Every Thursday, the US Patent and Trademark Office
publishes pending patent applications. Publication has no bearing on
whether a patent will eventually be issued based on the application.
Still, issued patents and published applications are often indicators
of what people have been thinking about and the kinds of things that
individuals or companies believe may be useful to them in the future. Assigned to Microsoft, the first of today's featured applications discloses ways of accessing protected content in a rights-management architecture. The second application discloses a way of securing computer data that may include encrypting different portions with different encryption.
20050188228, "System and method for accessing protected content in a rights-management architecture," assigned to Microsoft.
A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or "inscribed"); source-signed; and fully-individualized (or "owner exclusive"). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content. The client components include an object which accesses encrypted content, an object that parses the license and enforces the rights in the license, an object which obtains protection software and data that is individualized for the client and/or the persona operating the client, and a script of instructions that provides individualization information to a distributor of content so that the content may be individualized for the client and/or its operating persona. Content is generally protected by encrypting it with a key and then sealing the key into the content in a way that binds it to the meta-data associated with the content. In some instances, the key may also be encrypted in such a way as to be accessible only by the use of individualized protection software installed on the client, thereby binding use of the content to a particular client or set of clients.
20050188199, "Securing computer data," no assignee given.
One aspect of the present invention provides a method and a system for securing data and transmitting it securely. Data is encrypted on a source computer and transmitted to a receiving computer. Users must provide authentication to access the data on the source or receiving computer. The data is not decrypted on the receiving computer until access to it has been authorized. The data can be viewed on the receiving computer or processed to create a print file. The print file can be printed onto pre-printed or partially pre-printed forms. A second aspect of the present invention provides a method for dividing a data file into portions and encrypting the portions. Not all of the portions are encrypted by the same encryption method. An index file describes the portions into which the data was divided and the methods of encryption used to encrypt the portions. The different encryption methods can use different keys. These keys can be produced by multiplying an encryption key by random numbers.