Controlling and managing digital assets
First Claim
1. A method for controlling and managing a digital asset transmitted from a sending computer to a receiving computer, the method comprising:
- establishing a first secure communication pathway between the sending computer and an intermediate server;
transmitting the digital asset from the sending computer to the intermediate server using the first secure communication pathway;
establishing a second secure communication pathway between the receiving computer and the intermediate server;
transmitting the digital asset from the intermediate server to the receiving computer using the second secure communication pathway;
transmitting to the receiving computer rights defining how the digital asset may be manipulated; and
storing the digital asset at the receiving computer in a way that permits manipulation of the digital asset only in ways that are consistent with the transmitted rights.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling and managing digital assets. These systems and techniques are particularly useful when digital assets are transmitted electronically using, for example, the Internet, as these techniques serve to make the Internet secure for communication and control of digital assets. In addition, they permit dynamic control and management of digital assets, regardless of where the assets reside. Use of these systems and techniques promises to enable new, Internet-based distribution models, and to provide superior insight with respect to the use and status of digital assets. Particular implementations of the systems and techniques permit features such as lifetime control of digital content, multi-level control of digital content (including session encryption, asset encryption, and remote management), and try-before-you buy marketing approaches. They also support functions such as digital rights transfer, tracking, segmentation, archiving, and improved handling of upgrades and updates.
323 Citations
90 Claims
-
1. A method for controlling and managing a digital asset transmitted from a sending computer to a receiving computer, the method comprising:
-
establishing a first secure communication pathway between the sending computer and an intermediate server;
transmitting the digital asset from the sending computer to the intermediate server using the first secure communication pathway;
establishing a second secure communication pathway between the receiving computer and the intermediate server;
transmitting the digital asset from the intermediate server to the receiving computer using the second secure communication pathway;
transmitting to the receiving computer rights defining how the digital asset may be manipulated; and
storing the digital asset at the receiving computer in a way that permits manipulation of the digital asset only in ways that are consistent with the transmitted rights. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
45. A method for controlling and managing a digital asset installed on a computer, the method comprising:
-
installing on the computer rights defining how the digital asset may be manipulated, the installing comprising loading the rights into a secure database at the computer; and
storing the digital asset in a way that permits manipulation of the digital asset only in ways that are consistent with the installed rights.
-
-
60. A method for controlling and managing a digital asset transmitted from a sender to multiple recipients, the method comprising:
-
transmitting the digital asset from the sender to the recipients;
transmitting to the recipients rights defining how the digital asset may be manipulated;
storing the digital asset in storage locations associated with the recipients in a way that permits manipulation of the digital asset only in ways that are consistent with the transmitted rights; and
permitting certain ones of the recipients to modify the rights defining how the certain ones of the recipients may manipulate the digital asset. - View Dependent Claims (61, 62, 63, 64)
-
-
65. A method for controlling and managing a digital asset transmitted from a sender to a recipient, the method comprising:
-
transmitting the digital asset from the sender to the recipient;
transmitting to the recipient a first set of rights defining how the digital asset may be manipulated;
storing the digital asset in a storage location associated with the recipient in a way that permits manipulation of the digital asset only in ways that are consistent with the transmitted rights; and
permitting the recipient to transmit the digital asset to another recipient along with a second set of rights defining how the digital asset may be manipulated by the other recipient. - View Dependent Claims (66, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82)
-
-
67. A system for dynamically managing digital rights of digital content, comprising:
-
a digital content package comprising digital content data and a digital rights manager wherein the digital content data includes encrypted data; and
a digital rights database operable to store digital rights relating to the digital content data, wherein the digital rights manager includes code that is operable to;
determine whether digital rights to manipulate the digital content data exist in the digital rights database; and
decrypt the encrypted data of the digital content data to generate decrypted digital content that can be manipulated.
-
-
83. A method of providing secure collaboration among several collaborators, the method comprising:
-
providing a digital asset to a collaborator in an encrypted format;
permitting the collaborator to edit the digital asset using an authorized viewer program; and
saving changes made by the collaborator in an encrypted format by creating a collaboration file by encrypting a change document representing the changes made by the collaborator and the original encrypted digital asset. - View Dependent Claims (84, 85, 86, 87, 88, 89, 90)
-
Specification