US20050273439A1 - System and method for generating new licenses - Google Patents

System and method for generating new licenses Download PDF

Info

Publication number
US20050273439A1
US20050273439A1 US11/203,358 US20335805A US2005273439A1 US 20050273439 A1 US20050273439 A1 US 20050273439A1 US 20335805 A US20335805 A US 20335805A US 2005273439 A1 US2005273439 A1 US 2005273439A1
Authority
US
United States
Prior art keywords
content
license
secure
rights
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/203,358
Inventor
Wei Yen
David Blythe
John Princen
Pramila Srinivasan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/360,827 external-priority patent/US7322042B2/en
Application filed by Individual filed Critical Individual
Priority to US11/203,358 priority Critical patent/US20050273439A1/en
Publication of US20050273439A1 publication Critical patent/US20050273439A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1077Recurrent authorisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Definitions

  • the invention relates to assignment or modification of rights to content, such as for example in a closed-content distribution system, where those rights might be static or dynamic, and might be limited or permanent.
  • Closed-content distribution systems include end-to-end systems, including publishing servers, content distribution servers and playback devices, where the content that is playable on playback devices can be controlled through appropriate security techniques, and those security techniques make it relatively difficult for any unauthorized third party to distribute content that would be playable on the playback devices.
  • it might be possible to distribute unauthorized content but the playback devices are restricted to only use that content subject to rights granted by authorized licenses.
  • security techniques might be applied to make it relatively difficult for any unauthorized third party to distribute licenses granting rights to use that content.
  • a game device does record a set of state information, such as for example a high score or a set of users who have achieved high scores, for the purpose of creating ranking lists and for the purpose of providing an initiative to the users to achieve rankings.
  • the game device might allow the user to continue play for a duration of time, or might allow the user access to selected new portions of the game, in response to whether that user has achieved a specific objective.
  • the game device there is no substantial provision for the game device to dynamically modify rights to content (except for such extensions) or to dynamically provide rights to additional or upgraded or new content, across multiple sessions or using saved state information.
  • the invention provides methods and systems capable of assignment or modification of rights to content, such as for example in a closed-content distribution system, where those rights might be static or dynamic, and might be limited or permanent.
  • the invention provides methods and systems capable of either static interpretation or dynamic reinterpretation or updating of licenses to provide new or modified rights to content, and either static assignment or dynamic assignment of rights to content, such as for example in a closed distribution system.
  • the invention provides methods and systems capable of either limited assignment or unlimited assignment of rights to content, such as for example limited rights that are governed by time limitations or otherwise limited for a marketing purpose, and such as for example unlimited rights, such as for example might be traditionally conferred by purchase of permanent license for content.
  • the invention provides methods and systems capable of noting state information generated by an item of current content, and capable of providing new rights to content or new content (with the effect of adding to or updating the current content) in response thereto.
  • electronic or physical media might dynamically send new rights to content or new content to the owner of the current content, or that new content might be pre-loaded and available at the recipient device in response to new rights to that content.
  • the license server might dynamically send a license to the new content, either in response to a selected actual value of that state information or in response to a selected changed value therein.
  • a conditional license to new content includes a set of rights to content, those rights being associated with a class of possible sets of state information generated by an item of current content.
  • a conditional license L provides:
  • the “state information including S” is emitted or otherwise generated by C and the “rights to use N” are, but need not be, in addition to the already extant rights to use C.
  • the user might obtain a set of current content C, a set of new content N, and a dynamic license L, where the dynamic license L provides:
  • a “license” or other content rights, associated with selected content might be represented by a data structure maintained in storage.
  • the storage might be secure storage (such as for example included with a secure hardware device, such as a chip) or might be otherwise non-secure storage (such as for example RAM or disk storage), but digitally signed or encrypted by a security system, with the effect that the license or other content rights cannot be easily modified or read without approval by the security system.
  • the content rights might be dynamically updated themselves, with the approval of the security system, or might represent a dynamic determination of content rights, as described above, such as in an “IF-THEN” format, where the “IF” part represents a conditional trigger for additional or modified rights, and where the “THEN” part represents the additional or modified rights.
  • the security system prevents any changes to the state of the selected content element, with the effect that cheating on the original game is prevented.
  • the invention provides methods and systems including limited assignment of rights to content, such as for example limited rights that are governed by time limitations or otherwise limited for a marketing purpose.
  • the rights might be limited by the amount of time the user is allowed to play the game, as measured by actual time of execution of the game by the secure processor, as measured by the number of times the user is starts the game as recorded by the secure processor, or by the duration of time during which the user is allowed to play the game as measured by the secure processor.
  • These particular limited sets of rights have the advantage of being well suited to games testing, “free trials,” and rentals of application programs or games.
  • the invention also provides methods and systems including unlimited assignment of rights to content, such as for example might be traditionally conferred by purchase of underlying media including unencrypted content.
  • a dynamic license or a set of dynamic content rights might be represented within a data structure including a set of instructions (such as for example a set of machine code instructions, a pointer to a set of machine code instructions, a set of scripting language instructions, a pointer to a set of scripting language instructions, or other representation of the conditional “IF-THEN” nature of the dynamic rights).
  • the instructions are parsed (if necessary) and performed (either by execution, interpretation, emulation, or otherwise) by a secure processor. Any other techniques that are responsive to the state of selected content, and provide a descriptor of a set of enforceable rights, would be within the scope and spirit of the invention. After reading this application, those of ordinary skill in the art would recognize that these other techniques would be workable, and would not require either undue experimentation or further invention.
  • a dynamic license or a set of dynamic content rights might be represented by allowing an issuer of that dynamic license to read the state of the selected content, and to dynamically issue a license in response to that state.
  • the playback device need not implement any such dynamic assignment rules in advance, and that the issuer of the dynamic license would be able to change its dynamic rules for issuing a license at an appropriate time. For example the issuer of the dynamic license need not revoke the earlier dynamic license or issue a new dynamic license, and need not tell the playback device what the issuers' intended rules are for issuing the dynamic license.
  • a dynamic license or a set of dynamic content rights might be represented by allowing a set of security software to dynamically alter interpretation of a license, or the rights granted therein, under control and supervision of a secure processor.
  • a first content element C 1 might emit a state S, with the effect of altering or modifying rights to the content C 2 such that its conditions to launch are met and it can be executed.
  • a first content element C 1 might provide an incentive for a user to execute a second content element C 2 , by providing that second content element C 2 with the ability to alter or modify the state of the content C 1 (such as for example by adding bonus points to the score for C 1 , or otherwise marking as achieved a goal within the context of C 1 ).
  • This second example is not necessarily preferred.
  • contests or games might be conducted, with the effect that one or more winners (as determined, for example, in response to relative scores or relative times taken) of the contest or game would receive an appropriate prize, such as for example: a bonus game, a set of bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, and the like.
  • an appropriate prize such as for example: a bonus game, a set of bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, and the like.
  • the contest or game might include one winner, or more than one winner, or one or more winners of more than one class of winners, and the like.
  • the contest or game might include a team of players whose joint score is responsive to the individual scores of the team members, such as a sum or median of those scores or a maximum one or more of those scores.
  • the original game, the bonus game, or both might include provisions for individual play, for joint play, or for cooperative play.
  • an entity not associated with the original author or distributor of the game might provide a contest (either with or without entry requirements), in which superior play of the original game is rewarded with an update to that game, or with an update to rights to use that game.
  • the update might or might not be created by the original author or distributor of the game, the entity conducting the contest, or otherwise. (However, after reading this application, those skilled in the art would recognize that the nature of the closed-content distribution system would generally prevent external entities from providing authentic updates to content elements.)
  • the techniques described herein provide that games already available to the user in the closed system might appear to be upgraded, such as by alteration or emendation, without any particular requirement of rewriting code for the original game, or for having access to that original code.
  • the game might be upgraded by providing a new program that checks the state of the old game, and makes changes in the behavior of the old game, either by directly interacting with the user, or by altering the state information of the old game (with the intercession of the security system), or some combination or conjunction thereof.
  • educational software might be altered or emended to provide for an appropriate prize or reward for successful learning such as for example: a right to play a game program (either generically or limited to a selected period of time), a right to play bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, a next or another educational program “level” or other module for the educational program, a credit toward purchase of a new educational program, and the like.
  • a right to play a game program either generically or limited to a selected period of time
  • bonus “levels” or other modules for a game
  • cash prize a credit toward purchase of a new or upgraded game
  • next or another educational program “level” or other module for the educational program a credit toward purchase of a new educational program, and the like.
  • educational software might have the ability to, in response to completion of a first educational program or in response to achievement of a selected level of achievement (such as a successful grade on a test), provide access to a second educational program or test material (or to a next level of the same educational program or test material).
  • a selected level of achievement such as a successful grade on a test
  • the techniques described herein provide for security checks before accessing critical or otherwise sensitive data, such as for example confidential business information, confidential personal information, confidential financial information, program code, trade secrets, and the like.
  • the techniques described herein provide for a chain (whether sequential or organized as a directed graph, with either conditional or unconditional transfers at each edge of that directed graph) events for the system to watch for, and in response thereto, take action on. For example, reaching a selected state in a first game program might provide the user with the right to play a second game, reaching a selected state in the second game program might provide the user with the right to play a third game, and the like.
  • a chain might form a complex logical structure, such as a tree structure, a directed acyclic graph, or a directed graph including at least one closed loop.
  • the techniques described herein provide for limited assignment of rights to content, such as for example limited rights that are governed by time limitations or otherwise limited for a marketing purpose.
  • the rights might be limited by the amount of time the user is allowed to play the game, by the number of times the user is allowed to play the game, or by the duration of time during which the user is allowed to play the game.
  • FIG. 1 shows a block diagram of a system including dynamic assignment of rights to content in a closed distribution system.
  • FIGS. 2 a and 2 b show a process flow diagram of a method of operating the system including dynamic assignment of rights to content in a closed distribution system.
  • content server or “content distribution server” generally describe, in the distribution system, any device capable of delivering content (either directly or indirectly), to a secure processor or secure playback device, using any form of transport technique.
  • the content distribution server needs only a single copy of each content element, and might deliver multiple individualized copies of that content element in response to distinct users or in response to distinct requests.
  • the concept of a content server is broad, and includes not only a server having content stored thereon, but also devices by which content might be dynamically created, such as a television camera, video camera, webcam, any reasonable generalization thereof, and the like.
  • the content server may include a secure device capable of generating a secure hash and securely signing any information distributed from the server.
  • the phrase “license server” generally describes, in the distribution system, any device capable of delivering licenses for content.
  • the license server includes in the license it emits at least (1) a decryption key for the content, that decryption key being encrypted by a private key for the specific playback device, and (2) a digital signature or secure hash value that can be used to verify authenticity of the license, and optionally, (3) a digital signature or secure hash value that can be used to verify authenticity of the content.
  • the license server includes an online transaction server capable of requesting an identity of the device requesting the license and capable of creating, in response, a cryptographically signed data structure containing information specifying a device identity, a content identity and a set of content decryption keys.
  • secure processor and “secure playback device” generally describe the devices on which the content will be executed or interpreted (for code or instructions) or by which the content will be displayed or presented (for media content).
  • the secure processor is relatively secure against tampering, and includes at least a UID (unique identifier) or a known encryption key (such as for example a private key in a public-key cryptosystem), with the effect that other elements of the system are capable of communicating privately and securely with the secure processor.
  • a secure processor includes any general purpose or special purpose computing device for which there is at least some secure memory, secured against inspection or intrusion from outside the secure processor, and for which there is at least some executive control capable of preventing application software from disclosing the contents of that secure memory.
  • the secure processor has built in security software that cannot readily be circumvented, or other techniques to securely bootstrap the loading of such security software from insecure devices, such as for example external mass storage.
  • the secure playback device can include a playback device capable of presenting information, under control of the secure processor, to a user, such as for example a game-player or student.
  • content or the phrase “content element” generally describe an application program (such as for example a game program) or a set of media content (such as for example an animation clip or a video clip) to be executed or interpreted (for code or instructions) or to be displayed or presented (for media content).
  • the content might include application software, audio/video presentations, databases, educational programs, games or educational games, multimedia content, teaching materials, reasonable combinations or generations thereof, and the like.
  • the phrases “content state” or “state of the content element” generally describe a set of information generated in response to a state of the content, such as for example related to the state of progress through a game, such as for example a data structure including values the content saves in persistent storage, either for deliberate publication to possible readers thereof, or to record for itself its own state for later recovery if need be.
  • the content state might represent progress of a player in a game, such as a score value or a time taken value.
  • the secure processor might (1) encrypt the content state, with the effect that it can only be read by authorized readers, (2) digitally sign the content state, with the effect that it cannot be altered without detection by the content element, or (3) both, with the effect that the content state might be maintained on persistent storage outside the secure processor.
  • each license generally describes information sufficient for the secure playback device use the content subject to the rights granted by the license, and possibly to authenticate the content.
  • each license includes a data structure associated with one or more content elements, and including, in one embodiment, (1) an encrypted key for that content, with the effect that the secure processor can access the content if it has access to the license, and (2) a digital signature or secure hash value, with the effect that the license cannot be easily altered and remain effective.
  • the license also includes a description of those rights the license grants to the licensee with regard to the content.
  • licenses are individually tailored to each individual authorized recipient or user, and to each individual secure playback device for which that recipient or user is authorized, although in the context of the invention there is no such particular requirement.
  • rights and the phrases “content rights” or “rights to the content” generally describe what actions the secure processor is allowed to take with regard to the content.
  • the rights might include a number of times the secure processor is allowed to execute the content, an amount of total running time the secure processor is allowed to execute the content, an amount of wall-clock time the secure processor is allowed to execute the content, and the like.
  • the secure processor prevents any use of the content outside those specified by the content rights.
  • rights might be “static” or “dynamic,” and might be “limited” or “unlimited.”
  • limited and unlimited in the context of rights granted (by a license) to content, generally describe whether the rights are limited in one or more selected ways, such as for example time limited or play limited, or whether the rights are substantially unlimited, such as for example in the case of a traditional purchase of a permanent license for a game for that specific user or for that specific playback device.
  • FIG. 1 shows a block diagram of a system including dynamic assignment of rights to content in a closed distribution system.
  • a system 1 includes a content server 110 , a secure playback device 130 , a license server 140 , and a communication system 150 .
  • the content server 110 includes any device or system capable of delivering content 112 to the secure playback device 130 , directly or indirectly.
  • the content server 110 might include a server device capable of receiving requests for content 112 from the secure playback device 130 , and responding to those requests by sending content 112 using the communication system 150 .
  • the content server 110 receives explicit requests for content 112 from the secure playback device 130 .
  • the content server 110 might deliver the content package 111 including content 112 to the secure playback device 130 , in accordance with request for a subscription to that content 112 , a request from a device other than the secure playback device 130 , an original request from the secure playback device 130 or another device for the content 112 and any updates thereto, reasonable generalizations thereof, and the like.
  • the secure playback device 130 can have access to the content 112 without being able to use that content 112 , such as for example if a license 142 (as further described below) is required to authenticate or decrypt the content 112 .
  • the secure playback device 130 might receive many elements of content 112 , but not receive licenses 142 until a user presents proof of purchase of such a license 142 . In the latter event, the secure playback device 130 would obtain a license 142 from the license server 140 , either directly in response to the proof of purchase, or indirectly by the user entering information from the license 142 , obtained from the license server in response to the proof of purchase.
  • the license server 140 includes any device or system capable of delivering a license 142 to the secure playback device 130 , directly or indirectly.
  • the license server 140 might include a device similar to the content server 110 .
  • content server 110 and the license server 140 operate in the same or a similar manner.
  • the content server 110 might deliver the content 112 in a first manner, while the license server 140 delivers the license 142 in a second manner.
  • any one of these elements might be represented by one or more messages in an underlying communication transport protocol.
  • any one of these elements might be represented by inclusion or incorporation into a set of messages for collectively transporting multiple such elements.
  • the transport protocol need be either of these specific protocols, but might include other and further protocols, combinations of transport techniques, or significant variants thereof.
  • the communication system 150 includes any device or system, or technique, capable of delivering information (such as for example the content package 111 ) among the elements of the system 100 .
  • the communication system 150 includes a communication network, such as for example an Internet, intranet, extranet, VPN, LAN, WAN, enterprise network, private or public switched network, or broadcasting system, capable of electronic communication of the content package 111 including the content 112 .
  • a communication network such as for example an Internet, intranet, extranet, VPN, LAN, WAN, enterprise network, private or public switched network, or broadcasting system, capable of electronic communication of the content package 111 including the content 112 .
  • the communication system 150 operates electronically, either in whole or in part.
  • the communication system 150 might include (at least in part) transport of physical media on which the content package 111 including the content 112 is encoded, such as for example a CD-ROM, rewritable CD, DVD, floppy disk, detachable hard disk drive, magnetic tape, paper tape, bar-coded package, or any other media capable of being sensed and interpreted by the secure playback device 130 .
  • transport of physical media on which the content package 111 including the content 112 is encoded such as for example a CD-ROM, rewritable CD, DVD, floppy disk, detachable hard disk drive, magnetic tape, paper tape, bar-coded package, or any other media capable of being sensed and interpreted by the secure playback device 130 .
  • the secure playback device 130 includes a computing device capable of performing the tasks described herein, including receiving the content 112 directly or indirectly from the content server 110 , and receiving the license 142 directly or indirectly from the license server 140 .
  • the secure playback device 130 includes a secure processor including a secure state and a monitored state as described in the incorporated disclosure, optionally augmented using at least one auxiliary device 131 and external storage 132 , and with an application program such as a game program running in the monitored state.
  • the external storage 132 might include RAM (random access memory), mass storage devices (such as for example magnetic or optical disk drives), a removable storage device (such as for example a flash memory or PC card including a disk drive), or some combination thereof.
  • the application program (such as a game program running in the monitored state) has a process operating on the secure processor, that process having access to the state of the game, and capable of performing actions to alter the state of the game.
  • the state of the game can be maintained in the external storage 132 .
  • the state of the game might then be copied for use by a second device, or sent to that second device, either physically such as by moving the media on which the external storage 132 is embodied, or electronically such as by communication over a network.
  • a dynamic license or a set of dynamic content rights might be represented within a data structure.
  • the data structure might be maintained within the secure playback device 130 or in the external storage 132 , with the effect that a secure processor associated with the secure playback device 130 is capable of parsing and enforcing those dynamic content rights.
  • a dynamic license or a set of dynamic content rights might be represented by allowing an issuer of that dynamic license to read the state of the selected content, and to dynamically alter or issue a license 142 in response to that state.
  • the issuer of the dynamic license would be allowed to obtain the state of the game from the external storage 132 , and to dynamically alter or issue a license 142 for an element of content 112 .
  • an element of content 112 under control and supervision of a secure processor associated with the secure playback device 130 , can modify the state of the game by writing to the external storage 132 .
  • the element of content 112 can have the effect of providing a dynamic license or a set of dynamic content rights.
  • a first content element C 1 might emit a state S with the effect of altering or modifying rights to the content C 2 such that its conditions for launch are execution are met as a result of state S.
  • a first content element C 1 might provide an incentive for a user to execute a second content element C 2 , by providing that second content element C 2 with the ability to alter or modify the state of the content C 1 (such as for example by adding bonus points to the score for C 1 , or otherwise marking as achieved a goal within the context of C 1 ).
  • This second example is not necessarily preferred.
  • this has the effect that a dynamic license or a set of dynamic content rights can provide the user with rights to a second element of content 112 , in response to the state of the game for a first element of content 112 .
  • a dynamic license or a set of dynamic content rights can provide the user with rights to a second element of content 112 , in response to the state of the game for a first element of content 112 .
  • the state of the game might be in response to a result from an individual user, such as for example a raw score, a timed score, or some combination thereof.
  • the state of the game might also or alternatively be in response to an aggregate result, such as for example a total, a maximum or minimum of some calculated value, or some combination thereof.
  • the aggregate might be applied to a set of results from an individual user, or to a set of results from more than one such user.
  • the dynamic license or set of dynamic content rights (that is, in response to the state of the game) might include on or more of the following:
  • reporting the state of the game to a remote device either in response to an individual user or in response to an aggregate of a set of users, such as for example to determine a high score, a contest winner, or possible inappropriate activity (such as for example cheating at the game);
  • the dynamic license or set of dynamic content rights (that is, in response to the state of the game) might be completely detached from any aspect of the game itself.
  • the game only has control of what state it reports, not what is done with that information. This has the effect that the dynamic license or set of dynamic content rights might include one or more of the following:
  • New content 112 N might obtain rights that new content 112 N otherwise did not have, in response to the state of original content 112 C, such as for example rights for the new content 112 N to be initiated, launched, or started.
  • the content server 110 and the license server 140 actually be separate devices.
  • the content server 110 and the license server 140 might be co-hosted at the same device, which device would serve both the function of the content server 110 and the function of the license server 140 .
  • the content server 110 and the license server 140 might be co-hosted at the same device, which device would serve both the function of the content server 110 and the function of the license server 140 .
  • Each license 142 includes a data structure that might represent a static or “unconditional” license, that is, a license that does not depend on any state of the content, or a dynamic or “conditional” license, that is, a license that might be responsive to the state of the content, with the effect of providing distinct rights in response to distinct states.
  • a conditional license includes a data structure including an “IF-THEN,” construct including (1) an “IF” condition which when satisfied releases the rights described in the “THEN” portion, and (2) a “THEN” portion, which describes a set of rights conditional on the “IF” portion. This has the effect that the rights described in the “THEN” portion are conditional on whether the triggering conditions described in the “IF” portion have occurred.
  • a first choice of alternative embodiments includes whether the “IF” condition is to be evaluated substantially locally (that is, at the secure processor 130 ) or whether the “IF” condition is to be evaluated substantially remotely (that is, at one or more license servers 140 ).
  • the “IF” condition might include a description of one or more content elements to which the conditional license is responsive.
  • the “IF” condition might include a set of. instructions capable of being executed (such as for example machine code) or interpreted (such as for example a scripting language) by the secure processor 130 , or another processor with access to the state of the content, a result of those instructions providing a yes/no answer to whether the “IF” condition is satisfied.
  • an “IF” condition might be a function of a saved state of a game, during or after execution, digitally signed using a cryptographically-strong cipher.
  • the “IF” condition might include a description of one or more license servers 140 to which the conditional license is responsive.
  • the “IF” condition might include either a command or request or program entry point at a selected license server 140 , to be called upon or invoked or requested, a result of which call or invocation or request providing a yes/no answer to whether the “IF” condition is satisfied.
  • a second choice of alternatives includes whether the “THEN” portion is to be maintained substantially locally (that is, stored at the secure processor 130 ) or whether the “THEN” portion is to be maintained substantially remotely (that is, generated by the license server 140 ).
  • the “THEN” condition might include a description of a set of rights available to the user for the content whose license is being evaluated, in response to the “IF” condition is or was satisfied.
  • the “THEN” portion might include a description of one or more license servers 140 at which the “THEN” portion was or will be generated.
  • the “THEN” portion might include either a command or request or program entry point at a selected license server 140 , to be called upon or invoked or requested, a result of which call or invocation or request providing a description of a set of rights available to the user in response to whether the “IF” condition is or was satisfied.
  • conditional licenses might be coupled in series, with the effect that the “THEN” portion of a the “IF-THEN” data structure of a first conditional license might itself include a second conditional license, that is, a second “IF-THEN” data structure, with the effect that the second conditional license includes rights that are conditional upon the first conditional license, and upon further conditions.
  • conditional licenses might be coupled in parallel, with the effect that a license might include both an unconditional part (for which the user obtains those rights unconditionally) and a conditional part (for which the user obtains the associated rights only upon satisfaction of the stated condition.
  • new content 112 for which the user does not have a license 142 might be present at the secure processor 130 , either by prearrangement or by dynamic delivery in response to the conditional license 142 .
  • the secure processor 130 prevents access to the new content 112 until there is an effective set of rights available from a license 142 .
  • a conditional license 142 is triggered, with the effect that the rights it describes (or obtains from a license server 140 ) allow access to the new content 112 , the secure processor 130 then allows access to that new content 112 .
  • the license 142 or the rights described by that license 142 might be represented by a data structure maintained in storage.
  • the storage might be secure storage (such as for example included with the secure processor 130 , such as a chip) or might be otherwise non-secure storage (such as for example RAM or disk storage), but digitally signed or encrypted by the secure processor 130 (or digitally signed or encrypted by the license server 140 ), with the effect that the license 142 or other content rights cannot be easily modified or read without approval by the secure processor 130 .
  • the rights conferred by the license 142 might be dynamically updated themselves, with the approval of the secure processor 130 , or might represent a dynamic determination of rights by a license server 140 , as described above.
  • each license 142 maintained at the license server 140 includes an individual set of content 112 and an individual secure playback device 130 , and is maintained in a digitally signed form, with the effect that the license 142 cannot easily be modified.
  • each license 142 might be specific to a designated set of secure playback devices 130 , such as for example a set of secure playback devices 130 belonging to a common owner, located at a common place, or having a common configuration type.
  • Each license 142 includes information sufficient to decrypt the content 112 and verify that that content 112 is authentic, and possibly other data regarding how the content is protected or how the secure playback device 130 is allowed to use the content 112 .
  • each license 142 includes a recipient UID (unique identifier) for the secure playback device 130 to which it is directed, the content key 113 CK, one or more secure hash values SH, which the secure playback device 130 can use to verify the authenticity of the content 112 , and a cryptographically secure signature identifying the source of the license 142 .
  • a recipient UID unique identifier
  • SH secure hash values
  • rights to content 112 can be altered in response to a function of the state of a selected content element 112 , such as for example a game score, a time played, or other value, such as another characteristic of player success in a game.
  • the secure processor 130 prevents any changes to the state of the selected content element 112 , with the effect that cheating on the original game to obtain rights for new content 112 is prevented.
  • the conditional rights have the effect of being a bonus or reward available to those players who reach that designated level of player success.
  • Each license 142 also might represent a “limited” license, that is, a license for which rights are limited in one or more selected ways, such as for example time-limited or play-limited, or an “unlimited” license, that is, a license for which rights are substantially unlimited, such as for example permanent rights to use a game, as might occur in the case of a traditional purchase of physical media including embedded content with permanent rights.
  • a “limited” license that is, a license for which rights are limited in one or more selected ways, such as for example time-limited or play-limited
  • an “unlimited” license that is, a license for which rights are substantially unlimited, such as for example permanent rights to use a game, as might occur in the case of a traditional purchase of physical media including embedded content with permanent rights.
  • Limited licenses are limitations on rights as a function of actual time of execution, or number of launches of the game. These rights are securely enforced by the secure processor and are a function of that particular content. Thus, for some examples, a limited license might be limited by time (either time duration of play, time duration of when the content is available to the user, or otherwise), or might be limited by number of plays (either number of times the game is started, or otherwise). In these examples, operation of the game has an effect on whether the condition is satisfied for the license to allow the user rights. The operation of the game has an effect that would be similar across nearly all games, such as time played or number of times started.
  • a limited license might provide a parameter which limits or prevents execution of the game, or a portion thereof, such as for example a parental control parameter.
  • the game might read the parental control parameter and present alternative gameplay scenarios to the user (such as refusing to allow access to “adult” content when the parental control parameter so specifies).
  • a combination of static and unlimited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 is purchased to obtain access to that content 112 , and when that license 142 is purchased, the user has unlimited rights to use that content 112 .
  • a combination of static and limited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 is time limited (such as for example a “free trial” for that content 112 , or when purchased, such as for example rental of that content 112 for a limited duration of time) or play limited (also such as for example a “free trial” for that content 112 , or when purchased, such as for example rental of that content 112 for a limited number of executions).
  • time limited such as for example a “free trial” for that content 112 , or when purchased, such as for example rental of that content 112 for a limited duration of time
  • play limited also such as for example a “free trial” for that content 112 , or when purchased, such as for example rental of that content 112 for a limited number of executions.
  • a combination of dynamic and unlimited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 is dynamically enabled in response, to a state of another game (such as for example a “bonus game” when the user reaches a selected achievement level in another game), and other concepts described herein.
  • a combination of dynamic and limited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 dynamically enables, in response to a state of the game, dynamically enables limited rights to another game, for example, a bonus trial, or dynamically limits execution of another game, for example, as in parental control, or dynamically limits execution of a game in which a license 142 to content 112 is limited to selected times of day.
  • FIGS. 2 a and 2 b show a process flow diagram of a method of operating the system including dynamic assignment of rights to content in a closed distribution system.
  • the flow points and steps of the method 200 can be performed by separate elements in conjunction or in parallel, whether asynchronously or synchronously, in a pipelined manner, or otherwise. There is no particular requirement that the method 200 must be performed in the same order in which this description lists flow points or steps, except where explicitly so indicated.
  • the license server 140 is ready to deliver one or more conditional licenses 142 to one or more secure processors 130 .
  • the license server 140 determines information for an individual conditional license 142 for a selected secure processor 130 , including an “IF” condition and a “THEN” portion of a data structure for that conditional license 142 .
  • the “IF” condition might be prepared to be executed substantially locally (that is, at the secure processor 130 ) or might be prepared to be executed substantially remotely (that is, at one or more license servers 140 ).
  • the “THEN” portion might be prepared to be maintained substantially locally (that is, stored at the secure processor 130 ) or might be prepared to be maintained substantially remotely (that is, generated at one or more license servers 140 ).
  • the license server 140 delivers the conditional license 142 to the secure processor 130 .
  • the license server 110 delivers this information to the secure playback device 130 using a secure infrastructure overlaid on the communication system 150 .
  • the system 100 has delivered one or more conditional licenses 142 to one or more secure playback devices 130 , and is now ready to perform another task.
  • the secure processor 130 is ready to use the content 112 .
  • the secure processor 130 retrieves the content 112 from storage it maintains substantially locally.
  • the storage might be substantially local storage on which the secure processor 130 maintains the content 112 , digitally signed and encrypted, with the effect that the content 112 is secure against prying and tampering.
  • the secure processor 130 determines if. the user has a license 142 effective to permit the user to execute or present the content 112 . If the user has a license 142 effective to permit the user to execute or present the content 112 , the secure processor 130 allows that operation to proceed, and the method 200 continues with the flow point 220 B. If the user has a conditional license 142 with a “THEN” portion effective to permit the user to execute or present the content 112 , the method 200 proceeds with the next step.
  • the secure processor 130 determines if the “IF” condition for the conditional license 142 is satisfied.
  • the secure processor 130 proceeds to execute or interpret the “IF” condition and determine a yes/no answer regarding whether the “IF” condition for the conditional license 142 is satisfied.
  • the secure processor 130 proceeds to make the associated call or invocation or request of a designated license server 140 , and retrieves from that license server 140 a yes/no answer regarding whether the “IF” condition for the conditional license 142 is satisfied.
  • the method 200 proceeds with the next step. If the “IF” condition is not satisfied, the secure processor 130 does not allow execution or presentation of the content 112 to proceed, and the method 200 continues with the flow point 220 B.
  • the secure processor 130 determines what rights are granted by the “THEN” portion of the conditional license 142 .
  • the secure processor 130 determines the rights granted by the “THEN” portion of the conditional license 142 .
  • the secure processor 130 proceeds to make the associated call or invocation or request of a designated license server 140 , and retrieves from that license server 140 a description of a set of rights granted by the “THEN” portion of the conditional license 142 .
  • the method 200 proceeds with the step 222 , at which the secure processor 130 examines the rights granted by the “THEN” portion of the conditional license 142 . As described above, the rights might themselves be conditional. If so, it might occur that the method 200 performs the steps 222 , 223 and 224 repeatedly until rights associated with all satisfied “IF” conditions have been examined.
  • the method 200 proceeds with the step 225 , at which the secure processor 130 uses the content 112 , and with step 226 , at which the secure processor 130 records state.
  • the secure processor 130 is ready to use the content 112 .
  • the secure processor 130 may then use the content 112 and record the state of that content 112 (not shown).
  • the state might include a score, a high score, a time taken, a minimum time taken, or another data structure, such as for example some other measure of player success at a game.
  • the method 200 is ready to proceed with another task.
  • the content server 110 is ready to perform limited execution of an item of content 112 .
  • the secure processor 130 determines whether the limitation or execution is a time limitation or a limitation on the number of games.
  • the playback device 130 within a secure sub portion thereof, such as for example the secure processor, includes hardware and software elements which in combination provide abilities to start a game (or other content 112 ), stop a game, and measure the amount of execution time of a game.
  • the playback device 130 also within a secure sub portion thereof, such as for example the secure processor, includes hardware and software elements which in combination provide abilities to save and restore a limited execution rights of a game (or other content 112 ), and measure the a degree of consumption of the state of the game.
  • the playback device 130 might maintain the number of minutes of play for the specific content 112 , identified for the specific content 112 , in a secure memory (such as for example an internal flash memory within the secure sub-portion).
  • the playback device 130 might maintain that information in a memory external to the secure sub-portion, but digitally signed (and possibly encrypted) using a cryptographic technique, with the effect that the saved state of the game cannot be easily altered (and in some embodiments, cannot be easily read), by devices other than the playback device 130 .
  • a user of the playback device 130 requests a license 142 , specific to the specific playback device 130 , for a selected limited time duration.
  • the user presents an appropriate proof of purchase or other credit or entitlement to obtain the license 142 .
  • the license server 140 issues a limited license 142 , the limited license 142 including a description of the nature of the rights granted by that limited license 142 .
  • the description of the nature of the rights is encoded using a protocol known to both the playback device 130 and to the license server 140 .
  • the playback device 130 authenticates the license 142 using appropriate digital signature checking techniques, and prepares to initiate or launch the game (or other content 112 ).
  • the playback device 130 authenticates the description of the nature of the (limited) rights granted by the license 142 using appropriate digital signature checking techniques, and makes description available to the secure processor.
  • the playback device 130 retrieves the (saved) state of the consumption of the rights of the game (or other content 112 ). For example, it could retrieve the actual minutes of execution of the game.
  • the playback device 130 compares the limitations imposed by the license 142 , such as for example a time limitation, with information regarding the amount of consumption of the content 112 from the saved state of consumption the game (or other content 112 ). If the amount of consumption exceeds the allowed limit, the game is not permitted to launch (for example, the launch is aborted).
  • the limitations imposed by the license 142 such as for example a time limitation
  • the playback device 130 makes run-time comparisons from time to time regarding the limitations imposed by the license 142 , such as for example a time limitation, with information regarding the amount of consumption of the content 112 from the saved state of the game (or other content 112 ). If, at any of these run-time comparisons, the amount of consumption exceeds the allowed limit, the game (or other content 112 ) is aborted or halted.
  • the limitations imposed by the license 142 such as for example a time limitation
  • Run-time comparisons might be performed by one of at least two techniques.
  • the game makes periodic secure program calls to a secure set of code embodied in the secure processor, and using a secure timer in the processor accumulates the time consumption of the content being executed, with the effect that the secure processor can determine when the amount of consumption exceeds the limit.
  • the secure processor sets a secure timer interrupt from the game at the time of launch into a secure set of code embodied in the secure processor, similarly with the effect that the secure processor can determine when the amount of consumption exceeds the limit.
  • the secure processor may operate in a similar manner. In such embodiments, instead of the secure processor comparing an amount of time used against a selected time limit, the secure processor would compare a number of times launched against a selected limit on the number of launches.
  • the content server 110 has performed limited execution of an item of content 112 .
  • contests or games might be conducted, with the effect that one or more winners (as determined, for example, in response to relative scores or relative times taken) of the contest or game would receive an appropriate prize, such as for example: a bonus game, a set of bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, and the like.
  • an appropriate prize such as for example: a bonus game, a set of bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, and the like.
  • the contest or game might include one winner, or more than one winner, or one or more winners of more than one class of winners, and the like.
  • the contest or game might include a team of players whose joint score is responsive to the individual scores of the team members, such as a sum or median of those scores or a maximum one or more of those scores.
  • the original game, the bonus game, or both might include provisions for individual play, for joint play, or for cooperative play.
  • an entity not associated with the original author or distributor of the game might provide a contest (either with or without entry requirements), in which superior play of the original game is rewarded with an update to that game.
  • the update might or might not be created by the original author or distributor of the game, the entity conducting the contest, or otherwise.
  • the techniques described herein provide that games already available to the user in the closed system might be upgraded, such as by alteration or emendation, without any particular requirement of rewriting code for the original game, or for having access to that original code.
  • the game might be upgraded by providing a new program that checks the state of the old game, and makes changes in the behavior of the old game, either by directly interacting with the user, or by altering the state information of the old game (with the intercession of the security system), or some combination or conjunction thereof.
  • an entity not associated with the original author or distributor of the game might provide an updated, upgraded, modified, or otherwise different, version of the game, or a new “level” or other module for the game, without altering any of the original game code.
  • the new game might be created in response to status information maintained or provided by the old game, or the new game might call upon aspects of the old game (with the intercession of the security system) to provide a new game that is either different from, or an enhanced version of, the old game.
  • educational software might be altered or amended to provide for an appropriate prize or reward for successful learning, such as for example: a right to play a game program (either generically or limited to a selected period of time), a right to play bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, a next or another educational program “level” or other module for the educational program, a credit toward purchase of a new educational program, and the like.
  • a right to play a game program either generically or limited to a selected period of time
  • bonus “levels” or other modules for a game
  • cash prize a credit toward purchase of a new or upgraded game
  • next or another educational program “level” or other module for the educational program a credit toward purchase of a new educational program, and the like.
  • the techniques described herein provide for security checks before accessing critical or otherwise sensitive data, such as for example confidential business information, confidential personal information, confidential financial information, program code, trade secrets, and the like.
  • the techniques described herein provide for a chain (whether sequential or organized as a directed graph, with either conditional or unconditional transfers at each edge of that directed graph) events for the system to watch for, and in response thereto, take action on. For example, reaching a selected state in a first game program might provide the user with the right to play a second game, reaching a selected state in the second game program might provide the user with the right to play a third game, and the like.

Abstract

Dynamic assignment of rights to content, such as in a closed distribution system. Noting state information generated by an item of current content, and modifying state or rights of new content in response. Preloading or dynamically sending new content to the owner of the current content, with rights being enabled only at a later time, in the playback device, with predetermined conditions. In response to current state information, dynamically sending a license for new content from a server. Conditional or dynamic licenses to new content, including a set of rights associated with a class of possible sets of state information. Assignment of limited rights to a content, with support in a secure player to enforce them; for purposes of rental, bonus content, trials and other business models.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a Divisional of U.S. patent application Ser. No. 10/703,149 filed on Nov. 5, 2003, which is a CIP of U.S. patent application Ser. No. 10/360,827, filed on Feb. 7, 2003, both of which are incorporated by reference.
  • BACKGROUND OF THE APPLICATION
  • 1. Field of the Invention
  • The invention relates to assignment or modification of rights to content, such as for example in a closed-content distribution system, where those rights might be static or dynamic, and might be limited or permanent.
  • 2. Related Art
  • Closed-content distribution systems include end-to-end systems, including publishing servers, content distribution servers and playback devices, where the content that is playable on playback devices can be controlled through appropriate security techniques, and those security techniques make it relatively difficult for any unauthorized third party to distribute content that would be playable on the playback devices. In some closed-content distribution systems, it might be possible to distribute unauthorized content, but the playback devices are restricted to only use that content subject to rights granted by authorized licenses. In such systems, security techniques might be applied to make it relatively difficult for any unauthorized third party to distribute licenses granting rights to use that content.
  • In known computing systems, rights to use current content (even when the content itself has already been delivered) are made substantially impossible to modify, with the effect that additions or upgrades to those rights that current content involve either replacing that current content with new content, or distributing licenses including rights to that new content, and possibly techniques for revoking outdated licenses. Distributing such new licenses might involve substantial resources, including communication with a license server or computation by that license server to determine whether a license with new rights should be granted. It would be advantageous to be able to dynamically change the interpretation of licenses already available to the playback device, with the effect that those rights can be conditionally modified, even at a time well after the license was delivered to the user.
  • For one example, not intended to be limiting in any way, it would be advantageous to provide additional or upgraded game programs, or to provide new game programs, or to provide rights to use such additional or upgraded or new game programs, as an incentive to frequent or successful play of the current content. Other examples, also not intended to be limiting in any way, include cases where it is advantageous to provide additional or upgraded game programs, to provide new game programs, to provide rights to use such additional or upgraded or new game programs, or to provide other benefits, contingent on circumstances testable at the game device, or relatively local thereto, such as for example game state information when that state information is recorded by the current content. This would have the effect that rights to use current content could be effectively altered, modified, or otherwise added to, or even deleted or degraded in capability, without any code changes or media changes to that current content, and possibly without any intervention by a license server or similar device.
  • In known computing systems, if the current content maintains state information on externally modifiable storage, that state information might be altered or appended to by another program or individual, with the effect that a player might be able to deceive the current content (such as for example a game program). While it is possible for the current content to encrypt or digitally sign that state information, it often occurs that the current content was not created with this capability in mind, with the effect that providing this capability would involve adding to or modifying that current content. As noted in the incorporated disclosure (as further described below), it is often not desirable to redesign or re-author the current content to provide this capability.
  • In some known systems, a game device does record a set of state information, such as for example a high score or a set of users who have achieved high scores, for the purpose of creating ranking lists and for the purpose of providing an initiative to the users to achieve rankings. In some such systems, the game device might allow the user to continue play for a duration of time, or might allow the user access to selected new portions of the game, in response to whether that user has achieved a specific objective. However, in such systems, there is no substantial provision for the game device to dynamically modify rights to content (except for such extensions) or to dynamically provide rights to additional or upgraded or new content, across multiple sessions or using saved state information.
  • Accordingly, it would be advantageous to provide techniques with the effect that state information can be maintained on externally modifiable storage without the risk of a player being able to deceive the current content, and with the effect that rights can be dynamically altered to provide new or modified rights, in response to saved state information. In a closed-content distribution system, it would further be advantageous to provide techniques with the effect that a secondary program can use that game state information. That secondary program might be located logically relatively local to a secure processor used with the closed-content distribution system, or logically relatively distant from the secure processor. In a closed-content distribution system, it would further be advantageous to provide techniques with the effect that licenses can be dynamically reinterpreted (whether to add, modify, or remove rights) in response to that saved game state information.
  • Even in systems where rights might be static or dynamic, there is further advantage in being able to restrict the nature of the rights granted by the license. For one example, not intended to be limited in any way, at least one particular set of cases exists where it would be advantageous to make the rights granted by the license be limited in time, such as for example (1) by the amount of time the user is allowed to play the game, (2) by the number of times the user is allowed to play the game, or (3) by the duration of time during which the user is allowed to play the game. While these specific cases might be regarded as a special case of dynamic rights (that is, where the rights are dynamic in the sense that they are conditional on a measure of time), there is particular advantage to providing such limited rights, such as for example for testing, “free trials,” and rentals of application programs or games.
  • Accordingly, it would be advantageous to provide a technique involving either static or dynamic assignment of rights to content, and either limited or unlimited rights to content, such as for example in a closed distribution system.
  • SUMMARY
  • The invention provides methods and systems capable of assignment or modification of rights to content, such as for example in a closed-content distribution system, where those rights might be static or dynamic, and might be limited or permanent. For a first example, not intended to be limiting in any way, the invention provides methods and systems capable of either static interpretation or dynamic reinterpretation or updating of licenses to provide new or modified rights to content, and either static assignment or dynamic assignment of rights to content, such as for example in a closed distribution system. For a second example, not intended to be limiting in any way, the invention provides methods and systems capable of either limited assignment or unlimited assignment of rights to content, such as for example limited rights that are governed by time limitations or otherwise limited for a marketing purpose, and such as for example unlimited rights, such as for example might be traditionally conferred by purchase of permanent license for content.
  • In a first aspect, the invention provides methods and systems capable of noting state information generated by an item of current content, and capable of providing new rights to content or new content (with the effect of adding to or updating the current content) in response thereto. In one embodiment, electronic or physical media might dynamically send new rights to content or new content to the owner of the current content, or that new content might be pre-loaded and available at the recipient device in response to new rights to that content. In response to the state information generated by an item of current content, the license server might dynamically send a license to the new content, either in response to a selected actual value of that state information or in response to a selected changed value therein.
  • In a second aspect, the invention provides methods and systems including conditional or dynamic licenses to new content. In one embodiment, a conditional license to new content includes a set of rights to content, those rights being associated with a class of possible sets of state information generated by an item of current content. For a first example, not intended to be limiting in any way, the user might obtain a set of current content C, a set of new content N, and a conditional license L, where the conditional license L provides:
  • License for C
  • IF (always) THEN (rights to use C)
  • License for N
  • IF (on state information including S) THEN (rights to use N)
  • In this example, the “state information including S” is emitted or otherwise generated by C and the “rights to use N” are, but need not be, in addition to the already extant rights to use C.
  • Similarly, for a second example, not intended to be limiting in any way, the user might obtain a set of current content C, a set of new content N, and a dynamic license L, where the dynamic license L provides:
  • Limited License for C
  • IF (time t<t0) THEN (rights to use C)
  • Conditional License for N
  • IF ((on state information including S) or (time t>t0)) THEN (rights to use N)
  • Similarly, in this example, the “state information including S” is emitted or otherwise generated by C and the “rights to use N” are, but need not be, instead of the already rights to use C (those rights to use C expire at t=t0),
  • In these aspects of the invention, a “license” or other content rights, associated with selected content, might be represented by a data structure maintained in storage. The storage might be secure storage (such as for example included with a secure hardware device, such as a chip) or might be otherwise non-secure storage (such as for example RAM or disk storage), but digitally signed or encrypted by a security system, with the effect that the license or other content rights cannot be easily modified or read without approval by the security system. The content rights might be dynamically updated themselves, with the approval of the security system, or might represent a dynamic determination of content rights, as described above, such as in an “IF-THEN” format, where the “IF” part represents a conditional trigger for additional or modified rights, and where the “THEN” part represents the additional or modified rights. This has the effect that content rights are effectively a function of the state of a selected content element, such as for example a game score, a time played, or other value. The security system prevents any changes to the state of the selected content element, with the effect that cheating on the original game is prevented.
  • In a third aspect, the invention provides methods and systems including limited assignment of rights to content, such as for example limited rights that are governed by time limitations or otherwise limited for a marketing purpose. For some examples, the rights might be limited by the amount of time the user is allowed to play the game, as measured by actual time of execution of the game by the secure processor, as measured by the number of times the user is starts the game as recorded by the secure processor, or by the duration of time during which the user is allowed to play the game as measured by the secure processor. These particular limited sets of rights have the advantage of being well suited to games testing, “free trials,” and rentals of application programs or games. The invention also provides methods and systems including unlimited assignment of rights to content, such as for example might be traditionally conferred by purchase of underlying media including unencrypted content.
  • In a first embodiment, a dynamic license or a set of dynamic content rights might be represented within a data structure including a set of instructions (such as for example a set of machine code instructions, a pointer to a set of machine code instructions, a set of scripting language instructions, a pointer to a set of scripting language instructions, or other representation of the conditional “IF-THEN” nature of the dynamic rights). When the rights are to be reviewed to determine if the user has dynamic rights, the instructions are parsed (if necessary) and performed (either by execution, interpretation, emulation, or otherwise) by a secure processor. Any other techniques that are responsive to the state of selected content, and provide a descriptor of a set of enforceable rights, would be within the scope and spirit of the invention. After reading this application, those of ordinary skill in the art would recognize that these other techniques would be workable, and would not require either undue experimentation or further invention.
  • In a second embodiment, a dynamic license or a set of dynamic content rights might be represented by allowing an issuer of that dynamic license to read the state of the selected content, and to dynamically issue a license in response to that state. This has the effect that the issuer of the dynamic license would be allowed to read that state, and would be allowed to determine in real time whether or not to issue an appropriate license. One advantage of this second embodiment is that the playback device need not implement any such dynamic assignment rules in advance, and that the issuer of the dynamic license would be able to change its dynamic rules for issuing a license at an appropriate time. For example the issuer of the dynamic license need not revoke the earlier dynamic license or issue a new dynamic license, and need not tell the playback device what the issuers' intended rules are for issuing the dynamic license.
  • In one embodiment, a dynamic license or a set of dynamic content rights might be represented by allowing a set of security software to dynamically alter interpretation of a license, or the rights granted therein, under control and supervision of a secure processor.
  • For a first example, not intended to be limiting in any way, a first content element C1 might emit a state S, with the effect of altering or modifying rights to the content C2 such that its conditions to launch are met and it can be executed.
  • For a second example, not intended to be limiting in any way, a first content element C1 might provide an incentive for a user to execute a second content element C2, by providing that second content element C2 with the ability to alter or modify the state of the content C1 (such as for example by adding bonus points to the score for C1, or otherwise marking as achieved a goal within the context of C1). This second example is not necessarily preferred.
  • After reading this application, those skilled in the art would recognize that the techniques described herein provide an enabling technology, with the effect that heretofore advantageous features can be provided that heretofore were substantially infeasible.
  • For example, not intended to be limiting in any way, the techniques described herein provide that contests or games might be conducted, with the effect that one or more winners (as determined, for example, in response to relative scores or relative times taken) of the contest or game would receive an appropriate prize, such as for example: a bonus game, a set of bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, and the like. In various embodiments, the contest or game might include one winner, or more than one winner, or one or more winners of more than one class of winners, and the like. In various embodiments, the contest or game might include a team of players whose joint score is responsive to the individual scores of the team members, such as a sum or median of those scores or a maximum one or more of those scores. In various embodiments, the original game, the bonus game, or both, might include provisions for individual play, for joint play, or for cooperative play. For example, not intended to be limiting in any way, an entity not associated with the original author or distributor of the game might provide a contest (either with or without entry requirements), in which superior play of the original game is rewarded with an update to that game, or with an update to rights to use that game. The update might or might not be created by the original author or distributor of the game, the entity conducting the contest, or otherwise. (However, after reading this application, those skilled in the art would recognize that the nature of the closed-content distribution system would generally prevent external entities from providing authentic updates to content elements.)
  • For example, not intended to be limiting in any way, the techniques described herein provide that games already available to the user in the closed system might appear to be upgraded, such as by alteration or emendation, without any particular requirement of rewriting code for the original game, or for having access to that original code. In various embodiments, the game might be upgraded by providing a new program that checks the state of the old game, and makes changes in the behavior of the old game, either by directly interacting with the user, or by altering the state information of the old game (with the intercession of the security system), or some combination or conjunction thereof.
  • For example, not intended to be limiting in any way, the techniques described herein provide that educational software might be altered or emended to provide for an appropriate prize or reward for successful learning such as for example: a right to play a game program (either generically or limited to a selected period of time), a right to play bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, a next or another educational program “level” or other module for the educational program, a credit toward purchase of a new educational program, and the like.
  • For example, not intended to be limiting in any way, the techniques described herein provide that educational software might have the ability to, in response to completion of a first educational program or in response to achievement of a selected level of achievement (such as a successful grade on a test), provide access to a second educational program or test material (or to a next level of the same educational program or test material).
  • For example, not intended to be limiting in any way, the techniques described herein provide for security checks before accessing critical or otherwise sensitive data, such as for example confidential business information, confidential personal information, confidential financial information, program code, trade secrets, and the like.
  • For example, not intended to be limiting in any way, the techniques described herein provide for a chain (whether sequential or organized as a directed graph, with either conditional or unconditional transfers at each edge of that directed graph) events for the system to watch for, and in response thereto, take action on. For example, reaching a selected state in a first game program might provide the user with the right to play a second game, reaching a selected state in the second game program might provide the user with the right to play a third game, and the like. After reading this application, those skilled in the art would recognize that such a chain might form a complex logical structure, such as a tree structure, a directed acyclic graph, or a directed graph including at least one closed loop.
  • For example, not intended to be limiting in any way, the techniques described herein provide for limited assignment of rights to content, such as for example limited rights that are governed by time limitations or otherwise limited for a marketing purpose. For some examples, the rights might be limited by the amount of time the user is allowed to play the game, by the number of times the user is allowed to play the game, or by the duration of time during which the user is allowed to play the game. These particular limited sets of rights have the advantage of being well suited to games testing, “free trials,” and rentals of application programs or games.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows a block diagram of a system including dynamic assignment of rights to content in a closed distribution system.
  • FIGS. 2 a and 2 b show a process flow diagram of a method of operating the system including dynamic assignment of rights to content in a closed distribution system.
  • DETAILED DESCRIPTION
  • In the description herein, a preferred embodiment of the invention is described, including preferred process steps and data structures. Those skilled in the art would realize, after perusal of this application, that embodiments of the invention might be implemented using a variety of other techniques not specifically described, without undue experimentation or further invention, and that such other techniques would be within the scope and spirit of the invention.
  • Lexicography
  • The following terms relate or refer to aspects of the invention or its embodiments. The general meaning of each of these terms is intended to be illustrative and in no way limiting.
  • The phrases “content server” or “content distribution server” generally describe, in the distribution system, any device capable of delivering content (either directly or indirectly), to a secure processor or secure playback device, using any form of transport technique. As described below, the content distribution server needs only a single copy of each content element, and might deliver multiple individualized copies of that content element in response to distinct users or in response to distinct requests. The concept of a content server is broad, and includes not only a server having content stored thereon, but also devices by which content might be dynamically created, such as a television camera, video camera, webcam, any reasonable generalization thereof, and the like. The content server may include a secure device capable of generating a secure hash and securely signing any information distributed from the server.
  • The phrase “license server” generally describes, in the distribution system, any device capable of delivering licenses for content. As described below, the license server includes in the license it emits at least (1) a decryption key for the content, that decryption key being encrypted by a private key for the specific playback device, and (2) a digital signature or secure hash value that can be used to verify authenticity of the license, and optionally, (3) a digital signature or secure hash value that can be used to verify authenticity of the content. In one embodiment the license server includes an online transaction server capable of requesting an identity of the device requesting the license and capable of creating, in response, a cryptographically signed data structure containing information specifying a device identity, a content identity and a set of content decryption keys.
  • The phrases “secure processor” and “secure playback device” generally describe the devices on which the content will be executed or interpreted (for code or instructions) or by which the content will be displayed or presented (for media content). As described below, the secure processor is relatively secure against tampering, and includes at least a UID (unique identifier) or a known encryption key (such as for example a private key in a public-key cryptosystem), with the effect that other elements of the system are capable of communicating privately and securely with the secure processor. The concept of a secure processor is broad, and includes any general purpose or special purpose computing device for which there is at least some secure memory, secured against inspection or intrusion from outside the secure processor, and for which there is at least some executive control capable of preventing application software from disclosing the contents of that secure memory. In one embodiment, the secure processor has built in security software that cannot readily be circumvented, or other techniques to securely bootstrap the loading of such security software from insecure devices, such as for example external mass storage. In such embodiments, the secure playback device can include a playback device capable of presenting information, under control of the secure processor, to a user, such as for example a game-player or student.
  • The term “content” or the phrase “content element” generally describe an application program (such as for example a game program) or a set of media content (such as for example an animation clip or a video clip) to be executed or interpreted (for code or instructions) or to be displayed or presented (for media content). As described below, the content might include application software, audio/video presentations, databases, educational programs, games or educational games, multimedia content, teaching materials, reasonable combinations or generations thereof, and the like.
  • The phrases “content state” or “state of the content element” generally describe a set of information generated in response to a state of the content, such as for example related to the state of progress through a game, such as for example a data structure including values the content saves in persistent storage, either for deliberate publication to possible readers thereof, or to record for itself its own state for later recovery if need be. As described below, the content state might represent progress of a player in a game, such as a score value or a time taken value. The secure processor might (1) encrypt the content state, with the effect that it can only be read by authorized readers, (2) digitally sign the content state, with the effect that it cannot be altered without detection by the content element, or (3) both, with the effect that the content state might be maintained on persistent storage outside the secure processor.
  • The term “license” generally describes information sufficient for the secure playback device use the content subject to the rights granted by the license, and possibly to authenticate the content. In one embodiment, each license includes a data structure associated with one or more content elements, and including, in one embodiment, (1) an encrypted key for that content, with the effect that the secure processor can access the content if it has access to the license, and (2) a digital signature or secure hash value, with the effect that the license cannot be easily altered and remain effective. As described below, the license also includes a description of those rights the license grants to the licensee with regard to the content. In one embodiment, licenses are individually tailored to each individual authorized recipient or user, and to each individual secure playback device for which that recipient or user is authorized, although in the context of the invention there is no such particular requirement.
  • The term “rights” and the phrases “content rights” or “rights to the content” generally describe what actions the secure processor is allowed to take with regard to the content. For some examples, not intended to be limiting in any way, the rights might include a number of times the secure processor is allowed to execute the content, an amount of total running time the secure processor is allowed to execute the content, an amount of wall-clock time the secure processor is allowed to execute the content, and the like. As described below, the secure processor prevents any use of the content outside those specified by the content rights. As described below, rights might be “static” or “dynamic,” and might be “limited” or “unlimited.”
  • The terms “static” and “dynamic,” in the context of rights granted (by a license) to content, generally describe whether the rights are unconditional or static (in the sense that they do not change in response to the state of an application program or state of a game) or whether the rights are conditional or dynamic (in the sense that they might be altered, added to, or subtracted from, in response to the state of an application program or state of a game).
  • The terms “limited” and “unlimited,” in the context of rights granted (by a license) to content, generally describe whether the rights are limited in one or more selected ways, such as for example time limited or play limited, or whether the rights are substantially unlimited, such as for example in the case of a traditional purchase of a permanent license for a game for that specific user or for that specific playback device.
  • The scope and spirit of the invention is not limited to any of these definitions, or to specific examples mentioned therein, but is intended to include the most general concepts embodied by these and other terms.
  • System Elements
  • FIG. 1 shows a block diagram of a system including dynamic assignment of rights to content in a closed distribution system.
  • A system 1 includes a content server 110, a secure playback device 130, a license server 140, and a communication system 150.
  • The content server 110 includes any device or system capable of delivering content 112 to the secure playback device 130, directly or indirectly. In one embodiment, the content server 110 might include a server device capable of receiving requests for content 112 from the secure playback device 130, and responding to those requests by sending content 112 using the communication system 150. However, in the context of the invention, there is no particular requirement that the content server 110 receives explicit requests for content 112 from the secure playback device 130. For example, not intended to be limiting in any way, the content server 110 might deliver the content package 111 including content 112 to the secure playback device 130, in accordance with request for a subscription to that content 112, a request from a device other than the secure playback device 130, an original request from the secure playback device 130 or another device for the content 112 and any updates thereto, reasonable generalizations thereof, and the like.
  • In the context of the invention, it is possible that the secure playback device 130 can have access to the content 112 without being able to use that content 112, such as for example if a license 142 (as further described below) is required to authenticate or decrypt the content 112. In one embodiment, the secure playback device 130 might receive many elements of content 112, but not receive licenses 142 until a user presents proof of purchase of such a license 142. In the latter event, the secure playback device 130 would obtain a license 142 from the license server 140, either directly in response to the proof of purchase, or indirectly by the user entering information from the license 142, obtained from the license server in response to the proof of purchase.
  • The license server 140 includes any device or system capable of delivering a license 142 to the secure playback device 130, directly or indirectly. In one embodiment, the license server 140 might include a device similar to the content server 110. However, in the context of the invention, there is no particular requirement that content server 110 and the license server 140 operate in the same or a similar manner. For example, not intended to be limiting in any way, the content server 110 might deliver the content 112 in a first manner, while the license server 140 delivers the license 142 in a second manner.
  • After reading this application, those skilled in the art will recognize that in the context of the invention, there is no particular requirement that the content 112 or the license 142 be embodied in any particular format. For a first example, not intended to be limiting in any way, any one of these elements might be represented by one or more messages in an underlying communication transport protocol. For a second example, not intended to be limiting in any way, any one of these elements might be represented by inclusion or incorporation into a set of messages for collectively transporting multiple such elements. Those skilled in the art would recognize, after perusal of this application, that in the context of the invention, there is no particular requirement that the transport protocol need be either of these specific protocols, but might include other and further protocols, combinations of transport techniques, or significant variants thereof.
  • The communication system 150 includes any device or system, or technique, capable of delivering information (such as for example the content package 111) among the elements of the system 100. In one embodiment, the communication system 150 includes a communication network, such as for example an Internet, intranet, extranet, VPN, LAN, WAN, enterprise network, private or public switched network, or broadcasting system, capable of electronic communication of the content package 111 including the content 112. However, in the context of the invention, there is no particular requirement that the communication system 150 operates electronically, either in whole or in part. For example, not intended to be limiting in any way, the communication system 150 might include (at least in part) transport of physical media on which the content package 111 including the content 112 is encoded, such as for example a CD-ROM, rewritable CD, DVD, floppy disk, detachable hard disk drive, magnetic tape, paper tape, bar-coded package, or any other media capable of being sensed and interpreted by the secure playback device 130.
  • The secure playback device 130 includes a computing device capable of performing the tasks described herein, including receiving the content 112 directly or indirectly from the content server 110, and receiving the license 142 directly or indirectly from the license server 140. In one embodiment, the secure playback device 130 includes a secure processor including a secure state and a monitored state as described in the incorporated disclosure, optionally augmented using at least one auxiliary device 131 and external storage 132, and with an application program such as a game program running in the monitored state. In one embodiment, the external storage 132 might include RAM (random access memory), mass storage devices (such as for example magnetic or optical disk drives), a removable storage device (such as for example a flash memory or PC card including a disk drive), or some combination thereof.
  • In one embodiment, the application program (such as a game program running in the monitored state) has a process operating on the secure processor, that process having access to the state of the game, and capable of performing actions to alter the state of the game. In such embodiments, the state of the game can be maintained in the external storage 132. The state of the game might then be copied for use by a second device, or sent to that second device, either physically such as by moving the media on which the external storage 132 is embodied, or electronically such as by communication over a network.
  • As described above, in a first embodiment, a dynamic license or a set of dynamic content rights might be represented within a data structure. The data structure might be maintained within the secure playback device 130 or in the external storage 132, with the effect that a secure processor associated with the secure playback device 130 is capable of parsing and enforcing those dynamic content rights.
  • As described above, in a second embodiment, a dynamic license or a set of dynamic content rights might be represented by allowing an issuer of that dynamic license to read the state of the selected content, and to dynamically alter or issue a license 142 in response to that state. The issuer of the dynamic license would be allowed to obtain the state of the game from the external storage 132, and to dynamically alter or issue a license 142 for an element of content 112.
  • As described above, in a third embodiment, an element of content 112, under control and supervision of a secure processor associated with the secure playback device 130, can modify the state of the game by writing to the external storage 132. In such embodiments, either in combination with the first embodiment or the second embodiment described above, the element of content 112 can have the effect of providing a dynamic license or a set of dynamic content rights.
  • For a first example, not intended to be limiting in any way, a first content element C1 might emit a state S with the effect of altering or modifying rights to the content C2 such that its conditions for launch are execution are met as a result of state S.
  • For a second example, not intended to be limiting in any way, a first content element C1 might provide an incentive for a user to execute a second content element C2, by providing that second content element C2 with the ability to alter or modify the state of the content C1 (such as for example by adding bonus points to the score for C1, or otherwise marking as achieved a goal within the context of C1). This second example is not necessarily preferred.
  • In each of these described embodiments, this has the effect that a dynamic license or a set of dynamic content rights can provide the user with rights to a second element of content 112, in response to the state of the game for a first element of content 112. After reading this application, those skilled in the art would recognize that this is similar to a directed graph, where nodes of the direct graph represent sets of content rights and edges of the directed graph represent dynamic changes to those sets of content rights.
  • The state of the game might be in response to a result from an individual user, such as for example a raw score, a timed score, or some combination thereof. The state of the game might also or alternatively be in response to an aggregate result, such as for example a total, a maximum or minimum of some calculated value, or some combination thereof. The aggregate might be applied to a set of results from an individual user, or to a set of results from more than one such user.
  • The dynamic license or set of dynamic content rights (that is, in response to the state of the game) might include on or more of the following:
  • gaining/losing rights to other games or to extensions of the same game;
  • gaining/losing some other valuable thing, such as real money, game money, or entrance into a contest or club relating to the game;
  • reporting the state of the game to a remote device, either in response to an individual user or in response to an aggregate of a set of users, such as for example to determine a high score, a contest winner, or possible inappropriate activity (such as for example cheating at the game);
  • conducting a commercial transaction with a user, such as for example selling the user another element of content 112 (such as for example a game, or such as for example an extension of the same game).
  • The dynamic license or set of dynamic content rights (that is, in response to the state of the game) might be completely detached from any aspect of the game itself. The game only has control of what state it reports, not what is done with that information. This has the effect that the dynamic license or set of dynamic content rights might include one or more of the following:
  • New content 112 N might obtain rights that new content 112 N otherwise did not have, in response to the state of original content 112 C, such as for example rights for the new content 112 N to be initiated, launched, or started.
  • After reading this application, those skilled in the art will recognize that in the context of the invention, there is no particular requirement that the content server 110 and the license server 140 actually be separate devices. For one example, not intended to be limiting in any way, the content server 110 and the license server 140 might be co-hosted at the same device, which device would serve both the function of the content server 110 and the function of the license server 140. After reading this application, those skilled in the art will recognize that other and further variants of these ideas are within the scope and spirit of the invention, and would be workable without undue experimentation or further invention.
  • License Elements (Static or Dynamic)
  • Each license 142 includes a data structure that might represent a static or “unconditional” license, that is, a license that does not depend on any state of the content, or a dynamic or “conditional” license, that is, a license that might be responsive to the state of the content, with the effect of providing distinct rights in response to distinct states. In one embodiment, a conditional license includes a data structure including an “IF-THEN,” construct including (1) an “IF” condition which when satisfied releases the rights described in the “THEN” portion, and (2) a “THEN” portion, which describes a set of rights conditional on the “IF” portion. This has the effect that the rights described in the “THEN” portion are conditional on whether the triggering conditions described in the “IF” portion have occurred.
  • A first choice of alternative embodiments includes whether the “IF” condition is to be evaluated substantially locally (that is, at the secure processor 130) or whether the “IF” condition is to be evaluated substantially remotely (that is, at one or more license servers 140). Although each possibility is described separately herein, after reading this application those skilled in the art would recognize that combinations of these alternatives would be workable, are within the scope and spirit of the invention, and would not require undue experimentation or further invention.
  • In cases where the “IF” condition is evaluated substantially locally, the “IF” condition might include a description of one or more content elements to which the conditional license is responsive. Similarly, in such cases, the “IF” condition might include a set of. instructions capable of being executed (such as for example machine code) or interpreted (such as for example a scripting language) by the secure processor 130, or another processor with access to the state of the content, a result of those instructions providing a yes/no answer to whether the “IF” condition is satisfied. In one embodiment, an “IF” condition might be a function of a saved state of a game, during or after execution, digitally signed using a cryptographically-strong cipher.
  • After reading this application, those skilled in the art would recognize that such “IF” and “THEN” conditions might themselves be global in nature, or might have their context restricted in response to specific content elements, to specific content states, to specific users, or otherwise in response to selected tests performable at times when those “IF” and “THEN” conditions are evaluated. Moreover, those skilled in the art would recognize that such “IF” and “THEN” conditions might have specific date, location, or time restrictions, or other restrictions such as the nature of the hardware or software (such as a software version number) of the secure processor or the playback device. Those skilled in the art would recognize that such possibilities are within the scope and spirit of the invention, and could readily be implemented with reference to this application, without undue experimentation or further invention.
  • In cases where the “IF” condition is evaluated substantially remotely, the “IF” condition might include a description of one or more license servers 140 to which the conditional license is responsive. Similarly, in this second embodiment, the “IF” condition might include either a command or request or program entry point at a selected license server 140, to be called upon or invoked or requested, a result of which call or invocation or request providing a yes/no answer to whether the “IF” condition is satisfied.
  • A second choice of alternatives includes whether the “THEN” portion is to be maintained substantially locally (that is, stored at the secure processor 130) or whether the “THEN” portion is to be maintained substantially remotely (that is, generated by the license server 140). Although each possibility is described separately herein, after reading this application those skilled in the art would recognize that combinations of these alternatives would be workable, are within the scope and spirit of the invention, and would not require undue experimentation or further invention.
  • In cases where the “THEN” portion is maintained substantially locally, the “THEN” condition might include a description of a set of rights available to the user for the content whose license is being evaluated, in response to the “IF” condition is or was satisfied.
  • In cases where the “THEN” portion is maintained substantially remotely, the “THEN” portion might include a description of one or more license servers 140 at which the “THEN” portion was or will be generated. Similarly, in this second embodiment, the “THEN” portion might include either a command or request or program entry point at a selected license server 140, to be called upon or invoked or requested, a result of which call or invocation or request providing a description of a set of rights available to the user in response to whether the “IF” condition is or was satisfied.
  • After reading this application, those skilled in the art would recognize that conditional licenses might be coupled in series, with the effect that the “THEN” portion of a the “IF-THEN” data structure of a first conditional license might itself include a second conditional license, that is, a second “IF-THEN” data structure, with the effect that the second conditional license includes rights that are conditional upon the first conditional license, and upon further conditions.
  • Similarly, after reading this application, those skilled in the art would recognize that conditional licenses might be coupled in parallel, with the effect that a license might include both an unconditional part (for which the user obtains those rights unconditionally) and a conditional part (for which the user obtains the associated rights only upon satisfaction of the stated condition.
  • This has the effect that, in one embodiment, new content 112 for which the user does not have a license 142 might be present at the secure processor 130, either by prearrangement or by dynamic delivery in response to the conditional license 142. In either such case, when that new content 112 is available at the secure processor 130, the secure processor 130 prevents access to the new content 112 until there is an effective set of rights available from a license 142. When a conditional license 142 is triggered, with the effect that the rights it describes (or obtains from a license server 140) allow access to the new content 112, the secure processor 130 then allows access to that new content 112.
  • The license 142 or the rights described by that license 142 might be represented by a data structure maintained in storage. The storage might be secure storage (such as for example included with the secure processor 130, such as a chip) or might be otherwise non-secure storage (such as for example RAM or disk storage), but digitally signed or encrypted by the secure processor 130 (or digitally signed or encrypted by the license server 140), with the effect that the license 142 or other content rights cannot be easily modified or read without approval by the secure processor 130. The rights conferred by the license 142 might be dynamically updated themselves, with the approval of the secure processor 130, or might represent a dynamic determination of rights by a license server 140, as described above.
  • In one embodiment, each license 142 maintained at the license server 140 includes an individual set of content 112 and an individual secure playback device 130, and is maintained in a digitally signed form, with the effect that the license 142 cannot easily be modified. In alternative embodiments, each license 142 might be specific to a designated set of secure playback devices 130, such as for example a set of secure playback devices 130 belonging to a common owner, located at a common place, or having a common configuration type. Each license 142 includes information sufficient to decrypt the content 112 and verify that that content 112 is authentic, and possibly other data regarding how the content is protected or how the secure playback device 130 is allowed to use the content 112. In one embodiment, each license 142 includes a recipient UID (unique identifier) for the secure playback device 130 to which it is directed, the content key 113 CK, one or more secure hash values SH, which the secure playback device 130 can use to verify the authenticity of the content 112, and a cryptographically secure signature identifying the source of the license 142.
  • This has the effect that rights to content 112 can be altered in response to a function of the state of a selected content element 112, such as for example a game score, a time played, or other value, such as another characteristic of player success in a game. The secure processor 130 prevents any changes to the state of the selected content element 112, with the effect that cheating on the original game to obtain rights for new content 112 is prevented. In cases where the content state is responsive to a characteristic player success in the game, the conditional rights have the effect of being a bonus or reward available to those players who reach that designated level of player success.
  • License Elements (Limited or Unlimited)
  • Each license 142 also might represent a “limited” license, that is, a license for which rights are limited in one or more selected ways, such as for example time-limited or play-limited, or an “unlimited” license, that is, a license for which rights are substantially unlimited, such as for example permanent rights to use a game, as might occur in the case of a traditional purchase of physical media including embedded content with permanent rights.
  • Limited licenses are limitations on rights as a function of actual time of execution, or number of launches of the game. These rights are securely enforced by the secure processor and are a function of that particular content. Thus, for some examples, a limited license might be limited by time (either time duration of play, time duration of when the content is available to the user, or otherwise), or might be limited by number of plays (either number of times the game is started, or otherwise). In these examples, operation of the game has an effect on whether the condition is satisfied for the license to allow the user rights. The operation of the game has an effect that would be similar across nearly all games, such as time played or number of times started.
  • In further examples, a limited license might provide a parameter which limits or prevents execution of the game, or a portion thereof, such as for example a parental control parameter. In such an example, the game might read the parental control parameter and present alternative gameplay scenarios to the user (such as refusing to allow access to “adult” content when the parental control parameter so specifies).
  • License Elements (Business Models)
  • The combination of static-or-dynamic and limited or unlimited allows the invention to provide methods and systems in which selected business models of behavior are followed. Some examples, not intended to be limiting in any way, are:
  • A combination of static and unlimited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 is purchased to obtain access to that content 112, and when that license 142 is purchased, the user has unlimited rights to use that content 112.
  • A combination of static and limited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 is time limited (such as for example a “free trial” for that content 112, or when purchased, such as for example rental of that content 112 for a limited duration of time) or play limited (also such as for example a “free trial” for that content 112, or when purchased, such as for example rental of that content 112 for a limited number of executions).
  • A combination of dynamic and unlimited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 is dynamically enabled in response, to a state of another game (such as for example a “bonus game” when the user reaches a selected achievement level in another game), and other concepts described herein.
  • A combination of dynamic and limited license parameters allows the invention to provide a rights-management scheme in which a license 142 to content 112 dynamically enables, in response to a state of the game, dynamically enables limited rights to another game, for example, a bonus trial, or dynamically limits execution of another game, for example, as in parental control, or dynamically limits execution of a game in which a license 142 to content 112 is limited to selected times of day.
  • Method of Operation
  • FIGS. 2 a and 2 b show a process flow diagram of a method of operating the system including dynamic assignment of rights to content in a closed distribution system.
  • Although described serially, the flow points and steps of the method 200 can be performed by separate elements in conjunction or in parallel, whether asynchronously or synchronously, in a pipelined manner, or otherwise. There is no particular requirement that the method 200 must be performed in the same order in which this description lists flow points or steps, except where explicitly so indicated.
  • Delivery of Conditional License
  • At a flow point 10A, the license server 140 is ready to deliver one or more conditional licenses 142 to one or more secure processors 130.
  • At a step 211, the license server 140 determines information for an individual conditional license 142 for a selected secure processor 130, including an “IF” condition and a “THEN” portion of a data structure for that conditional license 142.
  • As described above, the “IF” condition might be prepared to be executed substantially locally (that is, at the secure processor 130) or might be prepared to be executed substantially remotely (that is, at one or more license servers 140).
  • As described above, the “THEN” portion might be prepared to be maintained substantially locally (that is, stored at the secure processor 130) or might be prepared to be maintained substantially remotely (that is, generated at one or more license servers 140).
  • At a step 212, the license server 140 delivers the conditional license 142 to the secure processor 130. As part of this step, in one embodiment, the license server 110 delivers this information to the secure playback device 130 using a secure infrastructure overlaid on the communication system 150.
  • At a flow point 210B, the system 100 has delivered one or more conditional licenses 142 to one or more secure playback devices 130, and is now ready to perform another task.
  • Invoking Conditional Licenses
  • At a flow point 220A, the secure processor 130 is ready to use the content 112.
  • At a step 221, the secure processor 130 retrieves the content 112 from storage it maintains substantially locally. In one embodiment, the storage might be substantially local storage on which the secure processor 130 maintains the content 112, digitally signed and encrypted, with the effect that the content 112 is secure against prying and tampering.
  • At a step 222, the secure processor 130 determines if. the user has a license 142 effective to permit the user to execute or present the content 112. If the user has a license 142 effective to permit the user to execute or present the content 112, the secure processor 130 allows that operation to proceed, and the method 200 continues with the flow point 220B. If the user has a conditional license 142 with a “THEN” portion effective to permit the user to execute or present the content 112, the method 200 proceeds with the next step.
  • At a step 223, the secure processor 130 determines if the “IF” condition for the conditional license 142 is satisfied.
  • As part of this step, if as described above, the “IF” condition is prepared to be executed substantially locally (that is, at the secure processor 130), the secure processor 130 proceeds to execute or interpret the “IF” condition and determine a yes/no answer regarding whether the “IF” condition for the conditional license 142 is satisfied.
  • As part of this step, if as described above, the “IF” condition is prepared to be executed substantially remotely (that is, at one or more license servers 140), the secure processor 130 proceeds to make the associated call or invocation or request of a designated license server 140, and retrieves from that license server 140 a yes/no answer regarding whether the “IF” condition for the conditional license 142 is satisfied.
  • If the “IF” condition is satisfied, the method 200 proceeds with the next step. If the “IF” condition is not satisfied, the secure processor 130 does not allow execution or presentation of the content 112 to proceed, and the method 200 continues with the flow point 220B.
  • At a step 224, the secure processor 130 determines what rights are granted by the “THEN” portion of the conditional license 142.
  • As part of this step, if as described above, the “THEN” portion is prepared to be maintained substantially locally (that is, stored at the secure processor 130), the secure processor 130 determines the rights granted by the “THEN” portion of the conditional license 142.
  • As part of this step, if as described above, the “THEN” portion is prepared to be maintained substantially remotely (that is, generated at one or more license servers 140), the secure processor 130 proceeds to make the associated call or invocation or request of a designated license server 140, and retrieves from that license server 140 a description of a set of rights granted by the “THEN” portion of the conditional license 142.
  • The method 200 proceeds with the step 222, at which the secure processor 130 examines the rights granted by the “THEN” portion of the conditional license 142. As described above, the rights might themselves be conditional. If so, it might occur that the method 200 performs the steps 222, 223 and 224 repeatedly until rights associated with all satisfied “IF” conditions have been examined.
  • The method 200 proceeds with the step 225, at which the secure processor 130 uses the content 112, and with step 226, at which the secure processor 130 records state.
  • At a flow point 220B, the secure processor 130 is ready to use the content 112. The secure processor 130 may then use the content 112 and record the state of that content 112 (not shown). As described above, the state might include a score, a high score, a time taken, a minimum time taken, or another data structure, such as for example some other measure of player success at a game. The method 200 is ready to proceed with another task.
  • Limited Game Execution
  • At a flow point 230A, the content server 110 is ready to perform limited execution of an item of content 112.
  • The secure processor 130 determines whether the limitation or execution is a time limitation or a limitation on the number of games.
  • In one embodiment, the playback device 130, within a secure sub portion thereof, such as for example the secure processor, includes hardware and software elements which in combination provide abilities to start a game (or other content 112), stop a game, and measure the amount of execution time of a game.
  • In one embodiment, the playback device 130, also within a secure sub portion thereof, such as for example the secure processor, includes hardware and software elements which in combination provide abilities to save and restore a limited execution rights of a game (or other content 112), and measure the a degree of consumption of the state of the game. For a first example, not intended to be limiting in any way, the playback device 130 might maintain the number of minutes of play for the specific content 112, identified for the specific content 112, in a secure memory (such as for example an internal flash memory within the secure sub-portion). For a second example, not intended to be limiting in any way, the playback device 130 might maintain that information in a memory external to the secure sub-portion, but digitally signed (and possibly encrypted) using a cryptographic technique, with the effect that the saved state of the game cannot be easily altered (and in some embodiments, cannot be easily read), by devices other than the playback device 130.
  • At step 232, a user of the playback device 130 requests a license 142, specific to the specific playback device 130, for a selected limited time duration.
  • At a step 233, the user presents an appropriate proof of purchase or other credit or entitlement to obtain the license 142.
  • At a step 234, the license server 140 issues a limited license 142, the limited license 142 including a description of the nature of the rights granted by that limited license 142. In one embodiment, the description of the nature of the rights is encoded using a protocol known to both the playback device 130 and to the license server 140.
  • At a step 235, the playback device 130 authenticates the license 142 using appropriate digital signature checking techniques, and prepares to initiate or launch the game (or other content 112).
  • At a step 236, the playback device 130 authenticates the description of the nature of the (limited) rights granted by the license 142 using appropriate digital signature checking techniques, and makes description available to the secure processor.
  • At a step 237, the playback device 130 retrieves the (saved) state of the consumption of the rights of the game (or other content 112). For example, it could retrieve the actual minutes of execution of the game.
  • At a step 238, the playback device 130 compares the limitations imposed by the license 142, such as for example a time limitation, with information regarding the amount of consumption of the content 112 from the saved state of consumption the game (or other content 112). If the amount of consumption exceeds the allowed limit, the game is not permitted to launch (for example, the launch is aborted).
  • At a step 239, the playback device 130 makes run-time comparisons from time to time regarding the limitations imposed by the license 142, such as for example a time limitation, with information regarding the amount of consumption of the content 112 from the saved state of the game (or other content 112). If, at any of these run-time comparisons, the amount of consumption exceeds the allowed limit, the game (or other content 112) is aborted or halted.
  • Run-time comparisons might be performed by one of at least two techniques. (A) In a first example technique, the game makes periodic secure program calls to a secure set of code embodied in the secure processor, and using a secure timer in the processor accumulates the time consumption of the content being executed, with the effect that the secure processor can determine when the amount of consumption exceeds the limit. (B) In a second example technique, the secure processor sets a secure timer interrupt from the game at the time of launch into a secure set of code embodied in the secure processor, similarly with the effect that the secure processor can determine when the amount of consumption exceeds the limit.
  • In cases where the limitation is a limitation on the number of games, the secure processor may operate in a similar manner. In such embodiments, instead of the secure processor comparing an amount of time used against a selected time limit, the secure processor would compare a number of times launched against a selected limit on the number of launches.
  • At a flow point 230B, the content server 110 has performed limited execution of an item of content 112.
  • Alterative Embodiments
  • Although preferred embodiments are disclosed herein, many variations are possible which remain within the concept, scope, and spirit of the invention. These variations would become clear to those skilled in the art after perusal of this application.
  • After reading this application, those skilled in the art would recognize that the techniques described herein provide an enabling technology, with the effect that heretofore advantageous features can be provided that heretofore were substantially infeasible.
  • For example, not intended to be limiting in any way, the techniques described herein provide that contests or games might be conducted, with the effect that one or more winners (as determined, for example, in response to relative scores or relative times taken) of the contest or game would receive an appropriate prize, such as for example: a bonus game, a set of bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, and the like. In various embodiments, the contest or game might include one winner, or more than one winner, or one or more winners of more than one class of winners, and the like. In various embodiments, the contest or game might include a team of players whose joint score is responsive to the individual scores of the team members, such as a sum or median of those scores or a maximum one or more of those scores. In various embodiments, the original game, the bonus game, or both, might include provisions for individual play, for joint play, or for cooperative play. For example, not intended to be limiting in any way, an entity not associated with the original author or distributor of the game might provide a contest (either with or without entry requirements), in which superior play of the original game is rewarded with an update to that game. The update might or might not be created by the original author or distributor of the game, the entity conducting the contest, or otherwise.
  • For example, not intended to be limiting in any way, the techniques described herein provide that games already available to the user in the closed system might be upgraded, such as by alteration or emendation, without any particular requirement of rewriting code for the original game, or for having access to that original code. In various embodiments, the game might be upgraded by providing a new program that checks the state of the old game, and makes changes in the behavior of the old game, either by directly interacting with the user, or by altering the state information of the old game (with the intercession of the security system), or some combination or conjunction thereof. For example, not intended to be limiting in any way, an entity not associated with the original author or distributor of the game might provide an updated, upgraded, modified, or otherwise different, version of the game, or a new “level” or other module for the game, without altering any of the original game code. The new game might be created in response to status information maintained or provided by the old game, or the new game might call upon aspects of the old game (with the intercession of the security system) to provide a new game that is either different from, or an enhanced version of, the old game.
  • For example, not intended to be limiting in any way, the techniques described herein provide that educational software might be altered or amended to provide for an appropriate prize or reward for successful learning, such as for example: a right to play a game program (either generically or limited to a selected period of time), a right to play bonus “levels” or other modules for a game, a cash prize, a credit toward purchase of a new or upgraded game, a next or another educational program “level” or other module for the educational program, a credit toward purchase of a new educational program, and the like.
  • For example, not intended to be limiting in any way, the techniques described herein provide for security checks before accessing critical or otherwise sensitive data, such as for example confidential business information, confidential personal information, confidential financial information, program code, trade secrets, and the like.
  • For example, not intended to be limiting in any way, the techniques described herein provide for a chain (whether sequential or organized as a directed graph, with either conditional or unconditional transfers at each edge of that directed graph) events for the system to watch for, and in response thereto, take action on. For example, reaching a selected state in a first game program might provide the user with the right to play a second game, reaching a selected state in the second game program might provide the user with the right to play a third game, and the like.
  • After reading this application, those skilled in the art will recognize these alternative embodiments and variations are illustrative and are intended to be in no way limiting.

Claims (21)

1. A playback system executing instructions according to specified conditions, comprising:
a playback device, including a processor and storage having content stored thereon;
a license server coupled to the playback device, wherein, in operation,
the license server delivers a conditional license associated with the content to the playback device;
the processor determines if a condition associated with the conditional license is satisfied;
the processor executes the content if the condition associated with the conditional license is satisfied;
the processor sends feedback from the playback device to the license server, which generates a new conditional license using the feedback.
2. The system of claim 1, wherein the processor includes a secure processor executing trusted software.
3. The system of claim 1, wherein data associated with said condition is selected from the group consisting of: rules, name-value pairs, codified instructions in resident playback device software, codified instructions in the conditional license, a state of execution of said content on said playback device, a state of transactions associated with said content.
4. The system of claim 1, wherein said condition is associated with a state of transactions.
5. The system of claim 1, wherein the license server determines license permissions based on conditions selected from the group consisting of: state of the content executed by the processor, associated assets of the content available to the processor, an amount of time the content is executed by the processor, a number of times the content is executed by the processor, progress by the processor in executing the content, state local to the license server, transactions by an entity associated with the content and the playback device, and purchases associated with the content.
6. The system of claim 1, wherein the processor dynamically allocates rights or permissions associated with the conditional license based on rules associated with the content.
7. The system of claim 1, wherein the license server issues to the playback device bonus rights or permissions, associated with bonus content, based on said condition.
8. The system of claim 1, wherein the license server issues to the playback device trial rights or permissions, associated with new content, based on said condition.
9. The system of claim 1, wherein said playback device is one of a plurality of playback devices, and wherein said condition includes state associated with one or more of said plurality playback devices.
10. The system of claim 1, wherein the playback device is one of a plurality of playback devices each of which is associated with a user account, and wherein said condition includes state associated with one or more of the user accounts.
11. A playback license server device executing instructions according to specified conditions, comprising:
an input means for receiving state from a playback device;
memory having executable modules, including a license generator module, stored thereon;
a processor, coupled to the memory, for executing the executable modules;
a license generator, including the license generator module, configured to generate a conditional license using state from the playback device;
an output means for sending the conditional license to the playback device.
12. The device of claim 11, wherein the state from the playback device includes secure state.
13. The device of claim 1 1, wherein the state received from the playback device is selected from the group consisting of: content state, game state, player state, time, duration of play, number of times content has been executed, progress of play, assets, score, and a combination thereof.
14. The device of claim 11, wherein the memory further includes transaction state, and wherein the license generator is further configured to generate a conditional license for content using the transaction state associated with the content.
15. The device of claim 11, wherein the memory further includes transaction state, and wherein the license generator is further configured to generate a conditional license for first content using the transaction state associated with second content.
16. The device of claim 11, wherein the memory further includes server rules, and wherein the license generator is further configured to generate a conditional licenses for content using the server rules.
17. The device of claim 11, wherein the license generator generates a new conditional license based on feedback from the playback device.
18. The device of claim 11, further comprising a secure device, including:
a secure processor having hardware and software elements effective to measure consumption of content;
a secure internal memory coupled to the secure processor, wherein, in operation, the secure processor stores a value associated with the measured consumption of content in the secure internal memory, the secure processor compares the value with quantities associated with the conditional license, and the secure processor enforces the conditional license based on the comparison.
19. The device of claim 11, further comprising a secure system, including:
a secure processor having hardware and software elements effective to measure consumption of content;
cryptographically secure mass storage coupled to the secure processor, wherein, in operation, the secure processor stores a value associated with the measured consumption of content in the cryptographically secure mass storage, the secure processor compares the value with quantities associated with the conditional license, and the secure processor enforces the conditional license based on the comparison.
20. The device of claim 11, further comprising a secure system, including:
a secure processor having hardware and software elements effective to measure consumption of content;
a memory means coupled to the secure processor, wherein, in operation, a value associated with the measured consumption is stored in the memory means;
a secure timer effective to facilitate runtime comparisons by the secure processor, wherein the runtime comparisons include comparing the value with quantities associated with the conditional license using a secure timer interrupt that is set up at content launch.
21. The device of claim 11, further comprising a secure system, including:
a secure processor having hardware and software elements effective to measure consumption of content;
a memory means coupled to the secure processor, wherein, in operation, a value associated with the measured consumption is stored in the memory means;
a secure timer effective to facilitate accumulation of time associated with the consumption of content by executing secure code at interrupt intervals, wherein when the accumulated time exceeds a threshold associated with the conditional license, the secure processor cancels the conditional license.
US11/203,358 2003-02-07 2005-08-12 System and method for generating new licenses Abandoned US20050273439A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/203,358 US20050273439A1 (en) 2003-02-07 2005-08-12 System and method for generating new licenses

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/360,827 US7322042B2 (en) 2003-02-07 2003-02-07 Secure and backward-compatible processor and secure software execution thereon
US10/703,149 US8131649B2 (en) 2003-02-07 2003-11-05 Static-or-dynamic and limited-or-unlimited content rights
US11/203,358 US20050273439A1 (en) 2003-02-07 2005-08-12 System and method for generating new licenses

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/703,149 Division US8131649B2 (en) 2003-02-07 2003-11-05 Static-or-dynamic and limited-or-unlimited content rights

Publications (1)

Publication Number Publication Date
US20050273439A1 true US20050273439A1 (en) 2005-12-08

Family

ID=34573336

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/703,149 Active 2025-12-19 US8131649B2 (en) 2003-02-07 2003-11-05 Static-or-dynamic and limited-or-unlimited content rights
US11/203,357 Expired - Lifetime US7464058B2 (en) 2003-02-07 2005-08-12 System and method for generating new licenses
US11/203,358 Abandoned US20050273439A1 (en) 2003-02-07 2005-08-12 System and method for generating new licenses
US12/330,487 Abandoned US20090150293A1 (en) 2003-02-07 2008-12-08 System and method for delivering licenses to a playback device

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US10/703,149 Active 2025-12-19 US8131649B2 (en) 2003-02-07 2003-11-05 Static-or-dynamic and limited-or-unlimited content rights
US11/203,357 Expired - Lifetime US7464058B2 (en) 2003-02-07 2005-08-12 System and method for generating new licenses

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/330,487 Abandoned US20090150293A1 (en) 2003-02-07 2008-12-08 System and method for delivering licenses to a playback device

Country Status (5)

Country Link
US (4) US8131649B2 (en)
EP (1) EP1680761B1 (en)
JP (1) JP4875493B2 (en)
CN (1) CN1879112A (en)
WO (1) WO2005045644A2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060258461A1 (en) * 2005-05-13 2006-11-16 Yahoo! Inc. Detecting interaction with an online service
US20060258460A1 (en) * 2005-05-13 2006-11-16 Yahoo! Inc. Enabling rent/buy redirection in invitation to an online service
US20080271165A1 (en) * 2007-04-27 2008-10-30 Microsoft Corporation Parameter-based interpretation of drm license policy
US20100041457A1 (en) * 2008-08-14 2010-02-18 Valve Corporation Overlaying interactive video game play with real-time chat sessions with game switching
US20100312810A1 (en) * 2009-06-09 2010-12-09 Christopher Horton Secure identification of music files
US8046838B1 (en) * 2007-04-30 2011-10-25 Hewlett-Packard Development Company, L.P. Using a modulation transfer function of a device to create digital content for the device
US9646142B2 (en) 2003-02-07 2017-05-09 Acer Cloud Technology Inc. Ensuring authenticity in a closed content distribution system
US10733271B2 (en) 2006-05-02 2020-08-04 Acer Cloud Technology, Inc. Systems and methods for facilitating secure streaming of electronic gaming content

Families Citing this family (96)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001271763A1 (en) * 2000-06-30 2002-01-14 Zinio Systems, Inc. System and method for encrypting, distributing and viewing electronic documents
US7885896B2 (en) 2002-07-09 2011-02-08 Avaya Inc. Method for authorizing a substitute software license server
US8041642B2 (en) 2002-07-10 2011-10-18 Avaya Inc. Predictive software license balancing
US7698225B2 (en) * 2002-08-30 2010-04-13 Avaya Inc. License modes in call processing
US7966520B2 (en) * 2002-08-30 2011-06-21 Avaya Inc. Software licensing for spare processors
US7681245B2 (en) * 2002-08-30 2010-03-16 Avaya Inc. Remote feature activator feature extraction
US7707116B2 (en) * 2002-08-30 2010-04-27 Avaya Inc. Flexible license file feature controls
US7757075B2 (en) * 2002-11-15 2010-07-13 Microsoft Corporation State reference
US7890997B2 (en) * 2002-12-26 2011-02-15 Avaya Inc. Remote feature activation authentication file system
US8131649B2 (en) 2003-02-07 2012-03-06 Igware, Inc. Static-or-dynamic and limited-or-unlimited content rights
US7779482B1 (en) * 2003-02-07 2010-08-17 iGware Inc Delivery of license information using a short messaging system protocol in a closed content distribution system
US7260557B2 (en) * 2003-02-27 2007-08-21 Avaya Technology Corp. Method and apparatus for license distribution
US20070155469A1 (en) * 2003-10-20 2007-07-05 Sam Johnson Automatic funding of paragames on electronic gaming platform
US9564004B2 (en) 2003-10-20 2017-02-07 Igt Closed-loop system for providing additional event participation to electronic video game customers
JP2005141683A (en) * 2003-11-10 2005-06-02 Sony Corp Content use management system, content reproducing apparatus, content use management method, content reproduction method, and computer program
EP1810229A4 (en) * 2004-06-22 2011-10-05 Ebooks Corp Ltd Lending system and method
US8968093B2 (en) * 2004-07-15 2015-03-03 Intel Corporation Dynamic insertion of personalized content in online game scenes
US7707405B1 (en) 2004-09-21 2010-04-27 Avaya Inc. Secure installation activation
US7747851B1 (en) * 2004-09-30 2010-06-29 Avaya Inc. Certificate distribution via license files
US8229858B1 (en) 2004-09-30 2012-07-24 Avaya Inc. Generation of enterprise-wide licenses in a customer environment
US9613491B2 (en) 2004-12-16 2017-04-04 Igt Video gaming device having a system and method for completing wagers and purchases during the cash out process
US20070026935A1 (en) * 2005-08-01 2007-02-01 Igt Methods and devices for managing gaming networks
US8152628B2 (en) 2005-08-01 2012-04-10 Igt Methods and devices for authentication and licensing in a gaming network
US7814023B1 (en) 2005-09-08 2010-10-12 Avaya Inc. Secure download manager
US7965922B2 (en) * 2005-09-16 2011-06-21 Sony Corporation Information processing device, information recording medium manufacturing device, information recording medium, methods thereof, and computer program
US20070073625A1 (en) * 2005-09-27 2007-03-29 Shelton Robert H System and method of licensing intellectual property assets
US7533061B1 (en) * 2006-01-18 2009-05-12 Loudeye Corp. Delivering media files to consumer devices
US20070206247A1 (en) * 2006-03-01 2007-09-06 Intouch Group, Inc. System, apparatus, and method for managing preloaded digital files for preview on a digital media playback apparatus
US20070245378A1 (en) * 2006-04-13 2007-10-18 Concert Technology Corporation User system providing previews to an associated portable media player
US8784196B2 (en) 2006-04-13 2014-07-22 Igt Remote content management and resource sharing on a gaming machine and method of implementing same
US9028329B2 (en) * 2006-04-13 2015-05-12 Igt Integrating remotely-hosted and locally rendered content on a gaming device
US20070245377A1 (en) * 2006-04-13 2007-10-18 Concert Technology Corporation Central system providing previews to a portable media player
US8968077B2 (en) 2006-04-13 2015-03-03 Idt Methods and systems for interfacing with a third-party application
US8316081B2 (en) * 2006-04-13 2012-11-20 Domingo Enterprises, Llc Portable media player enabled to obtain previews of a user's media collection
US20070245376A1 (en) * 2006-04-13 2007-10-18 Concert Technology Corporation Portable media player enabled to obtain previews of media content
US20070244985A1 (en) * 2006-04-13 2007-10-18 Concert Technology Corporation User system providing previews of a user's media collection to an associated portable media player
US8777737B2 (en) * 2006-04-13 2014-07-15 Igt Method and apparatus for integrating remotely-hosted and locally rendered content on a gaming device
US7603434B2 (en) * 2006-04-13 2009-10-13 Domingo Enterprises, Llc Central system providing previews of a user's media collection to a portable media player
US10026255B2 (en) 2006-04-13 2018-07-17 Igt Presentation of remotely-hosted and locally rendered content for gaming systems
US8676713B2 (en) * 2006-05-30 2014-03-18 Dell Products L.P. Dynamic constraints for content rights
US20080070688A1 (en) * 2006-09-20 2008-03-20 John Loehrer Real-time gaming system having scalable database
US8230037B2 (en) * 2006-09-29 2012-07-24 Audible, Inc. Methods and apparatus for customized content delivery
US7624276B2 (en) * 2006-10-16 2009-11-24 Broadon Communications Corp. Secure device authentication system and method
US7613915B2 (en) 2006-11-09 2009-11-03 BroadOn Communications Corp Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed
US20090156303A1 (en) 2006-11-10 2009-06-18 Igt Bonusing Architectures in a Gaming Environment
US8727855B2 (en) * 2006-11-13 2014-05-20 Igt Three-dimensional paylines for gaming machines
GB2446175B (en) * 2007-01-31 2011-06-29 Hewlett Packard Development Co Method of updating data
US8626931B2 (en) * 2007-02-05 2014-01-07 Broadcom Corporation Media transport protocol extensions for system information exchange, and applications thereof
US7962751B2 (en) * 2007-02-26 2011-06-14 Arthur Frederick Dudley Method for portability of information between multiple servers
US8285646B2 (en) 2007-03-19 2012-10-09 Igt Centralized licensing services
US8032472B2 (en) * 2007-04-04 2011-10-04 Tuen Solutions Limited Liability Company Intelligent agent for distributed services for mobile devices
US8752191B2 (en) * 2007-05-16 2014-06-10 Broadcom Corporation Generic digital rights management framework, and applications thereof
US8832467B2 (en) * 2007-05-16 2014-09-09 Broadcom Corporation Digital rights management metafile, management protocol and applications thereof
US7778986B2 (en) 2007-08-29 2010-08-17 International Business Machines Corporation Securing transfer of ownership of a storage object from an unavailable owner node to another node
US7899895B2 (en) 2007-08-29 2011-03-01 International Business Machines Corporation Transfer of ownership of a storage object in response to an original owner node becoming available after a period of unavailability
US7991822B2 (en) 2007-08-29 2011-08-02 International Business Machines Corporation Propagation of updates for attributes of a storage object from an owner node of the storage object to other nodes
CN101137092B (en) * 2007-09-11 2012-07-04 中兴通讯股份有限公司 Mobile game issuing method
US20090204956A1 (en) * 2008-02-08 2009-08-13 International Business Machines Corporation Multiple-mode software license enforcement
US20090254482A1 (en) * 2008-04-07 2009-10-08 Microsoft Corporation Time-based licenses
US10453003B2 (en) * 2008-09-18 2019-10-22 Microsoft Technology Licensing, Llc Digital rights management license identification
JP4711002B2 (en) * 2009-03-26 2011-06-29 ブラザー工業株式会社 Program and license registration device
US20100333212A1 (en) * 2009-06-25 2010-12-30 Microsoft Corporation Portable parameter-based licensing
JP5020297B2 (en) * 2009-09-08 2012-09-05 株式会社ソニー・コンピュータエンタテインメント Program execution restriction device and program execution restriction method
JP5454035B2 (en) 2009-09-15 2014-03-26 株式会社リコー Image processing apparatus, remote management system, license update method, and license update program
US20110191691A1 (en) * 2010-01-29 2011-08-04 Spears Joseph L Systems and Methods for Dynamic Generation and Management of Ancillary Media Content Alternatives in Content Management Systems
US20110191246A1 (en) 2010-01-29 2011-08-04 Brandstetter Jeffrey D Systems and Methods Enabling Marketing and Distribution of Media Content by Content Creators and Content Providers
US11157919B2 (en) * 2010-01-29 2021-10-26 Ipar, Llc Systems and methods for dynamic management of geo-fenced and geo-targeted media content and content alternatives in content management systems
US20110191288A1 (en) * 2010-01-29 2011-08-04 Spears Joseph L Systems and Methods for Generation of Content Alternatives for Content Management Systems Using Globally Aggregated Data and Metadata
US20110191287A1 (en) * 2010-01-29 2011-08-04 Spears Joseph L Systems and Methods for Dynamic Generation of Multiple Content Alternatives for Content Management Systems
US9197630B2 (en) * 2010-03-08 2015-11-24 Microsoft Technology Licensing, Llc Automated certificate management
JP5232197B2 (en) * 2010-06-30 2013-07-10 株式会社コナミデジタルエンタテインメント GAME SYSTEM, SERVER DEVICE, GAME CONTROL METHOD, SERVICE METHOD, GAME SYSTEM PROGRAM, AND SERVER PROGRAM
US9432746B2 (en) 2010-08-25 2016-08-30 Ipar, Llc Method and system for delivery of immersive content over communication networks
CN101976408A (en) * 2010-09-29 2011-02-16 中兴通讯股份有限公司 Widget as well as trial implementation method and terminal thereof
US8781304B2 (en) 2011-01-18 2014-07-15 Ipar, Llc System and method for augmenting rich media content using multiple content repositories
US9361624B2 (en) 2011-03-23 2016-06-07 Ipar, Llc Method and system for predicting association item affinities using second order user item associations
US8849819B2 (en) 2011-08-05 2014-09-30 Deacon Johnson System and method for controlling and organizing metadata associated with on-line content
US9466173B2 (en) 2011-09-30 2016-10-11 Igt System and method for remote rendering of content on an electronic gaming machine
US9524609B2 (en) 2011-09-30 2016-12-20 Igt Gaming system, gaming device and method for utilizing mobile devices at a gaming establishment
US10320951B2 (en) 2011-10-31 2019-06-11 Hurricane Electric Systems and methods for establishing a virtual local area network
US20130129095A1 (en) * 2011-11-18 2013-05-23 Comcast Cable Communications, Llc Key Delivery
US9134969B2 (en) 2011-12-13 2015-09-15 Ipar, Llc Computer-implemented systems and methods for providing consistent application generation
US20130218768A1 (en) 2012-02-21 2013-08-22 Mike Leber Systems and Methods for Facilitating Secured Financial Transactions
US8627097B2 (en) 2012-03-27 2014-01-07 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes
US9965760B2 (en) 2012-06-29 2018-05-08 Hurricane Electric Systems and methods for facilitating electronic transactions utilizing a mobile computing device
US8990956B2 (en) * 2012-08-06 2015-03-24 Hurricane Electric Systems and methods of exchanging information for a reward
US9129469B2 (en) 2012-09-11 2015-09-08 Igt Player driven game download to a gaming machine
CN103259709A (en) * 2013-05-27 2013-08-21 南京邮电大学 End-to-end mobile phone real-time video transmission method based on virtual private network
RU2682858C1 (en) * 2013-12-16 2019-03-21 Абб Швайц Аг Licensing of hardware component
JP2015201104A (en) * 2014-04-09 2015-11-12 富士通株式会社 Terminal device, information management device, terminal program, information management program, and system
JP6372311B2 (en) * 2014-10-30 2018-08-15 株式会社リコー Information processing system, electronic device, service authorization method and program
US10055930B2 (en) 2015-08-11 2018-08-21 Igt Gaming system and method for placing and redeeming sports bets
US10545646B2 (en) 2017-02-22 2020-01-28 Foxwordy Inc. Enabling and disabling one-click clauses
WO2018236925A1 (en) 2017-06-19 2018-12-27 Rigetti & Co, Inc. Distributed quantum computing system
US11123641B2 (en) * 2017-07-24 2021-09-21 Sony Interactive Entertainment Inc. Information processing device, server device, parental control method, profile information management method
US11010145B1 (en) 2018-02-21 2021-05-18 Rigetti & Co, Inc. Retargetable compilation for quantum computing systems
WO2024024611A1 (en) * 2022-07-27 2024-02-01 株式会社ソニー・インタラクティブエンタテインメント Information processing device, and game play control method

Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5238250A (en) * 1990-01-10 1993-08-24 Bung Electronic Engineering Company Computer game control apparatus
US5261069A (en) * 1990-08-13 1993-11-09 Hewlett-Packard Company Method of maintaining consistency of cached data in a database system
US5367698A (en) * 1991-10-31 1994-11-22 Epoch Systems, Inc. Network file migration system
US5400402A (en) * 1993-06-07 1995-03-21 Garfinkle; Norton System for limiting use of down-loaded video-on-demand data
US5404505A (en) * 1991-11-01 1995-04-04 Finisar Corporation System for scheduling transmission of indexed and requested database tiers on demand at varying repetition rates
US5528513A (en) * 1993-11-04 1996-06-18 Digital Equipment Corp. Scheduling and admission control policy for a continuous media server
US5610839A (en) * 1994-10-07 1997-03-11 Itt Corporation Communications management system architecture
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5715398A (en) * 1989-06-16 1998-02-03 R.R. Donnelley & Sons Company System for distributing items from an origin to a plurality of destinations
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5781901A (en) * 1995-12-21 1998-07-14 Intel Corporation Transmitting electronic mail attachment over a network using a e-mail page
US5790170A (en) * 1996-04-19 1998-08-04 Sony Corporation Two-way information transmission system and two-way information transmission method
US5809242A (en) * 1996-04-19 1998-09-15 Juno Online Services, L.P. Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system
US5815662A (en) * 1995-08-15 1998-09-29 Ong; Lance Predictive memory caching for media-on-demand systems
US5818512A (en) * 1995-01-26 1998-10-06 Spectravision, Inc. Video distribution system
US5829046A (en) * 1995-10-27 1998-10-27 Emc Corporation On-line tape backup using an integrated cached disk array
US5867223A (en) * 1995-07-17 1999-02-02 Gateway 2000, Inc. System for assigning multichannel audio signals to independent wireless audio output devices
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5903723A (en) * 1995-12-21 1999-05-11 Intel Corporation Method and apparatus for transmitting electronic mail attachments with attachment references
US5905860A (en) * 1996-03-15 1999-05-18 Novell, Inc. Fault tolerant electronic licensing system
US5913039A (en) * 1996-01-19 1999-06-15 Matsushita Electric Industrial Co., Ltd. Video on demand system with a transmission schedule table in the video server including entries for client identifiers, video titles, and reproduction start times
US5933498A (en) * 1996-01-11 1999-08-03 Mrj, Inc. System for controlling access and distribution of digital property
US5983227A (en) * 1997-06-12 1999-11-09 Yahoo, Inc. Dynamic page generator
US6016348A (en) * 1996-11-27 2000-01-18 Thomson Consumer Electronics, Inc. Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
US6032200A (en) * 1996-09-30 2000-02-29 Apple Computer, Inc. Process scheduling for streaming data through scheduling of disk jobs and network jobs and the relationship of the scheduling between these types of jobs
US6038601A (en) * 1997-07-21 2000-03-14 Tibco, Inc. Method and apparatus for storing and delivering documents on the internet
US6049821A (en) * 1997-01-24 2000-04-11 Motorola, Inc. Proxy host computer and method for accessing and retrieving information between a browser and a proxy
US6052720A (en) * 1998-05-14 2000-04-18 Sun Microsystems, Inc. Generic schema for storing configuration information on a server computer
US6085193A (en) * 1997-09-29 2000-07-04 International Business Machines Corporation Method and system for dynamically prefetching information via a server hierarchy
US6141756A (en) * 1998-04-27 2000-10-31 Motorola, Inc. Apparatus and method of reading a program into a processor
US6148340A (en) * 1998-04-30 2000-11-14 International Business Machines Corporation Method and system for differencing container files
US6185625B1 (en) * 1996-12-20 2001-02-06 Intel Corporation Scaling proxy server sending to the client a graphical user interface for establishing object encoding preferences after receiving the client's request for the object
US6205475B1 (en) * 1997-02-26 2001-03-20 William Michael Pitts Request interceptor in network nodes for determining local storage of file image satisfying predetermined criteria
US6212657B1 (en) * 1996-08-08 2001-04-03 Nstreams Technologies, Inc. System and process for delivering digital data on demand
US6219680B1 (en) * 1997-06-19 2001-04-17 International Business Machines Corporation System and method for building a web site for use in E-commerce with user specific pricing
US6219708B1 (en) * 1996-05-30 2001-04-17 Multi-Tech Systems, Inc. System for network resource management
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6243719B1 (en) * 1997-10-20 2001-06-05 Fujitsu Limited Data caching apparatus, data caching method and medium recorded with data caching program in client/server distributed system
US6256637B1 (en) * 1998-05-05 2001-07-03 Gemstone Systems, Inc. Transactional virtual machine architecture
US6259471B1 (en) * 1996-03-14 2001-07-10 Alcatel Apparatus and service for transmitting video data
US20010014882A1 (en) * 1994-11-23 2001-08-16 Stefik Mark J. System for controlling the distribution and use of digital works using digital tickets
US6289452B1 (en) * 1997-11-07 2001-09-11 Cybersource Corporation Method and system for delivering digital products electronically
US6321209B1 (en) * 1999-02-18 2001-11-20 Wired Solutions, Llc System and method for providing a dynamic advertising content window within a window based content manifestation environment provided in a browser
US6338050B1 (en) * 1998-11-16 2002-01-08 Trade Access, Inc. System and method for providing and updating user supplied context for a negotiations system
US20020016818A1 (en) * 2000-05-11 2002-02-07 Shekhar Kirani System and methodology for optimizing delivery of email attachments for disparate devices
US20020032784A1 (en) * 1998-03-25 2002-03-14 Community Learning And Information Network Computer architecture for managing courseware in a shared use operating environment
US6377972B1 (en) * 1999-01-19 2002-04-23 Lucent Technologies Inc. High quality streaming multimedia
US6389460B1 (en) * 1998-05-13 2002-05-14 Compaq Computer Corporation Method and apparatus for efficient storage and retrieval of objects in and from an object storage device
US20020059384A1 (en) * 2000-07-13 2002-05-16 Koninklijke Philips Electronics N.V. Substituting URL for attachment in forwarding electronic content
US20020071557A1 (en) * 2000-12-07 2002-06-13 Nguyen Binh T. Secured virtual network in a gaming environment
US6412011B1 (en) * 1998-09-14 2002-06-25 At&T Corp. Method and apparatus to enhance a multicast information stream in a communication network
US6412008B1 (en) * 1999-01-28 2002-06-25 International Business Machines Corporation System and method for cooperative client/server customization of web pages
US20020085720A1 (en) * 2000-12-01 2002-07-04 Masahiro Okada Game apparatus managing system, game apparatus, controlling method, computer program and recording medium
US6427238B1 (en) * 1998-05-29 2002-07-30 Opentv, Inc. Module manager for interactive television system
US20020116615A1 (en) * 2000-12-07 2002-08-22 Igt Secured virtual network in a gaming environment
US6446113B1 (en) * 1999-07-19 2002-09-03 Groove Networks, Inc. Method and apparatus for activity-based collaboration by a computer system equipped with a dynamics manager
US20020138764A1 (en) * 2001-02-01 2002-09-26 Jacobs Bruce A. System and method for an automatic license facility
US6466048B1 (en) * 2001-05-23 2002-10-15 Mosaid Technologies, Inc. Method and apparatus for switchably selecting an integrated circuit operating mode
US20020160833A1 (en) * 2000-10-25 2002-10-31 Lloyd David B. Adapting a game state to be compatible with a new version of a game
US20020162115A1 (en) * 2001-04-25 2002-10-31 Bruckner John Anthony System and method for monitoring and recovering the state of user participation in interactive broadcasts
US20020161673A1 (en) * 1999-01-27 2002-10-31 International Business Machines Corporation Aggregating and analyzing information about content requested in an e-commerce web environment to determine conversion rates
US20020165022A1 (en) * 2001-03-27 2002-11-07 Akira Hiraoka Game module adding service system
US6480883B1 (en) * 1998-06-30 2002-11-12 Kabushiki Kaisha Toshiba Real-time information transmission system
US20020169974A1 (en) * 2001-03-01 2002-11-14 Microsoft Corporation Detecting and responding to a clock rollback in a digital rights management system on a computing device
US6510502B1 (en) * 1998-05-14 2003-01-21 Kabushiki Kaisha Sega Enterprises Information processing device and method for reading information recorded on an information recording medium
US20030023564A1 (en) * 2001-05-31 2003-01-30 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US20030028622A1 (en) * 2001-08-06 2003-02-06 Mitsuhiro Inoue License management server, terminal device, license management system and usage restriction control method
US6526581B1 (en) * 1999-08-03 2003-02-25 Ucentric Holdings, Llc Multi-service in-home network with an open interface
US6557104B2 (en) * 1997-05-02 2003-04-29 Phoenix Technologies Ltd. Method and apparatus for secure processing of cryptographic keys
US6571279B1 (en) * 1997-12-05 2003-05-27 Pinpoint Incorporated Location enhanced information delivery system
US6574605B1 (en) * 1998-11-17 2003-06-03 Citibank, N.A. Method and system for strategic services enterprise workload management
US20030114227A1 (en) * 2001-10-10 2003-06-19 Rubin Jason Pehr System and method for saving game data
US20030120541A1 (en) * 2001-12-21 2003-06-26 Siann Jonathan I. Storage and delivery of electronic media content with advertising
US6594682B2 (en) * 1997-10-28 2003-07-15 Microsoft Corporation Client-side system for scheduling delivery of web content and locally managing the web content
US20030144869A1 (en) * 2001-11-20 2003-07-31 Contentguard Holdings, Inc. Extensible rights expression processing system
US6606644B1 (en) * 2000-02-24 2003-08-12 International Business Machines Corporation System and technique for dynamic information gathering and targeted advertising in a web based model using a live information selection and analysis tool
US20030157985A1 (en) * 2002-02-19 2003-08-21 Koninklijke Philips Electronics N.V. Virtual IPR system in electronic game environment
US20030182142A1 (en) * 2001-11-20 2003-09-25 Contentguard Holdings, Inc. Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
US6637029B1 (en) * 1997-07-03 2003-10-21 Nds Limited Intelligent electronic program guide
US6675350B1 (en) * 1999-11-04 2004-01-06 International Business Machines Corporation System for collecting and displaying summary information from disparate sources
US20040015426A1 (en) * 2002-03-14 2004-01-22 Bijan Tadayon System and method for expressing usage rights with sound signals
US6691312B1 (en) * 1999-03-19 2004-02-10 University Of Massachusetts Multicasting video
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
US20040044901A1 (en) * 2002-08-30 2004-03-04 Serkowski Robert J. License file serial number tracking
US6704797B1 (en) * 1999-06-10 2004-03-09 International Business Machines Corporation Method and system for distributing image-based content on the internet
US20040054923A1 (en) * 2002-08-30 2004-03-18 Seago Tom E. Digital rights and content management system and method for enhanced wireless provisioning
US20040098610A1 (en) * 2002-06-03 2004-05-20 Hrastar Scott E. Systems and methods for automated network policy exception detection and correction
US20040098297A1 (en) * 2002-06-27 2004-05-20 Borthwick Alvin J. System for managing requests and method of managing requests
US20040102987A1 (en) * 2002-03-29 2004-05-27 Eiji Takahashi Content reproduction apparatus and content reproduction control method
US6785712B1 (en) * 2000-09-21 2004-08-31 Rockwell Collins, Inc. Airborne e-mail data transfer protocol
US6805629B1 (en) * 2000-09-13 2004-10-19 Casino Data System Gaming device and method
US20050004875A1 (en) * 2001-07-06 2005-01-06 Markku Kontio Digital rights management in a mobile communications environment
US6873975B1 (en) * 1999-04-06 2005-03-29 Fujitsu Limited Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
US6901386B1 (en) * 2000-03-31 2005-05-31 Intel Corporation Electronic asset lending library method and apparatus
US6920567B1 (en) * 1999-04-07 2005-07-19 Viatech Technologies Inc. System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
US6993557B1 (en) * 1999-10-25 2006-01-31 Broadon Communications Corp. Creation of customized web pages for use in a system of dynamic trading of knowledge, goods and services
US20060031222A1 (en) * 2002-12-19 2006-02-09 Uwe Hannsmann Method for providing of content data to a client
US7092953B1 (en) * 2000-12-28 2006-08-15 Rightlsline, Inc. Apparatus and methods for intellectual property database navigation

Family Cites Families (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI111789B (en) * 1989-01-10 2003-09-15 Nintendo Co Ltd Electronic gaming apparatus with the possibility of pseudostereophonic development of sound
US5184830A (en) * 1989-01-10 1993-02-09 Nintendo Company Limited Compact hand-held video game system
KR0149503B1 (en) * 1989-04-20 1999-05-15 야마우찌 히로시 Memory cartridge
US5347579A (en) 1989-07-05 1994-09-13 Blandford Robert R Personal computer diary
US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5590199A (en) 1993-10-12 1996-12-31 The Mitre Corporation Electronic information network user authentication and authorization system
CA2176032A1 (en) 1994-01-13 1995-07-20 Bankers Trust Company Cryptographic system and method with key escrow feature
US5539828A (en) 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
US5586264A (en) 1994-09-08 1996-12-17 Ibm Corporation Video optimized media streamer with cache management
US5654746A (en) 1994-12-01 1997-08-05 Scientific-Atlanta, Inc. Secure authorization and control method and apparatus for a game delivery service
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US7069451B1 (en) 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
DE69637799D1 (en) * 1995-02-13 2009-02-12 Intertrust Tech Corp Systems and procedures for secure transaction management and electronic legal protection
US7143290B1 (en) 1995-02-13 2006-11-28 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5779549A (en) 1996-04-22 1998-07-14 Walker Assest Management Limited Parnership Database driven online distributed tournament system
US5786587A (en) 1995-08-10 1998-07-28 American Bank Note Holographics, Inc. Enhancement of chip card security
DE69729495T2 (en) * 1996-03-08 2004-10-28 Matsushita Electric Industrial Co., Ltd., Kadoma Image information processing system and microprocessor for the protected reproduction of audiovisual data
US5909491A (en) * 1996-11-06 1999-06-01 Nokia Mobile Phones Limited Method for sending a secure message in a telecommunications system
JPH10207779A (en) * 1997-01-21 1998-08-07 Victor Co Of Japan Ltd Digital information management system, terminal equipment, information management sensor and digital information management method
US7062500B1 (en) * 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
BR9714601A (en) * 1997-03-21 2002-09-10 Canal Plus Sa Broadcast and reception system and conditional access system for same
EP0878796B1 (en) 1997-05-13 2006-04-19 Kabushiki Kaisha Toshiba Information recording apparatus, information reproducing apparatus, and information distribution system
US5993627A (en) 1997-06-24 1999-11-30 Large Scale Biology Corporation Automated system for two-dimensional electrophoresis
FR2766942B1 (en) 1997-07-31 1999-10-01 Gemplus Card Int CHIP CARD READER WITH MICROCONTROLLER AND SECURITY COMPONENT
US6278782B1 (en) 1997-09-16 2001-08-21 Safenet, Inc. Method of implementing a key recovery system
US7092914B1 (en) 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6167441A (en) 1997-11-21 2000-12-26 International Business Machines Corporation Customization of web pages based on requester type
JPH11203127A (en) * 1998-01-09 1999-07-30 Casio Comput Co Ltd Program management system and control method for terminal management system
EP0944256A1 (en) 1998-03-19 1999-09-22 Hitachi Europe Limited Copy protection apparatus and method
US6195433B1 (en) * 1998-05-08 2001-02-27 Certicom Corp. Private key validity and validation
DE69942712D1 (en) 1998-05-29 2010-10-14 Texas Instruments Inc Secure computing device
US6330566B1 (en) 1998-06-22 2001-12-11 Microsoft Corporation Apparatus and method for optimizing client-state data storage
US6751729B1 (en) * 1998-07-24 2004-06-15 Spatial Adventures, Inc. Automated operation and security system for virtual private networks
US7228437B2 (en) 1998-08-13 2007-06-05 International Business Machines Corporation Method and system for securing local database file of local content stored on end-user system
US6826593B1 (en) 1998-09-01 2004-11-30 Lucent Technologies Inc. Computer implemented method and apparatus for fulfilling a request for information content with a user-selectable version of a file containing that information content
GB2341523B (en) 1998-09-12 2003-10-29 Ibm Apparatus and method for establishing communication in a computer network
US6292899B1 (en) 1998-09-23 2001-09-18 Mcbride Randall C. Volatile key apparatus for safeguarding confidential data stored in a computer system memory
US6563517B1 (en) 1998-10-02 2003-05-13 International Business Machines Corp. Automatic data quality adjustment to reduce response time in browsing
SG77270A1 (en) * 1998-10-16 2000-12-19 Matsushita Electric Ind Co Ltd Digital content protection system
US7174457B1 (en) 1999-03-10 2007-02-06 Microsoft Corporation System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
US6014558A (en) * 1998-12-28 2000-01-11 Northern Telecom Limited Variable rate optional security measures method and apparatus for wireless communications network
AU3381000A (en) 1999-03-27 2000-10-16 Microsoft Corporation Rendering digital content in an encrypted rights-protected form
US6470378B1 (en) 1999-03-31 2002-10-22 Intel Corporation Dynamic content customization in a clientserver environment
US6654388B1 (en) 1999-05-26 2003-11-25 Larscom Incorporated Method and apparatus for automatically determining allocation of voice and data channels on T1/E1 line
US6500070B1 (en) 1999-05-28 2002-12-31 Nintendo Co., Ltd. Combined game system of portable and video game machines
EP1061516A1 (en) 1999-06-08 2000-12-20 Deutsche Thomson-Brandt Gmbh Method for play back of an encrypted piece of information recorded on an information carrier and play back apparatus for use within said method
US6882979B1 (en) * 1999-06-18 2005-04-19 Onadine, Inc. Generating revenue for the use of softgoods that are freely distributed over a network
US7636843B1 (en) 1999-08-20 2009-12-22 Sony Corporation Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium
US6371854B1 (en) * 1999-08-20 2002-04-16 Ninetendo Co., Ltd. Combined game system
EP1134670A4 (en) 1999-08-27 2006-04-26 Sony Corp Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method
US6760324B1 (en) 1999-09-10 2004-07-06 Array Telecom Corporation Method, system, and computer program product for providing voice over the internet communication
CA2322113A1 (en) * 1999-10-04 2001-04-04 Pitney Bowes Inc. System and method for managing user permissions for accessing functionality of multiple software applications
JP2001195077A (en) 1999-10-25 2001-07-19 Sony Corp Device and method for transmitting contents data, device and method for controlling contents data, and recording medium
US6928551B1 (en) 1999-10-29 2005-08-09 Lockheed Martin Corporation Method and apparatus for selectively denying access to encoded data
US6397186B1 (en) * 1999-12-22 2002-05-28 Ambush Interactive, Inc. Hands-free, voice-operated remote control transmitter
JP2001209586A (en) 2000-01-26 2001-08-03 Toshiba Corp Unit and method of controlling contents for computer
SG97852A1 (en) 2000-02-25 2003-08-20 Kent Ridge Digital Labs Method and apparatus for digital content copy protection
US7043641B1 (en) * 2000-03-08 2006-05-09 Igt Encryption in a secure computerized gaming system
US7020303B2 (en) 2000-03-18 2006-03-28 Digimarc Corporation Feature-based watermarks and watermark detection strategies
JP2002011250A (en) * 2000-04-25 2002-01-15 Nintendo Co Ltd Game system and portable game machine
JP2001340646A (en) 2000-05-31 2001-12-11 Namco Ltd Competition game device and information storage medium
US7024394B1 (en) * 2000-07-07 2006-04-04 International Business Machines Corporation System and method for protecting user logoff from web business transactions
JP2002024178A (en) 2000-07-11 2002-01-25 Web I Inc Contents authentication system and method, and recording medium
US7475398B2 (en) 2000-08-01 2009-01-06 Wind River Systems, Inc. System and method for implementing a smart system call
DE20014381U1 (en) 2000-08-21 2000-11-30 Rent A Brain Gmbh Authentication device
US7052396B2 (en) * 2000-09-11 2006-05-30 Nintendo Co., Ltd. Communication system and method using pictorial characters
US7237123B2 (en) 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
WO2002030088A1 (en) 2000-10-04 2002-04-11 Routefree, Inc. Adaptive predictive delivery of information
WO2002029642A2 (en) 2000-10-04 2002-04-11 Routefree, Inc. Replacement of requested data with equivalent data
JP4470312B2 (en) * 2000-10-10 2010-06-02 ソニー株式会社 Server device, playback device, data distribution method, data playback method, storage medium
JP2002140309A (en) * 2000-11-02 2002-05-17 Hitachi Ltd Service system
US6811486B1 (en) * 2000-12-20 2004-11-02 Sierra Design Group Method and apparatus for enhancing game play through savable game play state
US7010303B2 (en) * 2000-12-22 2006-03-07 Research In Motion Limited Wireless router system and method
US20020095382A1 (en) 2001-01-10 2002-07-18 Hiroki Taoka Content decryption device
US7206765B2 (en) * 2001-01-17 2007-04-17 Contentguard Holdings, Inc. System and method for supplying and managing usage rights based on rules
US7774279B2 (en) * 2001-05-31 2010-08-10 Contentguard Holdings, Inc. Rights offering and granting
US7330717B2 (en) * 2001-02-23 2008-02-12 Lucent Technologies Inc. Rule-based system and method for managing the provisioning of user applications on limited-resource and/or wireless devices
US7308717B2 (en) 2001-02-23 2007-12-11 International Business Machines Corporation System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment
RU2290767C2 (en) 2001-03-12 2006-12-27 Конинклейке Филипс Электроникс Н.В. Receiving device for protective preservation of a unit of content and reproduction device
GB2373677B (en) 2001-03-19 2005-08-10 Nokia Mobile Phones Ltd Client server system
JP3392120B2 (en) 2001-03-23 2003-03-31 任天堂株式会社 GAME DEVICE AND ITS PROGRAM
JP4691268B2 (en) 2001-05-02 2011-06-01 任天堂株式会社 Game system and game program
JP4292456B2 (en) 2001-05-02 2009-07-08 ソニー株式会社 INFORMATION PROVIDING METHOD, INFORMATION PROVIDING DEVICE, INFORMATION PROVIDING METHOD PROGRAM, AND RECORDING MEDIUM CONTAINING INFORMATION PROVIDING METHOD PROGRAM
US6976009B2 (en) 2001-05-31 2005-12-13 Contentguard Holdings, Inc. Method and apparatus for assigning consequential rights to documents and documents having such rights
JP3966375B2 (en) * 2001-06-21 2007-08-29 独立行政法人農業・食品産業技術総合研究機構 Parallel processing computation commission system via the Internet
US7130829B2 (en) 2001-06-29 2006-10-31 International Business Machines Corporation Digital rights management
US20030023427A1 (en) * 2001-07-26 2003-01-30 Lionel Cassin Devices, methods and a system for implementing a media content delivery and playback scheme
US7203310B2 (en) 2001-12-04 2007-04-10 Microsoft Corporation Methods and systems for cryptographically protecting secure content
US7197301B2 (en) 2002-03-04 2007-03-27 Telespree Communications Method and apparatus for secure immediate wireless access in a telecommunications network
US20030220142A1 (en) 2002-05-21 2003-11-27 Mark Siegel Video Game controller with display screen
US7509683B2 (en) * 2002-08-26 2009-03-24 Hewlett-Packard Development Company, L.P. System and method for authenticating digital content
DE60315679T2 (en) * 2002-09-19 2008-06-05 Research In Motion Ltd., Waterloo DEVICE AND METHOD FOR IMMEDIATE WIRELESS MESSAGE TRANSMISSION
US20040083388A1 (en) * 2002-10-25 2004-04-29 Nguyen The Vinh Method and apparatus for monitoring data packets in a packet-switched network
US7757075B2 (en) * 2002-11-15 2010-07-13 Microsoft Corporation State reference
US8131649B2 (en) 2003-02-07 2012-03-06 Igware, Inc. Static-or-dynamic and limited-or-unlimited content rights
US7322042B2 (en) * 2003-02-07 2008-01-22 Broadon Communications Corp. Secure and backward-compatible processor and secure software execution thereon
KR20100093142A (en) 2003-04-25 2010-08-24 애플 인크. Methods and system for secure network-based distribution of content
US7685254B2 (en) * 2003-06-10 2010-03-23 Pandya Ashish A Runtime adaptable search processor
US20050071640A1 (en) * 2003-09-25 2005-03-31 General Instrument Corporation Method and apparatus for authenticating data
US9131272B2 (en) * 2003-11-04 2015-09-08 Universal Electronics Inc. System and method for saving and recalling state data for media and home appliances
US20050122977A1 (en) * 2003-12-05 2005-06-09 Microsoft Corporation Efficient download mechanism for devices with limited local storage
US7940932B2 (en) * 2004-04-08 2011-05-10 Texas Instruments Incorporated Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
US8908699B2 (en) 2004-04-16 2014-12-09 Broadcom Corporation Providing automatic format conversion via an access gateway in a home
KR100636169B1 (en) * 2004-07-29 2006-10-18 삼성전자주식회사 Method for transmitting content which is processed by various DRM System, and the method for reproducing the contents
KR100694064B1 (en) * 2004-10-08 2007-03-12 삼성전자주식회사 Method and Apparatus for converting DRM
US8332653B2 (en) * 2004-10-22 2012-12-11 Broadcom Corporation Secure processing environment
US7869593B2 (en) 2005-01-07 2011-01-11 First Data Corporation Software for providing based on shared knowledge public keys having same private key
US20060236122A1 (en) 2005-04-15 2006-10-19 Microsoft Corporation Secure boot
US7337147B2 (en) * 2005-06-30 2008-02-26 Microsoft Corporation Dynamic digital content licensing
WO2007004219A2 (en) * 2005-07-04 2007-01-11 Discretix Technologies Ltd. System, device and method of verifying that a code is executed by a processor
US20070067826A1 (en) * 2005-09-19 2007-03-22 Texas Instruments Incorporated Method and system for preventing unsecure memory accesses
US8959339B2 (en) 2005-12-23 2015-02-17 Texas Instruments Incorporated Method and system for preventing unauthorized processor mode switches
EP1916598A1 (en) * 2006-10-23 2008-04-30 Nagravision S.A. Method for loading and managing an application in a mobile equipment item
US20080275750A1 (en) 2007-05-04 2008-11-06 Credit Suisse Securities (Usa) Llc Method and system for processing and communicating corporate action events

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715398A (en) * 1989-06-16 1998-02-03 R.R. Donnelley & Sons Company System for distributing items from an origin to a plurality of destinations
US5238250A (en) * 1990-01-10 1993-08-24 Bung Electronic Engineering Company Computer game control apparatus
US5261069A (en) * 1990-08-13 1993-11-09 Hewlett-Packard Company Method of maintaining consistency of cached data in a database system
US5367698A (en) * 1991-10-31 1994-11-22 Epoch Systems, Inc. Network file migration system
US5404505A (en) * 1991-11-01 1995-04-04 Finisar Corporation System for scheduling transmission of indexed and requested database tiers on demand at varying repetition rates
US5400402A (en) * 1993-06-07 1995-03-21 Garfinkle; Norton System for limiting use of down-loaded video-on-demand data
US5528513A (en) * 1993-11-04 1996-06-18 Digital Equipment Corp. Scheduling and admission control policy for a continuous media server
US5610839A (en) * 1994-10-07 1997-03-11 Itt Corporation Communications management system architecture
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US20010014882A1 (en) * 1994-11-23 2001-08-16 Stefik Mark J. System for controlling the distribution and use of digital works using digital tickets
US5818512A (en) * 1995-01-26 1998-10-06 Spectravision, Inc. Video distribution system
US5867223A (en) * 1995-07-17 1999-02-02 Gateway 2000, Inc. System for assigning multichannel audio signals to independent wireless audio output devices
US5815662A (en) * 1995-08-15 1998-09-29 Ong; Lance Predictive memory caching for media-on-demand systems
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5829046A (en) * 1995-10-27 1998-10-27 Emc Corporation On-line tape backup using an integrated cached disk array
US5903723A (en) * 1995-12-21 1999-05-11 Intel Corporation Method and apparatus for transmitting electronic mail attachments with attachment references
US5781901A (en) * 1995-12-21 1998-07-14 Intel Corporation Transmitting electronic mail attachment over a network using a e-mail page
US5933498A (en) * 1996-01-11 1999-08-03 Mrj, Inc. System for controlling access and distribution of digital property
US5913039A (en) * 1996-01-19 1999-06-15 Matsushita Electric Industrial Co., Ltd. Video on demand system with a transmission schedule table in the video server including entries for client identifiers, video titles, and reproduction start times
US6259471B1 (en) * 1996-03-14 2001-07-10 Alcatel Apparatus and service for transmitting video data
US5905860A (en) * 1996-03-15 1999-05-18 Novell, Inc. Fault tolerant electronic licensing system
US5790170A (en) * 1996-04-19 1998-08-04 Sony Corporation Two-way information transmission system and two-way information transmission method
US5809242A (en) * 1996-04-19 1998-09-15 Juno Online Services, L.P. Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system
US6219708B1 (en) * 1996-05-30 2001-04-17 Multi-Tech Systems, Inc. System for network resource management
US6212657B1 (en) * 1996-08-08 2001-04-03 Nstreams Technologies, Inc. System and process for delivering digital data on demand
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6032200A (en) * 1996-09-30 2000-02-29 Apple Computer, Inc. Process scheduling for streaming data through scheduling of disk jobs and network jobs and the relationship of the scheduling between these types of jobs
US6016348A (en) * 1996-11-27 2000-01-18 Thomson Consumer Electronics, Inc. Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
US6185625B1 (en) * 1996-12-20 2001-02-06 Intel Corporation Scaling proxy server sending to the client a graphical user interface for establishing object encoding preferences after receiving the client's request for the object
US6049821A (en) * 1997-01-24 2000-04-11 Motorola, Inc. Proxy host computer and method for accessing and retrieving information between a browser and a proxy
US6205475B1 (en) * 1997-02-26 2001-03-20 William Michael Pitts Request interceptor in network nodes for determining local storage of file image satisfying predetermined criteria
US6557104B2 (en) * 1997-05-02 2003-04-29 Phoenix Technologies Ltd. Method and apparatus for secure processing of cryptographic keys
US5983227A (en) * 1997-06-12 1999-11-09 Yahoo, Inc. Dynamic page generator
US6219680B1 (en) * 1997-06-19 2001-04-17 International Business Machines Corporation System and method for building a web site for use in E-commerce with user specific pricing
US6637029B1 (en) * 1997-07-03 2003-10-21 Nds Limited Intelligent electronic program guide
US6038601A (en) * 1997-07-21 2000-03-14 Tibco, Inc. Method and apparatus for storing and delivering documents on the internet
US6085193A (en) * 1997-09-29 2000-07-04 International Business Machines Corporation Method and system for dynamically prefetching information via a server hierarchy
US6243719B1 (en) * 1997-10-20 2001-06-05 Fujitsu Limited Data caching apparatus, data caching method and medium recorded with data caching program in client/server distributed system
US6594682B2 (en) * 1997-10-28 2003-07-15 Microsoft Corporation Client-side system for scheduling delivery of web content and locally managing the web content
US6289452B1 (en) * 1997-11-07 2001-09-11 Cybersource Corporation Method and system for delivering digital products electronically
US6571279B1 (en) * 1997-12-05 2003-05-27 Pinpoint Incorporated Location enhanced information delivery system
US20020032784A1 (en) * 1998-03-25 2002-03-14 Community Learning And Information Network Computer architecture for managing courseware in a shared use operating environment
US6141756A (en) * 1998-04-27 2000-10-31 Motorola, Inc. Apparatus and method of reading a program into a processor
US6148340A (en) * 1998-04-30 2000-11-14 International Business Machines Corporation Method and system for differencing container files
US6256637B1 (en) * 1998-05-05 2001-07-03 Gemstone Systems, Inc. Transactional virtual machine architecture
US6389460B1 (en) * 1998-05-13 2002-05-14 Compaq Computer Corporation Method and apparatus for efficient storage and retrieval of objects in and from an object storage device
US6052720A (en) * 1998-05-14 2000-04-18 Sun Microsystems, Inc. Generic schema for storing configuration information on a server computer
US6510502B1 (en) * 1998-05-14 2003-01-21 Kabushiki Kaisha Sega Enterprises Information processing device and method for reading information recorded on an information recording medium
US6427238B1 (en) * 1998-05-29 2002-07-30 Opentv, Inc. Module manager for interactive television system
US6480883B1 (en) * 1998-06-30 2002-11-12 Kabushiki Kaisha Toshiba Real-time information transmission system
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6412011B1 (en) * 1998-09-14 2002-06-25 At&T Corp. Method and apparatus to enhance a multicast information stream in a communication network
US6338050B1 (en) * 1998-11-16 2002-01-08 Trade Access, Inc. System and method for providing and updating user supplied context for a negotiations system
US6574605B1 (en) * 1998-11-17 2003-06-03 Citibank, N.A. Method and system for strategic services enterprise workload management
US6377972B1 (en) * 1999-01-19 2002-04-23 Lucent Technologies Inc. High quality streaming multimedia
US20020161673A1 (en) * 1999-01-27 2002-10-31 International Business Machines Corporation Aggregating and analyzing information about content requested in an e-commerce web environment to determine conversion rates
US6412008B1 (en) * 1999-01-28 2002-06-25 International Business Machines Corporation System and method for cooperative client/server customization of web pages
US6321209B1 (en) * 1999-02-18 2001-11-20 Wired Solutions, Llc System and method for providing a dynamic advertising content window within a window based content manifestation environment provided in a browser
US6691312B1 (en) * 1999-03-19 2004-02-10 University Of Massachusetts Multicasting video
US6873975B1 (en) * 1999-04-06 2005-03-29 Fujitsu Limited Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
US6920567B1 (en) * 1999-04-07 2005-07-19 Viatech Technologies Inc. System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
US6704797B1 (en) * 1999-06-10 2004-03-09 International Business Machines Corporation Method and system for distributing image-based content on the internet
US6446113B1 (en) * 1999-07-19 2002-09-03 Groove Networks, Inc. Method and apparatus for activity-based collaboration by a computer system equipped with a dynamics manager
US6526581B1 (en) * 1999-08-03 2003-02-25 Ucentric Holdings, Llc Multi-service in-home network with an open interface
US6993557B1 (en) * 1999-10-25 2006-01-31 Broadon Communications Corp. Creation of customized web pages for use in a system of dynamic trading of knowledge, goods and services
US6675350B1 (en) * 1999-11-04 2004-01-06 International Business Machines Corporation System for collecting and displaying summary information from disparate sources
US6606644B1 (en) * 2000-02-24 2003-08-12 International Business Machines Corporation System and technique for dynamic information gathering and targeted advertising in a web based model using a live information selection and analysis tool
US6901386B1 (en) * 2000-03-31 2005-05-31 Intel Corporation Electronic asset lending library method and apparatus
US20020016818A1 (en) * 2000-05-11 2002-02-07 Shekhar Kirani System and methodology for optimizing delivery of email attachments for disparate devices
US20020059384A1 (en) * 2000-07-13 2002-05-16 Koninklijke Philips Electronics N.V. Substituting URL for attachment in forwarding electronic content
US6805629B1 (en) * 2000-09-13 2004-10-19 Casino Data System Gaming device and method
US6785712B1 (en) * 2000-09-21 2004-08-31 Rockwell Collins, Inc. Airborne e-mail data transfer protocol
US20020160833A1 (en) * 2000-10-25 2002-10-31 Lloyd David B. Adapting a game state to be compatible with a new version of a game
US20020085720A1 (en) * 2000-12-01 2002-07-04 Masahiro Okada Game apparatus managing system, game apparatus, controlling method, computer program and recording medium
US20020116615A1 (en) * 2000-12-07 2002-08-22 Igt Secured virtual network in a gaming environment
US20020071557A1 (en) * 2000-12-07 2002-06-13 Nguyen Binh T. Secured virtual network in a gaming environment
US7092953B1 (en) * 2000-12-28 2006-08-15 Rightlsline, Inc. Apparatus and methods for intellectual property database navigation
US20020138764A1 (en) * 2001-02-01 2002-09-26 Jacobs Bruce A. System and method for an automatic license facility
US20020169974A1 (en) * 2001-03-01 2002-11-14 Microsoft Corporation Detecting and responding to a clock rollback in a digital rights management system on a computing device
US20020165022A1 (en) * 2001-03-27 2002-11-07 Akira Hiraoka Game module adding service system
US20020162115A1 (en) * 2001-04-25 2002-10-31 Bruckner John Anthony System and method for monitoring and recovering the state of user participation in interactive broadcasts
US6466048B1 (en) * 2001-05-23 2002-10-15 Mosaid Technologies, Inc. Method and apparatus for switchably selecting an integrated circuit operating mode
US20030023564A1 (en) * 2001-05-31 2003-01-30 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US20050004875A1 (en) * 2001-07-06 2005-01-06 Markku Kontio Digital rights management in a mobile communications environment
US20030028622A1 (en) * 2001-08-06 2003-02-06 Mitsuhiro Inoue License management server, terminal device, license management system and usage restriction control method
US20030114227A1 (en) * 2001-10-10 2003-06-19 Rubin Jason Pehr System and method for saving game data
US20030144869A1 (en) * 2001-11-20 2003-07-31 Contentguard Holdings, Inc. Extensible rights expression processing system
US20030182142A1 (en) * 2001-11-20 2003-09-25 Contentguard Holdings, Inc. Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
US20030120541A1 (en) * 2001-12-21 2003-06-26 Siann Jonathan I. Storage and delivery of electronic media content with advertising
US20030157985A1 (en) * 2002-02-19 2003-08-21 Koninklijke Philips Electronics N.V. Virtual IPR system in electronic game environment
US20040015426A1 (en) * 2002-03-14 2004-01-22 Bijan Tadayon System and method for expressing usage rights with sound signals
US20040102987A1 (en) * 2002-03-29 2004-05-27 Eiji Takahashi Content reproduction apparatus and content reproduction control method
US20040098610A1 (en) * 2002-06-03 2004-05-20 Hrastar Scott E. Systems and methods for automated network policy exception detection and correction
US20040098297A1 (en) * 2002-06-27 2004-05-20 Borthwick Alvin J. System for managing requests and method of managing requests
US20040044901A1 (en) * 2002-08-30 2004-03-04 Serkowski Robert J. License file serial number tracking
US20040054923A1 (en) * 2002-08-30 2004-03-18 Seago Tom E. Digital rights and content management system and method for enhanced wireless provisioning
US20060031222A1 (en) * 2002-12-19 2006-02-09 Uwe Hannsmann Method for providing of content data to a client

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9646142B2 (en) 2003-02-07 2017-05-09 Acer Cloud Technology Inc. Ensuring authenticity in a closed content distribution system
US10263774B2 (en) 2003-02-07 2019-04-16 Acer Cloud Technology, Inc. Ensuring authenticity in a closed content distribution system
US9985781B2 (en) 2003-02-07 2018-05-29 Acer Cloud Technology, Inc. Ensuring authenticity in a closed content distribution system
US20090019154A1 (en) * 2005-05-13 2009-01-15 Yahoo! Inc. Enabling rent/buy redirection in invitation to an online service
US7587502B2 (en) * 2005-05-13 2009-09-08 Yahoo! Inc. Enabling rent/buy redirection in invitation to an online service
US8108515B2 (en) 2005-05-13 2012-01-31 Yahoo! Inc. Enabling rent/buy redirection in invitation to an online service
US20060258461A1 (en) * 2005-05-13 2006-11-16 Yahoo! Inc. Detecting interaction with an online service
US20060258460A1 (en) * 2005-05-13 2006-11-16 Yahoo! Inc. Enabling rent/buy redirection in invitation to an online service
US10733271B2 (en) 2006-05-02 2020-08-04 Acer Cloud Technology, Inc. Systems and methods for facilitating secure streaming of electronic gaming content
US20080271165A1 (en) * 2007-04-27 2008-10-30 Microsoft Corporation Parameter-based interpretation of drm license policy
US8046838B1 (en) * 2007-04-30 2011-10-25 Hewlett-Packard Development Company, L.P. Using a modulation transfer function of a device to create digital content for the device
US20100041457A1 (en) * 2008-08-14 2010-02-18 Valve Corporation Overlaying interactive video game play with real-time chat sessions with game switching
US9700791B2 (en) 2008-08-14 2017-07-11 Valve Corporation Overlaying interactive video game play with real-time chat sessions with game switching
US20100312810A1 (en) * 2009-06-09 2010-12-09 Christopher Horton Secure identification of music files

Also Published As

Publication number Publication date
US20050273438A1 (en) 2005-12-08
CN1879112A (en) 2006-12-13
US20050038753A1 (en) 2005-02-17
US20090150293A1 (en) 2009-06-11
WO2005045644A2 (en) 2005-05-19
US7464058B2 (en) 2008-12-09
JP4875493B2 (en) 2012-02-15
EP1680761B1 (en) 2018-03-14
JP2007510991A (en) 2007-04-26
US8131649B2 (en) 2012-03-06
EP1680761A4 (en) 2010-11-24
EP1680761A2 (en) 2006-07-19
WO2005045644A3 (en) 2005-08-11

Similar Documents

Publication Publication Date Title
US7464058B2 (en) System and method for generating new licenses
RU2541879C2 (en) Trusted entity based anti-cheating mechanism
US9246916B2 (en) Specifying rights in a digital rights license according to events
CN1333314C (en) Software execution control system and software execution control program
US7134144B2 (en) Detecting and responding to a clock rollback in a digital rights management system on a computing device
US7380275B2 (en) Secure and backward-compatible processor and secure software execution thereon
KR101081729B1 (en) Reprogrammable security for controlling piracy and enabling interactive content
Honick Software piracy exposed
US7779482B1 (en) Delivery of license information using a short messaging system protocol in a closed content distribution system
KR20110106849A (en) Method and system for controling code execution on a computing device using recursive security protocol
US20230086191A1 (en) Systems and Methods for Token Content Unlocking, Biometric Authentication using Privacy-Protecting Tokens, Ownership-Based Limitations of Content Access, Policy-Based Time Capsule Technology, and Content Lock Mechanisms
US20230100422A1 (en) Systems and Methods for Transaction Management in NFT-Directed Environments
US20230394469A1 (en) Systems and Methods for Instant NFTs and Protection Structure, Detection of Malicious Code within Blockchain Smart Contracts, Tokens with Transfer Limitations, Mirror Tokens and Parallel Addresses, Smart Contract Risk Scoring Method, and Cross-Device Digital Rights Management
US20230129900A1 (en) Systems and Methods for Protecting Against Token-Based Malicious Scripts
US20230043223A1 (en) Methods for Securely Adding Data to a Blockchain Using Dynamic Time Quanta and Version Authentication
KR100958427B1 (en) method of managing content data playing and system thereof
WO2023049908A1 (en) Systems and methods for transaction management in nft-directed environments
Jaakkola et al. Detecting piracy in standalone and network licensing systems
Schmalensee David S. Evans Franklin M. Fisher Daniel L. Rubinfeld
Groot IT-based risks in advergame campaigns: a focus on fairness and privacy
Becker et al. The Present and Future of Digital Rights Management
Pattrick et al. A secure digital asset managment network for game development and education
Saarinen et al. Nonius: Implementing a DRM System
Mjörner et al. Alternative methods of financing software: Replacing illegal copying with free copying
DOA Be More Secure

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION