SYSTEMS AND METHODS FOR TEMPORARY ASSIGNMENT AND EXCHANGE OF DIGITAL ACCESS RIGHTS
First Claim
1. A method comprising:
- detecting a second user device within a proximity of a first user device;
responsive to detecting the second user device, receiving at the first user device content authorization information, wherein the content authorization information enables access to a content asset on the second user device which the first user device is not authorized to access;
enabling access to the content asset on the first user device;
determining that the first user device leaves the proximity of the second user device;
in response to determining that the first user device leaves the proximity, maintaining access to the content asset on the first user device for a predetermined time.
11 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for assignment and exchange of temporary access rights, based on a physical or virtual proximity of user devices. A first user device may receive a temporary access right that enables access on a second user device to a content asset which the first user device is not authorized to access. In response to receiving the temporary access right, the first user device may enable access on the first user device to the content asset. Access to the content asset may be maintained after the first user device leaves the proximity of the second user device until the content asset is played back in its entirety. The proximity may be based on physical location or virtual connections through online services. The temporary access right may be requested from the second user device by the first user device or assigned to the first user device from the second user device and may limit the number of times that the content asset may be accessed on the first user device.
301 Citations
21 Claims
-
1. A method comprising:
-
detecting a second user device within a proximity of a first user device; responsive to detecting the second user device, receiving at the first user device content authorization information, wherein the content authorization information enables access to a content asset on the second user device which the first user device is not authorized to access; enabling access to the content asset on the first user device; determining that the first user device leaves the proximity of the second user device; in response to determining that the first user device leaves the proximity, maintaining access to the content asset on the first user device for a predetermined time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
control circuitry configured to; detect a second user device within a proximity of a first user device; responsive to detecting the second user device, receive at the first user device content authorization information, wherein the content authorization information enables access to a content asset on the second user device which the first user device is not authorized to access; enable access to the content asset on the first user device; determine that the first user device leaves the proximity of the second user device; in response to determining that the first user device leaves the proximity, maintain access to the content asset on the first user device for a predetermined time. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21-30. -30. (canceled)
Specification