Asynchronous communication within a server arrangement
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
H04L-009/32
G06F-003/00
G06F-015/16
출원번호
US-0604939
(2000-06-27)
발명자
/ 주소
DeMello,Marco A.
Zeman,Pavel
Krishnaswamy,Vinay
Malik,Prashant
Hughes,Kathryn E.
Byrum,Frank D.
출원인 / 주소
Microsoft Corporation
대리인 / 주소
Woodcock Washburn LLP
인용정보
피인용 횟수 :
38인용 특허 :
65
초록▼
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site. The fulfillme
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site. The fulfillment site includes an asynchronous fulfillment pipeline which logs information about processed transactions using a store-and-forward messaging service. The fulfillment site may be implemented as several server devices, each having a cache which stores frequently downloaded content items, in which case the asynchronous fulfillment pipeline may also be used to invalidate the cache if a change is made at one server that affects the cached content items.
대표청구항▼
What is claimed is: 1. A system for providing a content item, said system comprising: a plurality of download servers, wherein each download server receives a request for said content item, said request comprising encrypted data that represents a public key associated with a user from whom said req
What is claimed is: 1. A system for providing a content item, said system comprising: a plurality of download servers, wherein each download server receives a request for said content item, said request comprising encrypted data that represents a public key associated with a user from whom said request is received and an identification of said content item, said request having been generated at a first server with which said user has previously engaged in a transaction to purchase said content item, said encrypted data having been encrypted with a first key, each of said download servers having: a cache which stores said content item; and a first object which receives a first message to invalidate said content item in said cache and which invalidates said content item in said cache in response to receipt of said first message; and a fulfillment server having: a content store which stores said content item; and a first database which stores information relating to said content item; and a second object which receives a notification that said information in said first database has been updated or deleted, and which generates, in response to said notification, said first message for dispatch to said plurality of download servers, said first server being separate from said plurality of download servers and from said fulfillment server, said first key being known to said first server and to said plurality of download servers but not to said user, each of said plurality of download servers comprising logic that applies said first key to said encrypted data to retrieve said identification of said content item and said first key, and that uses said public key to encrypt a second key that is used to decrypt said content item, said content item being provided to said user in a form encrypted with said second key and including said second key in a form encrypted by said public key. 2. The system of claim 1, wherein said fulfillment server further includes a second database which stores a log of events occurring on said plurality of download servers, wherein each of said plurality of download servers generates a second message for dispatch to said fulfillment server in response to said events, and wherein said second object receives said second message and logs said events in said second database. 3. The system of claim 1, wherein said events include the downloading of said content item to said user who is a purchaser of said content item, said user having engaged in a purchase transaction with said first server, said first server including functionality to determine whether to generate said request or not to generate said request depending on whether the user has completed said purchase transaction. 4. The system of claim 1, wherein said content item is sold by a retailer for download by one of said plurality of download servers, and wherein said first database further stores information relating to said retailer. 5. The system of claim 4, wherein said plurality of download servers is hosted by said retailer. 6. The system of claim 1, wherein said user has previously obtained said public key by engaging in a transaction with a second server that distributes and installs public keys and their corresponding private keys on machines, said second server comprising logic that performs acts comprising: maintaining an association between said user, said public key, and a private key associated with said public key; receiving a request to install said public key and said private key on a machine; authenticating the user from whom the request is received as a condition to installing said public key and said private key on said machine; determining that a limit on the number of machines on which said user's public key and private key may be installed has not been exceeded as a further condition to installing said public key and said private key on said machine; and installing said public key and said private key on said machine by delivering a certificate that includes said public key and said private key with at least said private key being encrypted by a platform public key that is associated with, and relatively unique to, said machine. 7. The system of claim 1, wherein each of said first and second object is an instance of an MSMQ independent client. 8. A computer-implemented method of using a plurality of servers to distribute a content item, said method comprising the acts of: receiving, at a first of said plurality of servers from a first computing device, a request for said content item, said first server having a first cache; determining that no valid copy of said content item exists in said first cache; obtaining said content item at said first server from a content store; providing said content item to said first computing device; storing said content item in said first cache; receiving, at a fulfillment server, a change to an attribute of said content item, said attribute being stored at said fulfillment server; said fulfillment server sending a notification to said plurality of servers in response to said change; and said first server invalidating said copy of said content item in said first cache in response to said notification, each of said plurality of servers comprising logic that performs acts comprising: receiving, from a user, a request to provide said content item to a user, said request comprising a public key associated with said user and an identification of said content item, said public key and identification being in an form encrypted by a first key that is known to each of said plurality of servers and to a first server at which said request is generated but that is not known to said user, said public key being installed by an activation server on a plurality of machines associated with said user. 9. The computer-implemented method of claim 8, wherein said act of sending a notification comprises using a store-and-forward messaging facility. 10. The computer-implemented method of claim 8, wherein said change comprises a change in a physical location of said content item. 11. The computer-implemented method of claim 8, wherein said activation server enforces a limit as to the number of machines associated with said user on which said public key may be installed, said limit being initially set to a first number, and said limit being increasable beyond said first number if a standard that governs the increase in said limit has been met, said public key being installed on each of said users machines along with a private key corresponding to said public key in a manner so as to make an installation of said private key unusable if said installation of said private key is copied to a machine other than a machine on which said private key has been installed by said activation server. 12. The computer-implemented method of claim 8, wherein said content item comprises: encrypted content; and a first cryptographic key which decrypts said encrypted content. 13. The computer-implemented method of claim 12, wherein said content item further comprises meta-data, wherein said first cryptographic key is sealed with said meta-data. 14. The computer-implemented method of claim 12, wherein said encrypted content is stored in said cache separately from said first cryptographic key. 15. The computer-implemented method of claim 8, wherein said change comprises a change in the meta-data of said content item. 16. A computer-readable medium encoded with computer-executable instructions to perform a method of using a plurality of servers to distribute a content item, the method comprising: receiving, at a first of said plurality of servers from a first computing device, a request for said content item, said request being received from a user and having been generated at a server remote from said user, said request comprising an identification of a content item and a public key associated with said user, said request being in a form encrypted with a first cryptographic key that is known to said plurality of servers and to said server remote from said user, but that is not known to said user, said content item being encrypted in a form that is decryptable with said first cryptographic key, said first cryptographic key being included in said content item in a from encrypted with said public key, said first server having a first cache; determining that no valid copy of said content item exists in said first cache; obtaining said content item at said first server from a content store; providing said content item to said first computing device; storing said content item in said first cache; receiving, at a fulfillment server, a change to an attribute of said content item, said attribute being stored at said fulfillment server; said fulfillment server sending a notification to said plurality of servers in response to said change; and said first server invalidating said copy of said content item in said first cache in response to said notification. 17. The computer-readable medium of claim 16, wherein said act of sending a notification comprises using a store-and-forward messaging facility. 18. The computer-readable medium of claim 16, wherein said change comprises a change in a physical location of said content item. 19. The computer-readable medium of claim 16, wherein said change comprises a change in a level of protection to be applied to said content item. 20. The computer-readable medium of claim 16, wherein said content item comprises: encrypted content; and said first cryptographic key which decrypts said encrypted content. 21. The computer-readable medium of claim 20, wherein said content item further comprises meta-data, wherein said first cryptographic key is sealed with said meta-data. 22. The computer-readable medium of claim 20, wherein said encrypted content is stored in said cache separately from said first cryptographic key. 23. The computer-readable medium of claim 16, wherein said change comprises a change in the meta-data of said content item.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (65)
Rohatgi Pankaj (Sunnyvale CA) Dureau Vincent (Vemas CA), Apparatus and method for authenticating transmitting applications in an interactive TV system.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Dutta, Rabindranath, Incremental updates of items and prices on a customer's computer to reduce download times for frequently purchased items in e-commerce transactions in a method, system and program.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Khan Raheel Ahmed ; Burleson David Brent ; Filion John Thomas ; Cheek Donald Scott, Method and apparatus for a game delivery service including flash memory and a game back-up module.
Sachs James ; Pomeroy Thomas W. ; Novicov Aleksey ; Conboy Garth ; Walter Erik ; Leshner William S. ; Duga Brady ; Wotiz Richard, Method and apparatus for electronically distributing and viewing digital contents.
White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
Lambert, Mark L.; van der Rijn, Daniel J. G.; Kemper, David J.; Verkler, Jay L., Method and apparatus for storing and delivering documents on the internet.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Kenneth L. Nash, System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Ritchy, Robert; Bales, Christopher E.; Sauls, Skip; Mueller, Jeffrey; Dawe, Melissa; Pearson, Shane, System and method for utilizing a common framework for portal administration tools.
Yuen,Henry; Conboy,Garth; Duga,Brady; Fishkin,Ken; Gujar,Anuj; Leschner,Will; Rivlin,John; Tao,Zhen, Systems and methods for electronic off-line catalog.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.