Assigned to Trail.com, the first of today's applications discloses dynamic rights bundling. Assigned to Philips, the second application describes connection linked rights protection.
20070168288, "Method and system for dynamic digital rights bundling," assigned to Trails.com.
Abstract
Methods and systems for dynamically bundling portions into secured destination files are provided. Example embodiments provide a Dynamic Digital Rights Bundling System ("DDRBS"), which dynamically bundles a set of portions each variously containing digital rights management components, user interface controls, and content, into a secured destination file in response to a designated content request. In one embodiment, the DDRBS comprises a bundling engine, a translation engine, a merging engine, and an assortment of data repositories. These components cooperate to dynamically assemble and provide customized secured destination files comprising the requested content together with specialized user interface and digital rights management controls. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.
20070162979, "Connection linked rights protection," assigned to Philips.
Abstract
The present invention relates to a method and a system for performing digital rights management. The idea of the invention is that a master right associated with a content is stored at a first authorised device (211). An authorised device is a device which can be considered trusted and performs actions with contents according to the associated rights. These devices enforce rights that are bound to contents, and perform the security tasks of the DRM system employed. A subright is derived from the master right, which subright controls what type of access a second authorised device (261) is given to the associated content. Finally, the subright is distributed to the second authorised device, given that the second device complies with predetermined distribution criteria associated with the master right. The device distributing the subright authenticates the device which is to receive the subright, ensuring that the second device can be trusted.