Systems and methods for managing and protecting electronic content and applications
First Claim
1. A method for managing the use of protected electronic content by a rights management application executing on a computing device, the method comprising:
- receiving, from a first application executing on the computing device, by a second application executing on the computing device, a request to use the protected electronic content and a first credential associated with the first application;
receiving, from the second application executing on the computing device by the rights management application, the request to use the protected content and a second credential associated with the second application;
validating, by the rights management application, the second credential;
sending, by the rights management application based on validating the second credential, the protected electronic content to the second application;
validating, by the second application, the first credential; and
sending, by the second application based on validating the first credential, the protected electronic content to the first application for use in accordance with the request.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content'"'"'s possession of a credential from a first entity, while the content may condition access upon the application'"'"'s possession of a credential from a second entity and/or the user'"'"'s possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.
79 Citations
20 Claims
-
1. A method for managing the use of protected electronic content by a rights management application executing on a computing device, the method comprising:
-
receiving, from a first application executing on the computing device, by a second application executing on the computing device, a request to use the protected electronic content and a first credential associated with the first application; receiving, from the second application executing on the computing device by the rights management application, the request to use the protected content and a second credential associated with the second application; validating, by the rights management application, the second credential; sending, by the rights management application based on validating the second credential, the protected electronic content to the second application; validating, by the second application, the first credential; and sending, by the second application based on validating the first credential, the protected electronic content to the first application for use in accordance with the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium storing instructions that, when executing by a processor of a computing system, are configured to cause the processor to:
-
receive, from a first application executing on the computing system by a second application executing on the computing system, a request to use a piece of electronic content managed by a rights management application executing on the computing system and first credential associated with the first application; receive, from the second application executing on the computing device by the rights management application, the request to use the protected content and a second credential associated with the second application; validate, by the rights management application, the second credential; send, by the rights management application based on validating the second credential, the protected electronic content to the second application; validate, by the second application, the first credential; and send, by the second application based on validating the first credential, the protected electronic content to the first application for use in accordance with the request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification