Security-activated operational components
First Claim
Patent Images
1. A method for securely controlling an operational component, comprising:
- receiving, via a computing device, an object data file specifying one or more operational component functions for at least one of creating, producing, duplicating, processing or testing one or more objects and including an authorization code associated with digital rights management of the object data file;
retrieving, via a computing device, the authorization code from the object data file;
verifying, via a computing device, compliance of the authorization code with one or more predetermined conditions,wherein the verifying occurs at least partially prior to at least one of creating, producing, duplicating, processing or testing one or more objects as specified by the object data file; and
controlling, via a controller device, the operational component at least partially in response to a verification of compliance of the authorization code with the one or more predetermined conditions.
4 Assignments
0 Petitions
Accused Products
Abstract
Various methods and systems include exemplary implementations for a security-activated operational component. Possible embodiments include but are not limited to obtaining access to an object data file configured to implement various functional operation regarding one or more objects; verifying validity of an authorization code associated with the object data file; and controlling operation of the operational component to enable or prevent its activation pursuant to the authorization code in accordance with one or more predetermined conditions.
203 Citations
47 Claims
-
1. A method for securely controlling an operational component, comprising:
-
receiving, via a computing device, an object data file specifying one or more operational component functions for at least one of creating, producing, duplicating, processing or testing one or more objects and including an authorization code associated with digital rights management of the object data file; retrieving, via a computing device, the authorization code from the object data file; verifying, via a computing device, compliance of the authorization code with one or more predetermined conditions, wherein the verifying occurs at least partially prior to at least one of creating, producing, duplicating, processing or testing one or more objects as specified by the object data file; and controlling, via a controller device, the operational component at least partially in response to a verification of compliance of the authorization code with the one or more predetermined conditions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising a non-transitory computer readable medium configured to perform one or more acts for securely controlling an operational component, the one or more acts comprising:
-
one or more instructions for receiving an object data file specifying one or more operational component functions for at least one of creating, producing, duplicating, processing or testing one or more objects and including an authorization code associated with digital rights management of the object data file; one or more instructions for retrieving, via a computing device, the authorization code from the object data file; one or more instructions for verifying compliance of the authorization code with one or more predetermined conditions, wherein the verifying occurs at least partially prior to at least one of creating, producing, duplicating, processing or testing one or more objects as specified by the object data file; and one or more instructions for controlling the operational component at least partially in response to a verification of compliance of the authorization code with the one or more predetermined conditions. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A security system for one or more operational components comprising:
-
means for receiving an object data file specifying one or more operational component functions for at least one of creating, producing, duplicating, processing or testing one or more objects and including an authorization code associated with digital rights management of the object data file; means for retrieving the authorization code from the object data file; means for verifying compliance of the authorization code associated with an object data file with one or more predetermined conditions, wherein the verifying occurs prior to at least one of creating, producing, duplicating, processing or testing the one or more objects as specified by the object data file; means for controlling the operational component at least partially in response to a verification of compliance of the authorization code with the one or more predetermined conditions. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification