Separate authentication processes to secure content
First Claim
Patent Images
1. A method including:
- associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user; and
associating a second authentication process with the content, the second authentication process to protect the content from access by an unauthorized device,wherein the first authentication process and the second authentication process comprise separate and distinct authentication processes thereby enabling an authorized user to access the content on an authorized device and preventing the authorized user from accessing the content on the unauthorized device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user. A second authentication process is also associated with the content, the second authentication process to protect the content from access by an unauthorized device. The first authentication process and the second authentication process are separate and distinct authentication processes. This enables an authorized user to access the content on an authorized device and prevents the authorized user from accessing the content on the unauthorized device.
103 Citations
40 Claims
-
1. A method including:
-
associating a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user; and associating a second authentication process with the content, the second authentication process to protect the content from access by an unauthorized device, wherein the first authentication process and the second authentication process comprise separate and distinct authentication processes thereby enabling an authorized user to access the content on an authorized device and preventing the authorized user from accessing the content on the unauthorized device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system including:
-
a user device; a copy-protected device; and a content distributor, coupled via a network to both the user and copy-protected devices, to perform a first process to protect the content from access by an unauthorized user and a second process to protect the content from access by an unauthorized device with respect to content, wherein the first process and the second process comprise separate and distinct processes thereby enabling an authorized user device to access the content on the copy-protected device if the copy-protected device is authorized. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system including:
-
a user means; a copy-protected means; and a content distributor means, coupled via a network to both the user and copy-protected means, to perform a first process to protect the content from access by an unauthorized user means and a second to protect the content from access by an unauthorized device process with respect to the content, wherein the first process and the second process comprise separate and distinct authentication processes thereby enabling an authorized user means to access the content on the copy-protected means, if the copy-protected means is authorized.
-
-
40. A machine readable storage medium storing a sequence of instructions that, when executed by a machine, cause the machine to:
-
associate a first authentication process with content, the first authentication process to protect the content from access by an unauthorized user; and associate a second authentication process with the content, the second authentication process to protect the content from access by an unauthorized device, wherein the first authentication process and the second authentication process comprise separate and distinct authentication processes thereby enabling an authorized user to access the content on an authorized device and preventing the authorized user from accessing the content on the unauthorized device.
-
Specification