A method, system and software for permitting use of digital works having rights associated therewith within a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifyi
A method, system and software for permitting use of digital works having rights associated therewith within a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifying that the digital work is transferred from a first repository to a second repository; transferring the digital work from the first repository to the second repository in accordance with the transfer right; and in response to the transferring, step updating transfer right information in respect of the digital work.
대표청구항▼
What is claimed is: 1. A method for permitting use of digital works, the digital works having one or more rights associated therewith, within a system having repositories configured to enable use of the digital works in accordance with the one or more rights, the method comprising: electronically a
What is claimed is: 1. A method for permitting use of digital works, the digital works having one or more rights associated therewith, within a system having repositories configured to enable use of the digital works in accordance with the one or more rights, the method comprising: electronically associating a transfer right with a digital work, the transfer right specifying that the digital work is permitted to be transferred from a first repository to a second repository, wherein the transfer right is created from a grammar including one or more symbols selected from a set of predetermined symbols to define a valid sequence of symbols to indicate how the digital work is transferred, wherein at least one of the symbols included in the grammar represents a constraint on how the digital work may be transferred; electronically transferring the digital work from the first repository to the second repository in accordance with the transfer right; in response to the transferring step, electronically updating transfer right information in respect of the digital work; and electronically associating a usage right with the digital work transferred from the first repository to the second repository, the usage right specifying that the digital work is permitted to be used in a specific manner, wherein the first repository includes at least a server mode of operation, the server mode of operation being configured for processing a transfer request message received from the second repository, and the second repository includes both a requester mode of operation and a server mode of operation, the requester mode of operation being configured for sending to the first repository a transfer request message specifying a digital work and the server mode of operation being configured for processing a use request message for using the digital work transferred from the first repository in accordance with the usage right associated with the transferred digital work. 2. The method of claim 1, further comprising limiting use of the digital work by the first repository after the transferring step. 3. The method of claim 1, wherein the transfer right specifies a number of times the digital work is permitted to be transferred. 4. The method of claim 3, wherein the updating step comprises decrementing the number of times the digital work is permitted to be transferred in response to a transfer of the digital work. 5. The method of claim 1, wherein the transfer right enables use of the digital work as permitted by copyright laws. 6. The method of claim 1, wherein original rights are associated with the digital work and wherein the transferring step comprises transferring the original rights from a first party to a second party. 7. The method of claim 6, wherein the original rights specify a principal who is entitled to exercise usage rights, and wherein the transferring step comprises changing the principal of the original rights from the first party to the second party. 8. The method of claim 6, wherein the transferring step comprises transferring a next set of rights associated with the digital work to the second party. 9. The method of claim 2, wherein the limiting step further comprises disabling a party from using the digital work from the first repository. 10. The method of claim 2, wherein the limiting step further comprises erasing the digital work from the first repository. 11. The method of claim 1, further comprising reporting a fee transaction in response to the transferring step. 12. The method of claim 1, further comprising updating rights information associated with the digital work to reflect the transferring step. 13. The method of claim 1, wherein the transfer right is stored on the same physical device as the associated digital work. 14. The method of claim 1, wherein the transfer right and the associated digital work are stored on different physical devices. 15. The method of claim 1, wherein the digital work is a music work. 16. The method of claim 1, wherein the digital work is a video work. 17. The method of claim 1, wherein the digital work is a multimedia work. 18. The method of claim 1, wherein the digital work is a composite digital work. 19. The method of claim 1, wherein the digital work is software. 20. The method of claim 6, wherein the digital work is software and the original rights specify how the digital work is executed. 21. The method of claim 6, wherein the digital work is software and the original rights specify how the digital work is installed. 22. The method of claim 6, wherein the digital work is software and the original rights specify how the digital work is uninstalled. 23. A method for permitting use of digital works within a system comprising at least one repository configured to permit the use of the digital works in accordance with one or more rights, the method comprising: electronically associating rights with a digital work, the rights specifying a manner of use indicating one or more purposes for which the digital work is used and wherein at least one of the rights specifies a use to which an authorized requester is entitled pursuant to applicable law, wherein the rights are created from a grammar including one or more symbols selected from a set of predetermined symbols to define a valid sequence of symbols to indicate how the digital work is used, wherein at least one of the symbols included in the grammar represents a constraint on how the digital work may be transferred; receiving from a requester a request to access the digital work; and processing the request to determine if access is granted, the access being granted if the request is permitted by the rights associated with the digital work. 24. The method of claim 23, further comprising making a copy of the digital work if the access is granted, the copy of the digital work having a next set of rights associated therewith. 25. The method of claim 24, wherein the next set of rights does not include a copy right. 26. The method of claim 24, further comprising reporting a fee transaction in response to making a copy of the digital work. 27. The method of claim 24, further comprising updating rights information associated with the digital work to reflect the step of making a copy of the digital work. 28. The method of claim 24, wherein the copy right is stored on the same physical device as the associated digital work. 29. The method of claim 24, wherein the copy right and the associated digital work are stored on different physical devices. 30. The method of claim 23, wherein the digital work is a music work. 31. The method of claim 23, wherein the digital work is a video work. 32. The method of claim 23, wherein the digital work is a multimedia work. 33. The method of claim 23, wherein the digital work is a composite digital work. 34. The method of claim 23, wherein the digital work is software. 35. The method of claim 24, wherein the digital work is software and the next set of rights specify how the digital work is executed. 36. The method of claim 24, wherein the digital work is software and the next set of rights specify how the digital work is installed. 37. The method of claim 24, wherein the digital work is software and the next set of rights specify how the digital work is uninstalled. 38. The method of claim 24, wherein the copy right is a right to make a backup copy and the next set of rights includes a right to restore the backup copy if the digital work is rendered unusable. 39. The method of claim 38, further comprising restoring the backup copy. 40. The method of claim 23, wherein at least one of the rights is a copy right. 41. The method of claim 23, wherein at least one of the rights is an edit right. 42. The method of claim 23, wherein at least one of the rights is a backup right. 43. The method of claim 23, wherein at least one of the rights is a distribution right. 44. The method of claim 1, wherein the digital work includes a content file. 45. The method of claim 23, wherein the digital work includes a content file.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (212)
Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
Beetcher Robert Carl ; Corrigan Michael Joseph ; Reardon ; Jr. Francis Joseph ; Moran James William, Apparatus and method for controlling access to software.
Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
Barnes Vera L. (Wayne PA) Dodds ; Jr. Thomas J. (Drexel Hill PA) Gibson Harold F. (Downington PA) Campbell ; Jr. Carl M. (Newtown Square PA), Communications line authentication device.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus for creating and using program authorization information data structures.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA), Conditional object creating system having different object pointers for accessing a set of data structure objects.
Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Controlled dissemination of digital information.
Downer Robert R. (Medfield MA) Noonan Richard C. (Belmont MA) Dalke David M. (Marlborough MA), Controlling machine operation with respect to consumable accessory units.
Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
Akiyama Ryota,JPX ; Hasebe Takayuki,JPX ; Yoshioka Makoto,JPX, Information distribution system wherein storage medium storing ciphered information is distributed.
Okano Hirokazu (1-8-6 ; Kurakake Asakita-Ku ; Hiroshima-shi ; Hiroshima JPX), Information processing system using error-correcting codes and cryptography.
Lessin Arlen R. (New York NY) Gruppuso Frank M. (Commack NY) Harrison Shelley A. (Dix Hills NY), Intelligent portable interactive personal data system.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Johnson Donavon W. (Georgetown TX) Morgan Stephen P. (Mahopac NY) Smith Todd A. (Austin TX), Maintenance of file attributes in a distributed data processing system.
Musyck Emile P. (Geel BEX) Binard Luc A. (Mol BEX) Coupe Bernard G. (Tournai BEX), Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereo.
Hamilton Jeffrey S. (Doylestown PA) Kauffman Marc (Ft. Washington PA) Vince Lawrence D. (Lansdale PA), Method and apparatus for controlling access to digital signals.
Cichelli Richard J. (Allentown PA) Thompson Michael O. (Bethlehem PA), Method and apparatus for digital serial scanning with hierarchical and relational access.
Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
Cooper Thomas E. (Louisville CO) Nagda Jagdish (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted file.
Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
Vigarie Jean-Pierre,FRX, Method and equipment for allocating to a television program, which is already conditionally accessed, a complementary conditional access.
Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
Griffeth Nancy D. (Westfield NJ) Velthuijsen Hugo (Den Haag NLX), Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure cryptographic operations using control vectors generated inside a cryptographic facility.
Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Hartrick Thomas V. (Gaithersburg MD) Higgins Patricia E. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Structured document tags invoking specialized functions.
Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shelton William Anthony ; Healy William R. ; Jones Joseph Francis Earl ; Issac Samuel, System for collecting and presenting real-time weather information on multiple media.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Asip William F. (340 E. 52nd St. New York NY 10022) Bartha Miklos L. (11 Meade Ave. Passaic NJ 07055), System for remote monitoring and data transmission over non-dedicated telephone lines.
Volk Larry N. (3320 Royce Ct. Las Vegas NV), System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expir.
Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Aldous Stephen C. (Salt Lake City UT) Dake Guy M. (Sandy UT), Systems for connection of physical/electrical media connectors to computer communications cards.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Pavlov Leonidas P. (Colorado Springs CO) Aba-Jbara Nabil M. (Colorado Springs CO), Unitary, self-contained card verification and validation system and method.
Abraham Dennis G. (Concord NC) Henningsmeyer Daniela (Stuttgart VA DEX) Hudson John M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Stevens Jam, User defined function facility.
Cohen Jason M. (20 Skookwams Ct. West Islip NY 11795), Video communications system having a remotely controlled central source of video and audio data.
Phipps, Jason N.; Daws, Sally A.; Gibbons, Stephanie L.; Havens, Kimberly M.; Duffy, Megan E.; Motwani, Sandeep; Cuadra, Robert A.; Applebaum, Sam M.; Samos, Juni, Viewer-authored content acquisition and management system for in-the-moment broadcast in conjunction with media programs.
Phipps, Jason N.; Daws, Sally A.; Gibbons, Stephanie L.; Havens, Kimberly M.; Duffy, Megan E.; Motwani, Sandeep; Cuadra, Robert A.; Applebaum, Sam M.; Samos, Juni, Viewer-authored content acquisition and management system for in-the-moment broadcast in conjunction with media programs.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.