METHOD AND SYSTEM FOR VERIFYING ENTITLEMENT TO ACCESS CONTENT BY URL VALIDATION
First Claim
1. A method for controlling access to unsecured digital content available made available over electronic networks comprising the steps of:
- transacting with a user in a transaction system for purchase of rights to digital content to be delivered over an electronic network;
entitling the user to exercise the purchased rights to the digital content by storing a record of the transaction in a computer readable medium in operative communication with the transaction system;
authorizing the user to exercise the rights by creating a URL to be used by the user for accessing the digital content, the URL comprising an encrypted string, the encrypted string representing, upon decryption, unique transaction identifier information and rights information representative of the rights to which the user is entitled;
providing access to the URL at a user device;
receiving a request to exercise the purchased rights, indicated by access to the URL from the user device;
parsing the URL to obtain the encrypted string;
decrypting the encrypted string;
validating the requested exercise of rights using the rights information from the encrypted string; and
responsive to successful validation, providing access to the digital content identified by the URL.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects include a mechanism of entitling users to transacted-for digital content access, indicating download authorization with discrete authentication URLs, and validating download attempts using each such URL. The authentication mechanism comprises producing an encrypted string included in a URL provided to a user. The encrypted string comprises transaction identifier information, and information about the transacted-for entitlement. When a user wishes to exercise the transacted-for entitlement, the user activates the URL, which is resolved to a location that has/can obtain access to the key(s) used in producing the encrypted string, decrypt the string, and use the information in it to validate the URL and the entitlement. The validation can use data retrieved from a database, using the transaction identifier as a key. The entitlement information included in the now-decrypted string can be compared with the prior download information. A byte range of requested by a browser using the URL can be used in validation, as well as how a particular authorization/validation should count for entitlement fulfillment.
57 Citations
20 Claims
-
1. A method for controlling access to unsecured digital content available made available over electronic networks comprising the steps of:
-
transacting with a user in a transaction system for purchase of rights to digital content to be delivered over an electronic network; entitling the user to exercise the purchased rights to the digital content by storing a record of the transaction in a computer readable medium in operative communication with the transaction system; authorizing the user to exercise the rights by creating a URL to be used by the user for accessing the digital content, the URL comprising an encrypted string, the encrypted string representing, upon decryption, unique transaction identifier information and rights information representative of the rights to which the user is entitled; providing access to the URL at a user device; receiving a request to exercise the purchased rights, indicated by access to the URL from the user device; parsing the URL to obtain the encrypted string; decrypting the encrypted string; validating the requested exercise of rights using the rights information from the encrypted string; and responsive to successful validation, providing access to the digital content identified by the URL. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An article of manufacture comprising a computer readable medium storing data structures representative of computer executable instructions that when executed on a processor cause the processor to perform a method comprising the steps of:
-
transacting with a user for purchase of rights to digital content to be delivered over an electronic network; entitling the user to exercise the purchased rights to the digital content by storing a record of the transaction in a computer readable medium in operative communication with the transaction system; creating a URL to be used by the user for accessing the digital content, the URL comprising an encrypted bitstring, decryptable using a predetermined key into data representative of a unique transaction identifier and rights information representative of the rights to which the user is entitled; providing access to the URL at a user device; accepting a request to exercise the purchased rights, indicated by access to the URL from the user device; parsing the URL to obtain the encrypted string; decrypting the encrypted string with the predetermined key; validating the requested exercise of rights using the rights information from the decrypted bitstring; and responsive to successful validation, providing access to the digital content identified by the URL, and updating the prior usage information in the record. - View Dependent Claims (16, 17)
-
-
18. A system for controlling access to digital content made available over an electronic network comprising:
one or more processing resources configured to execute elements of functional modules described by computer readable instructions obtained from data structures on a computer readable medium, the modules comprising a rights entitlement module configured for completing a transaction with a user for entitlement to access an item of content and for recording an indication of such entitlement on a computer readable medium; an authorization module responsive to a request to exercise the entitlement by generating a URL comprising an encrypted portion, the encrypted portion encoding an identifier for the transaction; and a validation module configured for receiving the URL, parsing the URL to obtain the encrypted portion, decrypted the encrypted portion and using at least the identifier for the transaction to determine whether access to the item of content is to be provided to the user. - View Dependent Claims (19, 20)
Specification