scispace - formally typeset
Search or ask a question
Author

Julien G. Boeuf

Bio: Julien G. Boeuf is an academic researcher from Intertrust Technologies Corporation. The author has contributed to research in topics: Executable & Digital rights management. The author has an hindex of 4, co-authored 9 publications receiving 520 citations.

Papers
More filters
Patent
18 Oct 2006
TL;DR: In this paper, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized, and in some embodiments, the licenses contain control programs that are executable by the digital right management engine.
Abstract: Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine.

472 citations

Patent
18 Oct 2006
TL;DR: In this article, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized, and in some embodiments, the licenses contain control programs that are executable by the digital right management engine.
Abstract: Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine.

23 citations

Patent
23 Jul 2008
TL;DR: In this article, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device, and a method of using extended SCSI commands to communicate over a USB connection is provided.
Abstract: Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.

18 citations

Proceedings ArticleDOI
11 Jan 2009
TL;DR: Octopus employs several concepts from the trust management philosophy originally posited by Blaze, et al. in 1996, but perhaps its most striking similarity can be found in its clear separation of authorization mechanism from application semantics.
Abstract: Digital Rights Management systems originally arose as an example of a solution to one of the most basic problems associated with secure systems design, the problem of governing access by a credentialed entity to a resource in the context of a set of policies established to restrict or define such access. Most DRMs that are in use today are based on DRM-specific declarative rights expression languages and authorization mechanisms that have strong semantic coupling to the application in which they are employed. A notable exception to this approach can be found in the Octopus system described in this paper. Octopus employs several concepts from the trust management philosophy originally posited by Blaze, et al. in 1996, but perhaps its most striking similarity can be found in its clear separation of authorization mechanism from application semantics.

4 citations

Patent
25 May 2011
TL;DR: In this article, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized, and in some embodiments, the licenses contain control programs that are executable by the digital right management engine.
Abstract: Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine.

3 citations


Cited by
More filters
Patent
10 Oct 2012
TL;DR: In this paper, the authors present a system for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices using a bring-your-own-device (BYOD) policy.
Abstract: A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.

320 citations

Patent
26 Apr 2013
TL;DR: In this article, a method and apparatus for supporting a two-stage device-to-device (D2D) discovery using a D2D interworking function (IWF) is described.
Abstract: A method and apparatus are described for supporting a two-stage device-to-device (D2D) discovery using a D2D interworking function (IWF). A D2D IWF component may be configured to perform mapping between an application running on an application server and a third generation partnership project (3GPP) network, and provide a set of application programming interfaces (APIs) to allow discovery to be provided as a service to D2D applications. An application identifier may be mapped to a 3GPP identifier. Further, a method and apparatus are described for performing client-server discovery. A first wireless transmit/receive unit (WTRU) may be configured for a listen-only operation, and a second WTRU may be configured to transmit beacons. The first and second WTRUs may perform a radio access network (RAN) discovery procedure at an access stratum (AS) layer. A method and apparatus for performing charging for D2D service using a D2D IWF are also described.

250 citations

Patent
21 Feb 2014
TL;DR: In this article, a mobile terminal includes a controller, a touch screen, a memory configured to store a first list of at least one e-book of a first user, and first reading progress information for each of the e-books of the first user.
Abstract: A mobile terminal includes a controller, a touch screen, a memory configured to store a first list of at least one e-book of a first user and first reading progress information for each of the at least one e-book of the first user, and a communication module configured to receive e-book information including a second list of at least one e-book of a second user and second reading progress information for each of the at least one e-book of the second user. The controller is configured to display at least one icon on the touch screen, each of the at least one icon representing one of the at least one e-book in the first list or one of the at least one e-book in the second list, and display the first and second reading progress information corresponding to at least one e-book included in both the first and second lists.

221 citations

Patent
16 Oct 2012
TL;DR: In this article, a system for exposing data stored in a cloud computing system to a content delivery network provider includes a database configured to receive and store metadata about the data, the database being implemented in the Cloud Computing system to store configuration metadata for the data related to the content distribution network, and an origin server configured to send requests for the requested data from the CDPN and configured to provide the data to the CPDN based on the metadata.
Abstract: A system for exposing data stored in a cloud computing system to a content delivery network provider includes a database configured to receive and store metadata about the data, the database being implemented in the cloud computing system to store configuration metadata for the data related to the content delivery network, and an origin server configured to receive requests for the data from the content delivery network provider, and configured to provide the data to the content delivery network provider based on the metadata.

216 citations

Patent
14 Apr 2008
TL;DR: A method and apparatus for content substitution, consistent with certain embodiments of the present invention involves receiving data representing content, the data having at least first and second packet identifiers (PIDs) associated with the content and placing content having the first PID into a data stream as discussed by the authors.
Abstract: A method and apparatus for content substitution, consistent with certain embodiments of the present invention involves receiving data representing content, the data having at least first and second packet identifiers (PIDs) associated with first and second portions of content. The content having the first PID is placed into a data stream. An initiation flag is received indicating initiation of a PID mapping operation. The content having the second PID is then mapped to the first PID and the mapped content is placed into the data stream. A termination flag is received indicating termination of the PID mapping operation at which point the process returns to placing content having the first PID into the data stream. The content substitution process can be used to replace advertisements, provide multiple plots, multiple endings, multiple views as well as other applications. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.

183 citations