Tuesdays the Patent Office issues new patents. Today's Spotlight Patents both address aspects of digital rights management. Assigned to Sony Ericsson, the first patent concerns techniques for distributing content to a mobile device with digital rights. Assigned to Nokia, the second patent concerns techniques for managing access rights to information spaces.
8,447,992, "Method for distributing content to a mobile device with digital rights and mobile device therefor," assigned to Sony Ericsson Mobile Communications AB (SE).
The invention relates to a method for distributing content to a mobile device using a digital rights management (DRM) scheme, adapted for the case when files are exchanged over an external memory or over a serial connection between a computer (PC) and the mobile device, and a mobile device (ME) adapted therefor. The mobile device creates a request file (RORe-questrop) comprising information necessary for forming a rights object file. On the computer side, the request file is retrieved and a response file is sent back to the mobile device including the encrypted content (Contentdcf) and a rights object file (Content.ro). The mobile device receives the response file and decrypts and stores the content. The files may be exchanged over a DRM folder, arranged in the mobile device and accessible by the computer in mass storage mode, or the DRM folder may be arranged in an external memory (MS) alternately accessible by the mobile device and the computer.
8,447,974, "Method and apparatus for managing access rights to information spaces," assigned to Nokia (FI).
An approach is provided for managing access rights of users to information spaces using signatures stored in a memory tag. A signature manager caused reading of a memory tag to initiate a request, from a device, for an initial access to an information space. The request includes an authorization signature associated with the device. The signature manager determines a level of access to the information space by comparing the authorization signature against a lattice of signature primitives associated with the information space. The signature manager then modifies the authorization signature based on the determination and stores the modified authorization signature for validation of subsequent access to the information space by the device.