Method and system for binding enhanced software features to a persona
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-021/00
출원번호
UP-0871739
(2004-06-18)
등록번호
US-7823208
(2010-11-15)
발명자
/ 주소
DeMello, Marco A.
Keely, Leroy B.
Byrum, Frank D.
Yaacovi, Yoram
Hughes, Kathryn E.
출원인 / 주소
Microsoft Corporation
대리인 / 주소
Woodcock Washburn LLP
인용정보
피인용 횟수 :
12인용 특허 :
65
초록▼
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activa
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. Each retail site is equipped with a URL encryption object, which encrypts, according to a secret symmetric key shared between the retail site and the fulfillment site, information that is needed by the fulfillment site to process an order for content sold by the retail site. Upon selling a content item, the retail site transmits to the purchaser a web page having a link to a URL comprising the address of the fulfillment site and a parameter having the encrypted information. Upon following the link, the fulfillment site downloads the ordered content to the consumer, preparing the content if necessary in accordance with the type of security to be carried with the content. The fulfillment site includes an asynchronous fulfillment pipeline which logs information about processed transactions using a store-and-forward messaging service.
대표청구항▼
What is claimed: 1. A method of enabling the use of a first digital work on plural computing devices, said method comprising the acts of: receiving, at an activation server from a first computing device, a user's credentials and a request to authenticate the first computing device; retrieving activ
What is claimed: 1. A method of enabling the use of a first digital work on plural computing devices, said method comprising the acts of: receiving, at an activation server from a first computing device, a user's credentials and a request to authenticate the first computing device; retrieving activation information associated with the user's credentials, wherein the activation information identifies a number of previously activated computing devices associated with the user's credentials; comparing the activation information identifying the number of activated computing devices associated with the user's credentials to an activation limit number; when the activation limit number has been reached, denying the authentication request received from the first computing device, otherwise: authenticating said credentials by querying a namespace authority; providing a first activation certificate to said first computing device, wherein the activation certificate includes an activation private key encrypted by a public key associated with a secure repository, wherein the secure repository includes a repository private key and the public key; providing the secure repository to said first computing device, wherein the secure repository, when executed, decrypts the activation private key using the repository private key securely; decrypting a symmetric key, bound to said first digital work, using the activation private key wherein the symmetric key operable to decrypt said first digital work; and persisting an association between said credentials and at least some information included in said first activation certificate, wherein said computing device stores software having an activated state and a non-activated state, wherein said first activation certificate transforms said software to said activated state, wherein said software renders a second digital work regardless of whether it is in the activated state, and wherein said software renders said first digital work only if said software is in the activated state. 2. The method of claim 1 wherein said credentials comprise a username and a password. 3. The method of claim 1 wherein said first activation certificate is at least partly resistant to being used on a computing device other than said first computing device, and wherein said second activation certificate is at least partly resistant to being used on a computing device other than said second computing device. 4. A computer readable storage medium having stored thereon, instructions for enabling the use of a first digital work on plural computing devices, the computer readable medium comprising instructions for: receiving, at an activation server from a first computing device, a user's credentials and a request to authenticate the first computing device; retrieving activation information associated with the user's credentials, wherein the activation information identifies a number of previously activated computing devices associated with the user's credentials; comparing the activation information identifying the number of activated computing devices associated with the user's credentials to an activation limit number; when the activation limit number has been reached, denying the authentication request received from the first computing device, otherwise: authenticating said credentials by querying a namespace authority; providing a first activation certificate to said first computing device, wherein the activation certificate includes an activation private key encrypted by a public key associated with a secure repository, wherein the secure repository includes a repository private key and the public key; providing the secure repository to said first computing device, wherein the secure repository, when executed, decrypts the activation private key using the repository private key securely; decrypting a symmetric key, bound to said first digital work, using the activation private key wherein the symmetric key operable to decrypt said first digital work; and persisting an association between said credentials and at least some information included in said first activation certificate, wherein said computing device stores software having an activated state and a non-activated state, wherein said first activation certificate transforms said software to said activated state, wherein said software renders a second digital work regardless of whether it is in the activated state, and wherein said software renders said first digital work only if said software is in the activated state. 5. The computer readable storage medium of claim 4 wherein said credentials comprise a username and a password. 6. The computer readable storage medium of claim 4 wherein said first activation certificate is at least partly resistant to being used on a computing device other than said first computing device, and wherein said second activation certificate is at least partly resistant to being used on a computing device other than said second computing device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (65)
Rohatgi Pankaj (Sunnyvale CA) Dureau Vincent (Vemas CA), Apparatus and method for authenticating transmitting applications in an interactive TV system.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Dutta, Rabindranath, Incremental updates of items and prices on a customer's computer to reduce download times for frequently purchased items in e-commerce transactions in a method, system and program.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Khan Raheel Ahmed ; Burleson David Brent ; Filion John Thomas ; Cheek Donald Scott, Method and apparatus for a game delivery service including flash memory and a game back-up module.
Sachs James ; Pomeroy Thomas W. ; Novicov Aleksey ; Conboy Garth ; Walter Erik ; Leshner William S. ; Duga Brady ; Wotiz Richard, Method and apparatus for electronically distributing and viewing digital contents.
White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
Lambert, Mark L.; van der Rijn, Daniel J. G.; Kemper, David J.; Verkler, Jay L., Method and apparatus for storing and delivering documents on the internet.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Kenneth L. Nash, System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.