System and method for managing copyrighted electronic media
First Claim
1. A method for protecting electronic media, comprising:
- encrypting the media;
transmitting the encrypted media—
together with data indicating a first set of permissions—
to a user device;
decrypting and using the electronic media at the user device in accordance with the first set of permissions;
sending a signal from the user device requesting additional permissions;
receiving at the user device data representing additional permissions; and
using the electronic media at the user device in accordance with the additional permissions.
2 Assignments
0 Petitions
Accused Products
Abstract
Copyrighted electronic media are packaged in a secure electronic format, and registered on associated registration server, which serves to provide on-line licensing and copyright management for that media. Users are connected to the server, e.g., through a computer network or the Internet, to enable data transfers and to transact licenses to utilize the media. Packaged electronic media are typically created by an author or derivative user of the work. Once the packaged media is registered on the server, the media is made available for limited use and possible license through an authorization server. This limited use is specified within the minimum permissions data set assigned to each packaged media. Without a license, users are typically permitted to view the packaged media—through a system which unpackages the media—but cannot save or otherwise transfer the media without obtaining auxiliary permissions to do so from the authorization server. The electronic media is authenticated through digital signatures and optional encryption.
-
Citations
14 Claims
-
1. A method for protecting electronic media, comprising:
-
encrypting the media;
transmitting the encrypted media—
together with data indicating a first set of permissions—
to a user device;
decrypting and using the electronic media at the user device in accordance with the first set of permissions;
sending a signal from the user device requesting additional permissions;
receiving at the user device data representing additional permissions; and
using the electronic media at the user device in accordance with the additional permissions.
-
-
2. In a method of delivering electronic content from a server to a user, and rendering the content with an application program, an improvement wherein the server:
-
computes a one-way hash function on data representing the content, yielding hash data;
encrypts data including the hash data; and
transmits the encrypted hash data to the user;
and wherein the application program;
checks the authenticity of the delivered content by reference to the encrypted hash data; and
refuses to render the content if said check fails. - View Dependent Claims (3)
-
-
4. A method for protecting electronic media, comprising:
-
storing encrypted media on a user device;
receiving a request to utilize the stored media in a first manner;
checking first license data on the user device to determine whether use of the stored media in the first manner is authorized; and
if not;
contacting a remote server;
performing a licensing transaction with the remote server, resulting in issuance of second license data by the remote server;
storing the second license data on the user device; and
decrypting the media for use. - View Dependent Claims (5, 6)
-
-
7. A method of enhancing a content rendering application or a content authoring application, comprising:
-
receiving a rights management software development kit; and
modifying said application in accordance with software included in said kit, to thereby impart rights management functionality to said application.
-
-
8. A method of controlling use of a content object that includes text, the method including:
-
receiving data representing the object at a user device;
receiving at the user device an initial set of data representing usage rights associated with said object, the initial set of data defining a first set of rights that are permitted, and a second set of rights that are not permitted; and
upon receiving a request to perform a function using said content, checking said initial set of data representing usage rights to determine whether said function should be allowed, and wherein a drag and drop function is among those that are not permitted. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of controlling use of a content object that includes text, the method including:
-
receiving data representing the object at a user device;
receiving at the user device an initial set of data representing usage rights associated with said object, said data defining a first set of rights that are permitted, and a second set of rights that are not permitted; and
upon receiving a request to perform a function using said content, checking said data representing usage rights to determine whether said function should be allowed;
wherein a transmission function is among those that are not permitted.
-
-
14. A method of controlling email comprising:
-
receiving data representing email at a user device;
receiving at the user device an initial set of data representing usage rights associated with the email, the initial set of data defining a first set of rights that are permitted; and
upon receiving a request to perform a function using the email, checking said initial set of data representing usage rights to determine whether the function should be allowed, wherein a transmission function is among those that are not permitted, and wherein upon a blocked transmission, querying a remote server to determine criteria for transmission, and if the criteria is met, receiving an updated set of data defining a second set of rights that are permitted, the second set of rights including transmission rights.
-
Specification