New patents are issued by the USPTO on Tuesdays. Both of today's Spotlight Patents concern aspects of digital rights management. Assigned to Adobe, the first patent addresses techniques for a digital rights management retrieval system. Assigned to EMC, the second patents addresses data classification for digital rights management.
9,325,680, "Digital rights management retrieval system," assigned to Adobe.
A digital rights management retrieval system is provided. In some embodiments, a digital rights management system includes receiving a first notification from a first client device of a first protected content transaction for a first user with a first content distributor, wherein the first notification includes a first network address for the first content distributor; receiving a second notification from the first client device of a second protected content transaction by the first user with a second content distributor, wherein the second notification includes a second network address for the second content distributor; and maintaining a first list of content distributors for the first user, wherein the first list includes a network address for each content distributor from which the first user has downloaded protected content.
9,323,901, "Data classification for digital rights management," assigned to EMC.
Information management is used to enforce and control rights associated with data through the use of policies implemented by a digital rights management ("DRM") server. An information management system collects information about data objects in a computer system and classifies the data objects into one or more categories. The categories are mapped to service level objectives that include or request encryption and identify DRM policies to associate with data objects within each category. Each DRM policy identifies one or more users authorized to access data objects the DRM policy is associated with. Encryption is orchestrated, in one embodiment, by identifying a data object to the DRM server in an encryption request, and identifying a DRM policy to associate with the data object. The DRM server encrypts the data object and only allows it be decrypted by authorized users.