Method and system for preventing capture of electronic digital content
First Claim
Patent Images
1. A computer-implemented method of protecting content, the method comprising:
- presenting an indicator that differs from the content and indicates a presence of the content;
preventing a user from perceiving the content while the indicator is being presented;
receiving a request from the user to access the content;
enabling the user to perceive the content based on the request received from the user; and
preventing the user from capturing the content and preventing a perception of the content at the indicator whenever the user attempts to capture the content.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method of protecting content includes receiving a request from a user to access the content. The user is enabled to perceive the content based on the request received from the user. The user is prevented from capturing the content when perception of the content is enabled. The method may be performed by a Java applet running in a network environment.
39 Citations
85 Claims
-
1. A computer-implemented method of protecting content, the method comprising:
-
presenting an indicator that differs from the content and indicates a presence of the content; preventing a user from perceiving the content while the indicator is being presented; receiving a request from the user to access the content; enabling the user to perceive the content based on the request received from the user; and preventing the user from capturing the content and preventing a perception of the content at the indicator whenever the user attempts to capture the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 73, 74, 83)
-
-
22. A system for protecting content, the system comprising:
-
a processor having communications links for receiving content from a network; an output device for making received network content perceivable; an input device for receiving user input; and memory storing software instructions performed by the processor (i) for presenting an indicator that differs from the content and indicates a presence of the content, (ii) for preventing a user from perceiving the content while the indicator is being presented, (iii) for receiving a request from the user to access the content, (iv) for enabling the user to perceive the content based on the request received from the user, and (v) for preventing the user from capturing the content and preventing a perception of the content at the indicator whenever the user attempts to capture the content. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 75, 76, 84)
-
-
40. Computer software, tangibly embodied in a computer-readable medium for causing a computer system to perform the following operations, the software comprising:
-
a first code segment to generate an indicator that differs from the content and indicates a presence of the content; a second code segment to prevent a user from perceiving the content while the indicator is being presented; a third code segment to enable receipt of a request from the user to access the content; a fourth code segment to enable perception of the content based on the request received from the user; and a fifth code segment to prevent capturing of the content by the user and to prevent a perception of the content at the indicator whenever the user attempts to capture the content. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 77, 78, 85)
-
-
49. A computer-implemented method of protecting content, the method comprising:
-
presenting a visible indicator that differs from the content, and indicates a presence of the content; preventing a user from perceiving the content while the visible indicator is being presented; enabling a user to perceive the content while the visible indicator is selected; receiving a request from the user to capture the content; and preventing the user from capturing the content and preventing a perception of the content whenever the user attempts to capture the content. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 79, 80)
-
-
61. A system for protecting content, the system comprising:
-
a processor having communications links for receiving content from a network; an output device for making received network content perceivable; an input device for receiving user input; and memory storing software instructions performed by the processor (i) for presenting a visible indicator that differs from the content and indicates a presence of the content, (ii) for preventing a user from perceiving the content while the visible indicator is being presented, (iii) for enabling a user to perceive the content while the visible indicator is selected, (iv) for receiving a request from the user to access the content, and (v) for preventing the user from capturing the content and preventing a perception of the content whenever the user attempts to capture the content. - View Dependent Claims (62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 81, 82)
-
Specification