×

Secure non-invasive method and system for distribution of digital assets

  • US 8,565,424 B2
  • Filed: 04/12/2006
  • Issued: 10/22/2013
  • Est. Priority Date: 04/12/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving, at a server computer system, a request for a first digital content item of a plurality of digital content items from a client computer;

    outputting, from the server computer system, a first downloader component to the client computer, wherein the first downloader component is unable to download files other than files associated with the first digital content item;

    after outputting the first downloader component, cooperating with the first downloader component to output a first encrypted file associated with the first digital content item to the client computer, wherein the first downloader component regulates partial encryptions of the first encrypted file so that at least a first portion of the first encrypted file is not encrypted and at least a second portion of the first encrypted file is encrypted, such that the first encrypted file is unusable if copied to another client computer; and

    outputting, from the server computer system, a first file manager and an encrypted user profile to the client computer, the first file manager configured to access the encrypted user profile to decrypt the first encrypted file and configured to manage usage of the first encrypted file at the client computer based on one or more terms of usage associated with the first encrypted file, wherein the encrypted user profile includes a first key to decrypt the first encrypted file into the first digital content item and at least one acceptable user input, wherein the first key is made available to the first file manager in response to receiving one or more user inputs at the client computer that match one or more acceptable user inputs of the at least one acceptable user input, and wherein the first file manager is further configured to automatically delete the first encrypted file upon determining that usage of the first encrypted file is disallowed based on a limitation of a number of uses of the first encrypted file,wherein the first downloader component, the first encrypted file, the first file manager, and the encrypted user profile enforce a usage right of the first digital content item without requiring installation to the client computer of proprietary plug-ins associated with the first digital content item.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×