal, vol. 35, No. 3, pp. 313-335.
Dean et al., “Java Security: From HotJava to Netscape and Beyond”, Proc. of the 1996 IEEE symposium on security and privacy, Oakland, CA., pp. 190-200.
M. Satyanarayanan, Coda: A Highly Available File System for a Distributed Workstation Environment, IEEE, pp. 114-117, Dec. 1989.
M. Satyananarayanan, et al., A Highly Available File System for a Distributed Workstation Environment, IEEE, pp. 447-459, Apr. 1990.
Tobbicke, Distributed File Systems: Focus on Andrew File System/Distributed File Service (AFS/DFS), Dec. 1994.
Gupta et al., Reliable Garage Collection in Distributed Object Oriented System, Proceedings COMPSAC 88: The 12the Inter Computer Software and Applications Conference, Oct. 5-7, 1988, pp. 324-328.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Copy protection of data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Copy protection of data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Copy protection of data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3954714

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.