Pierre Chavanne - Davis CA, US John Hwa - Fremont CA, US Lakshmana Pamarthy - Santa Clara CA, US Carl Quinn - San Jose CA, US Ralph Hill - Los Gatos CA, US Eric Swenson - Soquel CA, US Motomasa Futagami - Sunnyvale CA, US Atsushi Mituszawa - Kanagawa, JP
Assignee:
Sony Corporation - Tokyo Sony Electronics Inc. - Park Ridge NJ
International Classification:
H04L 9/00 G06F 11/30
US Classification:
713193, 380 28, 380 37, 380268
Abstract:
Protection of digital content using a specific application of block cipher cryptography is described. The digital content is encrypted using an encryption key and a calculated initialization vector. The digital content includes a plurality of strides of data and each stride includes a string of data to be encrypted and a block of data to be encrypted. The calculated initialization vector to be used to encrypt the block of data is derived from the string of data in the stride to be encrypted. Furthermore, the initialization vector is calculated by performing an exclusive disjunction function on a seed value and the string of data for each stride.
Systems And Methods For Managing And Protecting Electronic Content And Applications
Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.
Michael K. MacKay - Los Altos CA, US W. Olin Sibert - Lexington MA, US Richard A. Landsman - Scotts Valley CA, US Eric J. Swenson - Santa Cruz CA, US William Hunt - Walnut Creek CA, US
Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software.
Systems And Methods For Managing And Protecting Electronic Content And Applications
Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.
Michael K. MacKay - Los Altos CA, US W. Olin Sibert - Lexington MA, US Richard A. Landsman - Scotts Valley CA, US Eric J. Swenson - Santa Cruz CA, US William Hunt - Walnut Creek CA, US
Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software.
Methods and systems for controlling the distribution of digital content are provided. A license holder acquires protected content and an original digital license to the protected content from a content provider system. The license holder in turn delegates all or part of the grants in that original license to other qualified devices or clients. The content remains in its original, protected or encrypted form while it is delivered from the license holder to the client along with a digital sublicense that the client receives from the original license holder, whereupon the content can then be rendered. The original digital license defines or governs the conditions under which such delegation occurs, and includes terms under which such delegation is permitted to continue in order to enforce the intent of the content provider.
Marc E. Strohwig - Walnut Creek CA, US Yoji Kawamoto - Tokyo, JP Motohiko Nagano - Tokyo, JP Pierre Chavanne - Davis CA, US Norifumi Goto - Tokyo, JP Eric John Swenson - Soquel CA, US
Assignee:
Sony Corporation - Tokyo Sony Electronics Inc. - Park Ridge NJ
International Classification:
G06F 7/04
US Classification:
726 26, 713178
Abstract:
A method for monitoring time so that the use of protected content can be controlled includes receiving a trusted time value from a trusted authority external to a client device. When the client is no longer in communication with the trusted authority, the previously-received trusted time value is updated by use of the client's operating system counter so that a calculated trusted time value is derived for content license evaluation purposes.
Method, Apparatus And System For Use In Distributed And Parallel Decryption
Pierre Chavanne - Davis CA, US Oscar Steele - Sunnyvale CA, US Yoji Kawamoto - Tokyo, JP Eric Swenson - Soquel CA, US
Assignee:
Sony Corporation - Tokyo Sony Electronics Inc. - Park Ridge NJ
International Classification:
H04L 9/00 H04N 21/2347 H04N 21/00
US Classification:
380281, 726 27, 726 28, 726 29, 726 30, 380277
Abstract:
The present embodiments advantageously provide methods and systems for use in decrypting content, and in some preferred embodiments expanding a security environment to distribute the computational processing involved in decryption. In some embodiments, a method for use in decrypting content is provided that receives a first content key at a first system for the decryption of a first track of encrypted content; encrypts the first content key according to a first instance key known at the first system; communicates the first encrypted content key over an externally accessible communication link to a second system; generates the first instance key at the second system independent of the first system; decrypts the first encrypted content key using the generated first instance key at the second system; and decrypts the first track of encrypted content using the first unencrypted content key at the second system.
Eric Leon Swenson (August 4, 1946, San Francisco - June 20, 2011, San Francisco) was an American skateboard designer and magazine publisher. He was the chief skateboard ...
Oct 2010 to 2000 Property and Auto Adjuster IIIInsurance Servicing, CSAA
Jan 2009 to Feb 2010 Call Center SupervisorDRN Program, CSAA, Colorado Springs
Nov 2006 to 2008 Property Damage Specialist, Team LeadKeva Juice Franchise Phoenix, AZ Jun 2005 to Jul 2006 Owner/ManagerScottsdale Insurance Scottsdale, AZ Jun 2003 to Jun 2005 Senior Claims representative
Education:
Worcester State College Worcester, MA 1991 to 1995 Bachelors in Communications/Public Relations
Swensonia was founded in 1995 as a production management consultancy serving media companies, internet startups, ad agencies and sole practitioner artists and... Swensonia was founded in 1995 as a production management consultancy serving media companies, internet startups, ad agencies and sole practitioner artists and designers.
The idea was that both large companies and small entities share common issues managing the intersection of technology...
Soquel, CA Santa Cruz, CA Felton, CA Carlisle, MA Cambridge, MA Arlington, MA College Park, MD
Work:
InterTrust Technologies - Sr. Systems Architect (2007) Sony Corporation of America - Systems Architect (2002-2007) InterTrust Technologies - VP Product Architecture (1997-2002)
Education:
Massachusetts Institute of Technology - EECS
Eric Swenson
Work:
Elsevier BV - Director Product Management Swensonia Inc - President + Principal Consultant (2007-2011) Hearst Corporation - Director Program Management (2002-2007)
Education:
New York University - Interactive Telecommunications, New York University - English and American Literature
Tagline:
Subliminal semiotician
Eric Swenson
Work:
RSJ/Swenson LLC - Founder & Managing Director Swenson Consulting Services - Owner Paychex - District Sales Manager Automobile Club of Southern California - Sales Development Manager
Education:
University of the Pacific - English
About:
Eric W. Swenson has over 25 years of experience in management, sales, training and marketing. He is the Managing Director of RSJ/Swenson, a talent management, development and human resources firm spe...
Tagline:
Leading expert on HR management and leadershig in the United States and Canada
Eric Swenson
Work:
Hollywood Kids Academy - Choreographer/Assistant (2010-2011)
Education:
Brigham Young University
Relationship:
Single
About:
I am Eric Swenson. Freshman at BYU Salt Lake Center. 18 years old.Â
Bragging Rights:
Graduated High School, Advanced Honors Diploma
Eric Swenson
Work:
Oasis Petroleum - Land Assistant (2009)
Education:
University of Houston–Downtown - Business - Marketing
Courtesy of Independent trucks The Independendent Truck Company, a respected high-quality standard in skateboarding, was co-founded by the late Eric Swenson. Skateboard business icon Eric Swenson, co-founder of Thrasher magazine and Independent trucks, ...
Skating icon, Thrasher mag co-founder Eric Swensen kills self
Skaters worldwide are mourning the loss of Eric Swenson, 64, of Potrero Hill, whose local manufacturing and publishing ventures helped launch a massive and lasting subculture. Swenson shot himself around 8:30 am without going inside the police station ...
Thrasher Magazine Co-founder Eric Swenson, 63, passed away on June 20. Ideas come a dime a dozen. People talk, but seldom act. Eric Swenson got things done. Never one to clamor for the spotlight, he preferred the hard work, orchestrating the show from ...
Suicide outside San Francisco police station was Thrasher magazine co-founder
Painful end: Eric Swenson shot and killed himself Monday outside Mission Police Station on Valencia Street. (Examiner file photo) The man who ended his life in front of the Mission Police Station on Monday was a skateboarding icon and co-founder of San ...
Thrasher magazine co-founder ID'd as suicide in front of Mission Police Station
Eric Swenson, Craig Stecyk and Fausto Vitello, at the Independent foundry in San Francisco in 1983. (Photo by MoFo/www.thrashermagazine.com) Swenson shot himself around 8:30 am without going inside the police station or talking to any officers. ...
Eric Swenson: Thrasher Magazine Co-Founder Suicide
by NowPublic Staff | June 23, 2011 at 05:34 am Eric Swenson approached the Mission District police station (Valencia at 17th St), where he shot himself in front of the building. Eric Swenson and Fausto Vitello founded Independent Trucks in 1978. ...
If this is indeed the case, a little piece of Thrasher magazine's Eric Swenson will live on forever. How sadly ironic that a man whose very name has been synonymous with skateboarding for decades would pass away the day before Go Skateboarding Day; ...
Eric Swenson, Craig Stecyk, & Fausto Vitello, at the Independent foundry in San Francisco, CA, 1983. Photo by MoFo By Octavio Lopez Raygoza Eric Swenson, 64, walked to the front of the Mission Police Station early Monday morning wearing a black shirt, ...