New pending patent applications are published by the USPTO on Thursdays. Both of today's Spotlight Applications concern aspects of digital rights management. Assigned to eBay, the first application discloses techniques for digital rights and integrity management in three-dimensional (3d) printing. Assigned to Sony, the second application discloses techniques for digital rights management of encrypted digital content.
20160171354, "Digital rights and integrity management in three-dimensional (3d) printing," assigned to eBay.
Abstract
Systems, methods and media for managing digital rights and pre-verification of structural integrity in three-dimensional (3D) printing are provided. In one example, a system comprises at least one module, executing on one or more computer processors, to receive a request from a user to print a 3D object by a 3D printer or printing service and receive a conditional authorization from an owner of digital rights in the 3D object to print the 3D object. The conditional authorization can include a printing specification or limitation. The at least one module pre-verifies, for structural integrity once printed by the 3D printer or printing service, a digital model on which the 3D object is based. In response to a received conditional authorization, the at least one module transmits instructions to the 3D printer or printing service to print the 3D object.20160173455, "Method and system for digital rights management of encrypted digital content," assigned to Sony (JP).
Abstract
Various aspects of a method and system for digital rights management of encrypted digital content are disclosed herein. The method includes determination of a seed value from a pre-stored vault file that corresponds to a registered user. The determination of the seed value is based on biometric information provided by the registered user. The method further includes generation of a set of intermediate values based on the determined seed value. The generation of the set of intermediate values is based on a pre-determined rule. The method further includes determination of a content key based on the generated set of intermediate values.