Method and network for selectively controlling the utility a target
First Claim
1. A distribution control system, comprising:
- a target, further comprising;
a change effecting device configured to affect the utility of the target;
a key stored in memory configured to restrict access to the key;
a receiver configured to receive data; and
logic coupled to the change effecting device, and configured to use the key and received data to selectively switch the change effecting device; and
an activation terminal, further comprising;
access to the data; and
a transmitter for sending the data to the receiver of the target.
4 Assignments
0 Petitions
Accused Products
Abstract
A distribution control system is provided to support the controlled and selective changing of utility for a target. The target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc. The distribution control system has a target with a change effecting device and a restricted access key. An activation device retrieves or generates an authorization key, and sends the authorization key to the target. The authorization key may be sent to the target wirelessly, for example, using a radio frequency signal. The target has logic that uses the restricted access key and the authorization key to change the utility of the target. In one example, the activation device retrieves the authorization key from a network operation center (NOC) by sending a target identifier to the NOC, and the NOC retrieves the authorization key for the identified target. The activation device may also connect to other systems for obtaining approval to change the utility of the target. For example, the authorization key may be sent to the target upon receiving payment, password, or other confirmation.
-
Citations
132 Claims
-
1. A distribution control system, comprising:
-
a target, further comprising;
a change effecting device configured to affect the utility of the target;
a key stored in memory configured to restrict access to the key;
a receiver configured to receive data; and
logic coupled to the change effecting device, and configured to use the key and received data to selectively switch the change effecting device; and
an activation terminal, further comprising;
access to the data; and
a transmitter for sending the data to the receiver of the target. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 116, 117, 118)
-
-
33. A target, comprising:
-
an externally perceptible indicia that indicates the target has controlled utility; and
the target configured with controlled utility. - View Dependent Claims (34, 35, 36, 37, 38, 39)
-
-
40. A package, comprising:
-
an externally perceptible indicia that indicates a target has controlled utility;
the target configured with controlled utility, and is in the package; and
wherein the indicia is on the packaging.
-
-
41. A method for distributing an electronic device, comprising:
-
receiving an electronic device with a utility controlled to be in a first utility state;
transferring the controlled electronic device to another party;
confirming that the other party is authorized to use the electronic device in a second utility state ; and
controlling the utility of the electronic device to the second utility state. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A method for distributing media, comprising:
-
receiving media compromised to control how an intended reader is able to read the media;
transferring the compromised media to another party;
confirming that the other party is authorized to have the compromised media in a restored state where the compromised media would be able to be read in the intended reader; and
sending data to the compromised media according to how the compromised media is to be restored. - View Dependent Claims (51, 52, 53, 54, 55, 56)
-
-
57. A method for controlling distribution of a target, comprising:
-
having a set of predefined keys that includes a predefined key capable of affecting a utility of the target;
receiving an identifier value;
retrieving the predefined key that is associated with the received identifier value; and
sending the predefined key. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A point of sale device for effecting a change in the utility of a target, comprising:
-
means to provide an authorized key; and
a transmitter for sending the authorized key to the target. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84)
-
-
85. A distribution control system, comprising:
-
a target having a utility intentionally compromised before entering its distribution chain;
an authorization key transmittable to the target responsive to an authorized condition; and
wherein the authorization key is selected to effectuate a change in the compromised utility of the target. - View Dependent Claims (86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98)
-
-
99. A method of manufacturing a target, comprising:
-
installing a change effecting device with the target so that in one state a utility of the target is compromised and in another state the utility is not compromised;
setting the change effecting device to one of the states;
storing a restricted-access key with the target;
configuring a receiver with the target to receive an authorization key; and
configuring logic to use the authorization key and the restricted-access key to change the state of the change effecting device to the other state. - View Dependent Claims (100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111)
-
-
112. A method for controlling the utility of a target, comprising:
-
authorizing a target to have its utility affected;
requesting an authorization key capable of affecting the authorized utility on the target;
sending the authorization key. - View Dependent Claims (113, 114, 115, 119, 120, 121, 122)
-
-
123. A method of controlling theft at a retail store, comprising:
offering electronic devices for sale that when placed in an operating state are configured to have a commercially unusable utility. - View Dependent Claims (124, 125, 130)
-
126. A method of controlling theft at a retail store, comprising:
accepting delivery of electronic devices that when placed in an operating state are configured to have a commercially unusable utility. - View Dependent Claims (127, 128)
-
129. A method of controlling theft at a retail store:
offering unreadable optical discs for sale.
-
131. An anti-theft kit, comprising:
-
a target having at least one of its desired utilities controlled; and
an indicia positioned such that it is externally readable, the indicia communicating that the target is controllable.
-
-
132. An anti-theft kit, comprising:
-
a package comprising a target having at least one of its desired utilities controlled; and
an indicia positioned on the package such that it is externally readable, the indicia communicating that the target is controllable.
-
Specification