System and method for unique digital asset identification and transaction management
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-007/00
출원번호
US-0210089
(2011-08-15)
등록번호
US-8706636
(2014-04-22)
발명자
/ 주소
Dunkeld, Bryan
Lambert, Edward
출원인 / 주소
Content Technologies LLC
대리인 / 주소
Kaufman, Marc S.
인용정보
피인용 횟수 :
1인용 특허 :
82
초록▼
Digital assets are tracked through the use of digital serial numbers. Systems equipped with the present invention can uniquely identify copies of assets within it. Assets that originate within the system can be uniquely identified even outside the system. The transaction history can be traced by loo
Digital assets are tracked through the use of digital serial numbers. Systems equipped with the present invention can uniquely identify copies of assets within it. Assets that originate within the system can be uniquely identified even outside the system. The transaction history can be traced by looking up the transaction history associated with an assets' serial number. The serial number applied to an asset is unique to each transaction and can be applied at the time a copy is made. Database entries are created that link each unique serial number to aspects of the transaction. Each serial number can reference details about a particular transaction such as parties involved, date and time of copy, ownership, terms of use, and payment terms.
대표청구항▼
1. A system for managing distribution of digital assets over a network, comprising: one or more computing devices having code stored therein which, when executed by at least one of the one or more computing devices, causes the at least one of the one or more computing devices to: enable storage of a
1. A system for managing distribution of digital assets over a network, comprising: one or more computing devices having code stored therein which, when executed by at least one of the one or more computing devices, causes the at least one of the one or more computing devices to: enable storage of a first instance of a digital asset, the first instance of the digital asset including digital content and a first unique identifier associated with the first instance of the digital asset;in response to a request to transfer the digital content from an external client computing device associated with a first user to another client computing device, determine a second unique identifier associated with a second instance of the digital asset, the second unique identifier being different from the first unique identifier, the second instance of the digital asset including the digital content and at least one other portion that does not include the digital content;enable storage of the second instance of the digital asset, the second instance of the digital asset including the second unique identifier embedded in the at least one other portion of the second instance of the digital asset;wherein other instances of the digital asset have unique identifiers embedded therein and the unique identifiers are used to track instances of the digital asset;wherein said second instance of said digital asset is stored on the another client computing device; anddebit an account of a customer related to the transfer of the instance of the digital asset. 2. The system of claim 1, wherein transfer of the second instance of the digital asset is in a peer to peer manner across the Internet. 3. The system of claim 1, wherein a second transfer can occur from either the external client computing device or the another client computing device, the second transfer further using a third instance of the digital asset and a third unique identifier embedded therein in a manner that does not alter user perceptible content of said third instance. 4. The system of claim 1, wherein at least the another client computing device is a portable electronics device, including at least one of a personal computer, a personal digital assistant, and a telephone. 5. The system of claim 1, wherein the digital content includes an MP3 based audio file. 6. The system of claim 1, wherein said second unique identifier is based on combining information from any one or more of the following: a first id for said system, a second id for the external client computing device, an asset id for the digital asset, a customer id, a randomly generated number and/or a time of transfer. 7. The system of claim 1, wherein a catalog of available digital assets is maintained by at least one of the one or more computing devices. 8. The system of claim 1, wherein the code also causes at least one of the more computing devices to execute an authorization routine, said authorization routine being adapted to secure agreement from a user of the external client computing system to access terms associated with the digital asset. 9. The system of claim 8, wherein the code also causes at least one of the more computing devices to execute a setup routine, the setup routine being adapted to set up a transaction account with a digital asset management system separate from the one or more computing devices, the transaction account including an identifier for the first user, identifiers for any transfers performed by the first user, and billing information associated with transfers. 10. The system of claim 8, wherein said code further causes at least one of the one or more processors to coordinate transfer to the external client computing device in cooperation with a digital asset management system, such that the digital asset management system provides the second unique identifier. 11. The system of claim 10, wherein said code causes at least one of the one or more processors to provide authorization for the digital asset management system to track all transfers. 12. The system of claim 11, wherein said code causes at least one of the one or more processors to provide hosting functions, and receive credits from the digital asset management system for all authorized transfers. 13. The system of claim 8, wherein external client computing device polls other computers coupled to the network to determine an optimal transfer source for instances of the digital asset. 14. The system of claim 1, wherein the digital content includes content for at least one of a newspaper, a book, a magazine, and a periodical. 15. The system of claim 8, wherein the second instantiation of the digital asset is created in accordance with distribution rules in place at the time of transfer, which distribution rules are different from distribution rules in place at the time of creation of the first instantiation of the digital asset. 16. The system of claim 8, wherein the external client computing device is integrated with a personal entertainment system, including a gambling machine, a digital jukebox, and/or a passenger seat. 17. The system of claim 1 wherein said code causes at least one of the one or more processors to provide a monitoring routine for analyzing the external client computing device to identify digital assets stored thereon which do not have transaction information from said system; and said monitoring routine being adapted to convert said digital assets into authorized assets. 18. A method, implemented by one or more computing devices, for managing distribution of digital assets over a network, comprising: at least one of the one or more computing devices enabling storage of a first instance of a digital asset, the first instance of the digital asset including both digital content and a first unique identifier associated with the first instance of the digital asset;in response to a request for a transfer of the digital content from an external client computing device associated with a first user to another client computing device, at least one of the one or more computing devices determining a second unique identifier for a second instance of the digital asset, the second unique identifier being different from the first unique identifier, the second instance of the digital asset including the digital content and at least one other portion that does not include the digital content;at least one of the one or more computing devices enabling storage of the second instance of the digital asset, the second instance of the digital asset including the second unique identifier embedded in the at least one other portion of the second instance of the digital asset;wherein other instances of the digital asset have unique identifiers embedded therein and the unique identifiers are used to track instances of the digital asset;wherein the second instance of the digital asset is transferred from the external client computing device to the another client computing device; anddebit an account of the customer related to the transfer of the instance of the digital asset. 19. The method of claim 18, wherein transfer of the second instance of the digital asset is in a peer to peer manner across the Internet. 20. The method of claim 18, wherein a second transfer can occur from either the external client computing device or the another client computing device, the second transfer further using a third instance of the digital asset and a third unique identifier embedded therein in a manner that does not alter user perceptible content of said third instance. 21. The method of claim 18, wherein at least the another client computing device is a portable electronics device, including at least one of a personal computer, a personal digital assistant, and a telephone. 22. The method of claim 18, wherein said digital content includes an MP3 based audio file. 23. The method of claim 18, wherein said second unique identifier is based on combining information from any one or more of the following: a first id for a distribution system, a second id for the external client computing device, an asset id for the digital asset, a customer id, a randomly generated number and/or a time of transfer. 24. The method of claim 18, wherein a catalog of available digital assets is maintained by at least one of the one or more computing devices. 25. The method of claim 18, further comprising securing agreement from a user of the external client computing system to access terms associated with the digital asset. 26. The method of claim 25, further comprising setting up a transaction account with a digital asset management system separate from the one or more computing devices, the transaction account including an identifier for a the first user, identifiers for any transfers performed by the first user, and billing information associated with transfers. 27. The method of claim 25, further comprising coordinating transfer to the external client computing device in cooperation with a digital asset management system, such that the digital asset management system provides the second unique identifier. 28. The method of claim 27, further comprising providing authorization for the digital asset management system to track all transfers. 29. The method of claim 28, further comprising providing hosting functions, and receiving credits from the digital asset management system for all authorized transfers. 30. The method of claim 25, wherein external client computing device polls other computers coupled to the network to determine an optimal transfer source for instances of the digital asset. 31. The method of claim 18, wherein the digital content includes content for at least one of newspaper, a book, a magazine, and a periodical. 32. The method of claim 25, wherein the second instantiation of the digital asset is created in accordance with distribution rules in place at the time of transfer, which distribution rules are different from distribution rules in place at the time of creation of the first instantiation of the digital asset. 33. The method of claim 25, wherein the external client computing device is integrated with a personal entertainment system, including a gambling machine, a digital jukebox, and/or a passenger seat. 34. The method of claim 18 further comprising analyzing the external client computing device to identify digital assets stored thereon which do not have transaction information from said system and said monitoring routine being adapted to convert said digital assets into authorized assets. 35. The system of claim 1, wherein the second instance of the digital asset is not in a proprietary format of the one or more computing devices. 36. The system of claim 1, wherein the another client computing device is not associated with the first user. 37. The method of claim 18, wherein the second instance of the digital asset is not in a proprietary format of the one or more computing devices. 38. The method of claim 18, wherein the another client computing device is not associated with the first user. 39. At least one non-transitory computer-readable media having instructions recorded thereon which, when executed by a computing device, cause the computing device to: at least one of the one or more computing devices enable storage of a first instance of a digital asset, the first instance of the digital asset including both digital content and a first unique identifier associated with the first instance of the digital asset;in response to a request for a transfer of the digital content from an external client computing device associated with a first user to another client computing device, at least one of the one or more computing devices determine a second unique identifier for a second instance of the digital asset, the second unique identifier being different from the first unique identifier, the second instance of the digital asset including the digital content and at least one other portion that does not include the digital content; andenable storage of the second instance of the digital asset the second instance of the digital asset including the second unique identifier embedded in the at least one other portion of the second instance of the digital asset;wherein other instances of the digital asset have unique identifiers embedded therein and the unique identifiers are used to track instances of the digital asset;wherein the second instance of the digital asset is transferred from the external client computing device to the another client computing device; anddebit an account of the customer related to the transfer of the instance of the digital asset. 40. The media of claim 39, wherein transfer of the second instance of the digital asset is in a peer to peer manner across the Internet. 41. The media of claim 39, wherein a second transfer can occur from either the external client computing device or the another client computing device, the second transfer further using a third instance of the digital asset and a third unique identifier embedded therein in a manner that does not alter user perceptible content of said third instance. 42. The media of claim 39, wherein at least the another client computing device is a portable electronics device, including at least one of a personal computer, a personal digital assistant, and a telephone. 43. The media of claim 39, wherein said digital content includes an MP3 based audio file. 44. The media of claim 39, wherein said second unique identifier is based on combining information from any one or more of the following: a first id for a distribution system, a second id for the external client computing device, an asset id for the digital asset, a customer id, a randomly generated number and/or a time of transfer. 45. The media of claim 39, wherein a catalog of available digital assets is maintained by at least one computing device. 46. The media of claim 39, wherein the second instantiation of the digital asset is created in accordance with distribution rules in place at the time of transfer, which distribution rules are different from distribution rules in place at the time of creation of the first instantiation of the digital asset. 47. The media of claim 39, wherein the second instance of the digital asset is not in a proprietary format of the one or more computing devices. 48. The media of claim 39, wherein the another client computing device is not associated with the first user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (82)
Paul A. Delano, Apparatus and methods for collaboratively searching knowledge databases.
Kogan Dan D. ; Drews Paul C. ; Held James P. ; Larson James A., Creating and maintaining hypertext links among heterogeneous documents by the establishment of anchors and connections.
Jones,Kevin C.; Aggson,Cynthia K.; Rodriguez,Tony F.; Mosher,Brian; Levy,Kenneth L.; Hiatt,R. Stephen; Rhoads,Geoffrey B., Digital asset management and linking media signals with related data using watermarks.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Kikinis Dan (Sratoga CA) Dornier Pascal (Sunnyvale CA) Seiler William J. (Scotts Valley CA), Hand-held portable computer having an electroluminescent flat-panel display with pixel elements at right angles to the p.
Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
Eastmond Bruce Charles ; Cudak Mark Conrad ; Kepler James Frank, Method access point device and peripheral for providing space diversity in a time division duplex wireless system.
Dutta, Rabindranath; French, Steven Michael; Janakiraman, Janani, Method and system for augmenting web-indexed search engine results with peer-to-peer search results.
Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Cudak Mark Conrad ; Mueller Bruce Dale ; Kelton James Robert ; Classon Brian Keith, Network protocol method, access point device and peripheral devices for providing for an efficient centrally coordinated peer-to-peer wireless communications network.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Leen, Fergus A.; Lawrence, Sam B.; McNally, David G.; Hetherington, Clive; McDowell, David M.; O'Neal, Kevin R., System and method for providing game advice to a user of a gaming application.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.