System and method for secure distribution and evaluation of compressed digital information
First Claim
1. A method for controlling access to digital information, comprising:
- storing digital information in an encrypted form on a host system;
reproducing the digital information using a media player application on the host system, said reproducing step including degrading a reproduction quality of the digital information based on at least one of a time condition and a use condition;
storing data on the host system which correlates a first type of decryption key with a first type of reproduction quality degradation performed based on at least one of said time condition and said use condition;
storing said first type of decryption key on the host system; and
comparing said first type of decryption key to the data stored on the host system to identify said first type of reproduction quality degradation,wherein said reproducing step includes degrading the reproduction quality of the digital information in accordance with the first type of reproduction quality degradation identified in said comparing step.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for controlling access to digital information is performed based on a plurality of decryption keys sent by the information provider. A first type of decryption key instructs a user'"'"'s host system to reproduce the digital information in accordance with a first level of reproduction quality degradation. Additional keys may specify other degradation levels. The quality of the digital information may be degraded based on a time condition or a use condition. Alternatively, only a portion of the information may be made viewable by a user. In order to obtain full and unrestricted access, the user must obtain a type of decryption key from the provider which removes all previous limitations on reproduction quality degradation.
84 Citations
21 Claims
-
1. A method for controlling access to digital information, comprising:
-
storing digital information in an encrypted form on a host system; reproducing the digital information using a media player application on the host system, said reproducing step including degrading a reproduction quality of the digital information based on at least one of a time condition and a use condition; storing data on the host system which correlates a first type of decryption key with a first type of reproduction quality degradation performed based on at least one of said time condition and said use condition; storing said first type of decryption key on the host system; and comparing said first type of decryption key to the data stored on the host system to identify said first type of reproduction quality degradation, wherein said reproducing step includes degrading the reproduction quality of the digital information in accordance with the first type of reproduction quality degradation identified in said comparing step. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for controlling access to digital information, comprising:
-
acquiring digital information for reproduction on a host system; sending the digital information to the host system with a first decryption key, said first decryption key instructing an application program on the host system to degrade the reproduction quality of the digital information based on at least one of a time condition and a use condition. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for controlling access of digital information, comprising:
-
storing digital information in an encrypted form on a host system; reproducing said digital information, using a first decryption key, a first time with a first quality of reproduction, and reproducing said digital information a second time, using a second decryption key, with a second quality of reproduction, said second quality of reproduction being degraded relative to said first quality of reproduction.
-
-
21. A method for controlling access of digital information, comprising:
-
storing digital information in an encrypted form on a host system; storing an application program for reproducing the digital information on the host system; storing a first decryption key on the host system; activating the application program to reproduce the digital information on the host system, said application program reproducing the digital information based on said first decryption key, said first decryption key controlling said application program to reproduce only a portion of the digital information; and storing a second decryption key on the host system, wherein said application program reproduces the digital information a second time based on said second decryption key, said second decryption key controlling said application program to reproduce all of the digital information.
-
Specification