A method of tracking electronic content includes producing a file of electronic content and executable instructions that collect notification information and attempt to transmit the notification information to an address when triggered by an event. The executable instructions deny access to the elec
A method of tracking electronic content includes producing a file of electronic content and executable instructions that collect notification information and attempt to transmit the notification information to an address when triggered by an event. The executable instructions deny access to the electronic content until the notification information is transmitted successfully.
대표청구항▼
1. A method of tracking or regulating access to electronic content, the method comprising: collecting notification information from a recipient of electronic content in response to an attempt to access the electronic content at a first computer, the notification information collected by notification
1. A method of tracking or regulating access to electronic content, the method comprising: collecting notification information from a recipient of electronic content in response to an attempt to access the electronic content at a first computer, the notification information collected by notification instructions previously received from a third computer;determining dynamically by the received notification instructions at the first computer how to navigate through a network configuration to a public network;initiating transmission of the collected notification information to a second computer at an address other than that of an immediate sender of the electronic content; andselectively controlling access to the electronic content at the first computer based on a result of the transmission of the notification information. 2. The method of claim 1, further comprising the steps of: transmitting the electronic content from the first computer to one or more successive computers; andwherein an access granting message is sent to the one or more successive computers to selectively control access to the electronic information. 3. The method of claim 1, further comprising charging a fee based on the notification information. 4. The method of claim 1, further including tracking one or more successive computers based on receipt of the notification information, wherein the first computer and second computer are among a plurality of the one or more successive computers. 5. The method of claim 1, wherein the notification information is collected by executable instructions associated with the electronic content. 6. A system of tracking electronic content, comprising: a notification server comprising a computer platform including processor and memory configured to receive notification information from a first computer, wherein notification instructions collect and send the notification information based upon a triggering event, the server interconnected by a network to a plurality of computers;the electronic content that includes the notification instructions;wherein the electronic content is configured to be propagated to the plurality of computers in succession and is configured to initiate transmission of the notification information to a network address other than an address of an immediate predecessor computer of the plurality of computers and the first computer itself being a successive computer of the plurality of computers, andwherein the electronic content is configured to control access to the electronic content based upon a result of the transmission of the notification information, andwherein the notification instructions are configured to determine dynamically at the first computer how to navigate through a network configuration to a public network. 7. The system of claim 6, wherein the electronic content includes computer executable instructions. 8. The system of claim 7, wherein the computer executable instructions are configured to selectively deny access to the electronic content. 9. The system of claim 7, wherein the executable instructions control access to the electronic content by limiting access to a predetermined number of accesses. 10. The system of claim 6, wherein the notification instructions are computer executable instructions. 11. The system of claim 6, wherein the electronic content is configured to initiate transmission of the notification information based upon an attempt to access the electronic content. 12. The system of claim 6, wherein the electronic content is propagated at least partially encrypted. 13. The system of claim 3, wherein the notification server is configured to track the propagation of the electronic content at least at some of the plurality of computers based upon the received notification information. 14. The system of claim 6, wherein the electronic content includes at least any one of: a text file, a graphics file, an audio file and a video file. 15. The system of claim 6, wherein the electronic content includes an instruction file or a program file. 16. The system of claim 6, wherein the electronic content is created at one of the plurality of computers. 17. The system of claim 6, wherein the triggering event is at least one of: (i) an attempt to access the electronic content;(ii) an attempt to save the electronic content;(iii) an attempt to delete the electronic content; and(iv) an attempt to display the electronic content. 18. The system of claim 6, further comprising an envelope generation computer configured to create an electronic envelope to contain the electronic content and configured to transmit the electronic envelope to one of the plurality of computers, the envelope generation computer connected to the network. 19. A computer-implemented method embedded in at least one non-transitory computer storage medium, the at least one non-transitory computer storage medium having executable instructions configured when executed to cause the following steps to be performed: receiving notification information at a server in response to an attempt to access electronic content at a successive computer, the successive computer being one of a plurality of successive computers having received the electronic content containing executable instructions from an original recipient computer; andtracking the plurality of successive computers based upon the received notification information,wherein the notification information is collected by executing at least some of the executable instructions and the notification information is received at a network address other than a network address transmitting the electronic data to the original recipient computer, andwherein the executable instructions are configured to determine dynamically at the first computer how to navigate through a network configuration to a public network. 20. The computer-implemented method of claim 19, further comprising charging a fee based at least in part on the notification information. 21. The computer-implements method of claim 19, wherein the notification information is collected by executing at least some of the executable instructions initiated by a triggering event, the triggering event being at least one of: (i) an attempt to access the electronic content;(ii) an attempt to save the electronic content;(iii) an attempt to delete the electronic content; and(iv) an attempt to list the electronic content. 22. The computer-implemented method of claim 19, wherein the electronic content includes at least any one of: a text file, a graphics file, an audio file, a program file, and a video file. 23. The computer-implemented method of claim 19, wherein the executable instructions are received with the electronic content from the original recipient computer. 24. The computer-implemented method of claim 19, wherein the executable instructions are configured to selectively control access to at least part of the electronic data at the successive computers. 25. A system of tracking electronic content, comprising: a notification server comprising a computer platform including processor and memory configured to receive notification information from a first computer, wherein notification instructions collect and send the notification information based upon a triggering event, the server interconnected by a network to a plurality of computers;the electronic content that includes the notification instructions;wherein the electronic content is configured to be propagated to the plurality of computers in succession and is configured to initiate transmission of the notification information to a network address other than an address of an immediate predecessor computer of the plurality of computers and the first computer itself being a successive computer of the plurality of computers, andwherein the electronic content is configured to control access to the electronic content based upon a result of the transmission of the notification information, andwherein the notification instructions are configured to determine at the first computer whether a proxy service is enabled or disabled for connecting to a network.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (138)
Anoop Gupta ; David M Bargeron, Accessing annotations across multiple target media streams.
Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
Walker Jay S. ; Lech Robert R. ; Van Luchene Andrew S. ; Sparico Thomas M. ; Jorasch James A. ; Schneier Bruce, Conditional purchase offer management system for event tickets.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
Parks,M. Jay; Peinado,Marcus; Helin,Jonas Fredrik; Strom,Clifford P., Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication.
Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Durst ; Jr. Robert T. (212 Shelton Rd. Monroe CT 06468) Hunter Kevin D. (440 Allyndale Dr. Stratford CT 06497), Method and system for preventing unauthorized use of software.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, Method of processing an E-mail message that includes a representation of an envelope.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Janacek, Robert; Muchhala, Mahesh, Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
Blumenthal Michael S. ; Barthel Daniel J. ; Newman Bruce ; Newman Brenda S., Secured electronic information delivery system having a three-tier structure.
Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
Uchida Wataru,JPX ; Nozaki Tsutomu,JPX, System for broadcasting electronic mails that separately stores and sends a portion of electronic mails with an access code for filtering and retrieving purpose.
Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
Kupka,Michael S.; Hawkins,Michael L.; Thomas,Trent M., System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.