Apex Standards Claim Construction


Patent: US10726102B2
Filed: 2014-01-08
Issued: 2020-07-28
Patent Holder: (Original Assignee) Ipra Technologies Ltd Oy     
Inventor(s): Lauri Valjakka, Jukka-Pekka Jussila, Jari Tapio

Title: Method of and system for providing access to access restricted content to a user

Abstract: According to an example embodiment of the invention, there is provided a system for providing access to access restricted content to a user, the system including a communication arrangement operable to receive a content request message, the content request message including a content identifier, a processor configured to cause a first determination to be performed to yield a positive or a negative result, a validation module configured to, in response to the first determination yielding a positive result, obtain a first digital rights management key, the processor being further configured to cause a second determination to be performed to yield a positive or a negative result, and responsive to the first and second determinations yielding a positive result, the validation module is configured to cause access to the access restricted content to be provided to the user.

The First Claim: 1. An apparatus, comprising at least one processor and a memory comprising program instructions, the processor, memory and program instructions configured to cause the apparatus at least to: obtain an access restricted content from at least one of a content database and a content providing server; obtain a first digital rights management key from the content database, wherein the obtaining is based at least in part on a query, the query comprising the content identifier and an identifier associated with the user; using the first digital rights management key, obtain a fingerprint of the access restricted content wherein the obtaining is based at least in part on the first digital rights management key, cause the content providing server to validate the fingerprint, and, if the validation is successful, access the access restricted content and derive a second and third digital rights management key from the access restricted content using the digital rights management header of the access restricted content wherein the second and third digital rights management keys are applied to retrieve the payload of the access restricted content and wherein at least one of the second or third digital rights management key is used to encrypt the other key of the second or third digital rights management key wherein the content is usable without being in an unprotected state.


Disclaimer: The promise of Apex Standards Claim Construction (CC) is that it will conduct the Broadest Reasonable, Ordinary, or Customary Interpretation for the claim elements of a target patent or the technical specification languages of an industrial standard. Therefore, a top-down, apriori evaluation is enabled, allowing stakeholders to swiftly and effectively analyze the relevance and scope of terms and phrases under consideration prior to making complex, high-value judgments. CC is intended to alleviate the initial burden of evidence by providing an exhaustive list of contextual semantic understandings that can be used as building blocks in the development of a prosecution-ready, licensing-ready, or litigation-ready work product. Stakeholders can then utilize the CC to revise the original claim or technical languages, as well as to find more relevant arts in order to build strategy and accomplish additional goals.



Reference Claim Element / Subject Matter Feature Meaning Claim Construction & Interpretation
[1] 1 .

An apparatus [1]
apparatus [1] [Meaning 1] device
[Meaning 2] article
[Meaning 3] equipment
[Meaning 4] apparatus comprising
[Meaning 5] authentication apparatus
[Meaning 6] information apparatus
[Interpretation 1] apparatus for providing access to content restricted by an access control system using at least one digital rights management key
[Interpretation 2] article of manufacture comprising at least one processor and program instructions configured to cause the apparatus to perform an operation
[Interpretation 3] access control apparatus for access control of content using at least one of digital rights management and content protection techniques
[Interpretation 4] electronic apparatus for providing access restricted content to an access restricted user using an electronic apparatus
[Interpretation 5] article of manufacture comprising at least one processor and program instructions for access control of content
[Interpretation 6] electronic apparatus for providing content restricted by an access to the content
[Interpretation 7] access control apparatus for access control of content associated with the user
[2] , comprising (comprises, with, including, having, the apparatus) at least one processor [2] processor [2] [Meaning 1] processors
[Meaning 2] memory
[Meaning 3] hardware processor
[Meaning 4] computer processor
[Meaning 5] processing unit
[Meaning 6] program code processor
[Interpretation 1] processing unit configured to perform at least one of the following operations and operations performed by the processing unit itself
[Interpretation 2] user interface configured to receive an input of an identifier associated with the user of the apparatus and processor comprising
[Interpretation 3] processing unit configured to execute program instructions comprising at least one digital rights management header instruction
[Interpretation 4] processor configured to execute program instructions to perform at least one of the method claims herein
[Interpretation 5] user interface for receiving an identifier of content from the user interface
[Interpretation 6] processing unit configured to execute at least one program comprising program instructions
[Interpretation 7] of an input and an output for communicating data with the apparatus
[3] and a memory [3] memory [3] [Meaning 1] processor
[Meaning 2] storage
[Meaning 3] computer
[Meaning 4] first memory
[Meaning 5] storage medium
[Meaning 6] memory device
[Interpretation 1] storage device coupled to the processor and configured to store at least one program of computer instructions and the memory
[Interpretation 2] computer readable memory comprising at least one content identifier and at least one digital rights management header and the memory
[Interpretation 3] processor coupled to the at least one processor and comprising program instructions and memory the memory
[Interpretation 4] memory coupled to the at least one processor and the memory further
[Interpretation 5] storage device comprising at least one memory the at least one memory
[Interpretation 6] program storage device comprising program instructions and memory storage device
[Interpretation 7] computer readable memory coupled to the processor and the memory
[4] comprising program instructions [4] program instructions [4] [Meaning 1] programs
[Meaning 2] code
[Meaning 3] instructions
[Meaning 4] programming instructions
[Meaning 5] computer instructions
[Meaning 6] one or more programs
[Interpretation 1] an access restricted content identifier and an access restricted content digital rights management header and program instructions for the processor
[Interpretation 2] at least one program instruction stored thereon for use in the apparatus to provide access to at least one content
[Interpretation 3] content identifier and at least one digital rights management header and program instructions executable by the at least one processor
[Interpretation 4] an access restricted content identifier and at least one program instruction executable by the one processor
[Interpretation 5] an access restricted content identifier and digital rights management header
[Interpretation 6] at least one program instruction stored on the storage medium
[5] , the processor [2] , memory [3] and program instructions [4] configured (acting, operating, configure, effective, operable) to cause the apparatus [1] at least to : obtain (determine, receive, select, retrieve, request) an access [5] access [5] [Meaning 1] identifier access
[Meaning 2] identification of
[Meaning 3] access to
[Meaning 4] indication of access
[Meaning 5] identifier associated with an access
[Interpretation 1] identification of content to be restricted to access by the user from the user device and an identification of access
[Interpretation 2] identifier associated with an access restricted content and obtain digital rights management header of the access
[Interpretation 3] associated content identifier from at least one of an access control database and an associated access
[Interpretation 4] encrypt and decrypt protected content from an access restricted content database and to obtain the access
[Interpretation 5] access restricted content and an identifier of the content of the access
[Interpretation 6] encrypt and decrypt content identifier associated with an encrypt and decrypt access
[Interpretation 7] associated content identifier for at least one piece of access
[6] restricted (limited, restricting, sensitive, unrestricted, protected) content [6] content [6] [Meaning 1] user identifier
[Meaning 2] contents identifier
[Meaning 3] digital content
[Meaning 4] or protected content
[Meaning 5] digital rights management header
[Meaning 6] version of the content
[Interpretation 1] identifier of content to be used by an apparatus of the user
[Interpretation 2] access content comprising at least one of an identifier and an attribute
[Interpretation 3] user identifier and an access restricted content identifier associated with the user
[Interpretation 4] content and an identifier associated with the user of the content identifier
[Interpretation 5] access content comprising an access restricted digital rights management header
[7] from at least one of a content database [7] content database [7] [Meaning 1] client
[Meaning 2] memory
[Meaning 3] database
[Meaning 4] user
[Meaning 5] user device
[Meaning 6] data store
[Interpretation 1] network and an access restricted content source and obtain at least one of an identifier associated with the content database
[Interpretation 2] user and an access restricted content provider to obtain an access restricted content from at least one of the user
[Interpretation 3] network and an access restricted content source from at least one of an access control server
[Interpretation 4] database comprising at least one of an identifier associated with the content
[Interpretation 5] user device and an access restricted content server comprising the content database
[Interpretation 6] user device and at least one of an access server
[Interpretation 7] server comprising at least one content database and content identifier
[8] and a content [6] providing (offering, provider, supplying, provision, access control) server [8] server [8] [Meaning 1] service
[Meaning 2] system
[Meaning 3] sever
[Meaning 4] server and
[Meaning 5] content server
[Meaning 6] web server
[Interpretation 1] service providing the access restricted content wherein the access restricted content comprises digital rights management header
[Interpretation 2] network server based at least in part on an access control policy
[Interpretation 3] service based at least in part on an identifier of the content
[Interpretation 4] network server based at least in part on content identifier
[Interpretation 5] service based on an access restriction associated with the content
[9] ; obtain a first digital rights management key [9] rights management key [9] [Meaning 1] management key
[Meaning 2] right key
[Meaning 3] content key
[Meaning 4] rights management
[Meaning 5] entitlement management key
[Interpretation 1] digital rights management key from the access restricted content using an identifier of the content obtained
[Interpretation 2] entitlement management key from the content database by obtaining the content identifier
[Interpretation 3] entitlement management key associated with the access restricted content obtained
[10] from the content database [7] , wherein the obtaining (obtain, request, receiving, acquiring, acquisition) is based at least in part on a query , the query comprising the content identifier [10] content identifier [10] [Meaning 1] fingerprint
[Meaning 2] content
[Meaning 3] user
[Meaning 4] access restriction
[Meaning 5] user name
[Meaning 6] restricted content
[Interpretation 1] access restricted content and an identifier associated with the user or the access restricted content itself
[Interpretation 2] first digital rights management key and an identifier associated with the first digital rights management key
[Interpretation 3] user identifier associated with the user of the content providing server device
[Interpretation 4] content providing server identifier and an identifier associated with the content database
[Interpretation 5] first digital rights management key for the access restricted content
[Interpretation 6] user name of the user of the content providing server
[Interpretation 7] content providing server identifier associated with the access restricted content
[11] and an identifier [11] identifier [11] [Meaning 1] identity
[Meaning 2] attribute
[Meaning 3] identity identifier
[Meaning 4] authentication token
[Meaning 5] access restriction
[Meaning 6] account identifier
[Interpretation 1] associated user identifier and wherein the first digital rights management key is applied to retrieve the access restricted content and
[Interpretation 2] access restriction identifier associated with the content and an identifier
[Interpretation 3] associated user identifier wherein the content identifier is not directly
[12] associated (corresponding, related, provided, associable, affiliated) with the user ; using the first digital rights management key [9] , obtain a fingerprint [12] fingerprint [12] [Meaning 1] hash
[Meaning 2] signature
[Meaning 3] fingerprinting
[Meaning 4] content fingerprint
[Meaning 5] fingerprint representative
[Meaning 6] digital fingerprint
[Interpretation 1] content identifier of the access restricted content and an identifier associated with the digital rights management
[Interpretation 2] digital rights management header of the access restricted content and obtain an encrypt and decrypt fingerprint
[Interpretation 3] biometric fingerprint from the user using the biometric fingerprint identifier
[Interpretation 4] first digital rights management header and at least one fingerprint
[Interpretation 5] digital rights management header and an encrypt and decrypt payload
[13] of the access [5] restricted content [6] wherein the obtaining is based at least in part on the first digital rights management key [9] , cause the content [6] providing server [8] to validate (send, transmit, validation, validated, check) the fingerprint [12] , and , if the validation [13] validation [13] [Meaning 1] authentication
[Meaning 2] validating
[Meaning 3] verification
[Meaning 4] signature validation
[Meaning 5] fingerprint validation
[Meaning 6] validation step
[Interpretation 1] signature is valid to authenticate the access restricted content and wherein if the authentication of content
[Interpretation 2] obtaining is successful and the fingerprint is valid and if the validating
[Interpretation 3] fingerprint is valid and the validation of the digital rights management key
[Interpretation 4] obtaining is successful and the validating of the obtained fingerprint
[Interpretation 5] fingerprint is valid and the validation of the content identifier
[14] is successful , access [5] the access [5] restricted content [6] and derive (obtain, receive, generate, request, recover) a second and third digital rights management key [9] from the access [5] restricted content [6] using the digital rights management header [14] rights management header [14] [Meaning 1] watermark
[Meaning 2] signature
[Meaning 3] fingerprint
[Meaning 4] content identifier
[Meaning 5] watermark information
[Meaning 6] rights management
[Interpretation 1] content key and the first digital rights management key to obtain the second and third fingerprint
[Interpretation 2] access control module to obtain the second and third digital rights management
[Interpretation 3] rights management key and the fingerprint to obtain the access restricted content
[Interpretation 4] content key and the content identifier associated with the payload
[Interpretation 5] signature of the access restricted content and the digital fingerprint
[15] of the access [5] restricted content [6] wherein the second and third digital rights management keys [15] rights management keys [15] [Meaning 1] management
[Meaning 2] rights
[Meaning 3] keys
[Meaning 4] rights management
[Meaning 5] right keys
[Meaning 6] entitlement management keys
[16] are applied (used, employed, required, configured, usable) to retrieve (decrypt, obtain, decipher, secure, scramble) the payload [16] payload [16] [Meaning 1] remainder
[Meaning 2] fingerprint
[Meaning 3] content
[Meaning 4] content identifier
[Meaning 5] original content
[Meaning 6] digital rights
[Interpretation 1] fingerprint of the access restricted content and wherein the second and third digital rights management keys are used for decryption
[Interpretation 2] access restricted content from the content providing server and to decrypt the digital rights management header
[Interpretation 3] access restricted content and to decrypt the retrieved access restricted content instead
[Interpretation 4] first and second digital rights management keys from the fingerprint
[Interpretation 5] access restricted content without being applied to decrypt the content
[17] of the access [5] restricted content [6] and wherein at least one of the second or third digital rights management key [9] is used to encrypt (authenticate, protect, generate, validate, retrieve) the other key of the second or third digital rights management key [9] wherein the content [6] is usable without being in an unprotected state .