Timed availability of secured content provisioned on a storage medium
First Claim
1. A method of controlling access by a user to a data content of a storage medium, the data being encrypted, comprising the steps of:
- examining an at least three element authorization record which comprises the elements of an unencrypted start time prior to which decryption is inhibited, a decryption key and one of an expiration time or a usage limit, wherein the elements define access restrictions;
measuring time; and
enabling, responsive to the examination of the access restrictions, the decryption of the encrypted data whereby the user has access to the data.
6 Assignments
0 Petitions
Accused Products
Abstract
A service methodology based on distribution of secured content, such as, movies, music, games, information and the like, whereby revenue may be generated for premier and pay-per-use access to the secured content. The service is manifested by the combination of a video disk reader, controller and authorization center. A service provider, for instance, locks up a movie on a video disk for which a premier event viewing date and time may be defined and which the provider may then directly distribute, in advance of the premier event, to potential consumers. Each consumer may purchase the right to view the movie once for a certain fee, for example $5.00, through online access from the controller to the authorization center, but the single viewing will only be allowed by the controller on or after the premier event. Thereafter, the consumer pays for viewing of the movie on a pay-per-use basis or over a defined window of time, perhaps for reduced fee, such as $1.00. Moreover, the online authorization process makes it possible to track consumer preferences at the authorization center, and as an alternative to the online payment processing, smart cards may be utilized for such.
553 Citations
37 Claims
-
1. A method of controlling access by a user to a data content of a storage medium, the data being encrypted, comprising the steps of:
-
examining an at least three element authorization record which comprises the elements of an unencrypted start time prior to which decryption is inhibited, a decryption key and one of an expiration time or a usage limit, wherein the elements define access restrictions; measuring time; and enabling, responsive to the examination of the access restrictions, the decryption of the encrypted data whereby the user has access to the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of controlling decryption of encrypted data, comprising the steps of:
-
examining an at least three element authorization record which comprises the elements of an unencrpyted start time prior to which decryption is inhibited, a decryption key and one of an expiration time and a usage limit, wherein the elements define access restrictions; measuring time; and enabling the decryption of the encrypted data after the measured time effectively reaches the start time. - View Dependent Claims (25, 26)
-
-
27. An apparatus for controlling access by a user to content of a storage medium, the content including encrypted data and the medium being readable by a corresponding medium reader from which the apparatus is adapted to receive the content, comprising:
-
means for defining a start time prior to which decryption of the encrypted data is inhibited; means for storing an at least three element authorization record, which authorization record comprises the elements of the start time which is unencrypted, a decryption key and one of an expiration time or a usage limit, wherein the three elements define access restrictions; means for measuring time; and means for enabling, responsive to the access restrictions, the decryption of the encrypted data whereby the user has access to the data. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification