On Tuesdays the USPTO issues new patents. Both of today's Spotlight Patents concern aspects of digital rights management. Assigned to Sony, the first patent addresses techniques for video upscaling. Assigned to SanDisk, the second patent addresses techniques for providing access to files based on user identity.
8,165,197, "Method and apparatus for video upscaling," assigned to Sony (JP).
Abstract
Upscaling video data for presentation on a relatively high resolution display device is described. Supplemental video data corresponding to video data is accessed and acquired in response to a request to upscale the video data. The video data and the supplemental video data are combined to produce a combined video data for displaying particular video content on a destination display device at a resolution that is high relative to the local display device. Digital rights management information may be verified prior to producing the combined video data, and additional digital rights information may be applied prior to transmitting the combined video data to the destination display device. A device registration database may also be used to control production and transmission of the upscaled video to other devices.
8,166,067, "Method and apparatus for providing access to files based on user identity," assigned to SanDisk IL (IL).
Abstract
A storage device provides a file system to a host based on the access rights of a user determined during authentication. If the authentication does not succeed, the storage device provides to the user a file system restricted to files authorized by public access rights. If the authentication does succeed, and the user is a device owner, the storage device provides to the user the native file system. If the authentication succeeds, and the user is not a device owner, the storage device provides a file system that is restricted to files that the given user is authorized to access. Due to the internal nature of the mechanism for safeguarding files, this security measure cannot be circumvented by simply connecting the storage device to another host that does not respect the permission rules of the file system.