DIGITAL RIGHTS TAGGING SYSTEM AND METHOD
First Claim
1. A system comprising:
- a receiving component operable to receive item identification data based on a tangible item and an ownership verification indicator and to receive image data based on the tangible item;
a first encrypting component operable to generate encrypted item identification data based on the item identification data; and
a second encrypting component operable to generate encrypted image data based on the image data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system is provided that includes a receiving component a first encrypting component and a second encrypting component. The receiving component can receive, from a first user, item identification data based on a tangible item and an ownership verification indicator. The receiving component can also receive, from the first user, image data based on the tangible item. The first encrypting component can generate encrypted item identification data based on the item identification data. The second encrypting component operable to generate encrypted image data based on the image data. The resultant set of encrypted information is stored so as to associate the image and the ownership data for use later as proof of ownership of an item and its associated rights.
13 Citations
20 Claims
-
1. A system comprising:
-
a receiving component operable to receive item identification data based on a tangible item and an ownership verification indicator and to receive image data based on the tangible item; a first encrypting component operable to generate encrypted item identification data based on the item identification data; and a second encrypting component operable to generate encrypted image data based on the image data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving via a receiving component, item identification data based on a tangible item and an ownership verification indicator; receiving via the receiving component, image data based on the tangible item; generating, via a first encrypting component, encrypted item identification data based on the item identification data; and generating, via a second encrypting component, encrypted image data based on the image data. - View Dependent Claims (8, 9, 11, 12)
-
-
10. The method of claim 10, wherein the user data is additionally associated with a second user.
-
13. A system comprising:
-
a first decrypting component operable to generate, from encrypted item identification data, item identification data based on a tangible item and an ownership verification indicator; a second decrypting component operable to generate image data based on encrypted image data; and a transmitting component, wherein said transmitting component is operable to transmit, the item identification data and the image data. - View Dependent Claims (14, 15, 16)
-
-
17. A method comprising:
-
generating, via a first decrypting component and from encrypted item identification data, item identification data based on a tangible item and an ownership verification indicator; generating, via a second decrypting component operable, image data based on encrypted image data; and transmitting, via a transmitting component, the item identification data and the image data. - View Dependent Claims (18, 19, 20)
-
Specification