Method for selling, protecting, and redistributing digital goods
First Claim
1. A method for limiting access to selected features of a multimedia file, comprising the steps of:
- disabling selected features of said multimedia file;
distributing said multimedia file with at least some enabled features;
offering to enable one or more specific disabled features when a user attempts to use at least one of said specific disabled features;
receiving a request from a user or user'"'"'s system, said request identifying an operating context and identifying said one or more disabled features; and
transmitting an authorization to said user or user'"'"'s system to enable said one or more disabled features, where said authorization is uniquely associated with said operating context;
whereby said selected features remain enabled only for said operating context.
8 Assignments
0 Petitions
Accused Products
Abstract
This is a method for limiting access to selected features of a freely distributed multimedia file, by disabling selected features of the file (using encryption, compression, or other access denial), distributing the file with some enabled features as an inducement to new users, and offering to enable more features when a new user attempts to use a disabled feature. A licensing system then receives a request from the user'"'"'s system, identifying a specific operating context and one or more features desired by the corresponding user. Accounting is done and an authorization is sent to the user or the user'"'"'s system to enable the features. However, the authorization is uniquely associated with the measured operating context of the user and the features remain enabled only for said operating context, thus limiting full operation to authorized users, while permitting new users access to limited operations.
84 Citations
26 Claims
-
1. A method for limiting access to selected features of a multimedia file, comprising the steps of:
-
disabling selected features of said multimedia file; distributing said multimedia file with at least some enabled features; offering to enable one or more specific disabled features when a user attempts to use at least one of said specific disabled features; receiving a request from a user or user'"'"'s system, said request identifying an operating context and identifying said one or more disabled features; and transmitting an authorization to said user or user'"'"'s system to enable said one or more disabled features, where said authorization is uniquely associated with said operating context; whereby said selected features remain enabled only for said operating context. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for limiting access to selected features of a data object, comprising the steps of:
-
compressing or encrypting portions of said data object; distributing said data object with at least some operable features; offering to decompress or decrypt one or more portions of said data object when a user of one of said operable features attempts to use features of at least one of said compressed or encrypted portions; receiving a request from a user or user'"'"'s system, said request identifying an operating context and said one or more compressed or encrypted portions; transmitting an authorization to said user or user'"'"'s system to decompress or decrypt at least one compressed or encrypted portion, where said authorization is uniquely associated with said unique user; whereby said selected portion is decompressed or decrypted only for said identified operating context. - View Dependent Claims (7)
-
-
8. A method for limiting access to selected data features of copyable encoded information accessed by a user on a user'"'"'s system, and for restricting access to said selected data features to a particular operating context, comprising the steps of:
-
locking said selected data feature, having a feature identifier, with a corresponding key; receiving an unlock request, from the user or user'"'"'s system, said request having a operating context identifier and a feature identifier; transforming said key using at least said unique operating context identifier to form an authorization; transmitting said authorization to said user or user'"'"'s system; reverse transforming said authorization using said unique operating context identifier to obtain the key corresponding to said feature identifier; and using said key to temporarily unlock said selected data feature; whereby said authorization can only be used to access the selected data feature in the presence of said operating context identifier. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for sharing limited access to selected data features of copyable encoded information stored on a server, and for permitting only uniquely identified workstations to unlock said selected data features, comprising the steps of:
-
locking said selected data feature, having a feature-identifier, with a corresponding key; receiving an unlock request having a unique workstation-identifier and a feature identifier from the workstation; transforming said key using at least said unique workstation identifier to form an authorization; transmitting said authorization to said workstation; reverse transforming said authorization using said unique workstation identifier to obtain the key corresponding to said feature-identifier; and using said key to unlock said selected data feature; whereby said key can only be used to access the selected data feature from a unique workstation-identifier. - View Dependent Claims (25, 26)
-
Specification