Abstract:
An online store can transmit an online account token to an electronic device or to a biometric sensing device after a user successfully enters his or her account password. The electronic device or the biometric sensing device can countersign the online account token when the one or more biometric images match reference biometric images and the account password matches user identifier data stored in the electronic device or in the biometric sensing device. The countersigned online account token can then be transmitted to the online store. The user can then make one or more purchases after the online store receives the countersigned online account token.
Abstract:
An improved system, device and method for accessing features of digital products with assistance from a content distribution system are disclosed. Third-party content can be submitted to and distributed by the content distribution system. In other words, the third-party content can be hosted (and distributed) by the content distribution system. A download interface can facilitate application programs operating on a client device to locally request and receive downloads from the content distribution system. Typically, a user of a client device would purchase an application program and then sometime later, using the application program, also purchase supplemental content for use with the application program. Once the supplemental content is purchased, it needs to be downloaded to the client device. Download policies are used to manage the download of supplemental content.
Abstract:
One or more user accounts can be linked together to form a group of linked user accounts to access content items assigned to the other user accounts in the group of linked user accounts. Prior to completing a purchase for a content item, a requesting user can be alerted that a member of the group of linked user accounts has access to the content item. Content items assigned to a member of a group of linked user accounts can be downloaded by one or more other members of the group of linked user accounts along with a Digital Rights Management (DRM) key that enables use of the content item. The DRM key can represent the group relationship between the downloading user account and the content owner's user account to which the content item is assigned.
Abstract:
A second user can authorize a first user to take or complete an online action by submitting one or more biometric images. For example, the second user can authorize a purchase by the first user on an online store. The second user can submit the one or more biometric images on the electronic device being used by the first user, or the second user can submit the biometric image or images remotely using another electronic device.
Abstract:
In one embodiment, a unique (or quasi unique) identifier can be received by an application store, or other on-line store, and the store can create a signed receipt that includes data desired from the unique identifier. This signed receipt is then transmitted to a device that is running the application obtained from the on-line store and the device can verify the receipt by deriving the unique (or quasi-unique) identifier from the signed receipt and comparing the derived identifier with the device identifier stored on the device, or the vendor identifier assigned to the application vendor.
Abstract:
Improved techniques and systems for delivery and acquisition of digital assets are disclosed. The techniques and systems are especially suitable and useful for delivering digital assets (e.g., media assets) that are available for acquisition and electronic delivery from online stores to electronic devices. In accordance with one aspect, when a digital asset is acquired form an online store via an electronic device associated with a user, the digital asset can be arranged for delivery to a number of other of electronic devices also associated with the user. It will be appreciated that the digital asset can be delivered and acquired without requiring explicit user input or instruction in accordance with another aspect. Other aspects of the techniques and systems include customization of configuration and user interfaces that are provided to facilitate acquisition of digital assets in a more efficient manner.