An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorization
An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorizations. Encrypted user-selected files and a player program are transmitted to each customer for metered access to received data files as limited by the authorization, and customers can make additional selections and play the encrypted files freely while the authorization remains established. The system can transmit the data files from local storage, and also provide links to encrypted files that are stored at remote vendor facilities. Authorizations can be for selected portions or class levels of the catalog, and for terms measured as calendar time, play time, and collective number of plays. Also disclosed is a method for facilitating the distribution and accessing of electronic files.
대표청구항▼
1. A system for on-demand distribution of data files over a communications network, comprising: a memory;a processor in data communication with the memory;a network interface in data communication with the processor;at least one catalog stored in the memory;wherein the at least one catalog is config
1. A system for on-demand distribution of data files over a communications network, comprising: a memory;a processor in data communication with the memory;a network interface in data communication with the processor;at least one catalog stored in the memory;wherein the at least one catalog is configured to reference at least a first data file and a second data file, wherein the first data file comprises at least a portion of a first work, wherein the second data file comprises at least a portion of a second work, wherein the first work is different from the second work, wherein each of the first data file and the second data file is capable of transmission to a user device over the communications network, wherein each of the first data file and the second data file is selectable by a user from the at least one catalog, and wherein either: the first data file and the second data file each comprises at least one musical recording, orthe first data file and the second data file each comprises at least one moving image; andwherein the processor is configured to: require at least a first authorization in order to permit at least one of transmission or play of at least a portion of each of the first data file and the second data file, wherein the first authorization is configured to expire if a predetermined act is not performed by or on behalf of the user on or before a predetermined date, which predetermined date comprises at least one of a predetermined calendar date or passage of a predetermined period of time, wherein the first authorization is usable across at least two logon sessions prior to the predetermined date, and wherein the at least one of transmission or play of at least a portion of each of the first data file and the second data file is at least one of limited or inhibited after the expiration of the first authorization;require at least a second authorization in order to permit play of at least a portion of at least one of the first data file or the second data file, wherein the second authorization comprises decryption data; andgenerate at least one instruction to transmit to the user device at least a portion of at least one of the first data file or the second data file. 2. The system of claim 1, wherein the processor is further configured to generate at least one instruction to permit non-volatile storage on the user device of at least a portion of at least one of the first data file or the second data file. 3. The system of claim 2, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 4. The system of claim 2, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 5. The system of claim 2, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 6. The system of claim 2, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 7. The system of claim 2, wherein the predetermined period of time comprises a predetermined amount of calendar time. 8. The system of claim 2, wherein the first authorization is further capable of reactivation after expiration. 9. The system of claim 2, wherein the generated instructions to transmit are provided to a service facility. 10. The system of claim 2, wherein the decryption data comprises public-private key encryption data. 11. The system of claim 1, wherein the processor is further configured to generate at least one instruction configured to limit residence of at least a portion of at least one of the first data file and the second data file on the user device to main memory. 12. The system of claim 11, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 13. The system of claim 11, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 14. The system of claim 11, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 15. The system of claim 11, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 16. The system of claim 11, wherein the predetermined period of time comprises a predetermined amount of calendar time. 17. The system of claim 11, wherein the first authorization is further capable of reactivation after expiration. 18. The system of claim 11, wherein the generated instructions to transmit are provided to a service facility. 19. The system of claim 11, wherein the decryption data comprises public-private key encryption data. 20. The system of claim 1, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 21. The system of claim 1, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 22. The system of claim 1, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 23. The system of claim 1, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 24. The system of claim 1, wherein the predetermined period of time comprises a predetermined amount of calendar time. 25. The system of claim 1, wherein the first authorization is further capable of reactivation after expiration. 26. The system of claim 1, wherein the generated instructions to transmit are provided to a service facility. 27. The system of claim 1, wherein the decryption data comprises public-private key encryption data. 28. A method of on-demand distribution of data files over a communication network, the method comprising: receiving a first request from a user device to access at least one catalog stored in a memory, wherein the at least one catalog is configured to reference at least a first data file and a second data file, wherein the first data file comprises at least a portion of a first work, wherein the second data file comprises at least a portion of a second work, wherein the first work is different from the second work, wherein each of the first data file and the second data file is capable of transmission to a user device over the communications network, wherein each of the first data file and the second data file is selectable by a user from the at least one catalog, and wherein either: the first data file and the second data file each comprises at least one musical recording, orthe first data file and the second data file each comprises at least one moving image;returning the access to the at least one catalog in response to the first request;receiving a second request from the user device for at least one of transmission or play of at least a portion of each of the first data file and the second data file;requiring at least a first authorization and a second authorization in order to permit at least one of the activities covered by the second request; andgenerating at least one instruction to transmit to the user device at least a portion of at least one of the first data file or the second data file;wherein the first authorization is configured to expire if a predetermined act is not performed by or on behalf of the user on or before a predetermined date, which predetermined date comprises at least one of a predetermined calendar date or the passage of a predetermined period of time, wherein the first authorization is usable across at least two logon sessions prior to the predetermined date, wherein the at least one of transmission or play of at least a portion of each of the first data file and the second data file is at least one of limited or inhibited after the expiration of the first authorization, and wherein the second authorization comprises decryption data. 29. The method of claim 28, wherein the processor is further configured to generate at least one instruction to permit non-volatile storage on the user device of at least a portion of at least one of the first data file or the second data file. 30. The method of claim 29, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 31. The method of claim 29, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 32. The method of claim 29, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 33. The method of claim 29, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 34. The method of claim 29, wherein the predetermined period of time comprises a predetermined amount of calendar time. 35. The method of claim 29, wherein the first authorization is further capable of reactivation after expiration. 36. The method of claim 29, wherein the generated instructions to transmit are provided to a service facility. 37. The method of claim 29, wherein the decryption data comprises public-private key encryption data. 38. The method of claim 28, wherein the processor is further configured to generate at least one instruction configured to limit residence of at least a portion of at least one of the first data file and the second data file on the user device to main memory. 39. The method of claim 38, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 40. The method of claim 38, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 41. The method of claim 38, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 42. The method of claim 38, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 43. The method of claim 38, wherein the predetermined period of time comprises a predetermined amount of calendar time. 44. The method of claim 38, wherein the first authorization is further capable of reactivation after expiration. 45. The method of claim 38, wherein the generated instructions to transmit are provided to a service facility. 46. The method of claim 38, wherein the decryption data comprises public-private key encryption data. 47. The method of claim 28, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 48. The method of claim 28, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 49. The method of claim 28, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 50. The method of claim 28, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 51. The method of claim 28, wherein the predetermined period of time comprises a predetermined amount of calendar time. 52. The method of claim 28, wherein the first authorization is further capable of reactivation after expiration. 53. The method of claim 28, wherein the generated instructions to transmit are provided to a service facility. 54. The method of claim 28, wherein the decryption data comprises public-private key encryption data. 55. A non-transitory computer-readable medium having computer-executable instructions stored thereon, which, when executed by a computing device, cause the computing device to perform a method of accessing data files by a user device in a data communication network, the method comprising: requesting, in a first request, access to at least one catalog stored in a memory of a remote computing device, wherein the at least one catalog is configured to reference at least a first data file and a second data file, wherein the first data file comprises at least a portion of a first work, wherein the second data file comprises at least a portion of a second work, wherein the first work is different from the second work, wherein each of the first data file and the second data file is capable of transmission to a user device over the communications network, wherein each of the first data file and the second data file is selectable by a user from the at least one catalog, and wherein either: the first data file and the second data file each comprises at least one musical recording, orthe first data file and the second data file each comprises at least one moving image;receiving the access to the at least one catalog in response to the first request;transmitting to a service facility a second request for at least one of transmission or play of at least a portion of each of the first data file and the second data file;receiving a requirement for at least a first authorization and a second authorization in order to permit at least one of the activities covered by the second request, wherein the first authorization is configured to expire if a predetermined act is not performed by or on behalf of the user on or before a predetermined date, which predetermined date comprises at least one of a predetermined calendar date or passage of a predetermined prior of time, wherein the first authorization is usable across at least two logon sessions prior to the predetermined date, and wherein the second authorization comprises decryption data; andreceiving, at the user device, at least a portion of at least one of the first data file or the second data file;wherein the at least one of transmission or play of at least a portion of each of the first data file and the second data file is at least one of limited or inhibited after the expiration of the first authorization. 56. The non-transitory computer-readable medium of claim 55, further comprising receiving at least one instruction to permit non-volatile storage on the user device of at least a portion of at least one of the first data file or the second data file. 57. The non-transitory computer-readable medium of claim 56, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 58. The non-transitory computer-readable medium of claim 56, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 59. The non-transitory computer-readable medium of claim 56, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 60. The non-transitory computer-readable medium of claim 56, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 61. The non-transitory computer-readable medium of claim 56, wherein the predetermined period of time comprises a predetermined amount of calendar time. 62. The non-transitory computer-readable medium of claim 56, wherein the first authorization is further capable of reactivation after expiration. 63. The non-transitory computer-readable medium of claim 56, wherein the service facility comprises the remote computing device. 64. The non-transitory computer-readable medium of claim 56, wherein the decryption data comprises public-private key encryption data. 65. The non-transitory computer-readable medium of claim 55, further comprising receiving at least one instruction configured to limit residence of at least a portion of at least one of the first data file and the second data file on the user device to main memory. 66. The non-transitory computer-readable medium of claim 65, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 67. The non-transitory computer-readable medium of claim 65, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 68. The non-transitory computer-readable medium of claim 65, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 69. The non-transitory computer-readable medium of claim 65, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 70. The non-transitory computer-readable medium of claim 65, wherein the predetermined period of time comprises a predetermined amount of calendar time. 71. The non-transitory computer-readable medium of claim 65, wherein the first authorization is further capable of reactivation after expiration. 72. The non-transitory computer-readable medium of claim 65, wherein the service facility comprises the remote computing device. 73. The non-transitory computer-readable medium of claim 65, wherein the decryption data comprises public-private key encryption data. 74. The non-transitory computer-readable medium of claim 55, wherein the first authorization comprises at least one of identification data, payment authorization data, customer account data, a customer identifier, or a password. 75. The non-transitory computer-readable medium of claim 55, wherein the user device comprises at least one of a computer, a player device, or a standalone device. 76. The non-transitory computer-readable medium of claim 55, wherein the predetermined act comprises a least one of identification, verification, authorization, or payment. 77. The non-transitory computer-readable medium of claim 55, wherein the predetermined period of time comprises a predetermined amount of playing time of at least one of the data files on the user device. 78. The non-transitory computer-readable medium of claim 55, wherein the predetermined period of time comprises a predetermined amount of calendar time. 79. The non-transitory computer-readable medium of claim 55, wherein the first authorization is further capable of reactivation after expiration. 80. The non-transitory computer-readable medium of claim 55, wherein the service facility comprises the remote computing device. 81. The non-transitory computer-readable medium of claim 55, wherein the decryption data comprises public-private key encryption data.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (78)
Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
Grady John ; Hand Kenneth ; Modrowsky John ; Richard ; III Arthur A., Method and system for accessing multimedia data over public switched telephone network.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Hendricks John S. (Potomac MD) Wunderlich Richard E. (Alpharetta GA), Operations center with video storage for a television program packaging and delivery system.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.