Copy Protection Or Prevention Patents (Class 705/57)
  • Patent number: 8533852
    Abstract: A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a request for a first encrypted token from a partner service provider and communicating the request to the network. An authentication web service receives the request for the first encrypted token from the network and generates the first encrypted token. The partner service provider generates a request for data with the first encrypted token and communicates the request for data to the network. A data web service receives the request for data and communicates the request for data from the data web service to the authentication web service. The authentication web service validates the request for data and communicates a validation result to the data web service. The data web service communicates data to the partner service provider from the data web service after validating.
    Type: Grant
    Filed: December 19, 2007
    Date of Patent: September 10, 2013
    Assignee: The DIRECTV Group, Inc.
    Inventor: Kapil Chaudhry
  • Patent number: 8533859
    Abstract: The various embodiments of the present invention provide a secure software distribution and execution method. According to the method, a server receives software from service provider for downloading to a client and identifies the sections for encoding. APIs are inserted in the identified sections. A unique ID is created based on the identity of the each client to generate an encryption algorithm, decryption key and decryption algorithm. The identified sections are encrypted with the generated encryption algorithm. The encrypted application along with encryption algorithm, decryption key and decryption algorithm are downloaded to the driver of the client machine. The API makes call to the driver by sending the encrypted segment when the encrypted portion is reached during the execution of software in the client machine so that the driver decrypts the encoded portion using the received key and the decryption algorithm to enable the continuous execution of the downloaded software.
    Type: Grant
    Filed: April 13, 2009
    Date of Patent: September 10, 2013
    Assignee: Aventyn, Inc.
    Inventors: Bhaktha Ram Keshavachar, Navin Govind
  • Patent number: 8533121
    Abstract: A remote phase identification system identifies the unknown phase attribute of any energized conductor within a three-phase power distribution network. A field probe at a remote location obtains an instantaneous phase measurement at a precise GPS second and communicates this phase, GPS second, and GPS coordinates to a field client. Either wireless Internet or satellite modem communications is used by the field client to retrieve the reference phase taken by a base station at the same GPS second. Field client tagging reference phase configuration files are automatically created for any circuit and applied to the base station reference phase. Configuration files can be named, saved, and loaded and are used by the field client to identify and display the unknown phase attribute. A field client can be any personal computer, smartphone, or personal digital assistant.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: September 10, 2013
    Inventor: Gregory Hubert Piesinger
  • Patent number: 8532291
    Abstract: The usability while performing copy control can be enhanced in the case of recording a digital broadcast program for which recording of one generation is permitted (“Copy One Generation”). When an output route in the case of copying digital contents from a first recording apparatus to a second recording apparatus is via LAN, authentication is executed between the first recording apparatus and the second recording apparatus. The capability of a move process with a predetermined copy number of multiple copies being kept is confirmed, and dedicated key information is shared to be used for encryption and decryption of the digital contents moved with the predetermined copy number of multiple copies being kept. Then, the digital contents recorded and managed in the first recording apparatus is added with the information about the predetermined copy number of multiple copies, and transmitted.
    Type: Grant
    Filed: June 16, 2011
    Date of Patent: September 10, 2013
    Assignee: Hitachi Consumer Electronics Co., Ltd.
    Inventors: Sadao Tsuruga, Hiroo Okamoto
  • Patent number: 8533849
    Abstract: A method for detecting at least one traitor computer system among a plurality of receiver computer systems including: assigning a version of protected content to each of the plurality of receiver computer systems that are currently identified as innocent by a content protection system that monitors distribution of protected content to the plurality of receiver computer systems; recovering at least one unauthorized rebroadcast of the content; generating a score for each of the plurality of receiver computer systems with respect to the recovered unauthorized rebroadcast; calculating a threshold independent of an estimation of maximum traitor computer systems; checking a highest score against the threshold; incriminating a receiver computer system having the highest score above the threshold as a traitor computer system; and removing any unauthorized rebroadcasts overlapping with the traitor computer system. The process may be repeated from generating scores until all traitors are identified.
    Type: Grant
    Filed: September 7, 2010
    Date of Patent: September 10, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hongxia Jin, Serdar Pehlivanoglu
  • Patent number: 8526610
    Abstract: A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means may operate in accordance with rules received as part of the streamed content, or through a side-band channel. The rules may specify allowed uses of the content, including whether or not the content can be copied or transferred, and whether and under what circumstances received content may be “checked out” of one device and used in a second device. The rules may also include or specify budgets, and a requirement that audit information be collected and/or transmitted to an external server. In a different aspect, the apparatus may include a media player designed to call plugins to assist in rendering content.
    Type: Grant
    Filed: October 5, 2010
    Date of Patent: September 3, 2013
    Assignee: Intertrust Technologies Corporation
    Inventors: Talal G. Shamoon, Ralph D. Hill, Chris D. Radcliffe, John P. Hwa, W. Olin Sibert, David M. Van Wie
  • Patent number: 8527424
    Abstract: An encrypted content and its encryption key under a copy right use condition of prohibiting a copy by the device having received a content are stored, and the encrypted content is copy-transferred with another device through the network, and at the same time, the encryption key is transferred through the network, so that it is stored in either one of the devices. Even when a high definition television broadcast signal received with a copy-once taken as a copy right use condition is recorded, an access flag that controls the presence or absence of the reproduction of the broadcast content for each broadcast content is provided. When an original broadcast content is transcoded into a low resolution, and is transfer to another device, its access flag is turned on, thereby making the reproduction possible.
    Type: Grant
    Filed: December 1, 2011
    Date of Patent: September 3, 2013
    Assignee: Fujitsu Limited
    Inventors: Masaki Yamashima, Osamu Kawai
  • Patent number: 8521650
    Abstract: A method and system for providing premium content and dispersing payment therefore. The method includes entering into an agreement with at least one partner that provides premium content and entering into an agreement with at least one customer that grants the customer access to premium content provided by at least one partner. The method further includes collecting defined parameter data of at least one customer accessing the premium content and dispersing payment to at least one partner where the payment is determined from the defined parameter data. The defined parameter data can be approximate time spent.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: August 27, 2013
    Assignee: ZepFrog Corp.
    Inventor: Michael Rodov
  • Patent number: 8521652
    Abstract: Embodiments include methods, apparatus, and systems for discovering licenses in open source files. One method of software execution includes discovering a software license in code; and determining if the software license is a pre-existing open source software license.
    Type: Grant
    Filed: May 19, 2006
    Date of Patent: August 27, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Glen A. Foster
  • Patent number: 8516258
    Abstract: Current MAC algorithms impose a significant system performance requirement in order to process messages in real time. According to an exemplary embodiment of the present invention, a hardware implemented generator for generating a MAC is provided, that results in a significant improvement in hardware performance requirements for processing messages in real time. The engine is based on linear feedback shift registers which are adapted to generate secure MACs.
    Type: Grant
    Filed: February 24, 2006
    Date of Patent: August 20, 2013
    Assignee: NXP B.V.
    Inventors: Marc Vauclair, Serret Avila Javier, Ventzislav Nikov
  • Patent number: 8510844
    Abstract: In a system which attaches update information required to create a content key used for content encryption/decryption to encrypted content and transmits the encrypted content, there is used an authorized content verification method including a verification request step of, by a receiver, transmitting an authorization verification request including update information received from a transmitter, an update information check step of, by the transmitter, checking whether the update information included in the received authorization verification request is predetermined update information, a message-of-acceptance transmission step of creating a message of acceptance using the update information and an exchange key shared between the transmitter and the receiver and transmitting the message of acceptance if the update information matches the predetermined update information, and an authorized content determination step of, by the receiver, determining that content is authorized content on the basis of reception of
    Type: Grant
    Filed: October 12, 2005
    Date of Patent: August 13, 2013
    Assignee: Panasonic Corporation
    Inventors: Ayako Takatsuji, Hiroyuki Iitsuka, Naoshi Usuki
  • Patent number: 8510792
    Abstract: A method includes identifying at a gateway device of a network a plurality of devices connected to the network. The method includes monitoring network traffic at the gateway device and determining that a particular traffic flow associated with one of the plurality of devices violates a privacy constraint. The method also includes providing a risk assessment associated with the privacy constraint violation. The risk assessment is at least partially based on terms and conditions associated with a particular device of the plurality of devices.
    Type: Grant
    Filed: November 25, 2009
    Date of Patent: August 13, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Ganesh Krishnamurthi, Balachander Krishnamurthy, Raghvendra Savoor
  • Patent number: 8510226
    Abstract: A licensing system is disclosed for performing synchronous encryption with a client over an IP-compliant network. In disclosed embodiments, the system includes a licensing agent configured to pass a data structure unencrypted in an initial communication between the licensing agent/client pair and pass a first key to said client responsive to an initial communication. The licensing agent then receives the data structure from the client having designated fields encrypted according to the first key. The licensing agent then sends a second key to the client for use in subsequent communications.
    Type: Grant
    Filed: January 10, 2007
    Date of Patent: August 13, 2013
    Assignee: GraphOn Corporation
    Inventors: Christopher D. Coley, Ralph E. Wesinger
  • Patent number: 8504480
    Abstract: A method and system for authenticating applications. The system includes a plurality of portable electronic devices, at least one process organizer, at least one module developer, at least one task performer and a workflow server. The process organizer generates an application. The process organizer can request modules from module developers that are incorporated into the application. Alternatively, the process organizer makes an agreement with a task performer to perform tasks to complete the application. The application is transmitted to the workflow server, which includes an online marketplace for displaying and selling the applications. A user purchases the application through the store. A routing module generates a signature and compares the signature to application, module or document metadata and a secret to determine consistency of the data before the application, module or document is routed.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: August 6, 2013
    Assignee: Ricoh Co., Ltd
    Inventor: Kurt W. Piersol
  • Patent number: 8499359
    Abstract: A user requests to store a file to a storage device and a DLP module receives the request. The DLP module receives data for the file, encrypts the data using an encryption key and stores the encrypted data to the storage device. Next, the DLP module determines whether the encrypted data in the file is in compliance with a DLP policy. To determine compliance, the DLP module decrypts the data using the encryption key and examines the decrypted data for compliance. If the decrypted data is not in compliance with the DLP policy, the DLP module deletes the encrypted data from the storage device.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: July 30, 2013
    Assignee: Symantec Corporation
    Inventor: William Blanke
  • Patent number: 8498942
    Abstract: A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device. The license request and the timeout indicator may be combined to form a device license for the personal media device. The device license may be digitally-signed to form a signed device license.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: July 30, 2013
    Assignee: Intel Corporation
    Inventor: Joshua D. Hug
  • Patent number: 8495755
    Abstract: Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.
    Type: Grant
    Filed: October 6, 2011
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hongxia Jin, Jeffrey B. Lotspiech
  • Patent number: 8494966
    Abstract: One embodiment of the present invention provides a system that facilitates the transfer of a software license from a first client to a second client. The system operates by receiving a request at the first client to deactivate the software license for an associated application installed on the first client. The system then receives a deactivation request that includes an identifier for the license at a license activation server from the first client. Next, the system validates the identifier on the license activation server to determine if the identifier is a valid identifier. If so, the system sends a deactivation message to the first client, receives a deactivation response from the first client, and increments a count of license instances available for the identifier on the license activation server.
    Type: Grant
    Filed: June 3, 2005
    Date of Patent: July 23, 2013
    Assignee: Adobe Systems Incorporated
    Inventors: Xuejun Xu, Katherine K. Nadell
  • Patent number: 8495389
    Abstract: A method for preventing unauthorized use of a software program on a computing device includes updating a state of a software program on a computing device to an updated state. Transmitting an update signal from the software program to a hardware token coupled to the computing device and updating a state of the hardware token to an updated state in response to the received update signal. Performing a first cryptographic check using the updated state of the software program and the updated state of the hardware token with the hardware token. Transmitting the first cryptographic check from the hardware token to the software program and performing a second cryptographic check using the state of the hardware token and the state of the software program with the computing device.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: July 23, 2013
    Assignee: SafeNet, Inc.
    Inventors: Laszlo Elteto, Michael Cochran, Mehdi Sotoodeh, Tu Le
  • Patent number: 8489510
    Abstract: Selling intangible property rights may include receiving content from a seller and determining one or more potential purchasers for the content's intangible property rights. The potential purchasers may be determined according to the subject of the content, the audience for the content, and the intangible property rights being sold. An offer to sell the intangible property rights may then be transmitted to one or more potential purchasers, along with a portion of the content. Upon receiving the one or more purchaser's acceptance of the offer, a complete copy of the content may be transmitted to the purchaser.
    Type: Grant
    Filed: December 5, 2007
    Date of Patent: July 16, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Ari Craine
  • Patent number: 8478693
    Abstract: A determination is made regarding whether a user is allowed to access a content item. The content item is associated with a website. An offer associated with the website is identified. The offer includes a set of use-time rules specifying time periods during which the offer can be used to access content. A use-time rule is associated with a user class. A class of the user with respect to the offer is determined. The user's class indicates whether the user has accepted the offer or whether the user has registered with the website. A determination is made regarding whether the user is allowed to access the content item based on the offer, the user's class, and a current timestamp.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: July 2, 2013
    Assignee: Google Inc.
    Inventors: Eric H. Weigle, Maricia S. Scott
  • Patent number: 8474059
    Abstract: Apparatus and methods are provided for embedding or embedding digital data into an analog host or cover signal. A distributed signal feature of the cover signal in a particular domain (time, frequency or space) is calculated and compared with a set of predefined quantization values corresponding to an information symbol to be encoded. The amount of change required to modify the signal feature to the determined target quantization value is calculated and the cover signal is modified accordingly to so change the feature value over a predefined interval. Information symbols are extracted by the opposite process. In one embodiment, the predefined value is a short term auto correlation value of the cover signal.
    Type: Grant
    Filed: December 9, 2011
    Date of Patent: June 25, 2013
    Assignee: Verance Corporation
    Inventor: Rade Petrovic
  • Patent number: 8464355
    Abstract: Exchange of Digital Rights Management protected content between two devices without the need for a third party. Each user marks a license as unusable and the devices the trade licenses. A user then instructs the device to import the received license. The device verifies that a license has been rendered unusable and only then erases the unusable license and enables the device to use the new license. The content associated with a license may be traded before or after the license exchange, and may also be downloaded from a third party. Also provided is a device for exchanging licenses.
    Type: Grant
    Filed: June 24, 2008
    Date of Patent: June 11, 2013
    Assignee: Thomson Licensing
    Inventor: Olivier Courtay
  • Patent number: 8463709
    Abstract: A system for providing users with an indication of files that are protected or licensed while a user is executing within the embedded partition set forth. The system enables users to quickly boot into an embedded environment and have an indication of all of their media files, whether the content is accessible via the embedded environment or the content is protected or licensed content stored within another partition. Thus, the user receives an indication that the protected or licensed content is still on their computer and that the user cannot access the protected or licensed content via the embedded environment.
    Type: Grant
    Filed: April 11, 2006
    Date of Patent: June 11, 2013
    Assignee: Dell Products L.P.
    Inventors: Erin Kurusz Walline, Steve Bracamontez, David Zavelson
  • Patent number: 8463776
    Abstract: An image container file has at least first and second multimedia streams (MSs). The first MS includes first image data representing an image. The second MS includes arbitrary data, which can for example, correspond to: a different representation of the same image; annotations to the first image data; second image data that together with the first image data form a new image with greater dynamic range, resolution, field of view or other attributes that can be derived from processing two or more independent images; or an executable file related to the first MS. The image container file can also include an extensible metadata to hold information describing one or more multimedia streams of the image container file. Further, the image container file may include DRM information to provide information related to obtaining a license to access encrypted data or verifying the authenticity of encrypted or unencrypted data.
    Type: Grant
    Filed: July 16, 2008
    Date of Patent: June 11, 2013
    Assignee: Microsoft Corporation
    Inventors: Geoffrey T. Dunbar, Kirt A. Debique, Joseph D. Ternasky, William M. Crow
  • Patent number: 8457317
    Abstract: An archival storage cluster of preferably symmetric nodes includes a data privacy scheme that implements key management through secret sharing. In one embodiment, the protection scheme is implemented at install time. At install, an encryption key is generated, split, and the constituent pieces written to respective archive nodes. The key is not written to a drive to ensure that it cannot be stolen or otherwise compromised. Due to the secret sharing scheme, any t of the n nodes must be present before the cluster can mount the drives. Thus, to un-share the secret, a process runs before the cluster comes up. It contacts as many nodes as possible to attempt to reach a sufficient t value. Once it does, the process un-shares the secret and mounts the drives locally. Given bidirectional communication, this mount occurs more or less at the same time on all t nodes. Once the drives are mounted, the cluster can continue to boot as normal.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: June 4, 2013
    Assignee: Hitachi Data Systems Corporation
    Inventor: David M. Shaw
  • Patent number: 8458098
    Abstract: Methods of tracking remote software installations at a central server may include receiving an installation message over a network from a user device wherein the installation message indicates an installation of the software at the user device. After receiving the installation message from the user device, an installation code may be created responsive to receiving the installation message, and the installation code may uniquely identify installation of the software at the user device. The installation code may be transmitted over the network to the user device, and the installation code may be stored at the central server. Related systems and computer program products are also discussed.
    Type: Grant
    Filed: September 29, 2005
    Date of Patent: June 4, 2013
    Assignee: Qurio Holdings, Inc.
    Inventor: Patricia Scardino
  • Patent number: 8452711
    Abstract: Apparatus preventing unauthorized copying of a document includes a secure document reproducing system having a document input device to receive and reproduce the secure document. A reader device detects an electronic data storage device affixed to the document and reads authorization information stored therein. A user wishing to copy the secure document inputs authorization information into a user interface module. The authorization information from the user is compared to the authorization information retrieved from the electronic data storage device, and if the two are identical, the secure document is reproduced.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: May 28, 2013
    Assignee: Xerox Corporation
    Inventors: Sabrina Pui-Wah Matsunaga, Francisco M. Valeriano, Amos Y. Kuo
  • Patent number: 8452016
    Abstract: There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key chest or central key repository (CKR), the method comprising receiving a user request from a user device for access to an encrypted content identified by a content identification, transmitting a key request to the CKR including the content identification, receiving an encrypted first key from the CKR, decrypting the encrypted first key using a second key to retrieve the first key, and providing a DRM license for the encrypted content to the user device using the first key for use by the user device to decrypt the encrypted content using the first key. By generating such DRM licenses, distributors can unlock protected content even sourced from distributors using different DRM schemas.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: May 28, 2013
    Assignee: Disney Enterprises, Inc.
    Inventors: Arnaud Robert, Scott F. Watson
  • Patent number: 8447699
    Abstract: Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links.
    Type: Grant
    Filed: March 4, 2010
    Date of Patent: May 21, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Asif Batada, Moshe Levy
  • Patent number: 8438113
    Abstract: The invention provides an end-to-end automated streaming workflow process which enables real-time or batch processing to grant licenses and to acquire licenses for 3rd party copyrighted content. Using a computer, the invention automates the permissions transaction process of procuring and processing licenses real-time or by batch, reducing lead-times from many weeks or months to hours, automatically transforming and translating requests and responses for global e-commerce among multi-vendor systems and non-standard rights semantics and languages, eliminating or reducing manual labor effort, negotiating licensing fees to conform with specifications, protecting rights-holders' intellectual property rights and assuring rights-holders they are fairly compensated and paid for their work, identifying “public domain” and/or “fair use” works, saving companies time and money, while providing a competitive advantage for publishers and the enterprise.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: May 7, 2013
    Inventor: Richard Stahl
  • Patent number: 8438111
    Abstract: The present invention is an apparatus and method for the money transactions required in the selling of merchandise or media content on the Internet or other public or private network. It can then track and maintain digital rights to merchandise or media. Methods of access to digitally protected content are disclosed. License metadata and credentials from multiple types of digital rights management systems may be used to grant access through a home based or other end-user custodial digital rights “place-chaser” to content protected by different types of serial copy management systems. Content security using a non-audible or invisible code signal sequence(s) can provide traceability as well as absolute anonymity for the purchaser. This apparatus can be used to conduct transactions off the web so that business can be done on the web.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: May 7, 2013
    Inventor: James Leonard Driessen
  • Patent number: 8438646
    Abstract: There are provided methods and systems for providing a plurality of protected segments from a contiguous media content segment, and selectively providing a user access to at least a portion of one of the protected segments in response to accessing a gating media segment associated with the protected segment.
    Type: Grant
    Filed: April 28, 2006
    Date of Patent: May 7, 2013
    Assignee: Disney Enterprises, Inc.
    Inventor: Ariff Sidi
  • Patent number: 8428552
    Abstract: A system is provided comprising processor, memory, and a provisioning application that receives a first message from a rating engine, the first message providing a first rating of a prepaid subscription account associated with a portable electronic device. The system also configures a first setting to a first index wherein the first setting is based on the first rating and wherein the first setting is associated with the device receiving access to services without further contact with the rating engine. The system also receives a second message from the rating engine, the second message providing a second rating of the account. The system also configures a second setting to the first index based on the second rating wherein the second setting replaces the first setting and the second setting is associated with contacting the rating engine before receiving access to services.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: April 23, 2013
    Assignee: Sprint Communications Company L.P.
    Inventors: Tiffany N. Daniels, Michael A. Gailloux, Kenneth W. Samson
  • Patent number: 8424105
    Abstract: Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Jason Scott Flaks, Jordan L. K. Schwartz, Michael I. Torres, Joseph Andrew Bono
  • Patent number: 8423473
    Abstract: Techniques are provided for controlling the activation of computer games. In one embodiment, the technique may involve receiving a combination of a game identifier for the game and a device identifier for the device. The technique may further involve accessing a database of known game identifiers, each known game identifier being associated with a device count corresponding to a total number of known devices on which a known game was previously played or activated, and obtaining a usage policy for the game.
    Type: Grant
    Filed: May 20, 2010
    Date of Patent: April 16, 2013
    Assignee: Uniloc Luxembourg S. A.
    Inventor: Craig S. Etchegoyen
  • Patent number: 8424099
    Abstract: A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer's network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.
    Type: Grant
    Filed: March 4, 2010
    Date of Patent: April 16, 2013
    Assignee: Comcast Cable Communications, LLC
    Inventor: James William Fahrny
  • Patent number: 8412634
    Abstract: The present invention proposes a safe and quick individual certification method using a portable terminal. When a portable terminal 30 sends a request for certification to a certification server 10, the certification server 10 transmits query code for certification to the portable terminal 30. The portable terminal 30 transmits said query code to the certification server 10 via a reader 21 or the like and also via a sales management server 23 to be certified. The certification server 10 verifies the query code to that generated in the past, and returns a result of verification and personal data required by the sales management server 23 to the sales management server 23.
    Type: Grant
    Filed: February 28, 2001
    Date of Patent: April 2, 2013
    Assignee: Kabushiki Kaisha Eighting
    Inventors: Tomonori Fujisawa, Shouji Satou
  • Patent number: 8413258
    Abstract: This object aims to propose an optical information recording medium configured to make copyright protection possible, an information recording method for an optical information recording medium and a recording device. An optical information recording medium is proposed to have a recording area available for recording data by laser light, wherein the recording area is provided with a user data area and a management area.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: April 2, 2013
    Assignee: Taiyo Yuden Co., Ltd.
    Inventor: Atsuo Shimizu
  • Patent number: 8412635
    Abstract: Methods and apparatus are disclosed for facilitating online storage of files (e.g., audio tracks, video, etc.) for playback/access or sale/exchange by the owners of the files without violating copyrights that copyright holders have in the files. For example, by providing a playback service that does not store additional versions of an audio file when the file is transmitted to, and immediately played on, a user device without buffering, the present invention avoids violating copyright laws by not making copies of the file. Numerous other aspects are disclosed.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: April 2, 2013
    Assignee: CFPH, LLC
    Inventors: Howard Lutnick, Dean P. Alderucci
  • Patent number: 8407481
    Abstract: Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent module; a template generator for randomly selecting one template from said template repository and generating a new agent module according to the selected template; and a transceiver for sending said new agent module to an external apparatus communicating with said secure apparatus to update a current agent module which is running in said external apparatus, wherein said current agent module is used to verify the integrity of said software system running in said external apparatus. The secure apparatus can protect software in an insecure environment with a high software protection level to prevent the software from being tampered or bypassed.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: March 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Ya Bin Dang, Da Ming Hao, Shih-Gong Li, Lin Luo, Shun Xiang Yang
  • Patent number: 8407809
    Abstract: A media file content provider 30 sends a non-permanent copy of a media file, such as a music or video file, to a second mobile station MS 34 in response to a request from a first MS 22. The copy may be rendered non-permanent by streaming it, by encrypting it, and by appending a first instruction to automatically delete it after playing. The first MS 22 may be given an option of delivery pathways, such as cellular 76, 78, WLAN 80, or DVB-H 84. After playing, an offer is made to the second MS 34 to purchase a permanent copy of the media file. If accepted, the content provider may provide another copy of the media file, or preferably a permanent decryption key or a second instruction that defeats the first instruction prior to its deletion of the media file.
    Type: Grant
    Filed: March 23, 2009
    Date of Patent: March 26, 2013
    Assignee: Nokia Corporation
    Inventors: Marko Leinonen, Anu Leinonen
  • Patent number: 8402558
    Abstract: A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: March 19, 2013
    Assignee: Digital Reg of Texas, LLC
    Inventors: Eugene B. Phillips, II, Seth Ornstein
  • Publication number: 20130066785
    Abstract: A method for distributing content. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.). The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece.
    Type: Application
    Filed: September 12, 2012
    Publication date: March 14, 2013
    Inventors: Augustin J. Farrugia, Thomas Dowdy, Gianpaolo Fasoli
  • Patent number: 8392333
    Abstract: A method for providing protected content, wherein content usage rights information and/or usage state information is embedded into obtained primary data that serves as a basis for a content item to be provided thereby providing the primary data with the embedded content usage rights information and/or usage state information as the content item.
    Type: Grant
    Filed: December 2, 2011
    Date of Patent: March 5, 2013
    Assignee: Sony Deutschland GmbH
    Inventor: Paul Szucs
  • Patent number: 8387156
    Abstract: An equipment managing system includes an intermediating apparatus and an equipment managing apparatus. The intermediating apparatus is connected to a license management apparatus and a program management apparatus via a network. The equipment managing apparatus is connected to an electronic equipment via a network. The intermediating apparatus stores a program acquired from the program management apparatus and a license file acquired from the license management apparatus to an external storage medium. The equipment managing apparatus sends the program and the license file recorded in the external storage medium to the electronic equipment.
    Type: Grant
    Filed: September 8, 2010
    Date of Patent: February 26, 2013
    Assignee: Ricoh Company, Ltd.
    Inventors: Taku Nagumo, Yuuko Sugiura, Tomoya Hirokawa, Taku Ikawa
  • Patent number: 8386389
    Abstract: Service delivery systems and methods are described. In one aspect, a service delivery system includes a set of tokens, a database, multiple terminals, and a service manager. Each of the tokens includes a respective token identifier. The database stores personal user profiles each of which is associated with a respective token identifier. The terminals are distributed about a selected locale. Each terminal has a reader that is operable to read token identifiers from tokens and a controller that is operable to transmit read token identifiers and context data identifying one or more conditions under which a token identifier is read through a network connection each time a token identifier is read. The service manager is connected to each of the terminals through a respective network connection and to the database.
    Type: Grant
    Filed: April 30, 2002
    Date of Patent: February 26, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wesley Chan, Ruth Rosenberg, Venkatesh Gururaja Rao, Glenn Clifford Steiner, James E. Patterson, Philippe Debaty, Shane Konsalla, Grady Gordon Cooper, Megan Grey Taylor, Staci Hartman
  • Patent number: RE44068
    Abstract: A copy prevention method and apparatus of a digital magnetic recording/reproducing system performs the copy prevention function by encoding to insert a marker involving copy prevention function information and executing the function and allows a program supplier to realize a desired copy prevention function of various patterns, in which the marker formed by a control word for scrambling audio and video bit straps and copy prevention information for preventing an illegal copy is encrypted by an encoded key to be multiplexed with the audio and video bit strips scrambled by the control word. The marker transmitted is detected from the bit strips to be decrypted and analyzed by the encoded key to determine whether the copy is permitted or not, so that the detected marker is updated to be recorded on a video tape and the control word is produced from the marker to perform the descrambling to supply the result to a monitor to be displayed.
    Type: Grant
    Filed: July 17, 2007
    Date of Patent: March 12, 2013
    Assignee: LG Electronics Inc.
    Inventor: Tae Joon Park
  • Patent number: RE44106
    Abstract: A copy prevention method and apparatus of a digital magnetic recording/reproducing system performs the copy prevention function by encoding to insert a marker involving copy prevention function information and executing the function and allows a program supplier to realize a desired copy prevention function of various patterns, in which the marker formed by a control word for scrambling audio and video bit straps and copy prevention information for preventing an illegal copy is encrypted by an encoded key to be multiplexed with the audio and video bit strips scrambled by the control word. The marker transmitted is detected from the bit strips to be decrypted and analyzed by the encoded key to determine whether the copy is permitted or not, so that the detected marker is updated to be recorded on a video tape and the control word is produced from the marker to perform the descrambling to supply the result to a monitor to be displayed.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: March 26, 2013
    Assignee: LG Electronics Inc
    Inventor: Tae Joon Park
  • Patent number: RE44121
    Abstract: A copy prevention method and apparatus of a digital magnetic recording/reproducing system performs the copy prevention function by encoding to insert a marker involving copy prevention function information and executing the function and allows a program supplier to realize a desired copy prevention function of various patterns, in which the marker formed by a control word for scrambling audio and video bit straps and copy prevention information for preventing an illegal copy is encrypted by an encoded key to be multiplexed with the audio and video bit strips scrambled by the control word. The marker transmitted is detected from the bit strips to be decrypted and analyzed by the encoded key to determine whether the copy is permitted or not, so that the detected marker is updated to be recorded on a video tape and the control word is produced from the marker to perform the descrambling to supply the result to a monitor to be displayed.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: April 2, 2013
    Assignee: LG Electronics Inc.
    Inventor: Tae Joon Park