US20030225700A1 - System and method for graphical rights expressions - Google Patents
System and method for graphical rights expressions Download PDFInfo
- Publication number
- US20030225700A1 US20030225700A1 US10/388,171 US38817103A US2003225700A1 US 20030225700 A1 US20030225700 A1 US 20030225700A1 US 38817103 A US38817103 A US 38817103A US 2003225700 A1 US2003225700 A1 US 2003225700A1
- Authority
- US
- United States
- Prior art keywords
- recited
- rights expression
- graphical representation
- expression information
- glyph
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000014509 gene expression Effects 0.000 title claims abstract description 212
- 238000000034 method Methods 0.000 title claims abstract description 89
- 238000001514 detection method Methods 0.000 claims description 6
- 230000003068 static effect Effects 0.000 claims description 4
- 230000009471 action Effects 0.000 description 22
- 238000004891 communication Methods 0.000 description 15
- 230000000875 corresponding effect Effects 0.000 description 15
- 230000008569 process Effects 0.000 description 15
- 238000009877 rendering Methods 0.000 description 14
- 239000003086 colorant Substances 0.000 description 12
- 238000012545 processing Methods 0.000 description 11
- 238000001994 activation Methods 0.000 description 9
- 230000001276 controlling effect Effects 0.000 description 8
- 230000004075 alteration Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 7
- 230000004913 activation Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000015654 memory Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 230000002829 reductive effect Effects 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000006835 compression Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000003909 pattern recognition Methods 0.000 description 3
- 238000002360 preparation method Methods 0.000 description 3
- 230000010076 replication Effects 0.000 description 3
- 239000000758 substrate Substances 0.000 description 3
- KJLPSBMDOIVXSN-UHFFFAOYSA-N 4-[4-[2-[4-(3,4-dicarboxyphenoxy)phenyl]propan-2-yl]phenoxy]phthalic acid Chemical compound C=1C=C(OC=2C=C(C(C(O)=O)=CC=2)C(O)=O)C=CC=1C(C)(C)C(C=C1)=CC=C1OC1=CC=C(C(O)=O)C(C(O)=O)=C1 KJLPSBMDOIVXSN-UHFFFAOYSA-N 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000001429 visible spectrum Methods 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000010339 dilation Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000003628 erosive effect Effects 0.000 description 1
- 238000009432 framing Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000000877 morphologic effect Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1073—Conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
- H04N21/83555—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed using a structured language for describing usage rules of the content, e.g. REL
Definitions
- This invention generally relates to controlling use of content, or other items, through usage rights associated with the content or other items, and more particularly to a system and method for expressing usage rights for content or other items based symbolic representations, such as graphical representations, modulated signal representations, and the like.
- DRM Digital Rights Management
- U.S. Pat. No. 5,634,012 discloses a DRM system for controlling the distribution of digital content, wherein devices of the DRM system can include a repository associated therewith.
- a predetermined set of usage transaction steps define a protocol used by the repositories for enforcing usage rights associated with the content.
- Usage rights persist with the content and the usage rights associated with the content comprise a digital work.
- the usage rights can permit various manners of use of the content, such as a right to view or print or display the content, a right to use the content only once, a right to distribute or redistribute the content, and the like. Such usage rights can be made contingent on payment or other conditions.
- the invention is a method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression.
- the method comprises specifying rights expression information indicating a manner of use of an item and generating a graphical representation of the rights expression information.
- the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
- a system for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression comprises means for specifying rights expression information indicating a manner of use of an item and means for generating a graphical representation of the rights expression information.
- the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
- a rights expression comprising rights expression information indicating a manner of use of an item and a graphical representation of said rights expression information.
- the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
- FIG. 1 is a schematic illustration of an exemplary Digital Rights Management system on which various embodiments of the present invention can be implemented;
- FIG. 2 illustrates a set of 8 symbols, derived from a circle, that can be used for expressing rights expressions
- FIG. 3 illustrates a set of 4 symbols, derived from a rectangle, that can be used for expressing rights expressions
- FIGS. 4 - 6 illustrate sets of 8 symbols, derived from circular structures, that can be used for expressing rights expressions
- FIGS. 7 - 8 illustrate sets of 8 symbols, derived from the 4 sides and 2 diagonals of square structures, that can be used for expressing rights expressions;
- FIG. 9 illustrates a set of 4 symbols, derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
- FIG. 10 illustrates a set of 4 symbols, derived from the 4 corners of a square structure, that can be used for expressing rights expressions
- FIG. 11 illustrates a set of 8 symbols, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
- FIG. 12 illustrates a set of 8 symbols, derived from a circular structure, that can be used for expressing rights expressions
- FIG. 13 illustrates a set of 5 symbols, using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions;
- FIG. 14 illustrates a set of 4 symbols, derived from a circular structure, that can be used for expressing rights expressions
- FIG. 15 illustrates a set of 12 symbols, derived from a star shape structure, in three different colors, Red (R), Green (G), and Blue (B), that can be used for expressing rights expressions;
- FIG. 16 illustrates an exemplary embodiment for combining the symbols shown in FIG. 15;
- FIG. 17 illustrates an exemplary message, read from left to right, for expressing rights expressions using the 4 symbols of the set shown in FIG. 10;
- FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set shown in FIG. 15;
- FIGS. 19 - 20 illustrate exemplary rights expressions for performing an action using the symbols of the set shown in FIG. 15;
- FIG. 21 illustrates an exemplary rights expression for the right to print 100 copies of 2 e-books with identification numbers 443 and 12 using the symbols of the set shown in FIG. 15;
- FIG. 22 illustrates an exemplary rights expression for the right to listen to music, such as playing or rendering the music, for 100 minutes for 2 pieces of music with identification numbers 443 and 13 using the symbols of the set shown in FIG. 15;
- FIG. 23 illustrates an exemplary rights expression for an e-book data record for an e-book with identification number 143 , whose owner has an IDENTIFICATION number 212 , using the symbols of the set shown in FIG. 15;
- FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, or industries, and can be custom-made for each application or industry using the symbols of the set shown in FIG. 15;
- FIGS. 25 - 26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
- U.S. Pat. No. 6,208,771 teaches method and apparatus for robust decoding of glyph address carpets
- No. 6,076,738 teaches self-clocking glyph shape codes
- No. 5,684,885 teaches binary glyph codes based on color relationships
- No. 5,864,127 teaches analog glyph detector and detector arrays
- No. 5,576,532 teaches interleaved and interlaced sync codes and address codes for self-clocking glyph codes
- No. 6,000,613 teaches self-clocking glyph code having composite glyphs for distributive encoding of multi-bit digital values
- No. 6,182,901 teaches orientational disambiguation for self-clocking glyph codes, No.
- 5,128,525 teaches convolution filtering for decoding self-clocking glyph shape codes
- No. 5,168,147 teaches binary image processing for decoding self-clocking glyph shape codes
- No. 5,091,966 teaches adaptively scaling for decoding spatially periodic self-clocking glyph shape codes.
- the exemplary embodiments described herein advantageously, leverage symbolic representations with rights expressions to express rights information related to items, such as digital content, services, abstract objects, resources, goods, and the like.
- the symbolic representations can be used to convey information, such as rights expression information, information about a grammar or language dealing with usage rights, information about access to information, and the like.
- the use of a rights expression for example, in the form of a license, and the like, can be used to define usage rights for specifying a permitted manner of use of an item, such as access to digital content, and the like.
- usage rights can be associated with one or more conditions, such as payment, and the like, that can be a prerequisite for exercising the specified manner of use of the item.
- a rights expression language such as eXtensible Rights Markup Language (XrML), and the like, for example, including predefined syntax and semantics, can be employed to express the usage rights.
- XrML eXtensible Rights Markup Language
- rights expression information corresponding to usage rights associated with content can be expressed via a graphical representation of the rights expression information.
- the graphical representation can include glyphs, machine and human-readable symbols, and other types of symbols to express the rights expression information.
- the rights expression information can be expressed via a modulated signal, such as modulated light and sound signals, and the like.
- the exemplary embodiments combine symbolic representations with rights expressions for conveying information about usage rights, conditions, access related to digital content, services, abstract objects, items, resources, and the like, in a flexible and robust manner.
- the DRM system 100 includes a user activation component in the form of an activation server 110 that issues a set of public and private key pairs 112 to a content user in a protected fashion.
- the user installs software that, for example, works with, or includes, a rendering application for a particular content format.
- the software is installed in a client environment 120 , for example, such as a computing device associated with the user.
- the software can be part of the DRM system 100 and can be used to access protected content 134 .
- the software can be activated.
- some information is exchanged between the activation server 110 and the client environment 120 .
- a client software component 122 can be downloaded and installed in the client environment 120 .
- the client software component 122 can be tamper resistant and can include the set of public and private key pairs 112 issued by the activation server 110 , as well as other components.
- a rights offer 132 can be associated with the protected content 134 and can specify usage rights 132 A that are available to an end-user, for example, when one or more corresponding conditions 132 B are satisfied.
- a license server 140 manages the encryption keys 112 and issues a license 142 for the protected content 134 .
- the license 142 can embody the actual granting of the usage rights 132 A to the end user.
- the rights offer 132 may grant the end user the right to view the protected content 134 on the condition of payment of a fee of five dollars, and the right to print the protected content on the condition of payment of a fee of ten dollars.
- the license 142 can be issued for the view right when the five dollar fee has been paid and/or for the print right when 10 dollar fee has been paid.
- the client component 122 interprets and enforces the rights that have been specified in the license 142 .
- Clear content 136 such as unprotected content, and the like, can be prepared, for example, with an application 138 , such as a document preparation application, installed on a computer 130 associated with a content publisher, a content distributor, a content service provider, or any other suitable party.
- Preparation of the clear content 136 can include specifying the usage rights 132 A and the conditions 132 B under which the clear content 136 can be used, associating the rights offer 132 with the clear content 136 , and protecting the clear content 136 with, for example, a cryptography algorithm to generate the protected content 134 .
- a rights language such as XrML, eXtensible Access Control Markup Language (XACML), Open Digital Rights Language (ODRL), and the like, can be used to specify the rights offer 132 .
- the rights offer 132 can be specified in any suitable manner.
- the phrase “specifying rights information”, as used herein, refers to creating, deriving, or other wise utilizing information that relates to rights expressions.
- the rights offer 132 can be in the form of a pre-defined specification, profile, template, and the like, that can be associated with the protected content 134 . Accordingly, the process of specifying the rights offer 132 can include any suitable process for associating rights, conditions, and the like, with content.
- the rights offer 132 associated with the protected content 134 and the encryption key 112 used to encrypt the clear content 136 can be transmitted to the license server 140 .
- a typical workflow for the DRM system 100 can include a user operating within the client environment 120 being activated for receiving the protected content 134 by the activation server 110 .
- the activation process results in the public and private key pair 112 , and, for example, some user and/or machine-specific information, and the like, being downloaded to the client environment 120 in the form of the client software component 122 .
- the activation process can be accomplished, for example, at any suitable time prior to the issuing of the license 142 .
- the user When the user wishes to use the protected content 134 , the user makes a request for the protected content 134 .
- the user might browse a Web site running on a Web server 150 , using a browser installed in the client environment 120 , and attempt to download the protected content 134 .
- the user may go through a series of steps possibly including a fee transaction, such as in the sale of content, other transactions, such as collection of information, and the like.
- the Web server 150 contacts the license server 140 , for example, through a secure communications channel, such as a channel using a Secure Sockets Layer (SSL).
- SSL Secure Sockets Layer
- the license server 140 then generates the license 142 for the protected content 134 and the Web server 150 downloads both the protected content 134 and the license 142 .
- the license 142 can include the appropriate usage rights of the usage rights 132 A and can be downloaded from the license server 140 or an associated device.
- the protected content 134 can be downloaded from the computer 130 associated with a publisher, distributor, or other party.
- the rights offer 132 can be persistent and remain associated with the protected content 134 .
- the client software component 122 in the client environment 120 can then proceed to interpret the license 142 and allow use of the protected content 134 based on the rights 132 A and the conditions 132 B specified in the license 142 .
- the interpretation and enforcement of the usage rights are further described in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,629,980, No. 5,634,012, No. 5,638,443, No. 5,715,403, No. 6,233,684, and No. 6,236,971.
- the above steps can take place sequentially, approximately simultaneously, in various orders, and the like.
- the DRM system 100 addresses security aspects of protecting the protected content 134 .
- the DRM system 100 can authenticate the license 142 that has been issued by the license server 140 .
- One way to accomplish such authentication is for the client software component 122 to determine if the licenses 142 can be trusted.
- the client software component 122 can include the capability to verify and/or validate the cryptographic signature, or other identifying characteristic of the license 142 .
- the client environment 120 and the license server 140 can receive the set of keys 112 , for example, in a tamper-resistant software package that can include other components, such as the client software component 122 for the activated client environment 120 to verify the signature of the license 142 .
- the DRM system 100 is of an exemplary nature and can be implemented in numerous other equivalent arrangements.
- the license 142 and the protected content 134 can be distributed from different entities.
- the rights offer 132 can be associated with the protected content 134 by a party other than the party preparing the protected content 134 .
- a clearinghouse 160 can be used to process payment transactions and verify payment prior to issuing the license 142 .
- the various processes and transactions can be performed, for example, via online and/or offline environments and/or combinations thereof. For example, an end user could download content to a computer and then transfer the content from the computer to a personal digital assistant (PDA).
- PDA personal digital assistant
- the end user could then buy a license for the content, for example, via a supermarket kiosk, a cash register, a prep-paid license card, and the like, and then transfer the license to the PDA.
- the end user could then activate the content for use on the PDA and/or the computer.
- the various devices can, but need not, communicate directly with one another and information can be exchanged in any suitable manner, such as by physically moving media between the devices.
- the devices and subsystems of the DRM system 100 of FIG. 1 can communicate, for example, over a communications network 170 , and can include, for example, any suitable servers, workstations, personal computers (PCs), laptop computers, PDAs, Internet appliances, set top boxes, modems, handheld devices, telephones, cellular telephones, wireless devices, other devices, and the like, capable of performing the processes of the disclosed exemplary embodiments.
- the devices and subsystems of the DRM system 100 can communicate with each other using any suitable protocol and can be implemented using a general purpose computer system.
- One or more interface mechanisms can be used in the DRM system 100 including, for example, Internet access, telecommunications in any suitable form, such as voice, modem, and the like, wireless communications media, and the like.
- communications network 170 can include, for example, wireless communications networks, cellular communications networks, satellite communications networks, Public Switched Telephone Networks (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, hybrid communications networks, combinations thereof, and the like.
- PSTNs Public Switched Telephone Networks
- PDNs Packet Data Networks
- the communications network 170 can be the same or different networks.
- the DRM system 100 of FIG. 1 is for exemplary purposes, as many variations of the specific hardware used to implement the disclosed exemplary embodiments are possible.
- the functionality of the devices and the subsystems of the DRM system 100 can be implemented via one or more programmed computer systems or devices.
- a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of the DRM system 100 .
- two or more programmed computer systems or devices can be substituted for any one of the devices and subsystems of the DRM system 100 .
- principles and advantages of distributed processing such as redundancy, replication, and the like, also can be implemented, as desired, for example, to increase the robustness and performance of the DRM system 100 .
- the exemplary embodiments of the present invention directed to symbolic representations for expressing rights information, such as the rights offer 132 , using graphical representations, such as glyph symbols, and the like, will now be described.
- the exemplary glyphs shown in FIGS. 2 - 24 can be generated in visible form, such as printed form, in digital form, such as electronic form, and the like.
- background and foreground symbols can be employed.
- background symbols can be configured to have no meaning to a human and can be employed for security purposes, such as to confuse possible hackers, while foreground symbols, which can be separated or distinguished from the background symbols based on predetermined patterns, placements, markers, codes, combination of pointers, and the like, can be configured and employed to express the rights expression information.
- random or semi-random noise, and the like can be employed in the symbols, for example, to provide further security functions or other functions.
- both the background and foreground symbols can have meaning to a human or machine, wherein the meaning of the background symbols can be used to interpret the meaning of the foreground symbols.
- the DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a predetermined manner, such as being printed on the same substrate as the first symbol, being printed at a certain physical location relative to the first symbol, and the like.
- a graphical representation of a rights expression can include a background portion and a foreground portion.
- the background portion for example, can be configured to have no meaning, unless a predetermined condition is satisfied, such as the day being Wednesday, and the like.
- the foreground portion can be configured to specify that “if you are scanning this item and its after Jul. 4, 2003, then also look at the background portion for additional information, otherwise continue to disregard the background portion.” Accordingly, various relationships between the background portion and the foreground portion can be specified with an appropriate rights expression, for example, using the graphical and other forms of the symbolic representations of the exemplary embodiments described herein.
- the symbols of exemplary embodiments also can be employed to convey redundant information.
- a corresponding reader can still be able to read the damaged ticket to extract the rights expression information based on redundant information that can be conveyed by the symbols.
- redundancy can be accomplished by overlapping or duplicating the information of some or all of the symbols to improve the accuracy of the ticket reader.
- the symbols can include a check-sum, error correction codes, and the like, for example, for verification and security purposes, to ensure that inconsistencies with the interpreted rights expression information can be resolved, and the like.
- the exemplary embodiments also are applicable for the rights expression information including digital information, such as electronic information, and the like.
- the exemplary embodiments can be used in cases where digital media, including the rights expression information, is damaged, where it is desired to have multiple ways to obtain a digital symbol, and the like.
- the symbols of the exemplary embodiments can be hidden as a non-obvious pattern, shape, and the like, in another image, pattern, and the like, which then can be detected by a suitable system, machine, device, and the like, having predetermined parameters and having predetermined knowledge about the parameters of the hidden information.
- the symbols can be part of a watermark in another image.
- Other technologies for example, special ink, such as heat sensitive ink, magnetic ink, invisible ink, ink visible under certain angles, different chemical conditions, different illumination, and the like, also can be employed for symbol generation, watermarking purposes, and the like.
- the symbols can convey information, for example, about licenses, grammar, rights expressions, rights assignments, payments, meta-data, content owners, histories regarding the content, the state of the content, encryption keys, expiration dates, digital signatures, conditions, constraints, parameters of a self-protecting document, digital works, content, digital content, resources, objects, and the like, that are available for end users to render, consume, use, distribute, and the like.
- the symbol patterns of the exemplary embodiments can be used to convey information about an action, a command, a function, a procedure, a module, a subroutine, executable code, and the like.
- the extracted information can instruct the transfer of funds to a specific account, for example, via the clearing house 160 , can instruct the transfer of an e-book to a specific address, can place a limit on distribution or transfers of content, for example, the protected content 134 , can add constraints for users of content, can destroy an encryption key, for example, the public/private key pairs 112 , after a predetermined number of times of usage of content, can stop or discontinue access to content, can transmit information about a content owner, can transmit information about content, can transmit information about a trademark owner, can transmit information about a copyright owner, can transmit information for adding up royalties and/or micro-payments, can instruct the sending of an e-mail back to a content owner about the status of content distribution, can be used combine or attach different sections, pieces,
- Such information can be recorded, updated, and the like, back onto the original content, recorded on the copies made of the original content, and the like.
- the exemplary embodiments can be employed in copy machines, cameras, video recorders, CD-writers, recording devices, duplication devices, replication devices, computing devices, rendering devices, and the like.
- the exemplary embodiments can employ spatially periodic self-clocking glyph shape codes, for example, as described in commonly-assigned U.S. Pat. No. 5,091,966, wherein decoding based on convolution filtering and morphological operations, such as erosion, dilation, opening, and closing operations, and the like, can be employed.
- decoding based on convolution filtering and morphological operations such as erosion, dilation, opening, and closing operations, and the like.
- such exemplary embodiments can tolerate a significant amount of image distortion and degrading high frequency noise.
- the exemplary embodiments also can reduce bit error rates in reading self-clocking glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,221,833, wherein a value assigned to a given glyph can be set to be different in just one bit position from values assigned to glyphs with which the given glyph is most likely to be confused.
- the exemplary embodiments can include glyphs that have a plurality of independently modulatable and readily distinguishable characteristics, such as substantially orthogonal characteristics, and the like, with appropriate design of symbol cells, such as an array of pixel positions with the corresponding pixel values for each glyph. Spatial synchronization and orientation determination, for example, for decoding purposes, can be achieved by markers or patterns, to reduce the propagation of errors.
- the exemplary embodiments can employ interleaved codes, interlaced codes, and the like, that can be encoded to facilitate the partitioning and correlation of data embedded within such glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,576,532.
- the exemplary embodiments also can employ composite glyphs and glyphs with different colors or shades, as further described herein.
- FIG. 2 illustrates a set 200 of 8 symbols 201 - 208 , derived from a circle, that can be used for expressing rights expressions.
- FIG. 3 illustrates a set 300 of 4 symbols 301 - 304 , derived from a rectangle, that can be used for expressing rights expressions.
- FIG. 4 illustrates a set 400 of 8 symbols 401 - 408 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 5 illustrates a set 500 of 8 symbols 501 - 508 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 6 illustrates a set 600 of 8 symbols 601 - 608 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 7 illustrates a set 700 of 8 symbols 701 - 708 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 8 illustrates a set 800 of 8 symbols 801 - 808 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 9 illustrates a set 900 of 4 symbols 901 - 904 , derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 10 illustrates a set 1000 of 4 symbols 1001 - 1004 , derived from the 4 corners of a square structure, that can be used for expressing rights expressions.
- FIG. 11 illustrates a set 1100 of 8 symbols 1101 - 1108 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 12 illustrates a set 1200 of 8 symbols 1201 - 1208 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 13 illustrates a set 1300 of 5 symbols 1301 - 1305 , using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions.
- FIG. 14 illustrates a set 1400 of 4 symbols 1401 - 1404 , derived from a star shape structure, that can be used for expressing rights expressions.
- FIG. 15 illustrates a set 1500 of symbols, derived from the star shape structure of FIG. 14, that can be used for expressing rights expressions.
- each of the symbols 1401 - 1404 can be taken from the Red, Green, and Blue (RGB) color space.
- each of the 4 symbols 1401 - 1404 of the star shape of FIG. 14 can include the Red (R), Green (G), and/or Blue (B) colors.
- 12 symbols can be generated (for example, four symbols times three colors).
- complex symbols derived from the set 1500 of FIG. 15 and having overlapping colors can be generated, as shown in FIG. 16.
- two or more symbols of different colors can be combined so as to overlap on a physical location, to potentially produce part or all of a star shape, in different colors, or combination of colors for each part of the star shape.
- the color of the resulting horizontal symbol 1401 can be based on the combination of Green and Red symbols 1401
- the color of vertical symbol 1402 can be Green
- the color of the diagonal symbol 1403 can be Blue.
- the described combination can be used to represent a complex symbol 1601 , as shown in FIG. 16.
- a new set of complex symbols with many more choices for symbols than the set 1400 from FIG. 14, can be defined, as illustrated by FIG. 16.
- the number of complex symbols in the new set, as illustrated by FIG. 16, can be (2 12 ⁇ 1) or 4095 symbols, assuming that a blank space is not considered a symbol.
- the number of complex symbols in the new set, as illustrated by FIG. 16 can be (2 12 ⁇ 1) or 4095 symbols, assuming that a blank space is not considered a symbol.
- YMC Yellow, Magenta, and Cyan
- YMCK Yellow, Magenta, Cyan, and Black
- sensors, detectors, and the like can be used with relatively very high accuracy.
- angle detection can be made practically independent of color detection.
- errors in the angle detection can be made independent of errors in the color detection, and visa versa, advantageously, reducing error propagation, reducing the overall error rate for decoding and recognition of generated complex symbols or messages generated from the complex symbols, and the like.
- FIG. 17 An exemplary embodiment for increasing the number of members of a set is illustrated by way of example in FIG. 17.
- a message that can be read from left to right, having N words, and using the 4 symbols 1001 - 1004 of the set 1000 shown in FIG. 10 is illustrated.
- every 3 symbols, starting and reading from left to right represent a word, wherein the symbols represent the letters in a word, and each word includes 3 letters.
- the first word includes a sequence of symbols 1002 , 1004 , and 1001
- the second word includes a sequence of symbols 1003 , 1003 , and 1004
- the Nth word includes a sequence of symbols 1001 , 1002 , and 1003 , and the like.
- a set of words can be defined, wherein the number of words in the set is 4 3 or 64 (for example, four symbols with three symbols per word), assuming that a blank space is not used in a word.
- a physical-level error occurs, such as a extra line drawn on a part of the symbol, a line deleted from a part of the symbol, and the like, then one word or symbol can be confused with another one.
- This is more problematic for words with long length, such as words defined with a length of 100 symbols (for example, each word including 100 symbols in series).
- more markers for position, rotation, orientation, synchronization, and the like can be employed.
- parity codes, check-sum codes, error checking or correction schemes, and the like can be employed to help to reduce the error rate.
- some of the members of the set can be set aside, and not be used at all, for the sake of better recognition of the symbols or words, more certainty in recognition, less confusion, and the like.
- FIGS. 16 and 17 can be combined to further increase the number of members in a resulting set.
- grammar, rules, and the like can be added between the words defined in FIG. 17 to even further increase the number of members in the resulting set.
- grammar, rules, and the like can be used to specify relationships between words, order of words, meaning in the context, exceptions, and the like.
- General rules such as English grammar rules, computer language rules, algorithmic rules, grammars, such as Pascal, eXtensible Markup Language (XML), FOR-loop structures, and the like, also can be employed.
- the resulting relative large set of complex symbols or words can be used, for example, to map, represent, abbreviate, symbolize, to correspond to different complete messages, partial messages, English phrases, words, letters, partial words, compression tables, dictionaries in English or other languages, other symbols, other glypbs, other letters, other languages, logical expressions, computer commands, executables, pieces of code, other human readable languages or symbols, voices, sounds, voice recognition commands, instructions, rules, numbers, grammar, parameters of rights assignment or granting or controlling access to items, conditions, fees, dates, information about items or an owner of an item, to request for specific actions and doing those actions, such as transfer of fund or items, erasure of content, disabling or preventing access to items, with tables, databases, formulas, curves, translation schemes, predefined or dynamic mapping relationships, such non-static and variable mapping relationships, mapping relationships depending on context, situation, or other parameters, and the like.
- FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set 1500 shown in FIG. 15.
- a book identification (ID) number in a database is 245, which, for example, refers to a novel by a given author, and an access expiration date is Jul. 12, 2003.
- the first complex symbol can be used to express the phrase “Book (or resource) ID number”
- the second complex symbol can be used to express the integer “245”
- the third complex symbol can be used to express the phrase “Access/expiration date”
- the fourth complex symbol can be used to express day and month of the year (“July 12,” or 7-12)
- the fifth complex symbol can be used to express the year “2003.”
- any suitable expression, grammar, rule, and the like can be expressed based on the glyphs and/or the complex symbols of the exemplary embodiments, advantageously, to enable rights management, rights assignment, and the like.
- Additional exemplary expressions and/or grammar for rights assignment and management such as for the XrML language, grammar, expressions, statements, licenses, rights assignment, and the like, that can be expressed using the described exemplary embodiments, for example, are further described in commonly-assigned U.S. Pat. No. 5,715,403, No. 5,629,980, No. 6,236,971, No. 6,233,684, No. 5,634,012, No. 5,638,443, and No. 5,530,235.
- FIG. 19 illustrates an exemplary rights expression for performing an action expressed using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the action can be the sending of funds, 55 US Dollars, to account number 435 at a bank with ID number 212 , and the like.
- the expressed action can include any suitable type of action and can be complex in structure, for example, having hierarchical, logical, conditional, and the like, statements within its structure.
- FIG. 20 illustrates an exemplary rights expression for performing an action using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the action can be the erasing of an e-book file with the ID number 125 .
- the expressed action can include rights management actions, editing actions, combining actions, actions for transferring items, objects, or resources, and the like.
- FIG. 21 illustrates an exemplary rights expression for expressing the right to print 100 copies of 2 e-books with ID numbers 443 and 12 using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- logical phrases such as AND, OR, exclusive OR (XOR), and the like, can be employed within an exemplary rights expression.
- the glyphs employed can include their own internal logic, rules, grammar, structure, options, ordering, and the like.
- FIG. 22 illustrates an exemplary rights expression for expressing the right to listen to music, play music, render music, and the like, for 100 minutes, for 2 pieces of music with ID numbers 443 and 13, using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the music ID numbers are listed in series, one after the other, and the end of the list of ID numbers is flagged, indicated, and the like, by an glyph referred to as an “End of List of ID Nos.”
- an expressed list can be extensive, include many layers within each other, such as directories, and the like.
- FIG. 23 illustrates an exemplary rights expression for expressing an e-book data record for an e-book with ID number 143 , whose owner has an ID number 212 , using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the end of the record is indicated, flagged, and the like, by a glyph referred to as “End of Data.”
- an expressed record can include additional information about the book, content owner, and the like, such as how to send payment to a content owner, and the like.
- the size of an expressed record can be of any suitable size, and the expressed record can be hierarchical, including its own directories, and the like.
- FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, industries, can be custom-made for each application or industry, and the like, using the symbols 1401 - 4104 of the set 1500 shown in FIG. 15.
- a glyph can be used to express what application the rights expression is intended for, such as e-books, movies, music, video, multimedia, and the like.
- the next glyph can be used to express the units employed for a given type of content, such a “Pages” for e-books, minutes for music and movies, Bytes for data, tracks for music, and the like.
- the next glyph can be used to express a range for the units, such as the range of pages of an e-book, and the like.
- the next two glyphs can be used to express the “Start” and “End” units for the ranges, such as 5 and 10, for expressing a range of “between pages 5 and 10,” in the case of an e-book, “between minutes 5 and 10,” in the case of a music file, and the like
- any suitable information also can be added, such as to indicate the name or the ID of an e-book, or content owner, information relevant to rights assignment or rights management, and the like.
- the glyphs of the exemplary embodiments can have flexible interpretations, can have multiple meanings, can depend on a context or application, and the like.
- the symbols, sets of symbols, and the like, of the exemplary embodiments, for example, as described with respect to FIGS. 2 - 24 can be correlated, associated, and the like, with corresponding information, such as rights expressions or portions thereof, and the like, for example, based on information that can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of DRM system 100 .
- One or more databases of the devices and subsystems of the DRM system 100 can store such information.
- the databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed herein, and the like.
- one or more glyphs can be employed so as to carry a secondary message, hidden message, and the like.
- a glyph in the case of airport security, such a glyph can be embedded on a passenger's ticket, in the case of library security, such a glyph can be embedded on a student's library card, and the like.
- a silent alarm in response to the passenger, an identified terrorist, presenting a ticket employing such a glyph, a silent alarm can be triggered to notify authorities to react to the situation in a manner that is not apparent to the terrorist.
- the exemplary embodiments can be employed to express various actions that can be initiated via a ticket, some of which may not be apparent to the ticket holder, advantageously, making it easier for authorities, and the like, to react to and/or control a given situation.
- the glyphs of the exemplary embodiments can be displayed in three dimensions, on paper, on a computer display, and the like, for example, using holographic technology, and the like.
- the glyphs of the exemplary embodiments can be secretly designed, such that it would be hard to replicate, or fake the glyphs, layers of security can be added, such as by employing watermarking, authentication, check-sum, and the like, schemes.
- the state, history, and the like,,of a system such as the DRM system 100 , content, and the like, can be encoded using the glyphs of the exemplary embodiments.
- the glyphs of the exemplary embodiments need not be printed nor be capable of being seen by a human eye, as long as the glyphs of the exemplary embodiments can be machine read, for example, using a suitable device, such as a scanner, wand, bar code reader, and the like.
- the glyphs or symbols of the exemplary embodiments need not be in forms that can be “seen” by a machine.
- the glyphs or symbols of the exemplary embodiments can be configured to be detected in some other way, such as being “heard,” and the like.
- the glyphs, symbols, words, messages, and the like, of the exemplary embodiments used to convey information can be encoded using light, sound, a series of sounds, light pulses, and the like, using at any suitable frequency, amplitude, and the like, can include ultraviolet waves, x-rays, microwaves, radio waves, and the like, can employ lasers, modulated or convoluted information, different colors or wavelengths, electric or magnetic field variations, and the like.
- Any suitable series of the glyphs, symbols, words, messages, and the like, of the exemplary embodiments employed can have its own grammar, rules, and the like, which provide a meaning to a transmitted message.
- a sound or light in a range of frequencies that a human ear or eye cannot detect can be employed for transmitting the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, during security applications, privacy applications, and the like.
- a transmitted message can be made transparent to a user or users, but at the same can be retrieved, understood, and the like, by a suitable sensor, detector, and the like.
- the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be expressed using any suitable human or machine sensing organ or device, and the like, so long as that the sensed information, message, and the like, can be quantized, digitized, expressed, and the like, based on numbers, bits, bytes, and the like.
- a device such as a touch tone telephone, and the like, can be used to transmit a sequence of sounds corresponding to the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, over a communications medium, such as a telephone line, and the like.
- the specific sounds including their sequence, duration, other factors, and the like, can be employed the represent the symbolic expression expressed by the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- an application can be used to enable a customer to engage in, for example, an online transaction that has the same effect as an application using the Internet for the online transaction, except that such a transaction can be sound based.
- rights expression information can be reduced to a series of numbers using various techniques.
- an unambiguous canonical rights expression can be converted into a binary format.
- such a binary format can be expressed as a sound, a series of sounds, and the like, and based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- a rights expression template, profile, and the like can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- such a rights expression template, profile, and the like can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- light, a series of light pulses, and the like at any suitable frequencies, including ultraviolet waves, x-rays, microwaves, radio waves, and the like, can be employed to express information, and, for example, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- the exemplary embodiments can be used to express information, such as rights expressions, and the like, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- information such as rights expressions, and the like
- any suitable rights expressions can be translated into the noted formats, and can be machine processed.
- the exemplary embodiments can provide increased efficiency, better matching of a resources to a target computational environment, such as matching a technology to a device employed, and the like.
- a user wishes to display on a personal computer screen a copy of the “Complete Works of William Shakespeare,” which the user has already obtained, and which resides in the hard drive of the personal computer of the user.
- the user can engage in an online transaction through the Internet, for example, visiting a corresponding Internet site, using the computer keyboard to provide certain information for representing a request for access to the work and the rights the user wishes to acquire, providing a credit card number to pay for the transaction, and downloading from the Internet site a digital license associated with the work authorizing the user the right to render the work by displaying the work on the personal computer screen.
- a computer program running on the personal computer can be used to interpret the license, and upon successful interpretation the user can be permitted to render the work.
- the above example can be accomplished by transmitting a series of sounds.
- the Internet site can transmit sound tones, which can be interpreted by a personal computer, other device, such as a mobile telephone, and the like, as corresponding a license granting the right to render the work.
- a touch-tone telephone system can be employed and configured to transmit and recognize the sound tones.
- Other devices can be employed and configured to transmit over a communications device other sounds, for example, with fine nuisances that are difficult to replicate, for example, for security purposes, and the like.
- a symbol in the form of a sound signal, a light signal, and the like can be transmitted and used, for example, during at checkout at an online store, and the like, to denote that an item, such as an e-book, music file, movie, and the like, is paid for and can be unlocked so as to function.
- an item such as an e-book, music file, movie, and the like
- the absence of such transmission can be used to prevent the item from being used.
- tones, frequencies, sequences of sounds or light, as noted above, and the like, as representations of symbols can be broadcast as a signal to initiate an action, series of actions, and the like.
- an owner of digital content such as a company
- a device such as a personal computer, and the like, can be offline, but can respond to the broadcast signal, for example, via a suitable device, and the like, capable of receiving the broadcasted signal.
- the broadcasted signal representation can be a command revoking or suspending licenses previously acquired authorizing devices to permit rendering or transfer of electronic files, digital works or content, specific digital works or content, and the like.
- the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be in printed or in visible form, such as in the case of a paper ticket with a glyph printed thereon, and the like.
- the ticket, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be in a digital form, such as an electronic form, and the like.
- an unauthorized person typically has to undertake a secondary activity, such as a second hacking attempt, a second decoding step, and the like, to unlock the information represented by the symbolic representation of a rights expression based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- a trusted communication session can be established between a repository, such as a personal computer, a smart card, and the like, employing the symbolic representation and a device, such as a reading device, scanning device, and the like, reading the symbolic representation.
- a trusted session can be dispensed with, for example, if it is not critical to maintain the security of the symbolic representation, if it is not critical to use a method to maintain security, and the like.
- symbolic representations such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments
- a highly complex symbol such as a multi-colored holograph
- the information represented therein can be made sufficiently complex, for example, so that such information cannot easily be discerned, the symbol cannot easily be counterfeited, and the like.
- a symbolic representation for example, can be in plain view, in plain view when rendered, and the like, and embody sensitive information without a need to encrypt such information.
- symbolic representations such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be secretly designed, such that replication, faking, and the like, are difficult to achieve, and additional layers of security can be employed, such as watermarking schemes, authentication schemes, check-sum schemes, and the like.
- the symbolic representations can include security aspects, and the like, that can be used in security methods and systems, and the like.
- the symbolic representations of the exemplary embodiments can be embedded into an item, such as digital content, and the like, or can be associated with the item using any suitable method, for example, such as the methods disclosed in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,634,012, No. 5,638,443, No. 5,715,403, and No. 5,629,980, and the like.
- the symbolic representation of the exemplary embodiments can be used to encode a security object that can be used to carry a secondary message, hidden message, and the like, and that can be represented in a human readable form, and the like.
- a security object can be printed on an airline ticket, boarding card, and the like, or can be represented in an electronic form, such as on a magnetic stripe of the airline ticket, boarding card, and the like.
- the airline ticket for example, such a security object can be used to notify authorities to react in a manner that is not apparent to the passenger holding the airline ticket.
- the security object can reside, digitally, in human readable a form, and the like, in an item, such as an identification card, smart card, repository, and the like, and, for example, can be used to express a right of entry into a certain building, and a condition that to enter the bearer must present a Maryland driver's license number 1234567890 issued in the name of John Smith.
- Information in or on the item can clearly reveal to a possessor, even an unauthorized possessor, that the item can be used to gain access to the building, but the condition that possession of the drivers license also is required can be hidden, for example, until a security officer reads the security object detailing same. Accordingly, an authorized possessor can be given enough information in eye-readable form, for example, to gain access to a building, but hidden information can be included in the form of the security object in order to catch an unauthorized possessor of the item.
- a parent can use the security object, for example, encoded in or on a child's library card, and the like, for example, to indicate to a librarian that the child only can borrow “G” rated videos, books, and the like.
- the librarian will able to detect the hidden message carried by the security symbol, while the child will not.
- the exemplary embodiments can be applied to any suitable situation where it is desirable that a possessor of an item bearing the security object, for example, not know the meaning of the security object, not know a full meaning of the security object, and the like.
- a company can issue a visitor an identification badge with such a security object encoded thereon, and can inform the visitor that the badge can only be used to gain access to building A.
- the security object when the visitor attempts to gain access to building B by presenting the badge to an appropriate device, such as a card reader, and the like, the security object can be used to trigger an alert not only to deny entry to the building B, but also to trigger some other action as defined by the security object, for example, such as to sound an alarm, to detain the person in the case of human intervention, and the like.
- human intervention can be involved, for example, in the case of security personnel having to examining the item, or no human intervention may be needed, for example, in the case of an automatic security system.
- the badge also can be encoded with a right, for example, represented by a glyph, to enter building A in a restricted manner, such as on specified days, at specified times, and the like.
- the exemplary embodiments described herein can be used to permit a digital work or content to be rendered, can be employed to allow access to a building, such as by opening a door, and the like.
- a condition for exercise of a usage right such as determining that a resource, such as a video file, or music file, being accessed, used, or acquired, has not been altered, or tampered with, for example, can be specified using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- a usage right can be used to specify that a video file can be rendered, played, and the like, an unlimited number of times on the condition that the rendering is performed prior to Jul. 4, 2003, and provided that, on each occasion that rendering is requested, a specified method determines that the video file has not been altered. If the file cannot be determined to be unaltered, then rendering can be denied and other consequences can follow, such as the DRM system 100 being programmed to lock down the file, and generate a report to the appropriate authority so that the suspected alteration can be investigated.
- the DRM system 100 can be configured to utilize a usage rights expression, for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like.
- a usage rights expression for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like.
- a condition can include, for example, determining that digital content in question has not been tampered with, has not been altered, and the like, and that the symbolic representation of the usage right has not been tampered with, has not been altered, and the like. Accordingly, if the DRM system 100 fails to determine that both that the digital content and the symbolic representation have not been altered, the exercise of the purported usage right can be denied.
- this exemplary embodiment provides a two-pronged layer of protection, because a person attempting gain unauthorized access or otherwise obtain something to which they are not entitled would have to pass two hurdles. For example, such unauthorized party would have to perform to forgeries or hack two things.
- a person wishing to exercise a usage right can present an item including a glyph representing such a usage right.
- the glyph can be in electronic form, in printed form, in a hard copy format, and the like.
- a DRM application such as the client component 122 , and the like, in addition to being configured to ensure that conditions for exercise of the usage right are satisfied, can be configured to determine that the glyph and/or the video file have not been altered in order to grant exercise of the usage right. If the DRM application determines that the glyph and/or the video file have been altered, the DRM application can be configured to prevent exercise of the usage right. If, however, the DRM application determines that the glyph and the video file have not been altered, the DRM application can be configured to allow the exercise of the usage right, for example, subject to successful completion of other processes employed by the DRM application.
- the determination of non-alteration can be employed before exercise of the usage right is allowed, thus, erring on the side of the usage right not being exercised if such a test fails.
- This approach can be varied, wherein the determination of non-alteration is not to be made, thus, erring on the side of permitting the exercise of the usage right.
- a hybrid approach is made possible. For example, a determination of non-alteration can be employed to exercise the full usage rights requested, but if such a determination fails, then some of the usage rights can be exercisable, while others may not. Thus, the exercisable usage rights can be configured as a subset of the full usage right, but need not be.
- the DRM system 100 can be configured to permit rendering by display of a file on a computer screen, but to not permit the file to be copied, moved, loaned, transferred, and the like.
- the DRM system 100 can be configured to generate an error report to an authorizing authority, such as a server, repository, device, and the like, where the report can be reviewed, automatically, based on human intervention, and the like.
- the report can be configured to detail the determinations made by the DRM system 100 , and the results of such determinations.
- the DRM system 100 then can permit exercise of the usage rights, if authorized to do so by the authorizing authority.
- the exemplary embodiments can be employed to ensure that an item, such as photographs, for example, police crime scene photographs, and the like, have not been altered.
- an item such as photographs, for example, police crime scene photographs, and the like
- it can be important to ensure that the photograph is not altered, but probably it can be even more important to ensure that if the photograph is altered that such alteration can be detected.
- the level of complexity employed in the symbolic representations of the exemplary embodiments depends on the level of security desired.
- the exemplary embodiments can be employed with objects other than photographs, video files, and the like, and in situations, other than evidentiary findings, and the like, as will be appreciated by those skilled in the relevant art(s).
- Any suitable method to detect if an item, such as a photograph, video file, and the like, has been tampered with can be employed with the exemplary embodiments.
- a verification method such as described in commonly assigned, co-pending, U.S. patent application Ser. No. 10/147,304 of Tadayon et al., entitled “METHOD AND APPARATUS FOR VERIFYING DATA INTEGRITY BASED ON DATA COMPRESSION PARAMETERS,” filed on May 17, 2002, the entire disclosure of which is hereby incorporated by reference herein, can be employed.
- Such a verification method can include determining one or more of various parameters resulting from, or used for, compression or other manipulation of the data and comparing the value or character of that parameter to the original value or character after transmission, processing and/or a period of time. Any compression scheme or other manipulation can be used. Further, combinations of the parameters can be used and processed in various manners through various logical processes.
- both background and foreground symbols can be configured to express a meaning, message, and the like.
- a meaning of the background symbol can be that when the background symbol is present the foreground symbol can be interpreted.
- both the background symbol and the foreground symbol can be configured to express a meaning.
- the DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a certain way, such as printed on a same substrate as the first symbol, printed at a certain physical location relative to the first symbol, and the like.
- each symbol can be configured to express part of the information being conveyed, for example, such that the information being conveyed can be distributed over a plurality of symbols, the information being conveyed can be distributed over a plurality of symbols in a redundant manner, and the like.
- all of the symbols can be configured to be in digital form, one of a plurality of symbols can be configured to be in digital form while the others are not, and the like.
- a paper ticket can include a printed symbol, which when read by an appropriate reader, machine, and the like, can be detected to represent a usage right.
- a condition to be satisfied in order to exercise the usage right can be the presentment to the reader, machine, and the like of a digital symbol, for example, included in a repository, such as a smart card, handheld device, and the like, or presentment of an additional printed symbol, and the like.
- a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey little or no information, but, instead, convey information on how to obtain information.
- the symbol can be configured as a pointer to another system, device, file, and the like.
- This exemplary embodiment can be useful where security is desired, because an unauthorized party, device, and the like, would have to hack, crack, and the like, multiple systems to obtain the information. For example, the unauthorized party would have to crack the symbol to determine that in order to obtain unauthorized access a second system must be compromised. The unauthorized party would then have to crack the second system.
- symbols can be configured as pointers to a system, device, place, and the like, where information can be obtained, a transaction is to take place, and the like.
- one or more symbols can be configured to convey Uniform Resource Locator (URL) information, for example, for a system, a device, a resource, a file, a document, a music file, a video file, a movie, an e-book, software, and the like.
- URL Uniform Resource Locator
- the symbol when a suitable reader, machine, and the like, reads the symbol, the symbol can be interpreted as representing the URL and appropriate actions can be taken, for example, such as directing a Web browser to the URL for gaining accessing a music file, video file, and the like.
- the present invention recognizes that there are situations where establishing a communications link with a server, repository, device, and the like, for example, over the Internet, via a telephone line, modem, and the like, may not practical or even possible.
- a user can attempt to gain access to an item, such as digital content, a service, and the like, by initiating an online transaction.
- the online transaction can result in the user gaining access to the item requested.
- the ability to communicate can be constrained. For example, a user may have received through the mail a disk including a movie file, a user may have on a hard drive of a personal computer, such as in the client environment 120 , a movie file, and the like.
- the owner of the movie file such as a movie studio, video store, and the like, for example, can have the user initiate an online transaction, transmit a credit card number to pay a fee for the accessing the movie, and receive a license that can permit rendering of the movie by viewing of the movie file on a screen of the personal computer.
- the user can employ a ticket, for example, including a license granting the user the right render the movie by viewing the movie file on the screen of the personal computer, and that can be read by the personal computer.
- the ticket can be in the form of a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. Depending on a level of security desired, the symbol can be made complex to deter counterfeiting.
- each use of the ticket can be recorded in a record, for example, on the ticket itself, in another repository, such as the personal computer of the user, and the like.
- Such a record can be configured to indicate the number of times the ticket has been used, wherein the ticket can be configured to be used one time, many times, and the like. For example, the user may have acquired the right to view ten movies distributed by a movie studio, movie store, and the like. This information can be recorded in the personal computer of the user.
- the number of views to which the user remains entitled can be reduced by one.
- the ticket need not record information concerning a use thereof, but rather information for authorizing use of the corresponding movie file.
- the ticket can be used to record information about use of the ticket.
- each use of the ticket to authorize rendering of the movie file can result in the number of authorized uses to be reduced by one and to be reflected on the ticket, wherein the rendering repository, such as the personal computer of the user, another repository device, and the like, need not record information concerning use.
- the ticket can be in digital form so that the use information can be recorded on the ticket.
- such use information can be a printed on the ticket, and the like.
- the ticket can be altered, information can be recorded on the ticket, and the like. Such alteration can be performed, for example, via mechanically means by the device reading the ticket, by human intervention, such as by a clerk at a kiosk, and the like.
- two tickets can be employed, wherein one ticket can be in digital form, and record information concerning use, and the other ticket can be in digital or printed hard copy form and provide information about the item to which access is desired.
- a movie studio can distribute a hard copy printed ticket which can employ one or more glyphs to express rights expression information concerning the usage rights, manners of use, conditions, and the like, associated with a movie file.
- the printed ticket can be presented together with the digital ticket to an appropriate device.
- the device can be configured to read the rights expression information that can be provided on either or both tickets based on the glyphs, process a transaction permitting the usage right to be exercised, such as rendering the movie by viewing the movie file on a screen of a personal computer, subject to applicable conditions, and record the use information, for example, on one or both of the tickets, on the rendering device, on another device, and the like.
- a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be employed to express rights expression information, for example, in a resource constrained system or environment, such as on devices having a small foot prints, handheld devices, systems having limited processing resources, and the like.
- a rights expression can be reduced to a suitable symbol, groups of symbols, sound, groups of sounds, light pulse, groups of light pulses, and the like, representing the rights expression information being expressed.
- a predetermined tone, set of tones, and the like can be used to represent an unambiguous canonical rights expression encoded in a binary format.
- an exemplary unambiguous canonical rights expression, encoded in a binary format can given by:
- a manner of use of an item can be specified with a symbol, such as the glyphs, symbols, words, messages, and the like, the exemplary embodiments.
- glyphs can be expressed in terms of sound, color, image, pulse, light, and the like, signals, wherein the amplitude, frequency, and width of the corresponding signals could be modified to modify an expressed message.
- information regarding rights, conditions, and the like can be expressed as three dimensional (3D) information, such as via a holographic glyph image, and the like.
- a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey rights expression information, such as an expiration date, and the like, for example, to prevent the display of information on a monitor of a computer, and the like.
- the glyph conveying the rights expression information can be displayed on the monitor of the computer, and can be scanned, wanded, and the like, via a suitable detector, hand-held scanner, and the like.
- rights expression information can be configured for use with an auction Web site, a storefront on the Internet, and the like.
- sound, light, a combination of light and sound, and the like can be is used for transmission of rights expression information.
- the movement of a user in a building can be monitored, and the presence of the user in a room can be monitored, detected, and the like, for example, using an iris scan, a smart card, voice recognition, biometrics, a device on the clothing of the user, and the like.
- a security level assigned to the room such as the Pentagon library
- items in the room such as top-secret files, and the like
- privileges of the user for gaining access to the corresponding information, data, services, and the like can be based on usage rights, conditions, restrictions, and the like, specified in the rights expression information transmitted in the room.
- a background signal for example, including noise, such as semi-random noise, random noise, a steganographically encoded signal, a scrambled signal, and the like, can be added to a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments that can be used to convey rights expression information.
- a flag, an indicator, and the like can be employed to indicate that the background signal can be neglected, for all or a part of the signal, by an appropriate scanner of the symbol conveying the rights expression information.
- the rights expression information can be represented as a video image or multimedia content consisting of video, sound, and text and having static and dynamic portions. Any of these elements of the multimedia content can, alone or in combination, be used to represent the rights expression information.
- the rights expression information can be expressed by being distributed throughout the portions or by being redundantly expressed by the portions for security and reliability.
- the symbolic representations of rights expressions in the exemplary embodiments can be used, for example, in a digital ticket that can be scanned or read by a machine.
- the symbolic representations can be customized to the needs of a specific group, company or industry, in which case the scanners or readers also can be specialized and customized for a specific purpose or task.
- the symbolic representations of rights expressions can be used to condense the amount of information, reduce the amount of hardware and/or software required to understand the information, and speed up the process for the convenience of the end user of the content, while providing relatively lower error rates and relatively higher precision.
- Barcode or symbol readers, pattern recognition engines, scanners, and the like can be employed, advantageously, with minor or no modifications to hardware and/or software for practicing the exemplary embodiments.
- the pattern recognition engines can include neural network, fuzzy logic techniques, and the like. Accordingly, available technologies can be used for the reader and recognition engine functions, which reduces the set-up costs for practicing the exemplary embodiments.
- processing the symbols expressing the rights information using the readers or pattern recognition processors, for example, to wand the symbol patterns and extract the rights expression information results in speed and reliability during the interpretation process for the end user of the content.
- the rights expression information can be output as plain English text, any other suitable human-readable language or form, such as voice or sound, and the like. Accordingly, the end user of the content does not have to know the rules and/or language related the rights expression information, drastically reducing the learning period for the end user, and thus, significantly reducing the operational expenses for the end user.
- the symbolic representations of the exemplary embodiments can be printed on a physical substrate, such as a piece of paper, or can be displayed on a computer monitor, for scanning by an appropriate reader, and the like.
- the rights expression information can be expressed with symbols in the form of parallel lines, bar codes with different widths, angles, ratios, perspectives, or distances, crossed lines, concentric circles, geometrical shapes, different colors, visible or invisible light sources with different wavelengths for representing different glyphs and shapes and for easy and fast optical recognition, Morse codes, laser pulses with different durations, Japanese characters, English characters, one-dimensional images, two-dimensional images, symbols, sets of symbols with specific angular relationships, sets of symbols with specific spatial relationships for defining different types of grammar or rules, rotational invariant symbols, spatial invariant symbols, symbols with more than one meaning, hidden meanings or meanings not readable by humans, or readable by specialized machines to keep some information secret, watermarks, steganographically encoded symbols, symbols accompanied by human-readable messages, symbols readable by machines
- different rights expression information or messages can be conveyed based on the order of the symbols, or placement of the symbols with respect to each other.
- the specific sequence of symbols can convey a specific situation or context, such as the information about an industry or purpose of the rights expression information.
- the symbolic representation can be in digital, such as electronic form, and the like, as well as in printed form, visible form, and the like.
- the symbols can be stored on some sort of electronic media, such a computer hard drive, server, floppy disk, smart card device, and the like.
- the symbolic representations can be generated using templates, a graphical user interface (GUI), and the like, advantageously, not requiring the end user of the content or providers of the content to have a complete knowledge of a rights expression language and/or grammar.
- GUI graphical user interface
- the recipe, algorithm, formula, and the like, used for the generation of the symbols could be in public domain or governed by a standards body, to encourage standardization of the symbols.
- the standards body then could set the parameters for shape or methods of generation of the symbols.
- the recipe, algorithm, formula, and the like, used for the generation of the symbols could be kept secret from the public, for example, to discourage unauthorized users from generating fake symbols and/or digital tickets.
- the symbol reader can be configured to reject the ticket as invalid.
- the rights expression information extracted from a symbol or symbols can instruct a scanner or reader to perform a predetermined action.
- a digital ticket can include a symbol or symbols corresponding to a rights expression indicating that a user has the right to print 4 copies of a report.
- the symbols also can instruct the reader to print another symbol on the digital ticket, print a new ticket, alter the ticket, and the like, so as to indicate that the user now has the right to print 3 more copies.
- the symbols themselves can have a grammar of their own, for example, a relationship internal to symbols themselves, used to express new meanings or extra information, for example, with respect to the neighboring symbols or a predetermined proximity to other specific symbols. For example, if a given symbol is within or exactly 2 symbols away from another symbol, such positional relationship could express further information that can be concluded from that sequence of symbols.
- a grammar can be based on the context or proximity of the symbols, with respect to each other or with respect to a marker, and the like.
- FIGS. 25 - 26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
- FIG. 25 is an exemplary flowchart for illustrating graphical, representation of rights expression information
- FIG. 26 an exemplary flowchart for illustrating modulated signal-based representation of rights expression information.
- the rights expression information can be specified.
- a graphical representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- the computer 130 of the DRM system 100 of FIG. 1 can be configured to perform the process for the graphical representation of rights expression information of FIG. 25.
- any suitable device, system and the like for example, such as one or more of the devices and subsystems of the DRM system 100 , can be configured to perform such processing.
- the rights expression information can be specified.
- a modulated signal-based representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- the computer 130 of the DRM system 100 of FIG. 1 can be configured to perform the process for the modulated signal-based representation of rights expression information of FIG. 26.
- any suitable device, system and the like for example, such as one or more of the devices and subsystems of the DRM system 100 , can be configured to perform such processing.
- the DRM system 100 can be used to store information relating to various processes described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of DRM system 100 .
- One or more databases of the devices and subsystems of the DRM system 100 can store the information used to implement the exemplary embodiments.
- the databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed above.
- All or a portion of the DRM system 100 can be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, micro-controllers, and the like, programmed according to the teachings of the disclosed exemplary embodiments.
- Appropriate software can be readily prepared by programmers of ordinary skill based on the teachings of the disclosed exemplary embodiments.
- the DRM system 100 can be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of component circuits.
- the exemplary embodiments described herein can be employed in offline systems, online systems, and the like, and in applications, such as TV applications, computer applications, DVD applications, VCR applications, appliance applications, CD player applications, and the like.
- the signals employed to transmit the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be configured to be transmitted within the visible spectrum of a human, within the audible spectrum of a human, not within the visible spectrum of a human, not within the audible spectrum of a human, combinations thereof, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/388,171 US20030225700A1 (en) | 2002-03-14 | 2003-03-14 | System and method for graphical rights expressions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US36393202P | 2002-03-14 | 2002-03-14 | |
US10/388,171 US20030225700A1 (en) | 2002-03-14 | 2003-03-14 | System and method for graphical rights expressions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030225700A1 true US20030225700A1 (en) | 2003-12-04 |
Family
ID=28041836
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/388,226 Expired - Lifetime US7359884B2 (en) | 2002-03-14 | 2003-03-14 | Method and apparatus for processing usage rights expressions |
US10/388,167 Abandoned US20040015426A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights with sound signals |
US10/388,217 Abandoned US20030233169A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights using light signals |
US10/388,171 Abandoned US20030225700A1 (en) | 2002-03-14 | 2003-03-14 | System and method for graphical rights expressions |
US10/388,162 Active 2027-11-01 US8108313B2 (en) | 2002-03-14 | 2003-03-14 | Rights expression profile system and method using templates |
US12/204,393 Active 2025-04-17 US9626668B2 (en) | 2002-03-14 | 2008-09-04 | Rights expression profile system and method using templates |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/388,226 Expired - Lifetime US7359884B2 (en) | 2002-03-14 | 2003-03-14 | Method and apparatus for processing usage rights expressions |
US10/388,167 Abandoned US20040015426A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights with sound signals |
US10/388,217 Abandoned US20030233169A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights using light signals |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/388,162 Active 2027-11-01 US8108313B2 (en) | 2002-03-14 | 2003-03-14 | Rights expression profile system and method using templates |
US12/204,393 Active 2025-04-17 US9626668B2 (en) | 2002-03-14 | 2008-09-04 | Rights expression profile system and method using templates |
Country Status (8)
Country | Link |
---|---|
US (6) | US7359884B2 (de) |
EP (4) | EP1490819A4 (de) |
JP (5) | JP2005532610A (de) |
KR (3) | KR100703521B1 (de) |
CN (4) | CN1653462A (de) |
AU (4) | AU2003230651A1 (de) |
BR (1) | BR0308409A (de) |
WO (4) | WO2003079269A1 (de) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030210429A1 (en) * | 2002-05-10 | 2003-11-13 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program |
US20060069646A1 (en) * | 2004-09-28 | 2006-03-30 | Yoshinori Matsumoto | Method of controlling a terminal device |
US20070011094A1 (en) * | 2005-07-05 | 2007-01-11 | Xerox Corporation | Tools for accessing digital works |
US20070177188A1 (en) * | 2006-01-27 | 2007-08-02 | Sbc Knowledge Ventures, L.P. | Methods and systems to process an image |
EP1855225A1 (de) * | 2006-05-09 | 2007-11-14 | Ricoh Company, Ltd. | Computergerät |
US20080301003A1 (en) * | 2007-05-31 | 2008-12-04 | Daniel Harkabi | System for Online Buying |
US20090138109A1 (en) * | 2007-11-06 | 2009-05-28 | Lg Electronics Inc. | Apparatus providing function to delete files and method for deleting files thereof |
US8532978B1 (en) * | 2008-10-31 | 2013-09-10 | Afrl/Rij | Natural language interface, compiler and de-compiler for security policies |
US8819290B2 (en) | 2009-10-23 | 2014-08-26 | Zte Corporation | Method and system for transmitting compressed rights |
US20150379512A1 (en) * | 2013-02-22 | 2015-12-31 | Op-Palvelut Oy | Communication during payment procedure |
US9589124B2 (en) | 2014-05-29 | 2017-03-07 | Comcast Cable Communications, Llc | Steganographic access controls |
US20170310725A1 (en) * | 2003-10-16 | 2017-10-26 | Gula Consulting Limited Liability Company | Electronic media distribution system |
Families Citing this family (111)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7788602B2 (en) | 2000-06-06 | 2010-08-31 | Microsoft Corporation | Method and system for providing restricted actions for recognized semantic categories |
US7716163B2 (en) | 2000-06-06 | 2010-05-11 | Microsoft Corporation | Method and system for defining semantic categories and actions |
US7770102B1 (en) | 2000-06-06 | 2010-08-03 | Microsoft Corporation | Method and system for semantically labeling strings and providing actions based on semantically labeled strings |
US7712024B2 (en) | 2000-06-06 | 2010-05-04 | Microsoft Corporation | Application program interfaces for semantically labeling strings and providing actions based on semantically labeled strings |
US9038108B2 (en) | 2000-06-28 | 2015-05-19 | Verizon Patent And Licensing Inc. | Method and system for providing end user community functionality for publication and delivery of digital media content |
JP4774582B2 (ja) * | 2000-06-30 | 2011-09-14 | ソニー株式会社 | コンテンツ管理装置、コンテンツ管理方法及びプログラム格納媒体 |
US7778816B2 (en) | 2001-04-24 | 2010-08-17 | Microsoft Corporation | Method and system for applying input mode bias |
US8972862B2 (en) * | 2001-06-27 | 2015-03-03 | Verizon Patent And Licensing Inc. | Method and system for providing remote digital media ingest with centralized editorial control |
US8990214B2 (en) | 2001-06-27 | 2015-03-24 | Verizon Patent And Licensing Inc. | Method and system for providing distributed editing and storage of digital media over a network |
US7970260B2 (en) | 2001-06-27 | 2011-06-28 | Verizon Business Global Llc | Digital media asset management system and method for supporting multiple users |
KR100703521B1 (ko) * | 2002-03-14 | 2007-04-03 | 콘텐트가드 홀딩즈 인코포레이티드 | 사용권리 표현을 처리하기 위한 방법 및 장치 |
US7707496B1 (en) | 2002-05-09 | 2010-04-27 | Microsoft Corporation | Method, system, and apparatus for converting dates between calendars and languages based upon semantically labeled strings |
US7707024B2 (en) | 2002-05-23 | 2010-04-27 | Microsoft Corporation | Method, system, and apparatus for converting currency values based upon semantically labeled strings |
US7742048B1 (en) | 2002-05-23 | 2010-06-22 | Microsoft Corporation | Method, system, and apparatus for converting numbers based upon semantically labeled strings |
MXPA04012119A (es) * | 2002-06-03 | 2005-04-19 | Contentguard Holdings Inc | Sistema y metodo para proveer y administrar expresiones de derechos. |
US7827546B1 (en) | 2002-06-05 | 2010-11-02 | Microsoft Corporation | Mechanism for downloading software components from a remote source for use by a local software application |
US7356537B2 (en) | 2002-06-06 | 2008-04-08 | Microsoft Corporation | Providing contextually sensitive tools and help content in computer-generated documents |
US7716676B2 (en) | 2002-06-25 | 2010-05-11 | Microsoft Corporation | System and method for issuing a message to a program |
US7392479B2 (en) * | 2002-06-27 | 2008-06-24 | Microsoft Corporation | System and method for providing namespace related information |
US7502945B2 (en) * | 2002-06-28 | 2009-03-10 | Microsoft Corporation | Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system |
US7209915B1 (en) | 2002-06-28 | 2007-04-24 | Microsoft Corporation | Method, system and apparatus for routing a query to one or more providers |
FR2848054A1 (fr) * | 2002-11-29 | 2004-06-04 | France Telecom | Systeme et procede de transmission d'informations associes a des droits d'utilisation |
US8131649B2 (en) * | 2003-02-07 | 2012-03-06 | Igware, Inc. | Static-or-dynamic and limited-or-unlimited content rights |
US20100017627A1 (en) | 2003-02-07 | 2010-01-21 | Broadon Communications Corp. | Ensuring authenticity in a closed content distribution system |
US20040267384A1 (en) * | 2003-02-07 | 2004-12-30 | Broadon Communications, Inc. | Integrated console and controller |
US7779482B1 (en) | 2003-02-07 | 2010-08-17 | iGware Inc | Delivery of license information using a short messaging system protocol in a closed content distribution system |
US7322042B2 (en) | 2003-02-07 | 2008-01-22 | Broadon Communications Corp. | Secure and backward-compatible processor and secure software execution thereon |
US7783614B2 (en) | 2003-02-13 | 2010-08-24 | Microsoft Corporation | Linking elements of a document to corresponding fields, queries and/or procedures in a database |
US7711550B1 (en) | 2003-04-29 | 2010-05-04 | Microsoft Corporation | Methods and system for recognizing names in a computer-generated document and for providing helpful actions associated with recognized names |
US9553879B2 (en) * | 2003-06-06 | 2017-01-24 | Core Wireless Licensing S.A.R.L. | Method and apparatus to represent and use rights for content/media adaptation/transformation |
US7653936B2 (en) * | 2003-06-25 | 2010-01-26 | Microsoft Corporation | Distributed expression-based access control |
US7739588B2 (en) | 2003-06-27 | 2010-06-15 | Microsoft Corporation | Leveraging markup language data for semantically labeling text strings and data and for providing actions based on semantically labeled text strings and data |
US6898555B2 (en) * | 2003-07-14 | 2005-05-24 | Aladdin Knowledge Systems Ltd. | Method for indicating the integrity of use-information of a computer program |
US7813000B2 (en) * | 2003-12-30 | 2010-10-12 | Microsoft Corporation | Device color characterization profile format |
JP4333494B2 (ja) * | 2004-06-17 | 2009-09-16 | ソニー株式会社 | コンテンツ再生装置,コンテンツ再生方法,コンテンツ管理装置,コンテンツ管理方法およびコンピュータプログラム。 |
GB0413848D0 (en) | 2004-06-21 | 2004-07-21 | British Broadcasting Corp | Accessing broadcast media |
KR100608585B1 (ko) * | 2004-07-12 | 2006-08-03 | 삼성전자주식회사 | 이동형 저장 장치에서 객체의 위치 정보를 이용하여 권리객체를 검색하는 방법 및 장치 |
AU2005263103B2 (en) * | 2004-07-12 | 2008-06-19 | Samsung Electronics Co., Ltd. | Apparatus and method for processing digital rights object |
US8402283B1 (en) | 2004-08-02 | 2013-03-19 | Nvidia Corporation | Secure content enabled drive system and method |
US8359332B1 (en) * | 2004-08-02 | 2013-01-22 | Nvidia Corporation | Secure content enabled drive digital rights management system and method |
US7664751B2 (en) | 2004-09-30 | 2010-02-16 | Google Inc. | Variable user interface based on document access privileges |
US7603355B2 (en) | 2004-10-01 | 2009-10-13 | Google Inc. | Variably controlling access to content |
US20060150153A1 (en) * | 2004-12-04 | 2006-07-06 | Micah Altman | Digital object verification method |
US8788425B1 (en) | 2004-12-15 | 2014-07-22 | Nvidia Corporation | Method and system for accessing content on demand |
US8875309B1 (en) | 2004-12-15 | 2014-10-28 | Nvidia Corporation | Content server and method of providing content therefrom |
US8346807B1 (en) | 2004-12-15 | 2013-01-01 | Nvidia Corporation | Method and system for registering and activating content |
US8751825B1 (en) | 2004-12-15 | 2014-06-10 | Nvidia Corporation | Content server and method of storing content |
US20060225055A1 (en) * | 2005-03-03 | 2006-10-05 | Contentguard Holdings, Inc. | Method, system, and device for indexing and processing of expressions |
US7526812B2 (en) * | 2005-03-24 | 2009-04-28 | Xerox Corporation | Systems and methods for manipulating rights management data |
DE102005015113A1 (de) * | 2005-04-01 | 2006-10-05 | Siemens Ag | Verfahren zur Verwaltung von Nutzungsrechten an elektronischen Datenobjekten durch einen Rechteerwerber |
US8893299B1 (en) | 2005-04-22 | 2014-11-18 | Nvidia Corporation | Content keys for authorizing access to content |
US8245051B2 (en) * | 2005-05-13 | 2012-08-14 | Microsoft Corporation | Extensible account authentication system |
DE102005033698A1 (de) * | 2005-07-19 | 2007-02-01 | Siemens Ag | Verfahren zum Export von Nutzungsrechten an elektronischen Datenobjekten |
US7565358B2 (en) * | 2005-08-08 | 2009-07-21 | Google Inc. | Agent rank |
US9401080B2 (en) | 2005-09-07 | 2016-07-26 | Verizon Patent And Licensing Inc. | Method and apparatus for synchronizing video frames |
US9076311B2 (en) | 2005-09-07 | 2015-07-07 | Verizon Patent And Licensing Inc. | Method and apparatus for providing remote workflow management |
US7992085B2 (en) | 2005-09-26 | 2011-08-02 | Microsoft Corporation | Lightweight reference user interface |
US7788590B2 (en) | 2005-09-26 | 2010-08-31 | Microsoft Corporation | Lightweight reference user interface |
EP1929685A4 (de) * | 2005-09-29 | 2011-12-21 | Contentguard Holdings Inc | System und verfahren zur digitalen rechteverwaltung unter verwendung einer vorauskopie mit ausgaberechten und verwaltete kopie-token |
KR100746014B1 (ko) * | 2005-11-09 | 2007-08-06 | 삼성전자주식회사 | 디지털 저작권 관리 방법 및 시스템 |
US7921059B2 (en) * | 2005-12-15 | 2011-04-05 | Microsoft Corporation | Licensing upsell |
US20070143228A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Licensing matrix |
WO2007120360A2 (en) | 2005-12-29 | 2007-10-25 | Blue Jungle | Information management system |
US20070156601A1 (en) * | 2006-01-03 | 2007-07-05 | International Business Machines Corporation | Method and system for providing interoperability between digital rights management systems |
US20070219908A1 (en) * | 2006-03-02 | 2007-09-20 | Yahoo! Inc. | Providing syndicated media to authorized users |
US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US20070255659A1 (en) * | 2006-05-01 | 2007-11-01 | Wei Yen | System and method for DRM translation |
WO2007130554A2 (en) | 2006-05-02 | 2007-11-15 | Broadon Communications Corp. | Content management system and method |
US7603350B1 (en) | 2006-05-09 | 2009-10-13 | Google Inc. | Search result ranking based on trust |
US7624276B2 (en) * | 2006-10-16 | 2009-11-24 | Broadon Communications Corp. | Secure device authentication system and method |
US7613915B2 (en) * | 2006-11-09 | 2009-11-03 | BroadOn Communications Corp | Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed |
US8200961B2 (en) * | 2006-11-19 | 2012-06-12 | Igware, Inc. | Securing a flash memory block in a secure device system and method |
CN101246527B (zh) * | 2007-02-15 | 2011-07-20 | 华为技术有限公司 | 提供、使用版权描述的方法及系统 |
US20090006109A1 (en) * | 2007-06-28 | 2009-01-01 | Yahoo! Inc. | Rights Engine Including Event Logs |
US8117094B2 (en) * | 2007-06-29 | 2012-02-14 | Microsoft Corporation | Distribution channels and monetizing |
US9412125B2 (en) | 2007-09-12 | 2016-08-09 | Sony Corporation | Open market content distribution |
US20090094147A1 (en) * | 2007-10-09 | 2009-04-09 | Fein Gene S | Multi-Computer Data Transfer and Processing to Support Electronic Content Clearance and Licensing |
US20090132422A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Machine-readable and enforceable license |
US20090132435A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Popularity based licensing of user generated content |
US20090132403A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Licensing interface for user generated content |
US20090210333A1 (en) * | 2008-02-14 | 2009-08-20 | Microsoft Corporation | Micro-licensing of composite content |
US8875013B2 (en) * | 2008-03-25 | 2014-10-28 | International Business Machines Corporation | Multi-pass validation of extensible markup language (XML) documents |
US20090254482A1 (en) * | 2008-04-07 | 2009-10-08 | Microsoft Corporation | Time-based licenses |
US8655826B1 (en) | 2008-08-01 | 2014-02-18 | Motion Picture Laboratories, Inc. | Processing and acting on rules for content recognition systems |
EP2164022A1 (de) * | 2008-09-02 | 2010-03-17 | Siemens Aktiengesellschaft | Verfahren zur Einräumung einer Zugriffsberechtigung auf ein rechnerbasiertes Objekt in einem Automatisierungssystem, Computerprogramm und Automatisierungssystem |
US20100174818A1 (en) * | 2009-01-07 | 2010-07-08 | Microsoft Corporation | Input Service for Client Devices |
US8606792B1 (en) | 2010-02-08 | 2013-12-10 | Google Inc. | Scoring authors of posts |
US9244965B2 (en) * | 2010-02-22 | 2016-01-26 | Thoughtwire Holdings Corp. | Method and system for sharing data between software systems |
US10657507B2 (en) * | 2010-05-17 | 2020-05-19 | Adobe Inc. | Migration between digital rights management systems without content repackaging |
FR2980865A1 (fr) * | 2011-09-29 | 2013-04-05 | France Telecom | Procede de distribution de contenus, dispositif d'obtention et programme d'ordinateur correspondant |
US9081974B2 (en) * | 2011-11-10 | 2015-07-14 | Microsoft Technology Licensing, Llc | User interface for selection of multiple accounts and connection points |
US20130144755A1 (en) * | 2011-12-01 | 2013-06-06 | Microsoft Corporation | Application licensing authentication |
US8725650B2 (en) * | 2012-01-26 | 2014-05-13 | Microsoft Corporation | Document template licensing |
US9172711B2 (en) * | 2012-02-13 | 2015-10-27 | PivotCloud, Inc. | Originator publishing an attestation of a statement |
US8627097B2 (en) | 2012-03-27 | 2014-01-07 | Igt | System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
US9177158B2 (en) * | 2012-11-07 | 2015-11-03 | Theplatform, Llc | Methods and systems for processing content rights |
JP6003699B2 (ja) * | 2013-02-08 | 2016-10-05 | 富士通株式会社 | テストデータ生成プログラム、方法及び装置 |
US10313433B2 (en) | 2013-03-14 | 2019-06-04 | Thoughtwire Holdings Corp. | Method and system for registering software systems and data-sharing sessions |
US9742843B2 (en) | 2013-03-14 | 2017-08-22 | Thoughtwire Holdings Corp. | Method and system for enabling data sharing between software systems |
US10372442B2 (en) | 2013-03-14 | 2019-08-06 | Thoughtwire Holdings Corp. | Method and system for generating a view incorporating semantically resolved data values |
US10523490B2 (en) * | 2013-08-06 | 2019-12-31 | Agilepq, Inc. | Authentication of a subscribed code table user utilizing optimized code table signaling |
US9319727B2 (en) | 2013-10-29 | 2016-04-19 | Fx Networks, Llc | Viewer-authored content acquisition and management system for in-the-moment broadcast in conjunction with media programs |
US9305000B1 (en) * | 2014-03-27 | 2016-04-05 | Veritas Us Ip Holdings Llc | Creating and publishing service level representations of applications from operational representations |
US10056919B2 (en) | 2014-07-02 | 2018-08-21 | Agilepq, Inc. | Data recovery utilizing optimized code table signaling |
US9984110B2 (en) | 2014-08-21 | 2018-05-29 | Dropbox, Inc. | Multi-user search system with methodology for personalized search query autocomplete |
US9183303B1 (en) | 2015-01-30 | 2015-11-10 | Dropbox, Inc. | Personal content item searching system and method |
US9384226B1 (en) | 2015-01-30 | 2016-07-05 | Dropbox, Inc. | Personal content item searching system and method |
AU2017278253A1 (en) | 2016-06-06 | 2019-01-24 | Agilepq, Inc. | Data conversion systems and methods |
SG10201806847PA (en) * | 2018-08-13 | 2020-03-30 | Mastercard International Inc | Methods and systems for facilitating migration to centralized compliance content for integration with a plurality of digital applications |
EP4055498A4 (de) * | 2019-09-05 | 2024-05-15 | Open Lens Project Ltd. | System und verfahren zur verwaltung von digitalen medieninhalten |
CN117478427B (zh) * | 2023-12-26 | 2024-04-02 | 广东省能源集团贵州有限公司 | 网络安全数据处理方法及系统 |
Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US5128525A (en) * | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5168147A (en) * | 1990-07-31 | 1992-12-01 | Xerox Corporation | Binary image processing for decoding self-clocking glyph shape codes |
US5221833A (en) * | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) * | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5444779A (en) * | 1993-10-18 | 1995-08-22 | Xerox Corporation | Electronic copyright royalty accounting system using glyphs |
US5449896A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Random access techniques for use with self-clocking glyph codes |
US5449895A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Explicit synchronization for self-clocking glyph codes |
US5453605A (en) * | 1993-12-22 | 1995-09-26 | Xerox Corporation | Global addressability for self-clocking glyph codes |
US5521372A (en) * | 1993-12-22 | 1996-05-28 | Xerox Corporation | Framing codes for robust synchronization and addressing of self-clocking glyph codes |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US5576532A (en) * | 1995-01-03 | 1996-11-19 | Xerox Corporation | Interleaved and interlaced sync codes and address codes for self-clocking glyph codes |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5684885A (en) * | 1995-09-27 | 1997-11-04 | Xerox Corporation | Binary glyph codes based on color relationships |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5745569A (en) * | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US5864127A (en) * | 1996-10-10 | 1999-01-26 | Xerox Corporation | Analog glyph detector and detector arrays |
US6000613A (en) * | 1991-12-27 | 1999-12-14 | Xerox Corporation | Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values |
US6076738A (en) * | 1990-07-31 | 2000-06-20 | Xerox Corporation | Self-clocking glyph shape codes |
US6182901B1 (en) * | 1993-12-22 | 2001-02-06 | Xerox Corporation | Orientational disambiguation for self-clocking glyph codes |
US6208771B1 (en) * | 1996-12-20 | 2001-03-27 | Xerox Parc | Methods and apparatus for robust decoding of glyph address carpets |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US6253193B1 (en) * | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US6311214B1 (en) * | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US6345104B1 (en) * | 1994-03-17 | 2002-02-05 | Digimarc Corporation | Digital watermarks and methods for security documents |
US6544294B1 (en) * | 1999-05-27 | 2003-04-08 | Write Brothers, Inc. | Method and apparatus for creating, editing, and displaying works containing presentation metric components utilizing temporal relationships and structural tracks |
Family Cites Families (232)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2258112A5 (de) | 1973-11-30 | 1975-08-08 | Honeywell Bull Soc Ind | |
CH624877A5 (de) | 1977-05-13 | 1981-08-31 | Idc Chemie Ag | |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4159468A (en) | 1977-11-17 | 1979-06-26 | Burroughs Corporation | Communications line authentication device |
GB2022969B (en) | 1978-04-12 | 1982-06-09 | Data Recall Ltd | Video display control apparatus |
US4361851A (en) | 1980-01-04 | 1982-11-30 | Asip William F | System for remote monitoring and data transmission over non-dedicated telephone lines |
AU556499B2 (en) | 1981-05-22 | 1986-11-06 | Data General Corporation | Data processing system |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4429385A (en) | 1981-12-31 | 1984-01-31 | American Newspaper Publishers Association | Method and apparatus for digital serial scanning with hierarchical and relational access |
US4578531A (en) | 1982-06-09 | 1986-03-25 | At&T Bell Laboratories | Encryption system key distribution method and apparatus |
US4736422A (en) | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
US4658093A (en) | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4652990A (en) | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
US4740890A (en) | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4621321A (en) | 1984-02-16 | 1986-11-04 | Honeywell Inc. | Secure data processing system architecture |
LU86203A1 (fr) | 1985-12-11 | 1987-07-24 | Cen Centre Energie Nucleaire | Procede et appareil verifiant l'authenticite de documents lies a une personne et l'identite de leurs porteurs |
US5319710A (en) | 1986-08-22 | 1994-06-07 | Tandem Computers Incorporated | Method and means for combining and managing personal verification and message authentication encrytions for network transmission |
DE3782780T2 (de) | 1986-08-22 | 1993-06-09 | Nippon Electric Co | Schluesselverteilungsverfahren. |
US5014234A (en) | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
JPH087720B2 (ja) | 1986-09-16 | 1996-01-29 | 富士通株式会社 | 複数サービス用icカードの領域アクセス方法 |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5109413A (en) | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
EP0268139A3 (de) | 1986-11-05 | 1991-04-10 | International Business Machines Corporation | Behandlung von Ausführungsrechten mit Bezug auf einen Softwarekopierschutzmechanismus |
US4796220A (en) | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US5390297A (en) | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US4937863A (en) | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US4888638A (en) | 1988-10-11 | 1989-12-19 | A. C. Nielsen Company | System for substituting television programs transmitted via telephone lines |
US4953209A (en) | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US4956863A (en) | 1989-04-17 | 1990-09-11 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
US5129083A (en) | 1989-06-29 | 1992-07-07 | Digital Equipment Corporation | Conditional object creating system having different object pointers for accessing a set of data structure objects |
JP2870027B2 (ja) | 1989-07-31 | 1999-03-10 | 日本電気株式会社 | アイコンの複数選択による一括処理方式 |
US5138712A (en) | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
GB9004901D0 (en) | 1990-03-05 | 1990-05-02 | Space Communications Sat Tel L | Television scrambler |
EP0450841B1 (de) | 1990-03-29 | 1996-08-21 | Gte Laboratories Incorporated | Überwachungssystem für die Übertragung von Videosignalen |
US5174641A (en) | 1990-07-25 | 1992-12-29 | Massachusetts Institute Of Technology | Video encoding method for television applications |
US5058162A (en) | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
JPH05134957A (ja) | 1990-10-10 | 1993-06-01 | Fuji Xerox Co Ltd | データ管理システム |
JP3047116B2 (ja) | 1990-11-15 | 2000-05-29 | 喜也 丸本 | 情報配給方式 |
DE69228350T2 (de) | 1991-05-08 | 1999-09-23 | Digital Equipment Corp., Maynard | Verwaltungssschnittstelle und format für lizenzverwaltungssystem |
AU2247092A (en) | 1991-05-08 | 1992-12-21 | Digital Equipment Corporation | License management system |
WO1992022029A1 (en) * | 1991-05-24 | 1992-12-10 | British Technology Group Usa, Inc. | Optimizing compiler for computers |
US5204897A (en) * | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5260999A (en) | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5940504A (en) | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
JPH05100939A (ja) | 1991-07-31 | 1993-04-23 | Fuji Xerox Co Ltd | フアイルシステム |
US5142578A (en) | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
US5276444A (en) | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
US5557518A (en) | 1994-04-28 | 1996-09-17 | Citibank, N.A. | Trusted agents for open electronic commerce |
WO1993011480A1 (en) | 1991-11-27 | 1993-06-10 | Intergraph Corporation | System and method for network license administration |
JP3185806B2 (ja) | 1991-12-13 | 2001-07-11 | ソニー株式会社 | ハイビジョン信号の記録エンコード方法 |
DE69330946D1 (de) | 1992-01-08 | 2001-11-22 | Broadband Innovations Inc | Mehrkanal-fernsehsignal ver- und entschlüsselungssystem und -verfahren |
JP2659896B2 (ja) | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | 構造化文書複製管理方法及び構造化文書複製管理装置 |
US5412717A (en) | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5237611A (en) | 1992-07-23 | 1993-08-17 | Crest Industries, Inc. | Encryption/decryption apparatus with non-accessible table of keys |
US5287408A (en) | 1992-08-31 | 1994-02-15 | Autodesk, Inc. | Apparatus and method for serializing and validating copies of computer software |
US5293422A (en) | 1992-09-23 | 1994-03-08 | Dynatek, Inc. | Usage control system for computer software |
JP3358627B2 (ja) | 1992-10-16 | 2002-12-24 | ソニー株式会社 | 情報記録再生装置 |
US5414852A (en) | 1992-10-30 | 1995-05-09 | International Business Machines Corporation | Method for protecting data in a computer system |
GB9303595D0 (en) | 1993-02-23 | 1993-04-07 | Int Computers Ltd | Licence management mechanism for a computer system |
US5337357A (en) | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5386369A (en) | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
JPH0736768A (ja) | 1993-07-15 | 1995-02-07 | Matsushita Electric Ind Co Ltd | 電子ファイル装置 |
US6135646A (en) | 1993-10-22 | 2000-10-24 | Corporation For National Research Initiatives | System for uniquely and persistently identifying, managing, and tracking digital objects |
US5625690A (en) | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
US5495411A (en) | 1993-12-22 | 1996-02-27 | Ananda; Mohan | Secure software rental system using continuous asynchronous password verification |
US5504816A (en) | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5553143A (en) | 1994-02-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic licensing |
US5787172A (en) | 1994-02-24 | 1998-07-28 | The Merdan Group, Inc. | Apparatus and method for establishing a cryptographic link between elements of a system |
US5563946A (en) | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5799087A (en) | 1994-04-28 | 1998-08-25 | Citibank, N.A. | Electronic-monetary system |
US5636346A (en) | 1994-05-09 | 1997-06-03 | The Electronic Address, Inc. | Method and system for selectively targeting advertisements and programming |
US5564038A (en) | 1994-05-20 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period |
US5477263A (en) | 1994-05-26 | 1995-12-19 | Bell Atlantic Network Services, Inc. | Method and apparatus for video on demand with fast forward, reverse and channel pause |
US5694546A (en) | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
EP0690399A3 (de) | 1994-06-30 | 1997-05-02 | Tandem Computers Inc | System für fernbediente finanzielle Transaktionen |
US5535276A (en) | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5557678A (en) | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5838792A (en) | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
JPH0854951A (ja) | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | ソフトウェア使用量管理装置 |
US5737420A (en) | 1994-09-07 | 1998-04-07 | Mytec Technologies Inc. | Method for secure data transmission between remote stations |
US6189037B1 (en) | 1994-09-30 | 2001-02-13 | Intel Corporation | Broadband data interface |
US5640592A (en) * | 1994-09-30 | 1997-06-17 | Mitsubishi Kasei America, Inc. | System for transferring utility algorithm stored within a peripheral device to a host computer in a format compatible with the type of the host computer |
FI100137B (fi) | 1994-10-28 | 1997-09-30 | Vazvan Simin | Reaaliaikainen langaton telemaksujärjestelmä |
US5727065A (en) | 1994-11-14 | 1998-03-10 | Hughes Electronics | Deferred billing, broadcast, electronic document distribution system and method |
US6963859B2 (en) | 1994-11-23 | 2005-11-08 | Contentguard Holdings, Inc. | Content rendering repository |
JP4386898B2 (ja) | 1994-12-13 | 2009-12-16 | インターシア ソフトウェア エルエルシー | 暗号鍵システム |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
SE504085C2 (sv) | 1995-02-01 | 1996-11-04 | Greg Benson | Sätt och system för att hantera dataobjekt i enlighet med förutbestämda villkor för användare |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5632681A (en) | 1995-03-07 | 1997-05-27 | International Business Machines Corporation | Universal electronic video game renting/distributing system |
US6157719A (en) | 1995-04-03 | 2000-12-05 | Scientific-Atlanta, Inc. | Conditional access system |
US6246767B1 (en) | 1995-04-03 | 2001-06-12 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US6424717B1 (en) | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
JPH08286927A (ja) * | 1995-04-18 | 1996-11-01 | Hitachi Ltd | アセンブラ処理方式 |
US5717604A (en) | 1995-05-25 | 1998-02-10 | Wiggins; Christopher | Network monitoring system for tracking, billing and recovering licenses |
US5790677A (en) | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
FR2736783B1 (fr) | 1995-07-13 | 1997-08-14 | Thomson Multimedia Sa | Procede et appareil d'enregistrement et de lecture avec un support d'enregistrement de grande capacite |
US5764807A (en) | 1995-09-14 | 1998-06-09 | Primacomp, Inc. | Data compression using set partitioning in hierarchical trees |
KR0166923B1 (ko) | 1995-09-18 | 1999-03-20 | 구자홍 | 디지탈 방송 시스템의 불법 시청 및 복사 방지방법 및 장치 |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US6279112B1 (en) | 1996-10-29 | 2001-08-21 | Open Market, Inc. | Controlled transfer of information in computer networks |
US5825876A (en) | 1995-12-04 | 1998-10-20 | Northern Telecom | Time based availability to content of a storage medium |
US5708709A (en) | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
EP0880840A4 (de) | 1996-01-11 | 2002-10-23 | Mrj Inc | Vorrichtung zur steuerung des zugriffs und der verteilung von digitalem eigentum |
US5870475A (en) | 1996-01-19 | 1999-02-09 | Northern Telecom Limited | Facilitating secure communications in a distribution network |
US5848378A (en) | 1996-02-07 | 1998-12-08 | The International Weather Network | System for collecting and presenting real-time weather information on multiple media |
US5987134A (en) | 1996-02-23 | 1999-11-16 | Fuji Xerox Co., Ltd. | Device and method for authenticating user's access rights to resources |
AU1317597A (en) | 1996-03-18 | 1997-10-10 | News Datacom Limited | Smart card chaining in pay television systems |
US5673316A (en) | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
ES2150243T3 (es) | 1996-04-01 | 2000-11-16 | Macrovision Corp | Un metodo y un aparato para proporcionar una proteccion contra copias de material de señal transmitido a traves de redes de entrega digitales a un terminal descodificador de consumidor. |
US5751813A (en) | 1996-04-29 | 1998-05-12 | Motorola, Inc. | Use of an encryption server for encrypting messages |
US5850433A (en) | 1996-05-01 | 1998-12-15 | Sprint Communication Co. L.P. | System and method for providing an on-line directory service |
WO1997043761A2 (en) | 1996-05-15 | 1997-11-20 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
US5812398A (en) * | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites |
JP2810033B2 (ja) | 1996-07-08 | 1998-10-15 | 村越 弘昌 | 稼働管理システム及び稼働管理方法 |
US5850443A (en) | 1996-08-15 | 1998-12-15 | Entrust Technologies, Ltd. | Key management system for mixed-trust environments |
FR2752655B1 (fr) | 1996-08-20 | 1998-09-18 | France Telecom | Procede et equipement pour affecter a un programme de television deja en acces conditionnel un acces conditionnel complementaire |
GB2316503B (en) | 1996-08-22 | 2000-11-15 | Icl Personal Systems Oy | Software licence management |
US5812664A (en) | 1996-09-06 | 1998-09-22 | Pitney Bowes Inc. | Key distribution system |
US5850444A (en) | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US6052780A (en) | 1996-09-12 | 2000-04-18 | Open Security Solutions, Llc | Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information |
US5825879A (en) | 1996-09-30 | 1998-10-20 | Intel Corporation | System and method for copy-protecting distributed video content |
US6006332A (en) | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
JPH10133955A (ja) | 1996-10-29 | 1998-05-22 | Matsushita Electric Ind Co Ltd | 可搬型メディア駆動装置とその方法、及び可搬型メディアとネットワークの連携装置とその方法 |
US6108372A (en) | 1996-10-30 | 2000-08-22 | Qualcomm Inc. | Method and apparatus for decoding variable rate data using hypothesis testing to determine data rate |
CN1482542A (zh) | 1997-01-27 | 2004-03-17 | �ʼҷ����ֵ�������˾ | 传递内容信息和与其相关的附加信息的方法和系统 |
GB9703193D0 (en) | 1997-02-15 | 1997-04-02 | Philips Electronics Nv | Television |
US7062500B1 (en) * | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
BR9714601A (pt) | 1997-03-21 | 2002-09-10 | Canal Plus Sa | Sistema de difusão e recepção e sistema de acesso condicional para o mesmo |
US6108420A (en) | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
WO1998051036A1 (en) | 1997-05-07 | 1998-11-12 | Neomedia Technologies, Inc. | Scanner enhanced remote control unit and system for automatically linking to on-line resources |
JP3613929B2 (ja) | 1997-05-07 | 2005-01-26 | 富士ゼロックス株式会社 | アクセス資格認証装置および方法 |
US6112239A (en) | 1997-06-18 | 2000-08-29 | Intervu, Inc | System and method for server-side optimization of data delivery on a distributed computer network |
GB9714227D0 (en) | 1997-07-04 | 1997-09-10 | British Telecomm | A method of scheduling calls |
JP3613936B2 (ja) | 1997-07-07 | 2005-01-26 | 富士ゼロックス株式会社 | アクセス資格認証装置 |
JPH1131130A (ja) | 1997-07-10 | 1999-02-02 | Fuji Xerox Co Ltd | サービス提供装置 |
JP3641909B2 (ja) | 1997-07-14 | 2005-04-27 | 富士ゼロックス株式会社 | 証明データ生成装置 |
US6584565B1 (en) | 1997-07-15 | 2003-06-24 | Hewlett-Packard Development Company, L.P. | Method and apparatus for long term verification of digital signatures |
JP2003521820A (ja) | 1997-08-01 | 2003-07-15 | サイエンティフィック−アトランタ, インコーポレイテッド | 条件付きアクセスシステム |
JP2001512842A (ja) | 1997-08-01 | 2001-08-28 | サイエンティフィック−アトランタ・インコーポレーテッド | 条件付きアクセスシステムにおいて使用される暗号化装置 |
EA002737B1 (ru) | 1997-08-05 | 2002-08-29 | Эникс Корпорейшн | Система идентификации отпечатков пальцев |
JP3671611B2 (ja) | 1997-08-05 | 2005-07-13 | 富士ゼロックス株式会社 | アクセス資格認証装置および方法 |
JP3622433B2 (ja) | 1997-08-05 | 2005-02-23 | 富士ゼロックス株式会社 | アクセス資格認証装置および方法 |
US6091777A (en) | 1997-09-18 | 2000-07-18 | Cubic Video Technologies, Inc. | Continuously adaptive digital video compression system and method for a web streamer |
IL121862A (en) | 1997-09-29 | 2005-07-25 | Nds Ltd West Drayton | Distributed ird system for pay television systems |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6044466A (en) | 1997-11-25 | 2000-03-28 | International Business Machines Corp. | Flexible and dynamic derivation of permissions |
US6141754A (en) | 1997-11-28 | 2000-10-31 | International Business Machines Corporation | Integrated method and system for controlling information access and distribution |
US6084969A (en) | 1997-12-31 | 2000-07-04 | V-One Corporation | Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network |
US6304658B1 (en) | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
JPH11205306A (ja) | 1998-01-16 | 1999-07-30 | Fuji Xerox Co Ltd | 認証装置および認証方法 |
JP3791169B2 (ja) | 1998-01-29 | 2006-06-28 | 富士ゼロックス株式会社 | 認証装置および方法 |
JP4113274B2 (ja) | 1998-02-05 | 2008-07-09 | 富士ゼロックス株式会社 | 認証装置および方法 |
EP0934765A1 (de) | 1998-02-09 | 1999-08-11 | CANAL+ Société Anonyme | Interaktives Spielsystem |
JP3867388B2 (ja) | 1998-02-12 | 2007-01-10 | 富士ゼロックス株式会社 | 条件付き認証装置および方法 |
CA2323781C (en) | 1998-03-16 | 2004-06-01 | Intertrust Technologies Corporation | Methods and apparatus for continuous control and protection of media content |
US6189146B1 (en) | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US7188358B1 (en) | 1998-03-26 | 2007-03-06 | Nippon Telegraph And Telephone Corporation | Email access control scheme for communication network using identification concealment mechanism |
US6282653B1 (en) | 1998-05-15 | 2001-08-28 | International Business Machines Corporation | Royalty collection method and system for use of copyrighted digital materials on the internet |
FI107984B (fi) | 1998-05-20 | 2001-10-31 | Nokia Networks Oy | Palvelun luvattoman käytön estäminen |
US6216112B1 (en) | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
JP3125746B2 (ja) * | 1998-05-27 | 2001-01-22 | 日本電気株式会社 | 人物像対話装置及び人物像対話プログラムを記録した記録媒体 |
US6219652B1 (en) | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
EP0964572A1 (de) | 1998-06-08 | 1999-12-15 | CANAL+ Société Anonyme | Decoder und Sicherheitsmodul für digitales Übertragungssystem |
US6169976B1 (en) | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6865675B1 (en) | 1998-07-14 | 2005-03-08 | Koninklijke Philips Electronics N.V. | Method and apparatus for use of a watermark and a unique time dependent reference for the purpose of copy protection |
US6275531B1 (en) | 1998-07-23 | 2001-08-14 | Optivision, Inc. | Scalable video coding method and apparatus |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
AU5781599A (en) | 1998-08-23 | 2000-03-14 | Open Entertainment, Inc. | Transaction system for transporting media files from content provider sources tohome entertainment devices |
US6397333B1 (en) | 1998-10-07 | 2002-05-28 | Infineon Technologies Ag | Copy protection system and method |
SG87837A1 (en) * | 1998-10-08 | 2002-04-16 | Sony Computer Entertainment Inc | Portable toy, portable information terminal, intertainment system, and recording medium |
US6327652B1 (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
JP2000215165A (ja) | 1999-01-26 | 2000-08-04 | Nippon Telegr & Teleph Corp <Ntt> | 情報アクセス制御方法および装置と情報アクセス制御プログラムを記録した記録媒体 |
EP1026898A1 (de) | 1999-02-04 | 2000-08-09 | CANAL+ Société Anonyme | Verfahren und Vorrichtung zur verschlüsselten Übertragung |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US6973444B1 (en) | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US7024393B1 (en) * | 1999-03-27 | 2006-04-04 | Microsoft Corporation | Structural of digital rights management (DRM) system |
CA2368377C (en) | 1999-04-07 | 2007-05-22 | Swisscom Mobile Ag | Method and system for ordering, loading and using access tickets |
US6920567B1 (en) * | 1999-04-07 | 2005-07-19 | Viatech Technologies Inc. | System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files |
WO2000062189A2 (en) * | 1999-04-12 | 2000-10-19 | Reciprocal, Inc. | System and method for data rights management |
US6453305B1 (en) | 1999-05-21 | 2002-09-17 | Compaq Computer Corporation | Method and system for enforcing licenses on an open network |
US6536037B1 (en) * | 1999-05-27 | 2003-03-18 | Accenture Llp | Identification of redundancies and omissions among components of a web based architecture |
AU4661700A (en) | 1999-06-01 | 2000-12-18 | Cacheflow, Inc. | Content delivery system |
WO2001003044A1 (en) | 1999-07-06 | 2001-01-11 | Transcast International, Inc. | Enabling viewers of television systems to participate in auctions |
FR2796183B1 (fr) | 1999-07-07 | 2001-09-28 | A S K | Ticket d'acces sans contact et son procede de fabrication |
US6796555B1 (en) | 1999-07-19 | 2004-09-28 | Lucent Technologies Inc. | Centralized video controller for controlling distribution of video signals |
US20020056118A1 (en) | 1999-08-27 | 2002-05-09 | Hunter Charles Eric | Video and music distribution system |
US6289455B1 (en) | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
GB2354102B (en) | 1999-09-08 | 2004-01-14 | Barron Mccann Ltd | Security system |
US6401211B1 (en) | 1999-10-19 | 2002-06-04 | Microsoft Corporation | System and method of user logon in combination with user authentication for network access |
JP2001142720A (ja) * | 1999-11-12 | 2001-05-25 | Ricoh Co Ltd | コンピュータシステム |
US6246797B1 (en) | 1999-11-12 | 2001-06-12 | Picsurf, Inc. | Picture and video storage management system and method |
DE19956359A1 (de) | 1999-11-24 | 2001-05-31 | Alcatel Sa | Kartenbuchung mittels einer virtuellen Eintrittskarte |
US6384829B1 (en) * | 1999-11-24 | 2002-05-07 | Fuji Xerox Co., Ltd. | Streamlined architecture for embodied conversational characters with reduced message traffic |
US6738901B1 (en) | 1999-12-15 | 2004-05-18 | 3M Innovative Properties Company | Smart card controlled internet access |
US6996720B1 (en) * | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
KR100544177B1 (ko) * | 2000-01-18 | 2006-01-23 | 삼성전자주식회사 | 컴퓨터를 통한 디지털 컨텐츠의 저장 및 재생 기능을구비한 개인 휴대 장치의 제어방법 및 이에 따른 개인휴대장치의 동작방법 |
JP2001209820A (ja) * | 2000-01-25 | 2001-08-03 | Nec Corp | 感情表出装置及びプログラムを記録した機械読み取り可能な記録媒体 |
JP2001294557A (ja) * | 2000-02-10 | 2001-10-23 | Nippon Shokubai Co Ltd | α,β−不飽和カルボン酸エステル類の製法及び該製法に用いる触媒 |
CN100527141C (zh) | 2000-06-02 | 2009-08-12 | 松下电器产业株式会社 | 记录及回放装置和方法 |
US7228427B2 (en) * | 2000-06-16 | 2007-06-05 | Entriq Inc. | Method and system to securely distribute content via a network |
US7017189B1 (en) * | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7225231B2 (en) | 2000-09-20 | 2007-05-29 | Visto Corporation | System and method for transmitting workspace elements across a network |
US6922670B2 (en) * | 2000-10-24 | 2005-07-26 | Sanyo Electric Co., Ltd. | User support apparatus and system using agents |
US7209893B2 (en) * | 2000-11-30 | 2007-04-24 | Nokia Corporation | Method of and a system for distributing electronic content |
US20020077984A1 (en) | 2000-12-19 | 2002-06-20 | Mark Ireton | Enabling protected digital media to be shared between playback devices |
US6912294B2 (en) * | 2000-12-29 | 2005-06-28 | Contentguard Holdings, Inc. | Multi-stage watermarking process and system |
US20020099545A1 (en) * | 2001-01-24 | 2002-07-25 | Levitt Benjamin J. | System, method and computer program product for damage control during large-scale address speech recognition |
US6575376B2 (en) * | 2001-02-16 | 2003-06-10 | Sybase, Inc. | System with improved methodology for providing international address validation |
US7580988B2 (en) * | 2001-04-05 | 2009-08-25 | Intertrust Technologies Corporation | System and methods for managing the distribution of electronic content |
US20020157002A1 (en) * | 2001-04-18 | 2002-10-24 | Messerges Thomas S. | System and method for secure and convenient management of digital electronic content |
US8001053B2 (en) | 2001-05-31 | 2011-08-16 | Contentguard Holdings, Inc. | System and method for rights offering and granting using shared state variables |
US7774280B2 (en) | 2001-06-07 | 2010-08-10 | Contentguard Holdings, Inc. | System and method for managing transfer of rights using shared state variables |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US20030023427A1 (en) * | 2001-07-26 | 2003-01-30 | Lionel Cassin | Devices, methods and a system for implementing a media content delivery and playback scheme |
WO2003014971A2 (en) | 2001-08-10 | 2003-02-20 | Cellectivity Limited | Web interaction system which enables a mobile telephone to interact with web resources |
US20030046274A1 (en) * | 2001-08-30 | 2003-03-06 | Erickson John S. | Software media container |
US7840488B2 (en) * | 2001-11-20 | 2010-11-23 | Contentguard Holdings, Inc. | System and method for granting access to an item or permission to use an item based on configurable conditions |
WO2003044680A1 (en) * | 2001-11-20 | 2003-05-30 | Contentguard Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
US7974923B2 (en) * | 2001-11-20 | 2011-07-05 | Contentguard Holdings, Inc. | Extensible rights expression processing system |
JP4477822B2 (ja) * | 2001-11-30 | 2010-06-09 | パナソニック株式会社 | 情報変換装置 |
US20030126086A1 (en) * | 2001-12-31 | 2003-07-03 | General Instrument Corporation | Methods and apparatus for digital rights management |
US20030158958A1 (en) * | 2002-02-20 | 2003-08-21 | Koninklijke Philips Electronics N.V. | Distributed storage network architecture using user devices |
KR100703521B1 (ko) * | 2002-03-14 | 2007-04-03 | 콘텐트가드 홀딩즈 인코포레이티드 | 사용권리 표현을 처리하기 위한 방법 및 장치 |
WO2004034223A2 (en) | 2002-10-09 | 2004-04-22 | Legal Igaming, Inc. | System and method for connecting gaming devices to a network for remote play |
FR2854870B1 (fr) | 2003-05-16 | 2006-03-24 | S2F Flexico | Procede et dispositif perfectionnes d'emballage, sachets obtenus et leur application |
JP5168039B2 (ja) | 2008-09-12 | 2013-03-21 | 王子ホールディングス株式会社 | 感熱記録体 |
-
2003
- 2003-03-14 KR KR1020047014487A patent/KR100703521B1/ko active IP Right Grant
- 2003-03-14 CN CNA038107198A patent/CN1653462A/zh active Pending
- 2003-03-14 US US10/388,226 patent/US7359884B2/en not_active Expired - Lifetime
- 2003-03-14 WO PCT/US2003/007847 patent/WO2003079269A1/en active Application Filing
- 2003-03-14 JP JP2003576008A patent/JP2005532610A/ja active Pending
- 2003-03-14 EP EP03744684A patent/EP1490819A4/de not_active Withdrawn
- 2003-03-14 WO PCT/US2003/007849 patent/WO2003079270A1/en active Application Filing
- 2003-03-14 US US10/388,167 patent/US20040015426A1/en not_active Abandoned
- 2003-03-14 CN CN2013100202494A patent/CN103150492A/zh active Pending
- 2003-03-14 BR BR0308409-4A patent/BR0308409A/pt not_active Application Discontinuation
- 2003-03-14 AU AU2003230651A patent/AU2003230651A1/en not_active Abandoned
- 2003-03-14 AU AU2003221995A patent/AU2003221995A1/en not_active Abandoned
- 2003-03-14 KR KR10-2004-7014492A patent/KR20040101312A/ko not_active Application Discontinuation
- 2003-03-14 US US10/388,217 patent/US20030233169A1/en not_active Abandoned
- 2003-03-14 US US10/388,171 patent/US20030225700A1/en not_active Abandoned
- 2003-03-14 AU AU2003225804A patent/AU2003225804A1/en not_active Abandoned
- 2003-03-14 EP EP03723739A patent/EP1483717A4/de not_active Withdrawn
- 2003-03-14 JP JP2003577196A patent/JP4290565B2/ja not_active Expired - Fee Related
- 2003-03-14 EP EP03716567A patent/EP1483715A4/de not_active Ceased
- 2003-03-14 KR KR1020047014430A patent/KR100960502B1/ko active IP Right Grant
- 2003-03-14 CN CN038108852A patent/CN1653463B/zh not_active Expired - Lifetime
- 2003-03-14 WO PCT/US2003/007936 patent/WO2003077955A1/en not_active Application Discontinuation
- 2003-03-14 WO PCT/US2003/007848 patent/WO2003079156A2/en not_active Application Discontinuation
- 2003-03-14 AU AU2003220269A patent/AU2003220269A1/en not_active Abandoned
- 2003-03-14 JP JP2003577197A patent/JP4740543B2/ja not_active Expired - Lifetime
- 2003-03-14 US US10/388,162 patent/US8108313B2/en active Active
- 2003-03-14 EP EP03717978A patent/EP1488302A4/de not_active Withdrawn
- 2003-03-14 CN CNA038110571A patent/CN1653465A/zh active Pending
-
2008
- 2008-09-04 US US12/204,393 patent/US9626668B2/en active Active
-
2011
- 2011-03-09 JP JP2011051399A patent/JP2011150717A/ja active Pending
-
2013
- 2013-05-08 JP JP2013098415A patent/JP2013157031A/ja active Pending
Patent Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5128525A (en) * | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5168147A (en) * | 1990-07-31 | 1992-12-01 | Xerox Corporation | Binary image processing for decoding self-clocking glyph shape codes |
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US6076738A (en) * | 1990-07-31 | 2000-06-20 | Xerox Corporation | Self-clocking glyph shape codes |
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US6000613A (en) * | 1991-12-27 | 1999-12-14 | Xerox Corporation | Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values |
US5221833A (en) * | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) * | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
US5444779A (en) * | 1993-10-18 | 1995-08-22 | Xerox Corporation | Electronic copyright royalty accounting system using glyphs |
US5449896A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Random access techniques for use with self-clocking glyph codes |
US5521372A (en) * | 1993-12-22 | 1996-05-28 | Xerox Corporation | Framing codes for robust synchronization and addressing of self-clocking glyph codes |
US6182901B1 (en) * | 1993-12-22 | 2001-02-06 | Xerox Corporation | Orientational disambiguation for self-clocking glyph codes |
US5449895A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Explicit synchronization for self-clocking glyph codes |
US5453605A (en) * | 1993-12-22 | 1995-09-26 | Xerox Corporation | Global addressability for self-clocking glyph codes |
US6345104B1 (en) * | 1994-03-17 | 2002-02-05 | Digimarc Corporation | Digital watermarks and methods for security documents |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5576532A (en) * | 1995-01-03 | 1996-11-19 | Xerox Corporation | Interleaved and interlaced sync codes and address codes for self-clocking glyph codes |
US6253193B1 (en) * | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US6311214B1 (en) * | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US5684885A (en) * | 1995-09-27 | 1997-11-04 | Xerox Corporation | Binary glyph codes based on color relationships |
US5745569A (en) * | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US5864127A (en) * | 1996-10-10 | 1999-01-26 | Xerox Corporation | Analog glyph detector and detector arrays |
US6208771B1 (en) * | 1996-12-20 | 2001-03-27 | Xerox Parc | Methods and apparatus for robust decoding of glyph address carpets |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
US6544294B1 (en) * | 1999-05-27 | 2003-04-08 | Write Brothers, Inc. | Method and apparatus for creating, editing, and displaying works containing presentation metric components utilizing temporal relationships and structural tracks |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7290031B2 (en) * | 2002-05-10 | 2007-10-30 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program |
US20030210429A1 (en) * | 2002-05-10 | 2003-11-13 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program |
US10257243B2 (en) * | 2003-10-16 | 2019-04-09 | Gula Consulting Limited Liability Company | Electronic media distribution system |
US20170310725A1 (en) * | 2003-10-16 | 2017-10-26 | Gula Consulting Limited Liability Company | Electronic media distribution system |
US20060069646A1 (en) * | 2004-09-28 | 2006-03-30 | Yoshinori Matsumoto | Method of controlling a terminal device |
US7860801B2 (en) * | 2005-07-05 | 2010-12-28 | Xerox Corporation | Tools for accessing digital works |
US20070011094A1 (en) * | 2005-07-05 | 2007-01-11 | Xerox Corporation | Tools for accessing digital works |
US20070177188A1 (en) * | 2006-01-27 | 2007-08-02 | Sbc Knowledge Ventures, L.P. | Methods and systems to process an image |
US8661348B2 (en) * | 2006-01-27 | 2014-02-25 | At&T Intellectual Property I, L.P. | Methods and systems to process an image |
EP1855225A1 (de) * | 2006-05-09 | 2007-11-14 | Ricoh Company, Ltd. | Computergerät |
US7850084B2 (en) | 2006-05-09 | 2010-12-14 | Ricoh Company, Ltd. | Computer apparatus |
US20070284437A1 (en) * | 2006-05-09 | 2007-12-13 | Kensaku Yamamoto | Computer apparatus |
US20080301003A1 (en) * | 2007-05-31 | 2008-12-04 | Daniel Harkabi | System for Online Buying |
US20090138109A1 (en) * | 2007-11-06 | 2009-05-28 | Lg Electronics Inc. | Apparatus providing function to delete files and method for deleting files thereof |
US8532978B1 (en) * | 2008-10-31 | 2013-09-10 | Afrl/Rij | Natural language interface, compiler and de-compiler for security policies |
US8819290B2 (en) | 2009-10-23 | 2014-08-26 | Zte Corporation | Method and system for transmitting compressed rights |
US20150379512A1 (en) * | 2013-02-22 | 2015-12-31 | Op-Palvelut Oy | Communication during payment procedure |
US9589124B2 (en) | 2014-05-29 | 2017-03-07 | Comcast Cable Communications, Llc | Steganographic access controls |
US10467399B2 (en) | 2014-05-29 | 2019-11-05 | Comcast Cable Communications, Llc | Steganographic access controls |
US11372960B2 (en) | 2014-05-29 | 2022-06-28 | Comcast Cable Communications, Llc | Steganographic access controls |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030225700A1 (en) | System and method for graphical rights expressions | |
JP4800553B2 (ja) | 印刷対象物と関連した適用業務の為の認証用ウォータマーク | |
EP1312030B1 (de) | Authentifizierungswasserzeichen für verpackte produkte | |
US7770013B2 (en) | Digital authentication with digital and analog documents | |
JP3803378B2 (ja) | 機密文書の安全な複製方法 | |
EP1078312B1 (de) | Gerät zur erzeugung und gerät zum lesen eines digitalen wasserzeichens sowie methode zur erzeugung und zum lesen eines digitalen wasserzeichens | |
EP1075757B1 (de) | Digitale authentisierung mit analogen dokumenten | |
US6233684B1 (en) | System for controlling the distribution and use of rendered digital works through watermaking | |
AU2001277147A1 (en) | Authentication watermarks for printed objects and related applications | |
JP2002504272A5 (de) | ||
Kwok et al. | Intellectual property protection for electronic commerce applications. | |
US6674859B1 (en) | Device and method for the protected output of electronically transmitted and stored documents | |
Halyal | Digital Libraries and Copyright Issues | |
Garofalakis et al. | Digital robbery; authors are not unprotected | |
Shaw | JISC Technology Applications Programme (JTAP)—Overview of Watermarks, Fingerprints, and Digital Signatures | |
JP2005535959A (ja) | 購入者にとっての潜在的な価値がある情報を含むデジタルコンテンツ及びそれを作成する方法 | |
Kim et al. | Technologies for online issuing service of documents | |
Mishra | Deterring Text Document Piracy with Text Watermarking | |
JP2005535960A (ja) | 購入者にとっての潜在的な価値がある情報を含むデジタルコンテンツ及びそれを作成する方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CONTENTGUARD-HOLDINGS, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LAO, GUILLERMO;TADAYON, BIJAN;HAM, MANUEL;AND OTHERS;REEL/FRAME:014295/0875;SIGNING DATES FROM 20030602 TO 20030609 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |