Controlling and managing digital assets
First Claim
1. A method for managing digital rights of software on a computer system, comprising:
- encrypting at least a portion of an executable file to generate an encrypted executable file;
writing the encrypted executable file to a host location on the computer system during installation of software including the encrypted executable file; and
providing a loader for the encrypted executable file wherein the loader is operable to authenticate the encrypted executable file and cause the encrypted executable file to run on the computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling and managing digital assets. These systems and techniques are particularly useful when digital assets are transmitted electronically using, for example, the Internet, as these techniques serve to make the Internet secure for communication and control of digital assets. In addition, they permit dynamic control and management of digital assets, regardless of where the assets reside. Use of these systems and techniques promises to enable new, Internet-based distribution models, and to provide superior insight with respect to the use and status of digital assets. Particular implementations of the systems and techniques permit features such as lifetime control of digital content, multi-level control of digital content (including session encryption, asset encryption, and remote management), and try-before-you buy marketing approaches. They also support functions such as digital rights transfer, tracking, segmentation, archiving, and improved handling of upgrades and updates.
354 Citations
75 Claims
-
1. A method for managing digital rights of software on a computer system, comprising:
-
encrypting at least a portion of an executable file to generate an encrypted executable file;
writing the encrypted executable file to a host location on the computer system during installation of software including the encrypted executable file; and
providing a loader for the encrypted executable file wherein the loader is operable to authenticate the encrypted executable file and cause the encrypted executable file to run on the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for managing digital rights of software, comprising:
-
a computer including a communication device operable to communicate, via a communication pathway, with other electronic devices that are remote from the computer;
a remote authentication device in communication with the communication device via the communication pathway; and
software operable to be installed and run on the computer wherein the software comprises;
an executable file, and an authentication loader program operable to authenticate and enable running of the executable file, wherein the software is structured and arranged such that installation of the software is accomplished based on whether the remote authentication device permits the software to be installed on the computer, and running of the software is accomplished based on whether the authentication loader program permits the software to be run on the computer. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A method for managing digital rights during installation of software on a computer system, comprising:
accessing a digital rights database to determine whether the software is permitted to be installed on the computer system wherein an installation program performs the following based on whether the software is permitted to be installed on the computer system;
encrypting at least a portion of an executable file to produce an encrypted executable file;
appending a loader to the encrypted executable file; and
writing the loader and the encrypted executable file to a host storage location on the computer system. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
Specification