Repository with security class and method for use thereof
First Claim
1. In a system having a server and at least one repository, a method for accessing digital works in accordance with usage rights associated with the digital works, the method comprising:
- receiving by a server a request from a repository to access a digital work in accordance with usage rights associated with the digital work, the usage rights specifying a manner of access and indicating a security class of the repository, and identifying the repository as a repository authorized for the requested access;
determining by the server a security level of the repository; and
if the security level of the repository corresponds to the security class specified in the usage rights associated with the digital work, granting by the server the request and permitting exercise of the manner of access specified in the usage rights associated with the digital work in accordance with the usage rights,wherein the security class indicates a security level of the repository and the usage rights are expressed with a grammar including one or more symbols selected from a set of predetermined symbols to define respective valid sequences of symbols to indicate the manner of access, and the security class,an authorization object is used for identification of the repository,the physical integrity of the repository is secured,the repository and the server communicate with a transmission transaction protocol,network connectivity between the server and the repository is with the transmission transaction protocol,the granting step includes permitting the repository to access the digital work only through the transmission transaction protocol, andthe transmission transaction protocol provides no time at which a communication connection between the repository and the server can be broken in a manner which will permit unauthorized use of the digital work by the repository.
2 Assignments
0 Petitions
Accused Products
Abstract
A trusted system having at least one repository for controlling use of digital works in accordance with usage rights associated with the digital works. The system comprises means for receiving a request to access a digital work in accordance with usage rights associated with the digital work, the usage rights specifying a manner of access and indicating a security class, means for determining a security level of a repository controlling the requested access, and means for granting the request and permitting exercise of the manner of access specified in the usage rights associated with the digital work in accordance with the usage rights if the security level of the repository corresponds to the security class specified in the usage rights associated with the digital work. The security class indicates a security level of a repository that can access the digital work, and the usage rights are expressed with a grammar. In addition, an authorization object is used for identification of the repository, the physical integrity of the repository is secured, and digital works are accessed only through a transmission transaction protocol.
-
Citations
45 Claims
-
1. In a system having a server and at least one repository, a method for accessing digital works in accordance with usage rights associated with the digital works, the method comprising:
-
receiving by a server a request from a repository to access a digital work in accordance with usage rights associated with the digital work, the usage rights specifying a manner of access and indicating a security class of the repository, and identifying the repository as a repository authorized for the requested access; determining by the server a security level of the repository; and if the security level of the repository corresponds to the security class specified in the usage rights associated with the digital work, granting by the server the request and permitting exercise of the manner of access specified in the usage rights associated with the digital work in accordance with the usage rights, wherein the security class indicates a security level of the repository and the usage rights are expressed with a grammar including one or more symbols selected from a set of predetermined symbols to define respective valid sequences of symbols to indicate the manner of access, and the security class, an authorization object is used for identification of the repository, the physical integrity of the repository is secured, the repository and the server communicate with a transmission transaction protocol, network connectivity between the server and the repository is with the transmission transaction protocol, the granting step includes permitting the repository to access the digital work only through the transmission transaction protocol, and the transmission transaction protocol provides no time at which a communication connection between the repository and the server can be broken in a manner which will permit unauthorized use of the digital work by the repository. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system having at least one repository accessing digital works in accordance with usage rights associated with the digital works, the system comprising:
-
means for receiving a request from a repository to access a digital work in accordance with usage rights associated with the digital work, the usage rights specifying a manner of access and indicating a security class of the repository, and identifying the repository as a repository authorized for the requested access; means for determining a security level of the repository; and means for granting the request and permitting exercise of the manner of access specified in the usage rights associated with the digital work in accordance with the usage rights if the security level of the repository corresponds to the security class specified in the usage rights associated with the digital work, wherein the security class indicates a security level of the repository and the usage rights are expressed with a grammar including one or more symbols selected from a set of predetermined symbols to define respective valid sequences of symbols to indicate the manner of access, and the security class, an authorization object is used for identification of the repository, the physical integrity of the repository is secured, communications with the repository are with a transmission transaction protocol, network connectivity with the repository is with the transmission transaction protocol, the repository is permitted access to the digital work only through the transmission transaction protocol, and the transmission transaction protocol provides no time at which a communication connection can be broken in a manner which will permit unauthorized use of the digital work by the repository. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification