WO1999052053A2 - Method for computer network operation providing basis for usage fees - Google Patents
Method for computer network operation providing basis for usage fees Download PDFInfo
- Publication number
- WO1999052053A2 WO1999052053A2 PCT/IB1999/000581 IB9900581W WO9952053A2 WO 1999052053 A2 WO1999052053 A2 WO 1999052053A2 IB 9900581 W IB9900581 W IB 9900581W WO 9952053 A2 WO9952053 A2 WO 9952053A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer system
- network
- node
- content
- identifier
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 76
- 230000004044 response Effects 0.000 claims abstract description 14
- 238000012546 transfer Methods 0.000 abstract description 40
- 238000013475 authorization Methods 0.000 abstract description 3
- 230000008569 process Effects 0.000 description 36
- 238000004891 communication Methods 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 9
- 239000000463 material Substances 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000004308 accommodation Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000001472 potassium tartrate Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/29—Payment schemes or models characterised by micropayments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
Definitions
- the present invention relates to computer networks for data transfer and to monitoring use of such data for example for fee accounting for usage rights.
- Owners of rights in electronically published works also desire to prevent the unauthorized and unaccounted distribution or usage of such materials.
- records of the distribution and usage of a work are held exclusively by the distributor, falsification of records results in increased profit for the distributor and loss of royalty income for the owner of rights.
- Unauthorized and unaccounted distribution can be curbed by preventing unauthorized copying of the work onto digital storage media and unauthorized transmission of the work over computer networks. Unauthorized and unaccounted usage can be curbed by preventing storage of the work for reuse or by monitoring the use of stored copies.
- Existing systems and methods for preventing storage, transmission, and unmonitored use of digital works place a heavy burden of cost on the consumer desiring access to a work in digital form. The continued expansion of publication and use of works in digital form cannot remain within the policies for intellectual property protection (such as providing incentives to authors and publishers) without systems and methods for computer network operation that provide an accurate basis for usage fees.
- a system for the control of distribution and use of digital works includes a distribution and usage reporting mechanism for accurately calculating fees associated with such distribution and use.
- the system operates according to a method for transferring data from a content providing node to a content requesting node.
- the method includes the steps of: (a) transmitting a first request to the content providing node, the first request for notifying an authorizing node; (b) receiving a permit from the authorizing node in response to the notification; (c) determining a file name in response to the permit; (d) transmitting to the content providing node a second request comprising the file name; (e) transmitting to an event reporting node a first report in response to receiving the permit; (f) receiving data from the file; and (g) transmitting to the event reporting node a second report in response to receiving the file.
- the content requesting node has an incentive to manipulate the authorizing node in order to receive unlimited authorization.
- the content providing node has an incentive to maintain proper authorization because revenues to the content providing node may be based on the number of authorized transfers.
- the content providing node may be prevented from obtaining information leading to the filenames that comprise the work.
- the content providing node may have an incentive to provide free transfers of the work for other commercial or personal use; however, by determining the file name in response to the permit and preventing access to the permit from the content providing node, the content providing node cannot identify particular files that correspond to a particular work.
- By transmitting reports from the content requesting node to an event reporting node modification of data transfer reports by the content providing node is prevented. Accurate records provide basis, for example, for fees payable to owners of rights in the work.
- a duration of the usage of the data may be used as a basis, for example, for revenues to distributors and payments to owners of rights. Falsification of the duration of usage by the content requesting node is prevented.
- FIG. 1 is a block diagram of a network in one embodiment of the present invention.
- Fig. 2 is a data flow diagram for a portion of the network of Fig. 1 that, inter alia, creates content files on a content providing node.
- Fig. 3 is a data flow diagram for a portion of the network of Fig. 1 that, inter alia, satisfies a data transfer request.
- Fig. 4 is a data flow diagram for a portion of the network of Fig. 1 that, inter alia, accomplishes payments, for example, to owners of rights in data transferred.
- Fig. 5 is a table of outcomes for lost transmissions of reports.
- Fig. 6 is a functional flow diagram for a portion of a method of validating a request by an authorizing node.
- Fig. 7 is a functional flow diagram for a portion of a method of creating a permit by an authorizing node.
- Fig. 8 is a functional flow diagram for a portion of a method of validating a permit by a content requesting node.
- Fig. 9 is a functional flow diagram for a portion of a method of reporting, by a content requesting node, a start of data transfer.
- Figs. 10 through 1 2 are functional flow diagrams for portions of a method of obtaining and using content files and reporting a summary of data transfer.
- Fig. 1 3 is a memory map of a data structure of a map file of the present invention.
- Fig. 14 is a memory map of a data structure of a header of a content file of the present invention.
- Fig. 1 5 is a memory map of a data structure of a request of the present invention.
- Fig. 1 6 is a memory map of a data structure of a permit of the present invention.
- Fig. 17 is a memory map of a data structure of a start report of the present invention.
- Fig. 1 8 is a memory map of a data structure of a summary report of the present invention.
- Fig. 19 is a memory map of a data structure of an access report of the present invention.
- Fig. 20 is a memory map of a data structure of a debit report of the present invention.
- a communication network of the present invention includes at least one computer system at each of several network nodes. Each node is coupled by a link from time to time for communication with other nodes of the network. Each link includes conventional computer communication technology of the type including, for example, local area, wide area, dedicated telephone, or satellite services and including conventional data communication hardware and software.
- the popular computer networks known as the Internet, World Wide Web, and National Information Infrastructure are examples of such a communication network having nodes possibly at physically separate locations and addressed by a node address, for example a uniform resource locator (URL), a name from a domain name system (DNS), or an Internet Protocol address (IP).
- URL uniform resource locator
- DNS domain name system
- IP Internet Protocol address
- Communication network 100 of Fig. 1 includes computer systems, each shown in a block, that communicate for data transfer. Communication of messages is illustrated by one or more lines between blocks, though it is apparent that one communication link between any two blocks is sufficient for any number of message lines. Practice of variations of the invention is independent of whether such a link is maintained continuously, as in a dedicated line, or is maintained for the duration of the message as in some public multiple access facilities.
- Communication technology provides known mechanisms and computer software for message transfer. This technology surrounds the message content data with other data that provide a mechanism for various purposes including tracking messages, synchronizing equipment, and assuring accurate and secure transfer of message content data.
- digital works are transferred between nodes.
- Network 100 includes content acquisition node 102, content managing node 104, provider preparation node 106, content providing node 108, content requesting node 1 10, authorizing node 1 1 2, banking node 1 14, event reporting node 1 1 6, and reconciling node 1 18.
- the content is first received from a source and formatted for storage on one or more of perhaps thousands of content providing nodes.
- a content developer, publisher, or distributor provides digital works, for example multimedia files, to content acquisition node 102 for encoding in a format efficient for storage and access by content managing node 104.
- Content is conveyed on line 130 as it becomes available for management by content managing node 104.
- Content from content managing node 104 is conveyed on line 1 32 and then made unique to each content providing node 108 by formatting processes performed by provider preparation node 106.
- Content providing node 108 receives content from time to time from provider preparation node 106 on line 134.
- a user or consumer at content requesting node 1 10 uses a network browser, such as
- a permit is a message created to uniquely respond to the request from a particular content requesting node. Using portions of the permit, content requesting node 1 10 requests on line 1 36 particular files from content providing node 108. In response, such particular files are conveyed on line 148 to content requesting node 1 10, completing the data transfer.
- Accounting for the above described transfer of content includes, for example, receiving payment from the user of content requesting node 1 10, making payment for distribution services to at least the operator of content providing node 108, and making payment to one or more owners of rights in the content.
- These accounting transactions find accurate basis in a reconciliation of reports from a variety of network nodes that are reported at separate times during the data transfer process. For example, when authorizing node 1 1 2 receives the request and queries an access authority data base on content managing node 104 via lines 140 and 142, content managing node 104 logs the query and reports the log on line 1 56 from time to time to reconciling node 1 18.
- authorizing node With knowledge of the identity of content requesting node 1 10, an identity of the user, and a price of the requested work for a requested purpose (for example, copy or preview), authorizing node confirms a debit of an account kept on banking node 1 14 by messages conveyed on line 144.
- Banking node 1 14 logs the debit and reports the log on line 1 54 from time to time to reconciling node 1 1 8.
- content requesting node 1 10 reports on line 150 to event reporting node 1 1 6.
- Event reporting node 1 1 6 logs the events and from time to time reports the log on line 1 52 to reconciling node 1 1 8.
- reconciling node 1 18 By comparing reports received on lines 1 52, 1 54, 1 56, and possibly 1 58 (from content providing node 108), reconciling node 1 18 distinguishes valid complete data transfers from incomplete transfers and from events that could indicate intentional interference with the integrity of network 100. For each valid complete transfer, reconciling node 1 1 8 allocates revenues generated from the debits of users' accounts, discussed above with reference to line 144. Reconciling node 1 18 then initiates funds transfers with messages to banking node 1 14 on line 1 60 for payments of, for example, distribution fees and royalties.
- Each node of network 100 may represent more than one conventional computer system that performs, inter alia, methods of the present invention. Multiple computers or multiple data storage devices may be necessary for maintaining a particular node's functions operational in periods of high network traffic. Such multiple computers may be at various physical locations, provided that only one network node address (for example, an IP address) is associated with each node.
- a method of the present invention for preparing content for storage on a content providing node includes separation of content and map information. When content is divided for convenience into several files in a conventional file storage system, map information identifies the particular files from the entire inventory on the storage system and the order of presentation of the files for reconstituting a particular work. Separation of content and map information facilitates security measures without unduly compromising rapid provision of a work or performance of a work on a content requesting node.
- contract items may additionally include: name of the album, producer, label, publisher, mail order company, publishing year, bar code, album and track distribution levels, title of a track, performers, authors, composers, ISRC code for the title, language, track number, duration, extract start and end times, number of allowed copies, price to preview (listen), price to make copy, rights collecting societies, authorized distribution areas, album cover picture, liner notes, other graphics, music style, associated country, and possibly pictures associated with the recording and text to be shown while the work is being played.
- Receiver processes 204 and 206 (using conventional communication and data storage technology) on content managing node 104, receive the encoded contract items and content and store each respectively on access authority data base (AADB) 208 and content masters store 210.
- AADB access authority data base
- Receiver processes 204 and 206 (using conventional communication and data storage technology) on content managing node 104, receive the encoded contract items and content and store each respectively on access authority data base (AADB) 208 and content masters store 210.
- AADB access authority data base
- 210 access authority data base
- Scrambling is a preferred (though weak) form of encryption that allows some security without unduly burdening data transfer or use of the work when requested.
- the scrambled result of a work is combined with a header, which includes encrypted data from access authority data base 208, to form one or more content files.
- Content files 21 7 are transferred for storage on store 216 of content providing node 108.
- Process 21 2 prepares map files 21 8 for transfer and storage on store 21 6.
- Descriptors of the work, of the content files, and of content providing node 108 are obtained from AADB 208 and formatted and encrypted by process 21 2 (using conventional data formatting and encryption technology). Some or all of the descriptors, alone or in combination, may be subject to rigorous encryption.
- the map file permits content file locations to be random or at least unpredictable in store 21 6, substantially decreasing the likelihood of unauthorized access without the system performance penalties associated with encrypting content files 21 8 on store 21 6.
- the map file includes a version number of a group of content files and a node address and pathname to each content file of the group.
- the node address corresponds to the unique node address of the content providing node for which content files are being prepared.
- Each node address and pathname is encrypted separately.
- Each content file of the group provides a different level of sound quality for the same audio material. Different levels of quality provide, for example, flexibility in meeting the audio fidelity of different content requesting nodes.
- Fig. 13 illustrates an example map file data structure 1 300 when instantiated in memory at provider preparation node 106.
- Fig. 14 illustrates an example data structure 1400 of a header of a content file when instantiated in memory at provider preparation node 106.
- Content files 21 7 and map files 218 are organized for convenient access on store 216 using a conventional file system such as a directory system, shadowed physical drives, or a RAID system.
- many content acquisition nodes may supply content to content managing node 104.
- Many content providing nodes may be supplied with content files from content managing node 104. Due to differing security and traffic support requirements, it is preferred to operate network 100 with physically separate nodes 104 and 106.
- the functions of nodes 104 and 106 may be combined on one node or combined with content acquisition node
- Various methods of the present invention for data transfer use to advantage (a) the cooperation of several network nodes, (b) linking a request through a registered node, (c) creating a permit using data from multiple sources, (d) using encryption, current time of day, or encryption keys based on unique properties of a node, and/or (e) providing unique structures and separate access to content files and map files.
- a data transfer begins at content requesting node (CRN) 1 10.
- CRN content requesting node
- Process 302 uses a conventional browser and operating system
- Process 302 responds to user input, for example a mouse switch closure ("click") when an on-screen cursor points to a portion of an HTML page identifying a title, and in the conventional manner generates a message 303 to content providing node (CPN) 108.
- Process 304 (using conventional HTTP message technology) forwards the request 305 to authorizing node (AN) 1 1 2.
- Fig. 1 5 illustrates an example request data structure 1 500 when instantiated in memory at authorizing node 1 1 2.
- process 304 determines the price to be billed for the request type and title and includes price and price currency with the forwarded request.
- Price information is stored in file 306 which is available for editing by the operator of content providing node 108.
- validate payment process 310 obtains price information via the associated map file from each content file after the validity of the request has been determined.
- Process 308 validates the request by denying further processing to requests that do not meet predetermined criteria.
- process 308 includes the steps beginning at step 600.
- the node address of content providing node (CPN) 108 is obtained from access authority data base (AADB) 208.
- AADB access authority data base
- the CPN node address as provided in request 305 is compared to the CPN node address as provided from AADB 208. If a match is found, control passes to step 606, else to step 608 where the request is ignored.
- the node address of the calling page (which contains the link that was followed by process 302) is compared to the CPN node address provided by AADB 208. If a match is found, the request is considered valid and control passes to process 310, else to step 608 where the request is ignored.
- Process 310 validates payment by the user by confirming that the user (via pay price process 310) has made a proper debit on the user's account. If a debit cannot be confirmed, request 305 is ignored. If confirmation of the debit transaction is successful, control passes to process 31 2.
- Process 312 creates a permit by combining information from more than one source.
- process 31 2 includes the steps beginning at step 700.
- a map file 31 5 for the requested content is obtained either from the request or from store 216 on content providing node 108.
- content providing node address, content price, and price currency are obtained from request 305.
- local date and time are obtained from the authorizing node 1 1 2.
- These data items are arranged, for example, in data structure 1 600 instantiated in memory of authorizing node 1 1 2, as illustrated in Fig. 1 6.
- some or all data in permit data structure 1600 are encrypted to provide permit 31 3.
- permit 31 3 is sent to content requesting node 1 10.
- Process 314 validates the permit by stopping the transaction for permits that do not meet predetermined criteria.
- process 314 includes the steps beginning at step 800.
- step 802 that portion of the permit that is encrypted is decrypted.
- step 804 the syntax of each content file location (content. CPN. node address. pathname) is checked. The several pathnames in the permit provide ready access to the content file matching the sound quality level specified in request 305 (see Fig. 1 5, request. sound. quality). If the syntax check fails, control passes to step 810 to stop the transaction. Otherwise control passes to step 806 where the content requesting node address provided in permit 31 3 is compared to the node address of content requesting node 1 10. If no match, control is transferred to step 810.
- Process 316 reports the start of a data transfer between content providing node 108 and content requesting node 1 10. Generation of the report may occur before data transfer actually starts or during an initial phase of data transfer. A start report is made to one or more event reporting nodes as specified by a list on content providing node 108.
- the report is transmitted by packet message techniques on a separate port so as to avoid interference with the data transfer itself which may be underway on another port.
- the two ports may share the same communication hardware such as a single line to an Internet Service Provider, as is well known in applications of TCP/IP.
- concurrent ports may be arranged on two or more hardware communication links.
- process 316 includes the steps beginning at step 900.
- one or more event reporting node addresses and the content managing node address are obtained from list 31 8 on content providing node 108.
- a port is opened for each event reporting node on list 318.
- ports 1000 through 101 6 are used, although other port numbers may be equivalently accommodated by the communication software on content requesting node 1 10. If no event reporting node successfully responds after attempts have been made to couple it for communication, then either the transaction is stopped or the transaction continues without the capability to generate reports.
- a port is opened for reporting to content managing node 104, using the next available port number from the range 1000 through 101 6.
- Fig. 1 7 illustrates a start report data structure 1 700 when instantiated in memory at content requesting node 1 10.
- data structure 1 700 such data includes the content requesting node address, the username and password, and the price, currency, and specified sound quality.
- data from permit 31 3 is added to the start report data structure.
- data structure 1 700 such data includes the content file location for the specified sound quality level, i.e. a corresponding content. CPN. node. address. pathname. quality. level.
- data from the content file header is added to the start report data structure.
- data include the title, artist, copyright, duration, ID. code.
- step 914 local values of the content requesting node are added to the start data structure.
- such values include a transaction number for discriminating reports from the same user, the current date and time, an encryption key unique to the content requesting node, and values from which the country in which content requesting node 1 10 is located. These later values include in one variation of the present invention, the time zone, the language identified by the operating system of node 1 10 and the keyboard identified by the operating system of node 1 10.
- Country location is important to allocating royalties under the laws that vary from one jurisdiction (country) to another.
- the report is placed in final format using conventional techniques and at step 91 8 it is sent to each event reporting node, for example node 1 16, and to content managing node 104.
- Process 320 obtains and uses the requested content files. After a content file header has been received by process 320, the transaction may be stopped if contents of the header do not compare favorably with the permit. In one variation, a summary report is prepared before data transfer of all requested files is complete. Further requests for files may be made in response to receiving an acknowledgment that the summary report has been received by the event reporting node. In a second variation, a duration of use of the files is measured and reported in a summary report, prepared and sent after all files have been received or usage is determined to be substantially completed. In the later case, shown in Fig. 10, process 320 includes the steps beginning at step 1000. At step 1002, a port is opened for content provider node file transfer (in addition to ports opened for reporting as discussed above).
- the header of the requested content file is obtained.
- the pathname to this content file is provided in permit 31 3 for a corresponding sound quality of content requesting node 1 10.
- the header of the specified content file is decrypted.
- step 1008 if the content providing node address in the obtained content file header does not match the content providing node address as permitted, the transaction stops at step 1010. Otherwise, control passes to step 1012.
- the usage mode as permitted is compared to the usage mode as requested.
- the user specifies a usage mode at the time of picking a title for a digital work to facilitate calculation of an appropriate price. For example, in many cases, the price for previewing a work (as in listening to a portion of an audio work) is less than the price for making a copy of a work for unlimited use. If the requested and permitted usage modes both indicate a copy is to be made, that is, the data transferred will be stored for repeated use, then control passes to step 1202 on Fig.
- Steps 1 102 through 1 108 obtain all subsequent blocks of the requested content file and, after each block is received, perform the digital work according to the data in that respective block. Unscrambling of the data may be required. Performance or preview may be, for example one or more of the following: playing audio, showing visual, performing multimedia, or executing computer program digital works. For example, when an audio file is being received, unscrambling is performed and the resulting data may be played without interruption.
- Fig. 1 8 illustrates a summary report data structure 1 800 when instantiated in memory at content requesting none 1 10.
- data items from start report structure 1 700 (having the same names) are formatted in summary report data structure 1 800.
- the summary report is sent through ports opened in steps 902 and 904 to one or more event reporting nodes. The transaction is completed at step 1 1 14. If at step 101 2, a copy of the work has been permitted, control passes to step 1 202.
- a destination file for receiving the digital work is opened on the content requesting node 1 10.
- an encryption key is prepared using conventional data security technology.
- the content file header is obtained and written to the destination file.
- each block of the requested content file is obtained, encrypted, and written to the destination file.
- the destination file is closed.
- the transaction is completed.
- Fig. 19 is a memory map of data structure 1900 of an access report record when instantiated in memory of content managing node 104 or reconciling node
- Report 342 is provided by banking node 1 14 from debit transactions requested by process 310 of authorizing node 1 1 2.
- Fig. 20 is a memory map of a data structure of a debit report record when instantiated in memory of banking node 1 14 or reconciling node 1 1 8.
- Reports 326 and 328 respectively provide the start and summary information from content requesting node 1 10.
- Data structures 1 700 and 1 800 correspond to a single record of the start report and summary report respectively when instantiated in memory of reconciling node 1 18.
- report 336 describing what content files were sent and when sent may be generated by content providing node 108.
- Each report consists of multiple records, each record having multiple fields.
- an access report record 1 900, debit report record 2000, start report 1 700, and summary report 1 800 may each include a tracking field for the value: request. CRN. node. address. transaction. number.
- content requesting node 1 10 may receive such a tracking field value with the permit.
- a method for reconciling reports of the present invention includes accommodations for high volume event report processing.
- reconciled reports may be used to identify nodes having suspect operations and thereby provide a way of detecting unauthorized copying and use of digital works.
- unauthorized use may be blocked. For example, if unauthorized transactions frequently involve the same content providing node address, that node address may be deleted from the list of registered content providing nodes by an appropriate operation on AADB 208.
- Event reporting node 1 16 receives start report 326 and summary report
- Each report is logged as an event by process 402 using conventional database technology.
- Logged events are stored for a time in events data base 404. Synchronization of multiple parallel event reporting nodes may result in additional database transactions by event reporting node 1 1 6 as to records in events data base 404.
- Process 406 using conventional data base technology, accomplishes the comparison of records having one or more respective field values that are identical. In one variation, the tracking field is used exclusively. Table 502 in Fig. 5 identifies results of reconciliation for several combinations of reports being reconciled. If for a given tracking field value (or at a given time, date, content requesting node, and content providing node), reports A 332, B 342, C 326, D 328, and possibly E 336 have been logged, then a group of messages accomplishing a normal request and payment for data transfer can be inferred to have been completed successfully. Allocation of earnings by process 408 follows the identification of such a reconciliation result.
- Allocation of earnings by process 408 is consummated by generating, according to conventional banking messaging and data base technology, requests for funds transfer by process 410 in banking node 1 14.
- network 100 overcomes the problems of the prior art and provides a basis for accurate allocation of earnings to the owners of rights in digital works stored on systems of the present invention or transferred according to methods of the present invention. These and other benefits are provided with lesser system performance penalties than heretofore possible.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000542725A JP2002510821A (en) | 1998-04-03 | 1999-04-02 | A computer network operating method that gives the standard of usage fee |
AU29506/99A AU2950699A (en) | 1998-04-03 | 1999-04-02 | Method for computer network operation providing basis for usage fees |
EP99910581A EP1075679A2 (en) | 1998-04-03 | 1999-04-02 | Method for computer network operation providing basis for usage fees |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/055,068 US6202056B1 (en) | 1998-04-03 | 1998-04-03 | Method for computer network operation providing basis for usage fees |
US09/055,068 | 1998-04-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999052053A2 true WO1999052053A2 (en) | 1999-10-14 |
WO1999052053A3 WO1999052053A3 (en) | 2000-02-03 |
Family
ID=21995371
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB1999/000581 WO1999052053A2 (en) | 1998-04-03 | 1999-04-02 | Method for computer network operation providing basis for usage fees |
Country Status (5)
Country | Link |
---|---|
US (7) | US6202056B1 (en) |
EP (1) | EP1075679A2 (en) |
JP (1) | JP2002510821A (en) |
AU (1) | AU2950699A (en) |
WO (1) | WO1999052053A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001063840A1 (en) * | 2000-02-23 | 2001-08-30 | Nokia Corporation | Method and system for preparing reports in a communication system comprising at least two networks |
JP2002014794A (en) * | 2000-06-30 | 2002-01-18 | Canon Inc | Print controller, portable terminal, server, print control method, data processing method of portable terminal, data processing method of server, and storage medium |
EP1276066A2 (en) * | 2001-07-10 | 2003-01-15 | Systemneeds Inc. | Licensing method and license providing system |
Families Citing this family (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7051004B2 (en) * | 1998-04-03 | 2006-05-23 | Macrovision Corporation | System and methods providing secure delivery of licenses and content |
US6202056B1 (en) * | 1998-04-03 | 2001-03-13 | Audiosoft, Inc. | Method for computer network operation providing basis for usage fees |
JP2000036781A (en) * | 1998-07-17 | 2000-02-02 | Sony Corp | Copyright managing device, work distributing device and work distribution/reception system |
JP3988274B2 (en) * | 1998-09-22 | 2007-10-10 | ソニー株式会社 | Information distribution apparatus, information distribution method, information reception apparatus, and information reception method |
US7017188B1 (en) * | 1998-11-16 | 2006-03-21 | Softricity, Inc. | Method and apparatus for secure content delivery over broadband access networks |
US6763370B1 (en) | 1998-11-16 | 2004-07-13 | Softricity, Inc. | Method and apparatus for content protection in a secure content delivery system |
AU3349500A (en) * | 1999-01-22 | 2000-08-07 | Tuneto.Com, Inc. | Digital audio and video playback with performance complement testing |
US6611813B1 (en) * | 2000-01-20 | 2003-08-26 | Listen.Com | Digital audio and video playback with performance complement testing |
US7099848B1 (en) | 1999-02-16 | 2006-08-29 | Listen.Com, Inc. | Audio delivery and rendering method and apparatus |
US7370071B2 (en) | 2000-03-17 | 2008-05-06 | Microsoft Corporation | Method for serving third party software applications from servers to client computers |
US7730169B1 (en) | 1999-04-12 | 2010-06-01 | Softricity, Inc. | Business method and system for serving third party software applications |
US6424998B2 (en) | 1999-04-28 | 2002-07-23 | World Theatre, Inc. | System permitting the display of video or still image content on selected displays of an electronic display network according to customer dictates |
US8099758B2 (en) | 1999-05-12 | 2012-01-17 | Microsoft Corporation | Policy based composite file system and method |
GB9914418D0 (en) * | 1999-06-22 | 1999-08-18 | Stringer Andrew M | Computer network payment system |
US8090619B1 (en) * | 1999-08-27 | 2012-01-03 | Ochoa Optics Llc | Method and system for music distribution |
US7647618B1 (en) | 1999-08-27 | 2010-01-12 | Charles Eric Hunter | Video distribution system |
US7209900B2 (en) * | 1999-08-27 | 2007-04-24 | Charles Eric Hunter | Music distribution systems |
US20060212908A1 (en) | 1999-08-27 | 2006-09-21 | Ochoa Optics Llc | Video distribution system |
US6647417B1 (en) | 2000-02-10 | 2003-11-11 | World Theatre, Inc. | Music distribution systems |
US6952685B1 (en) * | 1999-08-27 | 2005-10-04 | Ochoa Optics Llc | Music distribution system and associated antipiracy protection |
US6857106B1 (en) | 1999-09-15 | 2005-02-15 | Listen.Com, Inc. | Graphical user interface with moveable, mergeable elements |
JP3664230B2 (en) * | 1999-09-30 | 2005-06-22 | 株式会社日本コンラックス | Promotion method and system |
GB9925227D0 (en) * | 1999-10-25 | 1999-12-22 | Internet Limited | Data storage retrieval and access system |
KR100782255B1 (en) * | 1999-12-08 | 2007-12-04 | 리슨.컴 .인크. | Scheduled retrieval, storage and access of media data |
JP2003522356A (en) * | 1999-12-17 | 2003-07-22 | ワールド シアター,インコーポレイティド | Systems and methods for enabling customers to order selected products from a wide range of products offered by multiple participating merchants |
US6691163B1 (en) * | 1999-12-23 | 2004-02-10 | Alexa Internet | Use of web usage trail data to identify related links |
US9252898B2 (en) | 2000-01-28 | 2016-02-02 | Zarbaña Digital Fund Llc | Music distribution systems |
EP1256225B1 (en) * | 2000-02-04 | 2010-08-18 | Listen.Com, Inc. | System for distributed media network and meta data server |
US20030018581A1 (en) * | 2000-02-16 | 2003-01-23 | Bratton Timothy R. | Delivering media data to portable computing devices |
US20010046230A1 (en) * | 2000-03-14 | 2001-11-29 | Rojas Michael J. | Method and programmable device for telecommunications applications |
US7280982B1 (en) * | 2000-04-04 | 2007-10-09 | International Business Machines Corporation | System and method for a fee address system |
JP4708591B2 (en) * | 2000-04-14 | 2011-06-22 | キヤノン株式会社 | Information processing system, information processing apparatus, information processing method, and program |
AU2001271259A1 (en) * | 2000-06-28 | 2002-01-08 | Intertainer, Inc. | Intelligent media targeting system and method |
US20020007350A1 (en) * | 2000-07-11 | 2002-01-17 | Brian Yen | System and method for on-demand data distribution in a P2P system |
US7039594B1 (en) | 2000-07-26 | 2006-05-02 | Accenture, Llp | Method and system for content management assessment, planning and delivery |
US6826546B1 (en) * | 2000-08-17 | 2004-11-30 | Ideaflood, Inc. | Method and system for licensing a copy of a copyright protected work |
US7840691B1 (en) | 2000-09-07 | 2010-11-23 | Zamora Radio, Llc | Personal broadcast server system for providing a customized broadcast |
GB2383454B (en) * | 2000-10-13 | 2005-03-30 | Nds Ltd | Automated multi-level marketing system |
US20040010417A1 (en) * | 2000-10-16 | 2004-01-15 | Ariel Peled | Method and apparatus for supporting electronic content distribution |
US7054256B2 (en) * | 2000-10-20 | 2006-05-30 | Ochoa Optics Llc | High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes |
US7689705B1 (en) | 2000-10-27 | 2010-03-30 | Realnetworks, Inc. | Interactive delivery of media using dynamic playlist generation subject to restrictive criteria |
US7660902B2 (en) * | 2000-11-20 | 2010-02-09 | Rsa Security, Inc. | Dynamic file access control and management |
US7072867B2 (en) * | 2000-11-30 | 2006-07-04 | International Business Machines Corporation | System and method for third party logging server |
US7870592B2 (en) | 2000-12-14 | 2011-01-11 | Intertainer, Inc. | Method for interactive video content programming |
US20020083006A1 (en) * | 2000-12-14 | 2002-06-27 | Intertainer, Inc. | Systems and methods for delivering media content |
JP4216460B2 (en) * | 2000-12-26 | 2009-01-28 | パイオニア株式会社 | Information processing system, terminal device, and information processing method |
GB2372116A (en) * | 2001-02-08 | 2002-08-14 | Accenture | Multi-media management systems |
US8112311B2 (en) | 2001-02-12 | 2012-02-07 | Ochoa Optics Llc | Systems and methods for distribution of entertainment and advertising content |
DE10109441A1 (en) * | 2001-02-27 | 2002-09-12 | Mayah Comm Gmbh | Method for recognizing audio-visual data in transmission networks, in particular the Internet |
KR20020072453A (en) * | 2001-03-10 | 2002-09-16 | 삼성전자 주식회사 | Reproducing apparatus and additional information providing server system therefor |
US7908304B2 (en) * | 2001-03-15 | 2011-03-15 | Versata Development Group, Inc. | Method and system for managing distributor information |
US7925513B2 (en) | 2001-03-15 | 2011-04-12 | Versata Development Group, Inc. | Framework for processing sales transaction data |
US20030018481A1 (en) * | 2001-03-15 | 2003-01-23 | Cheng Zhou | Method and apparatus for generating configurable documents |
US7958024B2 (en) * | 2001-03-15 | 2011-06-07 | Versata Development Group, Inc. | Method and apparatus for processing sales transaction data |
US20020138576A1 (en) * | 2001-03-21 | 2002-09-26 | Schleicher Jorg Gregor | Method and system for generating revenue in a peer-to-peer file delivery network |
US7653552B2 (en) * | 2001-03-21 | 2010-01-26 | Qurio Holdings, Inc. | Digital file marketplace |
US20020138362A1 (en) * | 2001-03-21 | 2002-09-26 | Kitze Christopher Allin | Digital file marketplace |
US20020144283A1 (en) * | 2001-03-30 | 2002-10-03 | Intertainer, Inc. | Content distribution system |
US20020143647A1 (en) * | 2001-03-30 | 2002-10-03 | Intertainer, Inc. | Subscriber management system |
US6925469B2 (en) * | 2001-03-30 | 2005-08-02 | Intertainer, Inc. | Digital entertainment service platform |
US20020194143A1 (en) * | 2001-04-26 | 2002-12-19 | International Business Machines Corporation | Method and system for usage-based pricing of E-content |
US7505936B2 (en) * | 2001-05-11 | 2009-03-17 | Accenture Global Services Gmbh | Digital content subscription conditioning system |
US9633182B2 (en) | 2001-05-15 | 2017-04-25 | Altair Engineering, Inc. | Token based digital content licensing method |
US7895123B1 (en) | 2001-06-12 | 2011-02-22 | Accenture Global Services Limited | Digital content publication |
US7904326B2 (en) * | 2001-06-29 | 2011-03-08 | Versata Development Group, Inc. | Method and apparatus for performing collective validation of credential information |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US7249139B2 (en) | 2001-07-13 | 2007-07-24 | Accenture Global Services Gmbh | Secure virtual marketplace for virtual objects and services |
US7960005B2 (en) * | 2001-09-14 | 2011-06-14 | Ochoa Optics Llc | Broadcast distribution of content for storage on hardware protected optical storage media |
US8041803B2 (en) * | 2001-09-26 | 2011-10-18 | Qurio Holdings, Inc. | Method and system for delivering files in digital file marketplace |
US7233781B2 (en) | 2001-10-10 | 2007-06-19 | Ochoa Optics Llc | System and method for emergency notification content delivery |
US7299209B2 (en) * | 2001-10-18 | 2007-11-20 | Macrovision Corporation | Method, apparatus and system for securely providing material to a licensee of the material |
FI120778B (en) * | 2001-12-05 | 2010-02-26 | Sofia Digital Oy | Method and system for activating content |
JP2005512270A (en) | 2001-12-06 | 2005-04-28 | トヨタ モーター セールス, ユー.エス.エー, インコーポレイテッド | Vehicle player system |
US7552205B2 (en) * | 2002-05-21 | 2009-06-23 | Accenture Global Services Gmbh | Distributed transaction event matching |
US7519984B2 (en) * | 2002-06-27 | 2009-04-14 | International Business Machines Corporation | Method and apparatus for handling files containing confidential or sensitive information |
US20040015408A1 (en) * | 2002-07-18 | 2004-01-22 | Rauen Philip Joseph | Corporate content management and delivery system |
JP4777651B2 (en) * | 2002-08-23 | 2011-09-21 | イグジット−キューブ,インク. | Computer system and data storage method |
US8032412B2 (en) * | 2002-08-27 | 2011-10-04 | Unisys Corporation | Collecting and paying micropayments for internet and wireless purchase of copyright material |
US7269643B2 (en) * | 2002-12-17 | 2007-09-11 | Mediapulse, Inc. | Web site visit quality measurement system |
US7200860B2 (en) * | 2003-03-05 | 2007-04-03 | Dell Products L.P. | Method and system for secure network service |
US20050289081A1 (en) * | 2003-06-24 | 2005-12-29 | Manushantha Sporny | Computing system and method for secure sales transactions on a network |
US20050104555A1 (en) * | 2003-11-17 | 2005-05-19 | Phillip Simmonds-Short | Secure recharge station |
EP1548667A1 (en) * | 2003-12-24 | 2005-06-29 | T-Mobile International AG & CO. KG | Memory card for storing digital data content and method for handling the digital data content |
ATE324739T1 (en) * | 2004-01-05 | 2006-05-15 | Cit Alcatel | A METHOD FOR DETERMINING WHETHER A TRANSACTION HAS PROCEEDED CORRECTLY, A NETWORK NODE AND A DATA TRANSMISSION NETWORK FOR PERFORMING THE METHOD |
US20050182715A1 (en) * | 2004-02-17 | 2005-08-18 | Hideaki Kawahara | Method and system for charging for repeated use of a digital content item |
US7454648B2 (en) * | 2005-09-09 | 2008-11-18 | International Business Machines Corporation | System and method for calibrating a time of day clock in a computing system node provided in a multi-node network |
US20080015968A1 (en) * | 2005-10-14 | 2008-01-17 | Leviathan Entertainment, Llc | Fee-Based Priority Queuing for Insurance Claim Processing |
US7996367B2 (en) | 2006-01-18 | 2011-08-09 | Echosign, Inc. | Automatic document exchange with document searching capability |
US7996439B2 (en) * | 2006-01-18 | 2011-08-09 | Echosign, Inc. | Automatic document exchange and execution management |
US7895166B2 (en) * | 2006-01-18 | 2011-02-22 | Echosign, Inc. | Automatic document exchange with archiving capability |
US20070220257A1 (en) * | 2006-03-06 | 2007-09-20 | Sandisk Il Ltd. | Controlled-Access Recording Generator |
US8787973B2 (en) * | 2006-03-20 | 2014-07-22 | Sandisk Il Ltd. | Device and method for controlling usage of a memory card |
US8398668B2 (en) * | 2006-04-19 | 2013-03-19 | Vibrynt, Inc. | Devices and methods for treatment of obesity |
US8386605B2 (en) * | 2006-06-28 | 2013-02-26 | International Business Machines Corporation | Accessing of sample portions of a large digital file preliminary to the access of the entire file |
US20080320596A1 (en) * | 2007-06-22 | 2008-12-25 | Feng Chi Wang | Distributed digital rights management system and methods for use therewith |
US20090164804A1 (en) * | 2007-12-25 | 2009-06-25 | Sandisk Il Ltd. | Secured storage device |
CN102356397A (en) * | 2009-03-18 | 2012-02-15 | 澳汰尔工程公司 | Digital content licensing method |
EP2414954A4 (en) * | 2009-04-02 | 2013-05-22 | Altair Eng Inc | Hardware unit-based license management method |
US9208239B2 (en) | 2010-09-29 | 2015-12-08 | Eloy Technology, Llc | Method and system for aggregating music in the cloud |
US10679151B2 (en) | 2014-04-28 | 2020-06-09 | Altair Engineering, Inc. | Unit-based licensing for third party access of digital content |
US10685055B2 (en) | 2015-09-23 | 2020-06-16 | Altair Engineering, Inc. | Hashtag-playlist content sequence management |
US11799864B2 (en) | 2019-02-07 | 2023-10-24 | Altair Engineering, Inc. | Computer systems for regulating access to electronic content using usage telemetry data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998009209A1 (en) * | 1996-08-30 | 1998-03-05 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
WO1998010381A1 (en) * | 1996-09-04 | 1998-03-12 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
Family Cites Families (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3852571A (en) * | 1970-05-18 | 1974-12-03 | Hempstead Bank | System of transferral of funds |
US4658093A (en) | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US5050213A (en) * | 1986-10-14 | 1991-09-17 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5138712A (en) * | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
JPH05134957A (en) * | 1990-10-10 | 1993-06-01 | Fuji Xerox Co Ltd | Data management system |
US5783808A (en) * | 1996-01-11 | 1998-07-21 | J. D. Carreker And Associates, Inc. | Electronic check presentment system having transaction level reconciliation capability |
US6253069B1 (en) * | 1992-06-22 | 2001-06-26 | Roy J. Mankovitz | Methods and apparatus for providing information in response to telephonic requests |
SE9300671D0 (en) * | 1993-03-01 | 1993-03-01 | Sven Nauckhoff | WORK FLOW MANAGEMENT |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US20020156737A1 (en) * | 1993-10-22 | 2002-10-24 | Corporation For National Research Initiatives, A Virginia Corporation | Identifying, managing, accessing, and tracking digital objects and associated rights and payments |
US5455953A (en) * | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5563946A (en) * | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5592511A (en) | 1994-05-10 | 1997-01-07 | Schoen; Neil C. | Digital customized audio products with user created data and associated distribution and production system |
US5550981A (en) * | 1994-06-21 | 1996-08-27 | At&T Global Information Solutions Company | Dynamic binding of network identities to locally-meaningful identities in computer networks |
US5634012A (en) | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
JPH08263438A (en) * | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
WO1996027155A2 (en) * | 1995-02-13 | 1996-09-06 | Electronic Publishing Resources, Inc. | Systems and methods for secure transaction management and electronic rights protection |
WO1996037848A1 (en) * | 1995-05-24 | 1996-11-28 | Walker Asset Management Limited Partnership | 900 number billing and collection system and method for on-line computer services |
EP0870381A4 (en) * | 1995-06-07 | 1999-09-29 | Digital River Inc | Try-before-you-buy software distribution and marketing system |
US5790423A (en) * | 1995-06-14 | 1998-08-04 | Audible, Inc. | Interactive audio transmission receiving and playback system |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
DE19539801C2 (en) * | 1995-10-26 | 2001-04-19 | Ibm | Monitoring transactions with smart cards |
US5937164A (en) * | 1995-12-07 | 1999-08-10 | Hyperlock Technologies, Inc. | Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media within a platform independent networking system |
US5930768A (en) * | 1996-02-06 | 1999-07-27 | Supersonic Boom, Inc. | Method and system for remote user controlled manufacturing |
ES2150243T3 (en) * | 1996-04-01 | 2000-11-16 | Macrovision Corp | A METHOD AND APPARATUS TO PROVIDE PROTECTION AGAINST COPIES OF SIGNAL MATERIAL TRANSMITTED THROUGH DIGITAL DELIVERY NETWORKS TO A CONSUMER DECODER TERMINAL. |
JPH09330336A (en) * | 1996-06-11 | 1997-12-22 | Sony Corp | Information processor |
US6088451A (en) * | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
US6088455A (en) * | 1997-01-07 | 2000-07-11 | Logan; James D. | Methods and apparatus for selectively reproducing segments of broadcast programming |
US5889860A (en) * | 1996-11-08 | 1999-03-30 | Sunhawk Corporation, Inc. | Encryption system with transaction coded decryption key |
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US6311170B1 (en) * | 1996-12-04 | 2001-10-30 | Mark C. Embrey | Method and apparatus for making payments and delivering payment information |
US5889958A (en) * | 1996-12-20 | 1999-03-30 | Livingston Enterprises, Inc. | Network access control system and process |
US5870562A (en) * | 1997-03-24 | 1999-02-09 | Pfn, Inc. | Universal domain routing and publication control system |
US6105012A (en) * | 1997-04-22 | 2000-08-15 | Sun Microsystems, Inc. | Security system and method for financial institution server and client web browser |
US5968176A (en) * | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
JP3564262B2 (en) * | 1997-06-24 | 2004-09-08 | 富士通株式会社 | Information management system and device |
US6151628A (en) * | 1997-07-03 | 2000-11-21 | 3Com Corporation | Network access methods, including direct wireless to internet access |
US6223292B1 (en) * | 1997-07-15 | 2001-04-24 | Microsoft Corporation | Authorization systems, methods, and computer program products |
US6377982B1 (en) * | 1997-10-14 | 2002-04-23 | Lucent Technologies Inc. | Accounting system in a network |
US6000033A (en) * | 1997-11-26 | 1999-12-07 | International Business Machines Corporation | Password control via the web |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6629126B1 (en) * | 1998-03-13 | 2003-09-30 | Genuity Inc. | Framework for providing quality of service requirements in a distributed object-oriented computer system |
US6202056B1 (en) * | 1998-04-03 | 2001-03-13 | Audiosoft, Inc. | Method for computer network operation providing basis for usage fees |
US5969283A (en) * | 1998-06-17 | 1999-10-19 | Looney Productions, Llc | Music organizer and entertainment center |
US6219790B1 (en) * | 1998-06-19 | 2001-04-17 | Lucent Technologies Inc. | Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types |
JP3968875B2 (en) * | 1998-06-24 | 2007-08-29 | ソニー株式会社 | Download device and recording medium |
US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
US6263369B1 (en) * | 1998-10-30 | 2001-07-17 | Cisco Technology, Inc. | Distributed architecture allowing local user authentication and authorization |
US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6609113B1 (en) * | 1999-05-03 | 2003-08-19 | The Chase Manhattan Bank | Method and system for processing internet payments using the electronic funds transfer network |
US6697948B1 (en) * | 1999-05-05 | 2004-02-24 | Michael O. Rabin | Methods and apparatus for protecting information |
US6571285B1 (en) * | 1999-12-23 | 2003-05-27 | Accenture Llp | Providing an integrated service assurance environment for a network |
GB0012791D0 (en) * | 2000-05-25 | 2000-07-19 | Breakertech Inc | Mobile node-lock |
JP2003031528A (en) * | 2001-07-18 | 2003-01-31 | Toshiba Corp | Slurry for cmp, and manufacturing method of semiconductor device |
US20060107330A1 (en) * | 2003-01-02 | 2006-05-18 | Yaacov Ben-Yaacov | Method and system for tracking and managing rights for digital music |
-
1998
- 1998-04-03 US US09/055,068 patent/US6202056B1/en not_active Expired - Lifetime
-
1999
- 1999-04-02 WO PCT/IB1999/000581 patent/WO1999052053A2/en active Application Filing
- 1999-04-02 AU AU29506/99A patent/AU2950699A/en not_active Abandoned
- 1999-04-02 EP EP99910581A patent/EP1075679A2/en not_active Ceased
- 1999-04-02 JP JP2000542725A patent/JP2002510821A/en active Pending
-
2000
- 2000-11-21 US US09/717,614 patent/US6889206B1/en not_active Expired - Lifetime
-
2001
- 2001-01-10 US US09/757,966 patent/US7089315B2/en not_active Expired - Lifetime
- 2001-01-10 US US09/757,951 patent/US6999946B2/en not_active Expired - Lifetime
-
2004
- 2004-08-13 US US10/918,748 patent/US7266528B2/en not_active Expired - Lifetime
- 2004-08-17 US US10/921,476 patent/US7581013B2/en not_active Expired - Fee Related
-
2005
- 2005-11-23 US US11/286,213 patent/US7765159B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998009209A1 (en) * | 1996-08-30 | 1998-03-05 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
WO1998010381A1 (en) * | 1996-09-04 | 1998-03-12 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
Non-Patent Citations (2)
Title |
---|
BERNSTEIN ET AL: "Copyrights, Distribution Chains, Integrity and Piracy: The Need for a Standards-Based Solution" PROCEEDINGS OF THE KNOWRIGHT. CONFERENCE. PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INTELECTUAL PROPERTY RIGHTS FOR SPECIALIZED INFORMATION, KNOWLEGDE AND NEW TECHNOLOGY, XP002083938 * |
See also references of EP1075679A2 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001063840A1 (en) * | 2000-02-23 | 2001-08-30 | Nokia Corporation | Method and system for preparing reports in a communication system comprising at least two networks |
JP2002014794A (en) * | 2000-06-30 | 2002-01-18 | Canon Inc | Print controller, portable terminal, server, print control method, data processing method of portable terminal, data processing method of server, and storage medium |
EP1276066A2 (en) * | 2001-07-10 | 2003-01-15 | Systemneeds Inc. | Licensing method and license providing system |
EP1276066A3 (en) * | 2001-07-10 | 2003-11-26 | Systemneeds Inc. | Licensing method and license providing system |
Also Published As
Publication number | Publication date |
---|---|
EP1075679A2 (en) | 2001-02-14 |
US6889206B1 (en) | 2005-05-03 |
US7266528B2 (en) | 2007-09-04 |
AU2950699A (en) | 1999-10-25 |
US20010016837A1 (en) | 2001-08-23 |
US7581013B2 (en) | 2009-08-25 |
JP2002510821A (en) | 2002-04-09 |
US20060095387A1 (en) | 2006-05-04 |
US6999946B2 (en) | 2006-02-14 |
US7089315B2 (en) | 2006-08-08 |
WO1999052053A3 (en) | 2000-02-03 |
US7765159B2 (en) | 2010-07-27 |
US20010032187A1 (en) | 2001-10-18 |
US20050080735A1 (en) | 2005-04-14 |
US6202056B1 (en) | 2001-03-13 |
US20050080910A1 (en) | 2005-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6202056B1 (en) | Method for computer network operation providing basis for usage fees | |
US7702591B2 (en) | System and methods providing secure delivery of licenses and content | |
CN100403325C (en) | Method and system of preventing unauthorized rerecording of multimedia content | |
AU2002353842A1 (en) | System and methods providing secure delivery of licenses and content | |
JP5393910B2 (en) | Digital content rendering method and receiving apparatus | |
JP4018756B2 (en) | System for controlling the use and distribution of digital works with a charge notification mechanism | |
JP3738020B2 (en) | Complex digital work access and usage control system. | |
JP4291743B2 (en) | A system for the secure distribution and control of digital works. | |
US7209892B1 (en) | Electronic music/media distribution system | |
US20140137270A1 (en) | Digital media asset identification system & method | |
JP2000113066A (en) | Method and system for managing distribution of digital contents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
REEP | Request for entry into the european phase |
Ref document number: 1999910581 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999910581 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1999910581 Country of ref document: EP |