RIGHTS MANAGEMENT IN A CLOUD
First Claim
1. A personal digital rights management system embodied on a computer readable storage medium comprising:
- a component that receives computer content associated with a computer user; and
a remote rights service component that regulates access to the content based at least in part on access rights and an observed human behavioral characteristic, the access rights are designated by an authorized user or owner of the content.
2 Assignments
0 Petitions
Accused Products
Abstract
Innovative aspects provided herein pertain to digital rights management (DRM) and/or enforcement in conjunction with remote network clouds and services. Digital rights management licenses/rights/policies can be applied to personal files to facilitate worry free remote storage and/or file sharing. These rights can be identity-centric rather than machine centric, thereby facilitating access and usage from any network device anywhere. Various mechanisms are also disclosed to deter assorted uses of content and/or encourage rights acquisition as an alterative or in addition to technologically prohibitive means. Additionally, a system and method are provided that can afford a frictionless marketplace for file distribution, wherein content is protected and freely distributed and identity-centric rights can be purchased to access the content.
251 Citations
20 Claims
-
1. A personal digital rights management system embodied on a computer readable storage medium comprising:
-
a component that receives computer content associated with a computer user; and a remote rights service component that regulates access to the content based at least in part on access rights and an observed human behavioral characteristic, the access rights are designated by an authorized user or owner of the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of media distribution embodied on a computer readable storage medium comprising:
-
receiving a computer readable item; generating an encrypted copy of the item; authenticating a user based at least in part on an observed human behavioral characteristic; facilitating restriction free distribution or linking to the encrypted copy; and providing a key to decrypt the item to a service or application employed by an authenticated user on-demand. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of protecting content comprising:
-
monitoring access to computer readable content under protection; inferring attempted unauthorized access to the content; and persuading a user to acquire rights to the content by presenting a message via artificial intelligence that employs psychological reasoning based at least in part on at least one of the user'"'"'s gender, age, ethnicity, religion, or education. - View Dependent Claims (20)
-
Specification