The present invention facilitates convenient and secure distribution of proprietary content. A present secure content enabled drive system and method permits flexible use of storage medium for both protected distribution of information and user definable storage use. In one embodiment, a computer readable storage medium includes an unprotected information portion, a protected information portion and a protection interface. The unprotected portion stores unprotected information. The protected content portion stores protected information. The protection interface protects information in the protected content portion from unauthorized access.
|
8. A content protected storage medium method comprising:
partitioning a reprogrammable non-transitory storage medium into a protected portion and an unprotected portion;
storing content in said protected portion wherein said protected portion resides on a host protection area which is restricted to access by a trusted device, wherein said computer readable storage medium is an advanced technology attachment-5 (ATA-5) hard disk drive and each file on said protected portion of said ATA-5 hard disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized; and
loading a protection interface onto said storage medium, wherein said protection interface prevents unauthorized access to said content stored in said protected portion and marks an unlocked file with an indicator to prevent access by an untrusted machine, wherein said indicator is forwarded with said unlocked protected information to said trusted device.
1. A reprogrammable non-transitory computer readable storage medium comprising:
an unprotected portion for storage of unprotected information;
a protected information portion for storing protected information, wherein said protected information portion resides on a host protection area which is restricted to access by a trusted device, wherein said computer readable storage medium is an advanced technology attachment-5 (ATA-5) hard disk drive and each file on said protected information portion of said ATA-5 hard disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized; and
a protection interface for protecting information in said protected information portion, wherein said protection interface engages in a trusted device verification protocol that verifies identification information is associated with said trusted device and marks unlocked protected information to prevent access by an untrusted machine, wherein said mark is forwarded with said unlocked protected information to said trusted device.
14. A secure content enabled disk access system comprising:
a secure content enabled disk, wherein said secure content enabled disk is partitioned into a protected portion and unprotected portion and said secure content enabled disk includes a protection interface for limiting access to proprietary content stored in said protected portion, wherein said secure content enabled disk is an advanced technology attachment-5 (ATA-5) hard disk drive, wherein said protected portion stores secure content including protected information, wherein said protected portion resides on a host protection area which is restricted to access by a trusted device, wherein each file on a protected portion of said secure content enabled disk drive is encrypted in a special a two pass two-pass encryption comprising:
a first pass encryption using a real-time decryptable algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized,
wherein said protection interface permits authorized access to said protected content via a unified look and feel graphical user interface with content indicators corresponding to permissible content stored in said protected content portion; and
a processor for executing instructions, including instructions associated with interacting with said protection interface and accessing said proprietary content.
0. 18. A computer readable storage medium comprising:
an unprotected portion for storage of unprotected information;
a protected information portion for storing protected information, wherein said protected information portion resides on a host protection area which is restricted to access by a trusted device in accordance with a digital rights indicator; and
a protection interface for protecting information in said protected information portion, wherein said protection interface is operable to engage in a trusted device verification protocol that verifies identification information is associated with said trusted device and said protection interface is also operable to engage in a secure content enabled drive digital rights revision process, wherein said secure content enabled drive digital rights revision process comprises:
participating in establishing a communication link for communicating a digital rights indicator to a remote device;
engaging in a digital rights indicator revision authorization process for revising digital rights to a secure content enabled drive including a protected storage portion and a protection interface, wherein said protection interface is a micro kernel and prevents unauthorized read and write access to content stored in said protected storage portion; and
forwarding a revised digital rights indicator for said secure content enabled drive device if said digital rights indicator revision authorization process is successful.
0. 2. A computer readable storage medium of
3. The computer readable storage medium of
4. The computer readable storage medium of
5. The computer readable storage medium of
6. The computer readable storage medium of
7. The computer readable storage medium of
9. A content protected storage medium method of
10. A content protected storage medium method of
11. A content protected storage medium method of
12. A content protected storage medium method of
13. A content protected storage medium method of
15. A secure content enabled disk access system of
16. A secure content enabled disk access system of
17. A secure content enabled disk access system of
0. 19. The computer readable storage medium of claim 18 wherein said protection interface is a micro kernel and participates in a process to unlock said protected information.
0. 20. The computer readable storage medium of claim 18 wherein said protection interface provides operating system functions including memory management functions, hardware interaction functions, and user interface functions.
0. 21. The computer readable storage medium of claim 18 wherein said protection interface includes a digital rights registry key that is utilized to track digital rights to said protected content.
0. 22. The computer readable storage medium of claim 18 wherein protection interface includes instructions for participating in trusted device verification protocol.
0. 23. The computer readable storage medium of claim 18 wherein each file on a protected portion of a drive is encrypted in a two-pass encryption comprising:
a first pass encryption using a real-time decrypt able algorithm so content can be played back in real time; and
a second pass encryption which locks files while access is unauthorized.
0. 24. The computer readable storage medium of claim 18 wherein said protection interface includes instructions for unlocking and decrypting said content in said protected portion.
0. 25. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said participating in establishing said communication link includes receiving a request for said revised digital rights indicator.
0. 26. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said digital rights indicator revision authorization process comprises:
verifying a request for said revised digital rights indicator is from a valid requester;
determining if said valid requester has successfully completed a digital rights purchase process; and
creating a registry key corresponding to purchased digital access rights if said valid requester has successfully completed a digital rights purchase process.
0. 27. The computer readable storage medium of claim 26, including said secure content enabled drive digital rights revision process, wherein said valid requester is a trusted machine.
0. 28. The computer readable storage medium of claim 18, including said secure content enabled drive digital rights revision process, wherein said communication link is establish on the Internet.
|
The present invention relates to the field of , and 297 communicate information. Central processor 201 processes information. Main memory 202 stores information and instructions for the central processor 201. Removable protected data storage device 204 is a protected information storage medium (e.g., similar to protected information storage medium 100) and stores protected information (e.g., functioning as a large reservoir of protected content). Computer system 200 is utilized to present (e.g., display) authorized information from removable protected data storage device 201. Input device 206 207 provides a mechanism for inputting information and/or for pointing to or highlighting information on display 220. Signal communication port 208 provides a communication interface to exterior devices (e.g., an interface with a network). Display device 220 displays information in accordance with data stored in frame buffer 215. Graphics processor 211 processes graphics commands from central processor 201 and provides the resulting data to graphics buffers 215 for storage and retrieval by display monitor 220. In one embodiment, a graphics processor can present information from removable protected data storage device 204 utilizing a micro operating system of a protection interface included in removable protected data storage device 204 (e.g., without reliance on central processor or other operating system).
In step 310, a storage medium is partitioned into protected and unprotected portions. In one embodiment of the present invention, a hard disk is partitioned to reserve a percentage of available storage space for protected content and a percentage of available storage space for unprotected content. In one exemplary implementation, a portion of the storage locations are reserved for a protection interface. The portion of memory reserved for the protection interface can be a read only portion.
At step 320, content is stored in the protected portion. In one embodiment, a variety of proprietary content is stored in the protected portion. For example, movies, songs, video games and other entertainment content can be stored in the protected portion. A variety of different proprietary content can be “bundled” for convenient distribution on a single storage medium (e.g., hard disk).
In step 330, a protection interface is loaded onto the storage medium, wherein the protection interface prevents unauthorized access to the content stored in the protected portion. In one embodiment, the protected interface also provides operating system functions including memory management functions (e.g., maintains organization of files, directories, etc.), hardware interaction functions (e.g., control a disk drive, printer, etc.), and user interface functions. The protected portion interface can include instructions for providing a unified look and feel graphical user interface (GUI) with content indicators corresponding to permissible content stored in the protected content portion.
In one embodiment of the present invention, content is locked when it is loaded in the protected portion. The content can also be encrypted in the protected portion. Instructions are included in the protection interface for authorized unlocking and decrypting the content in the protected portion. In addition an unlocked file can be marked to prevent access by an untrusted machine.
In step 410, a protected storage medium (e.g., a secure content enabled drive) is created with protected storage locations and unprotected storage locations. In one embodiment, creating a secure content enabled drive includes performing a content protected storage medium creation method (e.g., content protected storage medium creation method 300). For example, a storage medium is partitioned into protected and unprotected portions, proprietary content is stored in the protected portion, and a protection interface is loaded onto the storage medium. The protection interface prevents unauthorized access to the content stored in the protected portion. In one exemplary implementation, a content protected storage medium similar to content protected storage medium 100 is created.
Initial digital rights authorization to access secure content stored in the protected storage locations are established in step 420. In one embodiment, establishing initial digital rights authorization includes storing a digital rights indicator on the protected storage medium, wherein the digital rights indicator indicates digital rights to access information stored in the protected storage locations. The digital rights indicator can indicate certain files within the protected storage area are accessible via the protection interface and certain files are not accessible. In one embodiment, the secure content includes movies, songs and/or video games and a digital rights indicator indicates which movies, songs and/or video games are accessible. For example, a SCED is loaded with a variety of songs from a plurality of categories (e.g., classical music, rock and roll music, country western music, etc.) and a digital rights indicator is set to indicate a purchaser of the SCED is authorized to access a variety of songs from one category (e.g., can access classical music songs). In one exemplary implementation, the digital rights indicator is utilized in encryption and decryption of protected information (e.g., utilized as a decryption key).
In step 430, the initial digital rights authorization to access secure content stored in the protected storage locations are revised. In one embodiment, revising the initial digital rights authorization includes performing a secure content enabled drive digital rights revision process. For example, a digital rights indicator is altered to indicate a user can access a variety of songs from an additional category (e.g., a user can access both classical music songs and country western songs). In one exemplary implementation, the digital rights indicator is a registry key associated with the secure content enabled drive. The registry key can also be stored in a centralized system remote from the secure content enabled drive.
The components of digital rights management system 470 cooperatively operate to track and modify digital rights. Digital rights server 471 executes instructions, including instructions for tracking and modifying digital rights to protected content on remote secure content enabled drive 490 with a protected storage portion and an unprotected storage portion. Digital rights tracking system 472 stores instructions and data, including instructions for tracking and modifying digital rights to protected content on a remote secure content enabled drive with a protected storage portion and an unprotected storage portion. Bus 473 communicates information between digital rights server 471 and digital rights tracking system 472.
In one embodiment, digital rights server 471 is utilized to establish initial digital rights authorization to access secure content stored in said protected storage locations. For example, digital rights server 471 creates an initial registry key for indicating digital rights to protected content on an SCED (e.g., SCED 490) and utilizes digital rights tracking system 472 to track the initial registry key information. In one exemplary implementation, digital rights tracking system 472 is a database and tracks digital rights indicators or keys. For example, digital rights tracking system 472 tracks the digital rights for each SCED and/or user. If a SCED is damaged or destroyed, a centralized record of SCED and user digital access rights is maintained. Digital rights server 471 is also utilized to perform a secure content enabled drive digital rights revision process to revise digital rights on an SCED (e.g., SCED 490).
In step 510, a communication link is established for communicating a digital rights indicator to a remote protected storage medium (e.g., SCED). In one embodiment, establishing a communication link includes receiving a request for a revised digital rights indicator. For example, a digital rights server (e.g., digital rights server 471) receives a request for a revised digital rights indicator and engages in a handshaking protocol to establish a communication link. It is appreciated that the present invention is readily adaptable for utilization with a variety of communication platforms, including wired connection and/or wireless connection. The communication link can be established on the Internet.
In step 520, a digital rights indicator revision authorization process for revising digital rights to a protected storage medium (e.g., SCED) is performed. In one embodiment, the digital rights indicator revision process includes verifying a request is from a valid requester (e.g., a trusted machine). A determination is made if the valid requester has successfully completed a digital rights purchase process. A digital rights purchase process includes receiving an indication of requested protected content access, forwarding a price for the requested protected content access and determining if the price is paid. If the valid requester has successfully completed a digital rights purchase process, a digital rights indicator (e.g., registry key) corresponding to purchased digital access rights is created.
In step 530 a revised digital rights indicator is forwarded to the protected storage medium (e.g., SCED) if the digital rights indicator revision authorization process is successful. The digital rights indicator is loaded on the protected storage medium for use in authorized access to protected content included in the protected storage medium. For example, the digital rights indicator can include a sequence of bits (e.g., binary logical values) utilized as a key in unlocking and decrypting proprietary content included in a protected information portion of a protected storage medium.
It is appreciated that the present invention can be implemented in a variety of embodiments. In one exemplary implementation the present invention can be utilized in processing systems utilized to provide a variety of graphics applications including video games. For example, the present invention can be utilized to distribute content for use in a game console, personal computer, personal digital assistant, cell phone or any number of platforms for implementing a video game. It is also appreciated that references to video game application implementations are exemplary and the present invention is not limited to these implementations.
Thus, the present invention enables secure and convenient distribution of proprietary content on flexibly usable storage medium. A significant amount of proprietary information can be distributed on a protected portion of the storage medium while regulating access to the proprietary content and still enabling storage resources for discretionary utilization by an end user. In addition to protecting information in the protected information portion, seamless and intuitive authorized interaction between information the protected content and the unprotected information is permitted. A protection interface can provide a micro-operating system that permits authorized content presentation (e.g., video, audio, etc.) without requirement of another operating system.
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.
Diamond, Michael B., White, Jonathan B., Daniell, Piers J.
Patent | Priority | Assignee | Title |
10652332, | Jul 09 2018 | Oracle International Corporation | System, method, and apparatuses for dynamic authorization |
11645384, | Mar 03 2021 | Bank of America Corporation | System for electronic data obfuscation and protection using independent destructible data objects |
12105794, | Mar 03 2021 | Bank of America Corporation | System for electronic data obfuscation and protection using independent destructible data objects |
Patent | Priority | Assignee | Title |
5237616, | Sep 21 1992 | International Business Machines Corporation | Secure computer system having privileged and unprivileged memories |
5552897, | Mar 07 1994 | AT&T IPM Corp | Secure communication apparatus and method |
5623546, | Jun 23 1995 | Google Technology Holdings LLC | Encryption method and system for portable data |
5629980, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works |
5721829, | May 05 1995 | Microsoft Technology Licensing, LLC | System for automatic pause/resume of content delivered on a channel in response to switching to and from that channel and resuming so that a portion of the content is repeated |
5757911, | Mar 10 1994 | Mita Industrial Co., Ltd. | Encryption communication process and terminal for encryption communication |
5857020, | Dec 04 1995 | RPX CLEARINGHOUSE LLC | Timed availability of secured content provisioned on a storage medium |
5861906, | May 05 1995 | Microsoft Technology Licensing, LLC | Interactive entertainment network system and method for customizing operation thereof according to viewer preferences |
5880733, | Apr 30 1996 | Microsoft Technology Licensing, LLC | Display system and method for displaying windows of an operating system to provide a three-dimensional workspace for a computer system |
5973680, | Feb 09 1995 | NEC PERSONAL COMPUTERS, LTD | Motion picture retrieval system |
6005636, | Mar 27 1997 | SHARP KABUSHIKI KAISHA, INC | System for setting user-adjustable image processing parameters in a video system |
6016348, | Nov 27 1996 | Thomson Consumer Electronics, Inc. | Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data |
6028585, | Sep 22 1995 | Lenovo PC International | Screen display control method and a screen display control apparatus |
6069647, | Jan 29 1998 | Intel Corporation | Conditional access and content security method |
6115819, | May 26 1994 | The Commonwealth of Australia | Secure computer architecture |
6141754, | Nov 28 1997 | UNILOC 2017 LLC | Integrated method and system for controlling information access and distribution |
6298445, | Apr 30 1998 | NORTONLIFELOCK INC | Computer security |
6314409, | Nov 05 1997 | HANGER SOLUTIONS, LLC | System for controlling access and distribution of digital property |
6367019, | Mar 26 1999 | Microsoft Technology Licensing, LLC | Copy security for portable music players |
6389538, | Aug 13 1998 | SANDPIPER CDN, LLC | System for tracking end-user electronic content usage |
6389541, | May 15 1998 | RPX Corporation | Regulating access to digital content |
6398245, | Aug 13 1998 | SANDPIPER CDN, LLC | Key management system for digital content player |
6550011, | Aug 05 1998 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Media content protection utilizing public key cryptography |
6580916, | Sep 15 2000 | ARRIS ENTERPRISES LLC | Service framework for evaluating remote services based upon transport characteristics |
6597380, | Mar 16 1998 | NEC Corporation | In-space viewpoint control device for use in information visualization system |
6615192, | Mar 12 1999 | Matsushita Electric Industrial Co., Ltd. | Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer |
6622148, | Oct 23 1996 | Viacom International Inc. | Interactive video title selection system and method |
6651171, | Apr 06 1999 | Microsoft Technology Licensing, LLC | Secure execution of program code |
6708161, | Sep 26 2000 | BLUE YONDER GROUP, INC | System and method for selective database indexing |
6742116, | Sep 30 1998 | Fujitsu Limited | Security method, security software and security system for electronic communications |
6748537, | Nov 15 2001 | Sony Corporation; SONY MUSIC ENTERTAINMENT, INC | System and method for controlling the use and duplication of digital content distributed on removable media |
6772335, | Nov 06 1995 | Xerox Corporation | Multimedia coordination system |
6785820, | Apr 02 2002 | JPMORGAN CHASE BANK, N A , AS ADMINISTRATIVE AGENT | System, method and computer program product for conditionally updating a security program |
6788800, | Jul 25 2000 | DIGIMARC CORPORATION AN OREGON CORPORATION | Authenticating objects using embedded data |
6807534, | Oct 13 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | System and method for managing copyrighted electronic media |
6823451, | May 10 2001 | MEDIATEK INC | Integrated circuit for security and manageability |
6832319, | Apr 24 1998 | International Business Machines Corporation; Intel Corporation | Content guard system for copy protection of recordable media |
6865555, | Nov 21 2001 | ARRIS ENTERPRISES LLC | System and method for providing conditional access to digital content |
6891953, | Jun 27 2000 | Microsoft Technology Licensing, LLC | Method and system for binding enhanced software features to a persona |
6922740, | May 21 2003 | TAHOE RESEARCH, LTD | Apparatus and method of memory access control for bus masters |
6948073, | Jun 27 2001 | Microsoft Technology Licensing, LLC | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client |
6957343, | Mar 30 2001 | Intel Corporation | Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media |
6980652, | Jun 23 1999 | CHEMTRON RESEARCH LLC | Combination mastered and writeable medium and use in electronic internet appliance |
6990513, | Jun 22 2000 | Microsoft Technology Licensing, LLC | Distributed computing services platform |
7003675, | Aug 13 1999 | Microsoft Technology Licensing, LLC | Encrypted content data structure package and generation thereof |
7007300, | May 10 2001 | GLOBALFOUNDRIES Inc | Secure booting of a personal computer system |
7010808, | Aug 25 2000 | Microsoft Technology Licensing, LLC | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system |
7020688, | Sep 05 2000 | FINANCIAL NETWORK, INC | Methods and systems for archiving and verification of electronic communications |
7035827, | Oct 17 2000 | Sony Corporation | Content receiving apparatus and method, storage medium, and server |
7036020, | Jul 25 2001 | SECUREWAVE STORAGE SOLUTIONS INC | Methods and systems for promoting security in a computer system employing attached storage devices |
7043581, | May 10 2001 | GLOBALFOUNDRIES Inc | Resource sequester mechanism |
7047411, | Dec 17 1999 | Microsoft Technology Licensing, LLC | Server for an electronic distribution system and method of operating same |
7065216, | Aug 13 1999 | Microsoft Technology Licensing, LLC | Methods and systems of protecting digital content |
7065506, | Nov 19 1999 | Rovi Solutions Corporation | Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device |
7065651, | Jan 16 2002 | Microsoft Technology Licensing, LLC | Secure video card methods and systems |
7069449, | Aug 03 2000 | Itech Group, Inc. | Method and system for encrypting and storing content to a user |
7073071, | Mar 31 2000 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
7093298, | Aug 30 2001 | UNILOC 2017 LLC | Apparatus and method for security object enhancement and management |
7095853, | Feb 24 2000 | RPX Corporation | System and method for preventing an illegal copy of contents |
7107462, | Jun 16 2000 | MIH Technology Holdings BV | Method and system to store and distribute encryption keys |
7111169, | Mar 29 2001 | Intel Corporation | Method and apparatus for content protection across a source-to-destination interface |
7120250, | Sep 09 2002 | Sony Corporation; Sony Electronics INC | Content distribution for multiple digital rights management |
7120868, | May 30 2002 | Microsoft Technology Licensing, LLC | System and method for adaptive document layout via manifold content |
7139811, | Aug 01 2001 | Cisco Technology, Inc | Double-proxy remote data access system |
7150031, | Jun 09 2000 | SYNAMEDIA LIMITED | System and method for reminders of upcoming rentable media offerings |
7152047, | May 24 2000 | ESECURE BIZ, INC | System and method for production and authentication of original documents |
7155733, | Jun 09 2000 | SYNAMEDIA LIMITED | System and method for expiration reminders of rentable media offerings |
7159120, | Nov 19 2001 | Google Technology Holdings LLC | Method and system for protecting data within portable electronic devices |
7181016, | Jan 27 2003 | Microsoft Technology Licensing, LLC | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
7191153, | Sep 10 1999 | CHEMTRON RESEARCH LLC | Content distribution method and apparatus |
7197648, | Jan 16 2002 | Microsoft Technology Licensing, LLC | Secure video card methods and systems |
7200593, | Jan 11 2002 | NS SOLUTIONS CORPORATION | Document management system |
7216372, | Nov 19 2002 | Disposable protector for the seat ring or upper part of a toilet | |
7225333, | Mar 27 1999 | Microsoft Technology Licensing, LLC | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
7225340, | Feb 20 2001 | MAXELL, LTD | Digital copying method and storage device for digital content |
7228427, | Dec 16 2002 | MIH Technology Holdings BV | Method and system to securely distribute content via a network |
7242771, | Jun 26 2002 | MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD | Contents management system |
7299209, | Oct 18 2001 | Rovi Solutions Corporation | Method, apparatus and system for securely providing material to a licensee of the material |
7340056, | Oct 11 2002 | MAGNOLIA LICENSING LLC | Remote deactivation of decoders for accessing multimedia digital data |
7353543, | Jan 10 2003 | Panasonic Corporation | Contents distribution system |
7370205, | Aug 01 2002 | Sony Corporation | Content distribution system, content distribution method and terminal device |
7370364, | Jul 31 2000 | ELLACOYA NETWORKS, LLC | Managing content resources |
7376624, | Feb 27 2002 | IMAGINEER SOFTWARE, INC | Secure communication and real-time watermarking using mutating identifiers |
7383205, | Mar 27 1999 | Microsoft Technology Licensing, LLC | Structure of a digital content package |
7395333, | May 09 2000 | Oracle America, Inc | Method and apparatus to obtain negotiated service advertisement |
7395438, | Apr 16 2002 | Microsoft Technology Licensing, LLC | Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication |
7536386, | Mar 27 2003 | Microsoft Technology Licensing, LLC | System and method for sharing items in a computer system |
7543160, | Sep 03 2004 | Malikie Innovations Limited | System and method for generating a secure state indicator on a display |
7549044, | Oct 28 2003 | HANGER SOLUTIONS, LLC | Block-level storage device with content security |
7606818, | Dec 20 2006 | SAP SE | Method and apparatus for aggregating change subscriptions and change notifications |
7606918, | Apr 27 2004 | Microsoft Technology Licensing, LLC | Account creation via a mobile device |
7607024, | Aug 01 2003 | KONINKLIJKE PHILIPS ELECTRONCS, N V | Record carrier comprising encryption indication information |
7644446, | Oct 23 2003 | Microsoft Technology Licensing, LLC | Encryption and data-protection for content on portable medium |
7689510, | Sep 07 2000 | Rovi Technologies Corporation | Methods and system for use in network management of content |
7716746, | Mar 05 2002 | SANYO ELECTRIC CO , LTD ; Sharp Kabushiki Kaisha; Fujitsu Limited | Data storing device for classified data |
7933409, | Mar 09 2004 | Panasonic Corporation | Content playback device |
20010020274, | |||
20010021926, | |||
20020002468, | |||
20020012432, | |||
20020077986, | |||
20020077992, | |||
20020099663, | |||
20030061477, | |||
20030097655, | |||
20030108199, | |||
20030140228, | |||
20030149989, | |||
20030152364, | |||
20030161473, | |||
20030215091, | |||
20030225796, | |||
20030229845, | |||
20040015426, | |||
20040083366, | |||
20040133794, | |||
20040133803, | |||
20040148523, | |||
20040193902, | |||
20050008130, | |||
20050025312, | |||
20050058291, | |||
20050086478, | |||
20050091511, | |||
20050111663, | |||
20050119967, | |||
20050132179, | |||
20050289076, | |||
20060005257, | |||
20060064605, | |||
20060149567, | |||
20060190621, | |||
20060224902, | |||
20070033419, | |||
20070192111, | |||
20070208992, | |||
20080148063, | |||
20080178081, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 19 2015 | Nvidia Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Aug 20 2020 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Nov 04 2024 | REM: Maintenance Fee Reminder Mailed. |
Date | Maintenance Schedule |
Dec 17 2022 | 4 years fee payment window open |
Jun 17 2023 | 6 months grace period start (w surcharge) |
Dec 17 2023 | patent expiry (for year 4) |
Dec 17 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 17 2026 | 8 years fee payment window open |
Jun 17 2027 | 6 months grace period start (w surcharge) |
Dec 17 2027 | patent expiry (for year 8) |
Dec 17 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 17 2030 | 12 years fee payment window open |
Jun 17 2031 | 6 months grace period start (w surcharge) |
Dec 17 2031 | patent expiry (for year 12) |
Dec 17 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |