Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
First Claim
1. A method including the following steps:
- creating a secure container;
assigning a potential user or recipient to a class, the assignment being based at least in part on information regarding the potential user or recipient'"'"'s previous use of content;
associating a first rule with the secure container, the rule at least in part governing use of at least some contents of the secure container contents, the first rule at least in part specifying potential users or recipients of the secure container contents, the specifying being based at least in part on the class to which the potential users or recipients have been assigned;
sending the secure container to a first remote party;
the first remote party embedding a content object in the secure container;
sending the secure container, including the embedded content object, to the potential user or recipient;
evaluating a digital certificate associated with the potential user or recipient;
determining, based at least in part on the digital certificate, that the potential user or recipient has been assigned to the class; and
based on the determination, and at least in part under control of the first rule, making at least some of the secure container contents available to the potential user or recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership. The Matching and Classification Utility may also use at least some rights management information together with any artificial intelligence, expert system, statistical, computational, manual, or any other means to define new classes, class hierarchies, classification systems, category schemes, and/or assign persons, things, and/or groups of persons and/or things to at least one class.
527 Citations
15 Claims
-
1. A method including the following steps:
-
creating a secure container; assigning a potential user or recipient to a class, the assignment being based at least in part on information regarding the potential user or recipient'"'"'s previous use of content; associating a first rule with the secure container, the rule at least in part governing use of at least some contents of the secure container contents, the first rule at least in part specifying potential users or recipients of the secure container contents, the specifying being based at least in part on the class to which the potential users or recipients have been assigned; sending the secure container to a first remote party; the first remote party embedding a content object in the secure container; sending the secure container, including the embedded content object, to the potential user or recipient; evaluating a digital certificate associated with the potential user or recipient; determining, based at least in part on the digital certificate, that the potential user or recipient has been assigned to the class; and based on the determination, and at least in part under control of the first rule, making at least some of the secure container contents available to the potential user or recipient. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method including the following steps:
-
creating a secure container; associating a first rule with the secure container, the first rule at least in part governing use of at least some of the secure container contents, the first rule at least in part specifying potential users or recipients of the secure container contents, the specifying being based at least in part on a first class to which the potential users or recipients have been assigned; sending the secure container to a first remote party; the first remote party embedding a first content object in the secure container; receiving a request for a content object from a potential user or recipient, the request specifying a desired class of rights management information; determining that the first content object has rights management information associated with it that belongs to the desired class; sending the secure container, including the embedded first content object, to the potential user or recipient; evaluating a digital certificate associated with the potential user or recipient; determining, based at least in part on the digital certificate, that the potential user or recipient has been assigned to the first class; and based on the determination, and at least in part under control of the first rule, making at least some of the secure container contents available to the potential user or recipient. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification