The present invention facilitates convenient and secure distribution of proprietary content. A present secure content enabled drive system and method permits flexible use of storage medium for both protected distribution of information and user definable storage use. In one embodiment, a computer readable storage medium includes an unprotected information portion, a protected information portion and a protection interface. The unprotected portion stores unprotected information. The protected content portion stores protected information. The protection interface protects information in the protected content portion from unauthorized access.

Patent
   RE47772
Priority
Aug 02 2004
Filed
Mar 19 2015
Issued
Dec 17 2019
Expiry
Aug 02 2024
Assg.orig
Entity
Large
3
138
currently ok
8. A content protected storage medium method comprising:
partitioning a reprogrammable non-transitory storage medium into a protected portion and an unprotected portion;
storing content in said protected portion wherein said protected portion resides on a host protection area which is restricted to access by a trusted device, wherein said computer readable storage medium is an advanced technology attachment-5 (ATA-5) hard disk drive and each file on said protected portion of said ATA-5 hard disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized; and
loading a protection interface onto said storage medium, wherein said protection interface prevents unauthorized access to said content stored in said protected portion and marks an unlocked file with an indicator to prevent access by an untrusted machine, wherein said indicator is forwarded with said unlocked protected information to said trusted device.
1. A reprogrammable non-transitory computer readable storage medium comprising:
an unprotected portion for storage of unprotected information;
a protected information portion for storing protected information, wherein said protected information portion resides on a host protection area which is restricted to access by a trusted device, wherein said computer readable storage medium is an advanced technology attachment-5 (ATA-5) hard disk drive and each file on said protected information portion of said ATA-5 hard disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized; and
a protection interface for protecting information in said protected information portion, wherein said protection interface engages in a trusted device verification protocol that verifies identification information is associated with said trusted device and marks unlocked protected information to prevent access by an untrusted machine, wherein said mark is forwarded with said unlocked protected information to said trusted device.
14. A secure content enabled disk access system comprising:
a secure content enabled disk, wherein said secure content enabled disk is partitioned into a protected portion and unprotected portion and said secure content enabled disk includes a protection interface for limiting access to proprietary content stored in said protected portion, wherein said secure content enabled disk is an advanced technology attachment-5 (ATA-5) hard disk drive, wherein said protected portion stores secure content including protected information, wherein said protected portion resides on a host protection area which is restricted to access by a trusted device, wherein each file on a protected portion of said secure content enabled disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized,
wherein said protection interface permits authorized access to said protected content via a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion; and
a processor for executing instructions, including instructions associated with interacting with said protection interface and accessing said proprietary content.
0. 18. A computer readable storage medium comprising:
an unprotected portion for storage of unprotected information;
a protected information portion for storing protected information, wherein said protected information portion resides on a host protection area which is restricted to access by a trusted device in accordance with a digital rights indicator; and
a protection interface for protecting information in said protected information portion, wherein said protection interface is operable to engage in a trusted device verification protocol that verifies identification information is associated with said trusted device and said protection interface is also operable to engage in a secure content enabled drive digital rights revision process, wherein said secure content enabled drive digital rights revision process comprises:
participating in establishing a communication link for communicating a digital rights indicator to a remote device;
engaging in a digital rights indicator revision authorization process for revising digital rights to a secure content enabled drive including a protected storage portion and a protection interface, wherein said protection interface is a micro kernel and prevents unauthorized read and write access to content stored in said protected storage portion; and
forwarding a revised digital rights indicator for said secure content enabled drive device if said digital rights indicator revision authorization process is successful.
0. 2. A computer readable storage medium of claim 1 wherein said protection interface permits seamless and intuitive interaction between said authorized information in said protected content and said unprotected information.
3. The computer readable storage medium of claim 1 wherein said protection interface is a micro kernel and participates in a process to unlock said protected information.
4. The computer readable storage medium of claim 1 wherein said protection interface includes instructions that direct a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion.
5. The computer readable storage medium of claim 1 wherein said protection interface includes a digital rights registry key that is utilized to track digital rights to said protected content.
6. The computer readable storage medium of claim 1 wherein said protection portion includes its own partition and encrypted file system.
7. The computer readable storage medium of claim 1 wherein said protection interface includes instructions for participating in said trusted device verification protocol.
9. A content protected storage medium method of claim 8 further comprising encrypting said content in said protected portion.
10. A content protected storage medium method of claim 8 further comprising decrypting said content in said protected portion.
11. A content protected storage medium method of claim 8 wherein said protection interface provides operating system functions including memory management functions, hardware interaction functions, and user interface functions.
12. A content protected storage medium method of claim 8 wherein said protection interface includes instructions for unlocking and decrypting said content in said protected portion.
13. A content protected storage medium method of claim 8 wherein said protected portion interface includes instructions that direct a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion.
15. A secure content enabled disk access system of claim 14 wherein access to said protected content is limited to a trusted device.
16. A secure content enabled disk access system of claim 14 wherein said protected protection interface includes instructions for performing operating system functions, including memory management functions, hardware interaction functions, and user interface functions.
17. A secure content enabled disk access system of claim 14 wherein said processor is graphics processing unit.
0. 19. The computer readable storage medium of claim 18 wherein said protection interface is a micro kernel and participates in a process to unlock said protected information.
0. 20. The computer readable storage medium of claim 18 wherein said protection interface provides operating system functions including memory management functions, hardware interaction functions, and user interface functions.
0. 21. The computer readable storage medium of claim 18 wherein said protection interface includes a digital rights registry key that is utilized to track digital rights to said protected content.
0. 22. The computer readable storage medium of claim 18 wherein protection interface includes instructions for participating in trusted device verification protocol.
0. 23. The computer readable storage medium of claim 18 wherein each file on a protected portion of a drive is encrypted in a two-pass encryption comprising:
a first pass encryption using a real-time decrypt able algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized.
0. 24. The computer readable storage medium of claim 18 wherein said protection interface includes instructions for unlocking and decrypting said content in said protected portion.
0. 25. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said participating in establishing said communication link includes receiving a request for said revised digital rights indicator.
0. 26. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said digital rights indicator revision authorization process comprises:
verifying a request for said revised digital rights indicator is from a valid requester;
determining if said valid requester has successfully completed a digital rights purchase process; and
creating a registry key corresponding to purchased digital access rights if said valid requester has successfully completed a digital rights purchase process.
0. 27. The computer readable storage medium of claim 26, including said secure content enabled drive digital rights revision process, wherein said valid requester is a trusted machine.
0. 28. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said communication link is establish on the Internet.

The present invention relates to the field of , and 297 communicate information. Central processor 201 processes information. Main memory 202 stores information and instructions for the central processor 201. Removable protected data storage device 204 is a protected information storage medium (e.g., similar to protected information storage medium 100) and stores protected information (e.g., functioning as a large reservoir of protected content). Computer system 200 is utilized to present (e.g., display) authorized information from removable protected data storage device 201. Input device 206 207 provides a mechanism for inputting information and/or for pointing to or highlighting information on display 220. Signal communication port 208 provides a communication interface to exterior devices (e.g., an interface with a network). Display device 220 displays information in accordance with data stored in frame buffer 215. Graphics processor 211 processes graphics commands from central processor 201 and provides the resulting data to graphics buffers 215 for storage and retrieval by display monitor 220. In one embodiment, a graphics processor can present information from removable protected data storage device 204 utilizing a micro operating system of a protection interface included in removable protected data storage device 204 (e.g., without reliance on central processor or other operating system).

FIG. 3 is a flow chart of content protected storage medium creation method 300 in accordance with one embodiment of the present invention. Content protected storage medium creation method 300 creates a protected storage medium (e.g., a secure content enabled disk). In one embodiment, a significant amount of proprietary content is loaded on a protected portion of a secure content enabled disk. The proprietary content is protected from unauthorized access by a protection interface included in the secure content enable disk.

In step 310, a storage medium is partitioned into protected and unprotected portions. In one embodiment of the present invention, a hard disk is partitioned to reserve a percentage of available storage space for protected content and a percentage of available storage space for unprotected content. In one exemplary implementation, a portion of the storage locations are reserved for a protection interface. The portion of memory reserved for the protection interface can be a read only portion.

At step 320, content is stored in the protected portion. In one embodiment, a variety of proprietary content is stored in the protected portion. For example, movies, songs, video games and other entertainment content can be stored in the protected portion. A variety of different proprietary content can be “bundled” for convenient distribution on a single storage medium (e.g., hard disk).

In step 330, a protection interface is loaded onto the storage medium, wherein the protection interface prevents unauthorized access to the content stored in the protected portion. In one embodiment, the protected interface also provides operating system functions including memory management functions (e.g., maintains organization of files, directories, etc.), hardware interaction functions (e.g., control a disk drive, printer, etc.), and user interface functions. The protected portion interface can include instructions for providing a unified look and feel graphical user interface (GUI) with content indicators corresponding to permissible content stored in the protected content portion.

In one embodiment of the present invention, content is locked when it is loaded in the protected portion. The content can also be encrypted in the protected portion. Instructions are included in the protection interface for authorized unlocking and decrypting the content in the protected portion. In addition an unlocked file can be marked to prevent access by an untrusted machine.

FIG. 4A is a flow chart of digital rights management method 400 in accordance with one embodiment of the present invention. Digital rights management method 400 is utilized to establish and modify digital rights to access information included in a protected portion of a protected storage medium (e.g., protected storage medium 100). For example, digital rights management method 400 can be utilized to control access to distributed proprietary content loaded on a SCED.

In step 410, a protected storage medium (e.g., a secure content enabled drive) is created with protected storage locations and unprotected storage locations. In one embodiment, creating a secure content enabled drive includes performing a content protected storage medium creation method (e.g., content protected storage medium creation method 300). For example, a storage medium is partitioned into protected and unprotected portions, proprietary content is stored in the protected portion, and a protection interface is loaded onto the storage medium. The protection interface prevents unauthorized access to the content stored in the protected portion. In one exemplary implementation, a content protected storage medium similar to content protected storage medium 100 is created.

Initial digital rights authorization to access secure content stored in the protected storage locations are established in step 420. In one embodiment, establishing initial digital rights authorization includes storing a digital rights indicator on the protected storage medium, wherein the digital rights indicator indicates digital rights to access information stored in the protected storage locations. The digital rights indicator can indicate certain files within the protected storage area are accessible via the protection interface and certain files are not accessible. In one embodiment, the secure content includes movies, songs and/or video games and a digital rights indicator indicates which movies, songs and/or video games are accessible. For example, a SCED is loaded with a variety of songs from a plurality of categories (e.g., classical music, rock and roll music, country western music, etc.) and a digital rights indicator is set to indicate a purchaser of the SCED is authorized to access a variety of songs from one category (e.g., can access classical music songs). In one exemplary implementation, the digital rights indicator is utilized in encryption and decryption of protected information (e.g., utilized as a decryption key).

In step 430, the initial digital rights authorization to access secure content stored in the protected storage locations are revised. In one embodiment, revising the initial digital rights authorization includes performing a secure content enabled drive digital rights revision process. For example, a digital rights indicator is altered to indicate a user can access a variety of songs from an additional category (e.g., a user can access both classical music songs and country western songs). In one exemplary implementation, the digital rights indicator is a registry key associated with the secure content enabled drive. The registry key can also be stored in a centralized system remote from the secure content enabled drive.

FIG. 4B is a flow chart of a digital rights management system 470 in accordance with one embodiment of the present invention. Digital rights management system 470 includes digital rights server 471, digital rights tracking system 472 (e.g., a database) and bus 473. Bus 473 is communicatively coupled to digital rights server 471 and digital rights tracking system 472. Digital rights management system 470 is communicatively coupled to secure content enabled drive 490. Secure content enabled drive 490 is removable and can be locally and remotely located. For example, secure content enabled drive 490 can be loaded with protected content locally with an initial digital rights setting and shipped to a remote end user and digital rights adjusted by communicating with digital rights management system 470.

The components of digital rights management system 470 cooperatively operate to track and modify digital rights. Digital rights server 471 executes instructions, including instructions for tracking and modifying digital rights to protected content on remote secure content enabled drive 490 with a protected storage portion and an unprotected storage portion. Digital rights tracking system 472 stores instructions and data, including instructions for tracking and modifying digital rights to protected content on a remote secure content enabled drive with a protected storage portion and an unprotected storage portion. Bus 473 communicates information between digital rights server 471 and digital rights tracking system 472.

In one embodiment, digital rights server 471 is utilized to establish initial digital rights authorization to access secure content stored in said protected storage locations. For example, digital rights server 471 creates an initial registry key for indicating digital rights to protected content on an SCED (e.g., SCED 490) and utilizes digital rights tracking system 472 to track the initial registry key information. In one exemplary implementation, digital rights tracking system 472 is a database and tracks digital rights indicators or keys. For example, digital rights tracking system 472 tracks the digital rights for each SCED and/or user. If a SCED is damaged or destroyed, a centralized record of SCED and user digital access rights is maintained. Digital rights server 471 is also utilized to perform a secure content enabled drive digital rights revision process to revise digital rights on an SCED (e.g., SCED 490).

FIG. 5 is a flow chart of secure content enabled drive digital rights revision process 500 in accordance with one embodiment. Secure content enabled drive digital rights revision process 500 facilitates alteration of digital access rights remotely. For example, if a remote user successfully completes prerequisite authorization requirements, secure content enabled drive digital rights revision process 500 provides an updated digital rights indicator permitting access to protected information via a protection interface on a protected storage medium (e.g., a SCED).

In step 510, a communication link is established for communicating a digital rights indicator to a remote protected storage medium (e.g., SCED). In one embodiment, establishing a communication link includes receiving a request for a revised digital rights indicator. For example, a digital rights server (e.g., digital rights server 471) receives a request for a revised digital rights indicator and engages in a handshaking protocol to establish a communication link. It is appreciated that the present invention is readily adaptable for utilization with a variety of communication platforms, including wired connection and/or wireless connection. The communication link can be established on the Internet.

In step 520, a digital rights indicator revision authorization process for revising digital rights to a protected storage medium (e.g., SCED) is performed. In one embodiment, the digital rights indicator revision process includes verifying a request is from a valid requester (e.g., a trusted machine). A determination is made if the valid requester has successfully completed a digital rights purchase process. A digital rights purchase process includes receiving an indication of requested protected content access, forwarding a price for the requested protected content access and determining if the price is paid. If the valid requester has successfully completed a digital rights purchase process, a digital rights indicator (e.g., registry key) corresponding to purchased digital access rights is created.

In step 530 a revised digital rights indicator is forwarded to the protected storage medium (e.g., SCED) if the digital rights indicator revision authorization process is successful. The digital rights indicator is loaded on the protected storage medium for use in authorized access to protected content included in the protected storage medium. For example, the digital rights indicator can include a sequence of bits (e.g., binary logical values) utilized as a key in unlocking and decrypting proprietary content included in a protected information portion of a protected storage medium.

It is appreciated that the present invention can be implemented in a variety of embodiments. In one exemplary implementation the present invention can be utilized in processing systems utilized to provide a variety of graphics applications including video games. For example, the present invention can be utilized to distribute content for use in a game console, personal computer, personal digital assistant, cell phone or any number of platforms for implementing a video game. It is also appreciated that references to video game application implementations are exemplary and the present invention is not limited to these implementations.

Thus, the present invention enables secure and convenient distribution of proprietary content on flexibly usable storage medium. A significant amount of proprietary information can be distributed on a protected portion of the storage medium while regulating access to the proprietary content and still enabling storage resources for discretionary utilization by an end user. In addition to protecting information in the protected information portion, seamless and intuitive authorized interaction between information the protected content and the unprotected information is permitted. A protection interface can provide a micro-operating system that permits authorized content presentation (e.g., video, audio, etc.) without requirement of another operating system.

The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.

Diamond, Michael B., White, Jonathan B., Daniell, Piers J.

Patent Priority Assignee Title
10652332, Jul 09 2018 Oracle International Corporation System, method, and apparatuses for dynamic authorization
11645384, Mar 03 2021 Bank of America Corporation System for electronic data obfuscation and protection using independent destructible data objects
12105794, Mar 03 2021 Bank of America Corporation System for electronic data obfuscation and protection using independent destructible data objects
Patent Priority Assignee Title
5237616, Sep 21 1992 International Business Machines Corporation Secure computer system having privileged and unprivileged memories
5552897, Mar 07 1994 AT&T IPM Corp Secure communication apparatus and method
5623546, Jun 23 1995 Google Technology Holdings LLC Encryption method and system for portable data
5629980, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works
5721829, May 05 1995 Microsoft Technology Licensing, LLC System for automatic pause/resume of content delivered on a channel in response to switching to and from that channel and resuming so that a portion of the content is repeated
5757911, Mar 10 1994 Mita Industrial Co., Ltd. Encryption communication process and terminal for encryption communication
5857020, Dec 04 1995 RPX CLEARINGHOUSE LLC Timed availability of secured content provisioned on a storage medium
5861906, May 05 1995 Microsoft Technology Licensing, LLC Interactive entertainment network system and method for customizing operation thereof according to viewer preferences
5880733, Apr 30 1996 Microsoft Technology Licensing, LLC Display system and method for displaying windows of an operating system to provide a three-dimensional workspace for a computer system
5973680, Feb 09 1995 NEC PERSONAL COMPUTERS, LTD Motion picture retrieval system
6005636, Mar 27 1997 SHARP KABUSHIKI KAISHA, INC System for setting user-adjustable image processing parameters in a video system
6016348, Nov 27 1996 Thomson Consumer Electronics, Inc. Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
6028585, Sep 22 1995 Lenovo PC International Screen display control method and a screen display control apparatus
6069647, Jan 29 1998 Intel Corporation Conditional access and content security method
6115819, May 26 1994 The Commonwealth of Australia Secure computer architecture
6141754, Nov 28 1997 UNILOC 2017 LLC Integrated method and system for controlling information access and distribution
6298445, Apr 30 1998 NORTONLIFELOCK INC Computer security
6314409, Nov 05 1997 HANGER SOLUTIONS, LLC System for controlling access and distribution of digital property
6367019, Mar 26 1999 Microsoft Technology Licensing, LLC Copy security for portable music players
6389538, Aug 13 1998 SANDPIPER CDN, LLC System for tracking end-user electronic content usage
6389541, May 15 1998 RPX Corporation Regulating access to digital content
6398245, Aug 13 1998 SANDPIPER CDN, LLC Key management system for digital content player
6550011, Aug 05 1998 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Media content protection utilizing public key cryptography
6580916, Sep 15 2000 ARRIS ENTERPRISES LLC Service framework for evaluating remote services based upon transport characteristics
6597380, Mar 16 1998 NEC Corporation In-space viewpoint control device for use in information visualization system
6615192, Mar 12 1999 Matsushita Electric Industrial Co., Ltd. Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer
6622148, Oct 23 1996 Viacom International Inc. Interactive video title selection system and method
6651171, Apr 06 1999 Microsoft Technology Licensing, LLC Secure execution of program code
6708161, Sep 26 2000 BLUE YONDER GROUP, INC System and method for selective database indexing
6742116, Sep 30 1998 Fujitsu Limited Security method, security software and security system for electronic communications
6748537, Nov 15 2001 Sony Corporation; SONY MUSIC ENTERTAINMENT, INC System and method for controlling the use and duplication of digital content distributed on removable media
6772335, Nov 06 1995 Xerox Corporation Multimedia coordination system
6785820, Apr 02 2002 JPMORGAN CHASE BANK, N A , AS ADMINISTRATIVE AGENT System, method and computer program product for conditionally updating a security program
6788800, Jul 25 2000 DIGIMARC CORPORATION AN OREGON CORPORATION Authenticating objects using embedded data
6807534, Oct 13 1995 DIGIMARC CORPORATION AN OREGON CORPORATION System and method for managing copyrighted electronic media
6823451, May 10 2001 MEDIATEK INC Integrated circuit for security and manageability
6832319, Apr 24 1998 International Business Machines Corporation; Intel Corporation Content guard system for copy protection of recordable media
6865555, Nov 21 2001 ARRIS ENTERPRISES LLC System and method for providing conditional access to digital content
6891953, Jun 27 2000 Microsoft Technology Licensing, LLC Method and system for binding enhanced software features to a persona
6922740, May 21 2003 TAHOE RESEARCH, LTD Apparatus and method of memory access control for bus masters
6948073, Jun 27 2001 Microsoft Technology Licensing, LLC Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
6957343, Mar 30 2001 Intel Corporation Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media
6980652, Jun 23 1999 CHEMTRON RESEARCH LLC Combination mastered and writeable medium and use in electronic internet appliance
6990513, Jun 22 2000 Microsoft Technology Licensing, LLC Distributed computing services platform
7003675, Aug 13 1999 Microsoft Technology Licensing, LLC Encrypted content data structure package and generation thereof
7007300, May 10 2001 GLOBALFOUNDRIES Inc Secure booting of a personal computer system
7010808, Aug 25 2000 Microsoft Technology Licensing, LLC Binding digital content to a portable storage device or the like in a digital rights management (DRM) system
7020688, Sep 05 2000 FINANCIAL NETWORK, INC Methods and systems for archiving and verification of electronic communications
7035827, Oct 17 2000 Sony Corporation Content receiving apparatus and method, storage medium, and server
7036020, Jul 25 2001 SECUREWAVE STORAGE SOLUTIONS INC Methods and systems for promoting security in a computer system employing attached storage devices
7043581, May 10 2001 GLOBALFOUNDRIES Inc Resource sequester mechanism
7047411, Dec 17 1999 Microsoft Technology Licensing, LLC Server for an electronic distribution system and method of operating same
7065216, Aug 13 1999 Microsoft Technology Licensing, LLC Methods and systems of protecting digital content
7065506, Nov 19 1999 Rovi Solutions Corporation Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device
7065651, Jan 16 2002 Microsoft Technology Licensing, LLC Secure video card methods and systems
7069449, Aug 03 2000 Itech Group, Inc. Method and system for encrypting and storing content to a user
7073071, Mar 31 2000 Intel Corporation Platform and method for generating and utilizing a protected audit log
7093298, Aug 30 2001 UNILOC 2017 LLC Apparatus and method for security object enhancement and management
7095853, Feb 24 2000 RPX Corporation System and method for preventing an illegal copy of contents
7107462, Jun 16 2000 MIH Technology Holdings BV Method and system to store and distribute encryption keys
7111169, Mar 29 2001 Intel Corporation Method and apparatus for content protection across a source-to-destination interface
7120250, Sep 09 2002 Sony Corporation; Sony Electronics INC Content distribution for multiple digital rights management
7120868, May 30 2002 Microsoft Technology Licensing, LLC System and method for adaptive document layout via manifold content
7139811, Aug 01 2001 Cisco Technology, Inc Double-proxy remote data access system
7150031, Jun 09 2000 SYNAMEDIA LIMITED System and method for reminders of upcoming rentable media offerings
7152047, May 24 2000 ESECURE BIZ, INC System and method for production and authentication of original documents
7155733, Jun 09 2000 SYNAMEDIA LIMITED System and method for expiration reminders of rentable media offerings
7159120, Nov 19 2001 Google Technology Holdings LLC Method and system for protecting data within portable electronic devices
7181016, Jan 27 2003 Microsoft Technology Licensing, LLC Deriving a symmetric key from an asymmetric key for file encryption or decryption
7191153, Sep 10 1999 CHEMTRON RESEARCH LLC Content distribution method and apparatus
7197648, Jan 16 2002 Microsoft Technology Licensing, LLC Secure video card methods and systems
7200593, Jan 11 2002 NS SOLUTIONS CORPORATION Document management system
7216372, Nov 19 2002 Disposable protector for the seat ring or upper part of a toilet
7225333, Mar 27 1999 Microsoft Technology Licensing, LLC Secure processor architecture for use with a digital rights management (DRM) system on a computing device
7225340, Feb 20 2001 MAXELL, LTD Digital copying method and storage device for digital content
7228427, Dec 16 2002 MIH Technology Holdings BV Method and system to securely distribute content via a network
7242771, Jun 26 2002 MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD Contents management system
7299209, Oct 18 2001 Rovi Solutions Corporation Method, apparatus and system for securely providing material to a licensee of the material
7340056, Oct 11 2002 MAGNOLIA LICENSING LLC Remote deactivation of decoders for accessing multimedia digital data
7353543, Jan 10 2003 Panasonic Corporation Contents distribution system
7370205, Aug 01 2002 Sony Corporation Content distribution system, content distribution method and terminal device
7370364, Jul 31 2000 ELLACOYA NETWORKS, LLC Managing content resources
7376624, Feb 27 2002 IMAGINEER SOFTWARE, INC Secure communication and real-time watermarking using mutating identifiers
7383205, Mar 27 1999 Microsoft Technology Licensing, LLC Structure of a digital content package
7395333, May 09 2000 Oracle America, Inc Method and apparatus to obtain negotiated service advertisement
7395438, Apr 16 2002 Microsoft Technology Licensing, LLC Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
7536386, Mar 27 2003 Microsoft Technology Licensing, LLC System and method for sharing items in a computer system
7543160, Sep 03 2004 Malikie Innovations Limited System and method for generating a secure state indicator on a display
7549044, Oct 28 2003 HANGER SOLUTIONS, LLC Block-level storage device with content security
7606818, Dec 20 2006 SAP SE Method and apparatus for aggregating change subscriptions and change notifications
7606918, Apr 27 2004 Microsoft Technology Licensing, LLC Account creation via a mobile device
7607024, Aug 01 2003 KONINKLIJKE PHILIPS ELECTRONCS, N V Record carrier comprising encryption indication information
7644446, Oct 23 2003 Microsoft Technology Licensing, LLC Encryption and data-protection for content on portable medium
7689510, Sep 07 2000 Rovi Technologies Corporation Methods and system for use in network management of content
7716746, Mar 05 2002 SANYO ELECTRIC CO , LTD ; Sharp Kabushiki Kaisha; Fujitsu Limited Data storing device for classified data
7933409, Mar 09 2004 Panasonic Corporation Content playback device
20010020274,
20010021926,
20020002468,
20020012432,
20020077986,
20020077992,
20020099663,
20030061477,
20030097655,
20030108199,
20030140228,
20030149989,
20030152364,
20030161473,
20030215091,
20030225796,
20030229845,
20040015426,
20040083366,
20040133794,
20040133803,
20040148523,
20040193902,
20050008130,
20050025312,
20050058291,
20050086478,
20050091511,
20050111663,
20050119967,
20050132179,
20050289076,
20060005257,
20060064605,
20060149567,
20060190621,
20060224902,
20070033419,
20070192111,
20070208992,
20080148063,
20080178081,
/
Executed onAssignorAssigneeConveyanceFrameReelDoc
Mar 19 2015Nvidia Corporation(assignment on the face of the patent)
Date Maintenance Fee Events
Aug 20 2020M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Nov 04 2024REM: Maintenance Fee Reminder Mailed.


Date Maintenance Schedule
Dec 17 20224 years fee payment window open
Jun 17 20236 months grace period start (w surcharge)
Dec 17 2023patent expiry (for year 4)
Dec 17 20252 years to revive unintentionally abandoned end. (for year 4)
Dec 17 20268 years fee payment window open
Jun 17 20276 months grace period start (w surcharge)
Dec 17 2027patent expiry (for year 8)
Dec 17 20292 years to revive unintentionally abandoned end. (for year 8)
Dec 17 203012 years fee payment window open
Jun 17 20316 months grace period start (w surcharge)
Dec 17 2031patent expiry (for year 12)
Dec 17 20332 years to revive unintentionally abandoned end. (for year 12)