Digital rights management using proximity testing
First Claim
Patent Images
1. A method for preventing unauthorized use of copyrighted digital information comprising the steps of:
- receiving a request for copyrighted digital information from a receiving device;
transmitting verification data from a source to the receiving device wherein the verification data comprises a secure source identifier;
receiving a reply message from the receiving device wherein the reply message comprises a secure confirmation of receipt for the verification data and a secure identifier of the receiving device;
determining an elapsed time between at least one of (a) the time of transmission of verification data and the time of receipt of the reply message, (b) the time of transmission of the verification data and a time of receipt of the verification data by the receiving device, or (c) a time of transmission of the reply message from the receiving device and a time of receipt of the reply message by the source; and
determining whether to transmit the copyrighted digital information to the receiving device, based at least in part on the elapsed time.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for preventing unauthorized use of copyrighted digital information includes transmitting verification data from a source to a receiving device. The verification data includes a secure source identifier. A reply message from the receiving device includes a secure confirmation of receipt for the verification data and a secure identifier of the receiving device. An elapsed time is determined between the time of transmission of verification data and the time of receipt of the reply message. Authorization to use or receive the digital content is based at least in part on the elapsed time.
82 Citations
30 Claims
-
1. A method for preventing unauthorized use of copyrighted digital information comprising the steps of:
-
receiving a request for copyrighted digital information from a receiving device;
transmitting verification data from a source to the receiving device wherein the verification data comprises a secure source identifier;
receiving a reply message from the receiving device wherein the reply message comprises a secure confirmation of receipt for the verification data and a secure identifier of the receiving device;
determining an elapsed time between at least one of (a) the time of transmission of verification data and the time of receipt of the reply message, (b) the time of transmission of the verification data and a time of receipt of the verification data by the receiving device, or (c) a time of transmission of the reply message from the receiving device and a time of receipt of the reply message by the source; and
determining whether to transmit the copyrighted digital information to the receiving device, based at least in part on the elapsed time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for preventing unauthorized use of copy-protected content, comprising:
-
a processor operable to execute program instructions;
a memory operably associated with the processor, the memory holding the program instructions comprising;
receiving a request for copyrighted digital information from a receiving device;
transmitting verification data from a source to the receiving device wherein the verification data comprises a secure source identifier;
receiving a reply message from the receiving device wherein the reply message comprises a secure confirmation of receipt for the verification data and a secure identifier of the receiving device;
determining an elapsed time between at least one of (a) the time of transmission of verification data and the time of receipt of the reply message, (b) the time of transmission of the verification data and a time of receipt of the verification data by the receiving device, or (c) a time of transmission of the reply message from the receiving device and a time of receipt of the reply message by the source; and
determining whether to transmit the copyrighted digital information to the receiving device, based at least in part on the elapsed time. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification