Patent application number | Description | Published |
20080255994 | Content Preview - Techniques enable creation of a preview license for digital content. In some instances, the preview license indicates that it allows a content-consuming device to consume less than all of the content. This preview license may create a list specifying multiple portions of the digital content that the content-consuming device may consume. These techniques may also present to a device user an offer to purchase rights to consume all of the digital content after consumption of the preview-licensed portion(s). In other instances, a content server may embed the preview license into a content package that contains the digital content, allowing the server to distribute the package to multiple devices. In still other instances, the preview license may be bound to a domain rather than to individual devices. This allows member devices to share the digital content and the preview license, such that each member device may enjoy the preview experience. | 10-16-2008 |
20080256592 | Managing Digital Rights for Multiple Assets in an Envelope - Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of these assets may be assigned a policy that may be different than the policy assigned to the first asset. This envelope, or a collection of envelopes, may then be provided to a content-consuming device to consume the assets in accordance with each asset's specified policy. | 10-16-2008 |
20080256646 | Managing Digital Rights in a Member-Based Domain Architecture - Techniques enable seamless movement and consumption of licensed digital content amongst multiple devices. In some embodiments, these techniques allow establishment of a domain capable of having multiple member devices. Each member device of the domain typically comprises a content-consuming device such as a personal computer, a portable media player, or the like. These techniques enable a license associated with digital content to bind to a domain rather than an individual device. As such, each member device of the domain may contain a domain identity and, with the identity, may consume the content with use of the license and in accordance with policy described in the license. These tools may also enable a member device to join multiple domains and to contain an identification of each of these multiple domains. | 10-16-2008 |
20090012805 | Portable Digital Rights for Multiple Devices - Portable digital rights for multiple devices is described. In an embodiment, a digital rights management (DRM) system includes a first device with a removable component configured as a token that is associated with a DRM license. The first device also includes a removable memory card that stores protected media content on which the first device can perform actions as permitted by the DRM license. The DRM system also includes a second device that can have the removable component and the removable memory card when removed from the first device and installed in the second device such that the second device can perform the actions on the protected media content as permitted by the DRM license. | 01-08-2009 |
20090265178 | Referral Lists for Tracking Distributed Content - Various embodiments described above can enable referral lists to be used in connection with distributed content to protect a referral infrastructure that is used with such content. In at least some embodiments, referral lists are protected using digital rights management (DRM) techniques. The DRM techniques can be used for a number of purposes including securely establishing a referring consumer, securely maintaining a chain of referring entities through distribution tracking, and maintaining control over the referral lists associated with distributed content. In at least some embodiments, DRM techniques are utilized to protect referral lists that are used in multi-level marketing networks. | 10-22-2009 |
20090271319 | Embedded Licenses for Content - In accordance with one or more aspects, a license for content is retrieved, the license having been previously embedded in the content. A requested action is allowed to be performed with the content only if a standalone license, or both a leaf license and a root license, indicate that the action with the content is permissible. Leaf licenses and/or standalone licenses can be embedded by a source of the content and/or by a target device that receives the content. Additionally, licenses can include one or more rules indicating where a target device that receives the content is to store the licenses. | 10-29-2009 |
20110167499 | Policy For Digital Rights Management - This document describes policies for digital rights management that enable distribution of full-function versions of applications that, while fully functional, have functions limited by an associated policy. A policy may be replaced or updated, thereby enabling use of previously limited functions without distribution of another version of the application. | 07-07-2011 |
20110173321 | OVER-THE-AIR DELIVERY OF METERING CERTIFICATES AND DATA - Metering is enabled through an arrangement in which a metering certificate is communicated to a mobile device using an over-the-air protocol. A metering trigger provides the metering certificate that includes a location to which metering data is posted by the mobile device and a public key of a public-private key pair, or alternatively provides a link to such metering certificate. A metering helper passes the metering certificate to a DRM system on the mobile device which collects metering data associated with the metering ID and uses the public key to encrypt the metering data into a metering challenge. The metering helper posts the metering challenge to the location. The metering service extracts the metering data from the metering challenge using a private key and generates a metering response that is received by the metering helper which prompts the DRM system to reset at least a portion of a data store in which the metering data is stored. | 07-14-2011 |
20110173454 | ASSOCIATING POLICY WITH UNENCRYPTED DIGITAL CONTENT - A content license associated with unencrypted digital content is generated, the content license including both an identifier of the unencrypted digital content and a content policy. At a user device, a determination is made as to whether the content license corresponds to particular unencrypted digital content. Use of the particular unencrypted digital content by the computing device is permitted in accordance with the content policy if the content license corresponds to the particular unencrypted digital content. However, use of the particular unencrypted digital content by the computing device based on the content license is prohibited if the content license does not correspond to the particular unencrypted digital content. | 07-14-2011 |
20110179268 | PROTECTING APPLICATIONS WITH KEY AND USAGE POLICY - One or more files of an application are obtained and configured as a virtual storage volume. An application package is generated by encrypting, using a key, the one or more files configured as a virtual storage volume. A license generation module generates a license including both a usage policy for the application and the key. A computing device, to run the application, obtains and attempts to authenticate the application package. If the application package is authenticated, then a license associated with the application package is obtained and at least part of the application package is decrypted using the key in the license. A virtual storage volume that includes the application is mounted, and the application is executed in accordance with the usage policy in the license. However, if the application is not authenticated, then the application is not executed. | 07-21-2011 |
20110258437 | SECURE LOCAL UPDATE OF CONTENT MANAGEMENT SOFTWARE - This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys without the use of a key server. | 10-20-2011 |
20120036562 | Trusted License Removal in a Content Protection System or the Like - A digital license includes an identification of a removal service that can authorize removing such license. A client selects the license to be removed and the service, constructs a challenge including therein a challenge license identification block (LIB) identifying the license to be removed, and sends the challenge to the service. The service receives the challenge, stores at least a portion of the challenge in a database, constructs a response corresponding to the challenge and including therein a response LIB identifying the license to be removed and an identification of the service, and sends the response to the client. The client receives the response, employs the response LIB from the response to identify the license to be removed, and removes the identified license upon confirming that the identification of the service in the identified license matches the identification of the service in the response. | 02-09-2012 |
Patent application number | Description | Published |
20140282460 | ENTERPRISE DEVICE UNENROLLMENT - A method and apparatus are described for unenrolling applications, such as from a mobile device. An enterprise can be associated with one or more applications. Rather than uninstalling the applications individually, a single unenroll user interface command can be used to remove all data on the mobile device associated with the enterprise. Moreover, the applications associated with the enterprise can be uninstalled. A user's personal data on the mobile device is not affected during the unenrollment. | 09-18-2014 |
20140282610 | ENTERPRISE APPLICATION MANAGEMENT WITH ENROLLMENT TOKENS - Embodiments of the disclosure provide application management capabilities to enterprises. A computing device of a user, associated with the enterprise, receives an enrollment token signed with a certificate. The enrollment token includes an enterprise identifier associated with the enterprise. The computing device receives a package containing one or more applications. The package also includes an enterprise identifier. Installation and execution of one or more applications from the received package is accepted or rejected based on a comparison of the enterprise identifier from the enrollment token with the enterprise identifier from the received package or application. A web service provides validation services by monitoring the installation and execution of applications on the computing devices associated with the enterprise. | 09-18-2014 |
20140282836 | ENTERPRISE DEVICE POLICY MANAGEMENT - When receiving multiple security policy configurations from different management sources, a computer device can apply the most secure of the policy configurations to the device. If one of the policy configurations is removed from the device, a determination can be made regarding which of the remaining security policy configurations is the most secure. Once the determination is made, one of the remaining security policies that is the most secure is applied. | 09-18-2014 |
20140282839 | UNIFIED ENTERPRISE DEVICE ENROLLMENT - A unified enrollment client is described that allows authentication and communication with disparate enterprise management source types. A first enterprise management source type can have a corporate-based management server which is on the premises of the corporation. A second enterprise management source type can have a cloud-based management server in which a corporate server communicates through a federation gateway to a cloud-based management server. Authentication can be handled regardless of the source type through the use of a discovery request which identifies the source type so that the enrollment client knows how to tailor the authentication, if any is needed, to the particular enterprise management source. | 09-18-2014 |
Patent application number | Description | Published |
20080238464 | SYSTEM AND METHOD OF MITIGATING EFFECTS OF COMPONENT DEFLECTION IN A PROBE CARD ANALYZER - A system and method of mitigating the effects of component deflections in a probe card analyzer system may implement three-dimensional comparative optical metrology techniques to model deflection characteristics. An exemplary system and method combine non-bussed electrical planarity measurements with fast optical planarity measurements to produce “effectively loaded” planarity measurements. | 10-02-2008 |
20100061620 | PROBE MARK INSPECTION - Probe mark inspection involves a recipe based on unique image characteristics or combinations of unique image characteristics. Result images are correlated with a reference created to determine which image characteristic or combination of image characteristics provides an improved contrast. | 03-11-2010 |
20100073019 | APPARATUS FOR OBTAINING PLANARITY MEASUREMENTS WITH RESPECT TO A PROBE CARD ANALYSIS SYSTEM - A system and method of mitigating the effects of component deflections in a probe card analyzer system may implement three-dimensional comparative optical metrology techniques to model deflection characteristics. An exemplary system and method combine non-bussed electrical planarity measurements with fast optical planarity measurements to produce “effectively loaded” planarity measurements. | 03-25-2010 |
20100305897 | METHOD OF APPLYING THE ANALYSIS OF SCRUB MARK MORPHOLOGY AND LOCATION TO THE EVALUATION AND CORRECTION OF SEMICONDUCTOR TESTING, ANALYSIS, AND MANUFACTURE - By examining scrub mark properties (such as position and size) directly, the performance of a wafer probing process may be evaluated. Scrub mark images are captured, image data measured, and detailed information about the process is extracted through analysis. The information may then be used to troubleshoot, improve, and monitor the probing process. | 12-02-2010 |
20100321056 | SYSTEM AND METHOD OF MEASURING PROBE FLOAT - A system and method allow accurate calculation of probe float through optical free-hanging and electrical planarity measurement techniques. In accordance with an examplary embodiment, probe float may be determined by acquiring a free-hanging planarity measurement, obtaining a first electrical contact planarity measurement, and calculating probe float using results of the acquiring and the obtaining operations. | 12-23-2010 |
20110089965 | PROBE CARD ANALYSIS SYSTEM AND METHOD - A system and method for evaluating wafer test probe cards under real-world wafer test cell condition integrates wafer test cell components into the probe card inspection and analysis process. Disclosed embodiments may utilize existing and/or modified wafer test cell components such as, a head plate, a test head, a signal delivery system, and a manipulator to emulate wafer test cell dynamics during the probe card inspection and analysis process. | 04-21-2011 |
20120150475 | APPARATUS FOR OBTAINING PLANARITY MEASUREMENTS WITH RESPECT TO A PROBE CARD ANALYSIS SYSTEM - A system and method of mitigating the effects of component deflections in a probe card analyzer system may implement three-dimensional comparative optical metrology techniques to model deflection characteristics. An exemplary system and method combine non-bussed electrical planarity measurements with fast optical planarity measurements to produce “effectively loaded” planarity measurements. | 06-14-2012 |
20140021970 | PROBE CARD ANALYSIS SYSTEM AND METHOD - A system and method for evaluating wafer test probe cards under real-world wafer test cell condition integrates wafer test cell components into the probe card inspection and analysis process. Disclosed embodiments may utilize existing and/or modified wafer test cell components such as, a head plate, a test head, a signal delivery system, and a manipulator to emulate wafer test cell dynamics during the probe card inspection and analysis process. | 01-23-2014 |