System for controlling the distribution and use of digital works using secure components
First Claim
1. A digital right management system, comprising:
- a secure component;
an interface between said secure component and a software application;
said secure component processes the requests coming from said software application through said interface;
said secure component validates signatures of one or more certificate documents to verify that said software application is compatible with said secure component;
in the case of verification of compatibility, said secure component allows operation of said software application; and
in the case of incompatibility, said secure component refuses to allow operation of said software application through said interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for controlling the distribution and use of digital works using digital tickets. In the present invention, a “digital ticket” is used to entitle the ticket holder to exercise some usage right with respect to a digital work. Usage rights are used to define how a digital work may be used or distributed. Each usage right may specify a digital ticket which must be present before the right may be exercised. Digital works are stored in repositories which enforce a digital works usage rights. Each repository has a “generic ticket agent” which punches tickets. In some instances only the generic ticket agent is necessary. In other instances, punching by a “special ticket agent” residing on another repository may be needed.
142 Citations
33 Claims
-
1. A digital right management system, comprising:
-
a secure component; an interface between said secure component and a software application; said secure component processes the requests coming from said software application through said interface; said secure component validates signatures of one or more certificate documents to verify that said software application is compatible with said secure component; in the case of verification of compatibility, said secure component allows operation of said software application; and in the case of incompatibility, said secure component refuses to allow operation of said software application through said interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification