Biometric rights management system
First Claim
Patent Images
1. A method for allowing an authorized user to audit encrypted media files, comprising:
- (a) measuring dynamic characteristics of an information entry by an authorized user to create a biometric profile of the authorized user;
(b) prompting an individual to perform the information entry, measuring dynamic characteristics thereof for comparison against the biometric profile of the authorized user, and verifying based on the comparison if the individual is the authorized user; and
(c) if the individual is verified as the authorized user, streaming a selected encrypted media file from a storage location, decrypting the streamed media file, and providing the decrypted streamed media file to an auditing device.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for using biometric information to control access to digital media that is obtained over a network such as the Internet. Encryption, techniques are used in combination with biometric verification technology to control and monitor access to online or locally held media. Biometrics such as keystroke dynamics are measured at a user'"'"'s computer to confirm the identity of a user for the purpose of allowing the user to audit music files to which the user has authorized access.
193 Citations
26 Claims
-
1. A method for allowing an authorized user to audit encrypted media files, comprising:
-
(a) measuring dynamic characteristics of an information entry by an authorized user to create a biometric profile of the authorized user;
(b) prompting an individual to perform the information entry, measuring dynamic characteristics thereof for comparison against the biometric profile of the authorized user, and verifying based on the comparison if the individual is the authorized user; and
(c) if the individual is verified as the authorized user, streaming a selected encrypted media file from a storage location, decrypting the streamed media file, and providing the decrypted streamed media file to an auditing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21)
-
-
16. A computer program product comprising a computer- readable medium having computer-readable code embodied therein for allowing an authorized user to audit encrypted media files comprising:
-
code means for measuring physical characteristics of an authorized user'"'"'s typing style and creating a biometric profile of the authorized user based on the measured physical characteristics of the authorized user'"'"'s typing style;
code means for measuring physical characteristics of a typing style of an individual purporting to be the authorized user and comparing features thereof with the biometric profile to verify, within a predetermined likelihood, that the individual is the authorized user; and
code means for, if the individual is verified to be the authorized user, causing an encrypted media file to be streamed to an auditing device and decrypted.
-
-
22. A biometric rights management system for controlling access to encrypted media files, comprising:
-
a remote server system having a database of encrypted media files and a database of user profiles each associated with an authorized user, at least some of the user profiles including an associated biometric profile containing biometric information identifying the authorized user associated therewith; and
a plurality of user computer systems connected to the remote server through the Internet, each having a biometric input device and being configured to;
(a) download from the server and store at a local storage device a selected encrypted media file;
(b) download from the server and store at a local storage device a selected user profile and associated biometric profile;
(c) measure biometric information of an individual using the biometric input device;
(d) compare the measured biometric information with the downloaded biometric profile to verify if the individual is the authorized user associated with the downloaded user profile; and
(e) if the individual is verified to be the authorized user, permit the encrypted media file to be audited. - View Dependent Claims (23, 24, 25, 26)
-
Specification