System and method for providing digital content
First Claim
Patent Images
1. A method comprising:
- receiving, from a first device, information acquired from a key;
verifying, by a computing device, that the information meets an encryption strength requirement and a market area requirement;
causing, by the computing device, an option to be selectable at a second device in response to verifying that the information meets the encryption strength requirement and the market area requirement; and
delivering, to the second device, content in response to receiving a selection of the option.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing access to content based upon one or more adequately-credentialed keys being proximate to a certain location. The method includes a first step of acquiring credential information from at least one key tagged with credential information using a credential acquisition device (CAD) at the certain location. The method also includes a second step of confirming that the credential information meets requirements for receiving the content. Further, the method includes a step of providing access to the content after performing the first and second steps.
90 Citations
20 Claims
-
1. A method comprising:
-
receiving, from a first device, information acquired from a key; verifying, by a computing device, that the information meets an encryption strength requirement and a market area requirement; causing, by the computing device, an option to be selectable at a second device in response to verifying that the information meets the encryption strength requirement and the market area requirement; and delivering, to the second device, content in response to receiving a selection of the option. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, via first device, information from a key; verifying, by a computing device, that the information meets an encryption strength requirement and is received within a particular time range; causing, by the computing device, an option to be selectable at a second device in response to verifying that the information meets the encryption strength requirement and is received within the particular time range; and transmitting content to the second device associated with the first device in response to receiving a selection of the option. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, via a first device, information from a first key; verifying, by a computing device, that the information meets an encryption strength requirement and is received within a particular time range; causing, by the computing device, a video-on-demand selection to be accessible at a second device in response to verifying that the information meets the encryption strength requirement and is received within the particular time range; and transmitting content to the second device in response to receiving a selection of the video-on-demand selection. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification