Updating usage conditions in lieu of download digital rights management protected content
2 Assignments
0 Petitions
Accused Products
Abstract
A method on an end user system for creating additional copies onto at least one computer readable medium such as CDs, DVDs, ZipDisks™, tape, Flash memory, and RAM. The method comprising the steps of: receiving encrypted content with associated usage conditions and a first hash value; receiving a selection from an end user to create at least one copy of the-encrypted content onto at least one computer readable medium; sending a request to an online electronic store of the encrypted content selected to be copied; receiving from the electronic store a description of the content selected to be copied along with a second hash value; and determining if the first hash value received is identical to the second hash value and if the first hash and the second hash value is identical authorizing the creating additional copies onto at least one computer readable medium.
-
Citations
45 Claims
-
1-22. -22. (canceled)
-
23. A method on an end user system for encoding watermarks, the method comprising:
-
receiving encrypted digital content with at least one usage right;
a first watermark for identifying a source of the encrypted content; and
at least one watermarking instruction for creating a second watermark on an end user system;
decrypting the watermarking instruction in the encrypted digital content;
generating the second watermark based upon the usage right associated with the content;
applying the second watermark to the encrypted digital content. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer readable medium encoded with programming instructions for encoding watermarks, the programming instructions comprising:
-
receiving encrypted digital content with at least one usage right;
a first watermark for identifying a source of the encrypted content; and
at least one watermarking instruction for creating a second watermark on an end user system;
decrypting the watermarking instruction in the encrypted digital content;
generating the second watermark based upon the usage right associated with the content;
applying the second watermark to the encrypted digital content. - View Dependent Claims (33, 34, 35, 36, 38, 39, 40)
-
-
37. The computer readable medium of 32, wherein the decrypting the watermarking instruction is performed in a tamper resistant environment so as to deter unauthorized access to the watermarking instruction.
-
41. An information processing system for encoding watermarks, the system comprising:
-
a processor coupled to memory for storing encrypted digital content with at least one usage right;
a first watermark for identifying a source of the encrypted content; and
at least one watermarking instruction for creating a second watermark;
a tamper resistant environment for deterring unauthorized access to the encrypted content, the tamper resistant environment including software instructions performed by the processor for decrypting the watermarking instruction in the encrypted digital content;
generating the second watermark based upon the usage right associated with the content;
applying the second watermark to the encrypted digital content. - View Dependent Claims (42, 43, 44)
-
-
45. The system of claim 45, wherein the second encrypting key is a symmetric key locally generated.
Specification