Method for selling, protecting, and redistributing digital...

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S052000, C705S057000, C705S059000, C705S067000, C705S068000, C713S172000, C713S189000, C713S152000

Reexamination Certificate

active

09942232

ABSTRACT:
This is a method for limiting access to selected features of a freely distributed multimedia file, by disabling selected features of the file (using encryption, compression, or other access denial), distributing the file with some enabled features as an inducement to new users, and offering to enable more features when a new user attempts to use a disabled feature. A licensing system then receives a request from the user's system, identifying a specific operating context and one or more features desired by the corresponding user. Accounting is done and an authorization is sent to the user or the user's system to enable the features. However, the authorization is uniquely associated with the measured operating context of the user and the features remain enabled only for said operating context, thus limiting full operation to authorized users, while permitting new users access to limited operations.

REFERENCES:
patent: 3609697 (1971-09-01), Blevins et al.
patent: 3798605 (1974-03-01), Feistel
patent: 3806882 (1974-04-01), Clarke
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4168396 (1979-09-01), Best
patent: 4253157 (1981-02-01), Kirschner et al.
patent: 4278837 (1981-07-01), Best
patent: 4319079 (1982-03-01), Best
patent: 4433207 (1984-02-01), Best
patent: 4458315 (1984-07-01), Uchenick
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4593376 (1986-06-01), Volk
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4688169 (1987-08-01), Joshi
patent: 4740890 (1988-04-01), William
patent: 4747139 (1988-05-01), Taaffe
patent: 4796220 (1989-01-01), Wolfe
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4827508 (1989-05-01), Shear
patent: 4864494 (1989-09-01), Kobus, Jr.
patent: 4864616 (1989-09-01), Pond et al.
patent: 4888798 (1989-12-01), Earnest
patent: 4924378 (1990-05-01), Hershey et al.
patent: 4991208 (1991-02-01), Walker et al.
patent: 4998279 (1991-03-01), Weiss
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5010571 (1991-04-01), Katznelson
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5027398 (1991-06-01), Miyoshi
patent: 5046090 (1991-09-01), Walker et al.
patent: 5046092 (1991-09-01), Walker et al.
patent: 5047928 (1991-09-01), Wiedemer
patent: 5054064 (1991-10-01), Walker et al.
patent: 5058162 (1991-10-01), Santon et al.
patent: 5065429 (1991-11-01), Lang
patent: 5070479 (1991-12-01), Nakagawa
patent: 5093921 (1992-03-01), Bevins, Jr.
patent: 5099516 (1992-03-01), Durkin et al.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5113518 (1992-05-01), Durst, Jr. et al.
patent: 5117458 (1992-05-01), Takaragi et al.
patent: 5119319 (1992-06-01), Tanenbaum
patent: 5126728 (1992-06-01), Hall
patent: 5166886 (1992-11-01), Molnar et al.
patent: 5199066 (1993-03-01), Logan
patent: 5222134 (1993-06-01), Waite et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5257373 (1993-10-01), Kurihara et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5291598 (1994-03-01), Grundy
patent: 5305447 (1994-04-01), Hampshire
patent: 5337360 (1994-08-01), Fischer
patent: 5363483 (1994-11-01), Jones et al.
patent: 5438508 (1995-08-01), Wyman
patent: 5479509 (1995-12-01), Ugon
patent: 5490216 (1996-02-01), Richardson, III
patent: 5509070 (1996-04-01), Schull
patent: 5530752 (1996-06-01), Rubin
patent: 5606609 (1997-02-01), Houser et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5649013 (1997-07-01), Stuckey et al.
patent: 5754864 (1998-05-01), Hill
patent: 5765152 (1998-06-01), Erickson
patent: 5790664 (1998-08-01), Coley et al.
patent: 5794142 (1998-08-01), Vanttila et al.
patent: 6243692 (2001-06-01), Floyd et al.
patent: 6256393 (2001-07-01), Safadi et al.
patent: 6266654 (2001-07-01), Schull
patent: 6298317 (2001-10-01), Wiemann
patent: 6343295 (2002-01-01), MacLeod et al.
patent: 6434558 (2002-08-01), MacLeod et al.
patent: 6480959 (2002-11-01), Granger et al.
patent: 6966002 (2005-11-01), Torrubia-Saez
patent: 2003/0191719 (2003-10-01), Ginter et al.
patent: 2005/0044367 (2005-02-01), Gasparini et al.
patent: 2005/0186933 (2005-08-01), Trans
patent: 0 084 441 (1982-01-01), None
patent: 0 128 672 (1983-05-01), None
patent: 0 197 963 (1984-10-01), None
patent: 0 180 460 (1985-05-01), None
patent: 0 469 864 (1990-07-01), None
patent: 0 593 305 (1992-10-01), None
patent: 2136175 (1983-03-01), None
patent: WO 85/02310 (1983-11-01), None
patent: WO 90/02382 (1988-08-01), None
patent: WO 93/01550 (1991-07-01), None
patent: WO 98/16882 (1996-10-01), None
Anguita, Davide, “Smart Adaptive Systems: State of the Art and Future Directions of Research”, DIBE, University of Geneva, from the Internet at www.eunite.org, 2001.
Best, Robert M., “Preventing Software Piracy with Crypto-Microprocessors”, Digest of Papers, VLSI: New Architectural Horizons, Feb. 25-28, 1980, pp. 466-469.
Blom, Rolf, et al., “Encryption Methods in Data Networks”, Erickson Technics, No. 3, 1976, pp. 74-105.
Brändli, Martin, “A Process-Oriented Approach for Representing Lineage Information of Spatial Data”, 3rdAGILE Conference on Geographic Information Science, Helsinki/Espoo, Finland, May 25-27, 2000, pp. 126-130.
Diffie, Whitfield and Hellman, Martin E., “New Directions in Cryptography”, IEEE Transaction on Information Theory, vol. RR22, No. 6, Nov. 1976, pp. 644-653.
Diffie, Whitfield and Hellman, Martin E., “Privacy and Authentification: An Introduction to Cryptography”, Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, pp. 397-427.
Electronic Publishing Resources, Inc. “Protecting Electronically Published Properties Increasing Publishing Profits”,. Chevy Chase, Maryland, pp. 1-8.
Goulde, Michael A., “Unix and NT Challenge”, Computerworld, Jul. 28, 1997, pp. 1-3.
Guillou, Louis C., “Smart Cards and Conditional Access”, Advances in Cryptology—Proceedings of EUROCRYPT 84, Editions Springer-Verlag, 1985, pp. 480-489.
Harrison, David R., “Client/Server Operating Systems: Challenges on All Fronts”, Network Computing, No. 508, 1994, pp. 1-3.
Herzberg, Amir and Pinter, Shlomit S., “Public Protection of Software”, ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393.
Kent, Stephen Thomas, “Protecting Externally Supplied Software in Small Computers”, Laboratory for Computer Science, Massachusetts Institute of Technology, Sep. 1980, pp. 1-253.
Mori, R. et al., “Superdistribution: The Concept and the Architecture”,The Transactions of the IEICE, vol. E 73, No. 7, 1990, Tokyo, JP, pp. 1133-1146*Translation Only*.
Variar, Ganesh, “The Origin of Data”, IntelligentEnterprise, from the Internet at www.intelligententerprise.com/020201/503feat3—1.shtml, Feb. 1, 2002, pp. 1-6.
Weingart, Steve H., “Physical Security for the μABYSS System”, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, 1987.
White, Steve R. and Comerford, Liam, “ABYSS: A Trusted Architecture for Software Protection”, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, 1987, pp. 38-51.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for selling, protecting, and redistributing digital... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for selling, protecting, and redistributing digital..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for selling, protecting, and redistributing digital... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3796766

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.