System Administration
Tools for the toolbox
Digital Rights Management Operating System
Why was this patent granted? This is an obvious application of trusted computing theories that have circulated in the industry for years. When you attempt to secure something, you eliminate all methods of inappropriate access.There is small novelty in the use of these ideas for managing "digital rights."
Was an implementation of the ideas expressed here provided? I doubt it; AFAIK that's no longer required.
10:39:46 AM # Google It!
categories: Industry, Law, Media, Security, System Administration