Rights expression profile system and method using templates
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06Q-020/12
G06F-021/10
G06Q-040/00
H04N-021/254
H04N-021/835
H04N-021/8355
출원번호
US-0204393
(2008-09-04)
등록번호
US-9626668
(2017-04-18)
발명자
/ 주소
Raley, Michael C.
Gilliam, Charles P.
Ham, Manual
Lao, Guillermo
Tadayon, Bijan
출원인 / 주소
CONTENTGAURD HOLDINGS, INC.
대리인 / 주소
Rimon PC
인용정보
피인용 횟수 :
0인용 특허 :
150
초록▼
A system and method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression, including specifying rights expression information indicating a manner of use of an item, the rights expression information
A system and method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression, including specifying rights expression information indicating a manner of use of an item, the rights expression information including at least one element, the element having a variable and corresponding value for the variable; and performing an encoding process, including determining an identifier associated with a template corresponding to the rights expression information, extracting from the rights expression information the value for the variable corresponding to the element, and encoding a license adapted to be enforced on a device based on the variable and the identifier, the license including an identification of the template and the value for the variable.
대표청구항▼
1. A method for managing use of protected items within a rights management system having a communication network, at least one receiving device configured to receive usage rights in an original form, the usage rights being based on a set of rights expressions in a syntax, and a consumption device co
1. A method for managing use of protected items within a rights management system having a communication network, at least one receiving device configured to receive usage rights in an original form, the usage rights being based on a set of rights expressions in a syntax, and a consumption device configured to use protected items, the method comprising: receiving, by the at least one receiving device, a usage right in an original form associated with a protected item, use of the protected item being controlled in accordance with the usage right, the usage right specifying one or more rights expressions;selecting, by the at least one receiving device, an identifier of a plurality of identifiers based at least in part on a profile of a consumption device, the profile including information identifying a usage rights processing capability of the consumption device;identifying, by the at least one receiving device, one or more variables associated with the selected identifier;assigning, by the at least one receiving device, a value to each of the one or more variables based at least in part on information contained in the usage right;encoding, by the at least one receiving device, the usage right into an encoded usage right, the encoded usage right including the assigned value for each of the one or more variables associated with the selected identifier, the encoded usage right being in an encoded form that can be processed by the consumption device;transmitting, by the at least one receiving device, the encoded usage right and the protected item to the consumption device; andcontrolling, by the consumption device, use of the protected item on the specified consumption device in accordance with the encoded usage right. 2. The method of claim 1, wherein the at least one receiving device is a set top box. 3. The method of claim 1, wherein the at least one receiving device is a PC. 4. The method of claim 1, further comprising: interpreting the usage right; anddetermining a mapping between the interpreted usage right and the usage rights processing capability of the consumption device. 5. The method of claim 1, further comprising querying a knowledge base to identify the usage rights processing capability of the consumption device. 6. The method of claim 1, further comprising evaluating the usage right in the original form. 7. The method of claim 1, wherein the encoded form is a form that is specific to the consumption device. 8. A system for managing use of protected items within a rights management system having a communication network, the system comprising: a consumption device comprising: one or more processors associated with the consumption device; andone or more memories associated with the consumption device operatively coupled to at least one of the one or more processors associated with the consumption device and having instructions stored thereon that, when executed by at least one of the one or more processors associated with the consumption device, cause at least one of the one or more processors associated with the consumption device to control use of a protected item on the consumption device in accordance with an encoded usage right; andat least one receiving device comprising: one or more processors associated with the at least one receiving device; andone or more memories associated with the at least one receiving device operatively coupled to at least one of the one or more processors associated with the at least one receiving device and having instructions stored thereon that, when executed by at least one of the one or more processors associated with the at least one receiving device, cause at least one of the one or more processors associated with the at least one receiving device to: enable the receipt of a usage right in an original form associated with the protected item, use of the protected item being controlled in accordance with the usage right, the usage right specifying one or more rights expressions;select an identifier of a plurality of identifiers based at least in part on a profile of the consumption device, the profile including information identifying a usage rights processing capability of the consumption device;identify one or more variables associated with the selected identifier;assign a value to each of the one or more variables based at least in part on information contained in the usage right; andencode the usage right into the encoded usage right, the encoded usage right including the assigned value for each of the one or more variables associated with the selected identifier, the encoded usage right being in an encoded form that can be processed by the consumption device. 9. The system of claim 8, wherein the at least one receiving device is a set top box. 10. The system of claim 8, wherein the at least one receiving device is a PC. 11. The system of claim 8, wherein at least one of the one or more memories associated with the at least one receiving device has further instructions stored thereon that, when executed by at least one of the one or more processors associated with the at least one receiving device, cause at least one of the one or more processors associated with the at least one receiving device to: interpret the usage right; anddetermine a mapping between the interpreted usage rights and the usage rights processing capability of the consumption device. 12. The system of claim 8, wherein at least one of the one or more memories associated with the at least one receiving device has further instructions stored thereon that, when executed by at least one of the one or more processors associated with the at least one receiving device, cause at least one of the one or more processors associated with the at least one receiving device to query a knowledge base to identify the usage rights processing capability of the consumption device. 13. The system of claim 8, wherein at least one of the one or more memories associated with the at least one receiving device has further instructions stored thereon that, when executed by at least one of the one or more processors associated with the at least one receiving device, cause at least one of the one or more processors associated with the at least one receiving device to evaluate the usage right. 14. The system of claim 8, wherein the encoded form is a form that is specific to the consumption device. 15. At least one non-transitory computer-readable medium storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to: receive a usage right in an original form associated with a protected item, use of the protected item being controlled in accordance with the usage right, the usage right specifying one or more rights expressions;select an identifier of a plurality of identifiers based at least in part on a profile of a consumption device, the consumption device being at least one of the one or more computing devices, the profile including information identifying a usage rights processing capability of the consumption device;identify one or more variables associated with the selected identifier;assign a value to each of the one or more variables based at least in part on information contained in the usage right;encode the usage right into an encoded usage right, the encoded usage right including the assigned value for each of the one or more variables associated with the selected identifier, the encoded usage right being in an encoded form that can be processed by the consumption device;transmit the encoded usage right and the protected item to the consumption device; andcontrol use of the protected item on the specified consumption device in accordance with the encoded usage right. 16. The at least one non-transitory computer-readable medium of claim 15, wherein at least one of the one or more computing devices is a set top box. 17. The at least one non-transitory computer-readable medium of claim 15, wherein at least one of the one or more computing devices is a PC. 18. The at least one non-transitory computer-readable medium of claim 15, further storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to: interpret the usage right; anddetermine a mapping between the interpreted usage right and the usage rights processing capability of the consumption device. 19. The at least one non-transitory computer-readable medium of claim 15, further storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to query a knowledge base to identify the usage rights processing capability of the consumption device. 20. The at least one non-transitory computer-readable medium of claim 15, further storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to evaluate the usage right in the original form. 21. The at least one non-transitory computer-readable medium of claim 15, wherein the encoded form is a form that is specific to the consumption device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (150)
Rumiko Kakehi JP; Masaki Kyojima JP, Access rights authentication apparatus.
Barnes Vera L. (Wayne PA) Dodds ; Jr. Thomas J. (Drexel Hill PA) Gibson Harold F. (Downington PA) Campbell ; Jr. Carl M. (Newtown Square PA), Communications line authentication device.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA), Conditional object creating system having different object pointers for accessing a set of data structure objects.
Stearns Richard G. (Mountain View CA) Hecht David L. (Palo Alto CA) Bloomberg Dan S. (Palo Alto CA), Convolution filtering for decoding self-clocking glyph shape codes.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Hecht David L. (Palo Alto CA) Stearns Richard G. (Mountain View CA) Flores L. Noah (Soquel CA), Framing codes for robust synchronization and addressing of self-clocking glyph codes.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Musyck Emile P. (Geel BEX) Binard Luc A. (Mol BEX) Coupe Bernard G. (Tournai BEX), Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereo.
Hamilton Jeffrey S. (Doylestown PA) Kauffman Marc (Ft. Washington PA) Vince Lawrence D. (Lansdale PA), Method and apparatus for controlling access to digital signals.
Cichelli Richard J. (Allentown PA) Thompson Michael O. (Bethlehem PA), Method and apparatus for digital serial scanning with hierarchical and relational access.
Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
O\Callaghan Daniel (Fairfax Station VA) Lew Eugene L. (Olney MD), Method and apparatus for video on demand with fast forward, reverse and channel pause.
Vigarie Jean-Pierre,FRX, Method and equipment for allocating to a television program, which is already conditionally accessed, a complementary conditional access.
Kang,Chun un; Kim,Dong jin, Method of controlling portable personal device having facilities for storing and playing digital contents by computer and portable personal device operation method therefor.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Jared David A. ; Flores L. Noah ; Hecht David L. ; Stearns Richard G. ; Chang Kenneth H. P., Methods and apparatus for robust decoding of glyph address carpets.
Hecht David L. (Palo Alto CA) Flores L. Noah (Soquel CA) Petrie Glen W. (San Jose CA) Webster Thomas M. (Mountain View CA), Random access techniques for use with self-clocking glyph codes.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Hecht David L. ; Stearns Richard G. ; Flores L. Noah, Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values.
Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shelton William Anthony ; Healy William R. ; Jones Joseph Francis Earl ; Issac Samuel, System for collecting and presenting real-time weather information on multiple media.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
Asip William F. (340 E. 52nd St. New York NY 10022) Bartha Miklos L. (11 Meade Ave. Passaic NJ 07055), System for remote monitoring and data transmission over non-dedicated telephone lines.
Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.