DIGITAL RIGHTS CONTROL USING PROCEDURES OF CONFIDENCE PROCESSING Russian patent published in 2011 - IPC H04L29/00 

Abstract RU 2419235 C2

FIELD: information technologies.

SUBSTANCE: TCG procedures are applied to check integrity or validity of platform and software of DRM, both with modifications and without modifications in a right objects acquisition protocols (ROAP) of DRM and specifications of DRM content format. In another version of realisation TCG procedures are used to amplify integrity of ROAP messages, a component of information and processing without variation of the existing ROAP protocol. In the third version of realisation TCG procedures are used to amplify integrity of ROAP messages, information and processing with some variances in the existing ROAP protocol.

EFFECT: improved data security.

23 cl, 13 dwg

Similar patents RU2419235C2

Title Year Author Number
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION 2008
  • Cha Inkhiok
  • Shakh Jodzhendra K.
  • E Chun'Sjuan'
RU2428808C2
APPARATUS AND METHOD FOR PROVIDING MOBILE MUSIC DEVICES WITH SUBSCRIPTION-BASED PLAYLIST SERVICE 2005
  • Khjujuppa Timo
  • Salo Jukha
  • Kopra Toni
  • Makipaa Mikko
  • Nikhtila Jukka
  • Levin Oren
  • Aaltonen Janne
  • Pajusalo Ari
  • Mukhonen Akhti
  • Khannikajnen Ari
  • Antola Janne
RU2412558C2
IMPROVED ACCESS TO DOMAIN 2007
  • Koster Robert P.
  • Montaner Khav'Er
  • Jakob Sorin M.
  • Korajkhi Najib
RU2447498C2
METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2444156C1
APPARATUS AND METHOD OF SENDING RIGHTS OBJECT FROM ONE DEVICE TO ANOTHER VIA SERVER 2007
  • Li Syn-Chzheh
  • Kim Te-Khen
  • Chkho En-Son
  • Son Son-Mu
  • Keshavamuvi Kiran Kumar
RU2432691C2
METHOD OF TRUSTED NETWORK CONNECTION FOR IMPROVEMENT OF PROTECTION 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2437230C2
SYSTEM OF TRUSTWORTHY NETWORK CONNECTION FOR SAFETY IMPROVEMENT 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehnkhaj
RU2437228C2
SYSTEM TO CONTROL ACCESS TO RELIABLE NETWORK BASED ON THREE-ELEMENT EQUIVALENT IDENTIFICATION 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2445695C2
METHOD AND DEVICE FOR RECEPTION AND REMOVAL OF INFORMATION CONCERNING OBJECTS OF DIGITAL RIGHTS 2005
  • Li Biung-Rae
  • Kim Tae-Sung
  • Dzung Kiung-Im
  • Okh Jun-Sang
  • Kim Shin-Khan
RU2347266C2
DEVICE AND METHOD FOR MOVING AND COPYING RIGHTS OBJECTS BETWEEN DEVICE AND PORTABLE STORAGE DEVICE 2005
  • Li Biung-Rae
  • Kim Tae-Sung
  • Dzung Kiung-Im
  • Okh Jun-Sang
  • Kim Shin-Khan
RU2377642C2

RU 2 419 235 C2

Authors

Singkhal Amit Ks.

Cha Inkhiok

Shakh Jodzhendra S.

Dates

2011-05-20Published

2007-05-04Filed