Method and apparatus for assigning consequential rights to documents and documents having such rights

Information

  • Patent Grant
  • 6976009
  • Patent Number
    6,976,009
  • Date Filed
    Thursday, May 31, 2001
    23 years ago
  • Date Issued
    Tuesday, December 13, 2005
    19 years ago
Abstract
Through the use of digital rights management, one or more conditional or consequential rights can be associated with a document. The conditional or consequential rights are activated by one or more trigger events that allow or restrict access to one or more documents by one or more users.
Description
RELATED APPLICATION DATA

This application is related to Applicants' patent applications entitled METHOD AND APPARATUS FOR TRANSFERRING USAGE RIGHTS AND DIGITAL WORK HAVING TRANSFERRABLE USAGE RIGHTS (U.S. application Ser. No. 09/867,746), METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE (U.S application Ser. No. 09/867,747), DEMARCATED DIGITAL CONTENT AND METHOD FOR CREATING AND PROCESSING DEMARCATED DIGITAL WORKS (U.S application Ser. No. 09/867,754), METHOD AND APPARATUS FOR DYNAMICALLY ASSIGNING USAGE RIGHTS TO DIGITAL WORKS (U.S application Ser. No. 09/867,745), and METHOD AND APPARATUS FOR HIERARCHICAL ASSIGNMENT OF RIGHTS TO DOCUMENTS AND DOCUMENTS HAVING SUCH RIGHTS (U.S application Ser. No. 09/867,748), which are being filed concurrently herewith, and are incorporated herein by reference in their entirety.


BACKGROUND OF THE INVENTION

1. Field of the Invention


This invention relates to the assignment of rights to a document. In particular, this invention relates to the assignment of conditional or consequential rights to one or more documents, and the management of those documents.


2. Description of Related Art


Digital rights management (DRM) describes a process of attaching usage rights to a digital work, such as eContent, as well as managing and enforcing the same rights. In general, these digital works and eContent can include any type of content, such as music, books, multimedia presentations, eBooks, video information, or the like. In general, any information that is capable of being stored can be protected through the use of digital rights management. For example, a digital book could be accompanied by a license establishing conditions, such as viewing, printing, borrowing, or the like, governing the book's usage. These rights could then be controlled by, for example, an associated reader's software, and the allowable transactions, such as buying, printing, or the like, authorized by, for example, a clearinghouse.


One of the most important issues impeding the widespread distribution of digital works as documents via electronic means, such as the internet, is the lack of protection of intellectual property rights of content owners during the distribution, dissemination and use of those digital documents. Efforts to overcome this problem have been termed “intellectual property rights management” (IPRM), “digital property rights management” (DPRM), “intellectual property management” (IPM), “rights management” (RM) and “electronic copyright management” (ECM), which can be collectively referred to as Digital Rights Management (DRM). There are a number of issues in Digital Rights Management including authentication, authorization, accounting, payment and financial clearing, rights specifications, rights verification, rights enforcement, document protection, and the like.


In the world of printed documents, a work created by an author is typically provided to a publisher, which formats and prints numerous copies of the work. The copies are then distributed to bookstores or other retail outlets, from which the copies are purchased by end users. While the low quality of physical copying, and the high cost of distributing printed material have served as deterrents to unauthorized copying of most printed documents, digital documents allow easy copying, modification, and redistribution if they are unprotected. Accordingly, digital rights management allows the protecting of digital documents to, for example, complicate copying, modifying and redistributing.


Similarly, it has been widely recognized that it is difficult to prevent, or even deter, individuals from making unauthorized distributions of electronic documents within current general-purpose computer and communication systems such as personal computers, workstations, and other devices connected via a distributed network, such as a local area network, an intranet and the internet. Many attempts to provide hardware-based solutions to prevent unauthorized copying have proven to be unsuccessful. Furthermore, the proliferation of broadband communications technologies and the development of the “national information infrastructure” (NII) will likely make it even more convenient to distribute large documents electronically, thus removing most deterrents to any unauthorized distribution of documents. Therefore, digital rights management technologies provide one method of protecting digital documents distributed electronically.


Two basic schemes have been employed to attempt to solve the document protection problem. In particular, the two basic schemes are secure containers and trusted systems. A secure container, or simply an encrypted document, offers one method of keeping document contents encrypted until a set of authorization parameters are satisfied. After the various parameters are verified, for example, by the document provider, the document can be released to a user. Commercial products such as IBM's Cryptolopes® and InterTrusts Digiboxes® fall into this category. While the secure container approach provides a solution to protect the document during delivery over unsecure channels, it does not provide any mechanism to prevent legitimate users from obtaining the unencrypted document, and then, for example, using and redistributing the unprotected document without authorization.


In the trusted system approach, the entire system that handles, for example, the distribution and viewing of a document, is responsible for preventing unauthorized use. Building such a trusted system usually entails introducing new hardware such as a secure processor, a secure storage, and secure rendering devices. The trusted system also requires that all software applications that run on the system be certificate to be trusted.


U.S. Pat. Nos. 5,530,235, 5,634,012, 5,715,403, 5,638,443 and 5,629,980, which are incorporated herein by reference in their entirety, generally discuss digital rights management. In general, an author creates a document and forwards it to a distributor for distribution. Typically, the author is the creator of the content, however, the author can be any one of the creator, the owner, the editor, or any other entity controlling a portion of content, or an agent of one of those entities. The author may distribute documents directly, without involving a secondary party such as a distributor. Therefore, the author and the distributor may be the same entity. A distributor can distribute documents to one or more users, for example, upon request. In a typical electronic distribution model, the content can be distributed as a document in encrypted form. For example, a distributor can encrypt the content with a random key, having encrypted the random key with a public key corresponding to one or more users. Thus, the encrypted document can be customized solely for a particular user. The user is then able to use the private key to unencrypt the public key and use the public key to unencrypt and view the document.


Payment for the document can be passed from a user to a distributor by way of a clearinghouse which can collect requests from one or more users who wish to view a particular document. The clearinghouse can also collect payment information, such as debit transactions, credit transactions, credit card transactions, or other known electronic payment schemes and forward the collected payments to a distributor. Furthermore, the clearinghouse may retain a share of the payment as a fee for these services. The distributor may also retain a portion of the payment from the clearinghouse to cover, for example, distribution services and royalties due an author.


Each time the user requests a document, an accounting message can be sent to an accounting server that can, for example, ensure that each request by the user matches a document sent by the distributor. Additionally, the accounting information can be received by an accounting server and distributor to reconcile any inconsistencies.


SUMMARY OF THE INVENTION

Conditional or consequential rights associated with a document allow for the limited usage of content based on, for example, an absolute value, a relative value, or the like. For example, the starting period of a right based on another event or another right can trigger the availability or expiration of availability of a document. Furthermore, the time for limiting the usage of content can be expressed as an absolute value, such as a particular time and date, or a relative value, such as a usage right expiring two minutes after a first usage. The usage right can also be linked to other events, such as the expiration of a right of another document, or the like. For example, a piece of music could be listened to for only one minute, or it can be listened to only once, after the right to a second piece of music has expired. This conditional or consequential right assignment can be hierarchical, such as the systems and methods described in co-pending U.S. application Ser. No. 09/867,748, entitled “Method and Apparatus for Hierarchical Assignment of Rights to Documents and Documents Having Such Rights,” filed herewith and incorporated by reference in its entirety, and/or linked to other events that may or may not have more than one step or condition. For example, the condition could be a chain of events that trigger the conditional or consequential rights. An example of this can be used in remote learning schemes. For example, if college courses are offered on the internet, the courses can be offered at a specified time, or the access to a second course restricted until a first course has been viewed.


In another example, if an exam has five sections, and for each section, a thirty-minute period is allocated, the user can proceed to the next section by using the thirty allocated minutes, or by pushing a button on, for example, a user interface, which indicates that they have completed that section. Alternatively, other triggering events and/or conditions can also govern transition to a subsequent document based on, for example, a fifteen-minute break allocated between sections 3 and 4. In this exemplary embodiment, multiple timers or counters can keep track of the time for each section and/or for all of the sections combined.


Alternative, the test taker could switch back and fourth between different sections, as long as the time is within the allocated time for each section or within other thresholds, such as a fifty-minute maximum for any given section. Alternatively, in another exemplary embodiment, alternating between sections may be forbidden. In this exemplary embodiment, time allocations can be based on multiple rules, and counters may or may not be dependent on each other, as a test administrator sets the rules and constraints of the exam prior to administration of the exam.


This concept can include the concept of subsidiary rights, for which one grants a right to a user, provided the user satisfies some condition or performs an action. For example, a user can edit one a copy is made of a document.


As another example, for joint projects, more than one person may contribute to the document with comments and modifications and/or design changes in which case a digital rights management system can keep track of, exercised rights, modifications, sources of modifications, dates, order of changes, approvals, vetoes, priorities, or the like. For example, in a paperless office, three approvals from three different departments may be needed for an action item.


The right assignment can also be integrated into, for example, an e-mail or electronic messaging system. For example, a content owner can assign different rights to different individuals and share or limit rights to information or files based on those rights. A friend could request permission to view or use a particular file, or further distribute the file to another individual, everyone in the address book or the public as a whole. Alternatively, the rights could, for example, limit the extent to which a user can add or delete individuals from a mailing list or address book. The right to view people in an address book could also be restricted based on a usage right. As another example, while in an instant messaging mode, a user can have the right to exclude or limit other users to particular content.


If the set of assigned rights are commonly used for different documents, the rules can be expressed as, for example, templates such as those discussed in U.S. Provisional Application Ser. No. 60/261,753, entitled “Method and Apparatus for Editing and Specifying the Rights and Conditions Associated with Documents or digital contents,” incorporated herein by reference in its entirety, multi-hyphen purpose templates, or the like. In general, a template can be used whenever a user desires to assign a predetermined set of rights to one or more, such as a set, of additional users. This template can contain, for example, a set of usage rights that may be particularly tailored towards the user class, accounting instructions, or the like.


In another exemplary embodiment, assume a content owner desires to assign some rights to a user, in terms of what compression methods the user can employ on the original data. For example, for some data, the content owner may wish to let the user be able to compress the data only by one of the choices of lossless compression techniques to maintain the integrity of the data. Alternatively, in another situation, for specific data the content owner may desire to let the user compress the data only by one of the choices of lossy methods, as long as the bit rate or total size of the document stays below a threshold.


For multilevel databases, some parts of the data may be open to public, while other parts may require different levels of rights or security clearance, such as differentiated security, using attribute-level sensitivity. For example, in a company, the telephone number of the employees may be accessible to the other employees, while other personal information, such as personnel information, cannot be accessed unless the content user is within a predefined class. For example, the direct supervisor may have access to inspect, read or modify the employee's personnel file, as long as a “paper trail” which records information pertaining to the supervisor's changes is generated and associated with the file. Furthermore, the right to notarize particular content, such as the electronic-signature of an authorized entity and/or a time stamp, with the option of an encryption for safe storage, can also be granted separately by a content owner.


Aspects of the present invention relate to assigning rights to documents. In particular, rights based on conditional or consequential conditions can be associated with a document.


Additionally, aspects of the present invention relate to a system for assigning conditional or consequential rights to one or more documents.


Furthermore, aspects of the present invention relate to activating or restricting access to one or more documents based on a conditional or consequential right associated with that document.


These and other features and advantages of this invention are described in, or are apparent, from the following detailed description of the embodiments.





BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments of the invention will be described in detail, with reference to the following figures wherein:



FIG. 1 is a functional block diagram illustrating an exemplary document according to this invention;



FIG. 2 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 3 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 4 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 5 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 6 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 7 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 8 illustrates an exemplary conditional or consequential right assignment according to this invention;



FIG. 9 is a flowchart outlining an exemplary method for assigning rights according to this invention; and



FIG. 10 is a flowchart outlining an exemplary method for exercising a right based on a condition or consequence according to this invention.





DETAILED DESCRIPTION OF THE INVENTION

Typically, rights are assigned to one or more documents based on, for example, a license agreement with the content owner. These rights are generally static and can be exercised by a user at any time provided the conditions of the license agreement, such as payment, are satisfied. By modifying the management of these rights, an exemplary embodiment of the systems and methods of this invention allow for specific portions of the rights associated with a specific portion of a document to be triggered based on, for example, a conditional or consequential event.


For example, a document can have one or more rights associated with it which may include one or more usage rights and/or delegation rights. The usage rights specify, for example, the right a particular user has to the document such as viewing, editing, modifying, updating, printing, or the like. The delegation rights include, for example, to how many users a user can distribute the document to, and which rights the user is allowed to associate with those distributed documents.


Thus, by associating a conditional or consequential trigger with the one or more usage rights and delegation rights, a content owner can provide additional specificity governing the use of one or more documents.



FIG. 1 illustrates an exemplary document 100. The document 100 comprises a right management module 110, a right availability module 120, a tracking module 130, a right usage determination module 140, an interface module 150, an accounting module 160, and a document updating module 170, interconnected by link 5. The document 100 can also be connected to a distributed network (not shown) which may or may not also be connected to one or more other documents, account processing systems, rights management systems, or other distributed networks, as well as one or more input devices and display devices (not shown).


While the exemplary embodiment illustrated in FIG. 1 shows the document 100 and associated components collocated, it is to be appreciated that the various components of the document 100 can be located at distant portions of a distributed network, such as a local area network, a wide area network, an intranet and/or the Internet, or within a dedicated document or document system. Thus, it should be appreciated that the components of the document 100 can be combined into one device or collocated on a particular note of distributed network. Furthermore, it should be appreciated that for ease of illustration, the various functional components of the document 100 have been divided as illustrated in FIG. 1. However, any of the functional components illustrated in FIG. 1 can be combined or further partitioned without affecting the operation of the system. As will be appreciated from the following description, and for reasons of computation efficiency, the components of the document can be arranged at any location within a distributed network without effecting the operation of the system. Furthermore, it is to be appreciated that the term module as used herein includes any hardware and/or software that provide the functionality as discussed herein. Likewise, the document 100 can comprise any necessary controllers, memory, and/or I/O interfaces that may be necessary given the particular embodiment and/or implementation of the document 100. Additionally, the document 100 can be any information to which conditional and/or consequential rights are associated.


Furthermore, the links 5 can be a wired or wireless link or any other known or later developed element(s) that is capable of supplying and communicating data to and from the connected elements. Additionally, the input devices can include, for example, a keyboard, a mouse, a speech to text converter, a stylus, a mouse, or the like. In general, the input device can be any device capable of communicating information to the document 100. Furthermore, the display device can be a computer monitor, a display on a PDA, an E-Book, or any other device capable of displaying information to one or more users.


Upon receiving a request by a user to use a document, the right availability module 120, in cooperation with the right management module 110 and the interface module 150 monitors the condition or consequential triggers associated with the document. Upon satisfaction of one or more of the conditional or consequential event, the document is released to the user for the requested use and any necessary accounting, such as crediting and/or debiting performed. Then, if the conditional or consequential right has an associated termination or expiration portion, the right availability module 120 in cooperation with the right management module 110 and the interface module 150 terminate the user's usage and/or delegation rights.



FIG. 2 illustrates an exemplary document 200 comprising one or more usage rights 210 and or one more delegation rights 220. Each of the usage rights 210 and the delegation rights 220 can also have associated therewith conditional/consequential rights 230 and 240, respectively. As previously discussed, this allows the usage rights to be based on, for example, the completion of a particular event or condition. Similarly, the delegation rights can be restricted based on a particular condition or event.



FIGS. 3–8 illustrate exemplary conditional events and subsequent rights granted to users. In particular, FIG. 3 illustrates that after condition A commences, a user has a view right for a predetermined duration.


In FIG. 4, after a condition B starts, a first user has a view right associated with a document. Additionally, a second user has a view right that it limited to a predetermined duration.


In FIG. 5, if an exemplary user in possession of the document is known, via, for example, a smart card, an identification, such as driver's license, a fingerprint, or the like, and the user's identity matches the conditional right, the user has view and edit rights for the document.


In FIG. 6, if an exemplary predetermined condition occurs, a first user has distribution rights, and a second user has an approval right for a predetermined duration. For example, the conditional event could be a stock offering that the first user can distribute. The second user can then be granted the option to purchase stock at, for example, a preferred price, for 24 hours. After 24 hours, this right to purchase can be withdrawn, and the second user's access to the document restricted.



FIG. 7 illustrates an exemplary conditional event where a predetermined time after a first condition ends or a second condition starts, subsequent rights are available. In this exemplary embodiment, after the triggering event, a first user has view and modify rights, while a second user is granted one print right.


In FIG. 8, the triggering event is when a predetermined condition ends. Upon satisfaction of this triggering event, rights are removed from the document possessed by the user. For example, the document can monitor the current date and time and once that time has passed, restrict access to the document.



FIG. 9 illustrates an exemplary embodiment of a method for associating conditional and/or consequential rights with a document. In particular, control begins in step S100 and continues to step S110. In step S110, a determination is made whether rights are already associated with the document. If rights are associated with the document, control continues to step S120 where the usage and delegation rights available to the particular user are determined. Control then continues to step S130.


In step S130, the rights one or more users desire to have associated with the document are received. Next, in step S140, it is determined whether the assignment of these rights is allowable. If the assignment is allowable, control continues to step S160. Otherwise, control jumps to step S150. In step S150, a message can be forwarded to the user indicating the assignment is not available. Control then optionally continues back to step S130.


In step S160, an optional accounting function can be performed. If accounting is necessary, control continues to step S170. Otherwise, control jumps to step S200.


In step S170, any necessary accounting functions are attempted. Then, in step S180, a determination is made whether the accounting, e.g., any crediting and/or debiting, is allowed. If the accounting functions are successful, control jumps to step S200. Otherwise, control continues to step S190 where a message can be forwarded to the user and control returns back to step S130.


In step S200, the right as chosen by the one or more users are associated with the document. Then, in step S210, the document can be updated reflecting, for example, which usage rights were used, the effect of any of these usage rights, a signature of the user and, for example, any modifications to or assignment of delegation rights. Control then continues to step S200 where the control sequence ends.



FIG. 10 illustrates an exemplary method of activating a right based, which could grant or restrict access, based on one or more conditions. In particular, control begins in step S400 and continues to step S410. In step S410, one or more conditions are monitored for detection of a triggering event. Then, in step S420, a determination is made whether the triggering event has been satisfied. If the triggering event is present, control jumps to step S450, otherwise, control continues to step S430. In step S430, a determination is made whether the conditional triggering event has expired. If the triggering event has expired, control jumps to step S510 where the control sequence ends. Otherwise, control continues to step S440, where the system waits for the triggering event and returns to step S410.


In step S450, a determination is made whether any accounting actions are necessary. If accounting actions are required, control continues to steps S460. Otherwise, control jumps to step S490.


In step S460, any necessary accounting, such as debiting and/or crediting is performed. Next, in step S470, a determination is made whether the debiting and/or crediting was successful. If the accounting was successful, control jumps to step S490, otherwise, control continues to step S480, where a message can be forwarded to the user indicating a problem associated with the accounting. Control then continues to step S510.


In step S490, one or more users are granted access to one or more documents based on the associated usage and delegation rights. Next, in step S500, the usage rights can be updated, for example, by associating a digital signature with the document that corresponds to, for example, the identify of the user and/or any modifications the user may have made to the document and any delegations performed by that user. Control then continues to step S510 where the control sequence ends.


As illustrated in FIG. 1, the document can be implemented either on a single programmed general purpose computer or a separate programmed general purpose computer. However, the document can also be implemented on a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element, an ASIC or other integrated circuit, a digital signal processor, a hardwired electronic or logic circuit such as a discrete element circuit, a programmable logic device such as a PLD, PLA, FPGA, PAL, or the like. In general, any device capable of implementing a finite state machine that is in turn capable of implementing the flowcharts in FIGS. 9–10 can be used to implement the document and conditional/consequential rights management system according to this invention.


Furthermore, the disclosed method may be readily implemented in software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation hardware platforms. Alternatively, the disclosed document and right management system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether hardware or software is used to implement the systems and methods in accordance with this invention is dependent on the speed and/or efficiency requirements of the system, the particular function, and a particular software and/or hardware systems or microprocessor or microcomputer systems being utilized. The document and rights management systems illustrated herein, however, can be readily implemented in hardware and/or software using any known or later-developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the functional description provided herein and with a general basic knowledge of the computer arts.


Moreover, the disclosed methods may be readily implemented as software executed on a programmed general purpose computer, a special purpose computer, a microprocessor or the like. In these instances, the methods and systems of this invention can be implemented as a program embedded in a personal computer, an E-Book, a secure container, or the like, such as a Java® or CGI script, as an XML document, as a resource residing on a server or graphics workstation, as a routine embedded in a dedicated electronic document, an electronic document viewer, or the like. The document and rights management system can also be implemented by physically incorporating the systems and methods into a hardware and/or software system, such as the hardware and software systems of a computer or dedicated electronic document.


It is, therefore, apparent that there has been provided, in accordance with the present invention, systems and methods for managing electronic documents. While this invention has been described in conjunction with a number of embodiments, it is evident that many alternatives, modifications and variations would be or are apparent to those of ordinary skill in the applicable art. Accordingly, applicants intend to embrace all such alternatives, modifications and variations that are within the spirit and scope of this invention.

Claims
  • 1. A rights management system for managing and enforcing rights to use digital content, the system comprising: at least one repository for enforcing rights associated with content;one or more consequential rights that are linked to another right and that are associated with respective content, and that are exercisable only upon satisfaction of a consequential event including expiration or exercise of the another right; anda right management module that manages the one or more consequential rights by enforcing use of the respective content based on the consequential rights, and permitting exercise of the consequential rights only after the satisfaction of the conseciuential event including the expiration or exercise of the another right to thereby provide sequential access to the respective content in accordance with the another right and the consequential rights.
  • 2. The system of claim 1, wherein the one or more consequential rights comprise one or more usage rights and one or more conditional values.
  • 3. The system of claim 2, wherein the usage rights comprise at least one of viewing, printing, editing, approving, modifying, updating and copying.
  • 4. The system of claim 2, wherein the conditional values comprise at least one of an absolute value and a relative value that at least one of allow access or restrict access to one or more items of digital content.
  • 5. The system of claim 1, wherein the one or more consequential rights are associated with one or more items of digital content.
  • 6. The system of claim 5, wherein the items of digital content comprise at least one of E-Books, books, documents, audio information, music, multimedia presentations and video information.
  • 7. The system of claim 1, wherein the one or more consequential rights comprise a plurality of consequential rights.
  • 8. A method of managing and enforcing rights to use digital content in a system having at least one repository for enforcing rights associated with content of the digital works, the method comprising the steps of: electronically determining one or more consequential rights, the consequential rights being linked to another right and associated with respective content and being exercisable only upon satisfaction of a consequential event including expiration or exercise of the another right;associating the one or more consequential rights with the respective content; andenforcing use of the respective content based on the consequential rights, and permitting exercise of the consequential rights only after the satisfaction of the consequential event including the expiration or exercise of the another right to thereby provide sequential access to the respective content in accordance with the another right and the consequential rights.
  • 9. The method of claim 8, wherein the one or more consequential rights comprise one or more usage rights and one or more conditional values.
  • 10. The method of claim 9, wherein the usage rights comprise at least one of viewing, printing, editing, approving, modifying, updating and copying.
  • 11. The method of claim 9, wherein the conditional values comprise at least one of an absolute value and a relative value that at least one of allow access or restrict access to one or more items of digital content.
  • 12. The method of claim 8, wherein the one or more consequential rights are associated with one or more portions of information.
  • 13. The method of claim 8, wherein the digital content comprise at least one of E-Books, music, multimedia presentations and video information.
  • 14. The method of claim 8, wherein the one or more consequential rights comprise a plurality of consequential rights.
  • 15. A computer-readable medium storing one or more computer readable instructions for a digital rights management language for managing and enforcing rights to use digital content in a system having at least one repository for enforcing rights associated with content of the digital works, the computer readable instructions configured to cause one or more computer processors to perform the steps of: specifying one or more usage rights that define the manner in which content can be used;linking one or more consequential rights to another usage right and that are associated with respective content, the consequential rights being exercisable only upon satisfaction of a consequential event including expiration or exercise of the another usage right; andproviding an enforcement instruction that enforces the use of the respective content based on the consequential rights, and permits exercise of the consequential rights only after the satisfaction of the consequential event including the expiration or exercise of the another usage right to thereby provide sequential access to the respective content in accordance with the another right and the consequential rights.
  • 16. The computer-readable medium of claim 15, wherein the usage rights comprise at least one of viewing, printing, editing, approving, modifying, updating and copying.
  • 17. The computer-readable medium of claim 15, wherein the consequential rights comprise at least one trigger that at least one of allows access or restricts access to one or more items of digital content.
  • 18. A computer-readable medium storing one or more computer readable instructions for managing and enforcing rights to use digital content in a system having at least one repository for enforcing rights associated with content of the digital works, the computer readable instructions comprising: an instruction that determines one or more consequential rights, the consequential rights being linked to another right and that are associated with respective content and exercisable only upon satisfaction of a consequential event including expiration or exercise of the another right;an instruction that associates the one or more consequential rights with one or more of the respective content; andan instruction that enforces use of the respective content based on the consequential rights, and permits exercise of the consequential rights only after the satisfaction of the consequential event including the expiration or exercise of the another right to thereby provide sequential access to the respective content in accordance with the another right and the consequential rights.
  • 19. The computer-readable medium of claim 18, wherein the one or more consequential rights comprise one or more usage rights and one or more conditional values.
  • 20. The computer-readable medium of claim 19, wherein the usage rights comprise at least one of viewing, printing, editing, approving, modifying, updating and copying.
  • 21. The computer-readable medium of claim 19, wherein the conditional values comprise at least one of an absolute value and a relative value that at least one of allow access or restrict access to one or more items of digital content.
  • 22. The computer-readable medium of claim 21, wherein the absolute value is at least one of a time, a date, an identity and a location.
  • 23. The computer-readable medium of claim 21, wherein the relative value is at least one of based on the status of one or more other usage rights, and one or more events.
  • 24. The computer-readable medium of claim 18, wherein the digital content comprise at least one of E-Books, books, music, audio information, multimedia presentations and video information.
  • 25. The computer-readable medium of claim 18, wherein the one or more consequential rights comprise a plurality of consequential rights.
US Referenced Citations (141)
Number Name Date Kind
3263158 Janis Jul 1966 A
3609697 Blevins et al. Sep 1971 A
3790700 Callais et al. Feb 1974 A
3798605 Feistel Mar 1974 A
4159468 Barnes et al. Jun 1979 A
4220991 Hamano et al. Sep 1980 A
4278837 Best Jul 1981 A
4323921 Guillou Apr 1982 A
4442486 Mayer Apr 1984 A
4529870 Chaum Jul 1985 A
4558176 Arnold et al. Dec 1985 A
4593376 Volk Jun 1986 A
4614861 Pavlov et al. Sep 1986 A
4644493 Chandra et al. Feb 1987 A
4658093 Hellman Apr 1987 A
4713753 Beobert et al. Dec 1987 A
4817140 Chandra et al. Mar 1989 A
4827508 Shear May 1989 A
4868376 Lessin et al. Sep 1989 A
4891838 Faber Jan 1990 A
4924378 Hershey et al. May 1990 A
4932054 Chou et al. Jun 1990 A
4937863 Robert et al. Jun 1990 A
4949187 Cohen Aug 1990 A
4953209 Ryder, Sr. et al. Aug 1990 A
4961142 Elliott et al. Oct 1990 A
4975647 Downer et al. Dec 1990 A
4977594 Shear Dec 1990 A
4999806 Chernow et al. Mar 1991 A
5010571 Katznelson Apr 1991 A
5014234 Edwards, Jr. May 1991 A
5023907 Johnson et al. Jun 1991 A
5047928 Wiedemer Sep 1991 A
5050213 Shear Sep 1991 A
5052040 Preston et al. Sep 1991 A
5058164 Elmer et al. Oct 1991 A
5103476 Waite et al. Apr 1992 A
5113519 Johnson et al. May 1992 A
5136643 Fischer Aug 1992 A
5138712 Corbin Aug 1992 A
5146499 Geffrotin Sep 1992 A
5148481 Abraham et al. Sep 1992 A
5159182 Eisele Oct 1992 A
5183404 Aldous et al. Feb 1993 A
5191193 Le Roux Mar 1993 A
5204897 Wyman Apr 1993 A
5222134 Waite et al. Jun 1993 A
5235642 Wobber et al. Aug 1993 A
5247575 Sprague et al. Sep 1993 A
5255106 Castro Oct 1993 A
5260999 Wyman Nov 1993 A
5263157 Janis Nov 1993 A
5263158 Janis Nov 1993 A
5276444 McNair Jan 1994 A
5276735 Boebert et al. Jan 1994 A
5291596 Mita Mar 1994 A
5301231 Abraham et al. Apr 1994 A
5311591 Fischer May 1994 A
5319705 Halter et al. Jun 1994 A
5337357 Chou et al. Aug 1994 A
5339091 Yamazaki et al. Aug 1994 A
5341429 Stringer et al. Aug 1994 A
5347579 Blandford Sep 1994 A
5381526 Ellson Jan 1995 A
5394469 Nagel et al. Feb 1995 A
5410598 Shear Apr 1995 A
5412717 Fischer May 1995 A
5428606 Moskowitz Jun 1995 A
5432849 Johnson et al. Jul 1995 A
5438508 Wyman Aug 1995 A
5444779 Daniele Aug 1995 A
5453601 Rosen Sep 1995 A
5455953 Russell Oct 1995 A
5457746 Dolphin Oct 1995 A
5473687 Lipscomb et al. Dec 1995 A
5473692 Davis Dec 1995 A
5499298 Narasimhalu et al. Mar 1996 A
5502766 Boebert et al. Mar 1996 A
5504814 Miyahara Apr 1996 A
5504818 Okano Apr 1996 A
5504837 Griffeth et al. Apr 1996 A
5509070 Schull Apr 1996 A
5530235 Stefik et al. Jun 1996 A
5532920 Hartrick et al. Jul 1996 A
5534975 Stefik et al. Jul 1996 A
5539735 Moskowitz Jul 1996 A
5563946 Cooper et al. Oct 1996 A
5568552 Davis Oct 1996 A
5621797 Rosen Apr 1997 A
5629980 Stefik et al. May 1997 A
5633932 Davis et al. May 1997 A
5634012 Stefik et al. May 1997 A
5638443 Stefik et al. Jun 1997 A
5649013 Stuckey et al. Jul 1997 A
5655077 Jones et al. Aug 1997 A
5708717 Alasia Jan 1998 A
5734823 Saigh et al. Mar 1998 A
5734891 Saigh Mar 1998 A
5737413 Akiyama et al. Apr 1998 A
5737416 Cooper et al. Apr 1998 A
5745569 Moskowitz et al. Apr 1998 A
5748783 Rhoads May 1998 A
5757907 Cooper et al. May 1998 A
5761686 Bloomberg Jun 1998 A
5765152 Erickson Jun 1998 A
5768426 Rhoads Jun 1998 A
5825892 Braudaway et al. Oct 1998 A
5892900 Ginter et al. Apr 1999 A
5910987 Ginter et al. Jun 1999 A
5915019 Ginter et al. Jun 1999 A
5917912 Ginter et al. Jun 1999 A
5920861 Hall et al. Jul 1999 A
5940504 Griswold Aug 1999 A
5943422 Van Wie et al. Aug 1999 A
5949876 Ginter et al. Sep 1999 A
5982891 Ginter et al. Nov 1999 A
5999949 Crandall Dec 1999 A
6047067 Rosen Apr 2000 A
6112181 Shear et al. Aug 2000 A
6115471 Oki et al. Sep 2000 A
6135646 Kahn et al. Oct 2000 A
6138119 Hall et al. Oct 2000 A
6141754 Choy Oct 2000 A
6157721 Shear et al. Dec 2000 A
6185683 Ginter et al. Feb 2001 B1
6226618 Downs et al. May 2001 B1
6233684 Stefik et al. May 2001 B1
6237786 Ginter et al. May 2001 B1
6240185 Van Wie et al. May 2001 B1
6253193 Ginter et al. Jun 2001 B1
6282404 Linton Aug 2001 B1
6292569 Shear et al. Sep 2001 B1
6301660 Benson Oct 2001 B1
6327652 England et al. Dec 2001 B1
6330670 England et al. Dec 2001 B1
6345256 Milsted et al. Feb 2002 B1
6363488 Ginter et al. Mar 2002 B1
6389402 Ginter et al. May 2002 B1
6408336 Schneider et al. Jun 2002 B1
6522769 Rhoads et al. Feb 2003 B1
6599324 Saito et al. Jul 2003 B2
Foreign Referenced Citations (13)
Number Date Country
0 084 441 Jul 1983 EP
0 180 460 May 1986 EP
0 332 707 Sep 1989 EP
0 651 554 May 1995 EP
0 668 695 Aug 1995 EP
0 725 376 Aug 1996 EP
2 136 175 Sep 1984 GB
2 236 604 Apr 1991 GB
2000181868 Jun 2000 JP
WO 9220022 Nov 1992 WO
WO 9301550 Jan 1993 WO
WO 9949615 Sep 1999 WO
WO 0163528 Aug 2001 WO
Related Publications (1)
Number Date Country
20020184160 A1 Dec 2002 US