METHOD FOR DIGITAL RIGHTS MANAGEMENT INCLUDING USER/PUBLISHER CONNECTIVITY INTERFACE
First Claim
1. A method for securing software to reduce unauthorized use of the software and for selectively exchanging information, the method comprising:
- providing software including data representing digital content;
associating at least one identifier with the software prior to distribution of the software, the at least one identifier being detectable by a resident authorized representative to request authentication of the software and selective exchange of information with a remote authorized representative; and
distributing the software with the at least one identifier to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for reducing unauthorized use of software and selectively exchanging information includes designating software for protection and information exchange via one or more corresponding identifier(s) associated with the software. An identifier is detected by an authorized representative entity resident on a user computer, network, or device, remotely located relative to the user, or both. During first use/transfer of content designated for protection, the authorized representative generates a password or authentication code based on user system information and links the code to the content. Subsequent use/access to the content requires that the current system information at least partially match system information of the authorized system encoded in the authorization code or codes associated with the content. A remote authorized representative is provided to establish a user/publisher connectivity platform to facilitate the exchange of information between the user system and the remote authorized representative requested by a software identifier.
-
Citations
97 Claims
-
1. A method for securing software to reduce unauthorized use of the software and for selectively exchanging information, the method comprising:
-
providing software including data representing digital content;
associating at least one identifier with the software prior to distribution of the software, the at least one identifier being detectable by a resident authorized representative to request authentication of the software and selective exchange of information with a remote authorized representative; and
distributing the software with the at least one identifier to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for securing software to reduce unauthorized use of the software and to selectively exchange information, the method comprising:
-
providing software including data representing digital content;
associating a plurality of identifiers with the software prior to distribution of the software, at least one identifier being detectable by a resident authorized representative to request authentication of the software and to request selective exchange of information with a remote authorized representative; and
distributing the software with the plurality of identifiers to a user. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method for digital rights management including selectively exchanging information between at least one resident authorized representative entity installed on or in a user device and at least one remote authorized representative entity, the method comprising:
-
associating at least one identifier with the software to designate the software for protection from unauthorized use;
associating at least one identifier with the software to request selective communication with a remote authorized representative;
detecting the identifiers using an authorized representative resident on or in the user device;
determining whether the user device is authorized to access the software using the authorized representative entity installed on or in the user device;
controlling access to the software based on whether the user device is determined to be authorized; and
selectively exchanging information with the remote authorized representative. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86)
-
-
87. A method for securing software to reduce unauthorized use of the software, the method comprising:
-
providing software including data representing digital content;
detecting an identifier associated with the software indicating that protection from unauthorized use is desired;
detecting an identifier associated with the software indicating that selective exchange of information is requested;
communicating with an authorized representative entity to determine whether a user device attempting to access the software is authorized to access the software; and
controlling access to the software based on whether the user device is authorized. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94, 95, 96, 97)
-
Specification