An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorization
An electronic media distribution/play system includes a service facility that has a communications network interface and maintains a data file catalog. The catalog is sent over the network to requesting users, and the system processes payments from customers in establishing file access authorizations. Encrypted user-selected files and a player program are transmitted to each customer for metered access to received data files as limited by the authorization, and customers can make additional selections and play the encrypted files freely while the authorization remains established. The system can transmit the data files from local storage, and also provide links to encrypted files that are stored at remote vendor facilities. Authorizations can be for selected portions or class levels of the catalog, and for terms measured as calendar time, play time, and collective number of plays. Also disclosed is a method for facilitating the distribution and accessing of electronic files.
대표청구항▼
1. A system for on-demand distribution of works over a communications network, comprising: a memory;a processor in data communication with the memory;a network interface in data communication with the processor;at least one catalog stored in the memory;wherein the at least one catalog is configured
1. A system for on-demand distribution of works over a communications network, comprising: a memory;a processor in data communication with the memory;a network interface in data communication with the processor;at least one catalog stored in the memory;wherein the at least one catalog is configured to reference at least a first work and a second work, wherein the first work is different from the second work, wherein each of the first work and the second work is selectable by a user from the at least one catalog, wherein a first data file comprises at least a portion of the first work, wherein a second data file comprises at least a portion of the second work, wherein the first data file is different from the second data file, wherein each of the first data file and the second data file is capable of transmission to a user device over the communications network, wherein each of the first data file and the second data file is capable of play on a software player associated with the user device, wherein each of the first data file and the second data file is encrypted prior to play, wherein at least a portion of the first data file is configured to reside in main memory on the user device at the time of play of the first data file, wherein at least a portion of the second data file is configured to reside in main memory on the user device at the time of play of the second data file, and wherein either: the first data file and the second data file each comprises at least one musical recording, orthe first data file and the second data file each comprises at least one moving image; andwherein the processor is configured to require a first authorization, which first authorization is configured to enable at least one of transmission or play of at least a portion of each of the first data file and the second data file, wherein the first authorization is configured to expire with respect to both the first data file and the second data file if at least one predetermined act is not performed by or on behalf of the user within a predetermined period of time, wherein the at least one predetermined act and the predetermined period of time are the same for both the first data file and the second data file, wherein the first authorization is usable across at least two logon sessions within the predetermined period of time, and wherein the at least one of transmission or play of at least a portion of each of the first data file and the second data file is configured to be at least one of limited or inhibited after the expiration of the first authorization. 2. The system of claim 1, wherein the first data file is configured to reside in non-volatile memory on the user device at the time of play of the first data file, and wherein the second data file is configured to reside in non-volatile memory on the user device at the time of play of the second data file. 3. The system of claim 1, wherein the first authorization comprises at least one of identification data, customer account data, a customer identifier, or a password. 4. The system of claim 2, wherein the first authorization comprises at least one of identification data, customer account data, a customer identifier, or a password. 5. The system of claim 1, wherein the predetermined act comprises a least one of identification, verification, authorization, renewal, or extension. 6. The system of claim 2, wherein the predetermined act comprises a least one of identification, verification, authorization, renewal, or extension. 7. The system of claim 1, wherein the first authorization is capable of reactivation after expiration. 8. The system of claim 2, wherein the first authorization is capable of reactivation after expiration. 9. The system of claim 1, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network from a service facility. 10. The system of claim 2, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network from a service facility. 11. The system of claim 1, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network on a peer-to-peer basis. 12. The system of claim 2, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network on a peer-to-peer basis. 13. A method of on-demand distribution of works over a communication network, the method comprising: receiving a first request from a user device to access at least one catalog stored in a memory, wherein the at least one catalog is configured to reference at least a first work and a second work, wherein the first work is different from the second work, wherein each of the first work and the second work is selectable by a user from the at least one catalog, wherein a first data file comprises at least a portion of the first work, wherein a second data file comprises at least a portion of the second work, wherein the first data file is different from the second data file, wherein each of the first data file and the second data file is capable of transmission to a user device over the communications network, wherein each of the first data file and the second data file is capable of play on a software player associated with the user device, wherein each of the first data file and the second data file is encrypted prior to play, wherein at least a portion of the first data file is configured to reside in main memory on the user device at the time of play of the first data file, wherein at least a portion of the second data file is configured to reside in main memory on the user device at the time of play of the second data file, and wherein either: the first data file and the second data file each comprises at least one musical recording, orthe first data file and the second data file each comprises at least one moving image;returning the access to the at least one catalog in response to the first request;receiving a second request from the user device for at least one of transmission or play of at least a portion of each of the first data file and the second data file; andrequiring a first authorization, which first authorization is configured to enable at least one of transmission or play of at least a portion of each of the first data file and the second data file; wherein the first authorization is configured to expire with respect to both the first data file and the second data file if at least one predetermined act is not performed by or on behalf of the user within a predetermined period of time, wherein the at least one predetermined act and the predetermined period of time are the same for both the first data file and the second data file, wherein the first authorization is usable across at least two logon sessions within the predetermined period of time, and wherein the at least one of transmission or play of at least a portion of each of the first data file and the second data file is configured to be at least one of limited or inhibited after the expiration of the first authorization. 14. The method of claim 13, wherein the first data file is configured to reside in non-volatile memory on the user device at the time of play of the first data file, and wherein the second data file is configured to reside in non-volatile memory on the user device at the time of play of the second data file. 15. The method of claim 13, wherein the first authorization comprises at least one of identification data, customer account data, a customer identifier, or a password. 16. The method of claim 14, wherein the first authorization comprises at least one of identification data, customer account data, a customer identifier, or a password. 17. The method of claim 13, wherein the predetermined act comprises a least one of identification, verification, authorization, renewal, or extension. 18. The method of claim 14, wherein the predetermined act comprises a least one of identification, verification, authorization, renewal, or extension. 19. The method of claim 13, wherein the first authorization is capable of reactivation after expiration. 20. The method of claim 14, wherein the first authorization is capable of reactivation after expiration. 21. The method of claim 13, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network from a service facility. 22. The method of claim 14, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network from a service facility. 23. The method of claim 13, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network on a peer-to-peer basis. 24. The method of claim 14, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network on a peer-to-peer basis. 25. A non-transitory computer-readable medium having computer-executable instructions stored thereon, which, when executed by a computing device, cause the computing device to perform a method of accessing works by a user device in a data communication network, the method comprising: requesting, in a first request, access to at least one catalog stored in a memory of a remote computing device, wherein the at least one catalog is configured to reference at least a first work and a second work, wherein the first work is different from the second work, wherein each of the first work and the second work is selectable by a user from the at least one catalog, wherein a first data file comprises at least a portion of the first work, wherein a second data file comprises at least a portion of the second work, wherein the first data file is different from the second data file, wherein each of the first data file and the second data file is capable of transmission to a user device over the communications network, wherein each of the first data file and the second data file is capable of play on a software player associated with the user device, wherein each of the first data file and the second data file is encrypted prior to play, wherein at least a portion of the first data file is configured to reside in main memory on the user device at the time of play of the first data file, wherein at least a portion of the second data file is configured to reside in main memory on the user device at the time of play of the second data file, and wherein either:the first data file and the second data file each comprises at least one musical recording, orthe first data file and the second data file each comprises at least one moving image;receiving the access to the at least one catalog in response to the first request;receiving a requirement for a first authorization, which first authorization is configured to enable at least one of transmission or play of at least a portion of each of the first data file and the second data file, wherein the first authorization is configured to expire with respect to both the first data file and the second data file if at least one predetermined act is not performed by or on behalf of the user within a predetermined period of time, wherein the at least one predetermined act and the predetermined period of time are the same for both the first data file and the second data file, wherein the first authorization is usable across at least two logon sessions within the predetermined period of time; andreceiving, at the user device, at least a portion of each of the first data file and the second data file;wherein the at least one of transmission or play of at least a portion of each of the first data file and the second data file is configured to be at least one of limited or inhibited after the expiration of the first authorization. 26. The non-transitory computer-readable medium of claim 25, wherein the first data file is configured to reside in non-volatile memory on the user device at the time of play of the first data file, and wherein the second data file is configured to reside in non-volatile memory on the user device at the time of play of the second data file. 27. The non-transitory computer-readable medium of claim 25, wherein the first authorization comprises at least one of identification data, customer account data, a customer identifier, or a password. 28. The non-transitory computer-readable medium of claim 26, wherein the first authorization comprises at least one of identification data, customer account data, a customer identifier, or a password. 29. The non-transitory computer-readable medium of claim 25, wherein the predetermined act comprises a least one of identification, verification, authorization, renewal, or extension. 30. The non-transitory computer-readable medium of claim 26, wherein the predetermined act comprises a least one of identification, verification, authorization, renewal, or extension. 31. The non-transitory computer-readable medium of claim 25, wherein the first authorization is capable of reactivation after expiration. 32. The non-transitory computer-readable medium of claim 26, wherein the first authorization is capable of reactivation after expiration. 33. The non-transitory computer-readable medium of claim 25, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network from a service facility. 34. The non-transitory computer-readable medium of claim 26, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network from a service facility. 35. The non-transitory computer-readable medium of claim 25, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network on a peer-to-peer basis. 36. The non-transitory computer-readable medium of claim 26, wherein at least a portion of each of the first data file and the second data file is capable of transmission to the user device over the communications network on a peer-to-peer basis.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (39)
Walker Robin D. (Glasgow GB6), Code operated access control system for electronic data store.
Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
Grady John ; Hand Kenneth ; Modrowsky John ; Richard ; III Arthur A., Method and system for accessing multimedia data over public switched telephone network.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Hendricks John S. (Potomac MD) Wunderlich Richard E. (Alpharetta GA), Operations center with video storage for a television program packaging and delivery system.
O'Rand Michael G. ; Widgren Esther E. ; Richardson Richard T. ; Lea Isabel A., Sperm antigen corresponding to a sperm zona binding protein autoantigenic epitope.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.