This application is related to U.S. patent application Ser. No. 11/531,448 of Gidon Elazar, Dan Harkabi and Nehemiah Weingarten, entitled “Marketplace for Transferring Licensed Digital Content,” filed Sep. 13, 2006.
This invention generally relates to the field of digital rights management, and more particularly, to methods of transferring rights in licensed digital content in accordance with a digital rights policy in the content.
The Internet worldwide network, as well as other data communication networks, enables many digital appliances to interconnect and exchange information. Digital appliances include personal computers, laptop computers, tablet computers, personal digital assistants (PDAs), mobile phones, MP3 players, DVD players, gaming consoles, digital recording devices such as digital cameras, and others. A particular use of the Internet, and other networks such as cable and satellite or a corporate or organization network is to distribute digital files, specifically digital content files.
A digital content file includes data which have an end use of being either viewed, listened to, read, played, executed, or otherwise utilized by an end user, and at some point prior to end use is stored and/or represented in numerical form. A digital content file may be an audio file, a video file, a software file, an electronic book, a document, a computer game or other types of content.
Digital content files are often copyrighted, thereby placing legal limitations on the distribution and end use. For example, a user may typically not create a copy of, distribute, modify, sell, and/or perform other end uses of a copyrighted digital content file, without first receiving a license or other form of permission from the copyright owner. Examples of copyrighted digital content files are commercial movies, commercial music, electronic books, software, computer games, and the like. Copyrighted digital content files are increasingly being licensed and transferred by content providers to end user purchasers over the Internet.
In order to combat downloading and sharing of copyrighted digital content by parties that are not licensed to do so, and to enforce use of digital content according to licenses, various protection methods are employed by content owners. The collective term for the control of distribution and usage of digital content is digital rights management (DRM). DRM systems typically involve cryptographic methods for the secure distribution of the content between a server of a content repository and a digital appliance. Such methods typically require the digital appliance to include an implementation of cryptographic algorithms and hold cryptographic keys in order to gain access to the content.
In many cases the software application used to provide the digital content implements some form of DRM that is engaged when the user attempts to access the digital content. One of the operations performed by such an application is the process of decrypting the content file using cryptographic methods and cryptographic keys. In order to execute such operations, the application must have access to the cryptographic methods and keys; therefore the cryptographic methods and keys must reside within the reach of the application. Typically the cryptographic methods, the keys, or both, reside within the application, in the digital content file itself, or somewhere within the digital appliance storage.
A digital appliance such as a computer or PDA is typically an open platform enabling computer programmers to develop programs for it. In some cases, software programs are developed for the purpose of hacking and locating the cryptographic keys and algorithms of a DRM system, in order to circumvent the DRM and gain access to the content. This process is generally called an “attack” and if it succeeds it is commonly referred to as a “crack” or a “hack” to the DRM system. A computer program that performs this function is referred to hereafter as a hacking program or a cracking program.
Other forms of attacks include using programming tools. For example, software debuggers track and trap the digital content information after the application has decrypted it, retrieving the “protected” information. Such information includes the digital content file and metadata describing how it is to be presented. A hacking program that cracks the application and releases this information from the DRM system enables the construction of unauthorized copies of the original digital content file.
As a countermeasure, DRM systems can use more sophisticated cryptographic schemes and code obfuscation techniques. Other methods include adding tamper resistant hardware to store the cryptographic keys. Such solutions either reveal the cryptographic key to the digital appliance in the process of decrypting the information, or internally perform the cryptographic functions but reveal the end result in a raw form that can then be accessed.
A side effect that arises from the above content protection methods is that the software application that provides the digital content takes an active part in the protection process by implementing the above mentioned cryptographic methods and code obfuscation. Since the content protection implementation must be kept secret, it can be known solely by the organization that developed the software application. Furthermore, the content itself must be amended with cryptographic keys and data that are known only to that specific implementation, making the specific software application be the only software piece that can decrypt and provide the content. By tying content to be used by a specific software application, the type and variety of digital appliances that may be utilized to use the content is limited to the type and variety of the consumer electronic appliances that the organization that developed the application decides to support.
Another method that is partially effective in preventing digital content files from being copied and disseminated without control is the streaming of digital content files such as audio and video files to users. In this scenario, files are not downloaded to be stored on a digital appliance but rather “broadcast” much like a radio program. This ensures that only a small block of the content is present on the digital appliance at each given moment. The downside of this is that a user must be connected to the streaming source or online during the entire duration of the music program or movie. Another problem with streaming is that, in contrast to a file that is saved on the digital appliance storage, a user that has paid for content that is streamed cannot access the content at all times. Another shortcoming of streaming is that programs exist today for recording the streamed content and reconstructing a digital copy of the original digital content, without creating a noticeable difference to the human eye or ear.
In a more recent development, in order to increase the protection of content data files, cryptographic keys and algorithms are stored and executed in a dedicated DRM device that is separate from the digital appliance with which it operates. This technique is described in United States patent application publication no. 2004/0039932. It is preferably carried out on commercially available memory cards or flash drives as DRM devices, which have their own processing capability. Suitable memory cards are available from SanDisk Corporation, the assignee hereof, which include those sold under trademarks CompactFlash (CF), Multi-Media Card (MMC), Secure Digital (SD), MicroSD and Memory Stick PRO. These memory cards are removably connected with digital appliances through mating connectors that are different for most cards. SanDisk Corporation flash drives, sold under the Cruzer trademark, contain a plug according to the Universal Serial Bus (USB) standard, so can be plugged directly into any digital appliance having a USB receptacle.
A product and service utilizing dedicated DRM devices to store books and other documents are provided by SanDisk Corporation under its trademarks BookLocker and FlashCP. An end user typically downloads data of books and documents from the Internet into a DRM device, which is a flash drive, through a digital appliance to which it is connected. The data are stored in a portion of the non-volatile flash memory of the DRM device that is not accessible by a digital appliance to which the DRM device is connected. Rather, the data are accessed by the processor internal of the DRM device, and then sent to the digital appliance one page at a time for display to the end user. This generation of document page images makes it very difficult for an unauthorized copy of the documents data files stored in the DRM device to be made.
When a book is purchased, data of the book are downloaded into an end user's DRM device. In addition to receiving data of the book content, the end user receives data of a license that has been purchased to use the book, and this license is also stored in the non-volatile memory. The license defines the rights of the end user in the data content. The book may be read by the end user, within the terms of the license, when the DRM device into which data of the book are stored is connected with a digital appliance having a suitable visual display. Rights to use the data content are not limited to any specific digital appliance or type of digital appliance. A digital appliance with which a DRM device can be used need not retain keys, security algorithms or the like; these are contained within and processed by the DRM device.
It is desirable to provide the end user a right to resell or transfer the content stored in a DRM device that mimics lawful transfers of the content when embodied in the more traditional physical form of a book, music CD, video DVD, computer software or game CD or the like, while at the same limiting any increased risks to the content provider of unauthorized copying and use. This is accomplished by transferring the content to a buyer's DRM device along with a suitable license to use the content while the license in the seller's DRM device thereafter limits or terminates further access to the content data stored in the seller's DRM device. A provider of the content, or some other authority that licenses the content, may become involved in the transaction by issuing the new license to the buyer's DRM device and limiting or terminating the content license in the seller's DRM device. The content provider or licensing authority then may share in some of the purchase price paid by the buyer, most of which goes to the seller. Alternatively, the original license in the seller's DRM device may allow transfer to the buyer's DRM device without having to obtain permission from or involve the content provider or licensing authority. In this case, the original license automatically changes after transfer of the content to limit or terminate rights of the seller to access the content in his or her DRM device. In addition to or in place of modifying or deleting the license in the seller's DRM device for the transferred content, the transfer process can be made to include erasing the content from the memory of the seller's DRM device but this is typically not necessary as a digital rights management matter because of the high degree of security that the DRM device provides to the content. The content cannot be read out of the DRM device by a connected digital appliance except as permitted by the license that is also stored therein.
Additional aspects, advantages and features of the present invention are included in the following description of exemplary examples thereof, which description should be taken in conjunction with the accompanying drawings.
All patents, patent applications, articles, standards, books, other publications, documents and things referenced herein are hereby incorporated herein by this reference in their entirety for all purposes. To the extent of any inconsistency or conflict in the definition or use of a term between any of the incorporated publications, documents or things and the text of the present document, the definition or use of the term in the present document shall prevail.
DRM Devices and their Operation
A common form of DRM device 11 and digital appliance 13 are shown in
The use of an SD card 19 as the DRM device is also illustrated in
Another memory storage device very useful for the DRM device is a memory card having two different external connectors on the card that both connect to the internal memory controller, one for insertion into a USB receptacle and another with a standard set of card contacts, such as according to the SD card standards. Such a device is described in United States patent application publication no. 2005/0230484A1, entitled “Memory Cards Having Two Standard Sets of Contacts,” and application publication no. 2006/0084287A1, entitled “Memory Card with Two Standard Sets of Contacts and a Contact Covering Mechanism.” Such memory cards may also utilize a wireless data communications interface with a host system, either in addition to the two sets of contacts or in place of one or both of them.
Any visual content of data stored in the DRM device may be viewed by the user on the digital appliance's visual display 25, and any audio content heard through audio speakers 27 or earphones. The digital appliance 13 may include only one of the display 25 or the audio source 27, or multiple copies of one of them, if dedicated to reproduce only visual or audio content, respectively. Some other human sensory transducer may be used as part of the digital appliance 13 when appropriate for reproducing data of a content file stored in the DRM device. The DRM device most commonly contains no visual, auditory or other human sensory transducer for reproducing the content data stored in it but rather typically relies upon the digital appliance for those functions.
Content files and other data are downloaded into the flash memory within either of the devices 11 or 19 through the digital appliance 13 to which they are inserted, when the digital appliance is connected to the Internet or some other network communicating with a source of such data. Alternatively, the DRM device may obtain content from a digital appliance that does not have either a visual display 25 or audio speakers 27 but is somehow connected to the network, such as by wireless Internet access through a HotPoint switch.
The electronic functions of such a flash memory device 11 or 19 are generally illustrated in
The form of the connector 49 is specific to the standard for the particular memory card or flash drive being used as the DRM device. Many such standards exist. For example, a public document describing the physical and some electrical characteristics of the SD Card is available from the SD Association (SDA): “Simplified Version of: Part 1 Physical Layer Specification Version 1.01,” dated Apr. 15, 2001. Specifications of the TransFlash memory card are available from SanDisk Corporation. Mechanical and electrical details of the USB interface are provided by the “Universal Serial Bus Specification,” revision 2.0, dated Apr. 27, 2000. Another, higher transfer rate interface, known as FireWire, is specified by the following standard of the Institute of Electrical and Electronics Engineers (IEEE): “IEEE Standard for a High Performance Serial Bus,” document no. IEEE 1394-1995, as amended by document nos. IEEE 1394a-2000 and IEEE 1394b-2002.
It is also desirable to manufacture the DRM device in a manner that makes it difficult to be disassembled. This provides additional security of the data stored in it. One such manufacturing technique and a flash drive resulting from it are described in United States patent application publication no. 2004/0137664A1.
The description above contemplates that the DRM device is implemented in the form of a memory card or flash device that is removable from the digital appliance. However, there are applications where it is desirable to permanently install the DRM device within a digital appliance, an example being where the digital appliance is highly portable such as an audio MP3 player. In such a case, the DRM device is preferably separately formed in a sealed package to increase the difficulty of it being disassembled, thereby increasing the security of the data being processed.
The microprocessor 41 of the controller 33 (
A memory segment 59 may be provided within the hidden portion 57 to store firmware that controls operation of the controller 33. Firmware is loaded from the flash memory 31 into the controller memory 43 as necessary, and then executed out of the memory 43 by the microprocessor 41. Another segment 61 may contain data of the content desired to be retrieved by the digital appliance 13 but these data are transferred to the digital appliance after processing by the controller 33. Data of a license that establishes rules for access and use the content may be stored in a segment 63. Another hidden segment 65 may be provided to store data of encryption keys, a serial number or other unique identification of the device and other security data used to download content data into the memory portion 57 and/or in the retrieval and use of those data by the digital appliance. An additional hidden memory segment 67 may also be included for use by the controller to temporarily store intermediate results of its processing that cannot be accessed by the digital appliance 13.
As an alternative to storing the content 61 in the hidden portion 57, it may be stored in an encrypted form in the memory portion 55 that is accessable by the host within the logical address space of the memory. Other items shown in
A wide variety of types of content data exist that may be stored in the memory segment 61. Data of books, magazines and other documents are examples for which the DRM device is quite useful. Data of music, lectures, books and other audio sources can also be stored in a DRM device. Various forms of visual data may also be stored as content, including that of still pictures, movies, television shows and the like. The DRM device may also be used to store data of games or various software applications. In general, any type of data that a user may want to access or use may be stored as content in the DRM device. The DRM device described herein allows the provider of the content to control its use so that the provider may obtain revenue in exchange for allowing its use.
Content may typically be downloaded into the memory segment 61 over the Internet, or some other computer network, through a digital appliance to which the DRM device is connected. License data that specifies allowed use of the content are downloaded into the memory segment 63 in the same manner. License data are usually downloaded as part of the downloading the content, to establish restrictions on the use of the accompanying content. Examples of license restrictions include dates or times that access to the content is permitted, a date that the license terminates, conditions for continuing the license in force and whether the content may be transferred to another DRM device. The controller of the DRM device utilizes the license data to control whether content requested by a user is rendered or not. But what is not controlled is the host or other digital appliance which may be used to retrieve data from the DRM device. Since the DRM device, and thus the content stored on it, are highly portable, its owner may use a wide variety of digital appliances in various locations to access the stored content. The license granted to the user is not restricted to any one digital appliance.
Transfers of content and license data are preferably made over the Internet in an encrypted manner but may be decrypted within the DRM device before being stored in it. Although the content data may be stored in an encrypted form, the inaccessibility by a digital appliance of the memory segments in which they are stored protects the content and license data from unauthorized access, even if stored in an unencrypted form. They are accessed only by the controller, which then renders the content to the digital appliance without encryption but in a form that is not particularly useful to someone who wants to copy the content data from the DRM device without permission.
The various types of data stored in the DRM device need not necessarily be segmented in the manner of the example shown in
The content so stored in the DRM device 11 or 19 may be utilized in the manner illustrated in
The rendering operation 93 performed by the controller 33 of the DRM device preferably provides an output of the content data to the digital appliance 13 to which it is connected that allows the end user to gain the benefit of the purchased license but which at the same time is not in a form useful for unauthorized copying of the accessed content data. A small portion of the content data are sent to the digital appliance 13 at a time and in a form that makes it difficult or impractical to aggregate together to recreate the content data file. The DRM device preferably arranges the presentation of the content data for the digital appliance, rather than sending the entire data file in a form that can be copied. This provides significant protection against copying the content data file by what is output in an unencrypted form from the DRM device.
For example, if the content is a book, magazine or other document, the rendering operation 93 sends a picture to the digital appliance 13 of one page at a time, such as in the form of a bit map image. This is all the end user requires in order to be able to read the document but security is maintained since this output is not particularly useful to someone who wants to copy the data being rendered. An unauthorized copier would prefer access to the data as stored in the flash memory 31, an entire data file in some conventional format, rather than having to assemble bit maps of each page into such a file. Similar limited renditions may also be provided at the output of the DRM device for other types of content data.
Transfer of Licensed Digital Content Between Users
In order for the business in content in digital form to be more analogous to content in physical forms, such as books, CDs, DVDs, and software or game CDs, the digital content needs to be transferable from one user to another, just as a purchaser of a book, CD or DVD may resell that item to another. A goal of the techniques described herein is to allow a licensee of copyrighted digital content to effectively transfer that content to another in a way that parallels operation of the existing markets in corresponding used physical items such as books, CDs and DVDs.
In most of the example systems shown in
In the used content transfer example of
In response to completion of this transaction, the state of the license in the seller's DRM device 101 may then automatically change the rights use by the seller of the content data stored therein, such as by terminating that license. When the rights of use by the DRM device 101 are terminated at about the same time the DRM device 105 acquires the content and license to use it, the transaction is similar to the selling of a book, CD, DVD or other physical version of the content. Alternatively, the order of events may be somewhat different than this, such as by the state of the license changing before the transaction is completed and then, if not completed, changing back to its original state.
Further, the original license may allow the original purchaser to maintain his or her license to continue to utilize the re-sold content, with or without a time limit, or to even sell an additional specified number of copies, usually within some set time limit. Such retained rights are in addition to the rights of transfer that mimic the rights of an owner of a physical book, audio CD, video DVD or other form of content. The license data stored on the DRM device 101 specify such permissions and conditions, which are implemented by the DRM device firmware when executing a transfer of the content and license. The license sent to the buyer's DRM device 105 is included as part of the original license stored in the seller's DRM device 101, and the initial cost of the license and content to the user of the DRM device 101 will commonly depend on the extent of any such re-licensing rights.
The content and license data are typically transmitted from the DRM device 101 through the seller's digital appliance 103 and over the Internet or some other network to the DRM device 105 through the buyer's digital appliance 107. The digital appliance typically contains software that implements this transfer. The firmware stored in the DRM devices then enables this transfer to occur, even though the memory space storing the content and license data are hidden or otherwise inaccessible by a connected digital appliance. The transmission is preferably encrypted within the seller's DRM device 101, such as by use of an algorithm stored in the hidden portion 65 (
Another example of transferring content is given in
The authority 109 in the embodiment of
The embodiment of
In another embodiment illustrated by
In the transactional embodiment of
The buyer initiates a request of the authority 109 to have useable used content downloaded into his or her DRM device 105. This is indicated by a path 161 of
In the case of
Further, rights in one or more of a limited number of copies of an item of content may be auctioned by the authority 109 in the business model of
An auction may also be used in the business models of
Another system for distributing content may emulate a library system of the type typically operated by a public entity, charity or even a commercial enterprise. The authority 109 of
The library may a record of the number of active licenses for each work, and when a request to borrow a copy of a work is received, the library then checks to see if the number of active licenses to borrowers is less than the number of copies of the work under which the library is licensed to loan. If so, the requested copy of the work may be loaned. If not, the request is denied. As soon as an active license terminates by the passage of a fixed period of time or otherwise, the library then again has a copy of the work to lend.
Although the various aspects of the present invention have been described with respect to exemplary embodiments thereof, it will be understood that the present invention is entitled to protection within the full scope of the appended claims. Particularly, modifications of the example transactions described above primarily with respect to
Number | Name | Date | Kind |
---|---|---|---|
4634807 | Chorley et al. | Jan 1987 | A |
4757302 | Hatakeyama et al. | Jul 1988 | A |
5446896 | Hegarty et al. | Aug 1995 | A |
5450489 | Ostrover et al. | Sep 1995 | A |
5530235 | Stefik et al. | Jun 1996 | A |
5715403 | Stefik | Feb 1998 | A |
5825879 | Davis | Oct 1998 | A |
5847698 | Reavey et al. | Dec 1998 | A |
5887269 | Brunts et al. | Mar 1999 | A |
5956034 | Sachs et al. | Sep 1999 | A |
5982891 | Ginter et al. | Nov 1999 | A |
5991399 | Graunke et al. | Nov 1999 | A |
6009525 | Horstmann | Dec 1999 | A |
6022223 | Taniguchi et al. | Feb 2000 | A |
6055314 | Spies et al. | Apr 2000 | A |
6118116 | Sawada et al. | Sep 2000 | A |
6226618 | Downs et al. | May 2001 | B1 |
6314409 | Schneck et al. | Nov 2001 | B2 |
6351547 | Johnson et al. | Feb 2002 | B1 |
6418421 | Hurtado et al. | Jul 2002 | B1 |
6529949 | Getsin et al. | Mar 2003 | B1 |
6546193 | Um et al. | Apr 2003 | B1 |
6550011 | Sims, III | Apr 2003 | B1 |
6598164 | Shepard | Jul 2003 | B1 |
6611358 | Narayanaswamy | Aug 2003 | B1 |
6636773 | Tagawa et al. | Oct 2003 | B1 |
6697944 | Jones et al. | Feb 2004 | B1 |
6732275 | Dimenstein | May 2004 | B1 |
6738614 | Blankenship et al. | May 2004 | B1 |
6738905 | Kravitz et al. | May 2004 | B1 |
6757749 | Aoki et al. | Jun 2004 | B2 |
6824051 | Reddy et al. | Nov 2004 | B2 |
6876984 | Tadayon et al. | Apr 2005 | B2 |
6886036 | Santamaki et al. | Apr 2005 | B1 |
6907585 | Kohno | Jun 2005 | B2 |
6922725 | Lamming et al. | Jul 2005 | B2 |
6944600 | Stefik et al. | Sep 2005 | B2 |
6973445 | Tadayon et al. | Dec 2005 | B2 |
6974076 | Siegel | Dec 2005 | B1 |
6983367 | Go et al. | Jan 2006 | B2 |
7023572 | Tuli | Apr 2006 | B2 |
7039615 | Gajjala et al. | May 2006 | B1 |
7058818 | Dariel | Jun 2006 | B2 |
7068381 | Tuli | Jun 2006 | B1 |
7068387 | Ahne et al. | Jun 2006 | B2 |
7213004 | Hars et al | May 2007 | B2 |
7225340 | Asahi et al. | May 2007 | B2 |
7249105 | Peinado et al. | Jul 2007 | B1 |
7257309 | Elswick et al. | Aug 2007 | B1 |
7296098 | Shih | Nov 2007 | B2 |
7305366 | Chase et al. | Dec 2007 | B2 |
7313814 | Zhu et al. | Dec 2007 | B2 |
7350228 | Peled et al. | Mar 2008 | B2 |
7353541 | Ishibashi et al. | Apr 2008 | B1 |
7769880 | Paka et al. | Aug 2010 | B2 |
7861312 | Lee et al. | Dec 2010 | B2 |
7925591 | Gajjala et al. | Apr 2011 | B2 |
20010013021 | Saito | Aug 2001 | A1 |
20020026424 | Akashi | Feb 2002 | A1 |
20020099955 | Peled et al. | Jul 2002 | A1 |
20020112172 | Simmons | Aug 2002 | A1 |
20020141499 | Goertzen | Oct 2002 | A1 |
20020152172 | Hars et al. | Oct 2002 | A1 |
20020176575 | Qawami et al. | Nov 2002 | A1 |
20020184156 | Tadayon et al. | Dec 2002 | A1 |
20020186842 | Sabet-Sharghi et al. | Dec 2002 | A1 |
20020196364 | Hendricks | Dec 2002 | A1 |
20030018582 | Yaacovi | Jan 2003 | A1 |
20030167236 | Stefik et al. | Sep 2003 | A1 |
20030225701 | Lee et al. | Dec 2003 | A1 |
20040010467 | Hori et al. | Jan 2004 | A1 |
20040039932 | Elazar et al. | Feb 2004 | A1 |
20040136536 | Michtchenko | Jul 2004 | A1 |
20040137664 | Elazar et al. | Jul 2004 | A1 |
20040193546 | Tokutani et al. | Sep 2004 | A1 |
20040193744 | Paley et al. | Sep 2004 | A1 |
20040205453 | Mortensen | Oct 2004 | A1 |
20040260716 | Sugiura | Dec 2004 | A1 |
20050004875 | Kontio et al. | Jan 2005 | A1 |
20050044330 | Elazar et al. | Feb 2005 | A1 |
20050061873 | Pirillo | Mar 2005 | A1 |
20050065891 | Lee et al. | Mar 2005 | A1 |
20050149450 | Stefik et al. | Jul 2005 | A1 |
20050230483 | Miller et al. | Oct 2005 | A1 |
20050230484 | Cuellar et al. | Oct 2005 | A1 |
20050289072 | Sabharwal | Dec 2005 | A1 |
20060010500 | Elazar et al. | Jan 2006 | A1 |
20060080535 | Elazar et al. | Apr 2006 | A1 |
20060084287 | Miller et al. | Apr 2006 | A1 |
20060107330 | Ben-Yaacov et al. | May 2006 | A1 |
20060167814 | Peinado et al. | Jul 2006 | A1 |
20060167815 | Peinado et al. | Jul 2006 | A1 |
20060253620 | Kang | Nov 2006 | A1 |
20070027814 | Tuoriniemi | Feb 2007 | A1 |
20070198430 | Takahashi et al. | Aug 2007 | A1 |
20070229393 | Ishii et al. | Oct 2007 | A1 |
20070255659 | Yen et al. | Nov 2007 | A1 |
20070265977 | Read | Nov 2007 | A1 |
20080065552 | Elazar et al. | Mar 2008 | A1 |
20080103983 | Jang et al. | May 2008 | A1 |
20080320605 | Ben-Yaacov et al. | Dec 2008 | A1 |
Number | Date | Country |
---|---|---|
19820479 | Dec 1999 | DE |
1304665 | Apr 2003 | EP |
1 376 309 | Jan 2004 | EP |
2367925 | Apr 2002 | GB |
WO 9842098 | Sep 1998 | WO |
WO 0113199 | Feb 2001 | WO |
WO 0123980 | Apr 2001 | WO |
WO 0169354 | Sep 2001 | WO |
WO 0193000 | Dec 2001 | WO |
WO 03036975 | May 2003 | WO |
WO 2004086363 | Jul 2004 | WO |
WO 2006080772 | Dec 2005 | WO |
WO 2006110213 | Oct 2006 | WO |
Entry |
---|
Kim, Won et al., “Object-Oriented Concepts, Databases, and Applications,” New York, New York: ACM Press, 1989, ISBN 0-201-14410-7, pp. 4-5. |
Corner, Douglas et al., “Operating System Design vol. 1: The Xinu Approach,” Englewood Cliffs, New Jersey, Prentice Hall, 1989, pp. 308-309. |
USPTO, “Final Office Action,” mailed in U.S. Appl. No. 11/531,448 on Mar. 26, 2009, 13 pages. |
USPTO, “Office Action,” mailed in U.S. Appl. No. 11/534,448 on Apr. 21, 2008, 9 pages. |
USPTO, “Office Action,” mailed in U.S. Appl. No. 11/531,448 on Aug. 14, 2007, 17 pages. |
Humer, Caroline, “Students Set to Hit the Latest E-Books,” http://msnbc.com/id/4846005/, Apr. 27, 2004, 5 pages. |
SanDisk Secure Content Solutions, Inc., “BookLocker™ Secure Digital Books,” Product Description, 2005, 4 pages. |
SD Group, “Simplified Version of: Part 1 Physical Layer Specification Version 1.01,” dated Apr. 15, 2001, 32 pages. |
“Universal Serial Bus Specification,” revision 2.0, dated Apr. 27, 2000, 84 pages. |
Institute of Electrical and Electronics Engineers (IEEE): “IEEE Standard for a High Performance Serial Bus,” document No. IEEE 1394-1995, 97 pages. |
Institute of Electrical and Electronics Engineers (IEEE): “IEEE Standard for a High Performance Serial Bus, Amendment 1,” document No. IEEE Std. 1394a-2000, 11 pages. |
Institute of Electrical and Electronics Engineers (IEEE): “IEEE Standard for a High Performance Serial Bus, Amendment 2,” document No. IEEE Std. 1394b-2002, 53 pages. |
“SanDisk TransFlash Memory Module—The Small, Scalable, Semi-removable Solution for Next-Generaiton Embedded Flash Data Storage Application,” SanDisk Flash Data Storage, SanDisk Corporation, 4 pages. |
“Memory Stick Media Formats,” www.memorystick.com/en/ms/variety.html, pp. 1-3, Feb. 1, 2005. |
Edited by Bill Cope and Robin Freeman, “Digital Rights Management and Content Development: Technology Drivers Across the Book Production Chain, from Creator to Consumer,” RMIT University, 2001, whole book (pp. v.-166). |
Lesley Ellen Harris, “Digital Property Currency of the 21st Century,” published McGraw-Hill Ryerson Ltd, 1998, whole book (pp. vi-230). |
National Research Council, “The Digital Dilemma, Intellectual Property Rights and the Emerging Information Infrastructure,” National Academy Press, Washington D.C., 2000, whole book (pp. v-340). |
Lawrence Lessig, “The Future of Ideas,” Random House 2001, whole book (pp. vii-352). |
Carol Riser, “Technological Protection Measures (Anti-Circumvention Devices) and Their Relation to Exceptions to Copyright in the Electronic Environment,” http://www.ipa-uie.org/events/bookfairs/fhf2000/crisher.html, Oct. 20, 2000, 6 pages. |
Mike Godwin, “A Cop in Every Computer,” IP Worldwide, http://www.law.com, Jan. 14, 2002, 5 pages. |
Mark Walter et al., “DRM: ‘Down-Right Messy’ and Getting Worse,” The Seybold Report, Analyzing Publishing Technologies, vol. 1, No. 3, pp. 5-15. |
Renato Iannella, “Digital Rights Management (DRM) Architectures,” D-Lib Magazine, vol. 7, No. 6, Jun. 2001, 10 pages. |
Joshua Duhl et al., “Understanding DRM Systems—An IDC Whitepaper,” www.idc.com, pp. 1-25. |
Patricia Evans, “DRM: Is the Road to Adoption Fraught With Potholes?” The Seybold Report, vol. 1, No. 14, Oct. 22, 2001, pp. 1-3. |
Richard Eoin Nash, “A Tale of Two E-media Hosts,” http://www.hostingtech.com/sp/02—06—sp—tale—print.html, Jun. 2002, pp. 1-3. |
Dennis Fowler, “Digital Rights (and Wrongs),” NW, Jun. 2002, pp. 26-31. |
Bill Pearson, Technical Marketing Engineer, “Digital Transmission Content Protection,” presented Jun. 16, 1999 at Intel Corporation, pp. 1-25. |
Jaehong Park et al., “Towards Usage Control Models: Beyond Traditional Access Control,” SACMAT'02, Jun. 3-4, 2002, Monterey, CA, pp. 57-64. |
Ingernar J. Cox, “Watermarking and Digital Rights Management,” NEC Research Institute, Princeton, NJ, Mar. 20, 2001, pp. 1-14. |
Eric Knorr, “Content Rights and Wrongs,” http://Techupdate.zdnet.com, Dec. 4, 2001, pp. 1-2. |
Mark Stamp, “Digital Rights Management: The Technology Behind the Hype (Draft),” Jun. 6, 2002, pp. 1-15. |
Bill Trippe, “XrML and Emerging Models of Content Development and Distribution,” The Gilbane Report, Apr. 23, 2002, pp. 1-16. |
Mark Walter, “Authentica, Alchemedia Apply DRM to Corporate Intellectual Property,” The Seybold Report, vol. 1, No. 12, Sep. 17, 2001, pp. 1-4. |
Nic Garnett, “Digital Rights Management, Copyright, and Napster,” Jun. 2001, pp. 1-5. |
Nic Garnett and Tomas Sander, “Fair Use by Design—Session 3: What DRM can and cannot do and what it is or isn't doing today,” 12th Conference on Computers, Freedom & Privacy, San Francisco, Apr. 16-19, 2002, 6 pages. |
Joshua Duhl, “Sony Licenses InterTrust's DRM: What Does It Mean?” IDCFlash, Jun. 2002, pp. 1-4. |
Dr. John Manferdelli, “Digital Rights Management(“DRM”)” Unified DRM Group, Microsoft Corporation, Symposium on Embeded Security, 2001, pp. 1-26. |
Martha Nalebuff, “Publisher's Dilemma,” Unified DRM Core at Microsoft Corporation, Seybold, Apr. 10, 2001, pp. 1-6. |
Amy Carroll et al., “Microsoft Palladium: A Business Overview,” Microsoft Content Security Business Unit, Jun. 2002, pp. 1-9. |
Gordon Lyon, “The Internet Marketplace and DRM,”Convergent Information Systems Division, NIST, Jul. 12, 2001, pp. 1-12. |
Michael Calvert, “Content Management—Timetable for Digital Rights Management,” InSide Gartner This Week, No. 2, Jul. 18, 2001, pp. 1-3. |
Kim Zwollo, “Digital Document Delivery and Digital Rights Management,” IOS Press, 2001, pp. 9-11. |
Olin Sibert, “Digital Rights Management: The Future Is Secure Hardware,” Electronic Design, vol. 48, i10, May 15, 2000, p. 56. |
Info-Tech Advisor Newsletter, “Digital Rights Management 101,” Jun. 26, 2001, pp. 1-2. |
“Fair Usage Called Key to Digital Rights Management,” Communications Daily, v 22, i25, Feb. 6, 2002, pp. 1-2. |
“Lack of DRM Standards Impeding Broadband Demand,” Audio Week, v. 13, i51, Dec. 24, 2001, pp. 1-2. |
Linden deCarmo, Media Alert—New Digital Rights Technologies Protect Content Creators' Interests, But What About Users' Rights? PC Magazine, Jun. 26, 2001, pp. 1-5, 80. |
Harvey Ardman, “Will DRM Make Digital Publishing More Profitable?” Seybold Seminars, Boston, Apr. 2001, pp. 1-2. |
Susan Marks, “Staking Out Digital Rights; Digital Rights Management Software Addresses the Thorny E-Comm Problem of Sharing Content While Protecting Intellectual Property,” Network World, Feb. 18, 2002, pp. 1-2. 70. |
Robert Bolick, “Pricing Digital Content,” Professional Book Group, The McGraw-Hill Companies, Mar. 11, 2001, pp. 1-8. |
Yuval Levin, “Talking to ourselves,” Liberzine.com, Sep. 6, 2000, pp. 1-3. |
Clifford Lynch, “The Battle to Define the Future of the Book in the Digital World,” First Monday, May 2001, pp. 1-49. |
Richard Stallman, “The Right to Read,” GNU Project—Free Software Foundation (FSF), Feb. 1997, pp. 1-5. |
“The Digital Millennium Copyright Act of 1998,” (DMCA) Pub. L. No. 105-304, 112 Stat. 2860, Dec. 1998, pp. 1-18. |
“Doesn't Everybody Do It?—Internet Piracy Attitudes and Behaviors,” A report on a survey conducted by SIIA and KPMG—Fall 2001, pp. 1-32. |
“IIPA 2000-2001 Estimated Trade Losses Due to Copyright Piracy,” International Intellectual Property Alliance (IIPA), Apr. 30, 2002, pp. 1-2. |
Ipsos-NPD, “Briefing: The Online Book Marketplace,” May 2001, 33 pages. |
Terje Hillesund, “Will E-books Change the World?” First Monday, per-viewed journal on the internet, Sep. 14, 2001, pp. 1-21. |
George Alexander et al., “The Road Ahead: Problems Facing the Publishing Industry Today,” The Seybold Report, Apr. 22, 2002, vol. 2, No. 2, pp. 3-9. |
John Markoff, “Fears of Misuse of Encryption System Are Voiced,” New York Times, Jun. 20, 2002, pp. 1-3. |
“Trusted Computing Platform Alliance (TCPA),” TCPA Design Philosophies and Concepts, Version 1.0, Copyright 2000 Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation, Intel Corporation, Microsoft Corporation, Jan. 25, 2001, pp. 1-30. |
Joshua Piven, “Tech vs. Tinseltown,” Computer Technology Review, Los Angeles, May 2002, pp. 1-4. |
“The Need for a Rights Language,” Technical White Paper, Version 1.0, ContentGuard 2001, pp. 1-12. |
“Extensible Rights Markup Language (XrML) 2.0 Specification,” Part 1—Part V, ContentGuard, Nov. 20, 2001, 154 pages. |
“Digital Rights Management for Ebooks: Publisher Requirements,” Version 1.0, Association of American Publishers (AAP), Nov. 27, 2000, pp. 1-66. |
USB Implementers Forum, “Universal Serial Bus Mass Storage Class, UFI Command Specification,” Revision 1.0, Dec. 14, 1998, pp. 1-53. |
Office Action issued Apr. 21, 2008 in U.S. Appl. No. 11/531,448 (7 pgs). |
Office Action issued Feb. 9, 2012 in corresponding EP Appl. No. 07 842 209.4 (8 pgs). |
“Sandisk BookLocker aka FlashCP DRM/Based USB Stick,” Colin Dunstan & Flauzon, Internet Article, Jun. 29, 2005, 1 page. |
“BookLocker,” SanDisk, Internet Article, Feb. 6, 2005, XP002484733, 1 page. |
“Sandisk Frees Students from Heavy Backpacks,” Press Release (Online), Jun. 28, 2005, 1 page. |
“Sandisk Introduces Ultra II SD Plus, a Dual-Purpose SD Memory Card with Built-In USB Connectivity,” Press Release (Online), Feb. 19, 2005, XP002484735, 1 page. |
Notification of Transmittal of the International Search Report and Written Opinion of the International Searching Authority, or the Declaration, International Application No. PCT/US2007/078105, mailed Jun. 27, 2008, 16 pages. |
Number | Date | Country | |
---|---|---|---|
20080065911 A1 | Mar 2008 | US |