US20070162398A1 - Method and apparatus for transferring usage rights and digital work having transferable usage rights - Google Patents
Method and apparatus for transferring usage rights and digital work having transferable usage rights Download PDFInfo
- Publication number
- US20070162398A1 US20070162398A1 US11/711,735 US71173507A US2007162398A1 US 20070162398 A1 US20070162398 A1 US 20070162398A1 US 71173507 A US71173507 A US 71173507A US 2007162398 A1 US2007162398 A1 US 2007162398A1
- Authority
- US
- United States
- Prior art keywords
- transfer
- usage rights
- digital content
- permission
- digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012546 transfer Methods 0.000 claims abstract description 46
- 238000004590 computer program Methods 0.000 abstract description 3
- 238000009826 distribution Methods 0.000 description 21
- 238000007726 management method Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000003467 diminishing effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000036962 time dependent Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
- G06Q50/188—Electronic negotiation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
Definitions
- the invention relates generally to distribution of digital works and more specifically to digital works having usage rights that can be transferred to others and a method and apparatus for effecting such a transfer.
- IPRM Intelligent Property Rights Management
- DPRM Digital Property Rights Management
- IPM Intelligent Property Management
- RM Lights Management
- ECM Electronic Copyright Management
- a “secure container” (or simply an encrypted document) offers a way to keep document contents encrypted until a set of authorization conditions are met and some copyright terms are honored (e.g., payment for use). After the various conditions and terms are verified with the document provider, the document is released to the user in clear form.
- Commercial products such as IBM's CRYPTOLOPESTM and InterTrust's DIGIBOXESTM fall into this category.
- the secure container approach provides a solution to protecting the document during delivery over insecure channels, but does not provide any mechanism to prevent legitimate users from obtaining the clear document and then using and redistributing it in violation of content owners' intellectual property.
- Cryptographic mechanisms are typically used to encrypt (or “encipher”) documents that are then distributed and stored publicly, and ultimately privately deciphered by authorized users. This provides a basic form of protection during document delivery from a document distributor to an intended user over a public network, as well as during document storage on an insecure medium.
- trusted system In the “trusted system” approach, the entire system is responsible for preventing unauthorized use and distribution of the document. Building a trusted system usually entails introducing new hardware such as a secure processor, secure storage and secure rendering devices. This also requires that all software applications that run on trusted systems be certified to be trusted. While building tamper-proof trusted systems is a real challenge to existing technologies, current market trends suggest that open and untrusted systems such as PC's and workstations using browsers to access the Web, will be the dominant systems used to access digital works. In this sense, existing computing environments such as PCs and workstations equipped with popular operating systems (e.g., WindowsTM, LinuxTM, and UNIX) and rendering applications such as browsers are not trusted systems and cannot be made trusted without significantly altering their architectures. Of course, alteration of the architecture defeats a primary purpose of the Web, i.e. flexibility and compatibility.
- U.S. Pat. No. 5,634,012 discloses a system for controlling the distribution of digital works.
- Each rendering device has a repository associated therewith.
- a predetermined set of usage transaction steps define a protocol used by the repositories for carrying out usage rights associated with a work.
- Usage rights are encapsulated with the content of the digital work or otherwise associated with the content to travel with the content.
- the usage rights can permit various types of use such as, viewing only, use once, distribution, and the like. Rights can be granted based on payment or other conditions.
- DRM techniques do not provide the flexibility of distribution that is possible with conventional printed documents. For example, the purchaser of a copy of a book generally can give that same copy to another, trade that copy, or sell that copy without violating the rights of the copyright holder. However, DRM techniques do not provide a flexible means for accomplishing analogous distribution of digital works without diminishing the control over the digital work by the content owner.
- a first aspect of the invention relates to a method, system and computer program product for transferring a digital work, including receiving by a first device a first digital work including digital content which is associated with usage rights and transfer permission information; sending to a server a request to transfer the digital content to a second device, the request indicating an identification of the second device; receiving from the server permission to transfer the digital content, the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and transferring the digital content associated with the new usage rights to the second device.
- a second aspect of the invention relates to a method, system and computer program product for transferring a digital work, including associating usage rights and transfer permission information with digital content; delivering to a first device the digital work comprising the digital content; receiving a request from the first device, the request being a transfer request to transfer the digital content from the first device to a second device, the request indicating an identification of the second device; ascertaining whether the requested transfer is authorized according to the transfer permission information; generating a permission for the requested transfer if the requested transfer is authorized; the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and delivering the permission for the request or a rejection of the request to the first device.
- FIG. 1 is a block diagram of a distribution system in accordance with the preferred embodiment
- FIG. 2 is a schematic illustration of the relationship between a digital work and the distribution server of the preferred embodiment.
- FIG. 3 is a flowchart of an exchange method of the preferred embodiment.
- FIG. 1 is a block diagram of a system for the electronic distribution of digital works, which may include correspondence, books, magazines, journals, newspapers, other papers, software, audio and video clips, and other files objects and the like in accordance with the preferred embodiment.
- digital work refers to any type of element having content in computer readable form.
- Content refers to the viewable or otherwise usable portion of a digital work.
- Author 110 creates original content 112 and passes it to distributor 120 for distribution. Ordinarily, author 110 is the creator of the content. However, the term “author” as used herein can be the creator, owner, editor, or other entity controlling the content or an agent (e.g. a publisher) of one of those entities.
- author 110 may distribute documents directly, without involving another party as distributor 120 and thus the author and distributor may be the same entity.
- the division of functions set forth in FIG. 1 is more efficient, as it allows author 110 to concentrate on content creation and not the administrative functions of distribution. Moreover, such a breakdown facilitates economies of scale by permitting distributor 120 to associate with a number of authors 110 .
- Distributor 120 distributes digital works, such as works 200 and 202 to users 130 and 132 upon request.
- the digital works can be distributed as a document containing the content and associated usage rights in encrypted form.
- Distributor 120 encrypts the works with a public key and then encrypts the public key with a private key corresponding to user 130 or 132 .
- the encrypted work is customized solely for the particular user 130 or 132 .
- Users 130 and 132 are then able to use their private key to unencrypt the public key and use it to unencrypt and view the content of the work 200 or 202 .
- Payment for the work is passed from user 130 or 132 to distributor 120 by way of clearinghouse 150 which collects requests from user 130 and 132 and from other users who wish to sue a particular content.
- Clearinghouse 150 also collects payment information, such as debit transactions, credit card transactions, or other known electronic payment schemes, and forwards the collected payments as a payment batch to distributor 120 .
- clearinghouse 150 may retain a share of the payment as a fee for the above-noted services.
- Distributor 120 may retain a portion of the batch payment from clearinghouse 150 for distribution services and forward a payment (for example royalties) to author 110 .
- Distributor 120 may compile a bundle or batch of user requests for a single work before distributing the work. In such a case, a single instance of the encrypted work can be generated for unencryption by all of the requesting users 130 .
- Clearinghouse 150 also maintains various records regarding ownership and usage rights as described in detail below.
- Clearinghouse 150 includes server 250 (see FIG. 2 ), a programmable general purpose computer for example.
- Server 250 includes a processor which runs rights transfer module 252 in the form of software code. The function of rights transfer module 252 is described in detail below.
- FIG. 2 illustrates the mechanism for facilitating the transfer of usage rights in accordance with the preferred embodiment.
- Digital work 200 includes content 210 and can be stored in a computer memory, such as a memory in a user device used for viewing content 210 .
- the user device can be a personal computer, and ebook reader, a personal digital assistant (PDA), or the like.
- PDA personal digital assistant
- user 130 has a right to use content 210
- user 132 has a right to use content 310
- Content 210 and content 310 have usage rights 212 and 312 respectively associated therewith and users 130 and 132 have respective licenses to use content 210 and content 310 in accordance with the usage rights.
- the exchange can be effected using current user ID flag module 216 of rights transfer module 252 to track the current user of content 210 and 310 .
- the right to exchange is an additional right which has already been awarded and which is tracked in transfer permissions module 214 .
- the exchange of usage rights may involve some fee, paid by user 130 to user 132 or vice versa.
- Rights transfer module 252 keeps track of this fee/percentage, and notifies the original content owners, who may be entitled to a percentage of the fee which was paid by a user (based on the license agreements between the users and the content owners).
- the price can be set using a predetermined, on-spot, or dynamic scheme, such as auction or stock-exchange.
- the exchange right/fee schedules can be attached to the content or other rights (physically, or by a pointer associated with a remote schedule).
- Current user ID flag module includes a database structure having a current user flag for each of works 200 and 202 . Such a flag can be an ID number or any other indication of the current authorized user.
- the exchange may involve more than two users, in which case current user ID flag module 216 can keep track of rights, fees, percentages, content owners, and current users (an exchange forum, similar to a stock exchange setting).
- FIG. 3 illustrates an exchange method in accordance with the preferred embodiment.
- a request is sent to server 250 from one of the users in step 400 .
- Rights transfer module 252 checks transfer permission module 214 to ascertain if the requested transfer has been authorized by the content owner or other applicable party in step 402 . If such permission has been granted, transfer permission module 214 manipulates current user ID flag module 216 to reflect the exchange in current users of the content, i.e. user 130 because the current user of content 310 and user 132 becomes the current user of content 210 , in step 404 .
- transfer permissions module 214 changes the usage rights 212 and 312 to prohibit use by users 130 and 132 of content 210 and 310 respectively and to permit the same use by the new user 132 and 13 respectively.
- works 200 and 202 are exchanged between users 130 and 132 with the new usage rights 212 and 312 respectively.
- works 200 and 202 can be redistributed from distributor 120 or clearinghouse 150 to users 130 and 132 .
- clearinghouse 150 can track all transactions, usage rights, current user data, and the like.
- the preferred embodiment can be adapted to an auction, as well.
- the right to auction can be awarded by the original content owner to the user, and the user can exercise this right, provided that the price limitations, time limitations, geographical limitations, and usage limitations (specified by the content owner) are followed.
- the price or range of price or percentages/fees/commissions can be predetermined, or can be dynamic, for example, using the market or other factors, for example, set by the current user.
- point or other rewards can be awarded to the user.
- Super-distribution can be done through e-mail or instant-messaging, using address books or “buddy lists.”
- the preferred embodiment can be used for version control, for updating/replacing (or providing patches or corrections for) content.
- the preferred embodiment can process returned content by a user, to obtain a refund, if the nature of the content permits and the owner of the content wishes to give this option to the user as an added usage right.
- user 130 may wish to merely grant remaining usage rights to user 132 .
- User 130 can transfer the usage rights to user 132 in a manner similar to the exchange described above.
- clearinghouse 150 can collect an electronic signature from user 132 and send any appropriate notices, such as a terminating notice to user 130 . If the content owner requires a fee for such a transfer, clearinghouse 150 can effect the fee transfer.
- a certification for disablement or destruction of the the software in position of user 130 can be issued automatically by clearinghouse 150 and sent to the content owner or authorized representative.
- user 130 may have the right to use content for a specific time period. User 130 then uses the content for a portion of the allowed time. However, before the expiration time period, user 130 can transfer the balance of remaining allowable time to user 132 . This can be effected in the manner described above. Of course this right also can be assigned to user 130 by the original content owner.
- clearinghouse 150 can keep track of all servers for an optimized accessing scheme. For example, tags can be used for identification and referral to a specific server for edge delivery of content on the Internet or any other network (as opposed to centralized content delivery), to solve the first-mile-bottleneck problem (related to traffic on the network).
- modules of the preferred embodiment have been described by functionality. However, the modules and need not be separate entities, such as separate files or even blocks of code. Also, the functions of the various modules can be mixed or combined. The various functions can be accomplished by any combination of software and/or hardware. For example, the invention can be implemented on one or more general purpose programmable computers, such as personal computers, servers, or the like. Date transfer can be accomplished using HTTP over the Internet or in any other manner.
- Any usage rights can be transferred traded, or assigned.
- the various data and files can be stores at any location and linked in an appropriate manner. For example, the content and usage rights need not be stored together.
- “associated” as used herein refers broadly to an established correspondence such as a call or a link, or other relationship.
- the digital works can be transferred directly form user to user or through a centralized system.
- the usage rights include all usage rights that can be expressed by the XrMLTM rights language and other rights grammar.
Abstract
A method, system and computer program product for transferring a digital work, including receiving by a first device a first digital work including digital content which is associated with usage rights and transfer permission information; sending to a server a request to transfer the digital content to a second device, the request indicating an identification of the second device; receiving from the server permission to transfer the digital content, the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and transferring the digital content associated with the new usage rights to the second device.
Description
- This application is a divisional application of co-pending U.S. patent application Ser. No. 09/867,746 of Tadayon, et al. filed May 31, 2001, entitled “METHOD AND APPARATUS FOR TRANSFERRING USAGE RIGHTS AND DIGITAL WORK HAVING TRANSFERABLE USAGE RIGHTS,” now allowed, which is related to U.S. patent application Ser. No. 09/867,747 of Tadayon, et al. filed May 31, 2001, entitled “METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE,” now U.S. Pat. No. 6,876,984; U.S. patent application Ser. No. 09/867,754 of Tadayon, et al. filed May 31, 2001, entitled “DEMARCATED DIGITAL CONTENT AND METHOD FOR CREATING AND PROCESSING DEMARCATED DIGITAL WORKS,” now U.S. Pat. No. 6,973,445; U.S. patent application Ser. No. 09/867,745 of Tadayon, et al. filed May 31, 2001, entitled “METHOD AND APPARATUS FOR DYNAMICALLY ASSIGNING USAGE RIGHTS TO DIGITAL,” now U.S. Pat. No. 6,754,642; U.S. patent application Ser. No. 09/867,749 of Tadayon, et al. filed May 31, 2001, entitled “METHOD AND APPARATUS FOR ASSIGNING CONDITIONAL OR CONSEQUENTIAL RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH RIGHTS,” now U.S. Pat. No. 6,976,009; and U.S. patent application Ser. No. 09/867,748 of Tadayon, et al. filed May 31, 2001, entitled “METHOD AND APPARATUS FOR HIERARCHICAL ASSIGNMENT OF RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH,” now U.S. Pat. No. 6,895,503, the disclosures of all of which are incorporated herein by reference in their entirety.
- 1. Field of the Invention
- The invention relates generally to distribution of digital works and more specifically to digital works having usage rights that can be transferred to others and a method and apparatus for effecting such a transfer.
- 2. Discussion of the Background
- One of the most important issues impeding the widespread distribution of digital works or documents (i.e. documents in forms readable by computers), via electronic means, and the Internet in particular, is the current lack of ability to enforce the intellectual property rights of content owners during the distribution and use of digital works. Efforts to resolve this problem have been termed “Intellectual Property Rights Management” (“IPRM”), “Digital Property Rights Management” (“DPRM”), “Intellectual Property Management” (“IPM”), “Rights Management” (“RM”), and “Electronic Copyright Management” (“ECM”), collectively referred to as “Digital rights management (DRM)” herein. There are a number of issues to be considered in digital rights management: authentication, authorization, accounting, payment and financial clearing, rights specification, rights verification, rights enforcement, and document protection for example. U.S. Pat. Nos. 5,530,235, 5,634,012, 5,715,403, 5,638,443, and 5,629,980 disclose DRM concepts addressing these issues and the disclosures thereof are incorporated herein by reference.
- In the world of printed documents, a work created by an author is usually provided to a publisher, which formats and prints numerous copies of the work. The copies are then sent by a distributor to bookstores or other retail outlets, from which the copies are purchased by end users. While the low quality of copying and the high cost of distributing printed material have served as deterrents to unauthorized copying of most printed documents, it is far too easy to copy, modify, and redistribute unprotected digital works. Accordingly, some method of protecting digital works is necessary to make it more difficult to copy them without authorization.
- Unfortunately, it has been widely recognized that it is difficult to prevent, or even deter, people from making unauthorized distributions of digital works within current general-purpose computing and communications systems such as personal computers, workstations, and other devices connected over communications networks, such as local area networks (LANs), intranets, and the Internet. Many attempts to provide hardware-based solutions to prevent unauthorized copying have proven to be unsuccessful. The proliferation of high band-width “broadband” communications technologies will render it even more convenient to distribute large documents electronically, including video files such as full length motion pictures, and thus will remove any remaining deterrents to unauthorized distribution of digital works. Accordingly, DRM technologies are becoming a high priority.
- Two basic DRM schemes have been employed to attempt to solve the document protection problem: secure containers and trusted systems. A “secure container” (or simply an encrypted document) offers a way to keep document contents encrypted until a set of authorization conditions are met and some copyright terms are honored (e.g., payment for use). After the various conditions and terms are verified with the document provider, the document is released to the user in clear form. Commercial products such as IBM's CRYPTOLOPES™ and InterTrust's DIGIBOXES™ fall into this category. Clearly, the secure container approach provides a solution to protecting the document during delivery over insecure channels, but does not provide any mechanism to prevent legitimate users from obtaining the clear document and then using and redistributing it in violation of content owners' intellectual property.
- Cryptographic mechanisms are typically used to encrypt (or “encipher”) documents that are then distributed and stored publicly, and ultimately privately deciphered by authorized users. This provides a basic form of protection during document delivery from a document distributor to an intended user over a public network, as well as during document storage on an insecure medium.
- In the “trusted system” approach, the entire system is responsible for preventing unauthorized use and distribution of the document. Building a trusted system usually entails introducing new hardware such as a secure processor, secure storage and secure rendering devices. This also requires that all software applications that run on trusted systems be certified to be trusted. While building tamper-proof trusted systems is a real challenge to existing technologies, current market trends suggest that open and untrusted systems such as PC's and workstations using browsers to access the Web, will be the dominant systems used to access digital works. In this sense, existing computing environments such as PCs and workstations equipped with popular operating systems (e.g., Windows™, Linux™, and UNIX) and rendering applications such as browsers are not trusted systems and cannot be made trusted without significantly altering their architectures. Of course, alteration of the architecture defeats a primary purpose of the Web, i.e. flexibility and compatibility.
- U.S. Pat. No. 5,634,012, the disclosure of which is incorporated herein by reference, discloses a system for controlling the distribution of digital works. Each rendering device has a repository associated therewith. A predetermined set of usage transaction steps define a protocol used by the repositories for carrying out usage rights associated with a work. Usage rights are encapsulated with the content of the digital work or otherwise associated with the content to travel with the content. The usage rights can permit various types of use such as, viewing only, use once, distribution, and the like. Rights can be granted based on payment or other conditions.
- Current DRM techniques do not provide the flexibility of distribution that is possible with conventional printed documents. For example, the purchaser of a copy of a book generally can give that same copy to another, trade that copy, or sell that copy without violating the rights of the copyright holder. However, DRM techniques do not provide a flexible means for accomplishing analogous distribution of digital works without diminishing the control over the digital work by the content owner.
- It is an object of the invention to increase the flexibility of distribution of digital content.
- A first aspect of the invention relates to a method, system and computer program product for transferring a digital work, including receiving by a first device a first digital work including digital content which is associated with usage rights and transfer permission information; sending to a server a request to transfer the digital content to a second device, the request indicating an identification of the second device; receiving from the server permission to transfer the digital content, the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and transferring the digital content associated with the new usage rights to the second device.
- A second aspect of the invention relates to a method, system and computer program product for transferring a digital work, including associating usage rights and transfer permission information with digital content; delivering to a first device the digital work comprising the digital content; receiving a request from the first device, the request being a transfer request to transfer the digital content from the first device to a second device, the request indicating an identification of the second device; ascertaining whether the requested transfer is authorized according to the transfer permission information; generating a permission for the requested transfer if the requested transfer is authorized; the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and delivering the permission for the request or a rejection of the request to the first device.
- The invention will be described through a preferred embodiment and the attached drawing in which:
-
FIG. 1 is a block diagram of a distribution system in accordance with the preferred embodiment; -
FIG. 2 is a schematic illustration of the relationship between a digital work and the distribution server of the preferred embodiment; and -
FIG. 3 is a flowchart of an exchange method of the preferred embodiment. -
FIG. 1 is a block diagram of a system for the electronic distribution of digital works, which may include correspondence, books, magazines, journals, newspapers, other papers, software, audio and video clips, and other files objects and the like in accordance with the preferred embodiment. The phrase “digital work” as used herein refers to any type of element having content in computer readable form. “Content” as used herein refers to the viewable or otherwise usable portion of a digital work.Author 110 creates original content 112 and passes it todistributor 120 for distribution. Ordinarily,author 110 is the creator of the content. However, the term “author” as used herein can be the creator, owner, editor, or other entity controlling the content or an agent (e.g. a publisher) of one of those entities. Alsoauthor 110 may distribute documents directly, without involving another party asdistributor 120 and thus the author and distributor may be the same entity. However, the division of functions set forth inFIG. 1 is more efficient, as it allowsauthor 110 to concentrate on content creation and not the administrative functions of distribution. Moreover, such a breakdown facilitates economies of scale by permittingdistributor 120 to associate with a number ofauthors 110. -
Distributor 120 distributes digital works, such asworks users 130 and 132 upon request. The digital works can be distributed as a document containing the content and associated usage rights in encrypted form.Distributor 120 encrypts the works with a public key and then encrypts the public key with a private key corresponding touser 130 or 132. Thus the encrypted work is customized solely for theparticular user 130 or 132.Users 130 and 132 are then able to use their private key to unencrypt the public key and use it to unencrypt and view the content of thework - Payment for the work is passed from
user 130 or 132 todistributor 120 by way ofclearinghouse 150 which collects requests fromuser 130 and 132 and from other users who wish to sue a particular content.Clearinghouse 150 also collects payment information, such as debit transactions, credit card transactions, or other known electronic payment schemes, and forwards the collected payments as a payment batch todistributor 120. Of course,clearinghouse 150 may retain a share of the payment as a fee for the above-noted services.Distributor 120 may retain a portion of the batch payment fromclearinghouse 150 for distribution services and forward a payment (for example royalties) toauthor 110.Distributor 120 may compile a bundle or batch of user requests for a single work before distributing the work. In such a case, a single instance of the encrypted work can be generated for unencryption by all of the requestingusers 130.Clearinghouse 150 also maintains various records regarding ownership and usage rights as described in detail below. - Each
time user 130 or 132 requests (or uses) content of a work, an accounting message can be sent toclearinghouse 150 which ensures that each request byuser 130 matches with a document sent touser 130 or 132 bydistributor 120. Accounting information is received byclearinghouse 150 directly fromdistributor 120. Any inconsistencies can be used adjust the payment batches made todistributor 120 accordingly. This accounting scheme is operative to reduce the possibility of fraud in electronic distribution and to handle any time-dependent usage permissions that may result in charges that vary, depending on the duration or other extent of use.Clearinghouse 150 includes server 250 (seeFIG. 2 ), a programmable general purpose computer for example.Server 250 includes a processor which runsrights transfer module 252 in the form of software code. The function ofrights transfer module 252 is described in detail below. -
FIG. 2 illustrates the mechanism for facilitating the transfer of usage rights in accordance with the preferred embodiment. Under the assumption thatdigital work 200 has been distributed touser 130 and thatdigital work 202 has been distributed to user 132, an example of the preferred embodiment is described below.Digital work 200 includescontent 210 and can be stored in a computer memory, such as a memory in a user device used for viewingcontent 210. For example, the user device can be a personal computer, and ebook reader, a personal digital assistant (PDA), or the like. In the example of the preferred embodiment,user 130 has a right to usecontent 210, and user 132 has a right to usecontent 310.Content 210 andcontent 310 have usage rights 212 and 312 respectively associated therewith andusers 130 and 132 have respective licenses to usecontent 210 andcontent 310 in accordance with the usage rights. - If
user 130 and user 132 desire to exchange their respective rights incontent user 130 desires rights to usecontent 310 and user 132 desires rights to usecontent 210, the exchange can be effected using current userID flag module 216 ofrights transfer module 252 to track the current user ofcontent transfer permissions module 214. The exchange of usage rights may involve some fee, paid byuser 130 to user 132 or vice versa.Rights transfer module 252 keeps track of this fee/percentage, and notifies the original content owners, who may be entitled to a percentage of the fee which was paid by a user (based on the license agreements between the users and the content owners). The price can be set using a predetermined, on-spot, or dynamic scheme, such as auction or stock-exchange. The exchange right/fee schedules can be attached to the content or other rights (physically, or by a pointer associated with a remote schedule). Current user ID flag module includes a database structure having a current user flag for each of works 200 and 202. Such a flag can be an ID number or any other indication of the current authorized user. The exchange may involve more than two users, in which case current userID flag module 216 can keep track of rights, fees, percentages, content owners, and current users (an exchange forum, similar to a stock exchange setting). -
FIG. 3 illustrates an exchange method in accordance with the preferred embodiment. Whenusers 130 and 132 wish to exchange usage rights to content, a request is sent toserver 250 from one of the users instep 400.Rights transfer module 252 checks transferpermission module 214 to ascertain if the requested transfer has been authorized by the content owner or other applicable party instep 402. If such permission has been granted, transferpermission module 214 manipulates current userID flag module 216 to reflect the exchange in current users of the content, i.e.user 130 because the current user ofcontent 310 and user 132 becomes the current user ofcontent 210, instep 404. - Subsequently, in
step 406,transfer permissions module 214 changes the usage rights 212 and 312 to prohibit use byusers 130 and 132 ofcontent step 408, works 200 and 202 are exchanged betweenusers 130 and 132 with the new usage rights 212 and 312 respectively. Alternatively, works 200 and 202 can be redistributed fromdistributor 120 orclearinghouse 150 tousers 130 and 132. In any case,clearinghouse 150 can track all transactions, usage rights, current user data, and the like. - The preferred embodiment can be adapted to an auction, as well. The right to auction can be awarded by the original content owner to the user, and the user can exercise this right, provided that the price limitations, time limitations, geographical limitations, and usage limitations (specified by the content owner) are followed. The price or range of price or percentages/fees/commissions can be predetermined, or can be dynamic, for example, using the market or other factors, for example, set by the current user. To encourage the exchange between friends, peer-to-peer distribution, or super-distribution, point or other rewards can be awarded to the user. Super-distribution can be done through e-mail or instant-messaging, using address books or “buddy lists.”
- The preferred embodiment can be used for version control, for updating/replacing (or providing patches or corrections for) content. The preferred embodiment can process returned content by a user, to obtain a refund, if the nature of the content permits and the owner of the content wishes to give this option to the user as an added usage right.
- Instead of trading usage rights,
user 130 may wish to merely grant remaining usage rights to user 132. For example, ifuser 130 buys a license to use software, and later wants to transfer the license to user 132,User 130 can transfer the usage rights to user 132 in a manner similar to the exchange described above. In such a case,clearinghouse 150 can collect an electronic signature from user 132 and send any appropriate notices, such as a terminating notice touser 130. If the content owner requires a fee for such a transfer,clearinghouse 150 can effect the fee transfer. In addition, a certification for disablement or destruction of the the software in position ofuser 130 can be issued automatically byclearinghouse 150 and sent to the content owner or authorized representative. - Alternatively,
user 130 may have the right to use content for a specific time period.User 130 then uses the content for a portion of the allowed time. However, before the expiration time period,user 130 can transfer the balance of remaining allowable time to user 132. This can be effected in the manner described above. Of course this right also can be assigned touser 130 by the original content owner. - In the case of accessing (or storing) information from multiple servers,
clearinghouse 150 can keep track of all servers for an optimized accessing scheme. For example, tags can be used for identification and referral to a specific server for edge delivery of content on the Internet or any other network (as opposed to centralized content delivery), to solve the first-mile-bottleneck problem (related to traffic on the network). - The particular modules of the preferred embodiment have been described by functionality. However, the modules and need not be separate entities, such as separate files or even blocks of code. Also, the functions of the various modules can be mixed or combined. The various functions can be accomplished by any combination of software and/or hardware. For example, the invention can be implemented on one or more general purpose programmable computers, such as personal computers, servers, or the like. Date transfer can be accomplished using HTTP over the Internet or in any other manner.
- Any usage rights can be transferred traded, or assigned. The various data and files can be stores at any location and linked in an appropriate manner. For example, the content and usage rights need not be stored together. Accordingly, “associated” as used herein refers broadly to an established correspondence such as a call or a link, or other relationship. The digital works can be transferred directly form user to user or through a centralized system. The usage rights include all usage rights that can be expressed by the XrML™ rights language and other rights grammar.
- The invention has been described trough a preferred embodiment. However, various modifications can be made without departing from the scope of the invention as defined by the appended claims and legal equivalents.
Claims (15)
1. A method for transferring a digital work, comprising:
receiving by a first device a first digital work comprising digital content which is associated with usage rights and transfer permission information;
sending to a server a request to transfer the digital content to a second device, the request indicating an identification of the second device;
receiving from the server permission to transfer the digital content, the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and
transferring the digital content associated with said new usage rights to the second device.
2. The method of claim 1 , wherein a digital work is encrypted using a cryptographic key.
3. The method of claim 2 , further comprising storing cryptographic keys for decrypting a digital work.
4. The method of claim 1 , wherein said new usage rights permit said second device to use said digital content.
5. The method of claim 1 , wherein said new usage rights are the same as said usage rights.
6. The method of claim 1 , wherein said new usage rights are remaining of said usage rights.
7. The method of claim 1 , wherein said transfer permission specifies fee to be paid before a transfer is permitted.
8. The method of claim 1 , wherein said digital content and said associated usage rights are stored in separate locations.
9. The method of claim 1 , wherein said digital content and said associated usage rights are stored in the same location.
10. A method for transferring a digital work, comprising:
associating usage rights and transfer permission information with digital content;
delivering to a first device the digital work comprising the digital content;
receiving a request from the first device, the request being a transfer request to transfer the digital content from said first device to a second device, the request indicating an identification of the second device;
ascertaining whether the requested transfer is authorized according to the transfer permission information;
generating a permission for the requested transfer if the requested transfer is authorized; the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and
delivering the permission for the request or a rejection of the request to the first device.
11. The method of claim 10 , wherein said permission for the requested transfer specifies fee to be paid before a transfer is permitted.
12. The method of claim 10 , further including tracking of transfer transactions.
13. The method of claim 10 , further including tracking of fee transactions.
14. The method of claim 10 , further including encrypting of the digital content.
15. The method of claim 10 , further including sending cryptographic keys to devices for decrypting digital works.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/711,735 US20070162398A1 (en) | 2001-05-31 | 2007-02-28 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
US14/270,239 US20140245404A1 (en) | 2001-05-31 | 2014-05-05 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/867,746 US7222104B2 (en) | 2001-05-31 | 2001-05-31 | Method and apparatus for transferring usage rights and digital work having transferrable usage rights |
US11/711,735 US20070162398A1 (en) | 2001-05-31 | 2007-02-28 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/867,746 Division US7222104B2 (en) | 2001-05-31 | 2001-05-31 | Method and apparatus for transferring usage rights and digital work having transferrable usage rights |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/270,239 Continuation US20140245404A1 (en) | 2001-05-31 | 2014-05-05 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070162398A1 true US20070162398A1 (en) | 2007-07-12 |
Family
ID=25350388
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/867,746 Expired - Lifetime US7222104B2 (en) | 2001-05-31 | 2001-05-31 | Method and apparatus for transferring usage rights and digital work having transferrable usage rights |
US11/711,735 Abandoned US20070162398A1 (en) | 2001-05-31 | 2007-02-28 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
US14/270,239 Abandoned US20140245404A1 (en) | 2001-05-31 | 2014-05-05 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/867,746 Expired - Lifetime US7222104B2 (en) | 2001-05-31 | 2001-05-31 | Method and apparatus for transferring usage rights and digital work having transferrable usage rights |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/270,239 Abandoned US20140245404A1 (en) | 2001-05-31 | 2014-05-05 | Method and apparatus for transferring usage rights and digital work having transferable usage rights |
Country Status (1)
Country | Link |
---|---|
US (3) | US7222104B2 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030120500A1 (en) * | 2001-12-21 | 2003-06-26 | Douglas Deeds | Method and system for delivering content to and locking content in a user device |
US20050097052A1 (en) * | 2003-10-31 | 2005-05-05 | Nokia Corporation | Distribution of media objects |
US20070038576A1 (en) * | 2005-08-12 | 2007-02-15 | Lg Electronics Inc. | Method for moving rights object in digital rights management |
US20070061456A1 (en) * | 2005-09-12 | 2007-03-15 | Nokia Corporation | Data access control |
US20070266155A1 (en) * | 2006-05-09 | 2007-11-15 | Fuji Xerox Co., Ltd. | Content Use Management System, Content-Providing System, Content-Using Device and Computer Readable Medium |
US20090031432A1 (en) * | 2007-07-24 | 2009-01-29 | Canon Kabushiki Kaisha | License management apparatus, license management method, and storage medium |
US20100067051A1 (en) * | 2007-03-30 | 2010-03-18 | Mariko Seki | Printing control system, printing apparatus, and recording medium recording a printing apparatus program |
US20110035291A1 (en) * | 2009-07-08 | 2011-02-10 | Donald Jones | Method and System for Online Redistribution of Information |
CN104348820A (en) * | 2013-08-08 | 2015-02-11 | 北大方正集团有限公司 | Server, terminal and digital copyright protection content forwarding method |
US20150269360A1 (en) * | 2014-03-18 | 2015-09-24 | Fujitsu Limited | Control method and system |
US9405753B2 (en) | 2000-01-24 | 2016-08-02 | George Aposporos | Dynamic ratings-based streaming media playback system |
US20170061104A1 (en) * | 2015-08-28 | 2017-03-02 | Microsoft Technology Licensing, Llc | Secure computing system record transfer control |
US9667515B1 (en) | 2011-09-29 | 2017-05-30 | Amazon Technologies, Inc. | Service image notifications |
US9871801B2 (en) | 2015-08-28 | 2018-01-16 | Microsoft Technology Licensing, Llc | Secure computing system record access control |
US9954863B2 (en) | 2015-08-28 | 2018-04-24 | Microsoft Technology Licensing, Llc | Computing system record security architecture |
US20180294956A1 (en) * | 2017-04-07 | 2018-10-11 | Walmart Apollo, Llc | Systems and Methods for Data Backup and Authentication Using Blockchain |
US20180294957A1 (en) * | 2017-04-07 | 2018-10-11 | Walmart Apollo, Llc | System for Recording Ownership of Digital Works and Providing Backup Copies |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003122726A (en) * | 2001-06-07 | 2003-04-25 | Hitachi Ltd | Method and system for contents control, and its processing program |
US7505760B2 (en) * | 2001-07-06 | 2009-03-17 | Nokia Corporation | Method and apparatus for the superdistribution of content in a network including stationary and mobile stations |
US20030093706A1 (en) * | 2001-11-15 | 2003-05-15 | Intel Corporation | Personal scheduling apparatus and method |
JP3735300B2 (en) * | 2002-01-31 | 2006-01-18 | 富士通株式会社 | Information recording / reproducing system capable of restricting access and access restriction method thereof |
US20040039932A1 (en) * | 2002-08-23 | 2004-02-26 | Gidon Elazar | Apparatus, system and method for securing digital documents in a digital appliance |
US7979700B2 (en) | 2002-08-23 | 2011-07-12 | Sandisk Corporation | Apparatus, system and method for securing digital documents in a digital appliance |
JP4217455B2 (en) * | 2002-10-15 | 2009-02-04 | キヤノン株式会社 | Peripheral device, information processing method, and control program |
US7257549B2 (en) * | 2002-12-11 | 2007-08-14 | Broadcom Corporation | Systems and circuits for providing support for user transactions on a media exchange network |
EP1609048A4 (en) | 2003-03-27 | 2009-01-14 | Milsys Ltd | Data storage device with full access by all users |
US20040199471A1 (en) * | 2003-04-01 | 2004-10-07 | Hardjono Thomas P. | Rights trading system |
US20040235521A1 (en) * | 2003-05-01 | 2004-11-25 | Salil Pradhan | Method and system for exchanging digital media |
JP3895358B2 (en) * | 2003-05-16 | 2007-03-22 | 株式会社ジャパン・ウェーブ | System for preventing unauthorized use of digital content, playback apparatus, and method for preventing unauthorized playback of digital content |
WO2005013133A2 (en) * | 2003-07-28 | 2005-02-10 | Sandisk Secure Content Solutions, Inc. | System, apparatus and method for controlling a storage device |
KR100493900B1 (en) * | 2003-08-21 | 2005-06-10 | 삼성전자주식회사 | Method for Sharing Rights Object Between Users |
KR100567822B1 (en) * | 2003-10-01 | 2006-04-05 | 삼성전자주식회사 | Method for creating domain based on public key cryptography |
US7281274B2 (en) * | 2003-10-16 | 2007-10-09 | Lmp Media Llc | Electronic media distribution system |
AU2003296658A1 (en) * | 2003-12-16 | 2005-07-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Technique for transferring media data files |
EP2110769B1 (en) * | 2004-02-03 | 2012-12-05 | SanDisk Secure Content Solutions, Inc. | Protection of digital data content |
US20070198426A1 (en) * | 2004-03-04 | 2007-08-23 | Yates James M | Method and apparatus for digital copyright exchange |
US20070219917A1 (en) * | 2004-03-29 | 2007-09-20 | Smart Internet Tecnoogy Crc Pty Limited | Digital License Sharing System and Method |
KR101043336B1 (en) * | 2004-03-29 | 2011-06-22 | 삼성전자주식회사 | Method and apparatus for acquiring and removing informations of digital right objects |
FI20040553A0 (en) * | 2004-04-19 | 2004-04-19 | Nokia Corp | Consumer control of media objects |
US20050273780A1 (en) * | 2004-05-14 | 2005-12-08 | Nokia Corporation | System, device, method and computer code product for partially sharing digital media |
JP4333494B2 (en) * | 2004-06-17 | 2009-09-16 | ソニー株式会社 | Content reproduction apparatus, content reproduction method, content management apparatus, content management method, and computer program. |
US7543144B2 (en) * | 2004-07-21 | 2009-06-02 | Beachhead Solutions | System and method for lost data destruction of electronic data stored on portable electronic devices |
US7540016B2 (en) * | 2004-07-21 | 2009-05-26 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall |
US7421589B2 (en) * | 2004-07-21 | 2008-09-02 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval |
US20060048224A1 (en) * | 2004-08-30 | 2006-03-02 | Encryptx Corporation | Method and apparatus for automatically detecting sensitive information, applying policies based on a structured taxonomy and dynamically enforcing and reporting on the protection of sensitive data through a software permission wrapper |
CN101048805A (en) * | 2004-10-25 | 2007-10-03 | 皇家飞利浦电子股份有限公司 | Method and apparatus for boostrapping mobile A/V jukeboxes |
US20060100965A1 (en) * | 2004-11-10 | 2006-05-11 | Nokia Corporation | Digital content after-market broker system, method, apparatus and computer program |
US7725721B2 (en) * | 2004-11-18 | 2010-05-25 | Cisco Technology, Inc. | Method and system for transferring software and hardware feature licenses between devices |
CN101513005A (en) * | 2005-03-15 | 2009-08-19 | 杰出网络公司 | Electronic copyright license repository |
JP2009508240A (en) * | 2005-09-12 | 2009-02-26 | サンド ボックス テクノロジーズ インク. | System and method for controlling the distribution of electronic information |
US8078788B2 (en) * | 2005-12-08 | 2011-12-13 | Sandisk Technologies Inc. | Media card command pass through methods |
JP2010503925A (en) * | 2006-09-13 | 2010-02-04 | サンディスク コーポレイション | Transfer licensed digital content between users |
US8839005B2 (en) * | 2006-09-13 | 2014-09-16 | Sandisk Technologies Inc. | Apparatus for transferring licensed digital content between users |
CN101165698B (en) * | 2006-10-17 | 2011-07-27 | 华为技术有限公司 | Export permitting method and system |
US20090106847A1 (en) * | 2007-10-23 | 2009-04-23 | Jeff Krupman | System and Method for Media Rights Transfer |
US9032154B2 (en) | 2007-12-13 | 2015-05-12 | Sandisk Technologies Inc. | Integration of secure data transfer applications for generic IO devices |
US20090157435A1 (en) * | 2007-12-14 | 2009-06-18 | Instamed Communications, Llc | System and method of accelerated health care claim payment |
US20090164600A1 (en) * | 2007-12-19 | 2009-06-25 | Concert Technology Corporation | System and method for place-shifting media items |
US9946848B2 (en) | 2009-02-26 | 2018-04-17 | International Business Machines Corporation | Software protection using an installation product having an entitlement file |
US20100268649A1 (en) * | 2009-04-17 | 2010-10-21 | Johan Roos | Method and Apparatus for Electronic Ticket Processing |
US8571994B2 (en) | 2009-06-26 | 2013-10-29 | Disney Enterprises, Inc. | Method and system for allocating access to digital media content |
US10565388B2 (en) * | 2009-06-26 | 2020-02-18 | Disney Enterprises, Inc. | Method and system for providing digital media rental |
WO2011082489A1 (en) * | 2010-01-06 | 2011-07-14 | Vitrium Systems Inc. | Method and system of providing a viewing experience with respect to a document having read-only content |
US20110276521A1 (en) * | 2010-05-04 | 2011-11-10 | Grotto Patrick A | System and method for monetizing content |
EP2595077B1 (en) * | 2011-11-16 | 2016-04-20 | Alcatel Lucent | Method and system for digital contents lending |
WO2013169478A1 (en) * | 2012-05-10 | 2013-11-14 | Disney Enterprises, Inc. | Method and system for allocating access to digital media content |
US9460027B2 (en) | 2015-01-26 | 2016-10-04 | HGST Netherlands, B.V. | Digital rights management system |
US9778845B2 (en) | 2015-02-02 | 2017-10-03 | Western Digital Technologies, Inc. | File management system |
CN107609354B (en) * | 2016-07-12 | 2020-11-10 | 厦门润丰投资有限公司 | Digital resource selling system and method based on metadata |
Citations (94)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US422991A (en) * | 1890-03-11 | Egg-tester | ||
US3790700A (en) * | 1971-12-17 | 1974-02-05 | Hughes Aircraft Co | Catv program control system |
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US4159468A (en) * | 1977-11-17 | 1979-06-26 | Burroughs Corporation | Communications line authentication device |
US4200700A (en) * | 1977-05-13 | 1980-04-29 | Idc Chemie Ag | Method of after-foaming a mixture of a foam and a resin solution |
US4321321A (en) * | 1980-11-07 | 1982-03-23 | Moore Joseph E | Method of producing color separation negatives using contrast reducing filter |
US4323921A (en) * | 1979-02-06 | 1982-04-06 | Etablissement Public De Diffusion Dit "Telediffusion De France" | System for transmitting information provided with means for controlling access to the information transmitted |
US4429385A (en) * | 1981-12-31 | 1984-01-31 | American Newspaper Publishers Association | Method and apparatus for digital serial scanning with hierarchical and relational access |
US4442486A (en) * | 1981-11-25 | 1984-04-10 | U.S. Philips Corporation | Protected programmable apparatus |
US4593376A (en) * | 1983-04-21 | 1986-06-03 | Volk Larry N | System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires |
US4644493A (en) * | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4736422A (en) * | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4816655A (en) * | 1985-12-11 | 1989-03-28 | Centre D'etude De L'energie Nucleaire, "C.E.N." | Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereof |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4891838A (en) * | 1985-11-04 | 1990-01-02 | Dental Data Service, Inc. | Computer accessing system |
US4924378A (en) * | 1988-06-13 | 1990-05-08 | Prime Computer, Inc. | License mangagement system and license storage key |
US4932054A (en) * | 1988-09-16 | 1990-06-05 | Chou Wayne W | Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device |
US4937863A (en) * | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US5010571A (en) * | 1986-09-10 | 1991-04-23 | Titan Linkabit Corporation | Metering retrieval of encrypted data stored in customer data retrieval terminal |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5113519A (en) * | 1989-05-15 | 1992-05-12 | International Business Machines Corporation | Maintenance of file attributes in a distributed data processing system |
US5183404A (en) * | 1992-04-08 | 1993-02-02 | Megahertz Corporation | Systems for connection of physical/electrical media connectors to computer communications cards |
US5191193A (en) * | 1989-10-13 | 1993-03-02 | Gemplus Card International | System of payment or information transfer by money card with electronic memory |
US5204897A (en) * | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5276735A (en) * | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5276444A (en) * | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5291596A (en) * | 1990-10-10 | 1994-03-01 | Fuji Xerox Co., Ltd. | Data management method and system with management table indicating right of use |
US5293422A (en) * | 1992-09-23 | 1994-03-08 | Dynatek, Inc. | Usage control system for computer software |
US5301231A (en) * | 1992-02-12 | 1994-04-05 | International Business Machines Corporation | User defined function facility |
US5311591A (en) * | 1992-05-15 | 1994-05-10 | Fischer Addison M | Computer system security method and apparatus for creating and using program authorization information data structures |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5381526A (en) * | 1992-09-11 | 1995-01-10 | Eastman Kodak Company | Method and apparatus for storing and retrieving generalized image data |
US5386369A (en) * | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
US5394469A (en) * | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5428606A (en) * | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5485577A (en) * | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5499298A (en) * | 1994-03-17 | 1996-03-12 | National University Of Singapore | Controlled dissemination of digital information |
US5504816A (en) * | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5504814A (en) * | 1991-07-10 | 1996-04-02 | Hughes Aircraft Company | Efficient security kernel for the 80960 extended architecture |
US5504818A (en) * | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
US5504837A (en) * | 1993-05-10 | 1996-04-02 | Bell Communications Research, Inc. | Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US5619570A (en) * | 1992-10-16 | 1997-04-08 | Sony Corporation | Information furnishing and collection system |
US5621797A (en) * | 1994-04-28 | 1997-04-15 | Citibank, N.A. | Electronic ticket presentation and transfer method |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5633932A (en) * | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5708717A (en) * | 1995-11-29 | 1998-01-13 | Alasia; Alfred | Digital anti-counterfeiting software method and apparatus |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5734823A (en) * | 1991-11-04 | 1998-03-31 | Microtome, Inc. | Systems and apparatus for electronic communication and storage of information |
US5734891A (en) * | 1991-11-04 | 1998-03-31 | Saigh; Michael M. | Systems and apparatus for electronic communication and storage of time encoded information |
US5737416A (en) * | 1994-04-25 | 1998-04-07 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub |
US5737413A (en) * | 1992-04-24 | 1998-04-07 | Fujitsu Limited | Information distribution system wherein storage medium storing ciphered information is distributed |
US5745879A (en) * | 1991-05-08 | 1998-04-28 | Digital Equipment Corporation | Method and system for managing execution of licensed programs |
US5745569A (en) * | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US5748783A (en) * | 1995-05-08 | 1998-05-05 | Digimarc Corporation | Method and apparatus for robust information coding |
US5757907A (en) * | 1994-04-25 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6020882A (en) * | 1997-02-15 | 2000-02-01 | U.S. Philips Corporation | Television access control system |
US6047067A (en) * | 1994-04-28 | 2000-04-04 | Citibank, N.A. | Electronic-monetary system |
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6185683B1 (en) * | 1995-02-13 | 2001-02-06 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US6189146B1 (en) * | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US6189037B1 (en) * | 1994-09-30 | 2001-02-13 | Intel Corporation | Broadband data interface |
US6209092B1 (en) * | 1997-01-27 | 2001-03-27 | U.S. Philips Corporation | Method and system for transferring content information and supplemental information relating thereto |
US6216112B1 (en) * | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6219652B1 (en) * | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US6240185B1 (en) * | 1996-08-12 | 2001-05-29 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US20020001387A1 (en) * | 1994-11-14 | 2002-01-03 | Dillon Douglas M. | Deferred billing, broadcast, electronic document distribution system and method |
US6353888B1 (en) * | 1997-07-07 | 2002-03-05 | Fuji Xerox Co., Ltd. | Access rights authentication apparatus |
US20020035618A1 (en) * | 2000-09-20 | 2002-03-21 | Mendez Daniel J. | System and method for transmitting workspace elements across a network |
US20020044658A1 (en) * | 1995-04-03 | 2002-04-18 | Wasilewski Anthony J. | Conditional access system |
US20020056118A1 (en) * | 1999-08-27 | 2002-05-09 | Hunter Charles Eric | Video and music distribution system |
US6397333B1 (en) * | 1998-10-07 | 2002-05-28 | Infineon Technologies Ag | Copy protection system and method |
US6516413B1 (en) * | 1998-02-05 | 2003-02-04 | Fuji Xerox Co., Ltd. | Apparatus and method for user authentication |
US6516052B2 (en) * | 1997-07-04 | 2003-02-04 | British Telecommunications Public Limited Company | Method of scheduling connections |
US6523745B1 (en) * | 1997-08-05 | 2003-02-25 | Enix Corporation | Electronic transaction system including a fingerprint identification encoding |
US20030097567A1 (en) * | 1997-08-05 | 2003-05-22 | Taro Terao | Device and method for authenticating user's access rights to resources |
US20040052370A1 (en) * | 1992-01-08 | 2004-03-18 | Katznelson Ron D. | Multichannel quadrature modulation |
Family Cites Families (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3263158A (en) | 1963-08-15 | 1966-07-26 | Motorola Inc | Saturable reactor voltage control circuit |
US3609697A (en) | 1968-10-21 | 1971-09-28 | Ibm | Program security device |
DE2840980C3 (en) | 1977-10-08 | 1982-05-06 | Tokyo Electric Co., Ltd., Tokyo | Electronic cash register and electronic cash register system |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4529870A (en) | 1980-03-10 | 1985-07-16 | David Chaum | Cryptographic identification, financial transaction, and credential device |
US4442466A (en) | 1981-02-20 | 1984-04-10 | Pioneer Electronic Corporation | Head drive mechanism for a cassette deck |
US4558176A (en) | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4614861A (en) | 1984-11-15 | 1986-09-30 | Intellicard International, Inc. | Unitary, self-contained card verification and validation system and method |
US4713753A (en) | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
DE3787583T2 (en) | 1986-07-07 | 1994-02-03 | Semiconductor Energy Lab | Portable book without paper. |
US4977594A (en) * | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5047928A (en) | 1986-10-24 | 1991-09-10 | Wiedemer John D | Billing system for computer software |
US4868376A (en) | 1987-05-15 | 1989-09-19 | Smartcard International Inc. | Intelligent portable interactive personal data system |
US4975647A (en) | 1987-06-01 | 1990-12-04 | Nova Biomedical Corporation | Controlling machine operation with respect to consumable accessory units |
US4961142A (en) | 1988-06-29 | 1990-10-02 | Mastercard International, Inc. | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US4953209A (en) | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
DE3903454A1 (en) | 1988-12-12 | 1990-06-13 | Raymund H Eisele | ELEMENT INSERTABLE IN IT FACILITIES |
US4949187A (en) | 1988-12-16 | 1990-08-14 | Cohen Jason M | Video communications system having a remotely controlled central source of video and audio data |
US5347579A (en) | 1989-07-05 | 1994-09-13 | Blandford Robert R | Personal computer diary |
US5138712A (en) | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
US5148481A (en) | 1989-10-06 | 1992-09-15 | International Business Machines Corporation | Transaction system security method and apparatus |
US5136643A (en) | 1989-10-13 | 1992-08-04 | Fischer Addison M | Public/key date-time notary facility |
FR2653914A1 (en) | 1989-10-27 | 1991-05-03 | Trt Telecom Radio Electr | SYSTEM FOR AUTHENTICATING A MICROCIRCUIT CARD BY A PERSONAL MICROCOMPUTER, AND METHOD FOR ITS IMPLEMENTATION |
US5263157A (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles |
US5263158A (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager |
US5058164A (en) | 1990-05-03 | 1991-10-15 | National Semiconductor Corp. | Encryption of streams of addressed information to be used for program code protection |
US5052040A (en) | 1990-05-25 | 1991-09-24 | Micronyx, Inc. | Multiple user stored data cryptographic labeling system and method |
JP2689998B2 (en) | 1990-08-22 | 1997-12-10 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Device for cryptographic operation |
US5255106A (en) | 1991-02-05 | 1993-10-19 | International Integrated Communications, Ltd. | Method and apparatus for delivering secured hard-copy facsimile documents |
US5260999A (en) | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5438508A (en) | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
JP2659896B2 (en) | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Structured document copy management method and structured document copy management device |
US5235642A (en) | 1992-07-21 | 1993-08-10 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
US5341429A (en) | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
US5337357A (en) | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
IL110891A (en) | 1993-09-14 | 1999-03-12 | Spyrus | System and method for data access control |
CA2129075C (en) | 1993-10-18 | 1999-04-20 | Joseph J. Daniele | Electronic copyright royalty accounting system using glyphs |
US5455953A (en) | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5768426A (en) * | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US5473687A (en) | 1993-12-29 | 1995-12-05 | Infosafe Systems, Inc. | Method for retrieving secure information from a database |
US5563946A (en) | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5473692A (en) | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
US5655077A (en) | 1994-12-13 | 1997-08-05 | Microsoft Corporation | Method and system for authenticating access to heterogeneous computing services |
US5649013A (en) | 1994-12-23 | 1997-07-15 | Compuserve Incorporated | Royalty tracking method and apparatus |
US5534975A (en) | 1995-05-26 | 1996-07-09 | Xerox Corporation | Document processing system utilizing document service cards to provide document processing services |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5761686A (en) * | 1996-06-27 | 1998-06-02 | Xerox Corporation | Embedding encoded information in an iconic version of a text image |
US6115471A (en) * | 1996-11-28 | 2000-09-05 | Fujitsu Limited | Member-exclusive service system and method through internet |
US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US5999949A (en) * | 1997-03-14 | 1999-12-07 | Crandall; Gary E. | Text file compression system utilizing word terminators |
FR2772486B1 (en) * | 1997-12-15 | 2000-01-07 | Elf Exploration Prod | METHOD FOR THE AUTOMATIC DETECTION OF PLANAR HETEROGENEITIES INTERRUPTING THE LAMINATION OF A MEDIUM |
US6611812B2 (en) * | 1998-08-13 | 2003-08-26 | International Business Machines Corporation | Secure electronic content distribution on CDS and DVDs |
US6434535B1 (en) * | 1998-11-13 | 2002-08-13 | Iomega Corporation | System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same |
-
2001
- 2001-05-31 US US09/867,746 patent/US7222104B2/en not_active Expired - Lifetime
-
2007
- 2007-02-28 US US11/711,735 patent/US20070162398A1/en not_active Abandoned
-
2014
- 2014-05-05 US US14/270,239 patent/US20140245404A1/en not_active Abandoned
Patent Citations (100)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US422991A (en) * | 1890-03-11 | Egg-tester | ||
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US3790700A (en) * | 1971-12-17 | 1974-02-05 | Hughes Aircraft Co | Catv program control system |
US4200700A (en) * | 1977-05-13 | 1980-04-29 | Idc Chemie Ag | Method of after-foaming a mixture of a foam and a resin solution |
US4159468A (en) * | 1977-11-17 | 1979-06-26 | Burroughs Corporation | Communications line authentication device |
US4323921A (en) * | 1979-02-06 | 1982-04-06 | Etablissement Public De Diffusion Dit "Telediffusion De France" | System for transmitting information provided with means for controlling access to the information transmitted |
US4321321A (en) * | 1980-11-07 | 1982-03-23 | Moore Joseph E | Method of producing color separation negatives using contrast reducing filter |
US4442486A (en) * | 1981-11-25 | 1984-04-10 | U.S. Philips Corporation | Protected programmable apparatus |
US4429385A (en) * | 1981-12-31 | 1984-01-31 | American Newspaper Publishers Association | Method and apparatus for digital serial scanning with hierarchical and relational access |
US4593376A (en) * | 1983-04-21 | 1986-06-03 | Volk Larry N | System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires |
US4736422A (en) * | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4644493A (en) * | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
US4891838A (en) * | 1985-11-04 | 1990-01-02 | Dental Data Service, Inc. | Computer accessing system |
US4816655A (en) * | 1985-12-11 | 1989-03-28 | Centre D'etude De L'energie Nucleaire, "C.E.N." | Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereof |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5010571A (en) * | 1986-09-10 | 1991-04-23 | Titan Linkabit Corporation | Metering retrieval of encrypted data stored in customer data retrieval terminal |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US4937863A (en) * | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US4924378A (en) * | 1988-06-13 | 1990-05-08 | Prime Computer, Inc. | License mangagement system and license storage key |
US4932054A (en) * | 1988-09-16 | 1990-06-05 | Chou Wayne W | Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
US5113519A (en) * | 1989-05-15 | 1992-05-12 | International Business Machines Corporation | Maintenance of file attributes in a distributed data processing system |
US5191193A (en) * | 1989-10-13 | 1993-03-02 | Gemplus Card International | System of payment or information transfer by money card with electronic memory |
US5291596A (en) * | 1990-10-10 | 1994-03-01 | Fuji Xerox Co., Ltd. | Data management method and system with management table indicating right of use |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5504818A (en) * | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
US5745879A (en) * | 1991-05-08 | 1998-04-28 | Digital Equipment Corporation | Method and system for managing execution of licensed programs |
US5204897A (en) * | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5504814A (en) * | 1991-07-10 | 1996-04-02 | Hughes Aircraft Company | Efficient security kernel for the 80960 extended architecture |
US5276444A (en) * | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5734891A (en) * | 1991-11-04 | 1998-03-31 | Saigh; Michael M. | Systems and apparatus for electronic communication and storage of time encoded information |
US5734823A (en) * | 1991-11-04 | 1998-03-31 | Microtome, Inc. | Systems and apparatus for electronic communication and storage of information |
US20040052370A1 (en) * | 1992-01-08 | 2004-03-18 | Katznelson Ron D. | Multichannel quadrature modulation |
US5301231A (en) * | 1992-02-12 | 1994-04-05 | International Business Machines Corporation | User defined function facility |
US5183404A (en) * | 1992-04-08 | 1993-02-02 | Megahertz Corporation | Systems for connection of physical/electrical media connectors to computer communications cards |
US5502766A (en) * | 1992-04-17 | 1996-03-26 | Secure Computing Corporation | Data enclave and trusted path system |
US5276735A (en) * | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5737413A (en) * | 1992-04-24 | 1998-04-07 | Fujitsu Limited | Information distribution system wherein storage medium storing ciphered information is distributed |
US5311591A (en) * | 1992-05-15 | 1994-05-10 | Fischer Addison M | Computer system security method and apparatus for creating and using program authorization information data structures |
US5412717A (en) * | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5381526A (en) * | 1992-09-11 | 1995-01-10 | Eastman Kodak Company | Method and apparatus for storing and retrieving generalized image data |
US5293422A (en) * | 1992-09-23 | 1994-03-08 | Dynatek, Inc. | Usage control system for computer software |
US5619570A (en) * | 1992-10-16 | 1997-04-08 | Sony Corporation | Information furnishing and collection system |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5504837A (en) * | 1993-05-10 | 1996-04-02 | Bell Communications Research, Inc. | Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes |
US5428606A (en) * | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5386369A (en) * | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
US5504816A (en) * | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5394469A (en) * | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
US5499298A (en) * | 1994-03-17 | 1996-03-12 | National University Of Singapore | Controlled dissemination of digital information |
US5757907A (en) * | 1994-04-25 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification |
US5737416A (en) * | 1994-04-25 | 1998-04-07 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub |
US5621797A (en) * | 1994-04-28 | 1997-04-15 | Citibank, N.A. | Electronic ticket presentation and transfer method |
US6047067A (en) * | 1994-04-28 | 2000-04-04 | Citibank, N.A. | Electronic-monetary system |
US6189037B1 (en) * | 1994-09-30 | 2001-02-13 | Intel Corporation | Broadband data interface |
US20020001387A1 (en) * | 1994-11-14 | 2002-01-03 | Dillon Douglas M. | Deferred billing, broadcast, electronic document distribution system and method |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5485577A (en) * | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US6237786B1 (en) * | 1995-02-13 | 2001-05-29 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6389402B1 (en) * | 1995-02-13 | 2002-05-14 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6185683B1 (en) * | 1995-02-13 | 2001-02-06 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US6363488B1 (en) * | 1995-02-13 | 2002-03-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US20020044658A1 (en) * | 1995-04-03 | 2002-04-18 | Wasilewski Anthony J. | Conditional access system |
US5748783A (en) * | 1995-05-08 | 1998-05-05 | Digimarc Corporation | Method and apparatus for robust information coding |
US5708717A (en) * | 1995-11-29 | 1998-01-13 | Alasia; Alfred | Digital anti-counterfeiting software method and apparatus |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5633932A (en) * | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
US5745569A (en) * | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US6240185B1 (en) * | 1996-08-12 | 2001-05-29 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6209092B1 (en) * | 1997-01-27 | 2001-03-27 | U.S. Philips Corporation | Method and system for transferring content information and supplemental information relating thereto |
US6020882A (en) * | 1997-02-15 | 2000-02-01 | U.S. Philips Corporation | Television access control system |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
US6516052B2 (en) * | 1997-07-04 | 2003-02-04 | British Telecommunications Public Limited Company | Method of scheduling connections |
US6353888B1 (en) * | 1997-07-07 | 2002-03-05 | Fuji Xerox Co., Ltd. | Access rights authentication apparatus |
US6523745B1 (en) * | 1997-08-05 | 2003-02-25 | Enix Corporation | Electronic transaction system including a fingerprint identification encoding |
US20030097567A1 (en) * | 1997-08-05 | 2003-05-22 | Taro Terao | Device and method for authenticating user's access rights to resources |
US6516413B1 (en) * | 1998-02-05 | 2003-02-04 | Fuji Xerox Co., Ltd. | Apparatus and method for user authentication |
US6189146B1 (en) * | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US6216112B1 (en) * | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6219652B1 (en) * | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6345256B1 (en) * | 1998-08-13 | 2002-02-05 | International Business Machines Corporation | Automated method and apparatus to package digital content for electronic distribution using the identity of the source content |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6397333B1 (en) * | 1998-10-07 | 2002-05-28 | Infineon Technologies Ag | Copy protection system and method |
US20020056118A1 (en) * | 1999-08-27 | 2002-05-09 | Hunter Charles Eric | Video and music distribution system |
US20020035618A1 (en) * | 2000-09-20 | 2002-03-21 | Mendez Daniel J. | System and method for transmitting workspace elements across a network |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9405753B2 (en) | 2000-01-24 | 2016-08-02 | George Aposporos | Dynamic ratings-based streaming media playback system |
US10318647B2 (en) | 2000-01-24 | 2019-06-11 | Bluebonnet Internet Media Services, Llc | User input-based play-list generation and streaming media playback system |
US9547650B2 (en) | 2000-01-24 | 2017-01-17 | George Aposporos | System for sharing and rating streaming media playlists |
US9779095B2 (en) | 2000-01-24 | 2017-10-03 | George Aposporos | User input-based play-list generation and playback system |
US7953665B2 (en) * | 2001-12-21 | 2011-05-31 | Nokia Corporation | Method and system for delivering content to and locking content in a user device |
US20030120500A1 (en) * | 2001-12-21 | 2003-06-26 | Douglas Deeds | Method and system for delivering content to and locking content in a user device |
US20050097052A1 (en) * | 2003-10-31 | 2005-05-05 | Nokia Corporation | Distribution of media objects |
US20070038576A1 (en) * | 2005-08-12 | 2007-02-15 | Lg Electronics Inc. | Method for moving rights object in digital rights management |
US20100146637A1 (en) * | 2005-08-12 | 2010-06-10 | Lee Seung-Jae | Method for moving rights object in digital rights management |
US20070061456A1 (en) * | 2005-09-12 | 2007-03-15 | Nokia Corporation | Data access control |
US8082451B2 (en) * | 2005-09-12 | 2011-12-20 | Nokia Corporation | Data access control |
US8065743B2 (en) * | 2006-05-09 | 2011-11-22 | Fuji Xerox Co., Ltd. | Content use management system, content-providing system, content-using device and computer readable medium |
US20070266155A1 (en) * | 2006-05-09 | 2007-11-15 | Fuji Xerox Co., Ltd. | Content Use Management System, Content-Providing System, Content-Using Device and Computer Readable Medium |
US20100067051A1 (en) * | 2007-03-30 | 2010-03-18 | Mariko Seki | Printing control system, printing apparatus, and recording medium recording a printing apparatus program |
US9135407B2 (en) * | 2007-07-24 | 2015-09-15 | Canon Kabushiki Kaisha | License management apparatus, license management method, and storage medium |
US20090031432A1 (en) * | 2007-07-24 | 2009-01-29 | Canon Kabushiki Kaisha | License management apparatus, license management method, and storage medium |
US20110035291A1 (en) * | 2009-07-08 | 2011-02-10 | Donald Jones | Method and System for Online Redistribution of Information |
US9667515B1 (en) | 2011-09-29 | 2017-05-30 | Amazon Technologies, Inc. | Service image notifications |
US20150047053A1 (en) * | 2013-08-08 | 2015-02-12 | Founder Apabi Technology Limited | Server, terminal, and transfer method for digital content under copyright protection |
CN104348820A (en) * | 2013-08-08 | 2015-02-11 | 北大方正集团有限公司 | Server, terminal and digital copyright protection content forwarding method |
US20150269360A1 (en) * | 2014-03-18 | 2015-09-24 | Fujitsu Limited | Control method and system |
US9871801B2 (en) | 2015-08-28 | 2018-01-16 | Microsoft Technology Licensing, Llc | Secure computing system record access control |
CN107924446A (en) * | 2015-08-28 | 2018-04-17 | 微软技术许可有限责任公司 | Secure computing system record transfer control |
US9954863B2 (en) | 2015-08-28 | 2018-04-24 | Microsoft Technology Licensing, Llc | Computing system record security architecture |
US10169547B2 (en) * | 2015-08-28 | 2019-01-01 | Microsoft Technology Licensing, Llc | Secure computing system record transfer control |
US20170061104A1 (en) * | 2015-08-28 | 2017-03-02 | Microsoft Technology Licensing, Llc | Secure computing system record transfer control |
US20180294956A1 (en) * | 2017-04-07 | 2018-10-11 | Walmart Apollo, Llc | Systems and Methods for Data Backup and Authentication Using Blockchain |
US20180294957A1 (en) * | 2017-04-07 | 2018-10-11 | Walmart Apollo, Llc | System for Recording Ownership of Digital Works and Providing Backup Copies |
WO2018187408A1 (en) * | 2017-04-07 | 2018-10-11 | Walmart Apollo, Llc | System for recording ownership of digital works and providing backup copies |
Also Published As
Publication number | Publication date |
---|---|
US20140245404A1 (en) | 2014-08-28 |
US20020184156A1 (en) | 2002-12-05 |
US7222104B2 (en) | 2007-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7222104B2 (en) | Method and apparatus for transferring usage rights and digital work having transferrable usage rights | |
US8892473B2 (en) | Method and system for subscription digital rights management | |
US20150033359A1 (en) | Method and system for subscription digital rights management | |
EP1309926B2 (en) | Method and system for subscription digital rights management | |
US6754642B2 (en) | Method and apparatus for dynamically assigning usage rights to digital works | |
US8869293B2 (en) | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights | |
US6976009B2 (en) | Method and apparatus for assigning consequential rights to documents and documents having such rights | |
EP1293866B1 (en) | System for controlling the distribution and use of digital works utilizing a usage rights grammar | |
US7366915B2 (en) | Digital license with referral information | |
US20130133084A1 (en) | Digital rights management of content when content is a future live event | |
AU2002305814A1 (en) | Cryptographic trust zones in digital rights management | |
EP1340134A2 (en) | Method and apparatus for supporting multiple trust zones in a digital rights management system | |
AU2002312352A1 (en) | Method and system for subscription digital rights management | |
AU2002303731A1 (en) | Method and apparatus for dynamically assigning usage rights to digital works | |
AU2002305506A1 (en) | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CONTENTGUARD HOLDINGS, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TADAYON, BIJAN;NAHIDIPOUR, ARAM;WANG, XIN;AND OTHERS;SIGNING DATES FROM 20010619 TO 20010716;REEL/FRAME:026395/0061 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |