Method and system for limiting the use of user-specific software features
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04N-007/16
H04N-007/167
H04L-029/06
H04L-009/32
H04L-009/28
G06F-012/14
출원번호
UP-0858890
(2004-06-02)
등록번호
US-7861306
(2011-02-24)
발명자
/ 주소
DeMello, Marco A.
Yaacovi, Yoram
Zeman, Pavel
출원인 / 주소
Microsoft Corporation
대리인 / 주소
Woodcock Washburn LLP
인용정보
피인용 횟수 :
7인용 특허 :
72
초록▼
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activa
A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.
대표청구항▼
What is claimed: 1. A method of enabling the use of a digital work on plural computing devices, said method comprising the acts of: receiving at an activation device, from a computing device, a request to enable the use of said digital work on said computing device, said request comprising first da
What is claimed: 1. A method of enabling the use of a digital work on plural computing devices, said method comprising the acts of: receiving at an activation device, from a computing device, a request to enable the use of said digital work on said computing device, said request comprising first data indicative of a user, said digital work being associated with said user and requiring the presence of second data on said computing device in order to be used on said computing device, wherein said second data comprises: a first cryptographic key, which enables use of said digital work; and a second cryptographic key; said first and second cryptographic keys are the private and public keys, respectively, of an asymmetric key pair; said digital work comprises encrypted content and a decryption key which decrypts said encrypted content; and at least a portion of said second data including said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said digital work in a form encrypted by said second cryptographic key; determining by said activation device whether a user-specific limit associated with said user that limits the use of said digital work on said plural computing devices has been reached, wherein said limit comprises a restriction on the number of computing devices which said user may enable for use of said digital work; and if said user-specific limit associated with said user has not been reached, then providing said second data from said activation device to said computing device. 2. The method of claim 1, wherein said limit comprises a restriction on the rate at which said user may enable computing devices to use said digital work. 3. The method of claim 2, wherein said limit comprises a time-dependent number of computing devices on which use of said digital work may be enabled, wherein said time-dependent number is the sum of: a first predetermined number of computing devices on which use of said digital work may be enabled during a first time period; and the product of a second number and a third number, wherein said second number is the number of second time periods that have commenced or elapsed since the end of said first time period, and said third number is a number of computing device on which use of said digital work may be enabled for each of said second time periods. 4. The method of claim 3, wherein said time-dependent number is capped at a maximum value if said sum exceeds said maximum value. 5. The method of claim 1, wherein said digital work comprises text, and wherein use of said digital work comprises displaying said text on one of said plural computing devices. 6. The method of claim 1, wherein said digital work comprises multimedia content, and wherein use of said digital work comprises rendering said multimedia content on one of said plural computing devices. 7. The method of claim 6, wherein said multimedia content comprises music, video, animations, or pictures. 8. The method of claim 1, wherein said digital work is created subsequent to the provision of said second data to said computing device. 9. The method of claim 1, wherein said second data comprises information indicative of said user. 10. The method of claim 1, wherein said first data is durably stored on said computing device so as to permit the enduring use of said digital work on said computing device. 11. One or more computer-readable media having executable instructions to perform a method of activating software installed on plural computing devices, said method comprising the acts of: receiving at an activation device, from a first computing device, a first request to activate said software installed on said first computing device, said request comprising information indicative of a user and said request comprising: a first cryptographic key, which enables use of said software installed on said first computing device; and a second cryptographic key; said first and second cryptographic keys are private and public keys, respectively, of an asymmetric key pair; said software installed on said first computing device comprises encrypted content and a decryption key which decrypts said encrypted content; and said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said software installed on said first computing device in a form encrypted by said second cryptographic key; said software having an activated state and a non-activated state, said software comprising content-rendering software, wherein said software renders a first class of digital works without regard to whether it is in the activated state, and wherein said software renders a second class of digital works only when it is in the activated state; determining by said activation device that a user-specific activation limit associated with said user that limits use of said software on said plural computing devices has not been reached; and based on said determination, providing first activation data from said activation device to said first computing device. 12. The one or more computer-readable media of claim 11, wherein said first and second classes of digital works comprise textual content, and wherein said software comprises text-rendering software. 13. The one or more computer-readable media of claim 11, wherein said first and second classes of digital works comprise multimedia content, and wherein said software comprises multimedia-rendering software. 14. The one or more computer-readable media of claim 13, wherein said multimedia content comprises music, video, animations, or pictures. 15. The one or more computer-readable media of claim 11, wherein said software in some manner processes a class of digital works, wherein each of said digital works in said class comprises encrypted content and a decryption key which decrypts said encrypted content, said decryption key being included in said digital work in an encrypted form decryptable with a cryptographic key, and wherein said first activation data comprises said cryptographic key. 16. The one or more computer-readable media of claim 11, further comprising the acts of: receiving, from a second computing device, a second request to activate said software installed on said second computing device, said second request comprising information indicative of said user; determining that said activation limit associated with said user has been reached; and denying activation of said software on said second computing device. 17. The one or more computer-readable media of claim 11, further comprising the act of providing a secure repository to said first computing device, said secure repository being in at least some way dependent upon said first computing device. 18. The one or more computer-readable media of claim 11, wherein said activation limit comprises a restriction on the number of activations of said software that said user may request. 19. The one or more computer-readable media of claim 11, wherein said activation limit comprises a restriction on the rate at which said user may activate said software. 20. A method of activating software on plural computing devices, said method comprising the acts of: receiving at an activation device, from a first computing device, a first request to activate first software installed on said first computing device with respect to a first user, said first request comprising: a first cryptographic key, which enables use of said first software installed on said first computing device; and a second cryptographic key; said first and second cryptographic keys are private and public keys, respectively, of an asymmetric key pair; said software installed on said first computing device comprises encrypted content and a decryption key which decrypts said encrypted content; and said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said software installed on said first computing device in a form encrypted by said second cryptographic key determining by said activation device that a user-specific activation limit associated with said first user that limits use of said software on said plural computing devices has not been reached; and based on said determination, activating said first software with respect to said first user; wherein said first software renders at least a first class of digital works without regard to whether said first software has been activated, and a second class of digital works only if said first software has been activated with respect to said first user. 21. The method of claim 20, wherein each of said first and second classes of digital works comprises textual content. 22. The method of claim 20, wherein each of said first and second sets of digital works comprises multimedia content. 23. The method of claim 22, wherein said multimedia content comprises music, video, animations, or pictures. 24. The method of claim 20, further comprising the acts of: receiving, from a second computing device, a second request to activate second software installed on said second computing device with respect to said first user; determining that an activation limit associated with said first user has been reached; and denying activation of said second software; wherein said second software renders at least said first class of digital works without regard to whether said second software has been activated, and said second class of digital works only if said second software has been activated with respect to said first user. 25. The method of claim 20, further comprising the acts of: receiving, from said first computing device, a second request to activate said first software with respect to a second user; determining that an activation limit associated with said second user has not been reached; and activating said first software with respect to said second user; wherein said first software further renders a third class of digital works only if said first software has been activated with respect to said second user. 26. The method of claim 20, wherein at least some items in said second class are created subsequent to activation of said first software. 27. The method of claim 20, wherein said activation limit comprises a restriction on the number of activations that said first user may request. 28. The method of claim 20, wherein said activation limit comprises a restriction on the rate at which said first user may activate software. 29. One or more computer-readable media having executable instructions to perform a method enabling the use of an enhanced feature available on plural computing devices, said method comprising the acts of: receiving at an activation device, from a first computing device, a first request to enable said enhanced feature on said first computing device said first request comprising: a first cryptographic key, which enables use of said enhanced feature; and a second cryptographic key; said first and second cryptographic keys are private and public keys, respectively, of an asymmetric key pair; said enhanced feature comprises encrypted content and a decryption key which decrypts said encrypted content; and said second cryptographic key is uploadable to a content provider wherein said decryption key may be included in said enhanced feature in a form encrypted by said second cryptographic key; associating a user with the requested enhanced feature wherein said first request comprises information indicative of said user; associating a user-specific limit with said user that limits the use of said enhanced feature on said plural computing devices; determining by said activation device that a user-specific limit has not been reached; based on said determination, enabling the use of said enhanced feature on said first computing device; wherein said first computing device has at least some non-enhanced features usable regardless of whether said enhanced feature is enabled, and wherein said limit is selected from the group consisting of: a restriction on the number of computing devices on which said enhanced feature may be enabled, and a restriction on the rate at which computing devices may be enabled to use said enhanced feature. 30. The one or more computer-readable media of claim 29, wherein said information comprises a username and password, and wherein said method further comprises the act of querying a namespace authority to validate said username and password. 31. The one or more computer-readable media of claim 29 wherein said enhanced feature comprises rendering a first class of digital works, and wherein said non-enhanced features comprise rendering a second class of digital works.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (72)
Rohatgi Pankaj (Sunnyvale CA) Dureau Vincent (Vemas CA), Apparatus and method for authenticating transmitting applications in an interactive TV system.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Dutta, Rabindranath, Incremental updates of items and prices on a customer's computer to reduce download times for frequently purchased items in e-commerce transactions in a method, system and program.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Khan Raheel Ahmed ; Burleson David Brent ; Filion John Thomas ; Cheek Donald Scott, Method and apparatus for a game delivery service including flash memory and a game back-up module.
Sachs James ; Pomeroy Thomas W. ; Novicov Aleksey ; Conboy Garth ; Walter Erik ; Leshner William S. ; Duga Brady ; Wotiz Richard, Method and apparatus for electronically distributing and viewing digital contents.
Kobata, Hiroshi; Gagne, Robert, Method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network.
White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
Lambert, Mark L.; van der Rijn, Daniel J. G.; Kemper, David J.; Verkler, Jay L., Method and apparatus for storing and delivering documents on the internet.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Saito, Takeshi; Hashimoto, Mikio; Kambayashi, Toru; Akiyama, Koichiro, Scheme for realizing communications through external network from contents processing device connected to local network in home environment.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Kenneth L. Nash, System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Wu, Yongjun; Sadhwani, Shyam; Wenker, Samuel J.; Evans, Brian P.; Farag, Hany; Darsa, Lucia, Media decoding control with hardware-protected digital rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.