Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Patent
1997-05-09
2000-08-29
Trammell, James P.
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
705 51, 705 14, 705 27, 707500, 707530, 707540, 709200, 709206, G06F 1338, G06F 1214
Patent
active
061121924
ABSTRACT:
A method of customizing and modifying program material to tailor it to a receiving end user or client. When program material is to be generated for future customization or modification, an encrypted license tag is associated with the program material. When examining putatively modifiable program material for possible modification, a license tag is decrypted. If clear text results then the putatively modifiable program material is established to be modifiable or customizable. Then the program material is modified or customized to suit the profile of a client or end user who is to receive this customized program material. With the encrypted license tag, the owner of the program material can control the modifications made to his or her program material.
REFERENCES:
patent: 5138712 (1992-08-01), Corbin
patent: 5155591 (1992-10-01), Wachob
patent: 5428778 (1995-06-01), Brookes
patent: 5446919 (1995-08-01), Wilkins
patent: 5459306 (1995-10-01), Stein et al.
patent: 5515098 (1996-05-01), Carles
patent: 5553143 (1996-09-01), Ross et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5886732 (1999-03-01), Humpelman
patent: 5887133 (1999-03-01), Brown et al.
patent: 5978579 (1999-11-01), Buxton et al.
patent: 5983351 (1999-11-01), Giogau
patent: 6026369 (2000-02-01), Capek
patent: 6038597 (2000-03-01), Van Wyngarden
Export Control News, v4, n9, pN/A, "Deciphering Encryption Controls", Sep. 21, 1990.
IBM Corporation, "Identifying and Tracking Copyright Source: An Automated Process for Handling Copyrighted Information", 1994.
Eric Hall, Network Computing, "Adding Interactive Services to Your Web Server", Jan. 16, 1996.
Chikaraishi et al, Proceedings of the International Conference on Software Maintenance, "An Independent Software-Modification Method", Jan. 1, 1995.
Martin Heller, Windows Magazine Issue: 708 p.: 309, "Prevent Pirages From Copping Controls--Protect Active X controls from Web pirates without inconveniencing legitimate users", Jul. 8, 1996.
Kohda et al., Ubiquitous advertising on the WWW: merging advertisement on the browser, IN Comput. Netw. ISDN Syst. (Netherlands) fifth International World Wide Web Conference, Paris, France, Jun. 5, 1996.
Cameron Douglas W.
Dougherty Anne V.
International Business Machines Corp.
Nguyen Nga B.
Trammell James P.
LandOfFree
Method for providing individually customized content in a networ does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for providing individually customized content in a networ, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for providing individually customized content in a networ will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1258952