×

Updating usage conditions in lieu of download digital rights management protected content

  • US 7,487,128 B2
  • Filed: 10/11/2005
  • Issued: 02/03/2009
  • Est. Priority Date: 08/13/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method on an end user system encoding watermarks with usage conditions of previously received encrypted digital content without receiving additional copies of the encrypted digital content, the method comprising:

  • sending to an electronic store a request from a user to acquire additional usage rights for encrypted digital content which has been previously received, wherein included with the encrypted digital content is;

    at least one usage right;

    a first watermark identifying a source of the encrypted digital content, wherein the first watermark includes transaction information and an identification of a clearing house which is separate from an identification of a store from which the encrypted digital content was purchased; and

    at least one watermarking instruction containing parameters and information for creating a second watermark on an end user system with transaction information to track each distribution of the encrypted digital content;

    receiving from the electronic store a hash value which uniquely identifies the encrypted digital content associated with the request to acquire additional usage rights for the encrypted digital content;

    comparing the hash value received from the electronic store with a previously stored hash value corresponding to the previously received encrypted digital content;

    updating the usage conditions associated with the encrypted digital content in response to the hash value received from the electronic store matching the previously stored hash value, wherein the watermarking instruction has been updated by a clearing house which is separate from a store from which the encrypted digital content was purchased;

    generating the second watermark, on the end user system, based upon the parameters and information in the watermarking instruction and the usage conditions which have been updated without re-receiving another copy of the encrypted digital content, wherein the generating the second watermark is performed in a tamper resistant environment so as to deter unauthorized access to the watermarking instruction;

    applying the second watermark to the encrypted digital content so as to overwrite the first watermark;

    decrypting the encrypted digital content with a first decrypting key; and

    reencrypting the digital content along with the second water mark with a second encryption key, wherein the second encrypting key is a symmetric key locally generated at the end user device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×