Claims
- 1. A method of generating a protected version of a digital asset, the method comprising:
encrypting the digital asset; generating a set of rights for controlling use of the digital asset; and associating the encrypted digital asset, the generated set of rights, and a viewer program to create the protected version of the digital asset.
- 2. The method of claim 1 further comprising:
presenting on a computer a user interface including an icon representing a program for generating the protected version of the digital asset; and performing the encrypting, generating, and associating in response to moving an icon representing the digital asset to the icon representing the program for generating the protected version of the digital asset.
- 3. The method of claim 1 wherein associating the encrypted digital asset, the generated set of rights, and the viewer program comprises generating an executable file including the encrypted digital asset, the generated set of rights, and the viewer program.
- 4. The method of claim 1 further comprising transmitting the protected version of the digital asset to a recipient.
- 5. The method of claim 4 wherein the digital rights prevent an entity other than the recipient from accessing the digital asset.
- 6. The method of claim 5 wherein the digital rights prevent the digital asset from being accessed using a computer other than a particular computer associated with the recipient.
- 7. A method of generating and manipulating a protected version of a digital asset, the method comprising:
encrypting the digital asset; generating a set of rights for controlling use of the digital asset; associating the encrypted digital asset, the generated set of rights, and a viewer program to create the protected version of the digital asset; transmitting the protected version of the digital asset to a recipient; authorizing manipulation of the digital asset by confirming that the generated set of rights allow manipulation of the digital asset; decrypting the encrypted digital asset if the generated set of rights allow manipulation of the digital asset; and allowing manipulation of the decrypted digital asset only within limits defined by the generated set of rights.
- 8. The method of claim 7, wherein authorizing manipulation of the digital asset, decrypting the encrypted digital asset, and allowing manipulation of the decrypted digital are performed by the viewer program associated with the digital asset.
- 9. The method of claim 7, wherein authorizing manipulation of the digital asset comprises authenticating a computer system on which a recipient is attempting to manipulate the digital asset.
- 10. The method of claim 7, wherein authorizing manipulation of the digital asset comprises communicating with a remotely located global rights management unit to authenticate the recipient and/or a computer system on which the recipient is attempting to manipulate the digital asset.
- 11. The method of claim 10, further comprising communicating tracking data to the global rights management unit each time that the recipient attempts to manipulate the digital asset.
- 12. The method of claim 11, wherein the tracking data comprises at least one of an identity of a computer system on which the digital asset is being hosted, a location of the computer system, a time that the digital asset was received, a time that manipulation of the digital asset is attempted, and a manner of manipulation of the digital asset that is being attempted.
- 13. The method of claim 7, wherein the generated set of rights allows the recipient to forward the digital asset to another recipient with full rights to manipulate the digital asset.
- 14. The method of claim 7, wherein the generated set of rights prevents all manipulation of the digital asset by another recipient if the recipient to which the digital asset was originally transmitted forwards the digital asset to the other recipient.
- 15. The method of claim 7, wherein the generated set of rights prevents the manipulation of the digital asset if the digital asset is copied.
- 16. The method of claim 7, wherein the generated set of rights allows the digital asset to be manipulated only once on any given computer system.
- 17. The method of claim 7, further comprising using a graphical user interface at a transmitting side to select rights to include in the generated set of rights prior to transmitting the protected version of the digital asset to the recipient.
- 18. The method of claim 7, wherein the viewer program includes a graphical user interface that allows the recipient to control manipulation of the decrypted digital content.
- 19. The method of claim 18, further comprising:
providing an upgrade graphical button as part of the graphical user interface; and upgrading the digital asset upon actuation of the upgrade graphical button by communicating upgrade data for the digital asset to the recipient if the upgrade data is available and if such upgrading is defined in the generated set of rights.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority from U.S. Provisional Application Nos. 60/240,077, filed Oct. 16, 2000, and titled “Software Dynamic Rights Management”; 60/224,894, filed Aug. 14, 2000, and titled “Secure Document Collaboration”; 60/218,242, filed Jul. 14, 2000, and titled “Dynamic Digital Rights Management”; and 60/289,795, filed May 10, 2001, and titled “Controlling and Managing Digital Assets” all of which are incorporated by reference.
Provisional Applications (4)
|
Number |
Date |
Country |
|
60240077 |
Oct 2000 |
US |
|
60224894 |
Aug 2000 |
US |
|
60218242 |
Jul 2000 |
US |
|
60289795 |
May 2001 |
US |