New patents are issued by the USPTO on Tuesdays including holidays such as the 4th of July. Both of this week's Spotlight Patents concern aspects of digital rights management. Assigned to Samsung, the first patent addresses techniques for transmitting and receiving message for downloadable CAS [Conditional Access System] or DRM in MMT. Assigned to Kaspersky Labs (RU), the second patent addresses techniques for controlling opening of files by vulnerable applications.
9,699,188, "Method and apparatus for transmitting and receiving message for downloadable CAS or DRM in MMT," assigned to Samsung and to the University of Seoul Industry Cooperation Foundation (KR)
A method for transmitting and receiving a message for Downloadable-Conditional Access System (D-CAS) or Downloadable-Digital Rights Management (D-DRM) in Moving Picture Experts Group Media Transport (MMT) is provided. The method includes, upon receiving Composition Information (CI) from an MMT server, acquiring signaling information for D-CAS or D-DRM, which is included in the CI, acquiring, from the signaling information, an address of a server from which software of D-CAS or D-DRM is downloadable, generating a request for the software based on the signaling information, and sending the request for the software to the server address.
9,697,361, "System and method of controlling opening of files by vulnerable applications," assigned to AO Kaspersky Lab (RU).
Disclosed are systems and methods for controlling opening of computer files by vulnerable applications. An example method includes: detecting a request from a software application to open a computer file on the user computer; determining one or more parameters of the file; determining a file access policy based on the parameters of the file, wherein the file access policy specifies at least access rights of the software application to the resources of the user computer; identifying vulnerabilities of the software application; determining an application launching policy for the software application based at least on the determined vulnerabilities, wherein the application launching policy specifies at least whether opening of the file is permitted or prohibited; and controlling opening of the file on the user computer and accessing of the computer resources by the software application working with the opened file based on the file access policy and application launching policy.