Super-distribution of protected digital content
First Claim
1. A computer-implemented method for surer-distribution of digital content from a first end-user of the digital content to a second end-user of the digital content, the method comprising:
- receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and
receiving authorization from an authorization authority, by the second end-user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein the authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content.
0 Assignments
0 Petitions
Accused Products
Abstract
Super distribution of protected digital content is disclosed. According to one embodiment of the invention previously purchased encrypted digital content is received from a purchaser of the digital content. The purchaser of the previously purchased encrypted digital content is different from the recipient of the encrypted digital content. A secure transmission is established with an authorization authority for decrypting the content. A first decryption key for decrypting at least part of the previously purchased encrypted content as permitted by the authorization authority is received from the authorization authority. The at least part of the previously purchased encrypted content is decrypted as permitted by the authorization authority.
119 Citations
20 Claims
-
1. A computer-implemented method for surer-distribution of digital content from a first end-user of the digital content to a second end-user of the digital content, the method comprising:
-
receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and receiving authorization from an authorization authority, by the second end-user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein the authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. The computer implemented method 1, further comprising:
-
determining that super-distribution is allowed by at least one usage condition in the encrypted digital content; and automatically contacting an authority to obtain a license and a decryption key.
-
-
10. A computer readable storage medium containing programming instructions for execution by a processor, the programming instructions comprising:
-
receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and receiving authorization from an authorization authority, by the second end-user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein an authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An information processing system comprising:
a network interface coupled to a player application running on the information processing system for performing; receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and receiving authorization from an authorization authority, by the second end- user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein the authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content. - View Dependent Claims (20)
Specification