METHOD AND APPARATUS TO PROVIDE A USER PROFILE FOR USE WITH A SECURE CONTENT SERVICE
First Claim
Patent Images
1. A method of inhibiting unauthorized access to content available on a network, the method comprising:
- receiving information from a consumer;
storing the information in a user profile;
receiving an encryption request from a content creator;
transforming content identified by the creator into encrypted content using an encryption key;
receiving a request to access the encrypted content from the consumer;
determining whether the consumer'"'"'s user profile satisfies entitlement criteria associated with the content; and
if the consumer'"'"'s user profile satisfies the entitlement criteria, transmitting authorization data to the consumer thereby allowing the consumer access to the encrypted content.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure content service available through a network comprising a user profile stored in a user profile store and a profile access controller to enforce access rights to the user profile, wherein the user profile is used to provide access rights to other content.
151 Citations
20 Claims
-
1. A method of inhibiting unauthorized access to content available on a network, the method comprising:
-
receiving information from a consumer; storing the information in a user profile; receiving an encryption request from a content creator; transforming content identified by the creator into encrypted content using an encryption key; receiving a request to access the encrypted content from the consumer; determining whether the consumer'"'"'s user profile satisfies entitlement criteria associated with the content; and if the consumer'"'"'s user profile satisfies the entitlement criteria, transmitting authorization data to the consumer thereby allowing the consumer access to the encrypted content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system that inhibits unauthorized access to content available on a network, the system comprising:
-
a communication interface; one or more storage devices; and one or more processors in communication with the communication interface and the one or more storage devices, the one or more processors programmed to; receive information via the communication interface from a consumer; store the information in a user profile on the one or more storage devices; receive an encryption request via the communication interface from a content creator; transform content identified by the creator into encrypted content using an encryption key; receive a request to access the encrypted content via the communication interface from the consumer; determine whether the consumer'"'"'s user profile satisfies entitlement criteria associated with the content; and if the consumer'"'"'s user profile satisfies the entitlement criteria, transmit via the communication interface authorization data to the consumer thereby allowing the consumer access to the encrypted content. - View Dependent Claims (14, 15, 16)
-
-
17. One or more processor readable storage devices having processor readable code embodied thereon, the processor readable code for instructing one or more processors to limit access to content available on a network, comprising the steps of:
-
receiving information from a consumer; storing the information in a user profile; receiving an encryption request from a content creator; transforming content identified by the creator into encrypted content using an encryption key; receiving a request to access the encrypted content from the consumer; determining whether the consumer'"'"'s user profile satisfies entitlement criteria associated with the content; and if the consumer'"'"'s user profile satisfies the entitlement criteria, transmitting authorization data to the consumer thereby allowing the consumer access to the encrypted content. - View Dependent Claims (18, 19, 20)
-
Specification