Method and system for limiting the use of user-specific software features
First Claim
1. A method of enabling the use of a digital work on plural computing devices, said method comprising the acts of:
- receiving at an activation device, from a computing device, a request to enable the use of said digital work on said computing device, said request comprising first data indicative of a user, said digital work being associated with said user and requiring the presence of second data on said computing device in order to be used on said computing device, wherein said second data comprises;
a first cryptographic key, which enables use of said digital work; and
a second cryptographic key;
said first and second cryptographic keys are the private and public keys, respectively, of an asymmetric key pair;
said digital work comprises encrypted content and a decryption key which decrypts said encrypted content; and
at least a portion of said second data including said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said digital work in a form encrypted by said second cryptographic key;
determining by said activation device whether a user-specific limit associated with said user that limits the use of said digital work on said plural computing devices has been reached, wherein said limit comprises a restriction on the number of computing devices which said user may enable for use of said digital work; and
if said user-specific limit associated with said user has not been reached, then providing said second data from said activation device to said computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.
91 Citations
31 Claims
-
1. A method of enabling the use of a digital work on plural computing devices, said method comprising the acts of:
-
receiving at an activation device, from a computing device, a request to enable the use of said digital work on said computing device, said request comprising first data indicative of a user, said digital work being associated with said user and requiring the presence of second data on said computing device in order to be used on said computing device, wherein said second data comprises; a first cryptographic key, which enables use of said digital work; and
a second cryptographic key;said first and second cryptographic keys are the private and public keys, respectively, of an asymmetric key pair; said digital work comprises encrypted content and a decryption key which decrypts said encrypted content; and at least a portion of said second data including said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said digital work in a form encrypted by said second cryptographic key; determining by said activation device whether a user-specific limit associated with said user that limits the use of said digital work on said plural computing devices has been reached, wherein said limit comprises a restriction on the number of computing devices which said user may enable for use of said digital work; and if said user-specific limit associated with said user has not been reached, then providing said second data from said activation device to said computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more computer-readable media having executable instructions to perform a method of activating software installed on plural computing devices, said method comprising the acts of:
-
receiving at an activation device, from a first computing device, a first request to activate said software installed on said first computing device, said request comprising information indicative of a user and said request comprising; a first cryptographic key, which enables use of said software installed on said first computing device; and
a second cryptographic key;said first and second cryptographic keys are private and public keys, respectively, of an asymmetric key pair; said software installed on said first computing device comprises encrypted content and a decryption key which decrypts said encrypted content; and said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said software installed on said first computing device in a form encrypted by said second cryptographic key; said software having an activated state and a non-activated state, said software comprising content-rendering software, wherein said software renders a first class of digital works without regard to whether it is in the activated state, and wherein said software renders a second class of digital works only when it is in the activated state; determining by said activation device that a user-specific activation limit associated with said user that limits use of said software on said plural computing devices has not been reached; and based on said determination, providing first activation data from said activation device to said first computing device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of activating software on plural computing devices, said method comprising the acts of:
-
receiving at an activation device, from a first computing device, a first request to activate first software installed on said first computing device with respect to a first user, said first request comprising; a first cryptographic key, which enables use of said first software installed on said first computing device; and
a second cryptographic key;said first and second cryptographic keys are private and public keys, respectively, of an asymmetric key pair; said software installed on said first computing device comprises encrypted content and a decryption key which decrypts said encrypted content; and said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said software installed on said first computing device in a form encrypted by said second cryptographic key determining by said activation device that a user-specific activation limit associated with said first user that limits use of said software on said plural computing devices has not been reached; and based on said determination, activating said first software with respect to said first user;
wherein said first software renders at least a first class of digital works without regard to whether said first software has been activated, and a second class of digital works only if said first software has been activated with respect to said first user. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. One or more computer-readable media having executable instructions to perform a method enabling the use of an enhanced feature available on plural computing devices, said method comprising the acts of:
-
receiving at an activation device, from a first computing device, a first request to enable said enhanced feature on said first computing device said first request comprising; a first cryptographic key, which enables use of said enhanced feature; and
a second cryptographic key;said first and second cryptographic keys are private and public keys, respectively, of an asymmetric key pair; said enhanced feature comprises encrypted content and a decryption key which decrypts said encrypted content; and said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said enhanced feature in a form encrypted by said second cryptographic key; associating a user with the requested enhanced feature wherein said first request comprises information indicative of said user; associating a user-specific limit with said user that limits the use of said enhanced feature on said plural computing devices; determining by said activation device that a user-specific limit has not been reached; based on said determination, enabling the use of said enhanced feature on said first computing device; wherein said first computing device has at least some non-enhanced features usable regardless of whether said enhanced feature is enabled, and wherein said limit is selected from the group consisting of;
a restriction on the number of computing devices on which said enhanced feature may be enabled, and a restriction on the rate at which computing devices may be enabled to use said enhanced feature. - View Dependent Claims (30, 31)
-
Specification