Authorization rights for operational components
First Claim
Patent Images
1. A method for implementing authorization rights regarding a security-controlled process, comprising:
- obtaining access to an object data file configured to implement the security-controlled process that involves creating or producing or duplicating or processing or testing one or more objects;
further obtaining a digital rights management code that provides access protection to the object data file;
determining that an aspect of the security-controlled process is subject to a permission agreement having a predetermined condition requiring qualitative or quantitative monitoring of the security-controlled process; and
pursuant to processing the digital rights management code, providing interaction with an operational component of the security-controlled process in accordance with the predetermined condition to enable or prevent activation of the operational component.
4 Assignments
0 Petitions
Accused Products
Abstract
Various methods and systems include exemplary implementations for a security-activated operational component. Possible embodiments include but are not limited to obtaining access to an object data file configured to implement various functional operation regarding one or more objects; verifying validity of an authorization code associated with the object data file; and controlling operation of the operational component to enable or prevent its activation pursuant to the authorization code in accordance with one or more predetermined conditions.
-
Citations
26 Claims
-
1. A method for implementing authorization rights regarding a security-controlled process, comprising:
-
obtaining access to an object data file configured to implement the security-controlled process that involves creating or producing or duplicating or processing or testing one or more objects; further obtaining a digital rights management code that provides access protection to the object data file; determining that an aspect of the security-controlled process is subject to a permission agreement having a predetermined condition requiring qualitative or quantitative monitoring of the security-controlled process; and pursuant to processing the digital rights management code, providing interaction with an operational component of the security-controlled process in accordance with the predetermined condition to enable or prevent activation of the operational component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A security system for implementing authorization rights regarding a security-controlled process, the system comprising:
-
a digital rights management code that is configured to control an operational component involved in a functional operation to create or produce or duplicate or process or test an object; a verification module capable of interacting with the operational component to obtain monitoring data regarding predetermined conditions required by a permission agreement, wherein the verification module is operably coupled to the digital rights management code and operably coupled to the operational component; and an object data file associated with the digital right management code, wherein the object data file is configured to activate or disable the operational component based on confirmation from the verification module regarding compliance with the predetermined conditions. - View Dependent Claims (23, 24, 25, 26)
-
Specification