US20030225700A1 - System and method for graphical rights expressions - Google Patents

System and method for graphical rights expressions Download PDF

Info

Publication number
US20030225700A1
US20030225700A1 US10/388,171 US38817103A US2003225700A1 US 20030225700 A1 US20030225700 A1 US 20030225700A1 US 38817103 A US38817103 A US 38817103A US 2003225700 A1 US2003225700 A1 US 2003225700A1
Authority
US
United States
Prior art keywords
recited
rights expression
graphical representation
expression information
glyph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/388,171
Other languages
English (en)
Inventor
Guillermo Lao
Bijan Tadayon
Manuel Ham
Charles Gilliam
Michael Raley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Contentguard Holdings Inc
Original Assignee
Contentguard Holdings Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=28041836&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20030225700(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Contentguard Holdings Inc filed Critical Contentguard Holdings Inc
Priority to US10/388,171 priority Critical patent/US20030225700A1/en
Assigned to CONTENTGUARD-HOLDINGS, INC. reassignment CONTENTGUARD-HOLDINGS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RALEY, MICHAEL, HAM, MANUEL, LAO, GUILLERMO, TADAYON, BIJAN, GILLIAM, CHARLES P.
Publication of US20030225700A1 publication Critical patent/US20030225700A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1073Conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • H04N21/83555Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed using a structured language for describing usage rules of the content, e.g. REL

Definitions

  • This invention generally relates to controlling use of content, or other items, through usage rights associated with the content or other items, and more particularly to a system and method for expressing usage rights for content or other items based symbolic representations, such as graphical representations, modulated signal representations, and the like.
  • DRM Digital Rights Management
  • U.S. Pat. No. 5,634,012 discloses a DRM system for controlling the distribution of digital content, wherein devices of the DRM system can include a repository associated therewith.
  • a predetermined set of usage transaction steps define a protocol used by the repositories for enforcing usage rights associated with the content.
  • Usage rights persist with the content and the usage rights associated with the content comprise a digital work.
  • the usage rights can permit various manners of use of the content, such as a right to view or print or display the content, a right to use the content only once, a right to distribute or redistribute the content, and the like. Such usage rights can be made contingent on payment or other conditions.
  • the invention is a method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression.
  • the method comprises specifying rights expression information indicating a manner of use of an item and generating a graphical representation of the rights expression information.
  • the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
  • a system for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression comprises means for specifying rights expression information indicating a manner of use of an item and means for generating a graphical representation of the rights expression information.
  • the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
  • a rights expression comprising rights expression information indicating a manner of use of an item and a graphical representation of said rights expression information.
  • the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
  • FIG. 1 is a schematic illustration of an exemplary Digital Rights Management system on which various embodiments of the present invention can be implemented;
  • FIG. 2 illustrates a set of 8 symbols, derived from a circle, that can be used for expressing rights expressions
  • FIG. 3 illustrates a set of 4 symbols, derived from a rectangle, that can be used for expressing rights expressions
  • FIGS. 4 - 6 illustrate sets of 8 symbols, derived from circular structures, that can be used for expressing rights expressions
  • FIGS. 7 - 8 illustrate sets of 8 symbols, derived from the 4 sides and 2 diagonals of square structures, that can be used for expressing rights expressions;
  • FIG. 9 illustrates a set of 4 symbols, derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
  • FIG. 10 illustrates a set of 4 symbols, derived from the 4 corners of a square structure, that can be used for expressing rights expressions
  • FIG. 11 illustrates a set of 8 symbols, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
  • FIG. 12 illustrates a set of 8 symbols, derived from a circular structure, that can be used for expressing rights expressions
  • FIG. 13 illustrates a set of 5 symbols, using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions;
  • FIG. 14 illustrates a set of 4 symbols, derived from a circular structure, that can be used for expressing rights expressions
  • FIG. 15 illustrates a set of 12 symbols, derived from a star shape structure, in three different colors, Red (R), Green (G), and Blue (B), that can be used for expressing rights expressions;
  • FIG. 16 illustrates an exemplary embodiment for combining the symbols shown in FIG. 15;
  • FIG. 17 illustrates an exemplary message, read from left to right, for expressing rights expressions using the 4 symbols of the set shown in FIG. 10;
  • FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set shown in FIG. 15;
  • FIGS. 19 - 20 illustrate exemplary rights expressions for performing an action using the symbols of the set shown in FIG. 15;
  • FIG. 21 illustrates an exemplary rights expression for the right to print 100 copies of 2 e-books with identification numbers 443 and 12 using the symbols of the set shown in FIG. 15;
  • FIG. 22 illustrates an exemplary rights expression for the right to listen to music, such as playing or rendering the music, for 100 minutes for 2 pieces of music with identification numbers 443 and 13 using the symbols of the set shown in FIG. 15;
  • FIG. 23 illustrates an exemplary rights expression for an e-book data record for an e-book with identification number 143 , whose owner has an IDENTIFICATION number 212 , using the symbols of the set shown in FIG. 15;
  • FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, or industries, and can be custom-made for each application or industry using the symbols of the set shown in FIG. 15;
  • FIGS. 25 - 26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
  • U.S. Pat. No. 6,208,771 teaches method and apparatus for robust decoding of glyph address carpets
  • No. 6,076,738 teaches self-clocking glyph shape codes
  • No. 5,684,885 teaches binary glyph codes based on color relationships
  • No. 5,864,127 teaches analog glyph detector and detector arrays
  • No. 5,576,532 teaches interleaved and interlaced sync codes and address codes for self-clocking glyph codes
  • No. 6,000,613 teaches self-clocking glyph code having composite glyphs for distributive encoding of multi-bit digital values
  • No. 6,182,901 teaches orientational disambiguation for self-clocking glyph codes, No.
  • 5,128,525 teaches convolution filtering for decoding self-clocking glyph shape codes
  • No. 5,168,147 teaches binary image processing for decoding self-clocking glyph shape codes
  • No. 5,091,966 teaches adaptively scaling for decoding spatially periodic self-clocking glyph shape codes.
  • the exemplary embodiments described herein advantageously, leverage symbolic representations with rights expressions to express rights information related to items, such as digital content, services, abstract objects, resources, goods, and the like.
  • the symbolic representations can be used to convey information, such as rights expression information, information about a grammar or language dealing with usage rights, information about access to information, and the like.
  • the use of a rights expression for example, in the form of a license, and the like, can be used to define usage rights for specifying a permitted manner of use of an item, such as access to digital content, and the like.
  • usage rights can be associated with one or more conditions, such as payment, and the like, that can be a prerequisite for exercising the specified manner of use of the item.
  • a rights expression language such as eXtensible Rights Markup Language (XrML), and the like, for example, including predefined syntax and semantics, can be employed to express the usage rights.
  • XrML eXtensible Rights Markup Language
  • rights expression information corresponding to usage rights associated with content can be expressed via a graphical representation of the rights expression information.
  • the graphical representation can include glyphs, machine and human-readable symbols, and other types of symbols to express the rights expression information.
  • the rights expression information can be expressed via a modulated signal, such as modulated light and sound signals, and the like.
  • the exemplary embodiments combine symbolic representations with rights expressions for conveying information about usage rights, conditions, access related to digital content, services, abstract objects, items, resources, and the like, in a flexible and robust manner.
  • the DRM system 100 includes a user activation component in the form of an activation server 110 that issues a set of public and private key pairs 112 to a content user in a protected fashion.
  • the user installs software that, for example, works with, or includes, a rendering application for a particular content format.
  • the software is installed in a client environment 120 , for example, such as a computing device associated with the user.
  • the software can be part of the DRM system 100 and can be used to access protected content 134 .
  • the software can be activated.
  • some information is exchanged between the activation server 110 and the client environment 120 .
  • a client software component 122 can be downloaded and installed in the client environment 120 .
  • the client software component 122 can be tamper resistant and can include the set of public and private key pairs 112 issued by the activation server 110 , as well as other components.
  • a rights offer 132 can be associated with the protected content 134 and can specify usage rights 132 A that are available to an end-user, for example, when one or more corresponding conditions 132 B are satisfied.
  • a license server 140 manages the encryption keys 112 and issues a license 142 for the protected content 134 .
  • the license 142 can embody the actual granting of the usage rights 132 A to the end user.
  • the rights offer 132 may grant the end user the right to view the protected content 134 on the condition of payment of a fee of five dollars, and the right to print the protected content on the condition of payment of a fee of ten dollars.
  • the license 142 can be issued for the view right when the five dollar fee has been paid and/or for the print right when 10 dollar fee has been paid.
  • the client component 122 interprets and enforces the rights that have been specified in the license 142 .
  • Clear content 136 such as unprotected content, and the like, can be prepared, for example, with an application 138 , such as a document preparation application, installed on a computer 130 associated with a content publisher, a content distributor, a content service provider, or any other suitable party.
  • Preparation of the clear content 136 can include specifying the usage rights 132 A and the conditions 132 B under which the clear content 136 can be used, associating the rights offer 132 with the clear content 136 , and protecting the clear content 136 with, for example, a cryptography algorithm to generate the protected content 134 .
  • a rights language such as XrML, eXtensible Access Control Markup Language (XACML), Open Digital Rights Language (ODRL), and the like, can be used to specify the rights offer 132 .
  • the rights offer 132 can be specified in any suitable manner.
  • the phrase “specifying rights information”, as used herein, refers to creating, deriving, or other wise utilizing information that relates to rights expressions.
  • the rights offer 132 can be in the form of a pre-defined specification, profile, template, and the like, that can be associated with the protected content 134 . Accordingly, the process of specifying the rights offer 132 can include any suitable process for associating rights, conditions, and the like, with content.
  • the rights offer 132 associated with the protected content 134 and the encryption key 112 used to encrypt the clear content 136 can be transmitted to the license server 140 .
  • a typical workflow for the DRM system 100 can include a user operating within the client environment 120 being activated for receiving the protected content 134 by the activation server 110 .
  • the activation process results in the public and private key pair 112 , and, for example, some user and/or machine-specific information, and the like, being downloaded to the client environment 120 in the form of the client software component 122 .
  • the activation process can be accomplished, for example, at any suitable time prior to the issuing of the license 142 .
  • the user When the user wishes to use the protected content 134 , the user makes a request for the protected content 134 .
  • the user might browse a Web site running on a Web server 150 , using a browser installed in the client environment 120 , and attempt to download the protected content 134 .
  • the user may go through a series of steps possibly including a fee transaction, such as in the sale of content, other transactions, such as collection of information, and the like.
  • the Web server 150 contacts the license server 140 , for example, through a secure communications channel, such as a channel using a Secure Sockets Layer (SSL).
  • SSL Secure Sockets Layer
  • the license server 140 then generates the license 142 for the protected content 134 and the Web server 150 downloads both the protected content 134 and the license 142 .
  • the license 142 can include the appropriate usage rights of the usage rights 132 A and can be downloaded from the license server 140 or an associated device.
  • the protected content 134 can be downloaded from the computer 130 associated with a publisher, distributor, or other party.
  • the rights offer 132 can be persistent and remain associated with the protected content 134 .
  • the client software component 122 in the client environment 120 can then proceed to interpret the license 142 and allow use of the protected content 134 based on the rights 132 A and the conditions 132 B specified in the license 142 .
  • the interpretation and enforcement of the usage rights are further described in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,629,980, No. 5,634,012, No. 5,638,443, No. 5,715,403, No. 6,233,684, and No. 6,236,971.
  • the above steps can take place sequentially, approximately simultaneously, in various orders, and the like.
  • the DRM system 100 addresses security aspects of protecting the protected content 134 .
  • the DRM system 100 can authenticate the license 142 that has been issued by the license server 140 .
  • One way to accomplish such authentication is for the client software component 122 to determine if the licenses 142 can be trusted.
  • the client software component 122 can include the capability to verify and/or validate the cryptographic signature, or other identifying characteristic of the license 142 .
  • the client environment 120 and the license server 140 can receive the set of keys 112 , for example, in a tamper-resistant software package that can include other components, such as the client software component 122 for the activated client environment 120 to verify the signature of the license 142 .
  • the DRM system 100 is of an exemplary nature and can be implemented in numerous other equivalent arrangements.
  • the license 142 and the protected content 134 can be distributed from different entities.
  • the rights offer 132 can be associated with the protected content 134 by a party other than the party preparing the protected content 134 .
  • a clearinghouse 160 can be used to process payment transactions and verify payment prior to issuing the license 142 .
  • the various processes and transactions can be performed, for example, via online and/or offline environments and/or combinations thereof. For example, an end user could download content to a computer and then transfer the content from the computer to a personal digital assistant (PDA).
  • PDA personal digital assistant
  • the end user could then buy a license for the content, for example, via a supermarket kiosk, a cash register, a prep-paid license card, and the like, and then transfer the license to the PDA.
  • the end user could then activate the content for use on the PDA and/or the computer.
  • the various devices can, but need not, communicate directly with one another and information can be exchanged in any suitable manner, such as by physically moving media between the devices.
  • the devices and subsystems of the DRM system 100 of FIG. 1 can communicate, for example, over a communications network 170 , and can include, for example, any suitable servers, workstations, personal computers (PCs), laptop computers, PDAs, Internet appliances, set top boxes, modems, handheld devices, telephones, cellular telephones, wireless devices, other devices, and the like, capable of performing the processes of the disclosed exemplary embodiments.
  • the devices and subsystems of the DRM system 100 can communicate with each other using any suitable protocol and can be implemented using a general purpose computer system.
  • One or more interface mechanisms can be used in the DRM system 100 including, for example, Internet access, telecommunications in any suitable form, such as voice, modem, and the like, wireless communications media, and the like.
  • communications network 170 can include, for example, wireless communications networks, cellular communications networks, satellite communications networks, Public Switched Telephone Networks (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, hybrid communications networks, combinations thereof, and the like.
  • PSTNs Public Switched Telephone Networks
  • PDNs Packet Data Networks
  • the communications network 170 can be the same or different networks.
  • the DRM system 100 of FIG. 1 is for exemplary purposes, as many variations of the specific hardware used to implement the disclosed exemplary embodiments are possible.
  • the functionality of the devices and the subsystems of the DRM system 100 can be implemented via one or more programmed computer systems or devices.
  • a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of the DRM system 100 .
  • two or more programmed computer systems or devices can be substituted for any one of the devices and subsystems of the DRM system 100 .
  • principles and advantages of distributed processing such as redundancy, replication, and the like, also can be implemented, as desired, for example, to increase the robustness and performance of the DRM system 100 .
  • the exemplary embodiments of the present invention directed to symbolic representations for expressing rights information, such as the rights offer 132 , using graphical representations, such as glyph symbols, and the like, will now be described.
  • the exemplary glyphs shown in FIGS. 2 - 24 can be generated in visible form, such as printed form, in digital form, such as electronic form, and the like.
  • background and foreground symbols can be employed.
  • background symbols can be configured to have no meaning to a human and can be employed for security purposes, such as to confuse possible hackers, while foreground symbols, which can be separated or distinguished from the background symbols based on predetermined patterns, placements, markers, codes, combination of pointers, and the like, can be configured and employed to express the rights expression information.
  • random or semi-random noise, and the like can be employed in the symbols, for example, to provide further security functions or other functions.
  • both the background and foreground symbols can have meaning to a human or machine, wherein the meaning of the background symbols can be used to interpret the meaning of the foreground symbols.
  • the DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a predetermined manner, such as being printed on the same substrate as the first symbol, being printed at a certain physical location relative to the first symbol, and the like.
  • a graphical representation of a rights expression can include a background portion and a foreground portion.
  • the background portion for example, can be configured to have no meaning, unless a predetermined condition is satisfied, such as the day being Wednesday, and the like.
  • the foreground portion can be configured to specify that “if you are scanning this item and its after Jul. 4, 2003, then also look at the background portion for additional information, otherwise continue to disregard the background portion.” Accordingly, various relationships between the background portion and the foreground portion can be specified with an appropriate rights expression, for example, using the graphical and other forms of the symbolic representations of the exemplary embodiments described herein.
  • the symbols of exemplary embodiments also can be employed to convey redundant information.
  • a corresponding reader can still be able to read the damaged ticket to extract the rights expression information based on redundant information that can be conveyed by the symbols.
  • redundancy can be accomplished by overlapping or duplicating the information of some or all of the symbols to improve the accuracy of the ticket reader.
  • the symbols can include a check-sum, error correction codes, and the like, for example, for verification and security purposes, to ensure that inconsistencies with the interpreted rights expression information can be resolved, and the like.
  • the exemplary embodiments also are applicable for the rights expression information including digital information, such as electronic information, and the like.
  • the exemplary embodiments can be used in cases where digital media, including the rights expression information, is damaged, where it is desired to have multiple ways to obtain a digital symbol, and the like.
  • the symbols of the exemplary embodiments can be hidden as a non-obvious pattern, shape, and the like, in another image, pattern, and the like, which then can be detected by a suitable system, machine, device, and the like, having predetermined parameters and having predetermined knowledge about the parameters of the hidden information.
  • the symbols can be part of a watermark in another image.
  • Other technologies for example, special ink, such as heat sensitive ink, magnetic ink, invisible ink, ink visible under certain angles, different chemical conditions, different illumination, and the like, also can be employed for symbol generation, watermarking purposes, and the like.
  • the symbols can convey information, for example, about licenses, grammar, rights expressions, rights assignments, payments, meta-data, content owners, histories regarding the content, the state of the content, encryption keys, expiration dates, digital signatures, conditions, constraints, parameters of a self-protecting document, digital works, content, digital content, resources, objects, and the like, that are available for end users to render, consume, use, distribute, and the like.
  • the symbol patterns of the exemplary embodiments can be used to convey information about an action, a command, a function, a procedure, a module, a subroutine, executable code, and the like.
  • the extracted information can instruct the transfer of funds to a specific account, for example, via the clearing house 160 , can instruct the transfer of an e-book to a specific address, can place a limit on distribution or transfers of content, for example, the protected content 134 , can add constraints for users of content, can destroy an encryption key, for example, the public/private key pairs 112 , after a predetermined number of times of usage of content, can stop or discontinue access to content, can transmit information about a content owner, can transmit information about content, can transmit information about a trademark owner, can transmit information about a copyright owner, can transmit information for adding up royalties and/or micro-payments, can instruct the sending of an e-mail back to a content owner about the status of content distribution, can be used combine or attach different sections, pieces,
  • Such information can be recorded, updated, and the like, back onto the original content, recorded on the copies made of the original content, and the like.
  • the exemplary embodiments can be employed in copy machines, cameras, video recorders, CD-writers, recording devices, duplication devices, replication devices, computing devices, rendering devices, and the like.
  • the exemplary embodiments can employ spatially periodic self-clocking glyph shape codes, for example, as described in commonly-assigned U.S. Pat. No. 5,091,966, wherein decoding based on convolution filtering and morphological operations, such as erosion, dilation, opening, and closing operations, and the like, can be employed.
  • decoding based on convolution filtering and morphological operations such as erosion, dilation, opening, and closing operations, and the like.
  • such exemplary embodiments can tolerate a significant amount of image distortion and degrading high frequency noise.
  • the exemplary embodiments also can reduce bit error rates in reading self-clocking glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,221,833, wherein a value assigned to a given glyph can be set to be different in just one bit position from values assigned to glyphs with which the given glyph is most likely to be confused.
  • the exemplary embodiments can include glyphs that have a plurality of independently modulatable and readily distinguishable characteristics, such as substantially orthogonal characteristics, and the like, with appropriate design of symbol cells, such as an array of pixel positions with the corresponding pixel values for each glyph. Spatial synchronization and orientation determination, for example, for decoding purposes, can be achieved by markers or patterns, to reduce the propagation of errors.
  • the exemplary embodiments can employ interleaved codes, interlaced codes, and the like, that can be encoded to facilitate the partitioning and correlation of data embedded within such glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,576,532.
  • the exemplary embodiments also can employ composite glyphs and glyphs with different colors or shades, as further described herein.
  • FIG. 2 illustrates a set 200 of 8 symbols 201 - 208 , derived from a circle, that can be used for expressing rights expressions.
  • FIG. 3 illustrates a set 300 of 4 symbols 301 - 304 , derived from a rectangle, that can be used for expressing rights expressions.
  • FIG. 4 illustrates a set 400 of 8 symbols 401 - 408 , derived from a circular structure, that can be used for expressing rights expressions.
  • FIG. 5 illustrates a set 500 of 8 symbols 501 - 508 , derived from a circular structure, that can be used for expressing rights expressions.
  • FIG. 6 illustrates a set 600 of 8 symbols 601 - 608 , derived from a circular structure, that can be used for expressing rights expressions.
  • FIG. 7 illustrates a set 700 of 8 symbols 701 - 708 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
  • FIG. 8 illustrates a set 800 of 8 symbols 801 - 808 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
  • FIG. 9 illustrates a set 900 of 4 symbols 901 - 904 , derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
  • FIG. 10 illustrates a set 1000 of 4 symbols 1001 - 1004 , derived from the 4 corners of a square structure, that can be used for expressing rights expressions.
  • FIG. 11 illustrates a set 1100 of 8 symbols 1101 - 1108 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
  • FIG. 12 illustrates a set 1200 of 8 symbols 1201 - 1208 , derived from a circular structure, that can be used for expressing rights expressions.
  • FIG. 13 illustrates a set 1300 of 5 symbols 1301 - 1305 , using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions.
  • FIG. 14 illustrates a set 1400 of 4 symbols 1401 - 1404 , derived from a star shape structure, that can be used for expressing rights expressions.
  • FIG. 15 illustrates a set 1500 of symbols, derived from the star shape structure of FIG. 14, that can be used for expressing rights expressions.
  • each of the symbols 1401 - 1404 can be taken from the Red, Green, and Blue (RGB) color space.
  • each of the 4 symbols 1401 - 1404 of the star shape of FIG. 14 can include the Red (R), Green (G), and/or Blue (B) colors.
  • 12 symbols can be generated (for example, four symbols times three colors).
  • complex symbols derived from the set 1500 of FIG. 15 and having overlapping colors can be generated, as shown in FIG. 16.
  • two or more symbols of different colors can be combined so as to overlap on a physical location, to potentially produce part or all of a star shape, in different colors, or combination of colors for each part of the star shape.
  • the color of the resulting horizontal symbol 1401 can be based on the combination of Green and Red symbols 1401
  • the color of vertical symbol 1402 can be Green
  • the color of the diagonal symbol 1403 can be Blue.
  • the described combination can be used to represent a complex symbol 1601 , as shown in FIG. 16.
  • a new set of complex symbols with many more choices for symbols than the set 1400 from FIG. 14, can be defined, as illustrated by FIG. 16.
  • the number of complex symbols in the new set, as illustrated by FIG. 16, can be (2 12 ⁇ 1) or 4095 symbols, assuming that a blank space is not considered a symbol.
  • the number of complex symbols in the new set, as illustrated by FIG. 16 can be (2 12 ⁇ 1) or 4095 symbols, assuming that a blank space is not considered a symbol.
  • YMC Yellow, Magenta, and Cyan
  • YMCK Yellow, Magenta, Cyan, and Black
  • sensors, detectors, and the like can be used with relatively very high accuracy.
  • angle detection can be made practically independent of color detection.
  • errors in the angle detection can be made independent of errors in the color detection, and visa versa, advantageously, reducing error propagation, reducing the overall error rate for decoding and recognition of generated complex symbols or messages generated from the complex symbols, and the like.
  • FIG. 17 An exemplary embodiment for increasing the number of members of a set is illustrated by way of example in FIG. 17.
  • a message that can be read from left to right, having N words, and using the 4 symbols 1001 - 1004 of the set 1000 shown in FIG. 10 is illustrated.
  • every 3 symbols, starting and reading from left to right represent a word, wherein the symbols represent the letters in a word, and each word includes 3 letters.
  • the first word includes a sequence of symbols 1002 , 1004 , and 1001
  • the second word includes a sequence of symbols 1003 , 1003 , and 1004
  • the Nth word includes a sequence of symbols 1001 , 1002 , and 1003 , and the like.
  • a set of words can be defined, wherein the number of words in the set is 4 3 or 64 (for example, four symbols with three symbols per word), assuming that a blank space is not used in a word.
  • a physical-level error occurs, such as a extra line drawn on a part of the symbol, a line deleted from a part of the symbol, and the like, then one word or symbol can be confused with another one.
  • This is more problematic for words with long length, such as words defined with a length of 100 symbols (for example, each word including 100 symbols in series).
  • more markers for position, rotation, orientation, synchronization, and the like can be employed.
  • parity codes, check-sum codes, error checking or correction schemes, and the like can be employed to help to reduce the error rate.
  • some of the members of the set can be set aside, and not be used at all, for the sake of better recognition of the symbols or words, more certainty in recognition, less confusion, and the like.
  • FIGS. 16 and 17 can be combined to further increase the number of members in a resulting set.
  • grammar, rules, and the like can be added between the words defined in FIG. 17 to even further increase the number of members in the resulting set.
  • grammar, rules, and the like can be used to specify relationships between words, order of words, meaning in the context, exceptions, and the like.
  • General rules such as English grammar rules, computer language rules, algorithmic rules, grammars, such as Pascal, eXtensible Markup Language (XML), FOR-loop structures, and the like, also can be employed.
  • the resulting relative large set of complex symbols or words can be used, for example, to map, represent, abbreviate, symbolize, to correspond to different complete messages, partial messages, English phrases, words, letters, partial words, compression tables, dictionaries in English or other languages, other symbols, other glypbs, other letters, other languages, logical expressions, computer commands, executables, pieces of code, other human readable languages or symbols, voices, sounds, voice recognition commands, instructions, rules, numbers, grammar, parameters of rights assignment or granting or controlling access to items, conditions, fees, dates, information about items or an owner of an item, to request for specific actions and doing those actions, such as transfer of fund or items, erasure of content, disabling or preventing access to items, with tables, databases, formulas, curves, translation schemes, predefined or dynamic mapping relationships, such non-static and variable mapping relationships, mapping relationships depending on context, situation, or other parameters, and the like.
  • FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set 1500 shown in FIG. 15.
  • a book identification (ID) number in a database is 245, which, for example, refers to a novel by a given author, and an access expiration date is Jul. 12, 2003.
  • the first complex symbol can be used to express the phrase “Book (or resource) ID number”
  • the second complex symbol can be used to express the integer “245”
  • the third complex symbol can be used to express the phrase “Access/expiration date”
  • the fourth complex symbol can be used to express day and month of the year (“July 12,” or 7-12)
  • the fifth complex symbol can be used to express the year “2003.”
  • any suitable expression, grammar, rule, and the like can be expressed based on the glyphs and/or the complex symbols of the exemplary embodiments, advantageously, to enable rights management, rights assignment, and the like.
  • Additional exemplary expressions and/or grammar for rights assignment and management such as for the XrML language, grammar, expressions, statements, licenses, rights assignment, and the like, that can be expressed using the described exemplary embodiments, for example, are further described in commonly-assigned U.S. Pat. No. 5,715,403, No. 5,629,980, No. 6,236,971, No. 6,233,684, No. 5,634,012, No. 5,638,443, and No. 5,530,235.
  • FIG. 19 illustrates an exemplary rights expression for performing an action expressed using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
  • the action can be the sending of funds, 55 US Dollars, to account number 435 at a bank with ID number 212 , and the like.
  • the expressed action can include any suitable type of action and can be complex in structure, for example, having hierarchical, logical, conditional, and the like, statements within its structure.
  • FIG. 20 illustrates an exemplary rights expression for performing an action using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
  • the action can be the erasing of an e-book file with the ID number 125 .
  • the expressed action can include rights management actions, editing actions, combining actions, actions for transferring items, objects, or resources, and the like.
  • FIG. 21 illustrates an exemplary rights expression for expressing the right to print 100 copies of 2 e-books with ID numbers 443 and 12 using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
  • logical phrases such as AND, OR, exclusive OR (XOR), and the like, can be employed within an exemplary rights expression.
  • the glyphs employed can include their own internal logic, rules, grammar, structure, options, ordering, and the like.
  • FIG. 22 illustrates an exemplary rights expression for expressing the right to listen to music, play music, render music, and the like, for 100 minutes, for 2 pieces of music with ID numbers 443 and 13, using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
  • the music ID numbers are listed in series, one after the other, and the end of the list of ID numbers is flagged, indicated, and the like, by an glyph referred to as an “End of List of ID Nos.”
  • an expressed list can be extensive, include many layers within each other, such as directories, and the like.
  • FIG. 23 illustrates an exemplary rights expression for expressing an e-book data record for an e-book with ID number 143 , whose owner has an ID number 212 , using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
  • the end of the record is indicated, flagged, and the like, by a glyph referred to as “End of Data.”
  • an expressed record can include additional information about the book, content owner, and the like, such as how to send payment to a content owner, and the like.
  • the size of an expressed record can be of any suitable size, and the expressed record can be hierarchical, including its own directories, and the like.
  • FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, industries, can be custom-made for each application or industry, and the like, using the symbols 1401 - 4104 of the set 1500 shown in FIG. 15.
  • a glyph can be used to express what application the rights expression is intended for, such as e-books, movies, music, video, multimedia, and the like.
  • the next glyph can be used to express the units employed for a given type of content, such a “Pages” for e-books, minutes for music and movies, Bytes for data, tracks for music, and the like.
  • the next glyph can be used to express a range for the units, such as the range of pages of an e-book, and the like.
  • the next two glyphs can be used to express the “Start” and “End” units for the ranges, such as 5 and 10, for expressing a range of “between pages 5 and 10,” in the case of an e-book, “between minutes 5 and 10,” in the case of a music file, and the like
  • any suitable information also can be added, such as to indicate the name or the ID of an e-book, or content owner, information relevant to rights assignment or rights management, and the like.
  • the glyphs of the exemplary embodiments can have flexible interpretations, can have multiple meanings, can depend on a context or application, and the like.
  • the symbols, sets of symbols, and the like, of the exemplary embodiments, for example, as described with respect to FIGS. 2 - 24 can be correlated, associated, and the like, with corresponding information, such as rights expressions or portions thereof, and the like, for example, based on information that can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of DRM system 100 .
  • One or more databases of the devices and subsystems of the DRM system 100 can store such information.
  • the databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed herein, and the like.
  • one or more glyphs can be employed so as to carry a secondary message, hidden message, and the like.
  • a glyph in the case of airport security, such a glyph can be embedded on a passenger's ticket, in the case of library security, such a glyph can be embedded on a student's library card, and the like.
  • a silent alarm in response to the passenger, an identified terrorist, presenting a ticket employing such a glyph, a silent alarm can be triggered to notify authorities to react to the situation in a manner that is not apparent to the terrorist.
  • the exemplary embodiments can be employed to express various actions that can be initiated via a ticket, some of which may not be apparent to the ticket holder, advantageously, making it easier for authorities, and the like, to react to and/or control a given situation.
  • the glyphs of the exemplary embodiments can be displayed in three dimensions, on paper, on a computer display, and the like, for example, using holographic technology, and the like.
  • the glyphs of the exemplary embodiments can be secretly designed, such that it would be hard to replicate, or fake the glyphs, layers of security can be added, such as by employing watermarking, authentication, check-sum, and the like, schemes.
  • the state, history, and the like,,of a system such as the DRM system 100 , content, and the like, can be encoded using the glyphs of the exemplary embodiments.
  • the glyphs of the exemplary embodiments need not be printed nor be capable of being seen by a human eye, as long as the glyphs of the exemplary embodiments can be machine read, for example, using a suitable device, such as a scanner, wand, bar code reader, and the like.
  • the glyphs or symbols of the exemplary embodiments need not be in forms that can be “seen” by a machine.
  • the glyphs or symbols of the exemplary embodiments can be configured to be detected in some other way, such as being “heard,” and the like.
  • the glyphs, symbols, words, messages, and the like, of the exemplary embodiments used to convey information can be encoded using light, sound, a series of sounds, light pulses, and the like, using at any suitable frequency, amplitude, and the like, can include ultraviolet waves, x-rays, microwaves, radio waves, and the like, can employ lasers, modulated or convoluted information, different colors or wavelengths, electric or magnetic field variations, and the like.
  • Any suitable series of the glyphs, symbols, words, messages, and the like, of the exemplary embodiments employed can have its own grammar, rules, and the like, which provide a meaning to a transmitted message.
  • a sound or light in a range of frequencies that a human ear or eye cannot detect can be employed for transmitting the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, during security applications, privacy applications, and the like.
  • a transmitted message can be made transparent to a user or users, but at the same can be retrieved, understood, and the like, by a suitable sensor, detector, and the like.
  • the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be expressed using any suitable human or machine sensing organ or device, and the like, so long as that the sensed information, message, and the like, can be quantized, digitized, expressed, and the like, based on numbers, bits, bytes, and the like.
  • a device such as a touch tone telephone, and the like, can be used to transmit a sequence of sounds corresponding to the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, over a communications medium, such as a telephone line, and the like.
  • the specific sounds including their sequence, duration, other factors, and the like, can be employed the represent the symbolic expression expressed by the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • an application can be used to enable a customer to engage in, for example, an online transaction that has the same effect as an application using the Internet for the online transaction, except that such a transaction can be sound based.
  • rights expression information can be reduced to a series of numbers using various techniques.
  • an unambiguous canonical rights expression can be converted into a binary format.
  • such a binary format can be expressed as a sound, a series of sounds, and the like, and based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • a rights expression template, profile, and the like can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • such a rights expression template, profile, and the like can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • light, a series of light pulses, and the like at any suitable frequencies, including ultraviolet waves, x-rays, microwaves, radio waves, and the like, can be employed to express information, and, for example, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • the exemplary embodiments can be used to express information, such as rights expressions, and the like, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • information such as rights expressions, and the like
  • any suitable rights expressions can be translated into the noted formats, and can be machine processed.
  • the exemplary embodiments can provide increased efficiency, better matching of a resources to a target computational environment, such as matching a technology to a device employed, and the like.
  • a user wishes to display on a personal computer screen a copy of the “Complete Works of William Shakespeare,” which the user has already obtained, and which resides in the hard drive of the personal computer of the user.
  • the user can engage in an online transaction through the Internet, for example, visiting a corresponding Internet site, using the computer keyboard to provide certain information for representing a request for access to the work and the rights the user wishes to acquire, providing a credit card number to pay for the transaction, and downloading from the Internet site a digital license associated with the work authorizing the user the right to render the work by displaying the work on the personal computer screen.
  • a computer program running on the personal computer can be used to interpret the license, and upon successful interpretation the user can be permitted to render the work.
  • the above example can be accomplished by transmitting a series of sounds.
  • the Internet site can transmit sound tones, which can be interpreted by a personal computer, other device, such as a mobile telephone, and the like, as corresponding a license granting the right to render the work.
  • a touch-tone telephone system can be employed and configured to transmit and recognize the sound tones.
  • Other devices can be employed and configured to transmit over a communications device other sounds, for example, with fine nuisances that are difficult to replicate, for example, for security purposes, and the like.
  • a symbol in the form of a sound signal, a light signal, and the like can be transmitted and used, for example, during at checkout at an online store, and the like, to denote that an item, such as an e-book, music file, movie, and the like, is paid for and can be unlocked so as to function.
  • an item such as an e-book, music file, movie, and the like
  • the absence of such transmission can be used to prevent the item from being used.
  • tones, frequencies, sequences of sounds or light, as noted above, and the like, as representations of symbols can be broadcast as a signal to initiate an action, series of actions, and the like.
  • an owner of digital content such as a company
  • a device such as a personal computer, and the like, can be offline, but can respond to the broadcast signal, for example, via a suitable device, and the like, capable of receiving the broadcasted signal.
  • the broadcasted signal representation can be a command revoking or suspending licenses previously acquired authorizing devices to permit rendering or transfer of electronic files, digital works or content, specific digital works or content, and the like.
  • the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be in printed or in visible form, such as in the case of a paper ticket with a glyph printed thereon, and the like.
  • the ticket, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be in a digital form, such as an electronic form, and the like.
  • an unauthorized person typically has to undertake a secondary activity, such as a second hacking attempt, a second decoding step, and the like, to unlock the information represented by the symbolic representation of a rights expression based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • a trusted communication session can be established between a repository, such as a personal computer, a smart card, and the like, employing the symbolic representation and a device, such as a reading device, scanning device, and the like, reading the symbolic representation.
  • a trusted session can be dispensed with, for example, if it is not critical to maintain the security of the symbolic representation, if it is not critical to use a method to maintain security, and the like.
  • symbolic representations such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments
  • a highly complex symbol such as a multi-colored holograph
  • the information represented therein can be made sufficiently complex, for example, so that such information cannot easily be discerned, the symbol cannot easily be counterfeited, and the like.
  • a symbolic representation for example, can be in plain view, in plain view when rendered, and the like, and embody sensitive information without a need to encrypt such information.
  • symbolic representations such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be secretly designed, such that replication, faking, and the like, are difficult to achieve, and additional layers of security can be employed, such as watermarking schemes, authentication schemes, check-sum schemes, and the like.
  • the symbolic representations can include security aspects, and the like, that can be used in security methods and systems, and the like.
  • the symbolic representations of the exemplary embodiments can be embedded into an item, such as digital content, and the like, or can be associated with the item using any suitable method, for example, such as the methods disclosed in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,634,012, No. 5,638,443, No. 5,715,403, and No. 5,629,980, and the like.
  • the symbolic representation of the exemplary embodiments can be used to encode a security object that can be used to carry a secondary message, hidden message, and the like, and that can be represented in a human readable form, and the like.
  • a security object can be printed on an airline ticket, boarding card, and the like, or can be represented in an electronic form, such as on a magnetic stripe of the airline ticket, boarding card, and the like.
  • the airline ticket for example, such a security object can be used to notify authorities to react in a manner that is not apparent to the passenger holding the airline ticket.
  • the security object can reside, digitally, in human readable a form, and the like, in an item, such as an identification card, smart card, repository, and the like, and, for example, can be used to express a right of entry into a certain building, and a condition that to enter the bearer must present a Maryland driver's license number 1234567890 issued in the name of John Smith.
  • Information in or on the item can clearly reveal to a possessor, even an unauthorized possessor, that the item can be used to gain access to the building, but the condition that possession of the drivers license also is required can be hidden, for example, until a security officer reads the security object detailing same. Accordingly, an authorized possessor can be given enough information in eye-readable form, for example, to gain access to a building, but hidden information can be included in the form of the security object in order to catch an unauthorized possessor of the item.
  • a parent can use the security object, for example, encoded in or on a child's library card, and the like, for example, to indicate to a librarian that the child only can borrow “G” rated videos, books, and the like.
  • the librarian will able to detect the hidden message carried by the security symbol, while the child will not.
  • the exemplary embodiments can be applied to any suitable situation where it is desirable that a possessor of an item bearing the security object, for example, not know the meaning of the security object, not know a full meaning of the security object, and the like.
  • a company can issue a visitor an identification badge with such a security object encoded thereon, and can inform the visitor that the badge can only be used to gain access to building A.
  • the security object when the visitor attempts to gain access to building B by presenting the badge to an appropriate device, such as a card reader, and the like, the security object can be used to trigger an alert not only to deny entry to the building B, but also to trigger some other action as defined by the security object, for example, such as to sound an alarm, to detain the person in the case of human intervention, and the like.
  • human intervention can be involved, for example, in the case of security personnel having to examining the item, or no human intervention may be needed, for example, in the case of an automatic security system.
  • the badge also can be encoded with a right, for example, represented by a glyph, to enter building A in a restricted manner, such as on specified days, at specified times, and the like.
  • the exemplary embodiments described herein can be used to permit a digital work or content to be rendered, can be employed to allow access to a building, such as by opening a door, and the like.
  • a condition for exercise of a usage right such as determining that a resource, such as a video file, or music file, being accessed, used, or acquired, has not been altered, or tampered with, for example, can be specified using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • a usage right can be used to specify that a video file can be rendered, played, and the like, an unlimited number of times on the condition that the rendering is performed prior to Jul. 4, 2003, and provided that, on each occasion that rendering is requested, a specified method determines that the video file has not been altered. If the file cannot be determined to be unaltered, then rendering can be denied and other consequences can follow, such as the DRM system 100 being programmed to lock down the file, and generate a report to the appropriate authority so that the suspected alteration can be investigated.
  • the DRM system 100 can be configured to utilize a usage rights expression, for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like.
  • a usage rights expression for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like.
  • a condition can include, for example, determining that digital content in question has not been tampered with, has not been altered, and the like, and that the symbolic representation of the usage right has not been tampered with, has not been altered, and the like. Accordingly, if the DRM system 100 fails to determine that both that the digital content and the symbolic representation have not been altered, the exercise of the purported usage right can be denied.
  • this exemplary embodiment provides a two-pronged layer of protection, because a person attempting gain unauthorized access or otherwise obtain something to which they are not entitled would have to pass two hurdles. For example, such unauthorized party would have to perform to forgeries or hack two things.
  • a person wishing to exercise a usage right can present an item including a glyph representing such a usage right.
  • the glyph can be in electronic form, in printed form, in a hard copy format, and the like.
  • a DRM application such as the client component 122 , and the like, in addition to being configured to ensure that conditions for exercise of the usage right are satisfied, can be configured to determine that the glyph and/or the video file have not been altered in order to grant exercise of the usage right. If the DRM application determines that the glyph and/or the video file have been altered, the DRM application can be configured to prevent exercise of the usage right. If, however, the DRM application determines that the glyph and the video file have not been altered, the DRM application can be configured to allow the exercise of the usage right, for example, subject to successful completion of other processes employed by the DRM application.
  • the determination of non-alteration can be employed before exercise of the usage right is allowed, thus, erring on the side of the usage right not being exercised if such a test fails.
  • This approach can be varied, wherein the determination of non-alteration is not to be made, thus, erring on the side of permitting the exercise of the usage right.
  • a hybrid approach is made possible. For example, a determination of non-alteration can be employed to exercise the full usage rights requested, but if such a determination fails, then some of the usage rights can be exercisable, while others may not. Thus, the exercisable usage rights can be configured as a subset of the full usage right, but need not be.
  • the DRM system 100 can be configured to permit rendering by display of a file on a computer screen, but to not permit the file to be copied, moved, loaned, transferred, and the like.
  • the DRM system 100 can be configured to generate an error report to an authorizing authority, such as a server, repository, device, and the like, where the report can be reviewed, automatically, based on human intervention, and the like.
  • the report can be configured to detail the determinations made by the DRM system 100 , and the results of such determinations.
  • the DRM system 100 then can permit exercise of the usage rights, if authorized to do so by the authorizing authority.
  • the exemplary embodiments can be employed to ensure that an item, such as photographs, for example, police crime scene photographs, and the like, have not been altered.
  • an item such as photographs, for example, police crime scene photographs, and the like
  • it can be important to ensure that the photograph is not altered, but probably it can be even more important to ensure that if the photograph is altered that such alteration can be detected.
  • the level of complexity employed in the symbolic representations of the exemplary embodiments depends on the level of security desired.
  • the exemplary embodiments can be employed with objects other than photographs, video files, and the like, and in situations, other than evidentiary findings, and the like, as will be appreciated by those skilled in the relevant art(s).
  • Any suitable method to detect if an item, such as a photograph, video file, and the like, has been tampered with can be employed with the exemplary embodiments.
  • a verification method such as described in commonly assigned, co-pending, U.S. patent application Ser. No. 10/147,304 of Tadayon et al., entitled “METHOD AND APPARATUS FOR VERIFYING DATA INTEGRITY BASED ON DATA COMPRESSION PARAMETERS,” filed on May 17, 2002, the entire disclosure of which is hereby incorporated by reference herein, can be employed.
  • Such a verification method can include determining one or more of various parameters resulting from, or used for, compression or other manipulation of the data and comparing the value or character of that parameter to the original value or character after transmission, processing and/or a period of time. Any compression scheme or other manipulation can be used. Further, combinations of the parameters can be used and processed in various manners through various logical processes.
  • both background and foreground symbols can be configured to express a meaning, message, and the like.
  • a meaning of the background symbol can be that when the background symbol is present the foreground symbol can be interpreted.
  • both the background symbol and the foreground symbol can be configured to express a meaning.
  • the DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a certain way, such as printed on a same substrate as the first symbol, printed at a certain physical location relative to the first symbol, and the like.
  • each symbol can be configured to express part of the information being conveyed, for example, such that the information being conveyed can be distributed over a plurality of symbols, the information being conveyed can be distributed over a plurality of symbols in a redundant manner, and the like.
  • all of the symbols can be configured to be in digital form, one of a plurality of symbols can be configured to be in digital form while the others are not, and the like.
  • a paper ticket can include a printed symbol, which when read by an appropriate reader, machine, and the like, can be detected to represent a usage right.
  • a condition to be satisfied in order to exercise the usage right can be the presentment to the reader, machine, and the like of a digital symbol, for example, included in a repository, such as a smart card, handheld device, and the like, or presentment of an additional printed symbol, and the like.
  • a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey little or no information, but, instead, convey information on how to obtain information.
  • the symbol can be configured as a pointer to another system, device, file, and the like.
  • This exemplary embodiment can be useful where security is desired, because an unauthorized party, device, and the like, would have to hack, crack, and the like, multiple systems to obtain the information. For example, the unauthorized party would have to crack the symbol to determine that in order to obtain unauthorized access a second system must be compromised. The unauthorized party would then have to crack the second system.
  • symbols can be configured as pointers to a system, device, place, and the like, where information can be obtained, a transaction is to take place, and the like.
  • one or more symbols can be configured to convey Uniform Resource Locator (URL) information, for example, for a system, a device, a resource, a file, a document, a music file, a video file, a movie, an e-book, software, and the like.
  • URL Uniform Resource Locator
  • the symbol when a suitable reader, machine, and the like, reads the symbol, the symbol can be interpreted as representing the URL and appropriate actions can be taken, for example, such as directing a Web browser to the URL for gaining accessing a music file, video file, and the like.
  • the present invention recognizes that there are situations where establishing a communications link with a server, repository, device, and the like, for example, over the Internet, via a telephone line, modem, and the like, may not practical or even possible.
  • a user can attempt to gain access to an item, such as digital content, a service, and the like, by initiating an online transaction.
  • the online transaction can result in the user gaining access to the item requested.
  • the ability to communicate can be constrained. For example, a user may have received through the mail a disk including a movie file, a user may have on a hard drive of a personal computer, such as in the client environment 120 , a movie file, and the like.
  • the owner of the movie file such as a movie studio, video store, and the like, for example, can have the user initiate an online transaction, transmit a credit card number to pay a fee for the accessing the movie, and receive a license that can permit rendering of the movie by viewing of the movie file on a screen of the personal computer.
  • the user can employ a ticket, for example, including a license granting the user the right render the movie by viewing the movie file on the screen of the personal computer, and that can be read by the personal computer.
  • the ticket can be in the form of a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. Depending on a level of security desired, the symbol can be made complex to deter counterfeiting.
  • each use of the ticket can be recorded in a record, for example, on the ticket itself, in another repository, such as the personal computer of the user, and the like.
  • Such a record can be configured to indicate the number of times the ticket has been used, wherein the ticket can be configured to be used one time, many times, and the like. For example, the user may have acquired the right to view ten movies distributed by a movie studio, movie store, and the like. This information can be recorded in the personal computer of the user.
  • the number of views to which the user remains entitled can be reduced by one.
  • the ticket need not record information concerning a use thereof, but rather information for authorizing use of the corresponding movie file.
  • the ticket can be used to record information about use of the ticket.
  • each use of the ticket to authorize rendering of the movie file can result in the number of authorized uses to be reduced by one and to be reflected on the ticket, wherein the rendering repository, such as the personal computer of the user, another repository device, and the like, need not record information concerning use.
  • the ticket can be in digital form so that the use information can be recorded on the ticket.
  • such use information can be a printed on the ticket, and the like.
  • the ticket can be altered, information can be recorded on the ticket, and the like. Such alteration can be performed, for example, via mechanically means by the device reading the ticket, by human intervention, such as by a clerk at a kiosk, and the like.
  • two tickets can be employed, wherein one ticket can be in digital form, and record information concerning use, and the other ticket can be in digital or printed hard copy form and provide information about the item to which access is desired.
  • a movie studio can distribute a hard copy printed ticket which can employ one or more glyphs to express rights expression information concerning the usage rights, manners of use, conditions, and the like, associated with a movie file.
  • the printed ticket can be presented together with the digital ticket to an appropriate device.
  • the device can be configured to read the rights expression information that can be provided on either or both tickets based on the glyphs, process a transaction permitting the usage right to be exercised, such as rendering the movie by viewing the movie file on a screen of a personal computer, subject to applicable conditions, and record the use information, for example, on one or both of the tickets, on the rendering device, on another device, and the like.
  • a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be employed to express rights expression information, for example, in a resource constrained system or environment, such as on devices having a small foot prints, handheld devices, systems having limited processing resources, and the like.
  • a rights expression can be reduced to a suitable symbol, groups of symbols, sound, groups of sounds, light pulse, groups of light pulses, and the like, representing the rights expression information being expressed.
  • a predetermined tone, set of tones, and the like can be used to represent an unambiguous canonical rights expression encoded in a binary format.
  • an exemplary unambiguous canonical rights expression, encoded in a binary format can given by:
  • a manner of use of an item can be specified with a symbol, such as the glyphs, symbols, words, messages, and the like, the exemplary embodiments.
  • glyphs can be expressed in terms of sound, color, image, pulse, light, and the like, signals, wherein the amplitude, frequency, and width of the corresponding signals could be modified to modify an expressed message.
  • information regarding rights, conditions, and the like can be expressed as three dimensional (3D) information, such as via a holographic glyph image, and the like.
  • a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey rights expression information, such as an expiration date, and the like, for example, to prevent the display of information on a monitor of a computer, and the like.
  • the glyph conveying the rights expression information can be displayed on the monitor of the computer, and can be scanned, wanded, and the like, via a suitable detector, hand-held scanner, and the like.
  • rights expression information can be configured for use with an auction Web site, a storefront on the Internet, and the like.
  • sound, light, a combination of light and sound, and the like can be is used for transmission of rights expression information.
  • the movement of a user in a building can be monitored, and the presence of the user in a room can be monitored, detected, and the like, for example, using an iris scan, a smart card, voice recognition, biometrics, a device on the clothing of the user, and the like.
  • a security level assigned to the room such as the Pentagon library
  • items in the room such as top-secret files, and the like
  • privileges of the user for gaining access to the corresponding information, data, services, and the like can be based on usage rights, conditions, restrictions, and the like, specified in the rights expression information transmitted in the room.
  • a background signal for example, including noise, such as semi-random noise, random noise, a steganographically encoded signal, a scrambled signal, and the like, can be added to a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments that can be used to convey rights expression information.
  • a flag, an indicator, and the like can be employed to indicate that the background signal can be neglected, for all or a part of the signal, by an appropriate scanner of the symbol conveying the rights expression information.
  • the rights expression information can be represented as a video image or multimedia content consisting of video, sound, and text and having static and dynamic portions. Any of these elements of the multimedia content can, alone or in combination, be used to represent the rights expression information.
  • the rights expression information can be expressed by being distributed throughout the portions or by being redundantly expressed by the portions for security and reliability.
  • the symbolic representations of rights expressions in the exemplary embodiments can be used, for example, in a digital ticket that can be scanned or read by a machine.
  • the symbolic representations can be customized to the needs of a specific group, company or industry, in which case the scanners or readers also can be specialized and customized for a specific purpose or task.
  • the symbolic representations of rights expressions can be used to condense the amount of information, reduce the amount of hardware and/or software required to understand the information, and speed up the process for the convenience of the end user of the content, while providing relatively lower error rates and relatively higher precision.
  • Barcode or symbol readers, pattern recognition engines, scanners, and the like can be employed, advantageously, with minor or no modifications to hardware and/or software for practicing the exemplary embodiments.
  • the pattern recognition engines can include neural network, fuzzy logic techniques, and the like. Accordingly, available technologies can be used for the reader and recognition engine functions, which reduces the set-up costs for practicing the exemplary embodiments.
  • processing the symbols expressing the rights information using the readers or pattern recognition processors, for example, to wand the symbol patterns and extract the rights expression information results in speed and reliability during the interpretation process for the end user of the content.
  • the rights expression information can be output as plain English text, any other suitable human-readable language or form, such as voice or sound, and the like. Accordingly, the end user of the content does not have to know the rules and/or language related the rights expression information, drastically reducing the learning period for the end user, and thus, significantly reducing the operational expenses for the end user.
  • the symbolic representations of the exemplary embodiments can be printed on a physical substrate, such as a piece of paper, or can be displayed on a computer monitor, for scanning by an appropriate reader, and the like.
  • the rights expression information can be expressed with symbols in the form of parallel lines, bar codes with different widths, angles, ratios, perspectives, or distances, crossed lines, concentric circles, geometrical shapes, different colors, visible or invisible light sources with different wavelengths for representing different glyphs and shapes and for easy and fast optical recognition, Morse codes, laser pulses with different durations, Japanese characters, English characters, one-dimensional images, two-dimensional images, symbols, sets of symbols with specific angular relationships, sets of symbols with specific spatial relationships for defining different types of grammar or rules, rotational invariant symbols, spatial invariant symbols, symbols with more than one meaning, hidden meanings or meanings not readable by humans, or readable by specialized machines to keep some information secret, watermarks, steganographically encoded symbols, symbols accompanied by human-readable messages, symbols readable by machines
  • different rights expression information or messages can be conveyed based on the order of the symbols, or placement of the symbols with respect to each other.
  • the specific sequence of symbols can convey a specific situation or context, such as the information about an industry or purpose of the rights expression information.
  • the symbolic representation can be in digital, such as electronic form, and the like, as well as in printed form, visible form, and the like.
  • the symbols can be stored on some sort of electronic media, such a computer hard drive, server, floppy disk, smart card device, and the like.
  • the symbolic representations can be generated using templates, a graphical user interface (GUI), and the like, advantageously, not requiring the end user of the content or providers of the content to have a complete knowledge of a rights expression language and/or grammar.
  • GUI graphical user interface
  • the recipe, algorithm, formula, and the like, used for the generation of the symbols could be in public domain or governed by a standards body, to encourage standardization of the symbols.
  • the standards body then could set the parameters for shape or methods of generation of the symbols.
  • the recipe, algorithm, formula, and the like, used for the generation of the symbols could be kept secret from the public, for example, to discourage unauthorized users from generating fake symbols and/or digital tickets.
  • the symbol reader can be configured to reject the ticket as invalid.
  • the rights expression information extracted from a symbol or symbols can instruct a scanner or reader to perform a predetermined action.
  • a digital ticket can include a symbol or symbols corresponding to a rights expression indicating that a user has the right to print 4 copies of a report.
  • the symbols also can instruct the reader to print another symbol on the digital ticket, print a new ticket, alter the ticket, and the like, so as to indicate that the user now has the right to print 3 more copies.
  • the symbols themselves can have a grammar of their own, for example, a relationship internal to symbols themselves, used to express new meanings or extra information, for example, with respect to the neighboring symbols or a predetermined proximity to other specific symbols. For example, if a given symbol is within or exactly 2 symbols away from another symbol, such positional relationship could express further information that can be concluded from that sequence of symbols.
  • a grammar can be based on the context or proximity of the symbols, with respect to each other or with respect to a marker, and the like.
  • FIGS. 25 - 26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
  • FIG. 25 is an exemplary flowchart for illustrating graphical, representation of rights expression information
  • FIG. 26 an exemplary flowchart for illustrating modulated signal-based representation of rights expression information.
  • the rights expression information can be specified.
  • a graphical representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • the computer 130 of the DRM system 100 of FIG. 1 can be configured to perform the process for the graphical representation of rights expression information of FIG. 25.
  • any suitable device, system and the like for example, such as one or more of the devices and subsystems of the DRM system 100 , can be configured to perform such processing.
  • the rights expression information can be specified.
  • a modulated signal-based representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
  • the computer 130 of the DRM system 100 of FIG. 1 can be configured to perform the process for the modulated signal-based representation of rights expression information of FIG. 26.
  • any suitable device, system and the like for example, such as one or more of the devices and subsystems of the DRM system 100 , can be configured to perform such processing.
  • the DRM system 100 can be used to store information relating to various processes described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of DRM system 100 .
  • One or more databases of the devices and subsystems of the DRM system 100 can store the information used to implement the exemplary embodiments.
  • the databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed above.
  • All or a portion of the DRM system 100 can be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, micro-controllers, and the like, programmed according to the teachings of the disclosed exemplary embodiments.
  • Appropriate software can be readily prepared by programmers of ordinary skill based on the teachings of the disclosed exemplary embodiments.
  • the DRM system 100 can be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of component circuits.
  • the exemplary embodiments described herein can be employed in offline systems, online systems, and the like, and in applications, such as TV applications, computer applications, DVD applications, VCR applications, appliance applications, CD player applications, and the like.
  • the signals employed to transmit the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be configured to be transmitted within the visible spectrum of a human, within the audible spectrum of a human, not within the visible spectrum of a human, not within the audible spectrum of a human, combinations thereof, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
US10/388,171 2002-03-14 2003-03-14 System and method for graphical rights expressions Abandoned US20030225700A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/388,171 US20030225700A1 (en) 2002-03-14 2003-03-14 System and method for graphical rights expressions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US36393202P 2002-03-14 2002-03-14
US10/388,171 US20030225700A1 (en) 2002-03-14 2003-03-14 System and method for graphical rights expressions

Publications (1)

Publication Number Publication Date
US20030225700A1 true US20030225700A1 (en) 2003-12-04

Family

ID=28041836

Family Applications (6)

Application Number Title Priority Date Filing Date
US10/388,226 Expired - Lifetime US7359884B2 (en) 2002-03-14 2003-03-14 Method and apparatus for processing usage rights expressions
US10/388,167 Abandoned US20040015426A1 (en) 2002-03-14 2003-03-14 System and method for expressing usage rights with sound signals
US10/388,217 Abandoned US20030233169A1 (en) 2002-03-14 2003-03-14 System and method for expressing usage rights using light signals
US10/388,171 Abandoned US20030225700A1 (en) 2002-03-14 2003-03-14 System and method for graphical rights expressions
US10/388,162 Active 2027-11-01 US8108313B2 (en) 2002-03-14 2003-03-14 Rights expression profile system and method using templates
US12/204,393 Active 2025-04-17 US9626668B2 (en) 2002-03-14 2008-09-04 Rights expression profile system and method using templates

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US10/388,226 Expired - Lifetime US7359884B2 (en) 2002-03-14 2003-03-14 Method and apparatus for processing usage rights expressions
US10/388,167 Abandoned US20040015426A1 (en) 2002-03-14 2003-03-14 System and method for expressing usage rights with sound signals
US10/388,217 Abandoned US20030233169A1 (en) 2002-03-14 2003-03-14 System and method for expressing usage rights using light signals

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/388,162 Active 2027-11-01 US8108313B2 (en) 2002-03-14 2003-03-14 Rights expression profile system and method using templates
US12/204,393 Active 2025-04-17 US9626668B2 (en) 2002-03-14 2008-09-04 Rights expression profile system and method using templates

Country Status (8)

Country Link
US (6) US7359884B2 (de)
EP (4) EP1490819A4 (de)
JP (5) JP2005532610A (de)
KR (3) KR100703521B1 (de)
CN (4) CN1653462A (de)
AU (4) AU2003230651A1 (de)
BR (1) BR0308409A (de)
WO (4) WO2003079269A1 (de)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030210429A1 (en) * 2002-05-10 2003-11-13 Canon Kabushiki Kaisha Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program
US20060069646A1 (en) * 2004-09-28 2006-03-30 Yoshinori Matsumoto Method of controlling a terminal device
US20070011094A1 (en) * 2005-07-05 2007-01-11 Xerox Corporation Tools for accessing digital works
US20070177188A1 (en) * 2006-01-27 2007-08-02 Sbc Knowledge Ventures, L.P. Methods and systems to process an image
EP1855225A1 (de) * 2006-05-09 2007-11-14 Ricoh Company, Ltd. Computergerät
US20080301003A1 (en) * 2007-05-31 2008-12-04 Daniel Harkabi System for Online Buying
US20090138109A1 (en) * 2007-11-06 2009-05-28 Lg Electronics Inc. Apparatus providing function to delete files and method for deleting files thereof
US8532978B1 (en) * 2008-10-31 2013-09-10 Afrl/Rij Natural language interface, compiler and de-compiler for security policies
US8819290B2 (en) 2009-10-23 2014-08-26 Zte Corporation Method and system for transmitting compressed rights
US20150379512A1 (en) * 2013-02-22 2015-12-31 Op-Palvelut Oy Communication during payment procedure
US9589124B2 (en) 2014-05-29 2017-03-07 Comcast Cable Communications, Llc Steganographic access controls
US20170310725A1 (en) * 2003-10-16 2017-10-26 Gula Consulting Limited Liability Company Electronic media distribution system

Families Citing this family (111)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7788602B2 (en) 2000-06-06 2010-08-31 Microsoft Corporation Method and system for providing restricted actions for recognized semantic categories
US7716163B2 (en) 2000-06-06 2010-05-11 Microsoft Corporation Method and system for defining semantic categories and actions
US7770102B1 (en) 2000-06-06 2010-08-03 Microsoft Corporation Method and system for semantically labeling strings and providing actions based on semantically labeled strings
US7712024B2 (en) 2000-06-06 2010-05-04 Microsoft Corporation Application program interfaces for semantically labeling strings and providing actions based on semantically labeled strings
US9038108B2 (en) 2000-06-28 2015-05-19 Verizon Patent And Licensing Inc. Method and system for providing end user community functionality for publication and delivery of digital media content
JP4774582B2 (ja) * 2000-06-30 2011-09-14 ソニー株式会社 コンテンツ管理装置、コンテンツ管理方法及びプログラム格納媒体
US7778816B2 (en) 2001-04-24 2010-08-17 Microsoft Corporation Method and system for applying input mode bias
US8972862B2 (en) * 2001-06-27 2015-03-03 Verizon Patent And Licensing Inc. Method and system for providing remote digital media ingest with centralized editorial control
US8990214B2 (en) 2001-06-27 2015-03-24 Verizon Patent And Licensing Inc. Method and system for providing distributed editing and storage of digital media over a network
US7970260B2 (en) 2001-06-27 2011-06-28 Verizon Business Global Llc Digital media asset management system and method for supporting multiple users
KR100703521B1 (ko) * 2002-03-14 2007-04-03 콘텐트가드 홀딩즈 인코포레이티드 사용권리 표현을 처리하기 위한 방법 및 장치
US7707496B1 (en) 2002-05-09 2010-04-27 Microsoft Corporation Method, system, and apparatus for converting dates between calendars and languages based upon semantically labeled strings
US7707024B2 (en) 2002-05-23 2010-04-27 Microsoft Corporation Method, system, and apparatus for converting currency values based upon semantically labeled strings
US7742048B1 (en) 2002-05-23 2010-06-22 Microsoft Corporation Method, system, and apparatus for converting numbers based upon semantically labeled strings
MXPA04012119A (es) * 2002-06-03 2005-04-19 Contentguard Holdings Inc Sistema y metodo para proveer y administrar expresiones de derechos.
US7827546B1 (en) 2002-06-05 2010-11-02 Microsoft Corporation Mechanism for downloading software components from a remote source for use by a local software application
US7356537B2 (en) 2002-06-06 2008-04-08 Microsoft Corporation Providing contextually sensitive tools and help content in computer-generated documents
US7716676B2 (en) 2002-06-25 2010-05-11 Microsoft Corporation System and method for issuing a message to a program
US7392479B2 (en) * 2002-06-27 2008-06-24 Microsoft Corporation System and method for providing namespace related information
US7502945B2 (en) * 2002-06-28 2009-03-10 Microsoft Corporation Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system
US7209915B1 (en) 2002-06-28 2007-04-24 Microsoft Corporation Method, system and apparatus for routing a query to one or more providers
FR2848054A1 (fr) * 2002-11-29 2004-06-04 France Telecom Systeme et procede de transmission d'informations associes a des droits d'utilisation
US8131649B2 (en) * 2003-02-07 2012-03-06 Igware, Inc. Static-or-dynamic and limited-or-unlimited content rights
US20100017627A1 (en) 2003-02-07 2010-01-21 Broadon Communications Corp. Ensuring authenticity in a closed content distribution system
US20040267384A1 (en) * 2003-02-07 2004-12-30 Broadon Communications, Inc. Integrated console and controller
US7779482B1 (en) 2003-02-07 2010-08-17 iGware Inc Delivery of license information using a short messaging system protocol in a closed content distribution system
US7322042B2 (en) 2003-02-07 2008-01-22 Broadon Communications Corp. Secure and backward-compatible processor and secure software execution thereon
US7783614B2 (en) 2003-02-13 2010-08-24 Microsoft Corporation Linking elements of a document to corresponding fields, queries and/or procedures in a database
US7711550B1 (en) 2003-04-29 2010-05-04 Microsoft Corporation Methods and system for recognizing names in a computer-generated document and for providing helpful actions associated with recognized names
US9553879B2 (en) * 2003-06-06 2017-01-24 Core Wireless Licensing S.A.R.L. Method and apparatus to represent and use rights for content/media adaptation/transformation
US7653936B2 (en) * 2003-06-25 2010-01-26 Microsoft Corporation Distributed expression-based access control
US7739588B2 (en) 2003-06-27 2010-06-15 Microsoft Corporation Leveraging markup language data for semantically labeling text strings and data and for providing actions based on semantically labeled text strings and data
US6898555B2 (en) * 2003-07-14 2005-05-24 Aladdin Knowledge Systems Ltd. Method for indicating the integrity of use-information of a computer program
US7813000B2 (en) * 2003-12-30 2010-10-12 Microsoft Corporation Device color characterization profile format
JP4333494B2 (ja) * 2004-06-17 2009-09-16 ソニー株式会社 コンテンツ再生装置,コンテンツ再生方法,コンテンツ管理装置,コンテンツ管理方法およびコンピュータプログラム。
GB0413848D0 (en) 2004-06-21 2004-07-21 British Broadcasting Corp Accessing broadcast media
KR100608585B1 (ko) * 2004-07-12 2006-08-03 삼성전자주식회사 이동형 저장 장치에서 객체의 위치 정보를 이용하여 권리객체를 검색하는 방법 및 장치
AU2005263103B2 (en) * 2004-07-12 2008-06-19 Samsung Electronics Co., Ltd. Apparatus and method for processing digital rights object
US8402283B1 (en) 2004-08-02 2013-03-19 Nvidia Corporation Secure content enabled drive system and method
US8359332B1 (en) * 2004-08-02 2013-01-22 Nvidia Corporation Secure content enabled drive digital rights management system and method
US7664751B2 (en) 2004-09-30 2010-02-16 Google Inc. Variable user interface based on document access privileges
US7603355B2 (en) 2004-10-01 2009-10-13 Google Inc. Variably controlling access to content
US20060150153A1 (en) * 2004-12-04 2006-07-06 Micah Altman Digital object verification method
US8788425B1 (en) 2004-12-15 2014-07-22 Nvidia Corporation Method and system for accessing content on demand
US8875309B1 (en) 2004-12-15 2014-10-28 Nvidia Corporation Content server and method of providing content therefrom
US8346807B1 (en) 2004-12-15 2013-01-01 Nvidia Corporation Method and system for registering and activating content
US8751825B1 (en) 2004-12-15 2014-06-10 Nvidia Corporation Content server and method of storing content
US20060225055A1 (en) * 2005-03-03 2006-10-05 Contentguard Holdings, Inc. Method, system, and device for indexing and processing of expressions
US7526812B2 (en) * 2005-03-24 2009-04-28 Xerox Corporation Systems and methods for manipulating rights management data
DE102005015113A1 (de) * 2005-04-01 2006-10-05 Siemens Ag Verfahren zur Verwaltung von Nutzungsrechten an elektronischen Datenobjekten durch einen Rechteerwerber
US8893299B1 (en) 2005-04-22 2014-11-18 Nvidia Corporation Content keys for authorizing access to content
US8245051B2 (en) * 2005-05-13 2012-08-14 Microsoft Corporation Extensible account authentication system
DE102005033698A1 (de) * 2005-07-19 2007-02-01 Siemens Ag Verfahren zum Export von Nutzungsrechten an elektronischen Datenobjekten
US7565358B2 (en) * 2005-08-08 2009-07-21 Google Inc. Agent rank
US9401080B2 (en) 2005-09-07 2016-07-26 Verizon Patent And Licensing Inc. Method and apparatus for synchronizing video frames
US9076311B2 (en) 2005-09-07 2015-07-07 Verizon Patent And Licensing Inc. Method and apparatus for providing remote workflow management
US7992085B2 (en) 2005-09-26 2011-08-02 Microsoft Corporation Lightweight reference user interface
US7788590B2 (en) 2005-09-26 2010-08-31 Microsoft Corporation Lightweight reference user interface
EP1929685A4 (de) * 2005-09-29 2011-12-21 Contentguard Holdings Inc System und verfahren zur digitalen rechteverwaltung unter verwendung einer vorauskopie mit ausgaberechten und verwaltete kopie-token
KR100746014B1 (ko) * 2005-11-09 2007-08-06 삼성전자주식회사 디지털 저작권 관리 방법 및 시스템
US7921059B2 (en) * 2005-12-15 2011-04-05 Microsoft Corporation Licensing upsell
US20070143228A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Licensing matrix
WO2007120360A2 (en) 2005-12-29 2007-10-25 Blue Jungle Information management system
US20070156601A1 (en) * 2006-01-03 2007-07-05 International Business Machines Corporation Method and system for providing interoperability between digital rights management systems
US20070219908A1 (en) * 2006-03-02 2007-09-20 Yahoo! Inc. Providing syndicated media to authorized users
US8364965B2 (en) 2006-03-15 2013-01-29 Apple Inc. Optimized integrity verification procedures
US20070255659A1 (en) * 2006-05-01 2007-11-01 Wei Yen System and method for DRM translation
WO2007130554A2 (en) 2006-05-02 2007-11-15 Broadon Communications Corp. Content management system and method
US7603350B1 (en) 2006-05-09 2009-10-13 Google Inc. Search result ranking based on trust
US7624276B2 (en) * 2006-10-16 2009-11-24 Broadon Communications Corp. Secure device authentication system and method
US7613915B2 (en) * 2006-11-09 2009-11-03 BroadOn Communications Corp Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed
US8200961B2 (en) * 2006-11-19 2012-06-12 Igware, Inc. Securing a flash memory block in a secure device system and method
CN101246527B (zh) * 2007-02-15 2011-07-20 华为技术有限公司 提供、使用版权描述的方法及系统
US20090006109A1 (en) * 2007-06-28 2009-01-01 Yahoo! Inc. Rights Engine Including Event Logs
US8117094B2 (en) * 2007-06-29 2012-02-14 Microsoft Corporation Distribution channels and monetizing
US9412125B2 (en) 2007-09-12 2016-08-09 Sony Corporation Open market content distribution
US20090094147A1 (en) * 2007-10-09 2009-04-09 Fein Gene S Multi-Computer Data Transfer and Processing to Support Electronic Content Clearance and Licensing
US20090132422A1 (en) * 2007-11-21 2009-05-21 Microsoft Corporation Machine-readable and enforceable license
US20090132435A1 (en) * 2007-11-21 2009-05-21 Microsoft Corporation Popularity based licensing of user generated content
US20090132403A1 (en) * 2007-11-21 2009-05-21 Microsoft Corporation Licensing interface for user generated content
US20090210333A1 (en) * 2008-02-14 2009-08-20 Microsoft Corporation Micro-licensing of composite content
US8875013B2 (en) * 2008-03-25 2014-10-28 International Business Machines Corporation Multi-pass validation of extensible markup language (XML) documents
US20090254482A1 (en) * 2008-04-07 2009-10-08 Microsoft Corporation Time-based licenses
US8655826B1 (en) 2008-08-01 2014-02-18 Motion Picture Laboratories, Inc. Processing and acting on rules for content recognition systems
EP2164022A1 (de) * 2008-09-02 2010-03-17 Siemens Aktiengesellschaft Verfahren zur Einräumung einer Zugriffsberechtigung auf ein rechnerbasiertes Objekt in einem Automatisierungssystem, Computerprogramm und Automatisierungssystem
US20100174818A1 (en) * 2009-01-07 2010-07-08 Microsoft Corporation Input Service for Client Devices
US8606792B1 (en) 2010-02-08 2013-12-10 Google Inc. Scoring authors of posts
US9244965B2 (en) * 2010-02-22 2016-01-26 Thoughtwire Holdings Corp. Method and system for sharing data between software systems
US10657507B2 (en) * 2010-05-17 2020-05-19 Adobe Inc. Migration between digital rights management systems without content repackaging
FR2980865A1 (fr) * 2011-09-29 2013-04-05 France Telecom Procede de distribution de contenus, dispositif d'obtention et programme d'ordinateur correspondant
US9081974B2 (en) * 2011-11-10 2015-07-14 Microsoft Technology Licensing, Llc User interface for selection of multiple accounts and connection points
US20130144755A1 (en) * 2011-12-01 2013-06-06 Microsoft Corporation Application licensing authentication
US8725650B2 (en) * 2012-01-26 2014-05-13 Microsoft Corporation Document template licensing
US9172711B2 (en) * 2012-02-13 2015-10-27 PivotCloud, Inc. Originator publishing an attestation of a statement
US8627097B2 (en) 2012-03-27 2014-01-07 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes
US9177158B2 (en) * 2012-11-07 2015-11-03 Theplatform, Llc Methods and systems for processing content rights
JP6003699B2 (ja) * 2013-02-08 2016-10-05 富士通株式会社 テストデータ生成プログラム、方法及び装置
US10313433B2 (en) 2013-03-14 2019-06-04 Thoughtwire Holdings Corp. Method and system for registering software systems and data-sharing sessions
US9742843B2 (en) 2013-03-14 2017-08-22 Thoughtwire Holdings Corp. Method and system for enabling data sharing between software systems
US10372442B2 (en) 2013-03-14 2019-08-06 Thoughtwire Holdings Corp. Method and system for generating a view incorporating semantically resolved data values
US10523490B2 (en) * 2013-08-06 2019-12-31 Agilepq, Inc. Authentication of a subscribed code table user utilizing optimized code table signaling
US9319727B2 (en) 2013-10-29 2016-04-19 Fx Networks, Llc Viewer-authored content acquisition and management system for in-the-moment broadcast in conjunction with media programs
US9305000B1 (en) * 2014-03-27 2016-04-05 Veritas Us Ip Holdings Llc Creating and publishing service level representations of applications from operational representations
US10056919B2 (en) 2014-07-02 2018-08-21 Agilepq, Inc. Data recovery utilizing optimized code table signaling
US9984110B2 (en) 2014-08-21 2018-05-29 Dropbox, Inc. Multi-user search system with methodology for personalized search query autocomplete
US9183303B1 (en) 2015-01-30 2015-11-10 Dropbox, Inc. Personal content item searching system and method
US9384226B1 (en) 2015-01-30 2016-07-05 Dropbox, Inc. Personal content item searching system and method
AU2017278253A1 (en) 2016-06-06 2019-01-24 Agilepq, Inc. Data conversion systems and methods
SG10201806847PA (en) * 2018-08-13 2020-03-30 Mastercard International Inc Methods and systems for facilitating migration to centralized compliance content for integration with a plurality of digital applications
EP4055498A4 (de) * 2019-09-05 2024-05-15 Open Lens Project Ltd. System und verfahren zur verwaltung von digitalen medieninhalten
CN117478427B (zh) * 2023-12-26 2024-04-02 广东省能源集团贵州有限公司 网络安全数据处理方法及系统

Citations (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5091966A (en) * 1990-07-31 1992-02-25 Xerox Corporation Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes
US5128525A (en) * 1990-07-31 1992-07-07 Xerox Corporation Convolution filtering for decoding self-clocking glyph shape codes
US5168147A (en) * 1990-07-31 1992-12-01 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes
US5221833A (en) * 1991-12-27 1993-06-22 Xerox Corporation Methods and means for reducing bit error rates in reading self-clocking glyph codes
US5245165A (en) * 1991-12-27 1993-09-14 Xerox Corporation Self-clocking glyph code for encoding dual bit digital values robustly
US5438508A (en) * 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US5444779A (en) * 1993-10-18 1995-08-22 Xerox Corporation Electronic copyright royalty accounting system using glyphs
US5449896A (en) * 1993-12-22 1995-09-12 Xerox Corporation Random access techniques for use with self-clocking glyph codes
US5449895A (en) * 1993-12-22 1995-09-12 Xerox Corporation Explicit synchronization for self-clocking glyph codes
US5453605A (en) * 1993-12-22 1995-09-26 Xerox Corporation Global addressability for self-clocking glyph codes
US5521372A (en) * 1993-12-22 1996-05-28 Xerox Corporation Framing codes for robust synchronization and addressing of self-clocking glyph codes
US5530235A (en) * 1995-02-16 1996-06-25 Xerox Corporation Interactive contents revealing storage device
US5576532A (en) * 1995-01-03 1996-11-19 Xerox Corporation Interleaved and interlaced sync codes and address codes for self-clocking glyph codes
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5684885A (en) * 1995-09-27 1997-11-04 Xerox Corporation Binary glyph codes based on color relationships
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5745569A (en) * 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US5864127A (en) * 1996-10-10 1999-01-26 Xerox Corporation Analog glyph detector and detector arrays
US6000613A (en) * 1991-12-27 1999-12-14 Xerox Corporation Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values
US6076738A (en) * 1990-07-31 2000-06-20 Xerox Corporation Self-clocking glyph shape codes
US6182901B1 (en) * 1993-12-22 2001-02-06 Xerox Corporation Orientational disambiguation for self-clocking glyph codes
US6208771B1 (en) * 1996-12-20 2001-03-27 Xerox Parc Methods and apparatus for robust decoding of glyph address carpets
US6233684B1 (en) * 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US6236971B1 (en) * 1994-11-23 2001-05-22 Contentguard Holdings, Inc. System for controlling the distribution and use of digital works using digital tickets
US6253193B1 (en) * 1995-02-13 2001-06-26 Intertrust Technologies Corporation Systems and methods for the secure transaction management and electronic rights protection
US6311214B1 (en) * 1995-07-27 2001-10-30 Digimarc Corporation Linking of computers based on optical sensing of digital data
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6544294B1 (en) * 1999-05-27 2003-04-08 Write Brothers, Inc. Method and apparatus for creating, editing, and displaying works containing presentation metric components utilizing temporal relationships and structural tracks

Family Cites Families (232)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2258112A5 (de) 1973-11-30 1975-08-08 Honeywell Bull Soc Ind
CH624877A5 (de) 1977-05-13 1981-08-31 Idc Chemie Ag
US4278837A (en) 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4159468A (en) 1977-11-17 1979-06-26 Burroughs Corporation Communications line authentication device
GB2022969B (en) 1978-04-12 1982-06-09 Data Recall Ltd Video display control apparatus
US4361851A (en) 1980-01-04 1982-11-30 Asip William F System for remote monitoring and data transmission over non-dedicated telephone lines
AU556499B2 (en) 1981-05-22 1986-11-06 Data General Corporation Data processing system
US4423287A (en) 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4429385A (en) 1981-12-31 1984-01-31 American Newspaper Publishers Association Method and apparatus for digital serial scanning with hierarchical and relational access
US4578531A (en) 1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus
US4736422A (en) 1983-06-30 1988-04-05 Independent Broadcasting Authority Encrypted broadcast television system
US4658093A (en) 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4652990A (en) 1983-10-27 1987-03-24 Remote Systems, Inc. Protected software access control apparatus and method
US4740890A (en) 1983-12-22 1988-04-26 Software Concepts, Inc. Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
US4621321A (en) 1984-02-16 1986-11-04 Honeywell Inc. Secure data processing system architecture
LU86203A1 (fr) 1985-12-11 1987-07-24 Cen Centre Energie Nucleaire Procede et appareil verifiant l'authenticite de documents lies a une personne et l'identite de leurs porteurs
US5319710A (en) 1986-08-22 1994-06-07 Tandem Computers Incorporated Method and means for combining and managing personal verification and message authentication encrytions for network transmission
DE3782780T2 (de) 1986-08-22 1993-06-09 Nippon Electric Co Schluesselverteilungsverfahren.
US5014234A (en) 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
JPH087720B2 (ja) 1986-09-16 1996-01-29 富士通株式会社 複数サービス用icカードの領域アクセス方法
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5109413A (en) 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
EP0268139A3 (de) 1986-11-05 1991-04-10 International Business Machines Corporation Behandlung von Ausführungsrechten mit Bezug auf einen Softwarekopierschutzmechanismus
US4796220A (en) 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US5390297A (en) 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US4937863A (en) 1988-03-07 1990-06-26 Digital Equipment Corporation Software licensing management system
US5247575A (en) 1988-08-16 1993-09-21 Sprague Peter J Information distribution system
US4888638A (en) 1988-10-11 1989-12-19 A. C. Nielsen Company System for substituting television programs transmitted via telephone lines
US4953209A (en) 1988-10-31 1990-08-28 International Business Machines Corp. Self-verifying receipt and acceptance system for electronically delivered data objects
US4956863A (en) 1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication
US5129083A (en) 1989-06-29 1992-07-07 Digital Equipment Corporation Conditional object creating system having different object pointers for accessing a set of data structure objects
JP2870027B2 (ja) 1989-07-31 1999-03-10 日本電気株式会社 アイコンの複数選択による一括処理方式
US5138712A (en) 1989-10-02 1992-08-11 Sun Microsystems, Inc. Apparatus and method for licensing software on a network of computers
GB9004901D0 (en) 1990-03-05 1990-05-02 Space Communications Sat Tel L Television scrambler
EP0450841B1 (de) 1990-03-29 1996-08-21 Gte Laboratories Incorporated Überwachungssystem für die Übertragung von Videosignalen
US5174641A (en) 1990-07-25 1992-12-29 Massachusetts Institute Of Technology Video encoding method for television applications
US5058162A (en) 1990-08-09 1991-10-15 Hewlett-Packard Company Method of distributing computer data files
JPH05134957A (ja) 1990-10-10 1993-06-01 Fuji Xerox Co Ltd データ管理システム
JP3047116B2 (ja) 1990-11-15 2000-05-29 喜也 丸本 情報配給方式
DE69228350T2 (de) 1991-05-08 1999-09-23 Digital Equipment Corp., Maynard Verwaltungssschnittstelle und format für lizenzverwaltungssystem
AU2247092A (en) 1991-05-08 1992-12-21 Digital Equipment Corporation License management system
WO1992022029A1 (en) * 1991-05-24 1992-12-10 British Technology Group Usa, Inc. Optimizing compiler for computers
US5204897A (en) * 1991-06-28 1993-04-20 Digital Equipment Corporation Management interface for license management system
US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system
US5940504A (en) 1991-07-01 1999-08-17 Infologic Software, Inc. Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
JPH05100939A (ja) 1991-07-31 1993-04-23 Fuji Xerox Co Ltd フアイルシステム
US5142578A (en) 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
US5276444A (en) 1991-09-23 1994-01-04 At&T Bell Laboratories Centralized security control system
US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5557518A (en) 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
WO1993011480A1 (en) 1991-11-27 1993-06-10 Intergraph Corporation System and method for network license administration
JP3185806B2 (ja) 1991-12-13 2001-07-11 ソニー株式会社 ハイビジョン信号の記録エンコード方法
DE69330946D1 (de) 1992-01-08 2001-11-22 Broadband Innovations Inc Mehrkanal-fernsehsignal ver- und entschlüsselungssystem und -verfahren
JP2659896B2 (ja) 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション 構造化文書複製管理方法及び構造化文書複製管理装置
US5412717A (en) 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5237611A (en) 1992-07-23 1993-08-17 Crest Industries, Inc. Encryption/decryption apparatus with non-accessible table of keys
US5287408A (en) 1992-08-31 1994-02-15 Autodesk, Inc. Apparatus and method for serializing and validating copies of computer software
US5293422A (en) 1992-09-23 1994-03-08 Dynatek, Inc. Usage control system for computer software
JP3358627B2 (ja) 1992-10-16 2002-12-24 ソニー株式会社 情報記録再生装置
US5414852A (en) 1992-10-30 1995-05-09 International Business Machines Corporation Method for protecting data in a computer system
GB9303595D0 (en) 1993-02-23 1993-04-07 Int Computers Ltd Licence management mechanism for a computer system
US5337357A (en) 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection
US5386369A (en) 1993-07-12 1995-01-31 Globetrotter Software Inc. License metering system for software applications
JPH0736768A (ja) 1993-07-15 1995-02-07 Matsushita Electric Ind Co Ltd 電子ファイル装置
US6135646A (en) 1993-10-22 2000-10-24 Corporation For National Research Initiatives System for uniquely and persistently identifying, managing, and tracking digital objects
US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5495411A (en) 1993-12-22 1996-02-27 Ananda; Mohan Secure software rental system using continuous asynchronous password verification
US5504816A (en) 1994-02-02 1996-04-02 Gi Corporation Method and apparatus for controlling access to digital signals
US5553143A (en) 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing
US5787172A (en) 1994-02-24 1998-07-28 The Merdan Group, Inc. Apparatus and method for establishing a cryptographic link between elements of a system
US5563946A (en) 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5799087A (en) 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
US5636346A (en) 1994-05-09 1997-06-03 The Electronic Address, Inc. Method and system for selectively targeting advertisements and programming
US5564038A (en) 1994-05-20 1996-10-08 International Business Machines Corporation Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period
US5477263A (en) 1994-05-26 1995-12-19 Bell Atlantic Network Services, Inc. Method and apparatus for video on demand with fast forward, reverse and channel pause
US5694546A (en) 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
EP0690399A3 (de) 1994-06-30 1997-05-02 Tandem Computers Inc System für fernbediente finanzielle Transaktionen
US5535276A (en) 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5557678A (en) 1994-07-18 1996-09-17 Bell Atlantic Network Services, Inc. System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5838792A (en) 1994-07-18 1998-11-17 Bell Atlantic Network Services, Inc. Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
JPH0854951A (ja) 1994-08-10 1996-02-27 Fujitsu Ltd ソフトウェア使用量管理装置
US5737420A (en) 1994-09-07 1998-04-07 Mytec Technologies Inc. Method for secure data transmission between remote stations
US6189037B1 (en) 1994-09-30 2001-02-13 Intel Corporation Broadband data interface
US5640592A (en) * 1994-09-30 1997-06-17 Mitsubishi Kasei America, Inc. System for transferring utility algorithm stored within a peripheral device to a host computer in a format compatible with the type of the host computer
FI100137B (fi) 1994-10-28 1997-09-30 Vazvan Simin Reaaliaikainen langaton telemaksujärjestelmä
US5727065A (en) 1994-11-14 1998-03-10 Hughes Electronics Deferred billing, broadcast, electronic document distribution system and method
US6963859B2 (en) 1994-11-23 2005-11-08 Contentguard Holdings, Inc. Content rendering repository
JP4386898B2 (ja) 1994-12-13 2009-12-16 インターシア ソフトウェア エルエルシー 暗号鍵システム
US5485577A (en) 1994-12-16 1996-01-16 General Instrument Corporation Of Delaware Method and apparatus for incremental delivery of access rights
SE504085C2 (sv) 1995-02-01 1996-11-04 Greg Benson Sätt och system för att hantera dataobjekt i enlighet med förutbestämda villkor för användare
US5943422A (en) * 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5632681A (en) 1995-03-07 1997-05-27 International Business Machines Corporation Universal electronic video game renting/distributing system
US6157719A (en) 1995-04-03 2000-12-05 Scientific-Atlanta, Inc. Conditional access system
US6246767B1 (en) 1995-04-03 2001-06-12 Scientific-Atlanta, Inc. Source authentication of download information in a conditional access system
US6424717B1 (en) 1995-04-03 2002-07-23 Scientific-Atlanta, Inc. Encryption devices for use in a conditional access system
JPH08286927A (ja) * 1995-04-18 1996-11-01 Hitachi Ltd アセンブラ処理方式
US5717604A (en) 1995-05-25 1998-02-10 Wiggins; Christopher Network monitoring system for tracking, billing and recovering licenses
US5790677A (en) 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
FR2736783B1 (fr) 1995-07-13 1997-08-14 Thomson Multimedia Sa Procede et appareil d'enregistrement et de lecture avec un support d'enregistrement de grande capacite
US5764807A (en) 1995-09-14 1998-06-09 Primacomp, Inc. Data compression using set partitioning in hierarchical trees
KR0166923B1 (ko) 1995-09-18 1999-03-20 구자홍 디지탈 방송 시스템의 불법 시청 및 복사 방지방법 및 장치
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US6279112B1 (en) 1996-10-29 2001-08-21 Open Market, Inc. Controlled transfer of information in computer networks
US5825876A (en) 1995-12-04 1998-10-20 Northern Telecom Time based availability to content of a storage medium
US5708709A (en) 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
EP0880840A4 (de) 1996-01-11 2002-10-23 Mrj Inc Vorrichtung zur steuerung des zugriffs und der verteilung von digitalem eigentum
US5870475A (en) 1996-01-19 1999-02-09 Northern Telecom Limited Facilitating secure communications in a distribution network
US5848378A (en) 1996-02-07 1998-12-08 The International Weather Network System for collecting and presenting real-time weather information on multiple media
US5987134A (en) 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
AU1317597A (en) 1996-03-18 1997-10-10 News Datacom Limited Smart card chaining in pay television systems
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
ES2150243T3 (es) 1996-04-01 2000-11-16 Macrovision Corp Un metodo y un aparato para proporcionar una proteccion contra copias de material de señal transmitido a traves de redes de entrega digitales a un terminal descodificador de consumidor.
US5751813A (en) 1996-04-29 1998-05-12 Motorola, Inc. Use of an encryption server for encrypting messages
US5850433A (en) 1996-05-01 1998-12-15 Sprint Communication Co. L.P. System and method for providing an on-line directory service
WO1997043761A2 (en) 1996-05-15 1997-11-20 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US5812398A (en) * 1996-06-10 1998-09-22 Sun Microsystems, Inc. Method and system for escrowed backup of hotelled world wide web sites
JP2810033B2 (ja) 1996-07-08 1998-10-15 村越 弘昌 稼働管理システム及び稼働管理方法
US5850443A (en) 1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments
FR2752655B1 (fr) 1996-08-20 1998-09-18 France Telecom Procede et equipement pour affecter a un programme de television deja en acces conditionnel un acces conditionnel complementaire
GB2316503B (en) 1996-08-22 2000-11-15 Icl Personal Systems Oy Software licence management
US5812664A (en) 1996-09-06 1998-09-22 Pitney Bowes Inc. Key distribution system
US5850444A (en) 1996-09-09 1998-12-15 Telefonaktienbolaget L/M Ericsson (Publ) Method and apparatus for encrypting radio traffic in a telecommunications network
US6052780A (en) 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US5825879A (en) 1996-09-30 1998-10-20 Intel Corporation System and method for copy-protecting distributed video content
US6006332A (en) 1996-10-21 1999-12-21 Case Western Reserve University Rights management system for digital media
JPH10133955A (ja) 1996-10-29 1998-05-22 Matsushita Electric Ind Co Ltd 可搬型メディア駆動装置とその方法、及び可搬型メディアとネットワークの連携装置とその方法
US6108372A (en) 1996-10-30 2000-08-22 Qualcomm Inc. Method and apparatus for decoding variable rate data using hypothesis testing to determine data rate
CN1482542A (zh) 1997-01-27 2004-03-17 �ʼҷ����ֵ������޹�˾ 传递内容信息和与其相关的附加信息的方法和系统
GB9703193D0 (en) 1997-02-15 1997-04-02 Philips Electronics Nv Television
US7062500B1 (en) * 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
BR9714601A (pt) 1997-03-21 2002-09-10 Canal Plus Sa Sistema de difusão e recepção e sistema de acesso condicional para o mesmo
US6108420A (en) 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
WO1998051036A1 (en) 1997-05-07 1998-11-12 Neomedia Technologies, Inc. Scanner enhanced remote control unit and system for automatically linking to on-line resources
JP3613929B2 (ja) 1997-05-07 2005-01-26 富士ゼロックス株式会社 アクセス資格認証装置および方法
US6112239A (en) 1997-06-18 2000-08-29 Intervu, Inc System and method for server-side optimization of data delivery on a distributed computer network
GB9714227D0 (en) 1997-07-04 1997-09-10 British Telecomm A method of scheduling calls
JP3613936B2 (ja) 1997-07-07 2005-01-26 富士ゼロックス株式会社 アクセス資格認証装置
JPH1131130A (ja) 1997-07-10 1999-02-02 Fuji Xerox Co Ltd サービス提供装置
JP3641909B2 (ja) 1997-07-14 2005-04-27 富士ゼロックス株式会社 証明データ生成装置
US6584565B1 (en) 1997-07-15 2003-06-24 Hewlett-Packard Development Company, L.P. Method and apparatus for long term verification of digital signatures
JP2003521820A (ja) 1997-08-01 2003-07-15 サイエンティフィック−アトランタ, インコーポレイテッド 条件付きアクセスシステム
JP2001512842A (ja) 1997-08-01 2001-08-28 サイエンティフィック−アトランタ・インコーポレーテッド 条件付きアクセスシステムにおいて使用される暗号化装置
EA002737B1 (ru) 1997-08-05 2002-08-29 Эникс Корпорейшн Система идентификации отпечатков пальцев
JP3671611B2 (ja) 1997-08-05 2005-07-13 富士ゼロックス株式会社 アクセス資格認証装置および方法
JP3622433B2 (ja) 1997-08-05 2005-02-23 富士ゼロックス株式会社 アクセス資格認証装置および方法
US6091777A (en) 1997-09-18 2000-07-18 Cubic Video Technologies, Inc. Continuously adaptive digital video compression system and method for a web streamer
IL121862A (en) 1997-09-29 2005-07-25 Nds Ltd West Drayton Distributed ird system for pay television systems
US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6044466A (en) 1997-11-25 2000-03-28 International Business Machines Corp. Flexible and dynamic derivation of permissions
US6141754A (en) 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US6084969A (en) 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
US6304658B1 (en) 1998-01-02 2001-10-16 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
JPH11205306A (ja) 1998-01-16 1999-07-30 Fuji Xerox Co Ltd 認証装置および認証方法
JP3791169B2 (ja) 1998-01-29 2006-06-28 富士ゼロックス株式会社 認証装置および方法
JP4113274B2 (ja) 1998-02-05 2008-07-09 富士ゼロックス株式会社 認証装置および方法
EP0934765A1 (de) 1998-02-09 1999-08-11 CANAL+ Société Anonyme Interaktives Spielsystem
JP3867388B2 (ja) 1998-02-12 2007-01-10 富士ゼロックス株式会社 条件付き認証装置および方法
CA2323781C (en) 1998-03-16 2004-06-01 Intertrust Technologies Corporation Methods and apparatus for continuous control and protection of media content
US6189146B1 (en) 1998-03-18 2001-02-13 Microsoft Corporation System and method for software licensing
US7188358B1 (en) 1998-03-26 2007-03-06 Nippon Telegraph And Telephone Corporation Email access control scheme for communication network using identification concealment mechanism
US6282653B1 (en) 1998-05-15 2001-08-28 International Business Machines Corporation Royalty collection method and system for use of copyrighted digital materials on the internet
FI107984B (fi) 1998-05-20 2001-10-31 Nokia Networks Oy Palvelun luvattoman käytön estäminen
US6216112B1 (en) 1998-05-27 2001-04-10 William H. Fuller Method for software distribution and compensation with replenishable advertisements
JP3125746B2 (ja) * 1998-05-27 2001-01-22 日本電気株式会社 人物像対話装置及び人物像対話プログラムを記録した記録媒体
US6219652B1 (en) 1998-06-01 2001-04-17 Novell, Inc. Network license authentication
EP0964572A1 (de) 1998-06-08 1999-12-15 CANAL+ Société Anonyme Decoder und Sicherheitsmodul für digitales Übertragungssystem
US6169976B1 (en) 1998-07-02 2001-01-02 Encommerce, Inc. Method and apparatus for regulating the use of licensed products
US6865675B1 (en) 1998-07-14 2005-03-08 Koninklijke Philips Electronics N.V. Method and apparatus for use of a watermark and a unique time dependent reference for the purpose of copy protection
US6275531B1 (en) 1998-07-23 2001-08-14 Optivision, Inc. Scalable video coding method and apparatus
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
AU5781599A (en) 1998-08-23 2000-03-14 Open Entertainment, Inc. Transaction system for transporting media files from content provider sources tohome entertainment devices
US6397333B1 (en) 1998-10-07 2002-05-28 Infineon Technologies Ag Copy protection system and method
SG87837A1 (en) * 1998-10-08 2002-04-16 Sony Computer Entertainment Inc Portable toy, portable information terminal, intertainment system, and recording medium
US6327652B1 (en) 1998-10-26 2001-12-04 Microsoft Corporation Loading and identifying a digital rights management operating system
JP2000215165A (ja) 1999-01-26 2000-08-04 Nippon Telegr & Teleph Corp <Ntt> 情報アクセス制御方法および装置と情報アクセス制御プログラムを記録した記録媒体
EP1026898A1 (de) 1999-02-04 2000-08-09 CANAL+ Société Anonyme Verfahren und Vorrichtung zur verschlüsselten Übertragung
US7073063B2 (en) * 1999-03-27 2006-07-04 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like
US6973444B1 (en) 1999-03-27 2005-12-06 Microsoft Corporation Method for interdependently validating a digital content package and a corresponding digital license
US7024393B1 (en) * 1999-03-27 2006-04-04 Microsoft Corporation Structural of digital rights management (DRM) system
CA2368377C (en) 1999-04-07 2007-05-22 Swisscom Mobile Ag Method and system for ordering, loading and using access tickets
US6920567B1 (en) * 1999-04-07 2005-07-19 Viatech Technologies Inc. System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
WO2000062189A2 (en) * 1999-04-12 2000-10-19 Reciprocal, Inc. System and method for data rights management
US6453305B1 (en) 1999-05-21 2002-09-17 Compaq Computer Corporation Method and system for enforcing licenses on an open network
US6536037B1 (en) * 1999-05-27 2003-03-18 Accenture Llp Identification of redundancies and omissions among components of a web based architecture
AU4661700A (en) 1999-06-01 2000-12-18 Cacheflow, Inc. Content delivery system
WO2001003044A1 (en) 1999-07-06 2001-01-11 Transcast International, Inc. Enabling viewers of television systems to participate in auctions
FR2796183B1 (fr) 1999-07-07 2001-09-28 A S K Ticket d'acces sans contact et son procede de fabrication
US6796555B1 (en) 1999-07-19 2004-09-28 Lucent Technologies Inc. Centralized video controller for controlling distribution of video signals
US20020056118A1 (en) 1999-08-27 2002-05-09 Hunter Charles Eric Video and music distribution system
US6289455B1 (en) 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
GB2354102B (en) 1999-09-08 2004-01-14 Barron Mccann Ltd Security system
US6401211B1 (en) 1999-10-19 2002-06-04 Microsoft Corporation System and method of user logon in combination with user authentication for network access
JP2001142720A (ja) * 1999-11-12 2001-05-25 Ricoh Co Ltd コンピュータシステム
US6246797B1 (en) 1999-11-12 2001-06-12 Picsurf, Inc. Picture and video storage management system and method
DE19956359A1 (de) 1999-11-24 2001-05-31 Alcatel Sa Kartenbuchung mittels einer virtuellen Eintrittskarte
US6384829B1 (en) * 1999-11-24 2002-05-07 Fuji Xerox Co., Ltd. Streamlined architecture for embodied conversational characters with reduced message traffic
US6738901B1 (en) 1999-12-15 2004-05-18 3M Innovative Properties Company Smart card controlled internet access
US6996720B1 (en) * 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
KR100544177B1 (ko) * 2000-01-18 2006-01-23 삼성전자주식회사 컴퓨터를 통한 디지털 컨텐츠의 저장 및 재생 기능을구비한 개인 휴대 장치의 제어방법 및 이에 따른 개인휴대장치의 동작방법
JP2001209820A (ja) * 2000-01-25 2001-08-03 Nec Corp 感情表出装置及びプログラムを記録した機械読み取り可能な記録媒体
JP2001294557A (ja) * 2000-02-10 2001-10-23 Nippon Shokubai Co Ltd α,β−不飽和カルボン酸エステル類の製法及び該製法に用いる触媒
CN100527141C (zh) 2000-06-02 2009-08-12 松下电器产业株式会社 记录及回放装置和方法
US7228427B2 (en) * 2000-06-16 2007-06-05 Entriq Inc. Method and system to securely distribute content via a network
US7017189B1 (en) * 2000-06-27 2006-03-21 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US7225231B2 (en) 2000-09-20 2007-05-29 Visto Corporation System and method for transmitting workspace elements across a network
US6922670B2 (en) * 2000-10-24 2005-07-26 Sanyo Electric Co., Ltd. User support apparatus and system using agents
US7209893B2 (en) * 2000-11-30 2007-04-24 Nokia Corporation Method of and a system for distributing electronic content
US20020077984A1 (en) 2000-12-19 2002-06-20 Mark Ireton Enabling protected digital media to be shared between playback devices
US6912294B2 (en) * 2000-12-29 2005-06-28 Contentguard Holdings, Inc. Multi-stage watermarking process and system
US20020099545A1 (en) * 2001-01-24 2002-07-25 Levitt Benjamin J. System, method and computer program product for damage control during large-scale address speech recognition
US6575376B2 (en) * 2001-02-16 2003-06-10 Sybase, Inc. System with improved methodology for providing international address validation
US7580988B2 (en) * 2001-04-05 2009-08-25 Intertrust Technologies Corporation System and methods for managing the distribution of electronic content
US20020157002A1 (en) * 2001-04-18 2002-10-24 Messerges Thomas S. System and method for secure and convenient management of digital electronic content
US8001053B2 (en) 2001-05-31 2011-08-16 Contentguard Holdings, Inc. System and method for rights offering and granting using shared state variables
US7774280B2 (en) 2001-06-07 2010-08-10 Contentguard Holdings, Inc. System and method for managing transfer of rights using shared state variables
US7421411B2 (en) * 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US20030023427A1 (en) * 2001-07-26 2003-01-30 Lionel Cassin Devices, methods and a system for implementing a media content delivery and playback scheme
WO2003014971A2 (en) 2001-08-10 2003-02-20 Cellectivity Limited Web interaction system which enables a mobile telephone to interact with web resources
US20030046274A1 (en) * 2001-08-30 2003-03-06 Erickson John S. Software media container
US7840488B2 (en) * 2001-11-20 2010-11-23 Contentguard Holdings, Inc. System and method for granting access to an item or permission to use an item based on configurable conditions
WO2003044680A1 (en) * 2001-11-20 2003-05-30 Contentguard Holdings, Inc. Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
US7974923B2 (en) * 2001-11-20 2011-07-05 Contentguard Holdings, Inc. Extensible rights expression processing system
JP4477822B2 (ja) * 2001-11-30 2010-06-09 パナソニック株式会社 情報変換装置
US20030126086A1 (en) * 2001-12-31 2003-07-03 General Instrument Corporation Methods and apparatus for digital rights management
US20030158958A1 (en) * 2002-02-20 2003-08-21 Koninklijke Philips Electronics N.V. Distributed storage network architecture using user devices
KR100703521B1 (ko) * 2002-03-14 2007-04-03 콘텐트가드 홀딩즈 인코포레이티드 사용권리 표현을 처리하기 위한 방법 및 장치
WO2004034223A2 (en) 2002-10-09 2004-04-22 Legal Igaming, Inc. System and method for connecting gaming devices to a network for remote play
FR2854870B1 (fr) 2003-05-16 2006-03-24 S2F Flexico Procede et dispositif perfectionnes d'emballage, sachets obtenus et leur application
JP5168039B2 (ja) 2008-09-12 2013-03-21 王子ホールディングス株式会社 感熱記録体

Patent Citations (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5128525A (en) * 1990-07-31 1992-07-07 Xerox Corporation Convolution filtering for decoding self-clocking glyph shape codes
US5168147A (en) * 1990-07-31 1992-12-01 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes
US5091966A (en) * 1990-07-31 1992-02-25 Xerox Corporation Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes
US6076738A (en) * 1990-07-31 2000-06-20 Xerox Corporation Self-clocking glyph shape codes
US5438508A (en) * 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US6000613A (en) * 1991-12-27 1999-12-14 Xerox Corporation Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values
US5221833A (en) * 1991-12-27 1993-06-22 Xerox Corporation Methods and means for reducing bit error rates in reading self-clocking glyph codes
US5245165A (en) * 1991-12-27 1993-09-14 Xerox Corporation Self-clocking glyph code for encoding dual bit digital values robustly
US5444779A (en) * 1993-10-18 1995-08-22 Xerox Corporation Electronic copyright royalty accounting system using glyphs
US5449896A (en) * 1993-12-22 1995-09-12 Xerox Corporation Random access techniques for use with self-clocking glyph codes
US5521372A (en) * 1993-12-22 1996-05-28 Xerox Corporation Framing codes for robust synchronization and addressing of self-clocking glyph codes
US6182901B1 (en) * 1993-12-22 2001-02-06 Xerox Corporation Orientational disambiguation for self-clocking glyph codes
US5449895A (en) * 1993-12-22 1995-09-12 Xerox Corporation Explicit synchronization for self-clocking glyph codes
US5453605A (en) * 1993-12-22 1995-09-26 Xerox Corporation Global addressability for self-clocking glyph codes
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US6236971B1 (en) * 1994-11-23 2001-05-22 Contentguard Holdings, Inc. System for controlling the distribution and use of digital works using digital tickets
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5576532A (en) * 1995-01-03 1996-11-19 Xerox Corporation Interleaved and interlaced sync codes and address codes for self-clocking glyph codes
US6253193B1 (en) * 1995-02-13 2001-06-26 Intertrust Technologies Corporation Systems and methods for the secure transaction management and electronic rights protection
US5530235A (en) * 1995-02-16 1996-06-25 Xerox Corporation Interactive contents revealing storage device
US6311214B1 (en) * 1995-07-27 2001-10-30 Digimarc Corporation Linking of computers based on optical sensing of digital data
US5684885A (en) * 1995-09-27 1997-11-04 Xerox Corporation Binary glyph codes based on color relationships
US5745569A (en) * 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US5864127A (en) * 1996-10-10 1999-01-26 Xerox Corporation Analog glyph detector and detector arrays
US6208771B1 (en) * 1996-12-20 2001-03-27 Xerox Parc Methods and apparatus for robust decoding of glyph address carpets
US6233684B1 (en) * 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US6544294B1 (en) * 1999-05-27 2003-04-08 Write Brothers, Inc. Method and apparatus for creating, editing, and displaying works containing presentation metric components utilizing temporal relationships and structural tracks

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7290031B2 (en) * 2002-05-10 2007-10-30 Canon Kabushiki Kaisha Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program
US20030210429A1 (en) * 2002-05-10 2003-11-13 Canon Kabushiki Kaisha Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program
US10257243B2 (en) * 2003-10-16 2019-04-09 Gula Consulting Limited Liability Company Electronic media distribution system
US20170310725A1 (en) * 2003-10-16 2017-10-26 Gula Consulting Limited Liability Company Electronic media distribution system
US20060069646A1 (en) * 2004-09-28 2006-03-30 Yoshinori Matsumoto Method of controlling a terminal device
US7860801B2 (en) * 2005-07-05 2010-12-28 Xerox Corporation Tools for accessing digital works
US20070011094A1 (en) * 2005-07-05 2007-01-11 Xerox Corporation Tools for accessing digital works
US20070177188A1 (en) * 2006-01-27 2007-08-02 Sbc Knowledge Ventures, L.P. Methods and systems to process an image
US8661348B2 (en) * 2006-01-27 2014-02-25 At&T Intellectual Property I, L.P. Methods and systems to process an image
EP1855225A1 (de) * 2006-05-09 2007-11-14 Ricoh Company, Ltd. Computergerät
US7850084B2 (en) 2006-05-09 2010-12-14 Ricoh Company, Ltd. Computer apparatus
US20070284437A1 (en) * 2006-05-09 2007-12-13 Kensaku Yamamoto Computer apparatus
US20080301003A1 (en) * 2007-05-31 2008-12-04 Daniel Harkabi System for Online Buying
US20090138109A1 (en) * 2007-11-06 2009-05-28 Lg Electronics Inc. Apparatus providing function to delete files and method for deleting files thereof
US8532978B1 (en) * 2008-10-31 2013-09-10 Afrl/Rij Natural language interface, compiler and de-compiler for security policies
US8819290B2 (en) 2009-10-23 2014-08-26 Zte Corporation Method and system for transmitting compressed rights
US20150379512A1 (en) * 2013-02-22 2015-12-31 Op-Palvelut Oy Communication during payment procedure
US9589124B2 (en) 2014-05-29 2017-03-07 Comcast Cable Communications, Llc Steganographic access controls
US10467399B2 (en) 2014-05-29 2019-11-05 Comcast Cable Communications, Llc Steganographic access controls
US11372960B2 (en) 2014-05-29 2022-06-28 Comcast Cable Communications, Llc Steganographic access controls

Also Published As

Publication number Publication date
AU2003225804A8 (en) 2003-09-29
US8108313B2 (en) 2012-01-31
US20040015426A1 (en) 2004-01-22
WO2003077955A1 (en) 2003-09-25
EP1483717A4 (de) 2006-05-24
KR100703521B1 (ko) 2007-04-03
JP2005520254A (ja) 2005-07-07
US20030233169A1 (en) 2003-12-18
US20040019546A1 (en) 2004-01-29
EP1490819A1 (de) 2004-12-29
WO2003079156A2 (en) 2003-09-25
BR0308409A (pt) 2005-02-09
US20080320599A1 (en) 2008-12-25
JP2011150717A (ja) 2011-08-04
AU2003225804A1 (en) 2003-09-29
CN103150492A (zh) 2013-06-12
CN1653462A (zh) 2005-08-10
JP2005532610A (ja) 2005-10-27
EP1483715A1 (de) 2004-12-08
KR100960502B1 (ko) 2010-06-01
KR20040098663A (ko) 2004-11-20
AU2003221995A1 (en) 2003-09-29
CN1653463B (zh) 2013-03-06
EP1488302A2 (de) 2004-12-22
EP1483717A1 (de) 2004-12-08
WO2003077955A9 (en) 2004-04-15
US9626668B2 (en) 2017-04-18
AU2003230651A1 (en) 2003-09-29
KR20040101311A (ko) 2004-12-02
CN1653463A (zh) 2005-08-10
EP1490819A4 (de) 2006-05-31
JP4290565B2 (ja) 2009-07-08
AU2003220269A1 (en) 2003-09-29
WO2003079156A3 (en) 2004-07-01
EP1488302A4 (de) 2005-11-30
US20030233330A1 (en) 2003-12-18
JP4740543B2 (ja) 2011-08-03
WO2003079270A1 (en) 2003-09-25
EP1483715A4 (de) 2006-05-17
US7359884B2 (en) 2008-04-15
CN1653465A (zh) 2005-08-10
AU2003221995A8 (en) 2003-09-29
JP2005520253A (ja) 2005-07-07
KR20040101312A (ko) 2004-12-02
WO2003079269A1 (en) 2003-09-25
JP2013157031A (ja) 2013-08-15

Similar Documents

Publication Publication Date Title
US20030225700A1 (en) System and method for graphical rights expressions
JP4800553B2 (ja) 印刷対象物と関連した適用業務の為の認証用ウォータマーク
EP1312030B1 (de) Authentifizierungswasserzeichen für verpackte produkte
US7770013B2 (en) Digital authentication with digital and analog documents
JP3803378B2 (ja) 機密文書の安全な複製方法
EP1078312B1 (de) Gerät zur erzeugung und gerät zum lesen eines digitalen wasserzeichens sowie methode zur erzeugung und zum lesen eines digitalen wasserzeichens
EP1075757B1 (de) Digitale authentisierung mit analogen dokumenten
US6233684B1 (en) System for controlling the distribution and use of rendered digital works through watermaking
AU2001277147A1 (en) Authentication watermarks for printed objects and related applications
JP2002504272A5 (de)
Kwok et al. Intellectual property protection for electronic commerce applications.
US6674859B1 (en) Device and method for the protected output of electronically transmitted and stored documents
Halyal Digital Libraries and Copyright Issues
Garofalakis et al. Digital robbery; authors are not unprotected
Shaw JISC Technology Applications Programme (JTAP)—Overview of Watermarks, Fingerprints, and Digital Signatures
JP2005535959A (ja) 購入者にとっての潜在的な価値がある情報を含むデジタルコンテンツ及びそれを作成する方法
Kim et al. Technologies for online issuing service of documents
Mishra Deterring Text Document Piracy with Text Watermarking
JP2005535960A (ja) 購入者にとっての潜在的な価値がある情報を含むデジタルコンテンツ及びそれを作成する方法

Legal Events

Date Code Title Description
AS Assignment

Owner name: CONTENTGUARD-HOLDINGS, INC., DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LAO, GUILLERMO;TADAYON, BIJAN;HAM, MANUEL;AND OTHERS;REEL/FRAME:014295/0875;SIGNING DATES FROM 20030602 TO 20030609

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION