Controlling and managing digital assets
First Claim
1. A method of generating a protected version of a digital asset, the method comprising:
- encrypting the digital asset;
generating a set of rights for controlling use of the digital asset; and
associating the encrypted digital asset, the generated set of rights, and a viewer program to create the protected version of the digital asset.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling and managing digital assets. These systems and techniques are particularly useful when digital assets are transmitted electronically using, for example, the Internet, as these techniques serve to make the Internet secure for communication and control of digital assets. In addition, they permit dynamic control and management of digital assets, regardless of where the assets reside. Use of these systems and techniques promises to enable new, Internet-based distribution models, and to provide superior insight with respect to the use and status of digital assets. Particular implementations of the systems and techniques permit features such as lifetime control of digital content, multi-level control of digital content (including session encryption, asset encryption, and remote management), and try-before-you buy marketing approaches. They also support functions such as digital rights transfer, tracking, segmentation, archiving, and improved handling of upgrades and updates.
-
Citations
19 Claims
-
1. A method of generating a protected version of a digital asset, the method comprising:
-
encrypting the digital asset;
generating a set of rights for controlling use of the digital asset; and
associating the encrypted digital asset, the generated set of rights, and a viewer program to create the protected version of the digital asset. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of generating and manipulating a protected version of a digital asset, the method comprising:
-
encrypting the digital asset;
generating a set of rights for controlling use of the digital asset;
associating the encrypted digital asset, the generated set of rights, and a viewer program to create the protected version of the digital asset;
transmitting the protected version of the digital asset to a recipient;
authorizing manipulation of the digital asset by confirming that the generated set of rights allow manipulation of the digital asset;
decrypting the encrypted digital asset if the generated set of rights allow manipulation of the digital asset; and
allowing manipulation of the decrypted digital asset only within limits defined by the generated set of rights. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification