Patent for Sale:Digital Rights Management
1. Fundamental security measures: This is the base of DRM (Digital Rights Management), including how to treat the encryption keys, how to store encryption key securely, how to protect digital content or software preloaded on a mobile memory device, such as USB disk or micro SD card. Parties which may feel interested include DRM companies, security companies and mobile memory device companies.
2. SRM (Secure Removable Media) is a specification of the open standard OMA. It applies DRM on mobile memory devices, such as micro SD card and USB disk. The main feature of SRM is to allow the license permitting the access of DRM protected content being installed on a mobile memory device. It is a major improvement of the traditional DRM, which only allows the license bounded to an electronic device, such as a PC, NB, mobile phone, tablet, set top box, smart TV, etc. It meets the requirement of consumers’ traditional rights of usage, including place‐shifting, time‐shifting, non‐commercial lending, rights of first sale, etc. It is not just a solution for consumers’ acceptance; as well, it is a solution to legal problem regarding consumer protection law pertaining to digital content in many countries.
3. NFC will emerge in the mobile phone applications in the near future. In a mobile phone, there are two places which can be implemented the smart card functions in NFC application, SIM card and micro SD card. SIM card is issued by telecom companies and hence is not a favorable choice for banks. Using micro SD card to perform the functions of a smart card or even smart card wallet requires special engineering works in order to enhance the security and capacity at the same time.
4. Web View Centric DRM: Due to the prevalence of mobile devices, the software applications on an electronic device are mostly browser related. Leading companies such as Google or HP are in the course of replacing the traditional operating system, which was designed primarily for desk top PC, by browser
Class 380: Cryptography
Equipment and processes which (a) conceal or obscure intelligible information by transforming such information so as to make the information unintelligible to a casual or unauthorized recipient, or (b) extract intelligible information from such a concealed representation, including breaking of unknown codes and messages.Subclass 277: KEY MANAGEMENT
Subclass 278: Key distribution
Subclass 286: Key escrow or recovery
Subclass 44: Having particular key generator
Subclass 45: Multiple key level
Class 713: Electrical Computers And Digital Processing Systems: SupportSubclass 150: MULTIPLE COMPUTER COMMUNICATION USING CRYPTOGRAPHY
Subclass 168: Particular communication authentication technique
Subclass 171: Having key exchange
Subclass 193: By stored data protection
Class 726: Information Security
This class provides, within a computer or digital data processing system, for processes or apparatus for increasing a system s extension of protection of system hardware, software, or data from maliciously caused destruction, unauthorized modification, or unauthorized disclosure. It provides for protection of data processing systems, apparatus, and methods as well as protection of information and services. Subject matter included in this class includes security policies, access control, monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused destruction, unauthorized modification, or unauthorized disclosure, and includes protection of hardware, and user protection, e.g., privacy, etc.Subclass 2: ACCESS CONTROL OR AUTHENTICATION
Subclass 26: PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION
Class 235: Registers
Machines employed for ascertaining the number of movements of various devices or machines; also, indicating devices where the purpose is to disclose the numerical extent or quantity of movement of a machine and where the device is separate and independent of the machine whose movements are to be noted; also organized machines, such as, cash-registers, fare-registers, voting machines and calculators having registering or counting devices as essential or important elements and having in addition certain other features necessary to make up the complete machines for the purposes desired.Subclass 380: Credit or identification card systems
Subclass 487: RECORDS
Subclass 492: Conductive
Class 700: Data Processing: Generic Control Systems Or Specific Applications
This class is structured into two main divisions: (1)for the combination of a data processing or calculating computer apparatus (or corresponding methods for performing data processing or calculating operations) AND a device or apparatus controlled thereby, the entirety hereinafter referred to as a "control system". (2)for data processing or calculating computer apparatus (or corresponding methods for performing data processing or calculating operations) wherein the data processing or calculating computer apparatus is designed for or utilized in a particular art device, system, process, or environment, or is utilized for the solution of a particular problem in a field other than mathematics (arithmetic processing per se is classified elsewhere).Subclass 110: Defect analysis or recognition
Class 324: Electricity: Measuring And Testing
This is the residual home for all subject matter, not elsewhere classified, relating to the measuring, testing (or sensing) of electric properties, (e.g., determining ground resistivity, determining frequency of an alternating current, determining kilowatt hour demand), or the measuring, testing or sensing of nonelectric properties by electric means (e.g., determining moisture, a nonelectric property, by measuring conductance with a resistance bridge; determining speed, a nonelectric property by use of an electric tachometer).
Class 365: Static Information Storage And Retrieval
Apparatus or corresponding processes for the static storage and retrieval of information. For classification herein, the storage system must be (1) static, (2) a singular storage element or plural elements of the same type, (3) addressable.Subclass 189.05: Having particular data buffer or latch