[9933] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: MS Patent for DRM OS [US-A-6,330,670]

daemon@ATHENA.MIT.EDU (Axel H Horns)
Thu Dec 13 09:33:14 2001

From: "Axel H Horns" <horns@ipjur.com>
To: cryptography@wasabisystems.com
Date: Thu, 13 Dec 2001 12:41:36 +0100
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Message-ID: <3C18A200.16618.11ECC7@localhost>
In-reply-to: <E16ENN4-0004sj-00@granger.mail.mindspring.net>

On 12 Dec 2001, at 23:16, John Young wrote:

> Microsoft's patent for a Digital Rights Management
> Operating System was awarded yesterday:
> 
>   http://cryptome.org/ms-drm-os.htm
> 
> Abstract

More relevant than the abstract: The independent claims of the patent.

------------------------------- CUT -------------------------------

1. A computerized method for a digital rights management operating 
system comprising:  

assuming a trusted identity;  

executing a trusted application;  

loading rights-managed data into memory for access by the trusted 
application; and  

protecting the rights-managed data from access by an untrusted 
program while the trusted application is executing.  

[...]

17. A computer system comprising:  

a processing unit;  

a system memory coupled to the processing unit through a system bus;  

a computer-readable medium coupled to the processing unit through a 
system bus; and  

a digital rights management operating system executed from the 
computer-readable medium by the processing unit, wherein the digital 
rights management operating system causes the processor to create a 
trusted identity for the digital rights management operating system.  

[...]

22. A computer-readable medium having computer-executable 
instructions for a digital rights management operating system stored 
thereon comprising:  

obtaining, from a computer processor, a first value for a monotonic 
counter;  

presenting, to a trusted time server, the first value for the 
monotonic counter;  

receiving, from the trusted time server, a certificate binding the 
first value of the monotonic counter to a time on the trusted time 
server;  

obtaining, from the processor, a second value for the monotonic 
counter before loading a trusted component;  

calculating, using the certificate and the second value, a trusted 
current time;  

comparing a time stamp on a trusted component with the trusted 
current time; and  

determining whether to load the trusted component based on the 
comparison.  

[...]

------------------------------- CUT -------------------------------

Hmmmm.... havn't checked that yet but I can hardly believe that those 
subject-matters as granted by USPTO *really* were novel and inventive 
on January 08, 1999 ...   

Axel H Horns
Patentanwalt




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post