New patents are issued on Tuesdays (Including patent 10,000,000). Both of today's Spotlight Patents concern aspects of digital rights management. Assigned to Adobe, the first patent addresses techniques for parts-based digital rights management. Assigned to Sony (JP), the second patent addresses techniques for digital rights management of encrypted digital content
10,002,237, "System and method for parts-based digital rights management," assigned to Adobe.
Abstract
Various embodiments of a system and method for parts-based digital rights management are described. Various embodiments may include a digital rights management component configured to receive content comprising a plurality of portions of content. The digital rights management component may also receive a license for the encrypted content; the license may include a plurality of permissions each specific to a respective portion of the content. Additionally, each permission may specify one or more access privileges for the respective portion of the content. The digital rights management component may receive a digital signature for the entire license. The digital rights management component may validate the digital signature to determine that the permissions have not been modified. The digital rights management component may also be configured to, in response to determining that said permissions have not been modified, provide access to content in accordance with said license including said permissions.
9,992,171, "Method and system for digital rights management of encrypted digital content," assigned to Sony (JP).
Abstract
Various aspects of a method and system for digital rights management of encrypted digital content are disclosed herein. The method includes determination of a seed value from a pre-stored vault file that corresponds to a registered user. The determination of the seed value is based on biometric information provided by the registered user. The method further includes generation of a set of intermediate values based on the determined seed value. The generation of the set of intermediate values is based on a pre-determined rule. The method further includes determination of a content key based on the generated set of intermediate values.