Patents Assigned to InterTrust Technologies
-
Patent number: 7050586Abstract: Systems and methods are disclosed for using an arbitrary fixed channel to carry third-party information. In one embodiment, the present invention provides systems and methods for enabling existing content rendering devices to accept content encoded in a proprietary format, such as an encoding format used by a digital rights management system. The encoded content is rendered by the device in the normal manner, and decoded by a retrofitting appliance connected to the device's output. The retrofitting appliance may apply decoded rules and controls to the decoded content, thereby managing use of the content.Type: GrantFiled: June 19, 2001Date of Patent: May 23, 2006Assignee: Intertrust Technologies CorporationInventor: Talal G. Shamoon
-
Publication number: 20060106714Abstract: Systems and methods are provided for pricing, selling, and/or otherwise distributing electronic content using auction mechanisms. A randomized auction mechanism is used to determine both the number of goods that are sold and the selling price. The auction mechanism automatically adapts to the bid distribution to yield revenue that is competitive with that which could be obtained if the vendor were able to determine the optimal fixed price for the goods. In one embodiment a set of bids is randomly or quasi-randomly partitioned into two or more groups. An optimal threshold is determined for each group, and this threshold is then used to select winning bids from one or more of the other groups. In another embodiment, each bid is compared to a competing bid that is randomly or quasi-randomly selected from the set of bids. If the bid is less than the randomly-selected competing bid, the bid is rejected. Otherwise, the bid is accepted and the bidder buys the auctioned item at the price of the randomly-selected bid.Type: ApplicationFiled: October 27, 2005Publication date: May 18, 2006Applicant: InterTrust Technologies CorporationInventors: Andrew Goldberg, Jason Hartline, Andrew Wright
-
Publication number: 20060036732Abstract: The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction processing application is deployed on a local computer system to manage transactions thereon. The local computer system contacts a remote computer system to obtain authorization to execute a transaction. The local computer system initiates a failure-recovery job that is operable to automatically resend status signals and other information to the remote system if the communication with the remote system exhibits certain predefined fault conditions. The remote system is able to dynamically adjust the definition of the predefined fault conditions. If the transaction concludes without triggering the predefined fault conditions, the failure-recovery job is cancelled.Type: ApplicationFiled: September 15, 2004Publication date: February 16, 2006Applicant: InterTrust Technologies CorporationInventors: Marc Strohwig, John McGinty, W. Sibert
-
Patent number: 6985885Abstract: Systems and methods are provided for pricing, selling, and/or otherwise distributing electronic content using auction mechanisms. A randomized auction mechanism is used to determine both the number of goods that are sold and the selling price. The auction mechanism automatically adapts to the bid distribution to yield revenue that is competitive with that which could be obtained if the vendor were able to determine the optimal fixed price for the goods. In one embodiment a set of bids is randomly or quasi-randomly partitioned into two or more groups. An optimal threshold is determined for each group, and this threshold is then used to select winning bids from one or more of the other groups. In another embodiment, each bid is compared to a competing bid that is randomly or quasi-randomly selected from the set of bids. If the bid is less than the randomly-selected competing bid, the bid is rejected. Otherwise, the bid is accepted and the bidder buys the auctioned item at the price of the randomly-selected bid.Type: GrantFiled: September 21, 2000Date of Patent: January 10, 2006Assignee: Intertrust Technologies Corp.Inventors: Andrew V. Goldberg, Jason D. Hartline, Andrew K. Wright
-
Patent number: 6973499Abstract: One embodiment of an inventive networking environment includes clients called sending clients because they send network content through a network, and clients called receiving clients because they receive the network content from the sending clients through the network. Both sending clients and receiving clients are “clients” in that they rely on a management server to orchestrate the secure transfer of information from sending clients to receiving clients.Type: GrantFiled: April 7, 2000Date of Patent: December 6, 2005Assignee: Intertrust Technologies Corp.Inventors: George H. Peden, Robert A. Marshall
-
Patent number: 6961854Abstract: Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark.Type: GrantFiled: July 23, 2004Date of Patent: November 1, 2005Assignee: Intertrust Technologies Corp.Inventors: Xavier Serret-Avila, Gilles Boccon-Gibod
-
Patent number: 6959384Abstract: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain.Type: GrantFiled: April 5, 2000Date of Patent: October 25, 2005Assignee: Intertrust Technologies CorporationInventor: Xavier Serret-Avila
-
Patent number: 6950867Abstract: The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction processing application is deployed on a local computer system to manage transactions thereon. The local computer system contacts a remote computer system to obtain authorization to execute a transaction. The local computer system initiates a failure-recovery job that is operable to automatically resend status signals and other information to the remote system if the communication with the remote system exhibits certain predefined fault conditions. The remote system is able to dynamically adjust the definition of the predefined fault conditions. If the transaction concludes without triggering the predefined fault conditions, the failure-recovery job is cancelled.Type: GrantFiled: July 31, 2000Date of Patent: September 27, 2005Assignee: Intertrust Technologies Corp.Inventors: Marc E. Strohwig, John M. McGinty, W. Olin Sibert
-
Publication number: 20050210275Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: May 11, 2005Publication date: September 22, 2005Applicant: InterTrust Technologies CorporationInventors: James Homing, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Home, Andrew Wright, Lesley Matheson, Susan Owicki
-
Patent number: 6948070Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.Type: GrantFiled: October 30, 2000Date of Patent: September 20, 2005Assignee: Intertrust Technologies CorporationInventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
-
Patent number: 6938021Abstract: Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership.Type: GrantFiled: October 18, 2002Date of Patent: August 30, 2005Assignee: Intertrust Technologies CorporationInventors: Victor H. Shear, David M. Van Wie, Robert P. Weber
-
Publication number: 20050183072Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: April 7, 2005Publication date: August 18, 2005Applicant: InterTrust Technologies CorporationInventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
-
Patent number: 6832316Abstract: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.Type: GrantFiled: January 6, 2000Date of Patent: December 14, 2004Assignee: Intertrust Technologies, Corp.Inventor: W. Olin Sibert
-
Patent number: 6785815Abstract: Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark.Type: GrantFiled: June 7, 2000Date of Patent: August 31, 2004Assignee: InterTrust Technologies Corp.Inventors: Xavier Serret-Avila, Gilles Boccon-Gibod
-
Publication number: 20040133793Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.Type: ApplicationFiled: June 25, 2003Publication date: July 8, 2004Applicant: InterTrust Technologies Corp.Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
-
Publication number: 20040123129Abstract: The present inventions provide an integrated, modular array of administrative and support services for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting financial management, rights management, certificate authority, rules clearing, usage clearing, secure directory services, and other transaction related capabilities functioning over a vast electronic network such as the Internet and/or over organization internal Intranets.Type: ApplicationFiled: December 2, 2003Publication date: June 24, 2004Applicant: InterTrust Technologies Corp.Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie, Robert P. Weber
-
Publication number: 20040107356Abstract: A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means may operate in accordance with rules received as part of the streamed content, or through a side-band channel. The rules may specify allowed uses of the content, including whether or not the content can be copied or transferred, and whether and under what circumstances received content may be “checked out” of one device and used in a second device. The rules may also include or specify budgets, and a requirement that audit information be collected and/or transmitted to an external server. In a different aspect, the apparatus may include a media player designed to call plugins to assist in rendering content.Type: ApplicationFiled: November 19, 2003Publication date: June 3, 2004Applicant: InterTrust Technologies Corp.Inventors: Talal G. Shamoon, Ralph D. Hill, Chris D. Radcliffe, John P. Hwa, W. Olin Sibert, David M. Van Wie
-
Publication number: 20040103305Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.Type: ApplicationFiled: October 28, 2003Publication date: May 27, 2004Applicant: InterTrust Technologies Corp.Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
-
Publication number: 20040073813Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: April 25, 2003Publication date: April 15, 2004Applicant: InterTrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Publication number: 20040059951Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: ApplicationFiled: April 25, 2003Publication date: March 25, 2004Applicant: InterTrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander