Secure non-invasive method and system for distribution of digital assets
First Claim
Patent Images
1. A system comprising:
- a processor; and
a memory storing instructions that when executed by the processor cause the processor to perform operations, the operations comprising;
receiving, at a client computer configured to execute one or more applications, a first file and a second file from a server computer, wherein the first file is at least partially encrypted;
receiving, at the client computer from the server computer, a first file manager specific to the first file and a second file manager specific to the second file;
receiving user input at the client computer; and
in response to the user input matching data stored in an encrypted user profile at the client computer, decrypting the first file using the first file manager based on a key stored in the encrypted user profile, wherein the first file manager selectively enables access, by the one or more applications, to the first file based on one or more first terms of usage, and wherein the second file manager selectively enables access, by the one or more applications, to the second file based on one or more second terms of usage.
9 Assignments
0 Petitions
Accused Products
Abstract
A client computer system receives a file that is at least partially encrypted. The client computer also receives a file manager and user input. In response to the user input matching data stored in an encrypted user profile, the client computer uses the file manager to decrypt the file based on a key stored in the encrypted user profile. The file is unusable if copied to another client computer, and the file manager manages usage of the file based on one or more terms of usage.
25 Citations
19 Claims
-
1. A system comprising:
-
a processor; and a memory storing instructions that when executed by the processor cause the processor to perform operations, the operations comprising; receiving, at a client computer configured to execute one or more applications, a first file and a second file from a server computer, wherein the first file is at least partially encrypted; receiving, at the client computer from the server computer, a first file manager specific to the first file and a second file manager specific to the second file; receiving user input at the client computer; and in response to the user input matching data stored in an encrypted user profile at the client computer, decrypting the first file using the first file manager based on a key stored in the encrypted user profile, wherein the first file manager selectively enables access, by the one or more applications, to the first file based on one or more first terms of usage, and wherein the second file manager selectively enables access, by the one or more applications, to the second file based on one or more second terms of usage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A client computer system comprising:
-
a processor; and a memory storing instructions that when executed by the processor cause the processor to perform operations, the operations comprising; receiving, at a client computer configured to execute one or more applications, a first file and a second file from a server computer, wherein the first file is at least partially encrypted; receiving, at the client computer from the server computer, a first file manager specific to the first file and a second file manager specific to the second file; receiving user input at the client computer; and in response to the user input matching data stored in an encrypted user profile at the client computer, decrypting the first file using the first file manager based on a key stored in the encrypted user profile, wherein the first file manager selectively enables access, by the one or more applications, to the first file based on one or more first terms of usage, and wherein the second file manager selectively enables access, by the one or more applications, to the second file based on one or more second terms of usage. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, at a server computer, a request for a digital content item from a client computer; outputting a downloader component from the server computer to the client computer, wherein the downloader component exclusively downloads files associated with the digital content item; outputting a first file associated with the digital content item to the downloader component at the client computer, wherein the first file is at least partially encrypted; and outputting a second file, a first file manager, a second file manager, and an encrypted user profile to the client computer, wherein the first file manager is configured to selectively enable access, by one or more applications executing at the client computer, to the first file and to decrypt the first file based on a key stored in the encrypted user profile in response to user input at the client computer matching data stored in the encrypted user profile, and wherein the second file manager is configured to selectively enable access, by the one or more applications executing at the client computer, to the second file based on one or more second terms of usage. - View Dependent Claims (16, 17, 18, 19)
-
Specification