On Tuesdays the USPTO issues new patents. Both of today's Spotlight Patents address aspects of DRM. Assigned to Microsoft, the first patent concerns a network service for modularly constructing a software defined radio that includes DRM techniques. Assigned to BEA, the second patent concerns techniques for managing objects and resources with access rights embedded in nodes within a hierarchical tree structure
7,784,029, "Network service for modularly constructing a software defined radio," assigned to Microsoft.
Systems and methods are provided that disclose a network service for modularly constructing a software defined radio ("SDR"). A server system provides an SDR kernel (i.e., a potentially platform-neutral definition of digital signal processing functionality and control operations necessary to implement the core portion of a software defined radio implementing a particular radio standard) to a client system. The client system may select a desired SDR kernel through a variety of means disclosed herein. While some SDR kernels may be provided for free and unrestricted use, others may be purchased or subscribed to and additionally restricted by digital rights management ("DRM") policies. Based upon the agreed upon payment terms and any other restrictions, a customized set of DRM policies may be applied by the server system to the SDR kernel before sending it to a client system. Additionally, the server system may provide a description of governmental regulations applicable to a given locality.
7,783,616, "System and method for managing objects and resources with access rights embedded in nodes within a hierarchical tree structure," assigned to BEA Systems.
A system and method for controlling access to data within a hierarchically organized document, such as an XML document. Elements may have their access rights specified, for example as a variable in an XML tag. If not specified within an element of the document, access rights are inherited from its nearest ancestor. Specified access rights may refer to a collection of entitlement expressions, which describe with arbitrarily fine granularity which users and user types may access the data.