摘要:
A rights management module controls access to a data set by processing requests for flexibly defined types of access to the data set and determines if the requested access may be granted. The requester's right for the requested type of access is verified by a verification module that may be part of the rights management core or verified through expansion rights verification modules. Extension verification modules may be contained within the data set itself or obtained from a separate store. Extension verification modules are authenticated by the rights management core.
摘要:
The method includes receiving digital content, determining whether the digital content has been previously protected in accordance with a digital rights management system, and if the digital content has not been previously protected then storing the digital content in the content management system. Otherwise, the method further includes extracting a first right associated with the digital content, and comparing the first rights associated with the digital content to a second right associated with the content management system. If the first right is consistent with the second right, then the digital content is stored in the content management system. If the first right is not consistent with the second right, then corrective action is taken.
摘要:
Methods and apparatus for managing rights associated with digital content in a digital exchange system (e.g., a content management system) are provided. The method includes providing one or more first templates, and providing one or more second templates. Each first template corresponds to one or more rights of a first digital rights management system, and each second template corresponds to one or more rights of a second digital rights management system. The method further includes relating one or more of the first templates to one or more of the second templates based on pre-determined criteria.
摘要:
Methods and apparatus for managing digital content in content management system are provided. The content management system includes a filter operable to automatically determine a first protected format of digital content that has been imported into the content management system, and a transformer operable to transform the digital content from the first protected format into a second protected format. The second protected format is different from the first protected format.
摘要:
Super distribution of protected digital content is disclosed. According to one embodiment of the invention previously purchased encrypted digital content is received from a purchaser of the digital content. The purchaser of the previously purchased encrypted digital content is different from the recipient of the encrypted digital content. A secure transmission is established with an authorization authority for decrypting the content. A first decryption key for decrypting at least part of the previously purchased encrypted content as permitted by the authorization authority is received from the authorization authority. The at least part of the previously purchased encrypted content is decrypted as permitted by the authorization authority.
摘要:
Embodiments of the present invention allow a system or client device to process multiple Digital Rights Management (DRM) systems and formats using a universal DRM client. The universal DRM client can operate based on a universal license so that it may use the same DRM scheme or format used by the content provider. A DRM system may then build a universal license that includes information for gaining access to the content in the DRM package. In turn, a DRM package and the universal license may be provided to the universal client. Based on the information in the universal license, the client device can access the protected content even if it does not have the specific client program code for the DRM format used originally by the content provider.
摘要:
Embodiments of the present invention provide for flexible monitoring of content. The content at a client device can be monitored based on the use and actions performed by the client. In order to monitor the content at the client, a dependency is created between any recipient of the content and a monitor installed at the client device. For example, the content may be encrypted and, when the content is accessed by a potential recipient, the recipient may be required to request a key from the monitor. This activates the monitor to begin recording transaction data and events about the content's use, such as the recipient's identity and the type of actions performed. The monitor can be configured to passively monitor and record the use of the content at the client's device. In addition, the monitor can be configured to provide audit data that indicates the transaction data recorded to a server.