Robinson, 2012 - Google Patents
Digital Rights Management Lite: Freeing Ebooks from Reader Devices and Software: Can Digital Visible Watermarks in ebooks Quality for Anti-circumvention …Robinson, 2012
- Document ID
- 3037163768171301102
- Author
- Robinson D
- Publication year
- Publication venue
- Va. JL & Tech.
External Links
Snippet
With explosive growth in the ebook market, publishers are looking for ways to effectively distribute ebooks while preventing them from being resold or used in violation of the terms of use. The current market is dominated by ebook-reader software and hardware, which is …
- 230000004224 protection 0 title description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0779—Transfer
- G06F2221/0791—Superdistribution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0702—Binding
- G06F2221/0704—Device
- G06F2221/0706—Domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0775—Logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
- G06Q50/184—Intellectual property management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hinkes | Access controls in the digital era and the fair use/first sale doctrines | |
Robinson | Digital Rights Management Lite: Freeing Ebooks from Reader Devices and Software: Can Digital Visible Watermarks in ebooks Quality for Anti-circumvention Protection under the Digital Millennium Copyright Act | |
Capobianco | Rethinking ReDigi: How a Characteristics-Based Test Advances the Digital First Sale Doctrine Debate | |
Hunter | Here there be pirates: How China is meeting its IP enforcement obligations under TRIPS | |
Deniesa et al. | Copyright Protection for Creators of Digital Artwork | |
Smith | The Shrinkwrap Snafu: Untangling the Extra Element in Breach of Contract Claims Based on Shrinkwrap Licenses | |
España | The Fallacy that Fair Use and Information Should Be Provided for Free: An Analysis of the Responses to the DMCA's Section 1201 | |
Wheatley | Overreaching Technological Means for Protection of Copyright: Identifying the Limits of Copyright in Works in Digital Form in the United States and the United Kingdom | |
Martin | Vicarious and Contributory Liability for Internet Host Providers: Combating Copyright Infringement in the United States, Russia, and China | |
Srivastava | Digital Rights Management: The New Copyrights | |
Sparkler | Senators, Congressmen, Please Heed the Call: Ensuring the Advancement of Digital Technology Through the Twenty-First Century | |
Tuononen | DRM Circumvention and Criminal Sanctions | |
Putra | Criminal Law Enforcement of Book Copyright Infringement in Digital Market Places in The Ecosystem E-Commerce Through Restorative Justice | |
Espinosa | Internet piracy: is protecting Intellectual Property worth government censorship | |
Melese | Analysis of Legal Framework Protecting Technological Copyright Protection Measures and Copyright Exceptions in Ethiopia: Lessons from United States and European Union Copyright Legislations | |
Bouzidi | Adjacent technical mechanisms to protect the digital Copyright | |
Hiaring | What's new in the neighborhood-the export of the DMCA in post-TRIPs FTAs | |
Jadhav et al. | Copyright and Related Issues | |
Gasser | Copyright and Digital Media in a Post-Napster World: 2005 Update | |
Diriyai | To be or not to be? Constructing a Digital Exhaustion Doctrine in the EU and US | |
Lutzker et al. | Altering the contours of copyright-The DMCA and the unanswered questions of Paramount Pictures Corp. v. 321 Studios | |
Williams | Congress Should Amend the Copyright Act to Protect Transactional Watermarks | |
Sookman | " TPMs": A Perfect Storm for Consumers: Replies to Professor Geist | |
Vaseva | Digital rights management | |
Lindblom | Using Products Liability Law for Guidance in the Grokster File-Sharing Scenario: Why the Sony Rule Should Be Refined |