Separate authentication processes to secure content
First Claim
Patent Images
1. A method including:
- associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user; and
associating a second authentication process with the content, the second authentication process to protect the content from access by an unauthorized device, wherein the first authentication process and the second authentication process comprise separate and distinct authentication processes thereby enabling an authorized user to access the content on an authorized device and preventing the authorized user from accessing the content on the unauthorized device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user. A second authentication process is also associated with the content, the second authentication process to protect the content from access by an unauthorized device. The first authentication process and the second authentication process are separate and distinct authentication processes. This enables an authorized user to access the content on an authorized device and prevents the authorized user from accessing the content on the unauthorized device.
-
Citations
40 Claims
-
1. A method including:
-
associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user; and
associating a second authentication process with the content, the second authentication process to protect the content from access by an unauthorized device, wherein the first authentication process and the second authentication process comprise separate and distinct authentication processes thereby enabling an authorized user to access the content on an authorized device and preventing the authorized user from accessing the content on the unauthorized device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 40)
-
-
21. A system including:
-
a user device;
a copy-protected device; and
a content distributor, coupled via a network to both the user and copy-protected devices, to perform a first process and a second process with respect to content, wherein the first process and the second process comprise separate and distinct user and copy-protected device authentication processes thereby enabling an authorized user to access the content on the copy-protected device if the copy-protected device is authorized. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system including:
-
a user means;
a copy-protected means; and
a content distributor means, coupled via a network to both the user and copy-protected means, to perform a first process and a second process with respect to the content, wherein the first process and the second process comprise separate and distinct user and copy-protected device authentication processes thereby enabling an authorized user to access the content on the copy-protected device, if the copy-protected device is authorized.
-
Specification