US20060265758A1 - Extensible media rights - Google Patents

Extensible media rights Download PDF

Info

Publication number
US20060265758A1
US20060265758A1 US11/134,719 US13471905A US2006265758A1 US 20060265758 A1 US20060265758 A1 US 20060265758A1 US 13471905 A US13471905 A US 13471905A US 2006265758 A1 US2006265758 A1 US 2006265758A1
Authority
US
United States
Prior art keywords
xmr
object
license
container
objects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/134,719
Inventor
Vikas Khandelwal
Eduardo Oliveira
Clifford Van Dyke
Mark VanAntwerp
Clifford Storm
James Alkove
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US11/134,719 priority Critical patent/US20060265758A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VAN DYKE, CLIFFORD P, OLIVEIRA, EDUARDO P, KHANDELWAL, VIKAS, STROM, CLIFFORD PAUL, ALKOVE, JAMES M, VANANTWERP, MARK D
Publication of US20060265758A1 publication Critical patent/US20060265758A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Application status is Abandoned legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Abstract

A DRM System. A DRM system comprising a service provider, a CE device coupled to the service provider, and an XMR license disposed upon the CE device.

Description

    DESCRIPTION OF THE DRAWINGS
  • The present description will be better understood from the following detailed description read in light of the accompanying drawings, wherein:
  • FIG. 1 is a block diagram of a typical digital rights management system utilizing an XMR DRM license.
  • FIG. 2 is a diagram showing an XMR DRM licenses.
  • FIG. 3 is a diagram showing a conventional ASF file.
  • FIG. 4 shows an XMR structure having a header object and an outer container object.
  • FIG. 5 shows the details of an XMR header object.
  • FIG. 6 shows the details of an XMR container object.
  • FIG. 7 is a block diagram showing an exemplary XMR DRM license.
  • FIG. 8 is a block diagram showing a computer processor capable of processing an XMR structure.
  • Like reference numerals are used to designate like parts in the accompanying drawings.
  • DETAILED DESCRIPTION
  • The detailed description provided below of extensible media rights in connection with the appended drawings is intended as a description of the present examples and is not intended to represent the only forms in which the present example may be constructed or utilized. The description sets forth the functions of the example and the sequence of steps for constructing and operating the example. However, the same or equivalent functions and sequences may be accomplished by different examples.
  • Extensible media rights may include a way of constructing a license that is used to govern the use of digital media. Although the present examples of extensible media rights (“XMR”) are described and illustrated herein as being implemented in a license of a digital rights management (“DRM”) system, the DRM system described is provided as an example and not a limitation. As those skilled in the art will appreciate, the present examples are suitable for application in a variety of different types of data exchange systems such as clients and servers.
  • Conventional binary systems that may be used for representing digital rights tend to have limitations. CCI systems utilize two bits and are typically capable of only conveying four states.
  • Extensible Media Rights (“XMR”) typically provide a binary system that may be used to convey media usage rights and restrictions, such as in a license that may be found in a digital rights management (“DRM”) system. The framework established by XMR typically allows extensions to be introduced in a backwards-compatible fashion. XMR typically uses an object framework, nesting structure, and binary representation to convey media usage rights in the form of a license. The format of an XMR license may include some aspects of RIFF and ASF files, both of which may use nested objects or structures that may have systems for providing different types or lengths.
  • FIG. 1 is a block diagram of a typical digital rights management system utilizing an XMR DRM license. Although the present examples are described and illustrated as being implemented in a consumer electronics (“CE”) device system, the system described is provided as an example and not a limitation. CE devices may include pocket PCs, set top boxes, portable media centers, cell phones, music players, PCs, software constructed media players, high fidelity components, and the like. In fact PCs are a common device that may be provided with DRM enabling software to function as a CE device. PCs may be used as docking stations for a user to store content on, and then download some or all of it to another CE device, such as an MP3 player. These CE devices are typically configured to operate in a system that includes the internet, PCs and the like to facilitate license and media content transfer.
  • DRM system 100 typically provides a collection of processes for the secure distribution of multimedia content 110 from a service provider 107 coupled 106 to an insecure channel, such as the Internet 105. Digital media content for viewing or playback would typically include music files, picture files, video files, documents, and other protected content, in short anything that a service provider wishes to transmit securely over an unsecured channel.
  • In particular content may be anything that a provider desires to protect such as music, video, multimedia, pictures and the like. Content is typically regulated to prevent its unauthorized use by providing licenses. Content may be audio, video, textual, encrypted, unencrypted, compressed, uncompressed or otherwise manipulated. In a DRM system the content, (or equivalently media, media files, files, or the like) to be played, can typically be freely transferred. Transfer of encrypted content is typically over unsecured channels such as the internet. In a DRM system the playback of the content is controlled, or allowed, by a license that may be typically stored on a specific CE device. Those skilled in the art will realize that the term “play” as used herein may also be construed to mean consumed, or other equivalent terms that indicate that there are limits placed upon accessing the media file governed by the license. Digital media file 110 is typically encrypted by service provider 107 prior to transmission, and is typically decrypted into an unencrypted media file 109 at the CE device 101 or 103
  • A personal computer 103 may be used to couple 104 to the internet 105 as a CE device. The computer may also be used to transfer content and licenses from the service provider 107 to another more portable consumer electronics device 101 via the path 102 shown. The personal computer and the CE devices may operate utilizing any number of suitable operating systems known to those skilled in the art to implement the desired DRM processes being activated. The instructions for implementing the functions described in this application may exist as software, hardware (for example instructions burned into an ASIC), or a combination of both.
  • The PC may act as a main storage location and have a large number of licenses and media files stored on it. Protocols for transferring information to the PC 103, and to the CE device 101 over paths 102 and 104 may be achieved by conventional connections such as Ethernet, USB, infrared, Bluetooth, MTP and the like. These pathways may be useful for transmitting licenses and content.
  • A CE device 101 may be as previously noted a variety of devices equipped with a processor. As shown here 101 the CE device may be a portable personal electronics device such as a digital juke box, MP3 player, or the like.
  • In alternative embodiments a consumer electronics device 101 may be coupled 104 to a service provider 107 without using the personal computer 103 as an intermediary. In this example the CE device 101 operates to download media and licenses directly from the internet.
  • A DRM capable device, such as a CE device 101, or a PC 103, typically includes a number of DRM components 114 utilized by a DRM system. The components 114 are typical, but not limiting, of DRM components. A similar set of components may be associated with the PC 103, but are omitted to simplify the figure. Typical DRM components may include one or more licenses 102. Also shown as part of a typical DRM system is a device certificate 111 that may uniquely identify the CE device 101 to the DRM system 100. Device certificates may provide cryptographical hand shake information that may facilitate the transfer of information, such as a master clock signal 110 from a trusted time authority 116.
  • In a typical application, DRM system 100 protects contents 110 by providing encrypted data files 109. Since files 109 are encrypted, the data itself is protected. Thus, the files 109 may be moved, archived, copied, or distributed without restriction. There is no need to hide files or make them inaccessible, or to put special protection in place when files are transmitted from system to system. However, copying a file and giving it to a friend will not enable that friend to use the file. In order to be able to use an encrypted file, users must obtain an XMR license 108. This license 108, that typically includes a grace period 115, is a way of exercising control over the encrypted file 110 and the unencrypted version 109 of the file. An XMR license 108 is typically granted to a single machine 101, and even if copied, it will not tend to function on other machines.
  • An example of a Digital Rights Management system that may be capable of utilizing Grace Periods is described in U.S. patent application Ser. No. 09/290,363, filed Apr. 12, 1999, U.S. patent application Ser. Nos. 10/185,527, 10/185,278, and 10/185,511, each filed on Jun. 28, 2002 which are hereby incorporated by reference in its entirety.
  • A typical licensing system is a digital rights management (“DRM”) system. As those skilled in the art will appreciate, the present example is suitable for application in a variety of different types of systems that operate under a license.
  • FIG. 2 is a diagram showing a plurality of typical XMR DRM licenses 202. XMR Licenses are typically exchanged as in a typical client server exchange. First a client initiates contact with a server and presents a certificate having a public key to the server. The server then sends an XMR license to the client. In this example the XMR license sent is an exemplary XMR license. In alternative embodiments any suitable method issuing a license may be utilized to cause an XMR license to be transmitted.
  • An XMR license typically accompanies a media file (not shown) that has been downloaded to the CE device 101, or to a PC 103. In the past licenses have been typically downloaded with the content, and not separately, although they may be downloaded together. The number of XMR licenses on the CE device 101 can be extremely large, such that a user typically can not keep track of the individual conditions applied to each media file by its associated license. A PC will typically contain even more XMR licenses. Occasionally, more than one XMR license will be associated with a media file.
  • XMR licenses typically regulate the use of content. Most current DRM solutions rely on unique identification of user devices, such as CE devices. In such systems each XMR license is typically bound to a unique consumer electronics device (or playback device), so the XMR license stored in one CE device typically can not be transferred or used by another device. The XMR licenses are typically stored separately from the content, typically in a dedicated storage area such as a secure store.
  • FIG. 3 Illustrates a conventional Advanced Streaming Format (“ASF”) data file structure and its use. A conventional ASF media file 300 may be stored on a computer 301, and may be played 305 by, a conventional media player application 303 or the like. Current ASF media files 300 typically are not used to provide licenses in DRM systems. Typically the ASF file is loaded by an application 303, and subsequently processed (or played) by the application 303, to produce an output such as the video output 309 and, sound output 307 shown here. ASF files 300 have been used convey a variety of information such as music, video and the like. Media players may include audio players, video players, editing programs, digital photo albums, and the like. The possible outputs 307, may include audio video and the like.
  • A typical ASF file may include a header object 302, a data object 304, and one or more index objects 308 310. In the ASF file structure space is provided for other top level objects 306. An ASF header object 302 typically includes a set of tables that may include information on the entire file, including the size of the file, if the file is packetized, how large the packets are, if there is audio stream, the number of streams present in the file, and the like. An ASF data object 104 may include the data or media content.
  • The ASF data object 304 that contains the digital media typically varies in length. The following paragraphs describe licenses that may incorporate the variable length structure of ASF files.
  • FIG. 4 shows an XMR structure having a header object 402 and an outer container object 412. Many different license features may be described in an XMR structure by coupling various base XMR objects together under a header 402. (One XMR base object is shown for simplicity.) The XMR objects may be assembled or coupled under a header in a variety of ways that may include nested structures inside the outer container structure. However, the XMR objects assembled under a header typically include a common structure like that of the XMR container object or template. For example, a number of license features may each be represented by XMR objects, by assembling them under a header to form an XMR license. In this arrangement each XMR object may have the structure of the XMR base object 401, and may be nested within the XMR container object.
  • The first two bytes of the XMR base object may be used for flags 404, the next two bytes may describe the object type 406, and the next four bytes may represent the object length “I” 408 of the information that makes up the object data 410. An object data of length “I” 410 typically follows the bytes that describe the object length. In addition the object 410 may contain numerous sub objects, where the length of each sub object may be provided in its own header.
  • XMR objects may be stored in network byte order (big-endian) and 1-byte alignment may be assumed (in other words, no alignment), so alignment-related padding bytes need not be inserted. Storage of these binary objects is typically provided by one or more memory registers, or data buffers.
  • FIG. 5 shows the details of an XMR header object 500. In order to perform an efficient check that a particular data buffer contains a valid and complete XMR representation, it is typically required that every XMR representation begin with the header structure shown. The header 500 may include the header constant 502, the XMR version 504, and the rights ID 506. An XMR license typically contains a header structure followed by a “container” object that may contain nested XMR “data” objects within it. Such a container object may be called an XMR outer container object. In alternate examples the length of the accompanying data object may be included in the header object.
  • FIG. 6 shows the details of a base XMR container object 600. Details of the flags 602, object type 604, object length 608, and object data 610 are shown in the figure. The remainder of the XMR binary representation may be composed of logically nested “objects”, which may be self-descriptive tag/length/value tuples. XMR representations will typically contain multiple derived objects with certain portions of the logical ordering and nesting structure being structured as indicated in the example described below.
  • A flag may be used to distinguish between “data objects” that contain additional fields in a structure derived from a base XMR object representation (such as an XMR outer container object) and “container” objects that have only nested XMR objects as their contents and are otherwise identical in structure to the base XMR object. Flags may simplify parsing, validating, extending, and diagnosing XMR data dumps.
  • The flags are typically used for a must understand object that indicates that at least the present field must be understood in order to process or enforce the license. In order to simplify parsing, validating, extending, and diagnosing of XMR data dumps, XMR objects typically begin with a field for flags. The current extension provided in this example defines flags that may distinguish between container or leaf objects and between mandatory and optional objects.
  • The must understand flag (0x0001) is used as a signal to compliant XMR parsers that if they don't recognize this object's object type value, they should return an error code to the calling application, rather than silently ignoring the object. The XMR parser should also understand all of the values of the object. For instance, an XMR object might define a DWORD which has newly introduced values for subsequent releases. Such values should be understood, or an error should be returned to the application. In general, the must understand flag will not be set on objects that represent rights and will be set on objects that represent restrictions.
  • If a container object is marked that it need not be understood, then an XMR parser should not check contained objects for the must understand flag unless the parser understands the container. For instance, the copy policy container does not have the must understand flag set. If an XMR parser does not understand the concept of copying, it need not understand any contained restrictions on the copy.
  • The container object flag (0x0002) is used when the XMR object contains data consisting of zero or more “nested” XMR objects. This construct is used for logical grouping and scoping reasons, and is distinguished in order to support general purpose tools as well as to simplify the logical rights usage design.
  • Each XMR object of the plurality of objects may be assigned a unique object type 604, as indicated by the type field. The length field 608 typically specifies the length of the object and it's plurality of nested children. The object type values may be centrally managed by a service provider, and may be allocated out of a single 16-bit space. Object type values should be given as part of each XMR object description.
  • The object data 610 is of variable length. The object length 608 may be the length in bytes of the entire object including the header structure. For container objects, this length includes the size of all the enveloped child objects. The child objects may refer to data objects that may be nested in an enveloping container object.
  • A use for XMR is to represent DRM licenses. The binary rendition of the XMR license puts the license in a form that typically needs little processing, or translation to be used. Some conventional licenses have typically been represented using a script based description, such as a proprietary XML schema. A conventional license, having a script based description, is typically not a binary representation, has a relatively large size, and a high processing time. This may limit the performance of DRM systems, especially as the size of the license store grows larger. XMR typically provides a very compact binary representation of a license which may help provide a minimal processing time. A binary format also tends to eliminate the need for parsers or interpreters typically utilized in script based licenses.
  • FIG. 7 is a block diagram showing an exemplary XMR DRM license 700. In the example provided mandatory and optional objects may be provided for the present example. In alternative embodiments the importance of the objects may change depending upon the purpose of the embodiment. In particular the example illustrates an application of the previously described XMR license structure.
  • The XMR header 702 is followed by a single outermost XMR container object 704 which typically has a plurality of nested objects 706, 708, 710, 712, 714 within it. The outer container object 704 is typically used to supply a total length value for the remainder of the XMR license. Extensions to the base XMR framework provided by the outer XMR container 704 may be logically nested within this outermost XMR container. The outer XMR container object typically includes flags, object type, and object length information. The last object within the outer XMR container will typically be the signature object 716 which ensures the integrity of the represented license. The outer XMR container object may include a number of containers 706, 708, 710, 712, 714 nested within it. It is possible to extend this license configuration by adding additional objects. Such an extensible structure may add other objects that may include one or more additional licensing constraints such as: a grace period, a source ID, an explicit uncompressed digital output protection list, a revocation container, a license granter key, a user ID and the like. The extensible structure may be used to change or extend the capabilities of current licenses, or may be used supply new licenses that specify digital rights beyond those previously downloaded.
  • A global policy container 706 is the first container nested in the outer XMR container 703. This object typically contains any data objects 707, 718 related to global policy, that is, policy not specific to playback or any other media usage scenario. This object may also include fields for flags, object types, and object lengths.
  • A minimum environment restriction object 707 may specify restrictions that may indicate several minimum requirements for security, and for the age of a revocation list (through versioning). In this example the minimum environment restriction object 707 can only be a child of a “Global Policy Container” XMR object. XMR encoding of this minimum environment restriction object 707 may include fields for flags, object type, object length, minimum security level, minimum app revocation list version, and minimum device revocation list version. The minimum security level typically specifies the lowest security level that the device must adhere to before it can access the content. The value from the license is compared with the security level from the device certificate. The value from the device certificate should be greater than or equal to the value from the license or the license must not be used to access the content.
  • In addition to the minimum environment restriction object 707 the global policy container 706 may include one or more additional child objects 718. In particular the child objects 718 of the global policy container 706 may include one or more of the following objects: minimum environment restriction, serial number restriction (Optional), rights settings (Optional), priority object (Optional), expiration restriction (Optional), issue date (Optional), expiration after first use restriction (Optional), expiration after first store restriction (Optional), and metering restriction (Optional).
  • The serial number restriction (Optional) restricts the content usage to one specific digital media receiver (“DMR”). This restriction is typically made only when multiple devices share the same device certificate. This restriction can typically only be a child of a “Global Policy Container” XMR object. This restriction may include fields for flags (set to must understand), object types, object length, and serial number. Serial number is a byte array containing the serial number of the DMR.
  • The rights settings (Optional), defines various rights settings that are global to the license. Various Boolean rights may be represented by this single object. This object can typically only be a child of a “Global Policy Container” XMR object. Object may contain fields for flags, object type, object length, and rights. Rights may have various states including: cannot persist, allow backup and restore collaborative play, and base license. The cannot persist bit indicates the license and content cannot be persisted; they should be used then discarded. The allow backup and restore bit indicates that a license may be backed up or restored to the same, or another device using a DRM backup and restore feature. The collaborative play right enables the single scenario that allows sharing of WMDRM protected content. The base license field may be used to derive keys for accessing other licenses.
  • The priority object (Optional), assigns the license a priority. This object need only be specified if there are two or more licenses issued for the same Key ID. This object can typically only be a child of a “global policy container” object. The XMR encoding of this object may include fields for flags, object type, object length, and priority. The priority field assigns a priority to the License. For licenses with the same key ID (“KID”), the license with the higher priority takes precedence.
  • The expiration restriction (Optional), describes any time limitations of the license. Fields may include flags, object type, object length, begin date and end date. The begin date typically controls the beginning of the validity period for the license. In this example the special value 0 indicates that the license may be valid from the beginning of time. The end date typically controls the end of validity period for the license. In the present example the special value 0xFFFFFFFF may indicate that the license is valid until the end of time, or its equivalent.
  • The issue date (Optional), object indicates when the license was issued. This object can typically only be a child of a “Global Policy Container” object. Object fields may include flags, object type, object length, and issue date.
  • The expiration after first use restriction (Optional), specifies the number of seconds the content may be played after first playback. The value of this restriction is that it allows the end user to choose when to begin playback, after which point they will have a specific number of seconds in which to play back the content. An alternative example replaces the first use restriction field with, an absolute expiration end date. This restriction can typically only be a child of a “Global Policy Container” object. Fields for this object may include flags, object type, object length, and expire after first use.
  • The expiration after first store restriction (Optional), This restriction specifies the time the content may be played after the license is first stored. This restriction allows a content provider to allow content to be used for a relative period of time regardless of the current time or time zone. The existence of this restriction in a license defines the license to be stateful. If a license containing this restriction is copied to another device or backed up, the state associated with this restriction is not copied. Instead, the copied license is assigned an absolute expiration end date. Fields for this object may include flags, object type, object length, and expire after first store. This restriction can typically only be a child of a “Global Policy Container” object.
  • The metering restriction (Optional) defines the information clients may be required to collect and where to remit that information to. This field may include flags, object type, object length, and metering ID. The metering ID may be the GUID of the metering requirements. This restriction can typically only be a child of a “Global Policy Container” object. Additional objects as described below may also be added, in addition to those shown above.
  • The Key material container object is used to contain any data objects related to key material and content encryption. This object can only be a child of an “Outer Container” XMR object. Typical fields include Flags, object type, and object length.
  • The RSA device key object defines the RSA public key of the device the license is bound to. This object can hold an RSA key. Emerald devices should have a 1024-bit or 2048-bit RSA key with an exponent of 65537. This object can typically only be a child of a “Key Material Container” XMR object. Fields for this object may include flags, object type, object Length, exponent, modulus Length, and modulus. Exponent specifies the exponent of the RSA key modulus length Specifies the length of the RSA key in bytes. For 2048-bit RSA, this value should be 256. Modulus is the modulus of the RSA key in network byte (big-endian) order.
  • Grace period (optional) indicates the number of seconds during which protected content can be played on a device after its clock becomes unset. The default value is zero seconds. This object can typically only be a child of a “Global Policy Container” object. Fields for this object may include flags, object type, object length and grace period.
  • Source ID (optional) identifies the source of the content. It could be used to make policy decisions based on the source. This object can typically only be a child of a “Global Policy Container” object. Fields for this object may include flags, object type, object length, and source ID. The source ID is typically an Identifier for the source of the content.
  • Explicit uncompressed digital audio output protection list (optional) is typically a container for Uncompressed Digital Audio Output Configuration objects. This container has a list of explicitly included Uncompressed Digital Audio output protection technologies that may be enumerated separately due to licensing restrictions. The application must employ all of the listed technologies that apply to the referenced output when outputting content to analog outputs. This is in addition to any other restrictions that may be on the output. Each listed output protection technology represents an addition requirement beyond the Uncompressed Digital Audio Output Protection level. The listed technologies only apply to digital outputs. Content sent to analog outputs is not affected by the list. This container can typically only be a child of a “Playback Right Container” XMR object. Fields typically include flags, object type, and object length.
  • Uncompressed Digital Audio Output Configuration Restriction (optional) typically requires the use of a certain uncompressed audio output protection scheme and provides relevant configuration data to be used by the scheme. This object typically can only be a child of an “Explicit Uncompressed Digital Audio Output Protection Container” XMR object. Fields typically include flags, object type, object length, audio output protection ID, and binary configuration data. The object length field typically Includes the 8-byte header, the 16-byte GUID, and the variable-length binary configuration data. The binary configuration data may include the configuration data for this output configuration. The size of the variable-length array is implied by the object length field of the object. The Binary Configuration Data is a variable length binary data field whose type is dependent on the value of the Audio Output Protection ID field. For the currently defined Audio Output Protection IDs, the Binary Configuration Data consists of a variable length unsigned integer in network byte order. The integer may be from 0 to 4 bytes long depending on the magnitude of the integer. The value and interpretation of the integer is defined below for each of the Audio Protection IDs. For the Downsample Required ID, the uncompressed digital audio must be downsample to a maximum value specified by the Binary Configuration Data. The Binary Configuration Data is a single integer containing an ordinal defining the downsample requirements. Currently, the only value 1 is defined. A value of 1 requires 48 KHz max sample rate, 16 bit max sample size. This Downsample Required ID applies to uncompressed digital audio outputs.
  • The revocation container object (optional) typically contains any data objects related to revoking or deleting XMR licenses. This object can typically only be a child of an “outer container” XMR object. Fields for this object may include flags, object type and object length.
  • The license granter key object typically specifies RSA public key of the entity that issued the license. When this license is revoked or deleted, the caller must prove possession of the corresponding RSA private key. This object can typically hold an RSA key. This object can typically only be a child of a “Revocation” XMR object. Fields for this object may include flags, object type, object length, exponent, modulus length, and modulus. Exponent typically specifies the exponent of the RSA key. Modulus length typically specifies the length of the RSA key in bytes. For 1024-bit RSA, this value should be 128. The modulus field is typically the modulus of the RSA key in network byte (big-endian) order.
  • The user ID object (optional) typically specifies a User ID to be associated with the license. The user ID is defined by the entity that issues the license. When this license is revoked or deleted, the caller may specify that only licenses with a particular User ID are to be deleted. The User ID is considered to be a binary blob. As such, if the User ID is a text string, any comparison with the blob is case sensitive. This object can only be a child of a “Revocation” XMR object. Fields for this object may include flags, object types, object length, and user ID.
  • The outer XMR container object 704 may also include on or more additional containers 708, 710, 712, 714 that may each include one or more additional child objects 720, 722, 724, 726, 728, 730, 732, 734. It is also specifically contemplated that additional child objects not listed here may be added, due to the extensible characteristics of this structure.
  • The second additional container 708 may be a playback right container. The playback right grants the ability to play the content. This object also contains any data objects related to media playback policy. This object typically includes fields for flags, object type and object length. This container can typically only be a child of an “outer container” XMR object.
  • The plurality of one through n child objects 720, 722 of the second additional container 708 may include any or all of the following: play count restriction (optional), output protection level restriction, explicit analog video output protection container object (optional), analog video output configuration restriction object (optional).
  • The play count restriction (optional), restriction specifies the number of times the content can be played. Play is defined as the first packet being decrypted. The existence of this restriction in a license defines the license to be stateful. If a license containing this restriction is copied to another device, the state associated with this restriction is usually not copied. Instead, another play count number of plays are allowed by the license copy.
  • If a license containing this restriction is backed up, the play count restriction in the backed up license is set to the net number of plays left instead of the original play count. This algorithm attempts to protect the content provider by accounting for the plays already consumed. However, it is impossible to account for any copies made between the time when the license was backed up and when the license was restored. Objects may include fields for flags, object type, object length and play count. This restriction can typically only be a child of a “Playback Right Container” object.
  • The output protection level restriction, restriction indicates several minimum requirements for content output protection, based on the type of content being output and the format of that content.
  • Output protection levels are specified by a number defining a minimum level of content protection required for a particular type and format of content. Larger numbers may imply that stronger content protection is required. Specific values may be defined for each type and format of content. Licenses should be issued with those specific defined values. Fields that may be included in this object include flags, object type, object length, digital compressed video output protection level, digital uncompressed video output protection level, analog video output protection level, digital compressed audio output protection level, and digital uncompressed audio output protection level.
  • The values defined for each type and format are mapped by this document to particular output technologies. That list of technologies may be expanded from time to time without notice. An application may map any technologies it supports to the levels defined by this document.
  • Licenses should be interpreted to allow for values that are not yet defined. For instance, if an output protection level defines a value of 200 for XXX content protection and 400 for ZZZ content protection, then an application that implements both XXX and ZZZ should interpret licenses at levels 201 through 400 inclusive as requiring ZZZ content protection. If a subsequent WMDRM specification defines level 300 for YYY content protection, a license issued for level 300 will be properly interpreted by the application.
  • Output protection levels may be defined for a type of output regardless of the original input format. For instance, if an application has an input of digital compressed video and doesn't support the required content protection for the digital compressed video, the application may uncompress the digital video and output that content based on the digital uncompressed video output protection level. This object can typically only be a child of a “playback right container” XMR object. The concept of output protection levels are further described in U.S. patent Ser. No. ______ (Attorney docket number 308256.01) ______ filed Apr. 14, 2005, the contents of which are hereby incorporated by reference.
  • The explicit analog video output protection container object (optional), is a container for analog video output configuration objects. This container typically has a list of explicitly included analog video output protection technologies that have to be enumerated separately due to licensing restrictions.
  • The application program must typically employ one of the listed technologies when outputting content to analog outputs. This is in addition to any other restrictions on the output. Each listed output protection technology represents an addition requirement beyond the analog video output protection level. The listed technologies only apply to analog outputs. Content sent to digital outputs is not affected by the list. Fields for this object may include flags, object type, and object length. This container can typically only be a child of a “Playback Right Container” XMR object
  • The analog video output configuration restriction object (optional) explicitly requires the use of a certain analog video output protection scheme and provides relevant configuration data to be used by the scheme. This object can typically only be a child of an “Explicit Audio Video Output Protection Container” XMR object
  • A third additional container 710 may be the optional copy right container. Copy right grants the ability to make a copy of this license on another CE device. This object is also a container that may contain any data objects related to media copy policy. Fields may include flags, object type and object length. This container can typically only be a child of an “outer container” XMR object. Child objects 1−n 724, 724 of the copy right container 710 may include any or all of the following: copy count restriction (optional), and copy protection level restriction (Optional).
  • The copy count restriction (optional), restriction allows an absolute number of copies to be made of the digital media. When a copy of this license is made to another device, state is maintained about the number of copies made. If the copy count restriction is not specified in a license, the license may be copied freely. The existence of this object in a license defines the license to be stateful. If a license containing this restriction is copied to another device, the state associated with this restriction is not copied. Instead, the copied license should have the copy policy container and all the child objects stripped from the license. The copied license can only be used to play the content. If a license containing this restriction is backed up, the copy count restriction in the backed up license is set to the net number of copies left instead of the original copy count. This process attempts to protect the content provider by accounting for the copies already made. However, it is impossible to account for any copies made between the time when the license was backed up and when the license was restored. Fields for this object may include flags, object type, object length and copy count. Copy count specifies the typically absolute number of copies that can be made. This restriction can typically only be a child of a “Copy Right Container” XMR object.
  • The copy protection level restriction (optional), defines the minimum level of protection for a destination copy. If a content protection system that meets the minimum level is not available then the copy isn't allowed. Fields for this object may include flags, object type, object length, and a minimum copy protection level. The minimum copy protection may start out with a suitable default value. This object can only be a child of a “Copy Right Container” XMR object.
  • A fourth additional container 712 may be the optional allow playlist burn right container. The allow playlist burn right grants the right to burn the content to a CD as part of a playlist. This object is also used to contain any data objects related to playlist burn policy. CD burning is typically not considered to be a copy. If no restrictions are set, an unlimited number of playlist burns are permitted. This object may include fields for flags, object type, and object length. This object can typically only be a child of an “outer container” XMR object. Child objects of the allow playlist burn right container 712 may include the playlist burn restriction as a child object 728.
  • The playlist burn restriction (optional) specifies limits on the right to burn playlists. The maxplaylistburncount field specifies the number of times that content can be copied to a CD as part of a particular playlist. The playlistburntrackcount field specifies the number of times that content can be copied to a CD as part of any playlist. The existence of this restriction in a license defines the license to be stateful. If a license containing this restriction is copied to another device, the state associated with this restriction is not copied. Instead, the entire CD burn policy container is not copied to the destination device. As such, the destination device may not burn CDs. If a license containing this restriction is backed up, the maxPlaylistburncount restriction is backed up intact. That is, a restored copy of the license is allowed to create copies of any particular play list. Due to the nature of this restriction, any other design would have to backup all of the play lists this license was used in. If a license containing this restriction is backed up, the playlistburntrackcount restriction in the backed up license is set to the net number of burns left instead of the original burn count. This process attempts to protect the content provider by accounting for the burns already consumed. However, it is impossible to account for any burns made between the time when the license was backed up and when the license was restored. Fields for this object may include flags, object type, object length, maxplaylistburncount, and playlistburntrackcount. Playlistburntrackcount right specifies the number of times the consumer is allowed to copy this particular media file within any playlist to a CD This object can only be a child of an “Allow Playlist Burn Right container” XMR object.
  • A fifth additional container may be the key material container object 714. The previously presented CD burn right grants the right to burn the content to a CD. This object 714 is also used to contain any data objects related to media CD burn policy. CD burning is not considered to be a copy. This right may be superseded by the allow playlist burn right, which should be used by content providers. Fields for this object may include flags, object type, and object length. Provision for this right is an example of backwards compatibility. This object can typically only be a child of an “outer container” XMR object. Child objects 1−n 732-734 may include: the content key object (optional), the RSA device key object (optional), and the uplink KID object (optional).
  • The content key object (optional) is used to contain any data objects related to key material and content encryption. Fields for the object may include flags, object type and object length. This object can typically only be a child of an “Outer Container” XMR object. This object is described further below.
  • The RSA device key object (optional), described more fully below, holds an encrypted version of the content key, and information about the crypto ciphers necessary to decrypt the key and then the content itself. DRM protected content typically contains a key ID identifying the key used to encrypt the content. That key ID is matched with the key ID in the Content key object to identify the license or licenses that contain the content key for the content. Fields for this object may include flags, object type, object length, key ID, symmetric cipher type, key encryption cipher type, encrypted key length, and encrypted key data. Key ID identifies the content key. Encrypted key length specifies the size of the encrypted key data. The encrypted key data buffers (the key data) encrypted using the specified Key Encryption Cipher type. The Symmetric Cipher Type defines how to interpret the decrypted buffer. This object can typically only be a child of a “Key Material Container” XMR object. In this application the key data is actually a combination of the content key and the integrity key typically used to sign the license. This combination of keys ties the signature to the creator of the license. This combination of keys also tends to eliminate any need for a PK based signature that might be present.
  • The uplink KID object (optional) specifies the key ID of the uplink license in chain of chained licenses. The uplink license contains the key used to encrypt the encrypted key in the content key object, and a chained checksum. The uplink KID object is present when this license is chained to another license instead of being granted to a device. The content key object indicates that the license is chained to another license by specifying a key encryption cipher type of “chained license”. In that case, the uplink KID object points to an uplink license. Fields may include flags, object type, object length, and uplink KID object including a chained checksum. Uplink KID specifies the Key ID of the license containing the content key used to encrypt the encrypted key. The chained checksum is typically a hash of the key from the uplink license That uplink license itself contains a content key.
  • As may be seen above extensibility may be provided in the XMR DRM license. XMR typically allows extensions to be introduced by defining new objects. Older XMR parsers typically ignore any objects that they do not know how to parse (unless the object is marked with a must understand flag), and may continue to parse any data following the unknown object. New objects may be introduced by nesting.
  • The outer XMR container 704 constructed in accordance with the base XMR object which includes the remainder of the XMR binary representation following the header which may be composed of logically nested “objects” 706, 708,710, 712, 714 which are simply self-descriptive tag/length/value tuples. All XMR representations may contain multiple derived objects with certain portions of the logical ordering and nesting structure being mandatory in this example. The designations of mandatory and optional used in this particular example are not intended to imply that other alternative examples must be limited by the same optional and mandatory designations.
  • FIG. 8 is a block diagram showing a computer processor capable of processing an XMR license structure. Exemplary computing environment 800 is only one example of a computing system and is not intended to limit the examples described in this application to this particular computing environment.
  • The computing environment 800 can be implemented with numerous other general purpose or special purpose computing system configurations. Examples of well known computing systems, may include, but are not limited to, personal computers, hand-held or laptop devices, microprocessor-based systems, multiprocessor systems, set top boxes, programmable consumer electronics, gaming consoles, consumer electronics, cellular telephones, PDAs, and the like.
  • The computer 800 includes a general-purpose computing system in the form of a computing device 801. The components of computing device 801 can include one or more processors (including CPUs, GPUs, microprocessors and the like) 807, a system memory 809, and a system bus 808 that couples the various system components. Processor 807 processes various computer executable instructions to control the operation of computing device 801 and to communicate with other electronic and computing devices (not shown). The system bus 808 represents any number of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
  • The system memory 809 includes computer-readable media in the form of volatile memory, such as random access memory (RAM), and/or non-volatile memory, such as read only memory (ROM). A basic input/output system (BIOS) is stored in ROM. RAM typically contains data and/or program modules that are immediately accessible to and/or presently operated on by one or more of the processors 807.
  • Mass storage devices 804 may be coupled to the computing device 801 or incorporated into the computing device by coupling to the buss. Such mass storage devices 804 may include a magnetic disk drive which reads from and writes to a removable, non volatile magnetic disk (e.g., a “floppy disk”) 805, or an optical disk drive that reads from and/or writes to a removable, non-volatile optical disk such as a CD ROM or the like 806. Computer readable media 805, 806 typically embody computer readable instructions, data structures, program modules and the like supplied on floppy disks, CDs, portable memory sticks and the like.
  • Any number of program modules can be stored on the hard disk 810. For example a number of XMR licenses 700. Mass storage device 804, ROM and/or RAM 809, including by way of example, an operating system, one or more application programs, other program modules, and program data. Each of such operating system, application programs, other program modules and program data (or some combination thereof) may include an embodiment of the systems and methods described herein.
  • A display device 802 can be connected to the system bus 808 via an interface, such as a video adapter 811. A user can interface with computing device 802 via any number of different input devices 803 such as a keyboard, pointing device, joystick, game pad, serial port, and/or the like. These and other input devices are connected to the processors 807 via input/output interfaces 812 that are coupled to the system bus 808, but may be connected by other interface and bus structures, such as a parallel port, game port, and/or a universal serial bus (USB).
  • Computing device 800 can operate in a networked environment using connections to one or more remote computers through one or more local area networks (LANs), wide area networks (WANs) and the like. The computing device 801 is connected to a network 814 via a network adapter 813 or alternatively by a modem, DSL, ISDN interface or the like.
  • Those skilled in the art will realize that storage devices utilized to store program instructions can be distributed across a network. For example a remote computer may store an example of the process described as software. A local or terminal computer may access the remote computer and download a part or all of the software to run the program. Alternatively the local computer may download pieces of the software as needed, or distributively process by executing some software instructions at the local terminal and some at the remote computer (or computer network). Those skilled in the art will also realize that by utilizing conventional techniques known to those skilled in the art that all, or a portion of the software instructions may be carried out by a dedicated circuit, such as a DSP, programmable logic array, or the like.

Claims (20)

1. A DRM system comprising:
a service provider;
a CE device coupled to the service provider; and
an XMR license disposed upon the CE device.
2. The DRM system of claim 1, in which the XMR license is sent from a service provider to the DRM device via an internet connection.
3. The DRM system of claim 1, in which the XMR license is binary.
4. The DRM system of claim 1, in which the XMR license is extensible.
5. The DRM system of claim 1, in which the XMR license includes a must understand field.
6. The DRM system of claim 5, in which the XMR license includes a plurality of objects with each object of the plurality of objects includes the must understand field.
7. The DRM system of claim 6, in which the must understand field present in each object of the plurality of objects is configured to cause an XMR parser to ignore an object of the plurality of objects that the XMR parser does not understand.
8. The DRM system of claim 1, in which the XMR license includes a content key object formed by combining a content key and an integrity key.
9. An XMR license comprising:
an XMR header object; and
an XMR container object.
10. The XMR license of claim 9, in which the XMR container object comprises a plurality of child objects each having a header including a must understand field.
11. The XMR license of claim 9, in which the XMR container object is extensible to allow the addition of additional objects to the XMR license.
12. The XMR license of claim 9, in which the XMR container object includes a nested structure for the addition of additional objects.
13. An XMR license comprising:
an XMR header object; and
an XMR container object including a global policy container and a plurality of additional container objects.
14. The XMR license of claim 13, additionally comprising an XMR signature object.
15. The XMR license of claim 13 in which the XMR key material container object includes a content key object.
16. The XMR license of claim 13 in which one of the plurality of container objects comprises a plurality of child objects.
17. The XMR license of claim 13 in which the XMR container object provides extensibility.
18. The XMR license of claim 13 in which the XMR license is binary.
19. The XMR license of claim 13 in which one of the plurality of container objects comprises a must understand field.
20. The XMR license of claim 13 in which the global policy container includes a minimum environment restriction object.
US11/134,719 2005-05-20 2005-05-20 Extensible media rights Abandoned US20060265758A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/134,719 US20060265758A1 (en) 2005-05-20 2005-05-20 Extensible media rights

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/134,719 US20060265758A1 (en) 2005-05-20 2005-05-20 Extensible media rights
US12/835,569 US8781969B2 (en) 2005-05-20 2010-07-13 Extensible media rights

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US12/053,090 Continuation US8700535B2 (en) 2003-02-25 2008-03-21 Issuing a publisher use license off-line in a digital rights management (DRM) system
US12/835,569 Continuation US8781969B2 (en) 2005-05-20 2010-07-13 Extensible media rights

Publications (1)

Publication Number Publication Date
US20060265758A1 true US20060265758A1 (en) 2006-11-23

Family

ID=37449738

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/134,719 Abandoned US20060265758A1 (en) 2005-05-20 2005-05-20 Extensible media rights
US12/835,569 Active US8781969B2 (en) 2005-05-20 2010-07-13 Extensible media rights

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/835,569 Active US8781969B2 (en) 2005-05-20 2010-07-13 Extensible media rights

Country Status (1)

Country Link
US (2) US20060265758A1 (en)

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060248596A1 (en) * 2005-04-27 2006-11-02 Microsoft Corporation Secure clock with grace periods
US20070143844A1 (en) * 2005-09-02 2007-06-21 Richardson Ric B Method and apparatus for detection of tampering attacks
US20070150967A1 (en) * 2003-11-21 2007-06-28 Matsushita Electric Industrial Co., Ltd. License acquiring system, server apparatus and terminal apparatus
US20070260881A1 (en) * 2006-04-04 2007-11-08 Maksim Krasnyanskiy File decryption interface
US20080189349A1 (en) * 2007-02-05 2008-08-07 Broadcom Corporation Media Transport Protocol Extensions for System Information Exchange, and Applications Thereof
US20080288788A1 (en) * 2007-05-16 2008-11-20 Broadcom Corporation Digital Rights Management Metafile, Management Protocol and Applications Thereof
WO2008148356A1 (en) * 2007-06-06 2008-12-11 Huawei Technologies Co., Ltd. The method, device and system for forwarding the license
US20090020600A1 (en) * 2007-07-19 2009-01-22 Canon Kabushiki Kaisha Right-of-use transfer system
US20090083429A1 (en) * 2007-05-16 2009-03-26 Broadcom Corporation Generic Digital Rights Management Framework, and Applications Thereof
US20090083730A1 (en) * 2007-09-20 2009-03-26 Richardson Ric B Installing Protected Software Product Using Unprotected Installation Image
US20090150674A1 (en) * 2007-12-05 2009-06-11 Uniloc Corporation System and Method for Device Bound Public Key Infrastructure
US20090157552A1 (en) * 2007-12-12 2009-06-18 Microsoft Corporation Digital content packaging, licensing and consumption
US20090158436A1 (en) * 2005-07-19 2009-06-18 Baese Gero Method for Exporting Use Rights for Electronic Data Objects
US20090292816A1 (en) * 2008-05-21 2009-11-26 Uniloc Usa, Inc. Device and Method for Secured Communication
US20090327702A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Key Escrow Service
US20090327059A1 (en) * 2008-06-25 2009-12-31 Microsoft Corporation Digital rights management support for metering in advertising scenarios
US7831517B1 (en) * 2006-10-24 2010-11-09 Adobe Systems Incorporated Single binary software license distribution
US20100296653A1 (en) * 2006-09-14 2010-11-25 Richardson Ric B System of dependant keys across multiple pieces of related scrambled information
US20110208616A1 (en) * 2008-06-13 2011-08-25 Christopher Simon Gorman Content system
US20110270709A1 (en) * 2010-04-30 2011-11-03 Chartsnow.Mobi Limited Content management apparatus
US20110314534A1 (en) * 2010-04-14 2011-12-22 Lee James Secured Execution Environments and Methods
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8423473B2 (en) 2009-06-19 2013-04-16 Uniloc Luxembourg S. A. Systems and methods for game activation
US8566960B2 (en) 2007-11-17 2013-10-22 Uniloc Luxembourg S.A. System and method for adjustable licensing of digital products
US8700535B2 (en) 2003-02-25 2014-04-15 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US20140189346A1 (en) * 2012-12-28 2014-07-03 Next Education, Llc License server manager
US8781969B2 (en) 2005-05-20 2014-07-15 Microsoft Corporation Extensible media rights
US20150095646A1 (en) * 2009-08-14 2015-04-02 Azuki Systems, Inc. Method and system for unified mobile content protection
US9075960B2 (en) 2013-03-15 2015-07-07 Now Technologies (Ip) Limited Digital media content management apparatus and method
US9141489B2 (en) 2009-07-09 2015-09-22 Uniloc Luxembourg S.A. Failover procedure for server system
US9224168B2 (en) 2004-11-15 2015-12-29 Microsoft Technology Licensing, Llc Tuning product policy using observed evidence of customer behavior
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US20170019408A1 (en) * 2013-09-20 2017-01-19 Oracle International Corporation Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
US9633183B2 (en) 2009-06-19 2017-04-25 Uniloc Luxembourg S.A. Modular software protection
US20170169244A1 (en) * 2007-02-21 2017-06-15 Palantir Technologies, Inc. Providing unique views of data based on changes or rules
US10104086B2 (en) 2015-04-24 2018-10-16 Oracle International Corporation Techniques for fine grained protection of resources in an access management environment
US10142371B2 (en) 2015-04-24 2018-11-27 Oracle International Corporation Authorization policy customization and authorization policy lockdown
US10171437B2 (en) 2015-04-24 2019-01-01 Oracle International Corporation Techniques for security artifacts management
US10248294B2 (en) 2016-06-15 2019-04-02 Palantir Technologies, Inc. Modal-less interface enhancements

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0202450D0 (en) * 2002-08-15 2002-08-15 Ericsson Telefon Ab L M Non-repudiation of digital content
US9251097B1 (en) * 2011-03-22 2016-02-02 Amazon Technologies, Inc. Redundant key management
US9904788B2 (en) * 2012-08-08 2018-02-27 Amazon Technologies, Inc. Redundant key management
KR20150080065A (en) * 2013-12-30 2015-07-09 주식회사 케이티 Method and server for generating videoconference data, and method and device for receiving videoconference data

Citations (97)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US623567A (en) * 1899-04-25 secor
US3718906A (en) * 1971-06-01 1973-02-27 R Lightner Vending system for remotely accessible stored information
US4202051A (en) * 1977-10-03 1980-05-06 Wisconsin Alumni Research Foundation Digital data enciphering and deciphering circuit and method
US4323921A (en) * 1979-02-06 1982-04-06 Etablissement Public De Diffusion Dit "Telediffusion De France" System for transmitting information provided with means for controlling access to the information transmitted
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4747139A (en) * 1984-08-27 1988-05-24 Taaffe James L Software security method and systems
US4799259A (en) * 1986-04-10 1989-01-17 Rockwell International Corporation Monolithic random digital noise generator
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US4916738A (en) * 1986-11-05 1990-04-10 International Business Machines Corp. Remote access terminal security
US4926479A (en) * 1988-04-29 1990-05-15 Massachusetts Institute Of Technology Multiprover interactive verification system
US5008935A (en) * 1989-06-30 1991-04-16 At&T Bell Laboratories Efficient method for encrypting superblocks of data
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
US5103392A (en) * 1983-10-05 1992-04-07 Fujitsu Limited System for storing history of use of programs including user credit data and having access by the proprietor
US5109413A (en) * 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
US5117457A (en) * 1986-11-05 1992-05-26 International Business Machines Corp. Tamper resistant packaging for information protection in electronic circuitry
US5177790A (en) * 1989-12-19 1993-01-05 Bull Cp8 Method for generating a random number in a data processing system/and system for implementing the method
US5193573A (en) * 1992-06-15 1993-03-16 Chronister Clyde H Ball valve having replaceable seals under full service pressure
US5204897A (en) * 1991-06-28 1993-04-20 Digital Equipment Corporation Management interface for license management system
US5410598A (en) * 1986-10-14 1995-04-25 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5490216A (en) * 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5710887A (en) * 1995-08-29 1998-01-20 Broadvision Computer system and method for electronic commerce
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5864620A (en) * 1996-04-24 1999-01-26 Cybersource Corporation Method and system for controlling distribution of software in a multitiered distribution chain
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6023766A (en) * 1997-02-14 2000-02-08 Fujitsu Limited Software license control system and software license control equipment
US6189146B1 (en) * 1998-03-18 2001-02-13 Microsoft Corporation System and method for software licensing
US6219652B1 (en) * 1998-06-01 2001-04-17 Novell, Inc. Network license authentication
US6335972B1 (en) * 1997-05-23 2002-01-01 International Business Machines Corporation Framework-based cryptographic key recovery system
US20020002674A1 (en) * 2000-06-29 2002-01-03 Tom Grimes Digital rights management
US20020004773A1 (en) * 2000-01-07 2002-01-10 Xu Jing Min Method and a system for certificate revocation list consolidation and access
US20020006204A1 (en) * 2001-06-27 2002-01-17 Paul England Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
US20020007456A1 (en) * 1999-03-27 2002-01-17 Marcus Peinado Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US6343280B2 (en) * 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
US20020013772A1 (en) * 1999-03-27 2002-01-31 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like
US20020018566A1 (en) * 2000-07-19 2002-02-14 Hitachi, Ltd. Apparatus and method for disribution of contents
US20020026574A1 (en) * 2000-08-31 2002-02-28 Sony Corporation Person authentication system, person authentication method , information processing apparatus, and program providing medium
US20020049679A1 (en) * 2000-04-07 2002-04-25 Chris Russell Secure digital content licensing system and method
US20020048369A1 (en) * 1995-02-13 2002-04-25 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20030014496A1 (en) * 2001-06-27 2003-01-16 Spencer Donald J. Closed-loop delivery system
US20030018491A1 (en) * 2001-07-17 2003-01-23 Tohru Nakahara Content usage device and network system, and license information acquisition method
US20030023564A1 (en) * 2001-05-31 2003-01-30 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US20030028454A1 (en) * 2001-08-01 2003-02-06 Masahiro Ooho Device and method for managing content usage right
US20030028490A1 (en) * 2001-07-31 2003-02-06 Koji Miura System, apparatus, and method of contents distribution, and program and program recording medium directed to the same
US20030041257A1 (en) * 2001-05-04 2003-02-27 Wee Susie J. Systems, methods and storage devices for scalable data streaming
US20030046238A1 (en) * 1999-12-20 2003-03-06 Akira Nonaka Data processing apparatus, data processing system, and data processing method therefor
US20030056118A1 (en) * 2001-09-04 2003-03-20 Vidius Inc. Method for encryption in an un-trusted environment
US20030069854A1 (en) * 2001-10-09 2003-04-10 Hsu Michael M. Expiring content on playback devices
US6557105B1 (en) * 1999-04-14 2003-04-29 Tut Systems, Inc. Apparatus and method for cryptographic-based license management
US20030084306A1 (en) * 2001-06-27 2003-05-01 Rajasekhar Abburi Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US20040001594A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Systems and methods for providing secure server key operations
US20040003270A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system
US20040003269A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Systems and methods for issuing usage licenses for digital content and services
US20040003268A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system
US20040003139A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Secure server plug-in architecture for digital rights management systems
US20040010602A1 (en) * 2002-07-10 2004-01-15 Van Vleck Paul F. System and method for managing access to digital content via digital rights policies
US6681017B1 (en) * 1997-09-03 2004-01-20 Lucent Technologies Inc. Simplified secure shared key establishment and data delivery protocols for electronic commerce
US20040039916A1 (en) * 2002-05-10 2004-02-26 David Aldis System and method for multi-tiered license management and distribution using networked clearinghouses
US20040039932A1 (en) * 2002-08-23 2004-02-26 Gidon Elazar Apparatus, system and method for securing digital documents in a digital appliance
US6701433B1 (en) * 1998-03-23 2004-03-02 Novell, Inc. Method and apparatus for escrowing properties used for accessing executable modules
US20040042451A1 (en) * 2001-09-27 2004-03-04 Yoshiyuki Takaku Communication method, communication system, and output equipment
US20040054678A1 (en) * 2000-12-08 2004-03-18 Ryuichi Okamoto Distribution device, terminal device, and program and method for use therein
US20040054630A1 (en) * 1995-02-13 2004-03-18 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US20040054912A1 (en) * 2002-09-04 2004-03-18 Daniel Adent Data stream header object protection
US20050002525A1 (en) * 2003-07-03 2005-01-06 Microsoft Corporation RTP payload format
US20050008240A1 (en) * 2003-05-02 2005-01-13 Ashish Banerji Stitching of video for continuous presence multipoint video conferencing
US20050010531A1 (en) * 2003-07-09 2005-01-13 Kushalnagar Nandakishore R. System and method for distributing digital rights management digital content in a controlled network ensuring digital rights
US20050010536A1 (en) * 2002-02-27 2005-01-13 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US20050021989A1 (en) * 2001-07-30 2005-01-27 Johnson Harold J. Secure method and system for handling and distributing digital media
US20050028151A1 (en) * 2003-05-19 2005-02-03 Roth Steven T. Module symbol export
US6856997B2 (en) * 2000-10-27 2005-02-15 Lg Electronics Inc. Apparatus and method for providing file structure for multimedia streaming service
US6859790B1 (en) * 1999-10-20 2005-02-22 Sony Corporation Data distribution system and method thereof, data processing device, data control device, and machine-readable recording medium recording distribution data
US6873975B1 (en) * 1999-04-06 2005-03-29 Fujitsu Limited Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
US20050069039A1 (en) * 2003-09-07 2005-03-31 Microsoft Corporation Determining a decoding time stamp from buffer fullness
US6983049B2 (en) * 2001-05-04 2006-01-03 Hewlett-Packard Development Company, Lp. Storage devices for secure scalable data streaming
US20060014521A1 (en) * 2004-07-14 2006-01-19 Zhi-Wen Chen Data protection method and system using the same
US6993137B2 (en) * 2000-06-16 2006-01-31 Entriq, Inc. Method and system to securely distribute content via a network
US7006633B1 (en) * 1999-07-16 2006-02-28 Global Encryption Standard Corporation Global encryption system
US7010808B1 (en) * 2000-08-25 2006-03-07 Microsoft Corporation Binding digital content to a portable storage device or the like in a digital rights management (DRM) system
US7010032B1 (en) * 1999-03-12 2006-03-07 Kabushiki Kaisha Toshiba Moving image coding apparatus and decoding apparatus
US7017188B1 (en) * 1998-11-16 2006-03-21 Softricity, Inc. Method and apparatus for secure content delivery over broadband access networks
US7020704B1 (en) * 1999-10-05 2006-03-28 Lipscomb Kenneth O System and method for distributing media assets to user devices via a portal synchronized by said user devices
US7020781B1 (en) * 2000-05-03 2006-03-28 Hewlett-Packard Development Company, L.P. Digital content distribution systems
US7024393B1 (en) * 1999-03-27 2006-04-04 Microsoft Corporation Structural of digital rights management (DRM) system
US20070003064A1 (en) * 2005-06-30 2007-01-04 Wiseman Willard M Apparatus and method for group session key and establishment using a certified migration key
US20070016594A1 (en) * 2005-07-15 2007-01-18 Sony Corporation Scalable video coding (SVC) file format
US20070016784A1 (en) * 2003-04-28 2007-01-18 Koninklijke Philips Electronics N.V. Method of storing revocation list
US7174320B2 (en) * 2002-04-04 2007-02-06 Intel Corporation Method of providing adaptive security
US7174452B2 (en) * 2001-01-24 2007-02-06 Broadcom Corporation Method for processing multiple security policies applied to a data packet structure
US20070033419A1 (en) * 2003-07-07 2007-02-08 Cryptography Research, Inc. Reprogrammable security for controlling piracy and enabling interactive content
US20070078777A1 (en) * 2005-09-29 2007-04-05 Contentguard Holdings, Inc. System and method for digital rights management using advanced copy with issue rights, and managed copy tokens
US7325139B2 (en) * 2002-04-15 2008-01-29 Sony Corporation Information processing device, method, and program
US20080075168A1 (en) * 2004-10-07 2008-03-27 Matsushita Electric Industrial Co., Ltd. Picture Coding Apparatus and Picture Decoding Apparatus
US7484103B2 (en) * 2002-01-12 2009-01-27 Je-Hak Woo Method and system for the information protection of digital content
US7502945B2 (en) * 2002-06-28 2009-03-10 Microsoft Corporation Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system

Family Cites Families (855)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6241704B1 (en) 1901-11-22 2001-06-05 Sims Deltec, Inc. Drug pump systems and methods
GB1561482A (en) * 1976-11-18 1980-02-20 Ibm Protection of data processing system against unauthorised programmes
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4529870A (en) 1980-03-10 1985-07-16 David Chaum Cryptographic identification, financial transaction, and credential device
GB2116004A (en) 1982-01-13 1983-09-14 Europ Systems Improvements in or relating to video display systems
FR2523745B1 (en) 1982-03-18 1987-06-26 Bull Sa Method and device for protecting a book by a software provider has a user
US4558176A (en) 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
US4528643A (en) 1983-01-10 1985-07-09 Fpdc, Inc. System for reproducing information in material objects at a point of sale location
US4967273A (en) 1983-03-21 1990-10-30 Vidcode, Inc. Television program transmission verification method and apparatus
DE3375905D1 (en) 1983-10-14 1988-04-14 Saint Gobain Isover Method and apparatus for melting glassy mineral materials
US4620150A (en) 1984-04-12 1986-10-28 General Electric Company Electric meter with electronic rolling demand register
US6289319B1 (en) 1984-05-24 2001-09-11 Lawrence B. Lockwood Automatic business and financial transaction processing system
US5257282A (en) 1984-06-28 1993-10-26 Unisys Corporation High speed code sequence generator
US4959774A (en) 1984-07-06 1990-09-25 Ampex Corporation Shadow memory system for storing variable backup blocks in consecutive time periods
US4910692A (en) 1985-10-09 1990-03-20 Outram John D Adaptive data logger
US5287537A (en) * 1985-11-15 1994-02-15 Data General Corporation Distributed processing system having plural computers each using identical retaining information to identify another computer for executing a received command
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5047928A (en) 1986-10-24 1991-09-10 Wiedemer John D Billing system for computer software
US4817094A (en) 1986-12-31 1989-03-28 International Business Machines Corporation Fault tolerant switch with selectable operating modes
US4750034A (en) 1987-01-21 1988-06-07 Cloeck En Moedigh Bioscoopreclame B.V. Apparatus for monitoring the replay of audio/video information carriers
US4855922A (en) 1987-03-20 1989-08-08 Scientific-Atlanta, Inc. Apparatus and method for monitoring an energy management system
US4855730A (en) 1987-05-08 1989-08-08 Rca Licensing Corporation Component audio/video system with timed control of plural peripheral devices
CA1337132C (en) 1988-07-15 1995-09-26 Robert Filepp Reception system for an interactive computer network and method of operation
US4953209A (en) 1988-10-31 1990-08-28 International Business Machines Corp. Self-verifying receipt and acceptance system for electronically delivered data objects
US4857999A (en) 1988-12-20 1989-08-15 Peac Media Research, Inc. Video monitoring system
US4933971A (en) 1989-03-14 1990-06-12 Tandem Computers Incorporated Method for encrypting transmitted data using a unique key
JPH087709B2 (en) 1989-05-15 1996-01-29 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Access privileges control method and system
GB8916586D0 (en) 1989-07-20 1989-09-06 Int Computers Ltd Distributed data processing system
JP2606419B2 (en) 1989-08-07 1997-05-07 松下電器産業株式会社 Cryptographic communication system and encrypted communication method
US5001752A (en) 1989-10-13 1991-03-19 Fischer Addison M Public/key date-time notary facility
CA2010591C (en) 1989-10-20 1999-01-26 Phillip M. Adams Kernels, description tables and device drivers
US5029206A (en) 1989-12-27 1991-07-02 Motorola, Inc. Uniform interface for cryptographic services
JPH03214834A (en) 1990-01-19 1991-09-20 Canon Inc Multi-medium network system
US5249184A (en) 1990-01-30 1993-09-28 Johnson Service Company Network control system with improved reliability
US6507909B1 (en) 1990-02-13 2003-01-14 Compaq Information Technologies Group, L.P. Method for executing trusted-path commands
US5012514A (en) 1990-06-26 1991-04-30 Paul Renton Hard drive security system
US5048086A (en) 1990-07-16 1991-09-10 Hughes Aircraft Company Encryption system based on chaos theory
US5301268A (en) 1990-10-10 1994-04-05 Fuji Xerox Co., Ltd. Apparatus for transferring information between different window systems
US5222134A (en) 1990-11-07 1993-06-22 Tau Systems Corporation Secure system for activating personal computer software at remote locations
US5163092A (en) 1990-11-28 1992-11-10 Siemens Aktiengesellschaft Parallel scrambler used in sonet data transmission
DE4039355C2 (en) 1990-12-10 1998-07-30 Bosch Gmbh Robert Device for function checking of a watchdog circuit
US5274368A (en) 1991-02-15 1993-12-28 Motorola, Inc. Method and apparatus for controlling access to a communication system
US5269019A (en) 1991-04-08 1993-12-07 Storage Technology Corporation Non-volatile memory storage and bilevel index structure for fast retrieval of modified records of a disk track
DE69228039T2 (en) 1991-05-08 1999-08-05 Digital Equipment Corp License management system
US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system
US5438508A (en) 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US5142578A (en) 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
EP0529512A3 (en) 1991-08-23 1993-06-16 Fujitsu Limited Method and system for generating random number sequences
US5414861A (en) 1991-09-11 1995-05-09 Fujitsu Limited Data protection system using different levels of reserve power to maintain data in volatile memories for any period of time
EP0605618A4 (en) 1991-09-23 1998-05-13 Microsystems Z Enhanced security system for computing devices.
ES2038912B1 (en) 1991-09-30 1994-08-01 Alcatel Standard Electrica Scrambling System synchronous parallel data.
US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5519433A (en) 1991-11-20 1996-05-21 Zing Systems, L.P. Interactive television security through transaction time stamping
US5437040A (en) 1991-12-20 1995-07-25 Codar Technology Electronic system with variable threshold power failure signaling
KR940009843B1 (en) 1992-02-07 1994-10-17 이병기 Parallel scrambling system
US5448045A (en) 1992-02-26 1995-09-05 Clark; Paul C. System for protecting computers via intelligent tokens or smart cards
US5261002A (en) 1992-03-13 1993-11-09 Digital Equipment Corporation Method of issuance and revocation of certificates of authenticity used in public key networks and other systems
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5389738A (en) 1992-05-04 1995-02-14 Motorola, Inc. Tamperproof arrangement for an integrated circuit device
CA2097360A1 (en) 1992-06-03 1993-12-04 Paul Dvorkis Optical readers
US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
DE4232271C1 (en) 1992-09-25 1994-02-17 Siemens Ag An electronic device having a shift register test (boundary scan)
US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5303370A (en) 1992-11-13 1994-04-12 Score Group, Inc. Anti-counterfeiting process using lenticular optics and color masking
GB9303595D0 (en) 1993-02-23 1993-04-07 Int Computers Ltd Licence management mechanism for a computer system
US5444782A (en) 1993-03-09 1995-08-22 Uunet Technologies, Inc. Computer network encryption/decryption device
US6147773A (en) 1995-09-05 2000-11-14 Hewlett-Packard Company System and method for a communication system
US5513319A (en) 1993-07-02 1996-04-30 Dell Usa, L.P. Watchdog timer for computer system reset
US5570465A (en) 1993-07-22 1996-10-29 Tsakanikas; Peter J. Apparatus, method and system for printing of legal currency and negotiable instruments
US5444780A (en) 1993-07-22 1995-08-22 International Business Machines Corporation Client/server based secure timekeeping system
US5355161A (en) 1993-07-28 1994-10-11 Concord Media Systems Identification system for broadcast program segments
US5440640A (en) 1993-10-05 1995-08-08 Arithmetica, Inc. Multistream encryption system for secure communication
US5771354A (en) 1993-11-04 1998-06-23 Crawford; Christopher M. Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
NZ336413A (en) 1993-12-01 2000-01-28 Rpk Nz Ltd Method of generating random numbers by manipulating electronic pointer with coordinates at points corresponding to time instants being used for selection of points subset and computation of number function
US6671813B2 (en) 1995-06-07 2003-12-30 Stamps.Com, Inc. Secure on-line PC postage metering system
US5495411A (en) 1993-12-22 1996-02-27 Ananda; Mohan Secure software rental system using continuous asynchronous password verification
US5530846A (en) 1993-12-29 1996-06-25 International Business Machines Corporation System for decoupling clock amortization from clock synchronization
BR9506414A (en) 1994-01-13 1997-09-09 Bankers Trust Co Method for generating digital COMMUNICATIONS proven reliable private critpográficas between a plurality of users to generate method proven reliable cryptographic communication between a plurality of devices and method for authorizing a trusted device to perform an electronic transaction between a first user and a second part
US5442704A (en) 1994-01-14 1995-08-15 Bull Nh Information Systems Inc. Secure memory card with programmed controlled security access control
US5509074A (en) 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5553143A (en) 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing
JP2853727B2 (en) * 1994-02-22 1999-02-03 日本ビクター株式会社 Play protection method and protection reproducing apparatus
US5479514A (en) 1994-02-23 1995-12-26 International Business Machines Corporation Method and apparatus for encrypted communication in data networks
RU95103479A (en) 1994-03-11 1996-12-27 Уолкер Эссет Мэнеджмент Лимитед Партнершип (US) Game system, game computer, method for playing or drawing lottery when player participates in it
US5553139A (en) 1994-04-04 1996-09-03 Novell, Inc. Method and apparatus for electronic license distribution
US5598470A (en) 1994-04-25 1997-01-28 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block
US5757907A (en) 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
CA2143874C (en) 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5724425A (en) 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5588060A (en) 1994-06-10 1996-12-24 Sun Microsystems, Inc. Method and apparatus for a key-management scheme for internet protocols
EP0693836A1 (en) 1994-06-10 1996-01-24 Sun Microsystems, Inc. Method and apparatus for a key-management scheme for internet protocols.
US5469506A (en) 1994-06-27 1995-11-21 Pitney Bowes Inc. Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic
US5905799A (en) 1994-07-20 1999-05-18 Bell Atlantic Network Services, Inc. Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
US5557765A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5726898A (en) 1994-09-01 1998-03-10 American Greetings Corporation Method and apparatus for storing and selectively retrieving and delivering product data based on embedded expert judgements
US5473692A (en) 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
DE69534757D1 (en) 1994-09-15 2006-04-13 Ibm System and method for secure storage and distribution of data using digital signatures
US6002772A (en) 1995-09-29 1999-12-14 Mitsubishi Corporation Data management system
DE69535013D1 (en) 1994-10-27 2006-07-06 Intarsia Software Llc Copyright data management system
US6424715B1 (en) 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
JP3241950B2 (en) 1994-10-27 2001-12-25 スイム技研株式会社 Biological deodorization method
US5535276A (en) 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5563799A (en) 1994-11-10 1996-10-08 United Technologies Automotive, Inc. Low cost/low current watchdog circuit for microprocessor
US5845065A (en) 1994-11-15 1998-12-01 Wrq, Inc. Network license compliance apparatus and method
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system for digital work, and method for controlling access to digital work
EP0719045B1 (en) 1994-12-13 2003-10-29 Mitsubishi Corporation Crypt key system for secure electronic transactions
US5485577A (en) 1994-12-16 1996-01-16 General Instrument Corporation Of Delaware Method and apparatus for incremental delivery of access rights
DE4447404C2 (en) * 1994-12-23 1998-08-20 Francotyp Postalia Gmbh A method for data input into a scale and arrangement for performing the method
US5586291A (en) 1994-12-23 1996-12-17 Emc Corporation Disk controller with volatile and non-volatile cache memories
SE504085C2 (en) 1995-02-01 1996-11-04 Greg Benson Method and system for managing data objects in accordance with predetermined conditions for users
US5604801A (en) 1995-02-03 1997-02-18 International Business Machines Corporation Public key data communications system under control of a portable security device
US7133846B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
CN100365535C (en) 1995-02-13 2008-01-30 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US5742682A (en) 1995-03-31 1998-04-21 Pitney Bowes Inc. Method of manufacturing secure boxes in a key management system
US5852665A (en) 1995-04-13 1998-12-22 Fortress U & T Ltd. Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US6192392B1 (en) * 1995-05-29 2001-02-20 Siemens Aktiengesellschaft Updating mechanism for user programs in a computer system
US5761669A (en) 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
US5883955A (en) 1995-06-07 1999-03-16 Digital River, Inc. On-line try before you buy software distribution system
JPH096326A (en) 1995-06-23 1997-01-10 Konami Co Ltd Image display device
US5790677A (en) 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
JPH0922352A (en) 1995-07-07 1997-01-21 Mitsubishi Corp Copyright managing device
US5671412A (en) 1995-07-28 1997-09-23 Globetrotter Software, Incorporated License management system for software applications
US5793839A (en) 1995-08-03 1998-08-11 Bell Atlantic Network Services, Inc. Common channel signaling event detection and control
KR0162385B1 (en) 1995-08-05 1998-12-15 구자홍 Method and apparatus of focus servo for multi-layer disk
US5809144A (en) 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
EP0760565B1 (en) * 1995-08-28 1998-07-08 Michael Feldbau Apparatus and method for authenticating the dispatch and contents of documents
US5754657A (en) 1995-08-31 1998-05-19 Trimble Navigation Limited Authentication of a message source
DE19532617C2 (en) 1995-09-04 1998-01-22 Nisl Klaus Dipl Ing Method and apparatus for sealing of computer data
US5758068A (en) 1995-09-19 1998-05-26 International Business Machines Corporation Method and apparatus for software license management
US5799090A (en) 1995-09-25 1998-08-25 Angert; Joseph C. pad encryption method and software
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5796839A (en) 1995-10-16 1998-08-18 Sony Corporation Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium
JP3982848B2 (en) 1995-10-19 2007-09-26 富士通株式会社 Security level control apparatus and a network communication system
US5666416A (en) 1995-10-24 1997-09-09 Micali; Silvio Certificate revocation system
US5999629A (en) 1995-10-31 1999-12-07 Lucent Technologies Inc. Data encryption security module
US5825883A (en) 1995-10-31 1998-10-20 Interval Systems, Inc. Method and apparatus that accounts for usage of digital applications
US5604755A (en) 1995-11-20 1997-02-18 International Business Machine Corp. Memory system reset circuit
US5875236A (en) * 1995-11-21 1999-02-23 At&T Corp Call handling method for credit and fraud management
US5768382A (en) 1995-11-22 1998-06-16 Walker Asset Management Limited Partnership Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
US5870474A (en) 1995-12-04 1999-02-09 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US5825876A (en) 1995-12-04 1998-10-20 Northern Telecom Time based availability to content of a storage medium
JPH09162859A (en) 1995-12-07 1997-06-20 Fujitsu Ltd Scrambling method and device, descrambling method and device and data transmission method and system
US5708709A (en) * 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
US5774870A (en) 1995-12-14 1998-06-30 Netcentives, Inc. Fully integrated, on-line interactive frequency and award redemption program
US6105069A (en) 1997-01-22 2000-08-15 Novell, Inc. Licensing controller using network directory services
US6885994B1 (en) 1995-12-26 2005-04-26 Catalina Marketing International, Inc. System and method for providing shopping aids and incentives to customers through a computer network
WO1997025798A1 (en) 1996-01-11 1997-07-17 Mrj, Inc. System for controlling access and distribution of digital property
JP3627384B2 (en) 1996-01-17 2005-03-09 富士ゼロックス株式会社 An information processing method with software protection function information processing apparatus and software protection
JP2991099B2 (en) 1996-01-26 1999-12-20 富士ゼロックス株式会社 Signature apparatus and method
US6324683B1 (en) 1996-02-23 2001-11-27 International Business Machines Corporation System, method and program for debugging external programs in client/server-based relational database management systems
US5790664A (en) 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
JP3486043B2 (en) 1996-03-11 2004-01-13 株式会社東芝 Method of operation of the software distribution system and software system
US5758069A (en) 1996-03-15 1998-05-26 Novell, Inc. Electronic licensing system
DE19612999C2 (en) 1996-03-22 1999-04-01 Wasy Ges Fuer Wasserwirtschaft System for securing protected software against unauthorized use in computer networks
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US5883958A (en) 1996-04-01 1999-03-16 Sony Corporation Method and device for data decryption, a method and device for device identification, a recording medium, a method of disk production, and a method and apparatus for disk recording
US5903651A (en) 1996-05-14 1999-05-11 Valicert, Inc. Apparatus and method for demonstrating and confirming the status of a digital certificates and other data
TW333630B (en) 1996-05-22 1998-06-11 Matsushita Electric Ind Co Ltd An encryption apparatus for ensuring security in communication between devices
US5802592A (en) 1996-05-31 1998-09-01 International Business Machines Corporation System and method for protecting integrity of alterable ROM using digital signatures
US5825877A (en) 1996-06-11 1998-10-20 International Business Machines Corporation Support for portable trusted software
US5809145A (en) 1996-06-28 1998-09-15 Paradata Systems Inc. System for distributing digital information
US6138236A (en) 1996-07-01 2000-10-24 Sun Microsystems, Inc. Method and apparatus for firmware authentication
US5892906A (en) 1996-07-19 1999-04-06 Chou; Wayne W. Apparatus and method for preventing theft of computer devices
US6272538B1 (en) 1996-07-30 2001-08-07 Micron Technology, Inc. Method and system for establishing a security perimeter in computer networks
US5883670A (en) 1996-08-02 1999-03-16 Avid Technology, Inc. Motion video processing circuit for capture playback and manipulation of digital motion video information on a computer
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US5812857A (en) 1996-08-28 1998-09-22 Extended Systems, Inc. Field configurable embedded computer system
US5793868A (en) 1996-08-29 1998-08-11 Micali; Silvio Certificate revocation system
US5717757A (en) 1996-08-29 1998-02-10 Micali; Silvio Certificate issue lists
US6061451A (en) 1996-09-03 2000-05-09 Digital Vision Laboratories Corporation Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use
US7039603B2 (en) 1996-09-04 2006-05-02 Walker Digital, Llc Settlement systems and methods wherein a buyer takes possession at a retailer of a product purchased using a communication network
US6026293A (en) * 1996-09-05 2000-02-15 Ericsson Inc. System for preventing electronic memory tampering
US5949879A (en) 1996-09-06 1999-09-07 Pitney Bowes Inc. Auditable security system for the generation of cryptographically protected digital data
US5926624A (en) 1996-09-12 1999-07-20 Audible, Inc. Digital information library and delivery system with logic for generating files targeted to the playback device
US5983350A (en) 1996-09-18 1999-11-09 Secure Computing Corporation Secure firewall supporting different levels of authentication based on address or encryption status
US5958050A (en) 1996-09-24 1999-09-28 Electric Communities Trusted delegation system
US5931917A (en) 1996-09-26 1999-08-03 Verifone, Inc. System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser
US5844986A (en) 1996-09-30 1998-12-01 Intel Corporation Secure BIOS
US5825879A (en) 1996-09-30 1998-10-20 Intel Corporation System and method for copy-protecting distributed video content
US5754763A (en) 1996-10-01 1998-05-19 International Business Machines Corporation Software auditing mechanism for a distributed computer enterprise environment
US6078667A (en) 1996-10-10 2000-06-20 Certicom Corp. Generating unique and unpredictable values
US6006332A (en) 1996-10-21 1999-12-21 Case Western Reserve University Rights management system for digital media
EP0907120A3 (en) 1997-10-02 2004-03-24 Tumbleweed Software Corporation Method amd apparatus for delivering documents over an electronic network
US5953420A (en) 1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users
US5948061A (en) 1996-10-29 1999-09-07 Double Click, Inc. Method of delivery, targeting, and measuring advertising over networks
US6537352B2 (en) 1996-10-30 2003-03-25 Idatech, Llc Hydrogen purification membranes, components and fuel processing systems containing the same
US6367017B1 (en) 1996-11-07 2002-04-02 Litronic Inc. Apparatus and method for providing and authentication system
US5872846A (en) * 1996-11-07 1999-02-16 Mci Communications Corporation System and method for providing security in data communication systems
US5889860A (en) 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key
US5841870A (en) 1996-11-12 1998-11-24 Cheyenne Property Trust Dynamic classes of service for an international cryptography framework
US6212634B1 (en) 1996-11-15 2001-04-03 Open Market, Inc. Certifying authorization in computer networks
US6523119B2 (en) 1996-12-04 2003-02-18 Rainbow Technologies, Inc. Software protection device and method
US6256774B1 (en) 1996-12-06 2001-07-03 Sun Microsystems, Inc. Methods, systems, and computer program products for storing, loading, analyzing, and sharing references to recently used objects
GB9626200D0 (en) 1996-12-18 1997-02-05 Ncr Int Inc Secure data processing method and system
US6581162B1 (en) 1996-12-31 2003-06-17 Compaq Information Technologies Group, L.P. Method for securely creating, storing and using encryption keys in a computer system
US5763832A (en) 1997-01-02 1998-06-09 Anselm; Anthony C. Apparatus for affixing a strain wire into the wiring of flexible electric conduit
US5943248A (en) 1997-01-17 1999-08-24 Picturetel Corporation w-bit non-linear combiner for pseudo-random number generation
US6073124A (en) 1997-01-29 2000-06-06 Shopnow.Com Inc. Method and system for securely incorporating electronic information into an online purchasing application
US5949877A (en) 1997-01-30 1999-09-07 Intel Corporation Content protection for transmission systems
CA2228185C (en) 1997-01-31 2007-11-06 Certicom Corp. Verification protocol
US5953502A (en) 1997-02-13 1999-09-14 Helbig, Sr.; Walter A Method and apparatus for enhancing computer system security
US7095852B2 (en) 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6233684B1 (en) 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US6862602B2 (en) 1997-03-07 2005-03-01 Apple Computer, Inc. System and method for rapidly identifying the existence and location of an item in a file
US5982898A (en) 1997-03-07 1999-11-09 At&T Corp. Certification process
US5934422A (en) 1997-03-17 1999-08-10 Tenneco Automotive Inc. Step motor actuated continuously variable shock absorber
US6005945A (en) 1997-03-20 1999-12-21 Psi Systems, Inc. System and method for dispensing postage based on telephonic or web milli-transactions
US5995625A (en) 1997-03-24 1999-11-30 Certco, Llc Electronic cryptographic packing
DE19712375A1 (en) 1997-03-25 1998-10-01 Bosch Gmbh Robert Watchdog circuit
US5925127A (en) 1997-04-09 1999-07-20 Microsoft Corporation Method and system for monitoring the use of rented software
US6119229A (en) 1997-04-11 2000-09-12 The Brodia Group Virtual property system
JP3988172B2 (en) 1997-04-23 2007-10-10 ソニー株式会社 The information processing apparatus and method, and recording medium
JP3864401B2 (en) 1997-04-23 2006-12-27 ソニー株式会社 Authentication system, an electronic apparatus, authentication method, and a recording medium
US5999921A (en) 1997-04-30 1999-12-07 Pitney Bowes Inc. Electronic postage meter system having plural clock system providing enhanced security
US6557104B2 (en) 1997-05-02 2003-04-29 Phoenix Technologies Ltd. Method and apparatus for secure processing of cryptographic keys
US6202151B1 (en) 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
EP1650757A1 (en) 1997-05-13 2006-04-26 Kabushiki Kaisha Toshiba Information ciphering method and apparatus, information reproducing method and apparatus
US6441813B1 (en) 1997-05-16 2002-08-27 Kabushiki Kaisha Toshiba Computer system, and video decoder used in the system
DE69724235D1 (en) 1997-05-28 2003-09-25 Siemens Ag Computer system and method for protecting software
US6131162A (en) 1997-06-05 2000-10-10 Hitachi Ltd. Digital data authentication method
US6021438A (en) * 1997-06-18 2000-02-01 Wyatt River Software, Inc. License management system using daemons and aliasing
US6236728B1 (en) 1997-06-19 2001-05-22 Brian E. Marchant Security apparatus for data transmission with dynamic random encryption
US6094486A (en) 1997-06-19 2000-07-25 Marchant; Brian E. Security apparatus for data transmission with dynamic random encryption
US6240183B1 (en) 1997-06-19 2001-05-29 Brian E. Marchant Security apparatus for data transmission with dynamic random encryption
US6236727B1 (en) 1997-06-24 2001-05-22 International Business Machines Corporation Apparatus, method and computer program product for protecting copyright data within a computer system
US6389535B1 (en) 1997-06-30 2002-05-14 Microsoft Corporation Cryptographic protection of core data secrets
JP3613936B2 (en) 1997-07-07 2005-01-26 富士ゼロックス株式会社 Access qualification authentication device
CA2210199A1 (en) 1997-07-11 1999-01-11 Mitel Corporation Method and apparatus for the generation of non-linear confusion data
US5893086A (en) 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US6073172A (en) 1997-07-14 2000-06-06 Freegate Corporation Initializing and reconfiguring a secure network interface
AUPO799197A0 (en) 1997-07-15 1997-08-07 Silverbrook Research Pty Ltd Image processing method and apparatus (ART01)
US6230185B1 (en) 1997-07-15 2001-05-08 Eroom Technology, Inc. Method and apparatus for facilitating communication between collaborators in a networked environment
US6314408B1 (en) 1997-07-15 2001-11-06 Eroom Technology, Inc. Method and apparatus for controlling access to a product
US6233600B1 (en) 1997-07-15 2001-05-15 Eroom Technology, Inc. Method and system for providing a networked collaborative work environment
US7127741B2 (en) 1998-11-03 2006-10-24 Tumbleweed Communications Corp. Method and system for e-mail message transmission
US6058188A (en) 1997-07-24 2000-05-02 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system
US6188995B1 (en) * 1997-07-28 2001-02-13 Apple Computer, Inc. Method and apparatus for enforcing software licenses
DE19733605A1 (en) * 1997-07-29 1999-02-04 Francotyp Postalia Gmbh A method for billing of shipping services
DE69724947T2 (en) 1997-07-31 2004-05-19 Siemens Ag Computer system and method for securing a file
US5951642A (en) 1997-08-06 1999-09-14 Hypertak, Inc. System for collecting detailed internet information on the basis of the condition of activities of information viewers viewing information of service providers
US20020002675A1 (en) 1997-08-06 2002-01-03 Ronald Roscoe Bush Secure encryption of data packets for transmission over unsecured networks
JPH1166732A (en) 1997-08-13 1999-03-09 Sony Corp Data transmitter
JPH1166734A (en) 1997-08-13 1999-03-09 Sony Corp Data transmitter and method therefor
DE69836455T2 (en) 1997-08-20 2007-03-29 Canon K.K. System for electronic watermarks, electronic information distribution system and apparatus for saving images
US6061796A (en) 1997-08-26 2000-05-09 V-One Corporation Multi-access virtual private network
US6233567B1 (en) 1997-08-29 2001-05-15 Intel Corporation Method and apparatus for software licensing electronically distributed programs
US6233685B1 (en) 1997-08-29 2001-05-15 Sean William Smith Establishing and employing the provable untampered state of a device
US6684198B1 (en) * 1997-09-03 2004-01-27 Sega Enterprises, Ltd. Program data distribution via open network
US6199068B1 (en) 1997-09-11 2001-03-06 Abb Power T&D Company Inc. Mapping interface for a distributed server to translate between dissimilar file formats
US6564995B1 (en) 1997-09-19 2003-05-20 Schlumberger Malco, Inc. Smart card application-selection
JP2001517822A (en) 1997-09-19 2001-10-09 パク,ヒョ,ジョーン Using an independent software registration server software use rights management system
US6122741A (en) 1997-09-19 2000-09-19 Patterson; David M. Distributed method of and system for maintaining application program security
US6061794A (en) 1997-09-30 2000-05-09 Compaq Computer Corp. System and method for performing secure device communications in a peer-to-peer bus architecture
JPH11110294A (en) 1997-10-01 1999-04-23 Toshiba Corp Microcomputer and information processor
US6185678B1 (en) * 1997-10-02 2001-02-06 Trustees Of The University Of Pennsylvania Secure and reliable bootstrap architecture
US6170060B1 (en) 1997-10-03 2001-01-02 Audible, Inc. Method and apparatus for targeting a digital information playback device
DE19744375A1 (en) 1997-10-08 1999-04-15 Philips Patentverwaltung Control circuit for a microcontroller
US6230272B1 (en) 1997-10-14 2001-05-08 Entrust Technologies Limited System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US6549626B1 (en) 1997-10-20 2003-04-15 Sun Microsystems, Inc. Method and apparatus for encoding keys
US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7092914B1 (en) 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6289452B1 (en) 1997-11-07 2001-09-11 Cybersource Corporation Method and system for delivering digital products electronically
US6286051B1 (en) 1997-11-12 2001-09-04 International Business Machines Corporation Method and apparatus for extending a java archive file
US6078909A (en) 1997-11-19 2000-06-20 International Business Machines Corporation Method and apparatus for licensing computer programs using a DSA signature
US6141754A (en) 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US6490680B1 (en) 1997-12-04 2002-12-03 Tecsec Incorporated Access control and authorization system
US6334189B1 (en) 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US6502079B1 (en) 1997-12-08 2002-12-31 Aprisma Management Technologies, Inc. Method and system for enforcing floating licenses
EP1059001B1 (en) 1997-12-10 2002-07-24 Thomson Licensing S.A. Method for protecting the audio/visual data across the nrss inte rface
US5991399A (en) 1997-12-18 1999-11-23 Intel Corporation Method for securely distributing a conditional use private key to a trusted entity on a remote system
US6167358A (en) 1997-12-19 2000-12-26 Nowonder, Inc. System and method for remotely monitoring a plurality of computer-based systems
US6567793B1 (en) 1997-12-22 2003-05-20 Christian Bielefeldt Hicks Remote authorization for unlocking electronic data system and method
US6023510A (en) * 1997-12-24 2000-02-08 Philips Electronics North America Corporation Method of secure anonymous query by electronic messages transported via a public network and method of response
US6151676A (en) 1997-12-24 2000-11-21 Philips Electronics North America Corporation Administration and utilization of secret fresh random numbers in a networked environment
EP0926637B1 (en) 1997-12-26 2005-04-27 Nippon Telegraph and Telephone Corporation Electronic cash implementing method for issuer having electronic cash balance counters, corresponding issuer equipment and recording medium having recorded thereon a program for execution of the method
US5983238A (en) 1997-12-26 1999-11-09 Diamond Id Gemstons identification tracking and recovery system
JPH11194987A (en) 1998-01-05 1999-07-21 Toshiba Corp Communication device
US6148417A (en) 1998-01-14 2000-11-14 Micron Electronics, Inc. Method for determining a source of failure during a file system access
US6049878A (en) 1998-01-20 2000-04-11 Sun Microsystems, Inc. Efficient, secure multicasting with global knowledge
US6069647A (en) 1998-01-29 2000-05-30 Intel Corporation Conditional access and content security method
US6243470B1 (en) 1998-02-04 2001-06-05 International Business Machines Corporation Method and apparatus for advanced symmetric key block cipher with variable length key and block
US6385596B1 (en) 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6295577B1 (en) 1998-02-24 2001-09-25 Seagate Technology Llc Disc storage system having a non-volatile cache to store write data in the event of a power failure
US6094487A (en) 1998-03-04 2000-07-25 At&T Corporation Apparatus and method for encryption key generation
US6513117B2 (en) * 1998-03-04 2003-01-28 Gemstar Development Corporation Certificate handling for digital rights management system
US20020055906A1 (en) 1998-03-11 2002-05-09 Katz Ronald A. Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce
JP3743594B2 (en) 1998-03-11 2006-02-08 株式会社モリタ製作所 Ct imaging apparatus
US6553420B1 (en) 1998-03-13 2003-04-22 Massachusetts Institute Of Technology Method and apparatus for distributing requests among a plurality of resources
US7233948B1 (en) 1998-03-16 2007-06-19 Intertrust Technologies Corp. Methods and apparatus for persistent control and protection of content
US7809138B2 (en) 1999-03-16 2010-10-05 Intertrust Technologies Corporation Methods and apparatus for persistent control and protection of content
US7171662B1 (en) * 1998-03-18 2007-01-30 Microsoft Corporation System and method for software licensing
US20040080541A1 (en) 1998-03-20 2004-04-29 Hisashi Saiga Data displaying device
US6615350B1 (en) 1998-03-23 2003-09-02 Novell, Inc. Module authentication and binding library extensions
US6532451B1 (en) 1998-03-23 2003-03-11 Novell, Inc. Nested strong loader apparatus and method
US6253224B1 (en) 1998-03-24 2001-06-26 International Business Machines Corporation Method and system for providing a hardware machine function in a protected virtual machine
US6199169B1 (en) 1998-03-31 2001-03-06 Compaq Computer Corporation System and method for synchronizing time across a computer cluster
US6226747B1 (en) 1998-04-10 2001-05-01 Microsoft Corporation Method for preventing software piracy during installation from a read only storage medium
US6374357B1 (en) 1998-04-16 2002-04-16 Microsoft Corporation System and method for regulating a network service provider's ability to host distributed applications in a distributed processing environment
US6237098B1 (en) 1998-04-22 2001-05-22 Interface Logic Systems, Inc. System for protecting weight verification device private key
US6118873A (en) 1998-04-24 2000-09-12 International Business Machines Corporation System for encrypting broadcast programs in the presence of compromised receiver devices
US7503072B2 (en) 1998-04-29 2009-03-10 Microsoft Corporation Hardware ID to prevent software piracy
US5994710A (en) 1998-04-30 1999-11-30 Hewlett-Packard Company Scanning mouse for a computer system
DE19820605A1 (en) 1998-05-08 1999-11-11 Giesecke & Devrient Gmbh Method for secure distribution of software
US6219788B1 (en) 1998-05-14 2001-04-17 International Business Machines Corporation Watchdog for trusted electronic content distributions
US6389541B1 (en) 1998-05-15 2002-05-14 First Union National Bank Regulating access to digital content
IL124571D0 (en) 1998-05-21 1998-12-06 Miki Mullor Method of restricting software operation within a licensed limitation
US6085976A (en) 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
US6243692B1 (en) 1998-05-22 2001-06-05 Preview Software Secure electronic software packaging using setup-external unlocking module
CN1391631A (en) 1998-05-26 2003-01-15 约瑟夫·M·克拉尔 Window and door closing mechanism
US6397259B1 (en) 1998-05-29 2002-05-28 Palm, Inc. Method, system and apparatus for packet minimized communications
US6438690B1 (en) 1998-06-04 2002-08-20 International Business Machines Corp. Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system
US20040225894A1 (en) 1998-06-04 2004-11-11 Z4 Technologies, Inc. Hardware based method for digital rights management including self activating/self authentication software
US20040107368A1 (en) 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
US6684332B1 (en) 1998-06-10 2004-01-27 International Business Machines Corporation Method and system for the exchange of digitally signed objects over an insecure network
US6279111B1 (en) 1998-06-12 2001-08-21 Microsoft Corporation Security model using restricted tokens
US6505300B2 (en) 1998-06-12 2003-01-07 Microsoft Corporation Method and system for secure running of untrusted content
US6298446B1 (en) 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6049789A (en) 1998-06-24 2000-04-11 Mentor Graphics Corporation Software pay per use licensing system
US20010005201A1 (en) 1998-06-30 2001-06-28 Digiorgio Rinaldo A computer system using a processor interfacing with multiple displays
US6587684B1 (en) 1998-07-28 2003-07-01 Bell Atlantic Nynex Mobile Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol
US6374355B1 (en) 1998-07-31 2002-04-16 Lucent Technologies Inc. Method for securing over-the-air communication in a wireless system
US20010011253A1 (en) 1998-08-04 2001-08-02 Christopher D. Coley Automated system for management of licensed software
US6438235B2 (en) 1998-08-05 2002-08-20 Hewlett-Packard Company Media content protection utilizing public key cryptography
US6304973B1 (en) 1998-08-06 2001-10-16 Cryptek Secure Communications, Llc Multi-level security network system
US7228437B2 (en) 1998-08-13 2007-06-05 International Business Machines Corporation Method and system for securing local database file of local content stored on end-user system
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6959288B1 (en) 1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system
US6275586B1 (en) 1998-09-10 2001-08-14 Igt Cryptographically secure pseudo random number generator
US6868433B1 (en) 1998-09-11 2005-03-15 L.V. Partners, L.P. Input device having positional and scanning capabilities
US6385727B1 (en) 1998-09-25 2002-05-07 Hughes Electronics Corporation Apparatus for providing a secure processing environment
US6671803B1 (en) 1998-10-06 2003-12-30 Koninklijke Philips Electronics N.V. Method and system for consumer electronic device certificate management
US6266420B1 (en) 1998-10-08 2001-07-24 Entrust Technologies Limited Method and apparatus for secure group communications
CA2347176A1 (en) 1998-10-23 2000-05-04 L-3 Communications Corporation Apparatus and methods for managing key material in heterogeneous cryptographic assets
US6820063B1 (en) 1998-10-26 2004-11-16 Microsoft Corporation Controlling access to content based on certificates and access predicates
US6330670B1 (en) 1998-10-26 2001-12-11 Microsoft Corporation Digital rights management operating system
US7194092B1 (en) 1998-10-26 2007-03-20 Microsoft Corporation Key-based secure storage
US6327652B1 (en) 1998-10-26 2001-12-04 Microsoft Corporation Loading and identifying a digital rights management operating system
EP1127425A4 (en) 1998-10-28 2004-12-01 L 3 Comm Corp Apparatus and methods for cryptographic synchronization in packet based communications
US6799270B1 (en) 1998-10-30 2004-09-28 Citrix Systems, Inc. System and method for secure distribution of digital information to a chain of computer system nodes in a network
US6321335B1 (en) 1998-10-30 2001-11-20 Acqis Technology, Inc. Password protected modular computer method and device
US6442529B1 (en) 1998-11-17 2002-08-27 Novaweb Technologies, Inc. Methods and apparatus for delivering targeted information and advertising over the internet
US6272469B1 (en) 1998-11-25 2001-08-07 Ge Medical Systems Global Technology Company, Llc Imaging system protocol handling method and apparatus
US6303924B1 (en) 1998-12-21 2001-10-16 Microsoft Corporation Image sensing operator input device
US6263431B1 (en) 1998-12-31 2001-07-17 Intle Corporation Operating system bootstrap security mechanism
US6279156B1 (en) 1999-01-26 2001-08-21 Dell Usa, L.P. Method of installing software on and/or testing a computer system
WO2000044119A1 (en) 1999-01-26 2000-07-27 Infolio, Inc. Universal mobile id system and method for digital rights management
US6839841B1 (en) * 1999-01-29 2005-01-04 General Instrument Corporation Self-generation of certificates using secure microprocessor in a device for transferring digital information
JP2002536727A (en) 1999-01-29 2002-10-29 インフィネオン テクノロジース アクチエンゲゼルシャフト Integrated circuit
JP4603167B2 (en) 1999-02-15 2010-12-22 ヒューレット・パッカード・カンパニーHewlett−Packard Company Inter-module communication computing device
GB2346989A (en) 1999-02-19 2000-08-23 Ibm Software licence management system uses clustered licence servers
US7552166B2 (en) 1999-02-22 2009-06-23 Chack Michael A Method of queuing requests to access a communications network
US6615349B1 (en) 1999-02-23 2003-09-02 Parsec Sight/Sound, Inc. System and method for manipulating a computer file and/or program
EP1762958A1 (en) 1999-03-08 2007-03-14 Spyrus, Inc. Method and system for enforcing access to a computing resource using a licensing certificate
US7174457B1 (en) 1999-03-10 2007-02-06 Microsoft Corporation System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
JP2000270007A (en) 1999-03-12 2000-09-29 Sony Corp Network system, network server, and terminal device
AU3324599A (en) 1999-03-16 2000-10-04 Valentin Alexandrovich Mischenko Method and apparatus for encoding and decoding information
DE19911504B4 (en) * 1999-03-16 2006-02-23 Südzucker AG Mannheim/Ochsenfurt A process for the industrial oxidation of alcohols, aldehydes or polyhydroxy compounds
US6393427B1 (en) 1999-03-22 2002-05-21 Nec Usa, Inc. Personalized navigation trees
US6668246B1 (en) 1999-03-24 2003-12-23 Intel Corporation Multimedia data delivery and playback system with multi-level content and privacy protection
US7124938B1 (en) 1999-03-24 2006-10-24 Microsoft Corporation Enhancing smart card usage for associating media content with households
US6463534B1 (en) 1999-03-26 2002-10-08 Motorola, Inc. Secure wireless electronic-commerce system with wireless network domain
US6223291B1 (en) 1999-03-26 2001-04-24 Motorola, Inc. Secure wireless electronic-commerce system with digital product certificates and digital license certificates
US7383205B1 (en) 1999-03-27 2008-06-03 Microsoft Corporation Structure of a digital content package
US6829708B1 (en) 1999-03-27 2004-12-07 Microsoft Corporation Specifying security for an element by assigning a scaled value representative of the relative security thereof
US7319759B1 (en) 1999-03-27 2008-01-15 Microsoft Corporation Producing a new black box for a digital rights management (DRM) system
US7051005B1 (en) 1999-03-27 2006-05-23 Microsoft Corporation Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
US7103574B1 (en) 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US6973444B1 (en) 1999-03-27 2005-12-06 Microsoft Corporation Method for interdependently validating a digital content package and a corresponding digital license
US7136838B1 (en) 1999-03-27 2006-11-14 Microsoft Corporation Digital license and method for obtaining/providing a digital license
US8131648B2 (en) 1999-10-20 2012-03-06 Tivo Inc. Electronic content distribution and exchange system
US6920567B1 (en) 1999-04-07 2005-07-19 Viatech Technologies Inc. System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
JP2000293587A (en) 1999-04-09 2000-10-20 Sony Corp Information processor, information processing method, management device and method, and providing medium
US6665409B1 (en) 1999-04-12 2003-12-16 Cirrus Logic, Inc. Methods for surround sound simulation and circuits and systems using the same
US6851051B1 (en) 1999-04-12 2005-02-01 International Business Machines Corporation System and method for liveness authentication using an augmented challenge/response scheme
US6345294B1 (en) 1999-04-19 2002-02-05 Cisco Technology, Inc. Methods and apparatus for remote configuration of an appliance on a network
US6389537B1 (en) 1999-04-23 2002-05-14 Intel Corporation Platform and method for assuring integrity of trusted agent communications
SE514105C2 (en) 1999-05-07 2001-01-08 Ericsson Telefon Ab L M Safe distribution and protection of encryption key information
US6959291B1 (en) 1999-05-19 2005-10-25 International Business Machines Corporation Management of a concurrent use license in a logically-partitioned computer
US6898706B1 (en) 1999-05-20 2005-05-24 Microsoft Corporation License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
US6957186B1 (en) 1999-05-27 2005-10-18 Accenture Llp System method and article of manufacture for building, managing, and supporting various components of a system
US6721713B1 (en) 1999-05-27 2004-04-13 Andersen Consulting Llp Business alliance identification in a web architecture framework
US6321314B1 (en) 1999-06-09 2001-11-20 Ati International S.R.L. Method and apparatus for restricting memory access
US7089194B1 (en) 1999-06-17 2006-08-08 International Business Machines Corporation Method and apparatus for providing reduced cost online service and adaptive targeting of advertisements
US6631478B1 (en) 1999-06-18 2003-10-07 Cisco Technology, Inc. Technique for implementing high performance stable storage hierarchy in a computer network
US6393126B1 (en) 1999-06-23 2002-05-21 Datum, Inc. System and methods for generating trusted and authenticatable time stamps for electronic documents
US6704873B1 (en) 1999-07-30 2004-03-09 Accenture Llp Secure gateway interconnection in an e-commerce based environment
EP1076279A1 (en) 1999-08-13 2001-02-14 Hewlett-Packard Company Computer platforms and their methods of operation
US6609201B1 (en) 1999-08-18 2003-08-19 Sun Microsystems, Inc. Secure program execution using instruction buffer interdependencies
WO2001016776A1 (en) 1999-08-27 2001-03-08 Sony Corporation Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method
US6158657A (en) 1999-09-03 2000-12-12 Capital One Financial Corporation System and method for offering and providing secured credit card products
US7123608B1 (en) 1999-09-10 2006-10-17 Array Telecom Corporation Method, system, and computer program product for managing database servers and service
US6781956B1 (en) 1999-09-17 2004-08-24 Cisco Technology, Inc. System and method for prioritizing packetized data from a distributed control environment for transmission through a high bandwidth link
US6728880B1 (en) 1999-09-17 2004-04-27 Adobe Systems Incorporated Secure time on computers with insecure clocks
EP1085396A1 (en) 1999-09-17 2001-03-21 Hewlett-Packard Company Operation of trusted state in computing platform
US6671737B1 (en) 1999-09-24 2003-12-30 Xerox Corporation Decentralized network system
US6763458B1 (en) 1999-09-27 2004-07-13 Captaris, Inc. System and method for installing and servicing an operating system in a computer or information appliance
US6918034B1 (en) 1999-09-29 2005-07-12 Nokia, Corporation Method and apparatus to provide encryption and authentication of a mini-packet in a multiplexed RTP payload
US6850252B1 (en) 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US6983050B1 (en) * 1999-10-20 2006-01-03 Microsoft Corporation Methods and apparatus for protecting information content
US6978367B1 (en) 1999-10-21 2005-12-20 International Business Machines Corporation Selective data encryption using style sheet processing for decryption by a client proxy
KR100636111B1 (en) 1999-10-30 2006-10-18 삼성전자주식회사 Method protecting data stored in lost mobile terminal and recording medium therefor
US20020123964A1 (en) 1999-11-03 2002-09-05 Gerald Arthur Kramer Payment monitoring system
US6738810B1 (en) 1999-11-03 2004-05-18 D. Michael Corporation Method and apparatus for encouraging timely payments associated with a computer system
US6844871B1 (en) * 1999-11-05 2005-01-18 Microsoft Corporation Method and apparatus for computer input using six degrees of freedom
US6826690B1 (en) 1999-11-08 2004-11-30 International Business Machines Corporation Using device certificates for automated authentication of communicating devices
US7299292B2 (en) 2002-03-29 2007-11-20 Widevine Technologies, Inc. Process and streaming server for encrypting a data stream to a virtual smart card client system
US6449719B1 (en) 1999-11-09 2002-09-10 Widevine Technologies, Inc. Process and streaming server for encrypting a data stream
US6801998B1 (en) 1999-11-12 2004-10-05 Sun Microsystems, Inc. Method and apparatus for presenting anonymous group names
US8271336B2 (en) 1999-11-22 2012-09-18 Accenture Global Services Gmbh Increased visibility during order management in a network-based supply chain environment
US6792537B1 (en) 1999-11-22 2004-09-14 Sun Microsystems, Inc. Mechanism for determining restrictions to impose on an implementation of a service
US6654389B1 (en) 1999-11-23 2003-11-25 International Business Machines Corporation System and method for searching patterns in real-time over a shared media
GB2357229B (en) 1999-12-08 2004-03-17 Hewlett Packard Co Security protocol
US7213005B2 (en) 1999-12-09 2007-05-01 International Business Machines Corporation Digital content distribution using web broadcasting services
US6460140B1 (en) 1999-12-30 2002-10-01 Starnet Communications Corporation System for controlling the use of licensed software
US7689510B2 (en) 2000-09-07 2010-03-30 Sonic Solutions Methods and system for use in network management of content
US6816900B1 (en) 2000-01-04 2004-11-09 Microsoft Corporation Updating trusted root certificates on a client computer
EP1166562B1 (en) 2000-01-05 2011-06-29 NDS Limited Digital content delivery system and method
US6571216B1 (en) 2000-01-14 2003-05-27 International Business Machines Corporation Differential rewards with dynamic user profiling
US7353209B1 (en) 2000-01-14 2008-04-01 Microsoft Corporation Releasing decrypted digital content to an authenticated path
US6816596B1 (en) 2000-01-14 2004-11-09 Microsoft Corporation Encrypting a digital object based on a key ID selected therefor
US6772340B1 (en) 2000-01-14 2004-08-03 Microsoft Corporation Digital rights management system operating on computing device and having black box tied to computing device
US6791157B1 (en) 2000-01-18 2004-09-14 Advanced Micro Devices, Inc. Integrated circuit package incorporating programmable elements
SG103829A1 (en) 2000-01-28 2004-05-26 Canon Kk Digital contents distribution system, digital contents distribution method, roaming server, information processor, and information processing method
FR2805062B1 (en) 2000-02-10 2005-04-08 Bull Cp8 A data stream of high-speed transmission on a network of internet type between a server and a terminal a chip card, in particular a multimedia data stream
US7426750B2 (en) 2000-02-18 2008-09-16 Verimatrix, Inc. Network-based content distribution system
JP2001236324A (en) 2000-02-24 2001-08-31 Fujitsu Ltd Portable electronic device with individual authenticating function by biometric information
US7421480B2 (en) 2000-02-28 2008-09-02 O2 Micro International Limited Personal computing environment using mozilla
WO2001065368A2 (en) 2000-03-01 2001-09-07 Tashenberg Bradley A A distributed operating network and method for using and implementing same
JP2001256318A (en) 2000-03-14 2001-09-21 Sony Corp System and method for contents transaction and program providing medium
US7080039B1 (en) 2000-03-23 2006-07-18 David J Marsh Associating content with households using smart cards
JP2001338233A (en) 2000-03-24 2001-12-07 Sony Corp Electronic equipment, system and method for charging based on hours used, charging processor, recording medium and prepaid card
US6625729B1 (en) 2000-03-31 2003-09-23 Hewlett-Packard Company, L.P. Computer system having security features for authenticating different components
US6694000B2 (en) 2000-04-11 2004-02-17 Telecommunication Systems, Inc. Prepaid real-time web based reporting
US6386894B2 (en) 2000-04-28 2002-05-14 Texas Instruments Incorporated Versatile interconnection scheme for beverage quality and control sensors
US20030037261A1 (en) 2001-03-26 2003-02-20 Ilumin Corporation Secured content delivery system and method
US6847942B1 (en) * 2000-05-02 2005-01-25 General Electric Canada Equipment Finance G.P. Method and apparatus for managing credit inquiries within account receivables
US6922724B1 (en) 2000-05-08 2005-07-26 Citrix Systems, Inc. Method and apparatus for managing server load
US6785713B1 (en) 2000-05-08 2004-08-31 Citrix Systems, Inc. Method and apparatus for communicating among a network of servers utilizing a transport mechanism
AUPQ736200A0 (en) * 2000-05-08 2000-06-01 Canon Kabushiki Kaisha Information appliance cost subsidy
US6954728B1 (en) 2000-05-15 2005-10-11 Avatizing, Llc System and method for consumer-selected advertising and branding in interactive media
US7047404B1 (en) 2000-05-16 2006-05-16 Surety Llc Method and apparatus for self-authenticating digital records
US6917628B2 (en) 2000-05-19 2005-07-12 Scientific-Atlanta, Inc. Allocating access across a shared communications medium of a DOCSIS 1.0 compliant cable network
EP1158420A1 (en) 2000-05-24 2001-11-28 Robert Bosch Gmbh Method for a description of audio-visual data content in a multimedia environment
AU6251701A (en) 2000-06-05 2001-12-17 Sealedmedia Ltd Digital rights management
US7028180B1 (en) 2000-06-09 2006-04-11 Northrop Grumman Corporation System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
US7213266B1 (en) 2000-06-09 2007-05-01 Intertrust Technologies Corp. Systems and methods for managing and protecting electronic content and applications
US7706540B2 (en) * 2002-12-16 2010-04-27 Entriq, Inc. Content distribution using set of session keys
US7107462B2 (en) 2000-06-16 2006-09-12 Irdeto Access B.V. Method and system to store and distribute encryption keys
US6961858B2 (en) 2000-06-16 2005-11-01 Entriq, Inc. Method and system to secure content for distribution via a network
US6976162B1 (en) 2000-06-28 2005-12-13 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
WO2002007038A2 (en) * 2000-06-29 2002-01-24 Morrell Calvin Jr Systems and methods for producing reward advertising and distributing by click-through incentives
WO2002001790A1 (en) * 2000-06-29 2002-01-03 Matsushita Electric Industrial Co., Ltd. Copyright protective device and method
US6976163B1 (en) 2000-07-12 2005-12-13 International Business Machines Corporation Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein
JP4366845B2 (en) 2000-07-24 2009-11-18 ソニー株式会社 Data processing apparatus and data processing method, and program providing medium
JP3527211B2 (en) 2000-08-01 2004-05-17 日立マクセル株式会社 Electronic coupon system
KR100471053B1 (en) 2000-08-04 2005-03-07 삼성전자주식회사 Computer and method for controlling the same
GB0020441D0 (en) * 2000-08-18 2000-10-04 Hewlett Packard Co Performance of a service on a computing platform
GB0020488D0 (en) * 2000-08-18 2000-10-11 Hewlett Packard Co Trusted status rollback
DE50007300D1 (en) 2000-08-24 2004-09-09 Wibu Systems Ag A method of protecting computer software and / or computer-readable data and protection unit
US7043633B1 (en) 2000-08-28 2006-05-09 Verizon Corporation Services Group Inc. Method and apparatus for providing adaptive self-synchronized dynamic address translation
US7743259B2 (en) 2000-08-28 2010-06-22 Contentguard Holdings, Inc. System and method for digital rights management using a standard rendering engine
JP4654498B2 (en) 2000-08-31 2011-03-23 ソニー株式会社 Personal authentication system, personal authentication method, and an information processing apparatus, and program providing medium
JP4556308B2 (en) 2000-08-31 2010-10-06 ソニー株式会社 Content distribution system, a content distribution method, and an information processing apparatus, and program providing medium
AU9452401A (en) 2000-09-07 2002-03-22 Ivan Vesely Cascaded stream cipher
US7596784B2 (en) 2000-09-12 2009-09-29 Symantec Operating Corporation Method system and apparatus for providing pay-per-use distributed computing resources
US7272720B2 (en) 2000-09-27 2007-09-18 Fujitsu Limited Date-and-time management device and signature generation apparatus with date-and-time management function
US6895504B1 (en) 2000-09-29 2005-05-17 Intel Corporation Enabling secure communications with a client
US7096469B1 (en) 2000-10-02 2006-08-22 International Business Machines Corporation Method and apparatus for enforcing capacity limitations in a logically partitioned system
CA2425260A1 (en) 2000-10-12 2002-04-18 Frank S. Maggio Method and system for communicating advertising and entertainment content and gathering consumer information
US20060282319A1 (en) 2000-10-12 2006-12-14 Maggio Frank S Method and system for substituting media content
JP2004512734A (en) 2000-10-18 2004-04-22 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィKoninklijke Philips Electronics N.V. Generation of a common encryption key
WO2002035327A2 (en) 2000-10-24 2002-05-02 Nds Limited Transferring electronic content
US6986030B2 (en) 2000-10-27 2006-01-10 M-Systems Flash Disk Pioneers Ltd. Portable memory device includes software program for interacting with host computing device to provide a customized configuration for the program
US6789193B1 (en) 2000-10-27 2004-09-07 Pitney Bowes Inc. Method and system for authenticating a network user
DE10054940B4 (en) 2000-11-06 2005-06-02 Siemens Ag A method for transmitting fax data via a packet transmission network, related devices and associated program
US20020129359A1 (en) 2000-11-27 2002-09-12 Lichner Randall Manton Cross platform system and method for the management and distribution of pay per view video on demand
US6585158B2 (en) 2000-11-30 2003-07-01 Agilent Technologies, Inc. Combined pointing device and bar code scanner
US7515718B2 (en) * 2000-12-07 2009-04-07 Igt Secured virtual network in a gaming environment
US6636270B2 (en) 2000-12-14 2003-10-21 Microsoft Corporation Clock slaving methods and arrangements
US6898286B2 (en) 2000-12-19 2005-05-24 International Business Machines Corporation Method and system verifying product licenses using hardware and product identifications
US6934840B2 (en) 2000-12-21 2005-08-23 International Business Machines Corporation Composite keystore facility apparatus and method therefor
US6407680B1 (en) 2000-12-22 2002-06-18 Generic Media, Inc. Distributed on-demand media transcoding system and method
US20020152393A1 (en) 2001-01-09 2002-10-17 Johannes Thoma Secure extensible computing environment
US7165109B2 (en) 2001-01-12 2007-01-16 Microsoft Corporation Method and system to access software pertinent to an electronic peripheral device based on an address stored in a peripheral device
US7340530B2 (en) 2001-01-17 2008-03-04 International Business Machines Corporation Methods, for providing data from network secure communications in a cluster computing environment
AU2002228370B2 (en) 2001-01-31 2004-06-24 Ntt Docomo, Inc. System for program delivery to storage module of a mobile terminal
US7310734B2 (en) 2001-02-01 2007-12-18 3M Innovative Properties Company Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US20020107701A1 (en) 2001-02-02 2002-08-08 Batty Robert L. Systems and methods for metering content on the internet
SG99387A1 (en) 2001-02-02 2003-10-27 Matsushita Electric Ind Co Ltd Content usage management system and content usage management method
JP2002229861A (en) * 2001-02-07 2002-08-16 Hitachi Ltd Recording device with copyright protecting function
US20030108164A1 (en) 2001-02-08 2003-06-12 Laurin Jeremy S. Simultaneous, multiple digital presentation content block, channel independent presentation controller
CA2371124A1 (en) 2001-02-09 2002-08-09 Itaru Kawakami Information processing method/apparatus and program
US20020111916A1 (en) 2001-02-12 2002-08-15 Coronna Mark S. Payment management
US20020124046A1 (en) 2001-02-20 2002-09-05 Fischer William A. Peripheral devices which manage application upload to computing devices
JP4191902B2 (en) 2001-02-28 2008-12-03 株式会社日立製作所 The content distribution device
US20020019814A1 (en) * 2001-03-01 2002-02-14 Krishnamurthy Ganesan Specifying rights in a digital rights license according to events
US7134144B2 (en) 2001-03-01 2006-11-07 Microsoft Corporation Detecting and responding to a clock rollback in a digital rights management system on a computing device
JP2002278839A (en) * 2001-03-15 2002-09-27 Sony Corp Data access managing system, memory packaged device, data access managing method and program storage medium
GB2373605B (en) 2001-03-23 2005-04-27 Ibm A method of metering use of digitally encoded products
US7987510B2 (en) 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
US7216368B2 (en) 2001-03-29 2007-05-08 Sony Corporation Information processing apparatus for watermarking digital content
DE60227220D1 (en) 2001-03-29 2008-08-07 Sony Corp An information processing apparatus
US8949878B2 (en) 2001-03-30 2015-02-03 Funai Electric Co., Ltd. System for parental control in video programs based on multimedia content information
US7117183B2 (en) 2001-03-31 2006-10-03 First Data Coroporation Airline ticket payment and reservation system and methods
GB2374165A (en) 2001-04-02 2002-10-09 Global Knowledge Network Secure distribution of electronic media
US20020147601A1 (en) 2001-04-05 2002-10-10 Fagan Von E. Lease arrangements for providing computer equipment
US7516325B2 (en) 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US20030037237A1 (en) 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
AU2002307765A1 (en) 2001-04-11 2002-10-28 Nice Systems Ltd. Digital video protection for authenticity verification
US20020157002A1 (en) 2001-04-18 2002-10-24 Messerges Thomas S. System and method for secure and convenient management of digital electronic content
US7424747B2 (en) 2001-04-24 2008-09-09 Microsoft Corporation Method and system for detecting pirated content
US20060167985A1 (en) 2001-04-26 2006-07-27 Albanese Michael J Network-distributed data routing
US7814532B2 (en) 2001-05-02 2010-10-12 Lenovo (Singapore) Pte. Ltd. Data processing system and method for password protecting a boot device
US20020166056A1 (en) 2001-05-04 2002-11-07 Johnson William C. Hopscotch ticketing
CA2446584A1 (en) 2001-05-09 2002-11-14 Ecd Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US7359882B2 (en) 2001-05-11 2008-04-15 Bea Systems, Inc. Distributed run-time licensing
US7233668B2 (en) 2001-05-23 2007-06-19 Sharestream, Llc System and method for a commercial multimedia rental and distribution system
WO2002097693A2 (en) 2001-05-29 2002-12-05 Matsushita Electric Industrial Co., Ltd. Rights management unit
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US7000100B2 (en) 2001-05-31 2006-02-14 Hewlett-Packard Development Company, L.P. Application-level software watchdog timer
US7145919B2 (en) 2001-06-01 2006-12-05 Telefonaktienbolaget Lm Ericsson (Publ) Method and apparatus for transporting different classes of data bits in a payload over a radio interface
US7395245B2 (en) 2001-06-07 2008-07-01 Matsushita Electric Industrial Co., Ltd. Content usage management system and server used in the system
KR20030096250A (en) 2001-06-07 2003-12-24 콘텐트가드 홀딩즈 인코포레이티드 Method and apparatus for supporting multiple trust zones in a digital rights management system
EP1430373A2 (en) * 2001-06-11 2004-06-23 Matsushita Electric Industrial Co., Ltd. License management server, license management system and usage restriction method
US20020193101A1 (en) 2001-06-15 2002-12-19 Mcalinden Paul Configuring a portable device
GB2376762A (en) 2001-06-19 2002-12-24 Hewlett Packard Co Renting a computing environment on a trusted computing platform
US6716652B1 (en) 2001-06-22 2004-04-06 Tellabs Operations, Inc. Method and system for adaptive sampling testing of assemblies
US6948073B2 (en) 2001-06-27 2005-09-20 Microsoft Corporation Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
US20030005335A1 (en) * 2001-06-28 2003-01-02 Hidekazu Watanabe Protecting secured codes and circuits in an integrated circuit
US7224805B2 (en) 2001-07-06 2007-05-29 Nokia Corporation Consumption of content
DE10134541A1 (en) * 2001-07-16 2003-02-13 Siemens Ag Computer system and method for ordering a product, particularly a food or luxury agent
US20030021416A1 (en) * 2001-07-26 2003-01-30 International Business Machines Corporation Encrypting a messaging session with a symmetric key
US6664948B2 (en) 2001-07-30 2003-12-16 Microsoft Corporation Tracking pointing device motion using a single buffer for cross and auto correlation determination
US20030027549A1 (en) 2001-07-30 2003-02-06 Msafe Inc. Prepaid communication system and method
US6807542B2 (en) 2001-08-14 2004-10-19 International Business Machines Corporation Method and apparatus for selective and quantitative rights management
GB2378780B (en) 2001-08-14 2003-07-09 Elan Digital Systems Ltd Data integrity
US6993648B2 (en) * 2001-08-16 2006-01-31 Lenovo (Singapore) Pte. Ltd. Proving BIOS trust in a TCPA compliant system
US7484105B2 (en) 2001-08-16 2009-01-27 Lenovo (Singapore) Ptd. Ltd. Flash update using a trusted platform module
US7039037B2 (en) 2001-08-20 2006-05-02 Wang Jiwei R Method and apparatus for providing service selection, redirection and managing of subscriber access to multiple WAP (Wireless Application Protocol) gateways simultaneously
US20030040960A1 (en) 2001-08-22 2003-02-27 Eckmann Eduardo Enrique Method for promoting online advertising
US20030041008A1 (en) 2001-08-22 2003-02-27 William Grey System and method for facilitating transactions among disparate entities
US6934942B1 (en) 2001-08-24 2005-08-23 Microsoft Corporation System and method for using data address sequences of a program in a software development tool
US7310821B2 (en) 2001-08-27 2007-12-18 Dphi Acquisitions, Inc. Host certification method and system
US20030046274A1 (en) 2001-08-30 2003-03-06 Erickson John S. Software media container
US7050936B2 (en) 2001-09-06 2006-05-23 Comverse, Ltd. Failure prediction apparatus and method
US20030048473A1 (en) 2001-09-13 2003-03-13 Allan Rosen Printing device having a built-in device driver
US7237121B2 (en) 2001-09-17 2007-06-26 Texas Instruments Incorporated Secure bootloader for securing digital devices
US20030053630A1 (en) 2001-09-20 2003-03-20 International Business Machines Corporation Method and system for key usage control in an embedded security system
US20030063750A1 (en) 2001-09-26 2003-04-03 Alexander Medvinsky Unique on-line provisioning of user terminals allowing user authentication
EP1442388A2 (en) 2001-10-03 2004-08-04 Shield One, LLC Remotely controlled failsafe boot mechanism and remote manager for a network device
US20030069981A1 (en) 2001-10-09 2003-04-10 Koninklijke Philips Electronics N.V. IP hopping for secure data transfer
AU2002363055A1 (en) 2001-10-19 2003-05-06 Bank Of America Corporation System and method for interative advertising
CA2464102A1 (en) 2001-10-22 2003-05-01 Apple Computer, Inc. Intelligent synchronization for a media player
US7546359B2 (en) 2001-10-24 2009-06-09 Groove Networks, Inc. Method and apparatus for managing a peer-to-peer collaboration system
US6925557B2 (en) 2001-10-26 2005-08-02 International Business Machines Corporation Method and system for a clean system booting process
US7490250B2 (en) 2001-10-26 2009-02-10 Lenovo (Singapore) Pte Ltd. Method and system for detecting a tamper event in a trusted computing environment
US20030084352A1 (en) 2001-10-30 2003-05-01 Schwartz Jeffrey D. Appliance security model system and method
US7035920B2 (en) 2001-10-30 2006-04-25 Hewlett-Packard Development Company, L.P. Remote execution of software using windows management instrumentation
US20030084104A1 (en) 2001-10-31 2003-05-01 Krimo Salem System and method for remote storage and retrieval of data
JP3993416B2 (en) 2001-11-02 2007-10-17 富士通株式会社 Electronic commerce method, program, recording medium, and a server
US7243366B2 (en) 2001-11-15 2007-07-10 General Instrument Corporation Key management protocol and authentication system for secure internet protocol rights management architecture
US7159120B2 (en) 2001-11-19 2007-01-02 Good Technology, Inc. Method and system for protecting data within portable electronic devices
US7054468B2 (en) 2001-12-03 2006-05-30 Honda Motor Co., Ltd. Face recognition using kernel fisherfaces
AT443970T (en) 2001-12-11 2009-10-15 Ericsson Telefon Ab L M Method of right management for streaming media
CA2365441C (en) 2001-12-19 2010-02-16 Diversinet Corp. Method of establishing secure communications in a digital network using pseudonymic digital identifiers
US6646244B2 (en) 2001-12-19 2003-11-11 Hewlett-Packard Development Company, L.P. Optical imaging device with speed variable illumination
US20030115458A1 (en) 2001-12-19 2003-06-19 Dongho Song Invisable file technology for recovering or protecting a computer file system
US7398389B2 (en) 2001-12-20 2008-07-08 Coretrace Corporation Kernel-based network security infrastructure
US6744616B2 (en) 2001-12-28 2004-06-01 General Electric Company Method and apparatus for controlling an electronic control
US7234144B2 (en) 2002-01-04 2007-06-19 Microsoft Corporation Methods and system for managing computational resources of a coprocessor in a computing system
US8271400B2 (en) 2002-01-15 2012-09-18 Hewlett-Packard Development Company, L.P. Hardware pay-per-use
US7013384B2 (en) 2002-01-15 2006-03-14 Lenovo (Singapore) Pte. Ltd. Computer system with selectively available immutable boot block code
EP1470466B1 (en) 2002-02-01 2016-11-09 Panasonic Intellectual Property Corporation of America License information exchange system
US7747531B2 (en) 2002-02-05 2010-06-29 Pace Anti-Piracy Method and system for delivery of secure software license information
US7742992B2 (en) 2002-02-05 2010-06-22 Pace Anti-Piracy Delivery of a secure software license for a software product and a toolset for creating the software product
US8606704B2 (en) 2002-02-08 2013-12-10 Apple Inc. Customer billing in a communications network
US7287280B2 (en) 2002-02-12 2007-10-23 Goldman Sachs & Co. Automated security management
US20030200336A1 (en) 2002-02-15 2003-10-23 Suparna Pal Apparatus and method for the delivery of multiple sources of media content
US7298717B2 (en) 2002-02-15 2007-11-20 Texas Instruments Incorporated Method and apparatus for providing transmit diversity with adaptive basis
US7110987B2 (en) 2002-02-22 2006-09-19 At&T Wireless Services, Inc. Secure online purchasing
US20030163712A1 (en) 2002-02-28 2003-08-28 Lamothe Brian P. Method & system for limiting use of embedded software
US20030172376A1 (en) 2002-03-11 2003-09-11 Microsoft Corporation User controlled targeted advertisement placement for receiver modules
US7805371B2 (en) 2002-03-14 2010-09-28 Contentguard Holdings, Inc. Rights expression profile system and method
US7627753B2 (en) 2002-03-19 2009-12-01 Microsoft Corporation Secure digital data format and code enforced policy
US7127579B2 (en) 2002-03-26 2006-10-24 Intel Corporation Hardened extended firmware interface framework
US7080043B2 (en) 2002-03-26 2006-07-18 Microsoft Corporation Content revocation and license modification in a digital rights management (DRM) system on a computing device
JP2005521934A (en) 2002-03-28 2005-07-21 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィKoninklijke Philips Electronics N.V. Revocation of content material
US7343493B2 (en) 2002-03-28 2008-03-11 Lenovo (Singapore) Pte. Ltd. Encrypted file system using TCPA
US7284188B2 (en) 2002-03-29 2007-10-16 Sony Corporation Method and system for embedding MPEG-7 header data to improve digital content queries
US7028149B2 (en) 2002-03-29 2006-04-11 Intel Corporation System and method for resetting a platform configuration register
US7069442B2 (en) 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
EP1351145A1 (en) 2002-04-04 2003-10-08 Hewlett-Packard Company Computer failure recovery and notification system
US6708893B2 (en) 2002-04-12 2004-03-23 Lucent Technologies Inc. Multiple-use smart card with security features and method
US7272858B2 (en) 2002-04-16 2007-09-18 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on a relatively simple device
US6782477B2 (en) 2002-04-16 2004-08-24 Song Computer Entertainment America Inc. Method and system for using tamperproof hardware to provide copy protection and online security
US7130951B1 (en) 2002-04-18 2006-10-31 Advanced Micro Devices, Inc. Method for selectively disabling interrupts on a secure execution mode-capable processor
US7092527B2 (en) 2002-04-18 2006-08-15 International Business Machines Corporation Method, system and program product for managing a size of a key management block during content distribution
EP1522191B1 (en) 2002-04-19 2013-07-17 Opentv, Inc. Supporting common interactive television functionality through presentation engine syntax
US20030204738A1 (en) 2002-04-30 2003-10-30 Morgan Stephen Paul System and method for secure distribution of digital content via a network
US6782349B2 (en) 2002-05-03 2004-08-24 International Business Machines Corporation Method and system for updating a root of trust measurement function in a personal computer
US20050135613A1 (en) 2002-05-10 2005-06-23 Karlheinz Brandenburg Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data
US7523490B2 (en) 2002-05-15 2009-04-21 Microsoft Corporation Session key security protocol
JP4239058B2 (en) 2002-05-22 2009-03-18 ソニー株式会社 Radio communication device, radio control method for a communication apparatus, a recording medium recording a program of a control method of a program and a wireless communication device of the control method of the wireless communication device
US7315896B2 (en) 2002-06-06 2008-01-01 International Business Machines Corporation Server network controller including packet forwarding and method therefor
US7146504B2 (en) 2002-06-13 2006-12-05 Microsoft Corporation Secure clock on computing device such as may be required in connection with a trust-based system
US7296154B2 (en) 2002-06-24 2007-11-13 Microsoft Corporation Secure media path methods, systems, and architectures
US20040225519A1 (en) 2002-06-25 2004-11-11 Martin Keith D. Intelligent music track selection
US7234157B2 (en) * 2002-06-27 2007-06-19 Lenovo Singapore Pte Ltd Remote authentication caching on a trusted client or gateway system
US7216369B2 (en) * 2002-06-28 2007-05-08 Intel Corporation Trusted platform apparatus, system, and method
US20040001088A1 (en) * 2002-06-28 2004-01-01 Compaq Information Technologies Group, L.P. Portable electronic key providing transportable personal computing environment
US7523310B2 (en) 2002-06-28 2009-04-21 Microsoft Corporation Domain-based trust models for rights management of content
EP1519775B1 (en) 2002-07-05 2013-03-20 Mudalla Technology, Inc. Secure game download
US7565325B2 (en) 2002-07-09 2009-07-21 Avaya Technology Corp. Multi-site software license balancing
US8041642B2 (en) * 2002-07-10 2011-10-18 Avaya Inc. Predictive software license balancing
JP2004046708A (en) * 2002-07-15 2004-02-12 Sony Corp System, server, method and program for providing software, terminal, control program, and method and program for utilizing the software
US7121460B1 (en) 2002-07-16 2006-10-17 Diebold Self-Service Systems Division Of Diebold, Incorporated Automated banking machine component authentication system and method
US7000829B1 (en) 2002-07-16 2006-02-21 Diebold, Incorporated Automated banking machine key loading system and method
US6678828B1 (en) * 2002-07-22 2004-01-13 Vormetric, Inc. Secure network file access control system
US6816809B2 (en) * 2002-07-23 2004-11-09 Hewlett-Packard Development Company, L.P. Hardware based utilization metering
US20040023636A1 (en) 2002-07-31 2004-02-05 Comverse Network Systems, Ltd. Wireless prepaid payphone system and cost control application
DE10235564A1 (en) 2002-08-03 2004-02-12 Robert Bosch Gmbh Watchdog circuit for microprocessor or microcontroller monitoring, has means for checking the watchdog circuit itself by resetting it and then executing a number of wait loops such that a processor monitoring time is exceeded
US20040039960A1 (en) 2002-08-23 2004-02-26 Reza Kassayan Method and apparatus for automatic hibernation after a power failure
JP2004086392A (en) 2002-08-26 2004-03-18 Hitachi Ltd Computer configuration changing method and system
US7698225B2 (en) 2002-08-30 2010-04-13 Avaya Inc. License modes in call processing
US7216363B2 (en) 2002-08-30 2007-05-08 Avaya Technology Corp. Licensing duplicated systems
US7877607B2 (en) * 2002-08-30 2011-01-25 Hewlett-Packard Development Company, L.P. Tamper-evident data management
US7242773B2 (en) 2002-09-09 2007-07-10 Sony Corporation Multiple partial encryption using retuning
JP2004102789A (en) * 2002-09-11 2004-04-02 Sony Corp License management device, license management method and computer program
BR0314673A (en) * 2002-09-23 2005-08-02 Koninkl Philips Electronics Nv Method and system for secure content distribution among devices in a network and host device to manage a network
JP2004118327A (en) 2002-09-24 2004-04-15 Sony Corp Contents usage control device, contents usage control method and computer program
CN1613257A (en) 2002-09-30 2005-05-04 松下电器产业株式会社 Content using apparatus
US7376840B2 (en) 2002-09-30 2008-05-20 Lucent Technologies, Inc. Streamlined service subscription in distributed architectures
US20040067746A1 (en) 2002-10-03 2004-04-08 Johnson Jeffrey A. System for providing communications equipment
JP2004127040A (en) 2002-10-03 2004-04-22 Internatl Business Mach Corp <Ibm> Information processor, control method, program and recording medium
US20040088541A1 (en) 2002-11-01 2004-05-06 Thomas Messerges Digital-rights management system
US20040088218A1 (en) 2002-11-04 2004-05-06 Abraham Daniel M. Coupon discounts redemption/cash back program
US7904720B2 (en) 2002-11-06 2011-03-08 Palo Alto Research Center Incorporated System and method for providing secure resource management
US7149801B2 (en) 2002-11-08 2006-12-12 Microsoft Corporation Memory bound functions for spam deterrence and the like
US7171539B2 (en) * 2002-11-18 2007-01-30 Arm Limited Apparatus and method for controlling access to a memory
US7278168B1 (en) 2002-11-27 2007-10-02 Adobe Systems Incorporated Dynamic enabling of functionality in electronic document readers
US7660998B2 (en) 2002-12-02 2010-02-09 Silverbrook Research Pty Ltd Relatively unique ID in integrated circuit
KR20040050625A (en) 2002-12-10 2004-06-16 한국전자통신연구원 Authentication Method using Symmetric Authenticated Key Exchange and Asymmetric Authenticated Key Exchange
EP1429224A1 (en) 2002-12-10 2004-06-16 Texas Instruments France Firmware run-time authentication
US7493289B2 (en) 2002-12-13 2009-02-17 Aol Llc Digital content store system
US8745409B2 (en) 2002-12-18 2014-06-03 Sandisk Il Ltd. System and method for securing portable data
AU2003296056A1 (en) 2002-12-20 2004-07-14 Matsushita Electric Industrial Co., Ltd. Information management system
BR0317604A (en) 2002-12-20 2005-11-29 Nagracard Sa Safety device for a modular safety connector
US20050080701A1 (en) 2002-12-23 2005-04-14 Ge Corporate Financial Services, Inc. Methods and systems for managing risk management information
GB0230301D0 (en) 2002-12-30 2003-02-05 Nokia Corp Streaming media
US20040128251A1 (en) 2002-12-31 2004-07-01 Chris Adam Apparatus, system and method for licensing
US7734549B2 (en) * 2002-12-31 2010-06-08 Motorola, Inc. Methods and apparatus for managing secured software for a wireless device
US7200760B2 (en) 2002-12-31 2007-04-03 Protexis, Inc. System for persistently encrypting critical software data to control the operation of an executable software program
US7801820B2 (en) 2003-01-13 2010-09-21 Sony Corporation Real-time delivery of license for previously stored encrypted content
US20040139312A1 (en) 2003-01-14 2004-07-15 General Instrument Corporation Categorization of host security levels based on functionality implemented inside secure hardware
US7383586B2 (en) 2003-01-17 2008-06-03 Microsoft Corporation File system operation and digital rights management (DRM)
JP4299249B2 (en) 2003-01-20 2009-07-22 富士通株式会社 Duplication prevention device, a program for executing the copy prevention method and method on a computer
US7581255B2 (en) 2003-01-21 2009-08-25 Microsoft Corporation Systems and methods for licensing one or more data streams from an encoded digital media file
US7181016B2 (en) 2003-01-27 2007-02-20 Microsoft Corporation Deriving a symmetric key from an asymmetric key for file encryption or decryption
US7356709B2 (en) 2003-01-31 2008-04-08 Microsoft Corporation Systems and methods for deterring software piracy in a volume license environment
US7322042B2 (en) 2003-02-07 2008-01-22 Broadon Communications Corp. Secure and backward-compatible processor and secure software execution thereon
US20040158731A1 (en) 2003-02-11 2004-08-12 Microsoft Corporation Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
US7577999B2 (en) 2003-02-11 2009-08-18 Microsoft Corporation Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
WO2004077267A2 (en) 2003-02-24 2004-09-10 Listen.Com Delivery system providing conditional media access
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7308573B2 (en) 2003-02-25 2007-12-11 Microsoft Corporation Enrolling / sub-enrolling a digital rights management (DRM) server into a DRM architecture
US7827156B2 (en) 2003-02-26 2010-11-02 Microsoft Corporation Issuing a digital rights management (DRM) license for content based on cross-forest directory information
US7457411B2 (en) 2003-03-13 2008-11-25 New Mexico Technical Research Foundation Information security via dynamic encryption with hash function
US7278165B2 (en) 2003-03-18 2007-10-02 Sony Corporation Method and system for implementing digital rights management
US20040187011A1 (en) 2003-03-18 2004-09-23 Lee Long K. Prevention of unauthorized software distribution
CN1764883A (en) 2003-03-24 2006-04-26 松下电器产业株式会社 Data protection management apparatus and data protection management method
US20040193919A1 (en) 2003-03-31 2004-09-30 Dabbish Ezzat A. Method and apparatus for identifying trusted devices
US7136945B2 (en) 2003-03-31 2006-11-14 Sony Corporation Method and apparatus for extending protected content access with peer to peer applications
US7275159B2 (en) 2003-08-11 2007-09-25 Ricoh Company, Ltd. Multimedia output device having embedded encryption functionality
GB2400461B (en) 2003-04-07 2006-05-31 Hewlett Packard Development Co Control of access to of commands to computing apparatus
US20040220858A1 (en) 2003-05-02 2004-11-04 Maggio Frank S. Method and system for verifying exposure to message content delivered via subscription networks
US20050033747A1 (en) 2003-05-25 2005-02-10 Erland Wittkotter Apparatus and method for the server-sided linking of information
US7729992B2 (en) 2003-06-13 2010-06-01 Brilliant Digital Entertainment, Inc. Monitoring of computer-related resources and associated methods and systems for disbursing compensation
US8838950B2 (en) * 2003-06-23 2014-09-16 International Business Machines Corporation Security architecture for system on chip
US20040268120A1 (en) 2003-06-26 2004-12-30 Nokia, Inc. System and method for public key infrastructure based software licensing
US20050005114A1 (en) 2003-07-05 2005-01-06 General Instrument Corporation Ticket-based secure time delivery in digital networks
US7089594B2 (en) 2003-07-21 2006-08-08 July Systems, Inc. Application rights management in a mobile environment
US7444667B2 (en) 2003-07-28 2008-10-28 Intel Corporation Method and apparatus for trusted blade device computing
US7275263B2 (en) 2003-08-11 2007-09-25 Intel Corporation Method and system and authenticating a user of a computer system that has a trusted platform module (TPM)
US7831693B2 (en) 2003-08-18 2010-11-09 Oracle America, Inc. Structured methodology and design patterns for web services
US20050044397A1 (en) 2003-08-19 2005-02-24 Telefonaktiebolaget Lm Ericsson Method and system for secure time management in digital rights management
CA2438357A1 (en) 2003-08-26 2005-02-26 Ibm Canada Limited - Ibm Canada Limitee System and method for secure remote access
GB0320141D0 (en) 2003-08-28 2003-10-01 Ibm Data storage systems
US7366914B2 (en) 2003-08-29 2008-04-29 Intel Corporation Source code transformation based on program operators
US7660755B2 (en) 2003-09-18 2010-02-09 At&T Intellectual Property I, L.P. Methods, systems, and computer-readable-mediums for managing rollover usage units of communication services
US7668950B2 (en) 2003-09-23 2010-02-23 Marchex, Inc. Automatically updating performance-based online advertising system and method
US7801819B2 (en) 2003-10-03 2010-09-21 Sony Corporation Rendering rights delegation system and method
US7958029B1 (en) 2003-10-20 2011-06-07 Thomas Bobich Method for minimizing financial risk for wireless services
US7254836B2 (en) 2003-10-23 2007-08-07 Microsoft Corporation Protected media path and refusal response enabler
US7296296B2 (en) 2003-10-23 2007-11-13 Microsoft Corporation Protected media path and refusal response enabler
CN100399225C (en) 2003-11-11 2008-07-02 松下电器产业株式会社 Method for determining use permission of information and content distribution system using the method
US7533274B2 (en) 2003-11-13 2009-05-12 International Business Machines Corporation Reducing the boot time of a TCPA based computing system when the core root of trust measurement is embedded in the boot block code
JP4040570B2 (en) 2003-11-14 2008-01-30 キヤノン株式会社 Image forming apparatus, a data reception processing method, control program
US7882034B2 (en) 2003-11-21 2011-02-01 Realnetworks, Inc. Digital rights management for content rendering on playback devices
US20050203801A1 (en) 2003-11-26 2005-09-15 Jared Morgenstern Method and system for collecting, sharing and tracking user or group associates content via a communications network
EP1688875A4 (en) 2003-11-27 2011-12-07 Panasonic Corp Content distribution system and content license management method
JP4450609B2 (en) 2003-11-28 2010-04-14 株式会社日立製作所 Storage device
US7523316B2 (en) 2003-12-08 2009-04-21 International Business Machines Corporation Method and system for managing the display of sensitive content in non-trusted environments
US7900140B2 (en) 2003-12-08 2011-03-01 Microsoft Corporation Media processing methods, systems and application program interfaces
US6990174B2 (en) * 2003-12-15 2006-01-24 Instrumentarium Corp. Method and apparatus for performing single-point projection imaging
FI20031835A (en) 2003-12-15 2005-06-16 Instrumentarium Corp A method and system for locating the reference mark in the digital radiographic projections
US7711898B2 (en) 2003-12-18 2010-05-04 Intel Corporation Register alias table cache to map a logical register to a physical register
US9286445B2 (en) 2003-12-18 2016-03-15 Red Hat, Inc. Rights management system
US20050138388A1 (en) 2003-12-19 2005-06-23 Robert Paganetti System and method for managing cross-certificates copyright notice
US20050138389A1 (en) 2003-12-23 2005-06-23 International Business Machines Corporation System and method for making password token portable in trusted platform module (TPM)
US7424610B2 (en) 2003-12-23 2008-09-09 Intel Corporation Remote provisioning of secure systems for mandatory control
US7222062B2 (en) 2003-12-23 2007-05-22 Intel Corporation Method and system to support a trusted set of operational environments using emulated trusted hardware
US20050149729A1 (en) 2003-12-24 2005-07-07 Zimmer Vincent J. Method to support XML-based security and key management services in a pre-boot execution environment
US20050144099A1 (en) 2003-12-24 2005-06-30 Indrojit Deb Threshold billing
US7207039B2 (en) 2003-12-24 2007-04-17 Intel Corporation Secure booting and provisioning
US7421588B2 (en) 2003-12-30 2008-09-02 Lenovo Pte Ltd Apparatus, system, and method for sealing a data repository to a trusted computing platform
US7526649B2 (en) 2003-12-30 2009-04-28 Intel Corporation Session key exchange
US7426752B2 (en) 2004-01-05 2008-09-16 International Business Machines Corporation System and method for order-preserving encryption for numeric data
CN100470439C (en) 2004-01-08 2009-03-18 松下电器产业株式会社 Contents distribution system, license distribution method and terminal device
US20050166051A1 (en) 2004-01-26 2005-07-28 Mark Buer System and method for certification of a secure platform
US7447158B2 (en) 2004-01-28 2008-11-04 Empirix Inc. System and method for testing signals within digital-network packets
US7522712B2 (en) 2004-01-29 2009-04-21 Comverse Ltd. Method for initiating a session in a store and forward messaging system
US7570761B2 (en) 2004-02-03 2009-08-04 Trimble Navigation Limited Method and system for preventing unauthorized recording of media content in the iTunes™ environment
US7802095B2 (en) 2004-02-03 2010-09-21 Music Public Broadcasting, Inc. Method and system for preventing unauthorized recording of media content on a Macintosh operating system
US7116969B2 (en) 2004-02-12 2006-10-03 Sharp Laboratories Of America, Inc. Wireless device having a secure clock authentication method and apparatus
US7546641B2 (en) 2004-02-13 2009-06-09 Microsoft Corporation Conditional access to digital rights management conversion
US7676846B2 (en) 2004-02-13 2010-03-09 Microsoft Corporation Binding content to an entity
US7237103B2 (en) 2004-02-18 2007-06-26 Wyse Technology, Inc. Computing device deployment using mass storage device
WO2005081895A2 (en) 2004-02-23 2005-09-09 Hillcrest Laboratories, Inc. Methods and systems for a secure media computing environment
US7934010B2 (en) 2004-03-03 2011-04-26 Alcatel-Lucent Usa Inc. System and method for retrieving digital multimedia content from a network node
US7703141B2 (en) 2004-03-11 2010-04-20 Microsoft Corporation Methods and systems for protecting media content
US7549048B2 (en) 2004-03-19 2009-06-16 Microsoft Corporation Efficient and secure authentication of computing systems
US7441246B2 (en) 2004-03-19 2008-10-21 Microsoft Corporation Configurable collection of computer related metric data
US7653727B2 (en) 2004-03-24 2010-01-26 Intel Corporation Cooperative embedded agents
US20060184790A1 (en) 2004-03-26 2006-08-17 Microsoft Corporation Protecting elementary stream content
JP4561146B2 (en) 2004-03-29 2010-10-13 ソニー株式会社 Content distribution system, the encryption device, an encryption method, information processing program, and storage medium
US20050221766A1 (en) 2004-03-31 2005-10-06 Brizek John P Method and apparatus to perform dynamic attestation
US7571488B2 (en) 2004-03-31 2009-08-04 Panasonic Corporation Rights management terminal, server apparatus and usage information collection system
US20050229228A1 (en) 2004-04-07 2005-10-13 Sandeep Relan Unicast cable content delivery
US8271783B2 (en) 2004-04-19 2012-09-18 Hewlett-Packard Development Company, L.P. Subordinate trusted platform module
JP3804670B2 (en) 2004-04-21 2006-08-02 セイコーエプソン株式会社 Semiconductor device, the access control method of an electronic device and semiconductor device
US8060923B2 (en) 2004-04-23 2011-11-15 Microsoft Corporation Trusted license removal in a content protection system or the like
US7266569B2 (en) * 2004-04-23 2007-09-04 Microsoft Corporation Metering accessing of content and the like in a content protection system or the like
US7568096B2 (en) 2004-04-23 2009-07-28 Microsoft Corporation Rendering digital content in a content protection system according to a plurality of chained digital licenses
US20050279827A1 (en) 2004-04-28 2005-12-22 First Data Corporation Methods and systems for providing guaranteed merchant transactions
US7380119B2 (en) 2004-04-29 2008-05-27 International Business Machines Corporation Method and system for virtualization of trusted platform modules
US7664965B2 (en) 2004-04-29 2010-02-16 International Business Machines Corporation Method and system for bootstrapping a trusted server having redundant trusted platform modules
US7480804B2 (en) 2004-04-29 2009-01-20 International Business Machines Corporation Method and system for hierarchical platform boot measurements in a trusted computing environment
US7484091B2 (en) 2004-04-29 2009-01-27 International Business Machines Corporation Method and system for providing a trusted platform module in a hypervisor environment
US7500267B2 (en) 2004-04-30 2009-03-03 Microsoft Corporation Systems and methods for disabling software components to protect digital media
US8074287B2 (en) 2004-04-30 2011-12-06 Microsoft Corporation Renewable and individualizable elements of a protected environment
US7644239B2 (en) * 2004-05-03 2010-01-05 Microsoft Corporation Non-volatile memory cache performance improvement
US7584502B2 (en) 2004-05-03 2009-09-01 Microsoft Corporation Policy engine and methods and systems for protecting data
US20050254526A1 (en) 2004-05-12 2005-11-17 Nokia Corporation Parameter sets update in streaming applications
US7477749B2 (en) * 2004-05-12 2009-01-13 Nokia Corporation Integrity protection of streamed content
US7289016B2 (en) 2004-05-25 2007-10-30 Eaton Corporation Portable timer apparatus, home system and method of timing for an object
US7463374B2 (en) 2004-05-26 2008-12-09 Electronics For Imaging, Inc. Methods and apparatus for secure printing
US7097357B2 (en) 2004-06-02 2006-08-29 General Electric Company Method and system for improved correction of registration error in a fluoroscopic image
US7881267B2 (en) 2004-06-04 2011-02-01 Hewlett-Packard Development Company, L.P. Portable computing device for wireless communications and method of operation
FR2871344B1 (en) 2004-06-10 2007-01-05 Shishamania Internat Sarl Narguille has simplifies ignition
US7266714B2 (en) 2004-06-15 2007-09-04 Dolby Laboratories Licensing Corporation Method an apparatus for adjusting the time of a clock if it is determined that the degree of adjustment is within a limit based on the clocks initial time
US20050283601A1 (en) 2004-06-22 2005-12-22 Sun Microsystems, Inc. Systems and methods for securing a computer boot
US20050289343A1 (en) 2004-06-23 2005-12-29 Sun Microsystems, Inc. Systems and methods for binding a hardware component and a platform
US8290970B2 (en) 2004-06-29 2012-10-16 Hewlett-Packard Development Company, L.P. System and method for offering one or more drivers to run on the computer
EP1615381A1 (en) 2004-07-07 2006-01-11 Thomson Multimedia Broadband Belgium Device and process for wireless local area network association
US20060010326A1 (en) * 2004-07-08 2006-01-12 International Business Machines Corporation Method for extending the CRTM in a trusted platform
US20060015732A1 (en) * 2004-07-15 2006-01-19 Sony Corporation Processing system using internal digital signatures
US7552326B2 (en) * 2004-07-15 2009-06-23 Sony Corporation Use of kernel authorization data to maintain security in a digital processing system
US7716494B2 (en) * 2004-07-15 2010-05-11 Sony Corporation Establishing a trusted platform in a digital processing system
US8312267B2 (en) 2004-07-20 2012-11-13 Time Warner Cable Inc. Technique for securely communicating programming content
US7490356B2 (en) 2004-07-20 2009-02-10 Reflectent Software, Inc. End user risk management
JP2006042410A (en) * 2004-07-22 2006-02-09 Toshiba Corp Snubber device
US7461312B2 (en) * 2004-07-22 2008-12-02 Microsoft Corporation Digital signature generation for hardware functional test
US7490245B2 (en) * 2004-07-24 2009-02-10 Lenovo (Singapore) Pte. Ltd. System and method for data processing system planar authentication
US20060020554A1 (en) * 2004-07-26 2006-01-26 Septon Daven W License proxy
US20060026422A1 (en) 2004-07-29 2006-02-02 International Business Machines Corporation Method, apparatus, and product for providing a backup hardware trusted platform module in a hypervisor environment
US7478246B2 (en) 2004-07-29 2009-01-13 International Business Machines Corporation Method for providing a scalable trusted platform module in a hypervisor environment
US20060026418A1 (en) 2004-07-29 2006-02-02 International Business Machines Corporation Method, apparatus, and product for providing a multi-tiered trust architecture
US7343496B1 (en) 2004-08-13 2008-03-11 Zilog, Inc. Secure transaction microcontroller with secure boot loader
PL1791358T3 (en) 2004-08-31 2011-10-31 Moving image encoding method and apparatus
US7743069B2 (en) 2004-09-03 2010-06-22 Sybase, Inc. Database system providing SQL extensions for automated encryption and decryption of column data
US8150232B2 (en) 2004-09-03 2012-04-03 Panasonic Corporation Recording medium, recording device, program, and recording method
US20060074600A1 (en) 2004-09-15 2006-04-06 Sastry Manoj R Method for providing integrity measurements with their respective time stamps
US7395452B2 (en) 2004-09-24 2008-07-01 Microsoft Corporation Method and system for improved reliability in storage devices
US8179870B2 (en) 2004-09-29 2012-05-15 Intel Corporation Method and apparatus for securing devices in a network
US7653819B2 (en) 2004-10-01 2010-01-26 Lenovo Singapore Pte Ltd. Scalable paging of platform configuration registers
US8160244B2 (en) 2004-10-01 2012-04-17 Broadcom Corporation Stateless hardware security module
US20060072748A1 (en) 2004-10-01 2006-04-06 Mark Buer CMOS-based stateless hardware security module
US7493487B2 (en) 2004-10-15 2009-02-17 Microsoft Corporation Portable computing environment
US7516326B2 (en) 2004-10-15 2009-04-07 Hewlett-Packard Development Company, L.P. Authentication system and method
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US7441121B2 (en) 2004-10-18 2008-10-21 Microsoft Corporation Device certificate self-individualization
US8166296B2 (en) 2004-10-20 2012-04-24 Broadcom Corporation User authentication system
TWI244320B (en) 2004-10-20 2005-11-21 Asia Optical Co Inc Scanning unit having anti-reflective layers with high reflectivity
US8332653B2 (en) 2004-10-22 2012-12-11 Broadcom Corporation Secure processing environment
US20060089917A1 (en) 2004-10-22 2006-04-27 Microsoft Corporation License synchronization
US7464103B2 (en) 2004-10-29 2008-12-09 Microsoft Corporation Multi-level nested open hashed data stores
US7694153B2 (en) 2004-11-15 2010-04-06 Microsoft Corporation Changing product behavior in accordance with license
US20060104356A1 (en) 2004-11-15 2006-05-18 Microsoft Corporation Timing for decoder buffer examination
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US8464348B2 (en) 2004-11-15 2013-06-11 Microsoft Corporation Isolated computing environment anchored into CPU and motherboard
US20060165005A1 (en) 2004-11-15 2006-07-27 Microsoft Corporation Business method for pay-as-you-go computer and dynamic differential pricing
US7610631B2 (en) 2004-11-15 2009-10-27 Alexander Frank Method and apparatus for provisioning software
US7562220B2 (en) 2004-11-15 2009-07-14 Microsoft Corporation System and method for programming an isolated computing environment
US7979721B2 (en) 2004-11-15 2011-07-12 Microsoft Corporation Enhanced packaging for PC security
US20060106920A1 (en) 2004-11-15 2006-05-18 Microsoft Corporation Method and apparatus for dynamically activating/deactivating an operating system
US20060112267A1 (en) 2004-11-23 2006-05-25 Zimmer Vincent J Trusted platform storage controller
US7987356B2 (en) 2004-11-29 2011-07-26 Broadcom Corporation Programmable security platform
US7457960B2 (en) 2004-11-30 2008-11-25 Analog Devices, Inc. Programmable processor supporting secure mode
US20060129496A1 (en) 2004-12-14 2006-06-15 Motorola, Inc. Method and apparatus for providing digital rights management
US20060129824A1 (en) 2004-12-15 2006-06-15 Hoff James P Systems, methods, and media for accessing TPM keys
US7315941B2 (en) * 2004-12-17 2008-01-01 Ntt Docomo Inc. Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity
US7373551B2 (en) 2004-12-21 2008-05-13 Intel Corporation Method to provide autonomic boot recovery
US7392429B2 (en) 2004-12-22 2008-06-24 Microsoft Corporation System and method for maintaining persistent state data
US7360253B2 (en) 2004-12-23 2008-04-15 Microsoft Corporation System and method to lock TPM always ‘on’ using a monitor
US7512795B2 (en) 2005-01-04 2009-03-31 Motorola, Inc. Method and apparatus for authenticating components
US7500269B2 (en) 2005-01-07 2009-03-03 Cisco Technology, Inc. Remote access to local content using transcryption of digital rights management schemes
US7770205B2 (en) 2005-01-19 2010-08-03 Microsoft Corporation Binding a device to a computer
US20060174110A1 (en) 2005-01-31 2006-08-03 Microsoft Corporation Symmetric key optimizations
US7359807B2 (en) 2005-02-14 2008-04-15 Microsoft Corporation Maintaining and managing metering data for a subsidized computer
US7406446B2 (en) 2005-03-08 2008-07-29 Microsoft Corporation System and method for trustworthy metering and deactivation
US20060206618A1 (en) 2005-03-11 2006-09-14 Zimmer Vincent J Method and apparatus for providing remote audio
US7849311B2 (en) 2005-03-15 2010-12-07 Silicon Graphics International Computer system with dual operating modes
US20060213997A1 (en) 2005-03-23 2006-09-28 Microsoft Corporation Method and apparatus for a cursor control device barcode reader
US20070033102A1 (en) 2005-03-29 2007-02-08 Microsoft Corporation Securely providing advertising subsidized computer usage
US7669056B2 (en) 2005-03-29 2010-02-23 Microsoft Corporation Method and apparatus for measuring presentation data exposure
US8738536B2 (en) 2005-04-14 2014-05-27 Microsoft Corporation Licensing content for use on portable device
US7856404B2 (en) 2005-04-14 2010-12-21 Microsoft Corporation Playlist burning in rights-management context
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US7558463B2 (en) 2005-04-18 2009-07-07 Microsoft Corporation Retention of information about digital-media rights in transformed digital media content
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US7617401B2 (en) 2005-04-22 2009-11-10 Microsoft Corporation Hardware functionality scan for device authentication
US7739505B2 (en) 2005-04-22 2010-06-15 Microsoft Corporation Linking Diffie Hellman with HFS authentication by using a seed
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US20060242406A1 (en) 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US7665143B2 (en) 2005-05-16 2010-02-16 Microsoft Corporation Creating secure process objects
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US7584497B2 (en) 2005-05-24 2009-09-01 Microsoft Corporation Strategies for scheduling bandwidth-consuming media events
US8353046B2 (en) 2005-06-08 2013-01-08 Microsoft Corporation System and method for delivery of a modular operating system
US7376976B2 (en) 2005-07-11 2008-05-20 Microsoft Corporation Transcryption of digital content between content protection systems
US7903117B2 (en) 2005-07-11 2011-03-08 Microsoft Corporation Strategies for processing media information using a plug-in processing module in a path-agnostic manner
US7590841B2 (en) 2005-07-19 2009-09-15 Microsoft Corporation Automatic update of computer-readable components to support a trusted environment
EP1811464A1 (en) 2005-12-30 2007-07-25 THOMSON Licensing Installation for protected access to a digital content
JP2007304849A (en) 2006-05-11 2007-11-22 Sony Corp Management device, information processor, management method, and information processing method
US20070269044A1 (en) 2006-05-16 2007-11-22 Bruestle Michael A Digital library system with rights-managed access
FI120760B (en) 2006-05-31 2010-02-26 Palodex Group Oy Method and apparatus for medical x-ray imaging
EP1933522B1 (en) 2006-12-11 2013-10-23 Sap Ag Method and system for authentication
US8332635B2 (en) 2007-05-29 2012-12-11 International Business Machines Corporation Updateable secure kernel extensions
US8422674B2 (en) 2007-05-29 2013-04-16 International Business Machines Corporation Application-specific secret generation
US7886162B2 (en) 2007-05-29 2011-02-08 International Business Machines Corporation Cryptographic secure program overlays
JP5073580B2 (en) 2008-05-30 2012-11-14 日置電機株式会社 Signal amplifier

Patent Citations (100)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US623567A (en) * 1899-04-25 secor
US3718906A (en) * 1971-06-01 1973-02-27 R Lightner Vending system for remotely accessible stored information
US4202051A (en) * 1977-10-03 1980-05-06 Wisconsin Alumni Research Foundation Digital data enciphering and deciphering circuit and method
US4323921A (en) * 1979-02-06 1982-04-06 Etablissement Public De Diffusion Dit "Telediffusion De France" System for transmitting information provided with means for controlling access to the information transmitted
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US5103392A (en) * 1983-10-05 1992-04-07 Fujitsu Limited System for storing history of use of programs including user credit data and having access by the proprietor
US4747139A (en) * 1984-08-27 1988-05-24 Taaffe James L Software security method and systems
US4799259A (en) * 1986-04-10 1989-01-17 Rockwell International Corporation Monolithic random digital noise generator
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US5410598A (en) * 1986-10-14 1995-04-25 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5109413A (en) * 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
US4916738A (en) * 1986-11-05 1990-04-10 International Business Machines Corp. Remote access terminal security
US5117457A (en) * 1986-11-05 1992-05-26 International Business Machines Corp. Tamper resistant packaging for information protection in electronic circuitry
US4926479A (en) * 1988-04-29 1990-05-15 Massachusetts Institute Of Technology Multiprover interactive verification system
US5008935A (en) * 1989-06-30 1991-04-16 At&T Bell Laboratories Efficient method for encrypting superblocks of data
US5177790A (en) * 1989-12-19 1993-01-05 Bull Cp8 Method for generating a random number in a data processing system/and system for implementing the method
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
US5204897A (en) * 1991-06-28 1993-04-20 Digital Equipment Corporation Management interface for license management system
US5193573A (en) * 1992-06-15 1993-03-16 Chronister Clyde H Ball valve having replaceable seals under full service pressure
US5490216A (en) * 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US20040054630A1 (en) * 1995-02-13 2004-03-18 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US20020048369A1 (en) * 1995-02-13 2002-04-25 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5710887A (en) * 1995-08-29 1998-01-20 Broadvision Computer system and method for electronic commerce
US5864620A (en) * 1996-04-24 1999-01-26 Cybersource Corporation Method and system for controlling distribution of software in a multitiered distribution chain
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6023766A (en) * 1997-02-14 2000-02-08 Fujitsu Limited Software license control system and software license control equipment
US6335972B1 (en) * 1997-05-23 2002-01-01 International Business Machines Corporation Framework-based cryptographic key recovery system
US6681017B1 (en) * 1997-09-03 2004-01-20 Lucent Technologies Inc. Simplified secure shared key establishment and data delivery protocols for electronic commerce
US6189146B1 (en) * 1998-03-18 2001-02-13 Microsoft Corporation System and method for software licensing
US6701433B1 (en) * 1998-03-23 2004-03-02 Novell, Inc. Method and apparatus for escrowing properties used for accessing executable modules
US6219652B1 (en) * 1998-06-01 2001-04-17 Novell, Inc. Network license authentication
US7017188B1 (en) * 1998-11-16 2006-03-21 Softricity, Inc. Method and apparatus for secure content delivery over broadband access networks
US6343280B2 (en) * 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
US7010032B1 (en) * 1999-03-12 2006-03-07 Kabushiki Kaisha Toshiba Moving image coding apparatus and decoding apparatus
US20020007456A1 (en) * 1999-03-27 2002-01-17 Marcus Peinado Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US7024393B1 (en) * 1999-03-27 2006-04-04 Microsoft Corporation Structural of digital rights management (DRM) system
US20020013772A1 (en) * 1999-03-27 2002-01-31 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like
US6873975B1 (en) * 1999-04-06 2005-03-29 Fujitsu Limited Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
US6557105B1 (en) * 1999-04-14 2003-04-29 Tut Systems, Inc. Apparatus and method for cryptographic-based license management
US7006633B1 (en) * 1999-07-16 2006-02-28 Global Encryption Standard Corporation Global encryption system
US7020704B1 (en) * 1999-10-05 2006-03-28 Lipscomb Kenneth O System and method for distributing media assets to user devices via a portal synchronized by said user devices
US6859790B1 (en) * 1999-10-20 2005-02-22 Sony Corporation Data distribution system and method thereof, data processing device, data control device, and machine-readable recording medium recording distribution data
US20030046238A1 (en) * 1999-12-20 2003-03-06 Akira Nonaka Data processing apparatus, data processing system, and data processing method therefor
US20020004773A1 (en) * 2000-01-07 2002-01-10 Xu Jing Min Method and a system for certificate revocation list consolidation and access
US20020049679A1 (en) * 2000-04-07 2002-04-25 Chris Russell Secure digital content licensing system and method
US7020781B1 (en) * 2000-05-03 2006-03-28 Hewlett-Packard Development Company, L.P. Digital content distribution systems
US6993137B2 (en) * 2000-06-16 2006-01-31 Entriq, Inc. Method and system to securely distribute content via a network
US7036011B2 (en) * 2000-06-29 2006-04-25 Cachestream Corporation Digital rights management
US20020002674A1 (en) * 2000-06-29 2002-01-03 Tom Grimes Digital rights management
US20020018566A1 (en) * 2000-07-19 2002-02-14 Hitachi, Ltd. Apparatus and method for disribution of contents
US7010808B1 (en) * 2000-08-25 2006-03-07 Microsoft Corporation Binding digital content to a portable storage device or the like in a digital rights management (DRM) system
US20020026574A1 (en) * 2000-08-31 2002-02-28 Sony Corporation Person authentication system, person authentication method , information processing apparatus, and program providing medium
US6856997B2 (en) * 2000-10-27 2005-02-15 Lg Electronics Inc. Apparatus and method for providing file structure for multimedia streaming service
US20040054678A1 (en) * 2000-12-08 2004-03-18 Ryuichi Okamoto Distribution device, terminal device, and program and method for use therein
US7174452B2 (en) * 2001-01-24 2007-02-06 Broadcom Corporation Method for processing multiple security policies applied to a data packet structure
US6983049B2 (en) * 2001-05-04 2006-01-03 Hewlett-Packard Development Company, Lp. Storage devices for secure scalable data streaming
US20030041257A1 (en) * 2001-05-04 2003-02-27 Wee Susie J. Systems, methods and storage devices for scalable data streaming
US20030023564A1 (en) * 2001-05-31 2003-01-30 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US20020006204A1 (en) * 2001-06-27 2002-01-17 Paul England Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
US20030084306A1 (en) * 2001-06-27 2003-05-01 Rajasekhar Abburi Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US20030014496A1 (en) * 2001-06-27 2003-01-16 Spencer Donald J. Closed-loop delivery system
US7203966B2 (en) * 2001-06-27 2007-04-10 Microsoft Corporation Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US20030018491A1 (en) * 2001-07-17 2003-01-23 Tohru Nakahara Content usage device and network system, and license information acquisition method
US20050021989A1 (en) * 2001-07-30 2005-01-27 Johnson Harold J. Secure method and system for handling and distributing digital media
US20030028490A1 (en) * 2001-07-31 2003-02-06 Koji Miura System, apparatus, and method of contents distribution, and program and program recording medium directed to the same
US20030028454A1 (en) * 2001-08-01 2003-02-06 Masahiro Ooho Device and method for managing content usage right
US20030056118A1 (en) * 2001-09-04 2003-03-20 Vidius Inc. Method for encryption in an un-trusted environment
US20040042451A1 (en) * 2001-09-27 2004-03-04 Yoshiyuki Takaku Communication method, communication system, and output equipment
US20030069854A1 (en) * 2001-10-09 2003-04-10 Hsu Michael M. Expiring content on playback devices
US7484103B2 (en) * 2002-01-12 2009-01-27 Je-Hak Woo Method and system for the information protection of digital content
US20050010536A1 (en) * 2002-02-27 2005-01-13 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US7174320B2 (en) * 2002-04-04 2007-02-06 Intel Corporation Method of providing adaptive security
US7325139B2 (en) * 2002-04-15 2008-01-29 Sony Corporation Information processing device, method, and program
US20040039916A1 (en) * 2002-05-10 2004-02-26 David Aldis System and method for multi-tiered license management and distribution using networked clearinghouses
US20040003268A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system
US7353402B2 (en) * 2002-06-28 2008-04-01 Microsoft Corporation Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system
US20040003269A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Systems and methods for issuing usage licenses for digital content and services
US20040003270A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system
US7502945B2 (en) * 2002-06-28 2009-03-10 Microsoft Corporation Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system
US20040001594A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Systems and methods for providing secure server key operations
US20040003139A1 (en) * 2002-06-28 2004-01-01 Microsoft Corporation Secure server plug-in architecture for digital rights management systems
US20040010602A1 (en) * 2002-07-10 2004-01-15 Van Vleck Paul F. System and method for managing access to digital content via digital rights policies
US20040039932A1 (en) * 2002-08-23 2004-02-26 Gidon Elazar Apparatus, system and method for securing digital documents in a digital appliance
US20040054912A1 (en) * 2002-09-04 2004-03-18 Daniel Adent Data stream header object protection
US20070016784A1 (en) * 2003-04-28 2007-01-18 Koninklijke Philips Electronics N.V. Method of storing revocation list
US20050008240A1 (en) * 2003-05-02 2005-01-13 Ashish Banerji Stitching of video for continuous presence multipoint video conferencing
US20050028151A1 (en) * 2003-05-19 2005-02-03 Roth Steven T. Module symbol export
US20050002525A1 (en) * 2003-07-03 2005-01-06 Microsoft Corporation RTP payload format
US20070033419A1 (en) * 2003-07-07 2007-02-08 Cryptography Research, Inc. Reprogrammable security for controlling piracy and enabling interactive content
US20050010531A1 (en) * 2003-07-09 2005-01-13 Kushalnagar Nandakishore R. System and method for distributing digital rights management digital content in a controlled network ensuring digital rights
US20050069039A1 (en) * 2003-09-07 2005-03-31 Microsoft Corporation Determining a decoding time stamp from buffer fullness
US20060014521A1 (en) * 2004-07-14 2006-01-19 Zhi-Wen Chen Data protection method and system using the same
US20080075168A1 (en) * 2004-10-07 2008-03-27 Matsushita Electric Industrial Co., Ltd. Picture Coding Apparatus and Picture Decoding Apparatus
US20070003064A1 (en) * 2005-06-30 2007-01-04 Wiseman Willard M Apparatus and method for group session key and establishment using a certified migration key
US20070016594A1 (en) * 2005-07-15 2007-01-18 Sony Corporation Scalable video coding (SVC) file format
US20070078777A1 (en) * 2005-09-29 2007-04-05 Contentguard Holdings, Inc. System and method for digital rights management using advanced copy with issue rights, and managed copy tokens

Cited By (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8700535B2 (en) 2003-02-25 2014-04-15 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US8719171B2 (en) 2003-02-25 2014-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US20070150967A1 (en) * 2003-11-21 2007-06-28 Matsushita Electric Industrial Co., Ltd. License acquiring system, server apparatus and terminal apparatus
US9336359B2 (en) 2004-10-18 2016-05-10 Microsoft Technology Licensing, Llc Device certificate individualization
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US9224168B2 (en) 2004-11-15 2015-12-29 Microsoft Technology Licensing, Llc Tuning product policy using observed evidence of customer behavior
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US20060248596A1 (en) * 2005-04-27 2006-11-02 Microsoft Corporation Secure clock with grace periods
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8781969B2 (en) 2005-05-20 2014-07-15 Microsoft Corporation Extensible media rights
US20090158436A1 (en) * 2005-07-19 2009-06-18 Baese Gero Method for Exporting Use Rights for Electronic Data Objects
US8087092B2 (en) 2005-09-02 2011-12-27 Uniloc Usa, Inc. Method and apparatus for detection of tampering attacks
US20070143844A1 (en) * 2005-09-02 2007-06-21 Richardson Ric B Method and apparatus for detection of tampering attacks
US8819421B2 (en) * 2006-04-04 2014-08-26 Qualcomm Incorporated File decryption interface
US20070260881A1 (en) * 2006-04-04 2007-11-08 Maksim Krasnyanskiy File decryption interface
US8284929B2 (en) * 2006-09-14 2012-10-09 Uniloc Luxembourg S.A. System of dependant keys across multiple pieces of related scrambled information
US20100296653A1 (en) * 2006-09-14 2010-11-25 Richardson Ric B System of dependant keys across multiple pieces of related scrambled information
US7831517B1 (en) * 2006-10-24 2010-11-09 Adobe Systems Incorporated Single binary software license distribution
US20080189348A1 (en) * 2007-02-05 2008-08-07 Broadcom Corporation Media Transport Protocol Extensions for System Integrity and Robustness, and Applications Thereof
US20080189349A1 (en) * 2007-02-05 2008-08-07 Broadcom Corporation Media Transport Protocol Extensions for System Information Exchange, and Applications Thereof
US9172710B2 (en) * 2007-02-05 2015-10-27 Broadcom Corporation Media transport protocol extensions for system integrity and robustness, and applications thereof
US8626931B2 (en) 2007-02-05 2014-01-07 Broadcom Corporation Media transport protocol extensions for system information exchange, and applications thereof
US20170169244A1 (en) * 2007-02-21 2017-06-15 Palantir Technologies, Inc. Providing unique views of data based on changes or rules
US20180046821A1 (en) * 2007-02-21 2018-02-15 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US10229284B2 (en) * 2007-02-21 2019-03-12 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US9760733B2 (en) * 2007-02-21 2017-09-12 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US8832467B2 (en) 2007-05-16 2014-09-09 Broadcom Corporation Digital rights management metafile, management protocol and applications thereof
US20080288788A1 (en) * 2007-05-16 2008-11-20 Broadcom Corporation Digital Rights Management Metafile, Management Protocol and Applications Thereof
US20090083429A1 (en) * 2007-05-16 2009-03-26 Broadcom Corporation Generic Digital Rights Management Framework, and Applications Thereof
US8752191B2 (en) 2007-05-16 2014-06-10 Broadcom Corporation Generic digital rights management framework, and applications thereof
WO2008148356A1 (en) * 2007-06-06 2008-12-11 Huawei Technologies Co., Ltd. The method, device and system for forwarding the license
US20100017888A1 (en) * 2007-06-06 2010-01-21 Huawei Technologies Co., Ltd. Method, device and system for transferring license
US20090020600A1 (en) * 2007-07-19 2009-01-22 Canon Kabushiki Kaisha Right-of-use transfer system
US7757937B2 (en) * 2007-07-19 2010-07-20 Canon Kabushiki Kaisha Right-of-use transfer system
US8671060B2 (en) * 2007-09-20 2014-03-11 Uniloc Luxembourg, S.A. Post-production preparation of an unprotected installation image for downloading as a protected software product
US20090083730A1 (en) * 2007-09-20 2009-03-26 Richardson Ric B Installing Protected Software Product Using Unprotected Installation Image
US8160962B2 (en) 2007-09-20 2012-04-17 Uniloc Luxembourg S.A. Installing protected software product using unprotected installation image
US20120030668A1 (en) * 2007-09-20 2012-02-02 Uniloc Usa, Inc. Post-production preparation of an unprotected installation image for downloading as a protected software product
US8566960B2 (en) 2007-11-17 2013-10-22 Uniloc Luxembourg S.A. System and method for adjustable licensing of digital products
US20090150674A1 (en) * 2007-12-05 2009-06-11 Uniloc Corporation System and Method for Device Bound Public Key Infrastructure
US8464059B2 (en) 2007-12-05 2013-06-11 Netauthority, Inc. System and method for device bound public key infrastructure
US20090157552A1 (en) * 2007-12-12 2009-06-18 Microsoft Corporation Digital content packaging, licensing and consumption
US9892390B2 (en) 2007-12-12 2018-02-13 Microsoft Technology Licensing, Llc Digital content packaging, licensing and consumption
US20090292816A1 (en) * 2008-05-21 2009-11-26 Uniloc Usa, Inc. Device and Method for Secured Communication
US8812701B2 (en) 2008-05-21 2014-08-19 Uniloc Luxembourg, S.A. Device and method for secured communication
US20110208616A1 (en) * 2008-06-13 2011-08-25 Christopher Simon Gorman Content system
US20090327059A1 (en) * 2008-06-25 2009-12-31 Microsoft Corporation Digital rights management support for metering in advertising scenarios
US20090327702A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Key Escrow Service
US8423473B2 (en) 2009-06-19 2013-04-16 Uniloc Luxembourg S. A. Systems and methods for game activation
US9633183B2 (en) 2009-06-19 2017-04-25 Uniloc Luxembourg S.A. Modular software protection
US9141489B2 (en) 2009-07-09 2015-09-22 Uniloc Luxembourg S.A. Failover procedure for server system
US20150095646A1 (en) * 2009-08-14 2015-04-02 Azuki Systems, Inc. Method and system for unified mobile content protection
US9858396B2 (en) * 2009-08-14 2018-01-02 Ericsson Ab Method and system for unified mobile content protection
US20110314534A1 (en) * 2010-04-14 2011-12-22 Lee James Secured Execution Environments and Methods
US8930277B2 (en) * 2010-04-30 2015-01-06 Now Technologies (Ip) Limited Content management apparatus
US20110270709A1 (en) * 2010-04-30 2011-11-03 Chartsnow.Mobi Limited Content management apparatus
US20140189346A1 (en) * 2012-12-28 2014-07-03 Next Education, Llc License server manager
US9075960B2 (en) 2013-03-15 2015-07-07 Now Technologies (Ip) Limited Digital media content management apparatus and method
US20170019408A1 (en) * 2013-09-20 2017-01-19 Oracle International Corporation Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
US10230732B2 (en) * 2013-09-20 2019-03-12 Oracle International Corporation Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
US10104086B2 (en) 2015-04-24 2018-10-16 Oracle International Corporation Techniques for fine grained protection of resources in an access management environment
US10142371B2 (en) 2015-04-24 2018-11-27 Oracle International Corporation Authorization policy customization and authorization policy lockdown
US10171437B2 (en) 2015-04-24 2019-01-01 Oracle International Corporation Techniques for security artifacts management
US10248294B2 (en) 2016-06-15 2019-04-02 Palantir Technologies, Inc. Modal-less interface enhancements

Also Published As

Publication number Publication date
US20100280954A1 (en) 2010-11-04
US8781969B2 (en) 2014-07-15

Similar Documents

Publication Publication Date Title
JP4864284B2 (en) Protection of the data stream header object
AU2004200453B2 (en) Tying a digital license to a user and tying the user to multiple computing devices in a digital rights management (DRM) system
US7272859B2 (en) Information providing device and method
US7577999B2 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
CN100566244C (en) Issuing a publisher use license off-line in a digital rights management (DRM) system
CN1950777B (en) Integrity protection of streamed content
US7543336B2 (en) System and method for secure storage of data using public and private keys
US7469050B2 (en) Organization-based content rights management and systems, structures, and methods therefor
US6820063B1 (en) Controlling access to content based on certificates and access predicates
CN101467462B (en) Retention of information about digital-media rights in transformed digital media content
US7353402B2 (en) Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system
AU2006304655B2 (en) Methods for digital rights management
KR101009126B1 (en) Revocation of a certificate and exclusion of other principals in a digital rights managementdrm system based on a revocation list from a delegated revocation authority
US6330670B1 (en) Digital rights management operating system
AU2005201577B2 (en) Rendering protected digital content within a network of computing devices or the like
CN100576148C (en) System and method for providing key operation of safety server
US7631318B2 (en) Secure server plug-in architecture for digital rights management systems
US8122100B2 (en) Multiple object download
CN1531253B (en) Server for managing registered/subregistered digit power in DRM structure
JP4724360B2 (en) How to get the signature rights label for the digital content (srl) using rights template in a digital rights management system
US7483958B1 (en) Methods and apparatuses for sharing media content, libraries and playlists
US8438645B2 (en) Secure clock with grace periods
JP4703209B2 (en) Conversion from conditional access to digital rights management
US20040158731A1 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
JP4467255B2 (en) Digital rights management (drm) publishing of content related to the method

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KHANDELWAL, VIKAS;OLIVEIRA, EDUARDO P;VAN DYKE, CLIFFORDP;AND OTHERS;REEL/FRAME:016400/0744;SIGNING DATES FROM 20050801 TO 20050811

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014