Method and system for limiting the use of user-specific software features
First Claim
1. A method of enabling the use of a digital work on plural computing devices, said method comprising the acts of:
- receiving, from a computing device, a request to enable the use of said digital work on said computing device, said request comprising first data indicative of a user, said digital work being associated with said user and requiring the presence of second data on said computing device in order to be used on said computing device; and
if a limit associated with said user has not been reached, providing said second data to said computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according to a secret symmetric key shared between the retail site and the fulfillment site, information that is needed by the fulfillment site to process an order for content sold by the retail site. Upon selling a content item, the retail site transmits to the purchaser a web page having a link to a URL comprising the address of the fulfillment site and a parameter having the encrypted information. Upon following the link, the fulfillment site downloads the ordered content to the consumer, preparing the content if necessary in accordance with the type of security to be carried with the content. The fulfillment site includes an asynchronous fulfillment pipeline which logs information about processed transactions using a store-and-forward messaging service. The fulfillment site may be implemented as several server devices, each having a cache which stores frequently downloaded content items, in which case the asynchronous fulfillment pipeline may also be used to invalidate the cache if a change is made at one server that affects the cached content items. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.
371 Citations
48 Claims
-
1. A method of enabling the use of a digital work on plural computing devices, said method comprising the acts of:
-
receiving, from a computing device, a request to enable the use of said digital work on said computing device, said request comprising first data indicative of a user, said digital work being associated with said user and requiring the presence of second data on said computing device in order to be used on said computing device; and
if a limit associated with said user has not been reached, providing said second data to said computing device. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
6. (cancelled).
-
16. A method of activating software installed on plural computing devices, said method comprising the acts of:
-
receiving, from a first computing device, a first request to activate said software installed on said first computing device, said request comprising information indicative of a user, said software having an activated state and a non-activated state;
determining that an activation limit associated with said user has not been reached; and
providing first activation data to said first computing device. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of activating software on plural computing devices, said method comprising the acts of:
-
receiving, from a first computing device, a first request to activate first software installed on said first computing device with respect to a first user;
determining that an activation limit associated with said first user has not been reached; and
activating said first software with respect to said first user;
wherein said first software renders at least a first class of digital works without regard to whether said first software has been activated, and a second class of digital works only if said first software has been activated with respect to said first user. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method enabling the use of an enhanced feature available on plural computing devices, said method comprising the acts of:
-
receiving, from a first computing device, a first request to enable said enhanced feature on said first computing device;
determining that a limit has not been reached;
enabling the use of said enhanced feature on said first computing device;
wherein said first computing device has at least some non-enhanced features usable regardless of whether said enhanced feature is enabled, and wherein said limit is selected from the group consisting of;
a restriction on the number of computing devices on which said enhanced feature may be enabled, and a restriction on the rate at which computing devices may be enabled to use said enhanced feature. - View Dependent Claims (38, 39, 40, 41)
-
-
42. A method of activating software for use by a persona on a limited number of computing devices, said method comprising the acts of:
-
receiving said persona'"'"'s credentials;
authenticating said credentials by querying a namespace authority;
requesting first information from the remote computing device;
determining a number of activations of the software within a first period of time in accordance with the persona'"'"'s credentials and first information requested from the remote computing device; and
if the number of activations is less than a maximum number of activations within said first period of time, then;
generating an activation certificate that includes second information related to the persona'"'"'s credentials; and
uploading said activation certificate to the remote computing device to activate the software residing on the remote computing device such that operation of the software is associated with the persona'"'"'s credentials. - View Dependent Claims (43, 44, 45, 46, 47, 48)
-
Specification