Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


MfiUHhKSON KWOK CHEN 


l\v omas op 
mot AHia^f 

2*02 MICHBLSON djl 

suite 210 

IRVINE, CA 93611 

Qi ?J 733.7040 
FAX (949) 751.7049 


NO. 254 P. 3 


Applicants) 
Assignee: 
Tide: 

Serial No.: 
Examiner: 
Docket No.: 


In The United States Pat ent And Trademark Office ^/ 

/ y 

Greg Benson; Gregory H. Urich; Christopher L. Knauft 
Maciovision Corporation : 

^ rn^S? v S IS? M F ° R PAGING A DATA OBJECT SO 
AS TO COMPLY WITH PREDETERMINED CONDITIONS FOR 
USAGE 


09/321,386 
M. Von Buhr 
M-I5081 US 


Filing Date: May 27,1999 
Group Art Unit: 2171 


Mail Stop Amendment 
I COMMISSIONER FOR PATENTS 
I Arlington, VA 22313-1450 


Irvine, California 
August 22, 2003 


AMENDMENT 

I Dear Sir: 

Applicants submit the following amendments and remarks. 


vj 


Serial No. 09/321,386 


P. 4 


IN THE CLATMS 
Please cancel Claims 55-63, 67-74, 77-78, 81^ 86-87^ and 96-^0. 


/ Ml 


. LAW OFTTCXJ 07 
CHSHA BQtXbul 

sunn »© 

IRVINE, CA 92*12 
(M 9) 732.7040 


1. (original) A method of managing a data object so as to comply with control 
conditions for usage of the data object, comprising: 

storing a data object in the memory of a data object provider processor; 

providing a variable number of control conditions for usage of the da* object; 

providing a general set of control data for the data object based on the variable 
number of control conditions for usage, the general set of control data comprising at 
least one or more usage control elements defining usages of the data object which 
comply with the variable number of control conditions; and 

encrypting at least the data object to create a secure data package so that it is 
ready to transfer to a user data processor. 


2. (original) The method of Claim 1, additionally comprising encrypting together | 
the data object and the general set of control data. 

3. (original) The method of Claim 1, wherein providing the general set of control | 
data includes providing an identifier which uniquely identifies the general set of control data. 

4. (original) The method of Claim 1, wherein providing the general set of control 
data includes providing a security control element which identifies a security process to bej 
applied before usage of the data object is allowed. 

5. (original) The method of Claim 1, wherein providing the general set of control I 
data includes providing a format control element which identifies the format of the control 
data. 1 

6. (original) The method of Claim 1, additionally comprising: 
receiving a request for authorization for usage by a user, 
comparing the usage for which authorization is requested with the one or more 

usage control elements of the general set of control data; and 


v.J 


-2- 


Serfcl No. 09/321,386 1 


granting the authorization if the usage for which authorization is requested 
complies with the usages denned by the one or more usage control elements. 

7. (original) The method of Claim 6, additionally comprising requiring payment 
for the requested authorization for usage before granting the authorization. 

8. (original) The method of Claim 1 , additionally comprising: 
transrnitting the secure data package into the data processor; 
checking, in response to a request by a user for usage of the data object, 

whether the requested usage complies with the usage defined by the at least one usage 
control element of the general set of control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the general set of control data, the 
data object so as to enable the requested usage. 

9. (original) The method of Claim 8, additionally comprising: 
combining, after the usage of the data object, the data object and the one or 

more usage control elements; and 

reencryptmg at least the data object 

10. (original) A method of controlling the usage by a user of a data object so as to 
omply with control conditions for usage of the data object, comprising: 

providing a variable number of control conditions for usage of the data object; 
providing a data object and control data, which comprises at least one usage 
control element defining a usage of the data object which complies with the variable 
number of control conditions, the data object being encrypted; 

receiving a request by the user for usage of the data object; 
checking, in response to the request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the control data, the data object 
and enabling the requested usage. 

" 3 " Serial No. 09732 1,386 


x-aw omcwoi 

MftcHOJlSOttKWOX 
PTFJf tHQDtlf 

2*01 MIOELSONDJl 
SUXXE2J0 
IRVWE. CA StMU 
CHS? m-7&40 


I 


NO. 254 P. 6 


II- (original) The method of Claim 10, wherein the usage control element is 
updated after the at least one usage of the data object 

12. (original) The method of Claim 10, wherein the control data comprises an 
indication of the number of times the user is authorized to use the data object in accordance 
with the at least one usage control element, wherein the requested usage of the data object is 
only enabled when the number of times is one or more, and wherein the number of times is 
decremented by one when the requested usage is enabled. 


13. (original) The method of Claim 10, wherein the control data comprise a 
security control element, and additionally comprising executing, before each usage of the data 
object, a security procedure defined in the security control element. 


14. (original) The method of Claim 10, wherein checking whether the requested 
usage complies with the usage defined by the at least one usage control element, comprises 
checkmg that a data processor is capable of executing a security procedure specified in a 
secunty control element of the at least one usage control element, and if not, disabling the j 
usage. ' 

15- (original) The method of Claim 10, additionally comprising: 

combining, after the usage of the data object, the data object and the one or 

more usage control elements; and 

reencrypting at least the data object 


16. (original) A system for managing a data object so as to comply with control | 
conditions for usage of the data object, comprising: 

a user interface module which receives a variable number of control 

conditions; 

a packaging module which provides a general set of control data for the data 
object based on the variable number of control conditions for usage, the genend set of 
control data comprising at least one or more usage control elements defining usages of 

" 4 " Serial No. 09/321386 


VJ 


NO. 254 P. 1 


the data object which comply with the variable number of control conditions and 
which packages the general set of control data; and 

an encrypting module which encrypts the data object to create a secure data 
package, which is ready for transfer to a user. 



lAWOMJCKOP 
CHEN 4t BOD Llt 
2«02 MICKELSON DJL 

sum: 210 

DIVINE. Ca TUM 

(9*5)753-7040 
FAX f>*») 7S2-7O40 


17. (original) Hie system of Claim 16, wherein the general set of control data I 
| comprises a control data element which controls further distribution of the data object 


18. 


(original) The system of Claim 16, wherein one of the usage control elements I 
includes a security control element that defines a security procedure. 

19. (original) A system for controlling the usage by a user of a data object so as to j 
comply with control conditions for usage of the data object, comprising: 

a usage manager module which receives a variable number of control 
conditions, checks whether a usage requested by the user complies with the usage 
defined by at least one usage control element that complies with the variable number 
of control conditions, and disables the usage requested by the user when the usage 
does not comply with the usage defined by the at least one usage control element; and 

a decryption module which decrypts the data object, responsive to the check 
for requested usage by the usage manager module. 

20. (original) The system of Claim 19, wherein one of the usage control elements 
includes a security control element that defines a security procedure. 


21. 


encryption algorithm. 


(original) The system of Claim 20, wherein the security procedure 


is an RSA 


22. (original) The system of Claim 19, wherein the usage manager module | 
encrypts the data object after usage. 

23. (original) A method of controlling the usage by a user of data objects so as to 
comply with a variable number of conditions for usage of the data objects, comprising: 


-5- 


Serial No. 09/321386 


NO. 254 P. 8 


providing at least two data packages, each data package comprising a data 
object and a user set of control data, which comprises at least one usage control 
element defining a usage of the data object which complies with the variable number j 
of conditions, the data object being encrypted; 

examining the usage control elements of the at least two data packages to find I 
a match; and 

performing an action being specified in the user sets of control data of the at i 

least two data packages. 


24. (original) The method of Claim 23, wherein one of the at least two data i 
packages is a sell order, and wherein one of the at least two data packages is a buy order. 

25. (original) The method of Claim 23, additionally comprising checking whether 
a data processor is capable of executing a security procedure specified in a security control 
element of the at least one usage control element, and disabling the usage when the data I 
processor is not capable of executing the security procedure, and decrypting the data objects 


26. 


(original) The method of Claim 25, additionally comprising: 

updating the at least one usage control element of each data package; and 

reencrypting each of the data object. 


27. (original) A method of managing a data object so as to comply with a variable 
number of control conditions for usage of the data object, comprising: 

providing variable control conditions for usage of the data object; 
providing a general set of control data for the data object based on the variable 
control conditions for usage, the general set of control data comprising at least one or 
more usage control elements defining usages of the data object which comply with the 
variable control conditions; 

providing, in response to a request for authorization for usage of the data 
object by a user, a user set of control data, which comprises at least a subset of the 
general set of control data, including at least one of the usage control elements; 
encrypting at least the data object to create a secure data package; and 


-6- 


Serial No. 09/321386 


«0.254 P. 9 


checking, before allowing transfer of the data package to the user, that the 
request for authorization for usage of the data object has been granted. 

28. (original) The method of Claim 27, additionally comprising checking whether 
a da* processor is capable of executing a security procedure specific in a security control 
element of the at leas, one usage control element, and disabiing the usage when rhe data 
processor is not capable of executing the security procedure. 

29. (original) The method of Claim 27, whereto the data object is composed of a, 
.east two constituent data objects and wherein the user se, of eontro! data, in response to a 
request for aumorizarion for usage of one of the constituent dam object by a user, is created 
only for that constituent data object and combined only with a copy of that constituent da* 

object. 

30. (original) Tie method of Claim 27, wherein the request for authorization is 
received from a user via a data network. 

I „. ( ° riiSiM,) ^"^"f Claim 27, wherein the data object is a composite daa 

object rnc.ucung at leas, two constituent data obje«s, and wherein providing a general set of 
control data comprises providing a respective general set of control data for each of the 
constituent data objects and ft. composite data object, and wherein providing a user se, of 
control data comprises providing a respective user se, of control data for each of the 
[ constituent data objects and the composite data object 

32. (original) The method as defined in Claim 27, additionally comprising storing 
[ the user se, of control dam in a processor of a data object provider. 

33. (original) The method as defined in Claim 27, additionally comprising: 
transmitting the data package; 

checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the user set of control data; and 


v.1 


-7- 


Serial No. 09/321,386 


macpitxkscw jcwdjc 

CBDIABXIDll* 

SUITE 110 
IRYINS. CA f26I2 


f. 10 


decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element ofthe user setof control data, the 
data object and enabling the requested usage. 


34. 


(original) The method of Claim 27, additionally comprising: 
transmitting the data package; and 
reencrypting the data object 


35. ( 0ri8inaI) A sysfcm for mw ^ Bg a ^ so as to comply with . 

conditions for usage of the data object, comprising: 1 

apackagrngmoddewhich provides a general set of contro! dataforthe da* 
object based on variable conditions for usage, the general set of coitro, data 
comprising a« leas, one or more usage control dements defimng usages of the data 
object which comply with tie variable conditions and which combines the user set of 

conr.o.datawiftmeda^obj^andwheremftepackagingmoduIep.oWdesm 
nespouse to a reoues, for authorization for usage of <he data object by a user, a user se, 
of co^ro, data, which comprises at leas, a subset of the genenu s« of control dafc, 
which subset comprises a, least one of .he usage control elements- 

an encrypting module which ^crypts me dati, object to create a secure data 
package, which is ready for transfer to a user; and 

a contiol module which checks thtf the reaues, for authorization for usa»e of 
to. d*a object has been granted before allowing transfer of the date package to tie 


36. (origina!) A method of managing a dati, objeo, so as to comply witi rontroi 
' conditions for usage ofthe data object, comprising: 

providing a general set of control data for die dau object based on a variable 
number of control conditions for usage, the genera, se, of con*,, da* comprisin. a. 
leas, one or more usage eontiol elements defining usages of the data object which" 
conmly wu me variable number of control conditions; and 

encrypting a, leas, the data object to create a, leas, one secure data package 
which is ready for transfer to a user. 


▼J 


-8- 


Serial No. 09/321,386 


NO. 254 P. n 


6' 


l»w omcss or 

J"3MICHELSaNDIL 

sum no 


37. (original) Tie method of Claim 36, wherein the data object and the usage 
control elements are encrypted into a single secure package. 

38. (original) The method of Claim 36, wherein providing the general set of 
control data includes providing a security control element which identifies a security process 
to be applied before usage of the data object is allowed 

39. (original) The method of Claim 36, wherein providing the general set of 
control data includes providing a format control element which identifies the format of the 
control data. 


40. (original) The method of Claim 36, additionally comprising: 

receiving a request for authorization for usage by a user; 

comparing the usage for which authorization is requested with the one or more 
usage control elements of the general set of control data; and 

granting the authorization if the usage for which authorization is requested 
complies with the usages defined by the one or more usage control elements. 


SO 


41. (original) A method of managing a data object at a data provider computer 
as to comply with control conditions for usage of the data object, comprising: 

providing a variable set of control data for the data object, *e variable set of 
control data including usage information regarding the data object; 

concatenating the variable set of control data with the data object; and 
encrypting at least the data object to create at least one secure data package 
that is ready for transmission to a user data processor. 


42. (original) The method of Claim 41. wherein the encrypting includes storing 
the at least one secure data package at the data provider computer. 

43. (original) A method of managing a data object at a data provider computer so 
as to comply with control conditions for usage of the data object, comprising: 


T.1 


-9- 


Serial No. 09/321386 


fa 


lAWornasor 

CHEN* HD1> up 

3402 MXCHELGOt? OIL 
SUITE 110 . 

(«S) 752-70*0 


providing a set of control data for the data object based on a variable number 
of contfol conditions for usage, the se, of contml data including usage information 
regarding the data object; 

combining the set of control data with the data object; and 
encrypting at least the data object to create at least one secure data package so 
that the at least one secure data package is stored in the data provider computer. 


44. (original) The method of Claim 43, additionally 
least one secure data package to the user data processor. 


money. 


comprising transmitting the at 
45. (original) lie metod of Claim 43, wherein the data object comprises digital 


46. (original) The method of Claim 43, wherein the data object 

empty file. 


comprises an 


author. 


47. (original) The method of Claim 43, wherein the data object i 


i$ created by an 


48 (original) A method of managing a data object so as to comply with control | 
conditions for usage of the data object, comprising: 

storing a data object in the memory of a data object provider processor 
provading a variable number of control conditions for usage of the data'object; 


and 


prodding a set of control data for the data object based on the variable number 
of control conditions for usage, the set of control data comprising at least one or more 
usage control elements defining usages of the data object which comply with the 
variable number of control conditions. 


49. 


and 


(original) The method of Claim 48, additionally comprising: 

transmitting the data object artd the se, of control data into a data processor, , 


V.l 


-10- 


Serial No. 09/321,386 1 


NO. 254 P. 13 


checking, in response to a request by a user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the set of control data; and 

complying with the usage defined by the at least one usage control element of 
the set of control data so as to enable the requested usage. 

50. (original) The method of Claim 49, additionally comprising combining, after 
the usage of the data object, the data object and the one or more usage control elements. 


51. (original) The method of Claim 49, wherein the data object comprises digital 


data. 


52. (original) The data object of Claim 49, wherein the control data comprises an 
object identifier. 

53. (original) The data object of Claim 49, wherein the data object comprises a 
video file. 


law omcrs or 

MacnuatSOJUCWOK 
CHZ2* 4t H£XD ur 

sunt: to 

ZB.VINE.CA 924)2 
FaX (SOS) 7XS-1M9 


54. 


(previously canceled) 


55.-63. (canceled) 

64. - 66. (previously canceled) 

67.-74, (canceled) 

75. - 76. (previously canceled) 

77. - 78. (canceled) 

79, - 80. (previously canceled) 

81.-82. (canceled) 


-11- 


Serial No. 09/321,386