×

Method and system for binding enhanced software features to a persona

  • US 6,891,953 B1
  • Filed: 06/27/2000
  • Issued: 05/10/2005
  • Est. Priority Date: 06/27/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of enabling the use of an item on plural computing devices, said method comprising the acts of:

  • providing, to a first computing device associated with a persona, first data which enables the use of said item on said first computing device; and

    determining that a second computing device is associated with said persona; and

    providing to said second computing device second data which enables the use of said item on said second computing device, wherein said first data differs in at least some respect from said second data, wherein said first data comprises a first cryptographic key which enables the use of said item, said first cryptographic key being included in said first data in a form encrypted by a second cryptographic key, and wherein said second data comprises said first cryptographic key in a form encrypted by a third cryptographic key different from said second cryptographic key, wherein said item comprises encrypted content and a decryption key which decrypts said encrypted content, and wherein said decryption key is encrypted so as to be decryptable by said first cryptographic key, wherein said first data further comprises a fourth cryptographic key, wherein said second data further comprises said fourth cryptographic key, wherein said first and fourth cryptographic keys are the private and public keys, respectively, of an asymmetric key pair, and wherein said decryption key is included in said item in a form encrypted by said fourth cryptographic key, and wherein the method further comprises the acts of;

    providing to said first computing device a first set of computer-executable instructions which applies said second cryptographic key; and

    providing to said second computing device a second set of computer-executable instructions which applies said third cryptographic key.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×