Resolving license dependencies for aggregations of legally-protectable content
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04K-001/00
H04L-009/00
출원번호
UP-0728174
(2003-12-04)
등록번호
US-7552093
(2009-07-01)
발명자
/ 주소
Levin, Douglas Andrew
Pedersen, Palle Martin
Shah, Ashesh C.
출원인 / 주소
Black Duck Software, Inc.
대리인 / 주소
Goodwin Procter LLP
인용정보
피인용 횟수 :
18인용 특허 :
48
초록▼
The disclosed technology can be used to develop systems and perform methods in which restriction, use, and/or interaction values can be assigned to license attributes associated with a first license to specify particular restrictions, uses (e.g., distribution), and interactions (e.g., manipulations)
The disclosed technology can be used to develop systems and perform methods in which restriction, use, and/or interaction values can be assigned to license attributes associated with a first license to specify particular restrictions, uses (e.g., distribution), and interactions (e.g., manipulations) pertaining to a first protectable content. These restriction, use, and/or interaction values can be compared with corresponding attribute values associated with a second license and a second protectable content and such comparisons can serve as a basis for determining attributes associated with a third protectable content, where the third protectable content is based on a combination of at least some aspects of the first protectable content and the second protectable content. The first and/or second protectable content can correspond to one or more multimedia presentations, video segments, audio segments, textual representations, works of art, visual representations, technological know-how, business know-how, contract rights, and/or software elements.
대표청구항▼
What is claimed is: 1. A method comprising: identifying, by a processor, a first license associated with a first protectable content; associating, by a processor, a portion of a plurality of license attributes with the first license; assigning, by a processor, a restriction value to each of the ass
What is claimed is: 1. A method comprising: identifying, by a processor, a first license associated with a first protectable content; associating, by a processor, a portion of a plurality of license attributes with the first license; assigning, by a processor, a restriction value to each of the associated license attributes, the restriction values of the associated license attributes specifying particular restrictions pertaining to the first protectable content; assigning, by a processor, at least one use value and at least one interaction value to a portion of the associated license attributes, the at least one use value representing a degree of distribution of the first protectable content and the at least one interaction value representing a degree of manipulation of the first protectable content; comparing, by a processor, the assigned restriction, use, and interaction values of the at least some of the associated license attributes with corresponding attribute values associated with a second license, the second license being associated with a second protectable content; detecting, by a processor, whether an event occurred associated with the comparison, wherein the event is at least one of an incompatibility, an error, and a warning; responsive to the comparison and the event detection, determining, by a processor, license attributes associated with a third protectable content, the third protectable content comprising a portion of the first protectable content and a portion of the second protectable content; and storing in a computer readable memory the determined license attributes associated with the third protectable content; wherein each processor is implemented in a digital data processing device. 2. The method of claim 1, wherein the first protectable content and the second protectable content correspond to different software elements. 3. The method of claim 2, wherein the software elements are compliant with an open source definition. 4. The method of claim 2, wherein the first protectable content is compliant with an open source definition and the second protectable content is not compliant with the open source definition. 5. The method of claim 1, wherein the first protectable content corresponds to at least one of a multimedia presentation, a video segment, an audio segment, a textual representation, a work of art, a visual representation, a technological know-how, a business know-how, and a contract right. 6. The method of claim 1, wherein the license attributes associated with the first license correspond to at least one of a software code format, a software naming convention, a software code annotation, a warranty, a reverse-engineering activity, a patent litigation activity, a standards body, a violation of intellectual property rights, and a textual description of at least one aspect of the first license. 7. The method of claim 1, wherein the assigned restriction values correspond to at least one of a prohibition, a requirement, and a nullity. 8. The method of claim 1, wherein the assigned restriction values are set to at least one of true, false, required, don't care, forbidden, 1, 0,-1, and text. 9. The method of claim 1, wherein the assigned use values correspond to at least one of an acquisition, a personal use, a research use, an organizational use, a limited distribution, and an unlimited distribution of at least one aspect of the first protectable content. 10. The method of claim 1, wherein the assigned interaction values correspond to at least one of an original element, a modified element, a group of distinct elements, a group of interconnected elements, a group of elements capable of providing a desired functionality, a plurality of interoperable groups of elements capable of providing a plurality of functions, an unrestricted manipulation of elements, and an unrestricted ownership of elements of at least one aspect of the first protectable content. 11. The method of claim 1, further comprising: analyzing, by a processor, the first protectable content to identify the first license. 12. The method of claim 1, further comprising: storing, by a processor, the restriction values, use values, and interaction values assigned to the at least some of the associated license attributes of the first license; storing, by a processor, the corresponding attribute values associated with the second license; based on the comparison of values, identifying, by a processor, values associated with the attributes associated with the third protectable content, the third protectable content being associated with a third license; storing, by a processor, the identified values associated with the attributes of the third protectable content; and using the stored attribute values of at least one of the first license, second license, and third license to determine, by a processor, attributes of a fourth protectable content, the fourth protectable content being based on a combination including at least some aspects of at least one of the first protectable content, second protectable content, and third protectable content. 13. The method of claim 1, further comprising: storing, by a processor, the restriction values, use values, and interaction values assigned to the at least some of the associated license attributes of the first license; storing, by a processor, the corresponding attribute values associated with the second license; based on the comparison of values, identifying, by a processor, values associated with the attributes associated with the third protectable content, the third protectable content being associated with a third license; storing, by a processor, the identified values associated with the attributes of the third protectable content; and using the stored attribute values associated with the third protectable content to determine, by a processor, attribute values of a fourth protectable content, the fourth protectable content being based on a combination including at least some aspects of the third protectable content. 14. The method of claim 13, further comprising: based on the attribute values of the fourth protectable content, determining, by a processor, a plurality of license alternatives for the fourth protectable content. 15. The method of claim 14, further comprising: selecting, by a processor, one of the plurality of license alternatives based on an operational environment associated with the fourth protectable content. 16. The method of claim 14, further comprising: storing, by a processor, the plurality of license alternatives in a network-accessible location. 17. The method of claim 1, further comprising: providing a third license representative of the attributes associated with the third protectable content. 18. The method of claim 1, further comprising: based on the attributes associated with the third protectable content, determining, by a processor, a plurality of license alternatives for the third protectable content. 19. The method of claim 18, further comprising: selecting, by a processor, one of the plurality of license alternatives based on an operational environment associated with the third protectable content. 20. The method of claim 18, further comprising: storing, by a processor, the plurality of license alternatives in a network-accessible location. 21. The method of claim 1, wherein the at least one assigned use value is equivalent to a default use value associated with the first license. 22. The method of claim 1, wherein the at least one assigned use value overrides a default use value associated with the first license. 23. The method of claim 1, wherein the at least one assigned interaction value is equivalent to a default interaction value associated with the first license. 24. The method of claim 1, wherein the at least one assigned interaction value overrides a default interaction value associated with the first license. 25. The method of claim 1, wherein the assigned restriction, use, and interaction values of the at least some of the associated license attributes of the first license override at least some of the corresponding attribute values associated with the second license to form attribute values associated with the third protectable content. 26. The method of claim 1, wherein the assigned restriction, use, and interaction values of the at least some of the associated license attributes of the first license coexist along with at least some of the corresponding attribute values associated with the second license as at least some attribute values of the attributes associated with the third protectable content. 27. The method of claim 1, further comprising: generating, by a processor, information associated with the detected event, the event information including indicia pertaining to at least one of an event type, a frequency of occurrence of the event type, a related use value, a related interaction value, and an identifier associated with at least one of the first license and second license; and storing, by a processor, the event information in a data structure. 28. The method of claim 1, further comprising assigning, by a processor, at least one source value to each of the attributes associated with the third protectable content, the source values identifying attribute information associated with at least one of the first and second licenses that affected values associated with particular ones of the attributes of the third protectable content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (48)
Tardo, Joseph John; Frailong, Jean-Marc; Mendoza, Harold Lee; Haris, Shiv, Apparatus and method for cryptographic-based license management.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system.
Afifi Ashraf ; Chan Dominic ; Comuzzi Joseph J. ; Hart Johnson M. ; Pizzarello Antonio, Method and apparatus for analyzing computer code using weakest precondition.
Lee,Chris Guo; Matada,Anmol Neelammna; Wang,Ningning, Method and apparatus for determining relative relevance between portions of large electronic documents.
Cline David C. (San Jose CA) Silverman Andrew P. (Los Gatos CA) Wymore Farrell W. (Mountain View CA), Method for analyzing calls of application program by inserting monitoring routines into the executable version and redir.
Califano Andrea (New York NY), Method for finding a reference token sequence in an original token string within a database of token strings using appen.
Ruffin Michael ; Jayaram Kristin R. ; Merenda Ann C. ; Morrison Timothy I. ; Ordonez Carlos A. ; Preston Allen H. ; Temple ; III Joseph L. ; Yan Eva L., Method, system and program product for evaluating the business requirements of an enterprise for generating business solution deliverables.
Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
Jain Ramesh ; Horowitz Bradley ; Fuller Charles E. ; Gupta Amarnath ; Bach Jeffrey R. ; Shu Chiao-fe, Similarity engine for content-based retrieval of images.
Driskell Dwight D. ; Greenspan Michael ; Henley Vivian C. ; Lane Nancy C. ; MacFarlane Lloyd ; Nielsen Betty J., System and method for associating services information with selected elements of an organization.
Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for providing assurance to a host that a piece of software possesses a particular property.
Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
Sahoo, Subhranshu; Narayanan, Ganapathy, System and method to select compatible open-source software and components for developed or conceptualized solution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.