On Tuesdays the USPTO issues new patents. Both of today's Spotlight Patents concern aspects of digital rights management. Assigned to Ericsson (SE), the first patent addresses techniques for achieving a secure recording and storing of a recorded activity is based on an extended Digital Rights Management (DRM) system. Assigned to Nokia, the second patent addresses a a digital rights management (DRM) license manager to protect software applications from unauthorized use.
8,272,063, "DRM scheme extension," assigned to Ericsson (SE).
A method for achieving a secure recording and storing of a recorded activity is based on an extended Digital Rights Management (DRM) system. A recording and storing procedure is initiated, in response to recognizing one or more triggers at a device hosted by a user equipment. On the basis of the one or more triggers a Rights Issuer is located, and a Recording and Storing Instruction (RSI) is retrieved from the RI, using an existing DRM standard. Based on the RSI, a trusted storage for storing the recorded activity is located, and one or more recording procedures, involving one or more recording equipments, are activated and managed by the device. Before the recorded content is forwarded to the trusted storage, a protected content is generated from the recorded content, according to content of the RSI.
8,271,390, "Digital rights management (DRM) license manager, assigned to Nokia (FI).
A method, device, and system including a digital rights management (DRM) license manager to protect software applications from unauthorized use. The DRM license manager system binds essential application data to a software license. This binding is achieved by adding an encryption key to a software license and encrypting the application data with that key. The essential application data is any kind of data which is required for proper operation of the program, such as media files, game levels or state tables. The DRM license manager system performs a check and decrypt operation of the essential application data during program run time. It requires that the license is available on the system. It also ensures that the decryption operation can only take place if the conditions defined in the license are met.