Distributing Access to a Data Item
First Claim
Patent Images
1. A computer-implemented method, comprising:
- verifying that a first computer is in the same group as a second computer, the first computer storing first permission data allowing a first number of end users to access an encrypted data item, each group member identified as a publisher computer, distributor computer, retailer computer or end-user computer, where members of the group are associated with a common group key;
transferring second permission data from the first computer to the second computer, the second permission data allowing access to the encrypted data item for a second number of end-users through the second computer, where the second number does not exceed the first number; and
reducing the first number of end users.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided for use in distributing access to a data item. The method includes allowing multiple transfers between computers of a single instance of permission to gain access to the data item, the transfers occurring across data connections and including a first transfer between a first computer and a second computer and a subsequent transfer between the second computer and a third computer, wherein at any one time only one computer retains the instance of permission and is able to use the instance of permission to gain access to the data item.
-
Citations
21 Claims
-
1. A computer-implemented method, comprising:
-
verifying that a first computer is in the same group as a second computer, the first computer storing first permission data allowing a first number of end users to access an encrypted data item, each group member identified as a publisher computer, distributor computer, retailer computer or end-user computer, where members of the group are associated with a common group key; transferring second permission data from the first computer to the second computer, the second permission data allowing access to the encrypted data item for a second number of end-users through the second computer, where the second number does not exceed the first number; and reducing the first number of end users. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, encoded on a computer-readable medium, operable to cause data processing apparatus to perform operations comprising:
-
verifying that a first computer is in the same group as a second computer, the first computer storing first permission data allowing a first number of end users to access an encrypted data item, each group member identified as a publisher computer, distributor computer, retailer computer or end-user computer, where members of the group are associated with a common group key; transferring second permission data from the first computer to the second computer, the second permission data allowing access to the encrypted data item for a second number of end-users through the second computer, where the second number does not exceed the first number; and reducing the first number of end users. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
means for verifying that a first computer is in the same group as a second computer, the first computer storing first permission data allowing a first number of end users to access an encrypted data item, each group member identified as a publisher computer, distributor computer, retailer computer or end-user computer, where members of the group are associated with a common group key; means for transferring second permission data from the first computer to the second computer, the second permission data allowing access to the encrypted data item for a second number of end-users through the second computer, where the second number does not exceed the first number; and reducing the first number of end users. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification