System and method for activating a rendering device in a multi-level rights-management architecture
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04K-001/00
출원번호
US-0985214
(2004-11-10)
등록번호
US-7430542
(2008-09-30)
발명자
/ 주소
DeMello,Marco A.
Narin,Attila
Setty,Venkateshaiah
Zeman,Pavel
Krishnaswamy,Vinay
Manferdelli,John L.
Byrum,Frank D.
Keely,Leroy Bertrand
Yaacovi,Yoram
Alger,Jeffrey A.
출원인 / 주소
Microsoft Corporation
대리인 / 주소
Woodcock Washburn LLP
인용정보
피인용 횟수 :
2인용 특허 :
64
초록▼
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or "inscribed"); source-signed; and fully-individualized (or "owner exclusive"). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content. The client components include an object which accesses encrypted content, an object that parses the license and enforces the rights in the license, an object which obtains protection software and data that is individualized for the client and/or the persona operating the client, and a script of instructions that provides individualization information to a distributor of content so that the content may be individualized for the client and/or its operating persona. Content is generally protected by encrypting it with a key and then sealing the key into the content in a way that binds it to the meta-data associated with the content. In some instances, the key may also be encrypted in such a way as to be accessible only by the use of individualized protection software installed on the client, thereby binding use of the content to a particular client or set of clients.
대표청구항▼
What is claimed is: 1. A computer-readable storage medium encoded with computer-executable instructions to perform a method of activating software installed on a computing device, said method comprising the acts of: validating a server; deriving an identifier associated with said computing device;
What is claimed is: 1. A computer-readable storage medium encoded with computer-executable instructions to perform a method of activating software installed on a computing device, said method comprising the acts of: validating a server; deriving an identifier associated with said computing device; uploading said identifier to said server; receiving a secure repository from said server; and authenticating said secure repository, further comprising the acts of: installing said secure repository; and receiving one or more activation certificates adapted for use with said secure repository, wherein said one or more activation certificates includes: a first activation certificate in an encrypted form; and a second activation certificate in an unencrypted form. 2. A computer-readable storage medium encoded with computer-executable instructions to perform a method of enabling the use of content items in a multi-level distribution architecture, said method comprising the acts of: rendering a first set of content items without regard to whether a first status is activated or non-activated; and rendering a second set of content items only if said first status is activated, further comprising the act of obtaining an activation certificate, wherein said second set of content items are encrypted with a first key, wherein said activation certificate contains a first public/private key pair, and wherein said second set of content items are decryptable only in the presence of said activation certificate, further comprising the act of downloading a secure repository having associated therewith a second public/private key pair, wherein said first key is encrypted with the public key of said first public/private key pair, and wherein said activation certificate contains the private key of said first public/private key pair in a form encrypted by the public key of said second public/private key pair. 3. The computer-executable instructions of claim 1, wherein the computer-executable instructions comprise a client-side object. 4. The computer-executable instructions of claim 3, wherein said client-side object comprises an ACTIVEX control COM object. 5. The computer-executable instructions of claim 3, wherein said client-side object comprises a Java Applet. 6. The computer-executable instructions of claim 3, wherein said client-side object comprises a NETSCAPE plug-in. 7. The computer executable instructions of claim 1, wherein said method further comprises the act of uploading, to said server, data associated with a user. 8. The computer executable instructions of claim 1, wherein said identifier is based on hardware associated with said computing device, and wherein said identifier uniquely identifies said computing device. 9. The computer executable instructions of claim 1, wherein said secure repository is based on said identifier. 10. The computer executable instructions of claim 1, wherein said authenticating act comprises verifying a digital signature of at least some code of said secure repository. 11. The computer executable instructions of claim 1, wherein said computing device comprises a dedicated reader device. 12. The computer executable instructions of claim 1, wherein said computing device comprises an open-platform computing arrangement. 13. The computer executable instructions of claim 1, wherein an address of said server is hard-coded into said computer-executable instructions.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (64)
Rohatgi Pankaj (Sunnyvale CA) Dureau Vincent (Vemas CA), Apparatus and method for authenticating transmitting applications in an interactive TV system.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Dutta, Rabindranath, Incremental updates of items and prices on a customer's computer to reduce download times for frequently purchased items in e-commerce transactions in a method, system and program.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Khan Raheel Ahmed ; Burleson David Brent ; Filion John Thomas ; Cheek Donald Scott, Method and apparatus for a game delivery service including flash memory and a game back-up module.
Sachs James ; Pomeroy Thomas W. ; Novicov Aleksey ; Conboy Garth ; Walter Erik ; Leshner William S. ; Duga Brady ; Wotiz Richard, Method and apparatus for electronically distributing and viewing digital contents.
White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
Lambert, Mark L.; van der Rijn, Daniel J. G.; Kemper, David J.; Verkler, Jay L., Method and apparatus for storing and delivering documents on the internet.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Kenneth L. Nash, System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.