Copy Protection Or Prevention Patents (Class 705/57)
-
Patent number: 8533852Abstract: A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a request for a first encrypted token from a partner service provider and communicating the request to the network. An authentication web service receives the request for the first encrypted token from the network and generates the first encrypted token. The partner service provider generates a request for data with the first encrypted token and communicates the request for data to the network. A data web service receives the request for data and communicates the request for data from the data web service to the authentication web service. The authentication web service validates the request for data and communicates a validation result to the data web service. The data web service communicates data to the partner service provider from the data web service after validating.Type: GrantFiled: December 19, 2007Date of Patent: September 10, 2013Assignee: The DIRECTV Group, Inc.Inventor: Kapil Chaudhry
-
Patent number: 8533859Abstract: The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for downloading to a client and identifies the sections for encoding. APIs are inserted in the identified sections. A unique ID is created based on the identity of the each client to generate an encryption algorithm, decryption key and decryption algorithm. The identified sections are encrypted with the generated encryption algorithm. The encrypted application along with encryption algorithm, decryption key and decryption algorithm are downloaded to the driver of the client machine. The API makes call to the driver by sending the encrypted segment when the encrypted portion is reached during the execution of software in the client machine so that the driver decrypts the encoded portion using the received key and the decryption algorithm to enable the continuous execution of the downloaded software.Type: GrantFiled: April 13, 2009Date of Patent: September 10, 2013Assignee: Aventyn, Inc.Inventors: Bhaktha Ram Keshavachar, Navin Govind
-
Patent number: 8533121Abstract: A remote phase identification system identifies the unknown phase attribute of any energized conductor within a three-phase power distribution network. A field probe at a remote location obtains an instantaneous phase measurement at a precise GPS second and communicates this phase, GPS second, and GPS coordinates to a field client. Either wireless Internet or satellite modem communications is used by the field client to retrieve the reference phase taken by a base station at the same GPS second. Field client tagging reference phase configuration files are automatically created for any circuit and applied to the base station reference phase. Configuration files can be named, saved, and loaded and are used by the field client to identify and display the unknown phase attribute. A field client can be any personal computer, smartphone, or personal digital assistant.Type: GrantFiled: November 23, 2010Date of Patent: September 10, 2013Inventor: Gregory Hubert Piesinger
-
Patent number: 8532291Abstract: The usability while performing copy control can be enhanced in the case of recording a digital broadcast program for which recording of one generation is permitted (“Copy One Generation”). When an output route in the case of copying digital contents from a first recording apparatus to a second recording apparatus is via LAN, authentication is executed between the first recording apparatus and the second recording apparatus. The capability of a move process with a predetermined copy number of multiple copies being kept is confirmed, and dedicated key information is shared to be used for encryption and decryption of the digital contents moved with the predetermined copy number of multiple copies being kept. Then, the digital contents recorded and managed in the first recording apparatus is added with the information about the predetermined copy number of multiple copies, and transmitted.Type: GrantFiled: June 16, 2011Date of Patent: September 10, 2013Assignee: Hitachi Consumer Electronics Co., Ltd.Inventors: Sadao Tsuruga, Hiroo Okamoto
-
Patent number: 8533849Abstract: A method for detecting at least one traitor computer system among a plurality of receiver computer systems including: assigning a version of protected content to each of the plurality of receiver computer systems that are currently identified as innocent by a content protection system that monitors distribution of protected content to the plurality of receiver computer systems; recovering at least one unauthorized rebroadcast of the content; generating a score for each of the plurality of receiver computer systems with respect to the recovered unauthorized rebroadcast; calculating a threshold independent of an estimation of maximum traitor computer systems; checking a highest score against the threshold; incriminating a receiver computer system having the highest score above the threshold as a traitor computer system; and removing any unauthorized rebroadcasts overlapping with the traitor computer system. The process may be repeated from generating scores until all traitors are identified.Type: GrantFiled: September 7, 2010Date of Patent: September 10, 2013Assignee: International Business Machines CorporationInventors: Hongxia Jin, Serdar Pehlivanoglu
-
Patent number: 8526610Abstract: A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means may operate in accordance with rules received as part of the streamed content, or through a side-band channel. The rules may specify allowed uses of the content, including whether or not the content can be copied or transferred, and whether and under what circumstances received content may be “checked out” of one device and used in a second device. The rules may also include or specify budgets, and a requirement that audit information be collected and/or transmitted to an external server. In a different aspect, the apparatus may include a media player designed to call plugins to assist in rendering content.Type: GrantFiled: October 5, 2010Date of Patent: September 3, 2013Assignee: Intertrust Technologies CorporationInventors: Talal G. Shamoon, Ralph D. Hill, Chris D. Radcliffe, John P. Hwa, W. Olin Sibert, David M. Van Wie
-
Patent number: 8527424Abstract: An encrypted content and its encryption key under a copy right use condition of prohibiting a copy by the device having received a content are stored, and the encrypted content is copy-transferred with another device through the network, and at the same time, the encryption key is transferred through the network, so that it is stored in either one of the devices. Even when a high definition television broadcast signal received with a copy-once taken as a copy right use condition is recorded, an access flag that controls the presence or absence of the reproduction of the broadcast content for each broadcast content is provided. When an original broadcast content is transcoded into a low resolution, and is transfer to another device, its access flag is turned on, thereby making the reproduction possible.Type: GrantFiled: December 1, 2011Date of Patent: September 3, 2013Assignee: Fujitsu LimitedInventors: Masaki Yamashima, Osamu Kawai
-
Patent number: 8521650Abstract: A method and system for providing premium content and dispersing payment therefore. The method includes entering into an agreement with at least one partner that provides premium content and entering into an agreement with at least one customer that grants the customer access to premium content provided by at least one partner. The method further includes collecting defined parameter data of at least one customer accessing the premium content and dispersing payment to at least one partner where the payment is determined from the defined parameter data. The defined parameter data can be approximate time spent.Type: GrantFiled: February 26, 2007Date of Patent: August 27, 2013Assignee: ZepFrog Corp.Inventor: Michael Rodov
-
Patent number: 8521652Abstract: Embodiments include methods, apparatus, and systems for discovering licenses in open source files. One method of software execution includes discovering a software license in code; and determining if the software license is a pre-existing open source software license.Type: GrantFiled: May 19, 2006Date of Patent: August 27, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventor: Glen A. Foster
-
Patent number: 8516258Abstract: Current MAC algorithms impose a significant system performance requirement in order to process messages in real time. According to an exemplary embodiment of the present invention, a hardware implemented generator for generating a MAC is provided, that results in a significant improvement in hardware performance requirements for processing messages in real time. The engine is based on linear feedback shift registers which are adapted to generate secure MACs.Type: GrantFiled: February 24, 2006Date of Patent: August 20, 2013Assignee: NXP B.V.Inventors: Marc Vauclair, Serret Avila Javier, Ventzislav Nikov
-
Patent number: 8510844Abstract: In a system which attaches update information required to create a content key used for content encryption/decryption to encrypted content and transmits the encrypted content, there is used an authorized content verification method including a verification request step of, by a receiver, transmitting an authorization verification request including update information received from a transmitter, an update information check step of, by the transmitter, checking whether the update information included in the received authorization verification request is predetermined update information, a message-of-acceptance transmission step of creating a message of acceptance using the update information and an exchange key shared between the transmitter and the receiver and transmitting the message of acceptance if the update information matches the predetermined update information, and an authorized content determination step of, by the receiver, determining that content is authorized content on the basis of reception ofType: GrantFiled: October 12, 2005Date of Patent: August 13, 2013Assignee: Panasonic CorporationInventors: Ayako Takatsuji, Hiroyuki Iitsuka, Naoshi Usuki
-
Patent number: 8510792Abstract: A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint. The method also includes providing a risk assessment associated with the privacy constraint violation. The risk assessment is at least partially based on terms and conditions associated with a particular device of the plurality of devices.Type: GrantFiled: November 25, 2009Date of Patent: August 13, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Ganesh Krishnamurthi, Balachander Krishnamurthy, Raghvendra Savoor
-
Patent number: 8510226Abstract: A licensing system is disclosed for performing synchronous encryption with a client over an IP-compliant network. In disclosed embodiments, the system includes a licensing agent configured to pass a data structure unencrypted in an initial communication between the licensing agent/client pair and pass a first key to said client responsive to an initial communication. The licensing agent then receives the data structure from the client having designated fields encrypted according to the first key. The licensing agent then sends a second key to the client for use in subsequent communications.Type: GrantFiled: January 10, 2007Date of Patent: August 13, 2013Assignee: GraphOn CorporationInventors: Christopher D. Coley, Ralph E. Wesinger
-
Patent number: 8504480Abstract: A method and system for authenticating applications. The system includes a plurality of portable electronic devices, at least one process organizer, at least one module developer, at least one task performer and a workflow server. The process organizer generates an application. The process organizer can request modules from module developers that are incorporated into the application. Alternatively, the process organizer makes an agreement with a task performer to perform tasks to complete the application. The application is transmitted to the workflow server, which includes an online marketplace for displaying and selling the applications. A user purchases the application through the store. A routing module generates a signature and compares the signature to application, module or document metadata and a secret to determine consistency of the data before the application, module or document is routed.Type: GrantFiled: February 3, 2011Date of Patent: August 6, 2013Assignee: Ricoh Co., LtdInventor: Kurt W. Piersol
-
Patent number: 8499359Abstract: A user requests to store a file to a storage device and a DLP module receives the request. The DLP module receives data for the file, encrypts the data using an encryption key and stores the encrypted data to the storage device. Next, the DLP module determines whether the encrypted data in the file is in compliance with a DLP policy. To determine compliance, the DLP module decrypts the data using the encryption key and examines the decrypted data for compliance. If the decrypted data is not in compliance with the DLP policy, the DLP module deletes the encrypted data from the storage device.Type: GrantFiled: December 14, 2010Date of Patent: July 30, 2013Assignee: Symantec CorporationInventor: William Blanke
-
Patent number: 8498942Abstract: A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device. The license request and the timeout indicator may be combined to form a device license for the personal media device. The device license may be digitally-signed to form a signed device license.Type: GrantFiled: April 20, 2012Date of Patent: July 30, 2013Assignee: Intel CorporationInventor: Joshua D. Hug
-
Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
Patent number: 8495755Abstract: Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.Type: GrantFiled: October 6, 2011Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Hongxia Jin, Jeffrey B. Lotspiech -
Patent number: 8494966Abstract: One embodiment of the present invention provides a system that facilitates the transfer of a software license from a first client to a second client. The system operates by receiving a request at the first client to deactivate the software license for an associated application installed on the first client. The system then receives a deactivation request that includes an identifier for the license at a license activation server from the first client. Next, the system validates the identifier on the license activation server to determine if the identifier is a valid identifier. If so, the system sends a deactivation message to the first client, receives a deactivation response from the first client, and increments a count of license instances available for the identifier on the license activation server.Type: GrantFiled: June 3, 2005Date of Patent: July 23, 2013Assignee: Adobe Systems IncorporatedInventors: Xuejun Xu, Katherine K. Nadell
-
Patent number: 8495389Abstract: A method for preventing unauthorized use of a software program on a computing device includes updating a state of a software program on a computing device to an updated state. Transmitting an update signal from the software program to a hardware token coupled to the computing device and updating a state of the hardware token to an updated state in response to the received update signal. Performing a first cryptographic check using the updated state of the software program and the updated state of the hardware token with the hardware token. Transmitting the first cryptographic check from the hardware token to the software program and performing a second cryptographic check using the state of the hardware token and the state of the software program with the computing device.Type: GrantFiled: December 18, 2006Date of Patent: July 23, 2013Assignee: SafeNet, Inc.Inventors: Laszlo Elteto, Michael Cochran, Mehdi Sotoodeh, Tu Le
-
Patent number: 8489510Abstract: Selling intangible property rights may include receiving content from a seller and determining one or more potential purchasers for the content's intangible property rights. The potential purchasers may be determined according to the subject of the content, the audience for the content, and the intangible property rights being sold. An offer to sell the intangible property rights may then be transmitted to one or more potential purchasers, along with a portion of the content. Upon receiving the one or more purchaser's acceptance of the offer, a complete copy of the content may be transmitted to the purchaser.Type: GrantFiled: December 5, 2007Date of Patent: July 16, 2013Assignee: AT&T Intellectual Property I, L.P.Inventor: Ari Craine
-
Patent number: 8478693Abstract: A determination is made regarding whether a user is allowed to access a content item. The content item is associated with a website. An offer associated with the website is identified. The offer includes a set of use-time rules specifying time periods during which the offer can be used to access content. A use-time rule is associated with a user class. A class of the user with respect to the offer is determined. The user's class indicates whether the user has accepted the offer or whether the user has registered with the website. A determination is made regarding whether the user is allowed to access the content item based on the offer, the user's class, and a current timestamp.Type: GrantFiled: February 13, 2012Date of Patent: July 2, 2013Assignee: Google Inc.Inventors: Eric H. Weigle, Maricia S. Scott
-
Patent number: 8474059Abstract: Apparatus and methods are provided for embedding or embedding digital data into an analog host or cover signal. A distributed signal feature of the cover signal in a particular domain (time, frequency or space) is calculated and compared with a set of predefined quantization values corresponding to an information symbol to be encoded. The amount of change required to modify the signal feature to the determined target quantization value is calculated and the cover signal is modified accordingly to so change the feature value over a predefined interval. Information symbols are extracted by the opposite process. In one embodiment, the predefined value is a short term auto correlation value of the cover signal.Type: GrantFiled: December 9, 2011Date of Patent: June 25, 2013Assignee: Verance CorporationInventor: Rade Petrovic
-
Patent number: 8464355Abstract: Exchange of Digital Rights Management protected content between two devices without the need for a third party. Each user marks a license as unusable and the devices the trade licenses. A user then instructs the device to import the received license. The device verifies that a license has been rendered unusable and only then erases the unusable license and enables the device to use the new license. The content associated with a license may be traded before or after the license exchange, and may also be downloaded from a third party. Also provided is a device for exchanging licenses.Type: GrantFiled: June 24, 2008Date of Patent: June 11, 2013Assignee: Thomson LicensingInventor: Olivier Courtay
-
Patent number: 8463709Abstract: A system for providing users with an indication of files that are protected or licensed while a user is executing within the embedded partition set forth. The system enables users to quickly boot into an embedded environment and have an indication of all of their media files, whether the content is accessible via the embedded environment or the content is protected or licensed content stored within another partition. Thus, the user receives an indication that the protected or licensed content is still on their computer and that the user cannot access the protected or licensed content via the embedded environment.Type: GrantFiled: April 11, 2006Date of Patent: June 11, 2013Assignee: Dell Products L.P.Inventors: Erin Kurusz Walline, Steve Bracamontez, David Zavelson
-
Patent number: 8463776Abstract: An image container file has at least first and second multimedia streams (MSs). The first MS includes first image data representing an image. The second MS includes arbitrary data, which can for example, correspond to: a different representation of the same image; annotations to the first image data; second image data that together with the first image data form a new image with greater dynamic range, resolution, field of view or other attributes that can be derived from processing two or more independent images; or an executable file related to the first MS. The image container file can also include an extensible metadata to hold information describing one or more multimedia streams of the image container file. Further, the image container file may include DRM information to provide information related to obtaining a license to access encrypted data or verifying the authenticity of encrypted or unencrypted data.Type: GrantFiled: July 16, 2008Date of Patent: June 11, 2013Assignee: Microsoft CorporationInventors: Geoffrey T. Dunbar, Kirt A. Debique, Joseph D. Ternasky, William M. Crow
-
Patent number: 8457317Abstract: An archival storage cluster of preferably symmetric nodes includes a data privacy scheme that implements key management through secret sharing. In one embodiment, the protection scheme is implemented at install time. At install, an encryption key is generated, split, and the constituent pieces written to respective archive nodes. The key is not written to a drive to ensure that it cannot be stolen or otherwise compromised. Due to the secret sharing scheme, any t of the n nodes must be present before the cluster can mount the drives. Thus, to un-share the secret, a process runs before the cluster comes up. It contacts as many nodes as possible to attempt to reach a sufficient t value. Once it does, the process un-shares the secret and mounts the drives locally. Given bidirectional communication, this mount occurs more or less at the same time on all t nodes. Once the drives are mounted, the cluster can continue to boot as normal.Type: GrantFiled: May 7, 2008Date of Patent: June 4, 2013Assignee: Hitachi Data Systems CorporationInventor: David M. Shaw
-
Patent number: 8458098Abstract: Methods of tracking remote software installations at a central server may include receiving an installation message over a network from a user device wherein the installation message indicates an installation of the software at the user device. After receiving the installation message from the user device, an installation code may be created responsive to receiving the installation message, and the installation code may uniquely identify installation of the software at the user device. The installation code may be transmitted over the network to the user device, and the installation code may be stored at the central server. Related systems and computer program products are also discussed.Type: GrantFiled: September 29, 2005Date of Patent: June 4, 2013Assignee: Qurio Holdings, Inc.Inventor: Patricia Scardino
-
Patent number: 8452711Abstract: Apparatus preventing unauthorized copying of a document includes a secure document reproducing system having a document input device to receive and reproduce the secure document. A reader device detects an electronic data storage device affixed to the document and reads authorization information stored therein. A user wishing to copy the secure document inputs authorization information into a user interface module. The authorization information from the user is compared to the authorization information retrieved from the electronic data storage device, and if the two are identical, the secure document is reproduced.Type: GrantFiled: April 18, 2006Date of Patent: May 28, 2013Assignee: Xerox CorporationInventors: Sabrina Pui-Wah Matsunaga, Francisco M. Valeriano, Amos Y. Kuo
-
Patent number: 8452016Abstract: There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key chest or central key repository (CKR), the method comprising receiving a user request from a user device for access to an encrypted content identified by a content identification, transmitting a key request to the CKR including the content identification, receiving an encrypted first key from the CKR, decrypting the encrypted first key using a second key to retrieve the first key, and providing a DRM license for the encrypted content to the user device using the first key for use by the user device to decrypt the encrypted content using the first key. By generating such DRM licenses, distributors can unlock protected content even sourced from distributors using different DRM schemas.Type: GrantFiled: July 10, 2009Date of Patent: May 28, 2013Assignee: Disney Enterprises, Inc.Inventors: Arnaud Robert, Scott F. Watson
-
Patent number: 8447699Abstract: Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links.Type: GrantFiled: March 4, 2010Date of Patent: May 21, 2013Assignee: QUALCOMM IncorporatedInventors: Asif Batada, Moshe Levy
-
Patent number: 8438113Abstract: The invention provides an end-to-end automated streaming workflow process which enables real-time or batch processing to grant licenses and to acquire licenses for 3rd party copyrighted content. Using a computer, the invention automates the permissions transaction process of procuring and processing licenses real-time or by batch, reducing lead-times from many weeks or months to hours, automatically transforming and translating requests and responses for global e-commerce among multi-vendor systems and non-standard rights semantics and languages, eliminating or reducing manual labor effort, negotiating licensing fees to conform with specifications, protecting rights-holders' intellectual property rights and assuring rights-holders they are fairly compensated and paid for their work, identifying “public domain” and/or “fair use” works, saving companies time and money, while providing a competitive advantage for publishers and the enterprise.Type: GrantFiled: January 21, 2011Date of Patent: May 7, 2013Inventor: Richard Stahl
-
Patent number: 8438111Abstract: The present invention is an apparatus and method for the money transactions required in the selling of merchandise or media content on the Internet or other public or private network. It can then track and maintain digital rights to merchandise or media. Methods of access to digitally protected content are disclosed. License metadata and credentials from multiple types of digital rights management systems may be used to grant access through a home based or other end-user custodial digital rights “place-chaser” to content protected by different types of serial copy management systems. Content security using a non-audible or invisible code signal sequence(s) can provide traceability as well as absolute anonymity for the purchaser. This apparatus can be used to conduct transactions off the web so that business can be done on the web.Type: GrantFiled: May 3, 2010Date of Patent: May 7, 2013Inventor: James Leonard Driessen
-
Patent number: 8438646Abstract: There are provided methods and systems for providing a plurality of protected segments from a contiguous media content segment, and selectively providing a user access to at least a portion of one of the protected segments in response to accessing a gating media segment associated with the protected segment.Type: GrantFiled: April 28, 2006Date of Patent: May 7, 2013Assignee: Disney Enterprises, Inc.Inventor: Ariff Sidi
-
Patent number: 8428552Abstract: A system is provided comprising processor, memory, and a provisioning application that receives a first message from a rating engine, the first message providing a first rating of a prepaid subscription account associated with a portable electronic device. The system also configures a first setting to a first index wherein the first setting is based on the first rating and wherein the first setting is associated with the device receiving access to services without further contact with the rating engine. The system also receives a second message from the rating engine, the second message providing a second rating of the account. The system also configures a second setting to the first index based on the second rating wherein the second setting replaces the first setting and the second setting is associated with contacting the rating engine before receiving access to services.Type: GrantFiled: March 7, 2011Date of Patent: April 23, 2013Assignee: Sprint Communications Company L.P.Inventors: Tiffany N. Daniels, Michael A. Gailloux, Kenneth W. Samson
-
Patent number: 8424105Abstract: Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked.Type: GrantFiled: June 10, 2011Date of Patent: April 16, 2013Assignee: Microsoft CorporationInventors: Jason Scott Flaks, Jordan L. K. Schwartz, Michael I. Torres, Joseph Andrew Bono
-
Patent number: 8423473Abstract: Techniques are provided for controlling the activation of computer games. In one embodiment, the technique may involve receiving a combination of a game identifier for the game and a device identifier for the device. The technique may further involve accessing a database of known game identifiers, each known game identifier being associated with a device count corresponding to a total number of known devices on which a known game was previously played or activated, and obtaining a usage policy for the game.Type: GrantFiled: May 20, 2010Date of Patent: April 16, 2013Assignee: Uniloc Luxembourg S. A.Inventor: Craig S. Etchegoyen
-
Patent number: 8424099Abstract: A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer's network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.Type: GrantFiled: March 4, 2010Date of Patent: April 16, 2013Assignee: Comcast Cable Communications, LLCInventor: James William Fahrny
-
Patent number: 8412634Abstract: The present invention proposes a safe and quick individual certification method using a portable terminal. When a portable terminal 30 sends a request for certification to a certification server 10, the certification server 10 transmits query code for certification to the portable terminal 30. The portable terminal 30 transmits said query code to the certification server 10 via a reader 21 or the like and also via a sales management server 23 to be certified. The certification server 10 verifies the query code to that generated in the past, and returns a result of verification and personal data required by the sales management server 23 to the sales management server 23.Type: GrantFiled: February 28, 2001Date of Patent: April 2, 2013Assignee: Kabushiki Kaisha EightingInventors: Tomonori Fujisawa, Shouji Satou
-
Patent number: 8413258Abstract: This object aims to propose an optical information recording medium configured to make copyright protection possible, an information recording method for an optical information recording medium and a recording device. An optical information recording medium is proposed to have a recording area available for recording data by laser light, wherein the recording area is provided with a user data area and a management area.Type: GrantFiled: October 29, 2008Date of Patent: April 2, 2013Assignee: Taiyo Yuden Co., Ltd.Inventor: Atsuo Shimizu
-
Patent number: 8412635Abstract: Methods and apparatus are disclosed for facilitating online storage of files (e.g., audio tracks, video, etc.) for playback/access or sale/exchange by the owners of the files without violating copyrights that copyright holders have in the files. For example, by providing a playback service that does not store additional versions of an audio file when the file is transmitted to, and immediately played on, a user device without buffering, the present invention avoids violating copyright laws by not making copies of the file. Numerous other aspects are disclosed.Type: GrantFiled: December 4, 2009Date of Patent: April 2, 2013Assignee: CFPH, LLCInventors: Howard Lutnick, Dean P. Alderucci
-
Patent number: 8407481Abstract: Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent module; a template generator for randomly selecting one template from said template repository and generating a new agent module according to the selected template; and a transceiver for sending said new agent module to an external apparatus communicating with said secure apparatus to update a current agent module which is running in said external apparatus, wherein said current agent module is used to verify the integrity of said software system running in said external apparatus. The secure apparatus can protect software in an insecure environment with a high software protection level to prevent the software from being tampered or bypassed.Type: GrantFiled: June 27, 2008Date of Patent: March 26, 2013Assignee: International Business Machines CorporationInventors: Ya Bin Dang, Da Ming Hao, Shih-Gong Li, Lin Luo, Shun Xiang Yang
-
Patent number: 8407809Abstract: A media file content provider 30 sends a non-permanent copy of a media file, such as a music or video file, to a second mobile station MS 34 in response to a request from a first MS 22. The copy may be rendered non-permanent by streaming it, by encrypting it, and by appending a first instruction to automatically delete it after playing. The first MS 22 may be given an option of delivery pathways, such as cellular 76, 78, WLAN 80, or DVB-H 84. After playing, an offer is made to the second MS 34 to purchase a permanent copy of the media file. If accepted, the content provider may provide another copy of the media file, or preferably a permanent decryption key or a second instruction that defeats the first instruction prior to its deletion of the media file.Type: GrantFiled: March 23, 2009Date of Patent: March 26, 2013Assignee: Nokia CorporationInventors: Marko Leinonen, Anu Leinonen
-
Patent number: 8402558Abstract: A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.Type: GrantFiled: June 10, 2011Date of Patent: March 19, 2013Assignee: Digital Reg of Texas, LLCInventors: Eugene B. Phillips, II, Seth Ornstein
-
Publication number: 20130066785Abstract: A method for distributing content. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.). The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece.Type: ApplicationFiled: September 12, 2012Publication date: March 14, 2013Inventors: Augustin J. Farrugia, Thomas Dowdy, Gianpaolo Fasoli
-
Patent number: 8392333Abstract: A method for providing protected content, wherein content usage rights information and/or usage state information is embedded into obtained primary data that serves as a basis for a content item to be provided thereby providing the primary data with the embedded content usage rights information and/or usage state information as the content item.Type: GrantFiled: December 2, 2011Date of Patent: March 5, 2013Assignee: Sony Deutschland GmbHInventor: Paul Szucs
-
Patent number: 8387156Abstract: An equipment managing system includes an intermediating apparatus and an equipment managing apparatus. The intermediating apparatus is connected to a license management apparatus and a program management apparatus via a network. The equipment managing apparatus is connected to an electronic equipment via a network. The intermediating apparatus stores a program acquired from the program management apparatus and a license file acquired from the license management apparatus to an external storage medium. The equipment managing apparatus sends the program and the license file recorded in the external storage medium to the electronic equipment.Type: GrantFiled: September 8, 2010Date of Patent: February 26, 2013Assignee: Ricoh Company, Ltd.Inventors: Taku Nagumo, Yuuko Sugiura, Tomoya Hirokawa, Taku Ikawa
-
Patent number: 8386389Abstract: Service delivery systems and methods are described. In one aspect, a service delivery system includes a set of tokens, a database, multiple terminals, and a service manager. Each of the tokens includes a respective token identifier. The database stores personal user profiles each of which is associated with a respective token identifier. The terminals are distributed about a selected locale. Each terminal has a reader that is operable to read token identifiers from tokens and a controller that is operable to transmit read token identifiers and context data identifying one or more conditions under which a token identifier is read through a network connection each time a token identifier is read. The service manager is connected to each of the terminals through a respective network connection and to the database.Type: GrantFiled: April 30, 2002Date of Patent: February 26, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Wesley Chan, Ruth Rosenberg, Venkatesh Gururaja Rao, Glenn Clifford Steiner, James E. Patterson, Philippe Debaty, Shane Konsalla, Grady Gordon Cooper, Megan Grey Taylor, Staci Hartman
-
Patent number: RE44068Abstract: A copy prevention method and apparatus of a digital magnetic recording/reproducing system performs the copy prevention function by encoding to insert a marker involving copy prevention function information and executing the function and allows a program supplier to realize a desired copy prevention function of various patterns, in which the marker formed by a control word for scrambling audio and video bit straps and copy prevention information for preventing an illegal copy is encrypted by an encoded key to be multiplexed with the audio and video bit strips scrambled by the control word. The marker transmitted is detected from the bit strips to be decrypted and analyzed by the encoded key to determine whether the copy is permitted or not, so that the detected marker is updated to be recorded on a video tape and the control word is produced from the marker to perform the descrambling to supply the result to a monitor to be displayed.Type: GrantFiled: July 17, 2007Date of Patent: March 12, 2013Assignee: LG Electronics Inc.Inventor: Tae Joon Park
-
Patent number: RE44106Abstract: A copy prevention method and apparatus of a digital magnetic recording/reproducing system performs the copy prevention function by encoding to insert a marker involving copy prevention function information and executing the function and allows a program supplier to realize a desired copy prevention function of various patterns, in which the marker formed by a control word for scrambling audio and video bit straps and copy prevention information for preventing an illegal copy is encrypted by an encoded key to be multiplexed with the audio and video bit strips scrambled by the control word. The marker transmitted is detected from the bit strips to be decrypted and analyzed by the encoded key to determine whether the copy is permitted or not, so that the detected marker is updated to be recorded on a video tape and the control word is produced from the marker to perform the descrambling to supply the result to a monitor to be displayed.Type: GrantFiled: January 7, 2009Date of Patent: March 26, 2013Assignee: LG Electronics IncInventor: Tae Joon Park
-
Patent number: RE44121Abstract: A copy prevention method and apparatus of a digital magnetic recording/reproducing system performs the copy prevention function by encoding to insert a marker involving copy prevention function information and executing the function and allows a program supplier to realize a desired copy prevention function of various patterns, in which the marker formed by a control word for scrambling audio and video bit straps and copy prevention information for preventing an illegal copy is encrypted by an encoded key to be multiplexed with the audio and video bit strips scrambled by the control word. The marker transmitted is detected from the bit strips to be decrypted and analyzed by the encoded key to determine whether the copy is permitted or not, so that the detected marker is updated to be recorded on a video tape and the control word is produced from the marker to perform the descrambling to supply the result to a monitor to be displayed.Type: GrantFiled: January 7, 2009Date of Patent: April 2, 2013Assignee: LG Electronics Inc.Inventor: Tae Joon Park