IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0289099
(2005-11-28)
|
등록번호 |
US-7861308
(2011-02-24)
|
발명자
/ 주소 |
- Strohwig, Marc E.
- Kawamoto, Yoji
- Nagano, Motohiko
- Chavanne, Pierre
- Goto, Norifumi
- Steele, III, Oscar H.
- Swenson, Eric John
|
출원인 / 주소 |
- Sony Corporation
- Sony Electronics Inc.
|
대리인 / 주소 |
Fitch, Even, Tabin & Flannery
|
인용정보 |
피인용 횟수 :
6 인용 특허 :
2 |
초록
▼
A method for monitoring time so that the use of protected content can be controlled includes receiving a trusted time value from a trusted authority external to a client device. When the client is no longer in communication with the trusted authority, the previously-received trusted time value is up
A method for monitoring time so that the use of protected content can be controlled includes receiving a trusted time value from a trusted authority external to a client device. When the client is no longer in communication with the trusted authority, the previously-received trusted time value is updated by use of the client's operating system counter so that a calculated trusted time value is derived for content license evaluation purposes.
대표청구항
▼
What is claimed is: 1. A method of controlling the use of content, the method comprising: receiving a first time value from a trusted authority external to a client; securely storing the first time value; securely storing, using a central processing unit (CPU), a first counter value corresponding t
What is claimed is: 1. A method of controlling the use of content, the method comprising: receiving a first time value from a trusted authority external to a client; securely storing the first time value; securely storing, using a central processing unit (CPU), a first counter value corresponding to a point in time corresponding to the first time value; calculating a time offset value as a function of a difference between a second counter value and the first counter value; combining the time offset value with the first time value to obtain a calculated time value; and using the calculated time value to control the use of the content. 2. The method of claim 1, wherein receiving the first time value includes receiving the first time value from the trusted authority while the trusted authority is in communication with the client via a network, and wherein combining the time offset value with the first time value includes combining the time offset value with the first time value at a point in time when the client is not in communication with the trusted authority. 3. The method of claim 1, further comprising evaluating a license having temporal rules according to the calculated time value. 4. The method of claim 1, wherein the first and second counter values are generated by a counter adapted to provide a plurality of counter values between a minimum counter value and a maximum counter value, and to generate the minimum counter value following the maximum counter value, wherein the time offset value is a function of the second counter value minus the first counter value if the first counter value is less than the second counter value, and wherein the time offset value is a function of the second counter value plus the maximum counter value minus the first counter value if the first counter value is greater than the second counter value. 5. The method of claim 4, wherein receiving the first time value includes receiving the first time value from the trusted authority while the trusted authority is in communication with the client via a network, and wherein combining the time offset value with the first time value includes combining the time offset value with the first time value at a point in time when the client is not in communication with the trusted authority. 6. The method of claim 4, further comprising evaluating a license having temporal rules according to the calculated time value. 7. An article of manufacture for controlling the use of content and for use by a device having a processing unit, the device being adapted to receive data from a trusted authority external to the device, the article of manufacture comprising: at least one non-transitory, tangible computer usable media including at least one computer program embedded therein, the at least one computer program being adapted to cause the device to perform: receiving a first time value from the trusted authority; securely storing the first time value; securely storing a first counter value corresponding to a point in time corresponding to the first time value; calculating a time offset value as a function of a difference between a second counter value and the first counter value; combining the time offset value with the first time value to obtain a calculated time value; and using the calculated time value to control the use of the content. 8. A system for controlling the use of content and adapted to receive data from a trusted authority external to the system, the system comprising: a device having a processing unit capable of executing software routines, and programming logic executed by the processing unit, wherein the programming logic is operable with the processing unit to control the use of the content by performing steps comprising: receiving a first time value from the trusted authority; securely storing the first time value; securely storing a first counter value corresponding to a point in time corresponding to the first time value; calculating a time offset value as a function of a difference between a second counter value and the first counter value; combining the time offset value with the first time value to obtain a calculated time value; and using the calculated time value to control the use of the content. 9. A method of monitoring time, comprising: receiving a first time value from a trusted authority external to a client; securely storing the first time value; securely storing, using a central processing unit (CPU), a first counter value corresponding to a point in time corresponding to the first time value; combining a time offset value with the first time value to obtain a calculated time value, wherein the time offset value is a function of a difference between a second counter value and the first counter value; selecting the larger of one of the calculated time value and a system clock time value; and evaluating a license having temporal rules according to the selected larger one of the calculated time value and the system clock time value. 10. The method of claim 9 further comprising: securely storing a second time value corresponding to a point in time when the client was most recently in communication with the trusted authority; and securely storing a third time value corresponding to a point in time when at least a subsystem of an application was most recently initialized, the application being adapted for using content. 11. The method of claim 9 wherein receiving the first time value includes receiving the first time value from the trusted authority while the trusted authority is in communication with the client via a network, and wherein combining the time offset value with the first time value includes combining the time offset value with the first time value at a point in time when the client is not in communication with the trusted authority. 12. The method of claim 9 wherein the first and second counter values are generated by a counter adapted to provide a plurality of counter values between a minimum counter value and a maximum counter value, and to generate the minimum counter value following the maximum counter value, and wherein the time offset value is a function of the second counter value minus the first counter value if the first counter value is less than the second counter value, and wherein the time offset value is a function of the second counter value plus the maximum counter value minus the first counter value if the first counter value is greater than the second counter value. 13. The method of claim 9 further comprising securely storing a second time value, wherein the second time value corresponds to a point in time when the client was most recently in communication with the trusted authority, and wherein evaluating the license having temporal rules includes evaluating the license having temporal rules if the second time value corresponds to a point in time that has occurred within a predetermined time period. 14. A method of monitoring time, comprising: receiving a first time value from a trusted authority external to a client; securely storing the first time value; securely storing, using a central processing unit (CPU), a first counter value corresponding to a point in time corresponding to the first time value; and combining a time offset value with the first time value to obtain a calculated time value if a second time value is greater than a third time value, wherein the second time value corresponds to a point in time when the client was most recently in communication with the trusted authority, wherein the third time value corresponds to a point in time when at least a subsystem of an application was most recently initialized, the application being adapted for using content, and wherein the time offset value is a function of a difference between a second counter value and the first counter value. 15. The method of claim 14 further comprising securely storing the second and third time values. 16. The method of claim 14 wherein combining the time offset value with the first time value includes combining the time offset value with the first time value if the second time value corresponds to a point in time that has occurred within a predetermined time period. 17. The method of claim 14, wherein receiving the first time value includes receiving the first time value from the trusted authority while the trusted authority is in communication with the client via a network, and wherein combining the time offset value with the first time value includes combining the time offset value with the first time value at a point in time when the client is not in communication with the trusted authority. 18. The method of claim 14 further comprising evaluating a license having temporal rules according to the calculated time value. 19. The method of claim 14 wherein the first and second counter values are generated by a counter adapted to provide a plurality of counter values between a minimum counter value and a maximum counter value, and to generate the minimum counter value following the maximum counter value, and wherein the time offset value is a function of the second counter value minus the first counter value if the first counter value is less than the second counter value, and wherein the time offset value is a function of the second counter value plus the maximum counter value minus the first counter value if the first counter value is greater than the second counter value. 20. An article of manufacture for monitoring time and for use by a device having a processing unit, the device being adapted for communication with a trusted authority external to the device, the article of manufacture comprising: at least one non-transitory, tangible computer usable media including at least one computer program embedded therein, the at least one computer program having a subsystem and being adapted to cause the device to perform: receiving a first time value from the trusted authority; securely storing the first time value; securely storing a first counter value corresponding to a point in time corresponding to the first time value; and combining a time offset value with the first time value to obtain a calculated time value if a second time value is greater than a third time value, wherein the second time value corresponds to a point in time when the device was most recently in communication with the trusted authority, wherein the third time value corresponds to a point in time when at least the subsystem of the at least one computer program was most recently initialized, and wherein the time offset value is a function of a difference between a second counter value and the first counter value. 21. A system for monitoring time and adapted for communication with a trusted authority external to the system, the system comprising: a device having a processing unit capable of executing software routines, and programming logic executed by the processing unit, wherein the programming logic is operable with the processing unit to control the use of the content by performing steps comprising: receiving a first time value from the trusted authority; securely storing the first time value; securely storing a first counter value corresponding to a point in time corresponding to the first time value; and combining a time offset value with the first time value to obtain a calculated time value if a second time value is greater than a third time value, wherein the second time value corresponds to a point in time when the device was most recently in communication with the trusted authority, wherein the third time value corresponds to a point in time when at least a portion of the programming logic was most recently initialized, and wherein the time offset value is a function of a difference between a second counter value and the first counter value.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.