Method and system for managing a data object so as to comply with predetermined conditions for usage
First Claim
Patent Images
1. A method for rights management of a data object, comprising:
- storing a data object in a memory device;
associating a rights object to the data object, the rights object including header, security, and rights information defining usages of the data object in compliance with a variable number of control conditions; and
encrypting the data object and the rights object for transfer to a user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for managing a data object so as to comply with predetermined conditions for usage of the data object. To control the usage of the data object, a set of control data, defining uses of the data object, which comply with the predetermined conditions, is created for the data object. The data object is concatenated with the user set of control data, encrypted and transferred to the user. When the user wants to use the data object, a special user program checks whether the usage complies with the control data. If so, the usage is enabled. Otherwise it is disabled.
88 Citations
30 Claims
-
1. A method for rights management of a data object, comprising:
-
storing a data object in a memory device;
associating a rights object to the data object, the rights object including header, security, and rights information defining usages of the data object in compliance with a variable number of control conditions; and
encrypting the data object and the rights object for transfer to a user. - View Dependent Claims (2, 3, 4)
-
-
5. A method for rights management of a data object, comprising:
-
receiving a data object in a memory device;
receiving a rights object via a rights object acquisition protocol, the rights object including header, security, and rights information defining usages of the data object in compliance with a variable number of control conditions; and
decrypting the rights object and the data object for use by a user. - View Dependent Claims (6, 7)
-
-
8. A method for rights management of a data object, comprising:
-
storing a data object in a provider'"'"'s memory device;
associating a rights object to the data object, the rights object including header, security, and rights information defining usages of the data object in compliance with a variable number of control conditions;
encrypting the data object and the rights object;
transferring the data object to a user'"'"'s memory device;
transferring the rights object to the user'"'"'s memory device via a rights object acquisition protocol; and
decrypting the rights object and the data object to extract content for use by a user. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for managing data, comprising:
providing a data package including data that is at least partially encrypted with a key;
providing a license associated with the data, wherein the license includes a variable number of control conditions for usage of the data;
transferring the data package to a user device;
transferring the license to the user device; and
granting access to the data according to the license. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
25. A system for managing data, comprising:
-
a content module for receiving requests for data, retrieving the data, and transmitting the data; and
a license module for receiving requests for a license associated with the data, retrieving the license, and transmitting the license, the license including a variable number of control conditions for usage of the data. - View Dependent Claims (26, 27)
-
-
28. A system for controlling the usage of a data object, comprising:
-
a usage manager module which receives a variable number of control conditions, checks whether a usage requested by the user complies with the usage defined by at least one usage control element including a geographical area of usage, and disables the usage requested by the user when the usage does not comply with the geographical area of usage control element; and
a decryption module which decrypts the data object, responsive to the check for requested usage by the usage manager module. - View Dependent Claims (29, 30)
-
Specification