Distribution and rights management of digital content
First Claim
1. A method for managing digital rights, the method comprising:
- detecting a data file on a user device, wherein the data file includes a digital wrapper preventing access to the data file without a valid authorization;
searching for information relating to an authorization to access the data file using data stored in a non-volatile storage area of the user device; and
disabling the digital wrapper if an authorization to access the data file is found during the search.
5 Assignments
0 Petitions
Accused Products
Abstract
Techniques and systems for for managing digital rights can be implemented to protect against unauthorized copying of digital content and to help ensure payment to content owners and distributors. Digital wrappers can be applied to data files to prevent access without a valid authorization. Information relating to authorizations to access data files and/or keys for accessing the data files may be stored and retrieved using data stored in a non-volatile storage area of a user device. Software on the user device can be used to recognize files and to apply digital wrappers to recognized files. In addition, the software can be used to remove digital wrappers from files in accordance with authorizations to access the files. Payments or other credits can be allocated among distributors of a data file using information associated with the digital wrappers.
-
Citations
118 Claims
-
1. A method for managing digital rights, the method comprising:
-
detecting a data file on a user device, wherein the data file includes a digital wrapper preventing access to the data file without a valid authorization;
searching for information relating to an authorization to access the data file using data stored in a non-volatile storage area of the user device; and
disabling the digital wrapper if an authorization to access the data file is found during the search. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for managing digital rights, the method comprising:
-
detecting a data file on a user device;
identifying the data file using a file recognition algorithm;
searching for information relating to an authorization to access the data file using data stored in a non-volatile storage area of the user device; and
allowing access to the data file if an authorization to access the data file is found during the search. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for allocating proceeds in connection with a distribution of digital rights, the method comprising:
-
receiving a data file on a user device, wherein the data file includes a digital wrapper including information relating to at least one distributor of the data file;
receiving a request to purchase a right to access the data file;
extracting the information relating to at least one distributor from the digital wrapper; and
allocating credits to the at least one distributor based on the extracted information. - View Dependent Claims (30, 31, 32, 33)
-
-
34. A method for allocating proceeds in connection with a distribution of digital rights, the method comprising:
-
receiving a data file on a user device, wherein the data file includes a digital wrapper including information relating to one or more distributors of the data file;
identifying a user of the user device;
modifying the digital wrapper to include information relating to the identification of the user, wherein a detection of the data file with the modified digital wrapper enables an allocation of credit to the user. - View Dependent Claims (35, 36, 37, 38, 39)
-
-
40. A method for facilitating digital rights management on a user device, the method comprising:
-
collecting information relating to a user device from the user device, with the information relating to the user device including unique identification data for the user device;
generating a digital key using the collected information;
storing the digital key;
encrypting the digital key;
sending the encrypted key to the user device for storage on the user device;
receiving, from the user device, the encrypted key and information relating to the user device; and
validating the user device using at least two components selected from the group consisting of the received encrypted key, the received information, and the stored digital key. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A method for managing digital rights, the method comprising:
-
monitoring an input/output system of a user device for attempted file transfers;
detecting an attempt to transfer a data file through the input/output system;
applying a digital wrapper to the data file before allowing the attempted transfer, wherein the digital wrapper is adapted to prevent unauthorized access to the data file. - View Dependent Claims (50, 51, 52, 53, 54)
-
-
55. A method for managing digital rights, the method comprising:
-
identifying a digital file on a first user device, wherein the digital file is subject to a license in accordance with license information stored on the first user device;
receiving a request to copy the digital file from the first user device to a second user device;
obtaining information associated with the second user device, including unique identification data for the second user device;
copying the digital file from the first user device to the second user device;
storing data on the first user device, wherein the data identifies the copied digital file and identifies the second user device. - View Dependent Claims (56, 57, 58, 59)
-
-
60. A method for managing digital rights, the method comprising:
-
identifying a media file for distribution;
identifying access rules associated with the media file, wherein the access rules include information relating to usage rights and usage fees;
applying a digital wrapper to the media file, with the digital wrapper including identification data for the media file and data relating to the access rules, wherein the digital wrapper is adapted to prevent unauthorized access to the media file. - View Dependent Claims (61, 62)
-
-
63. A method for managing digital rights, the method comprising:
-
encoding a media file with licensing information;
locking the media file using a digital wrapper to prevent unauthorized access;
loading the wrapped media file onto a user device;
installing instructions on the user device to allow unlocking of media files, wherein the instructions provide for identifying the media file and sending a message, in accordance with the licensing information encoded in the media file, to a remote server to obtain a license to use the media file;
receiving a license to access the media file from the remote server; and
allowing access to the media file on the user device using the license. - View Dependent Claims (64, 65)
-
-
66. A system for managing digital rights, comprising:
-
a centralized database adapted to store identifiers for a plurality of digital files and adapted to store user licenses to use the digital files;
a centralized server operable to receive messages via a network from a remote device, with each received message including a user identifier for a user and identification information for a digital file, wherein the centralized server is further operable to process payment information for a license to use the digital file, to store information associating the license to use the digital file with the user, and to send licensing information for the digital file to the remote device; and
wherein the licensing information is adapted to enable the remote device to allow use of the digital file by the user. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73)
-
-
74. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
detecting a data file on a user device, wherein the data file includes a digital wrapper preventing access to the data file without a valid authorization;
searching for information relating to an authorization to access the data file using data stored in a non-volatile storage area of the user device; and
disabling the digital wrapper if an authorization to access the data file is found during the search. - View Dependent Claims (75, 76, 77, 78, 79, 80, 81, 82, 83, 84)
-
-
85. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
detecting a data file on a user device;
identifying the data file using a file recognition algorithm;
searching for information relating to an authorization to access the data file using data stored in a non-volatile storage area of the user device; and
allowing access to the data file if an authorization to access the data file is found during the search. - View Dependent Claims (86, 87, 88)
-
-
89. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
receiving information extracted from a digital wrapper applied to a data file, with the extracted information including an identification of the data file;
receiving a request to purchase an authorization to access the data file;
identifying at least one distributor of the data file based on the extracted information; and
allocating credits to the identified distributors in accordance with a predefined allocation structure. - View Dependent Claims (90, 91)
-
-
92. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
storing a data file on a user device, wherein the data file includes a digital wrapper including information relating to at least one or more distributors of the data file;
identifying a user of the user device;
modifying the digital wrapper to include information relating to the identification of the user, wherein a detection of the data file with the modified digital wrapper enables an allocation of credit to the user. - View Dependent Claims (93, 94)
-
-
95. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
receiving information relating to a user device from the user device, with the received information including unique identification data for the user device;
generating a digital key using the received information;
storing the digital key;
encrypting the digital key;
sending the encrypted key to the user device for storage on the user device;
receiving, from the user device, the encrypted key and collected information relating to the user device, with the collected information being collected by the user device in accordance with instructions stored on the user device; and
validating the user device using at least two data items selected from the group consisting of the received encrypted key, the collected information, and the stored digital key. - View Dependent Claims (96, 97, 98, 99)
-
-
100. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
monitoring an input/output system of a user device for attempted file transfers;
detecting an attempt to transfer a data file through the input/output system;
applying a digital wrapper to the data file before allowing the attempted transfer, wherein the digital wrapper is adapted to prevent unauthorized access to the data file. - View Dependent Claims (101, 102, 103)
-
-
104. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
identifying a digital file on a first user device, wherein the digital file is subject to a license in accordance with license information stored on the first user device;
receiving a request to copy the digital file from the first user device to a second user device;
obtaining information associated with the second user device, including unique identification data for the second user device;
copying the digital file from the first user device to the second user device;
storing data on the first user device, wherein the data identifies the copied digital file and identifies the second user device. - View Dependent Claims (105, 106, 107)
-
-
108. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
identifying a media file;
identifying access rules associated with the media file, wherein the access rules include information relating to usage rights and usage fees;
applying a digital wrapper to the media file, with the digital wrapper including identification data for the media file and data relating to the access rules, wherein the digital wrapper is adapted to prevent unauthorized access to the media file. - View Dependent Claims (109, 110, 111, 112)
-
-
113. An article comprising a machine-readable medium storing instructions for causing one or more processors to perform operations comprising:
-
receiving a digital key;
storing the digital key in a non-volatile memory;
storing license information for at least one digital file in a license database in a volatile storage area;
identifying an attempt to access a specific digital file; and
allowing access to the digital file using the digital key if the license database includes license information identifying a license to the specific digital file. - View Dependent Claims (114, 115, 116, 117, 118)
-
Specification