US20070101139A1 - System for protecting information over the internet - Google Patents

System for protecting information over the internet Download PDF

Info

Publication number
US20070101139A1
US20070101139A1 US11/639,824 US63982406A US2007101139A1 US 20070101139 A1 US20070101139 A1 US 20070101139A1 US 63982406 A US63982406 A US 63982406A US 2007101139 A1 US2007101139 A1 US 2007101139A1
Authority
US
United States
Prior art keywords
computer system
survey
key
computer
content information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/639,824
Inventor
Leonard Bayer
Nelson Mathias
David Frost
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
S Aqua Semiconductor LLC
Original Assignee
Harris Interactive Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harris Interactive Inc filed Critical Harris Interactive Inc
Priority to US11/639,824 priority Critical patent/US20070101139A1/en
Publication of US20070101139A1 publication Critical patent/US20070101139A1/en
Assigned to DOT ASSETS NO. 2 LLC reassignment DOT ASSETS NO. 2 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HARRIS INTERACTIVE INC.
Assigned to HARRIS INTERACTIVE, INC reassignment HARRIS INTERACTIVE, INC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BAYER, LEONARD, FROST, DAVID, MATHIAS, NELSON
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Definitions

  • the present invention relates to a system (and method) for protecting information over the Internet or other public networks, and relates particularly to, a system for protecting the viewing of information at a computer system which is connected over the Internet to the system.
  • the invention is especially suitable for conducting surveys over the Internet via a computer in which part of the survey viewed on the display of the computer must be protected from unauthorized viewing and copying.
  • the invention may also be applied to any other application where viewing of information at a computer requires authorization and protection from copying, where rights to limited viewing of the information are received via the Internet. Viewing is generally defined herein as displaying graphics, text, video, or other information with any accompanying audio.
  • surveys or polls are a series of questions on a form presented to individuals, called voters, to sample the views of people in a given region or country for political, commercial or entertainment purposes.
  • Surveys are typically conducted either in person, mail, or via telephone to a great number of individual voters.
  • surveys can now be taken by persons at their computer.
  • a system for conducting surveys over the Internet is described in U.S. patent application Ser. No. 09/243,064, filed Feb. 2, 1999.
  • Often surveys are used to test concepts, such as the packaging of a new food product, before companies make an investment in the product or to determine the best way to advertise the product.
  • Complicated systems for downloading digital works to computer systems have been developed capable of providing billing and payment to the owners of the digital works based on usage, such as copying or displaying, which may be metered.
  • U.S. Pat. Nos. 5,629,980, 5,638,443, and 5,715,403 describe a system for controlling the distribution and use of digital works in which usage rights are permanently attached to each digital work stored in repositories, and rendering systems receiving a digital work have access to the work in accordance with the usage rights attached to the work.
  • U.S. Pat. No. 5,982,891 provides a system for virtual distribution to electronic appliances, such as computers, to enable payment for use, and reporting of use, of content distributed to such electronic appliances.
  • the electronic appliance can have a secure processing unit to provide a processing environment offering tamper resistance.
  • access to distributed content is not allowed unless control information, rules and controls, for that content is present at the appliance specifying usage.
  • control information, rules and controls, for that content is present at the appliance specifying usage.
  • These systems which may use encryption/decryption techniques, are complex in order that they can support traditional commercial distribution and transaction methods for digital works. Unauthorized copying of digital works is primarily prevented by the usage or control information which must be present, or permanently attached, to digital works.
  • a still further object of the present invention is to provide an improved system for protecting information over the Internet transmitted in a content file to a computer in which no specific usage control information, i.e., information defining how the content file may be used, is provided, or otherwise associated with the transmitted content file, in contrast with prior art distribution systems for digital works.
  • Yet another object of the present invention is to provide an improved system for protecting information over the Internet in which a network computer can enable a client computer having received an encrypted content files to be authenticated by the network computer using a plurality of identifiers before the client computer can receive a key to decrypt the content file.
  • a further object of the present invention is to provide an improved system for protecting information in which a computer receiving a content file has focus control to protect displayed information from the content file from being readily accessed and thereby copied.
  • the content protection system embodying the present invention includes a web site addressable by one or more client computer systems for connecting to the content protection system over the Internet or other public network.
  • Each client computer system connects to the web site and receives a respondent identifier and viewer software.
  • the viewer software When the viewer software is installed at the client computer system, it generates a unique viewer identifier identifying the client computer system.
  • the viewer identifier is sent to the web site for registering the viewer identifier with the respondent identifier.
  • the web site has a database and one or more web servers coupled to the database.
  • the database stores registration information including the viewer identifier and associated respondent identifiers for the client computer systems, encrypted content information files and keys to decrypt such files, survey invitation information for each of the surveys, and exposure limit information to determine whether content information can be viewed by a client computer system.
  • the client computer system Based on the survey invitation information, if the user of the client computer system has been selected to participate in a survey, the client computer system receives an E-mail invitation to participate including a unique survey identifier associated with the survey and the respondent identifier of the client computer system.
  • the survey may represent any program which requires content information to be viewed in a secure environment.
  • the client computer system In response to receiving a survey, in accordance with the E-mail invitation, from the web site, or another web site, the client computer system enables the content viewer to connect to the web site of the content protection system and download a file with the encrypted content information for that survey.
  • the downloaded file has no associated information regarding usage of the file by the client computer system.
  • the encrypted content information is identified by a unique content identifier.
  • the encrypted file may alternatively be provided from another source on the client computer system, such as a disk or CDROM.
  • the viewer software sends a request to the content protection system for a key to decrypt the downloaded content information file, and includes in the request the respondent, viewer, survey, and content identifiers.
  • the content protection system determines whether the respondent, viewer and survey identifiers match corresponding identifiers of the participants invited to take the survey stored in the database of the system, determines based on the exposure limit information whether the content information can be viewed at the client computer system, and if the survey has not yet been taken by the user at the client computer system. If so, the decryption key is sent to the client computer system and the viewer uses the key to decrypt the encrypted content information file, and then opens a viewer window to show (graphic or text) or play (video, animation, or audio) the decrypted content information on the display of the computer system. If not, an error message is sent to the client computer system.
  • the viewer ignores interrupts from the keyboard and mouse which typically allow the user to access information and thereby enable copying, such as a print screen key, right mouse button, or screen scraper. If the user selects another window other than the window of the viewer, the viewer stops showing the decrypted content and displays a protection image in its place. Thus, the content information is protected from authorized viewing by encryption and protected from unauthorized copying by limiting the ability of the user access to only viewing.
  • FIG. 1 is a block diagram of the system according to the present invention illustrating the network connection of components of the system with client computer systems;
  • FIG. 2 is a block diagram of the content protection system of FIG. 1 with a survey server and one of the client computer systems;
  • FIG. 3 illustrates the tables of the database of the content protection system of FIG. 1 ;
  • FIG. 4 is a flow chart showing the encryption by the Content Encryption server of FIG. 1 ;
  • FIG. 5 is a flow chart showing the operation for downloading and registering of the viewer software from the content protection system to one of the client computer systems;
  • FIG. 6 is a block diagram of one of the client computer system of FIGS. 1 and 2 showing the installed viewer software
  • FIG. 7 is a flow chart showing the operation of the system for protecting content information received as part of a survey.
  • the system 10 of the present invention is shown having multiple web servers 12 , 13 , 14 , and 15 at a web site which are capable of establishing a network connection over the Internet 16 or other public network with one or more client computer systems 18 .
  • Client computer system 18 represents a desktop, laptop, WebTV, or other computer system having typical web browser software, such as Microsoft Explorer or NetScape Navigator, and network interface, such as a modem, or T 1 /T 2 data line to an Internet Service Provider, for communicating to web sites at Internet addresses associated with such sites.
  • the web servers 12 - 15 are connected to a LAN 17 and have access to database 20 .
  • the Download and Register Content Viewer server 12 is coupled to the Internet 16 and has an Internet address or URL enabling a user at client computer system 18 to connect to the web server 12 and download a file referred to as content viewer software.
  • the Registration server 13 updates and maintains registration information in the database 20 identifying the client computer system and installed content viewer software at the client computer system.
  • the Content Encryption server 14 provides for assigning a unique identifier to each content file representing information, such as an image, text, video, audio, or animation, encrypting the content file, determining a decryption key for the encrypted content file, and storing the content file at a URL on the server 14 or another web site on the Internet.
  • the server 14 also allows a client computer system 18 to receive an encrypted content file at the URL associated with the file.
  • the Key server 15 has a URL addressable by the viewer software installed at the client computer system 18 to request the decryption key associated with a downloaded encrypted file.
  • the database 20 stores in addition to registration information and information about each encrypted content file, exposure limit information on the rules regarding when the content may be viewed and how many times the content may be viewed at a client computer system, and survey and invitation information defining the survey requiring viewing of content files and the participants (registered client computer systems) selected for each survey, as will be described later in connection to FIG. 3 .
  • the database 20 may be stored in memory, such as the hard drive or RAM, of a computer or another server, or may be contained in memory of one of servers 12 - 15 .
  • One or more administrative computers represented by computer 21 can be coupled to LAN 17 .
  • the administrative computer 21 can send content files to the content encryption server 14 for encryption, and update the database with regards to the survey, invitation information and exposure limit information.
  • the survey may be conducted over the Internet as described in U.S. patent application Ser. No. 09/243,064, filed Feb. 2, 1999, which is herein incorporated by reference.
  • a survey which requires the user to view a content file encrypted by the content protected system before answering one or more questions, may automatically enable the content viewer, if installed on the client computer system, to connect to the URL of the content protection system's Content Encryption server 14 to first obtain the encrypted content file and then request the decryption key from the Key server 15 .
  • the user at a client computer system 18 can receive an invitation, such as in an E-mail message, to link to the address of the survey server, or the user can address the survey server.
  • the survey may represent any program or file which requires information to be viewed.
  • the survey server may be a separate web site, or can be included in the web site of the content protection system.
  • the records of the Exposure Limit 25 and ContentView 26 tables store exposure limit information.
  • the records of the Respondent table 30 store registration information.
  • the records of the Survey 27 and invitation 29 tables store survey and invitation information.
  • the records of the SurveyContent 24 and Content 28 tables store the information regarding the content files.
  • Each table is related to each other by one or more identifiers defined as follows: ContentID is an identifier to an encrypted content file; SurveyID is the identifier of a particular survey; RespondentID is an identifier for an invitation to take a survey or view secure content; ViewerID is an identifier which uniquely identifies a client computer system for an instance of the viewer software downloaded to a client computer system.
  • the RespondentID need not be unique, but when combined with the ViewerID may be considered unique in representing a survey participant.
  • the SurveyContent table 24 has two data fields, SurveyID and ContentID. Each record in the SurveyContent table links a particular survey having the SurveyID to an encrypted content file having the ContentID.
  • the Exposure Limit Table 25 has records with the following data fields: ContentID; SurveyID; EndDate, the last date which the encrypted file associated with the ContentID of the record can be viewed; EndHour, the time (hour and minute) on the EndDate when the encrypted file associated with the ContentID of the record can no longer be viewed; StartDate, the first date which the encrypted file of the ContentID of the record can be viewed; StartHour, the time (hour and minute) on the StartDate when the encrypted file associated with the ContentID of the record can be viewed; and No Viewing, a number indicating the number of times the encrypted file associated with the ContentID can be viewed by a client computer system.
  • the invitation Table 29 has records with the following data fields: RespondentID; SurveyID; ViewerID; Survey Complete, the date and time when the survey associated with the SurveyID was completed at the client computer system having the RespondentID and associated ViewerID; and Survey Start, the date and time when the survey associated with the SurveyID was started at the client computer system having the RespondentID for the associated viewer software ViewerID.
  • the Respondent Table 30 has records with the following data fields: RespondentID; ViewerID associated with the RespondentID; and E-mail, the E-mail address of the RespondentID. In the example of tables 25 - 30 shown in FIG.
  • each of the types of different data fields are indicated by “Ir” for an integer number, “D” for date, “T” for time, “VA” for variable alphanumeric followed by a number indicating the maximum character length, and “A 32 ”, for a fixed length alphanumeric of 32 characters.
  • the database tables 25 - 30 will further be described in connection with FIGS. 5 and 7 .
  • the administrative computer 21 can send unencrypted (clear text) content file to the Content Encryption server 14 with a ContentID and name to be associated with the content file.
  • the content file may contain data in the form of text, graphics, video, or audio, and can represent a commercial or advertisement for a product or service.
  • the Content Encryption server 14 processes the unencrypted content file 32 in accordance with an encryption algorithm 33 to provide an encrypted content file 34 , a decryption (unencryption) key 35 , and an encrypted ContentID 36 .
  • the encryption algorithm 33 may be any type of typical encryption algorithm requiring an unencryption key associated with an encrypted file.
  • the encryption algorithm may be in accordance with the Federal Data Encryption Standard (DES).
  • Server 14 creates a record in the Content table 28 specifying the ContentID, the Content Name, Decryption key, and the URL where the encrypted content file is stored.
  • DES Federal Data Encryption Standard
  • Server 14 creates a record in the Content table 28 specifying the ContentID, the Content Name, Decryption key, and the URL where the encrypted content file is stored.
  • DES Federal Data Encryption Standard
  • Server 14 creates a record in the Content table 28 specifying the ContentID, the Content Name, Decryption key, and the URL where the encrypted content file is stored.
  • DES Federal Data Encryption Standard
  • Server 14 creates a record in the Content table 28 specifying the ContentID, the Content Name, Decryption key, and the URL where the encrypted content file is stored.
  • DES Federal Data Encryption Standard
  • Server 14 creates a record in the Content table 28 specifying the ContentID, the Content Name, Decrypt
  • the administrative computer 21 For each survey (or program) requiring the viewing of one or more encrypted content files, the administrative computer 21 adds a record to the SurveyContent table 24 of the database linking the encrypted content file, ContentID, with the particular survey, SurveyID. Further, a record in the Exposure Limit table 25 is created specifying for the encrypted content file, ContentID, and SurveyID, the number of viewings for each client computer system, the start date and time of the content file may be viewed, and end date and time the content file may be viewed. Further, each survey, SurveyID, may have a record in the Survey table 27 specifying the URL associated with the survey at the survey server 22 , and the name of the survey. The URL may be specified by the administrative computer or by the server 14 . The administrative computer may be programmed with an administrative interface for updating (adding, deleting, or changing) the records in the tables 25 - 30 of database 20 in which edit fields correspond to the data fields of the tables.
  • the content control system 10 sends from server 12 to the client computer system of a user an E-mail invitation to participate in a survey in the future with the URL of the server 12 (step 38 ), as shown in FIG. 5 .
  • Each E-mail invitation contains a RespondentID.
  • the URL of server 12 enables the web browser of the client computer system 18 to link to a page at server 12 which enables the user to send a request to download of the content viewer software (step 39 ).
  • This request includes the RespondentID received via the E-mail invitation.
  • server 12 sends the content viewer program with an installation program (step 40 ).
  • the client computer system 18 receives the content viewer and installation software, and the installation program of the viewer is manually executed by the user at the client computer system 18 to install the viewer in memory of the computer, such that it can be called when needed by a survey received from the survey server 22 (step 41 ).
  • the installation program registers the content viewer in the Windows registry of the client computer system with a specific application type so a file with the same extension can invoke the viewer.
  • the registration process generates a unique ViewerID to identify the client computer system 18 , such as described below.
  • the E-mail invitation asks the client computer user to register the content viewer with server 12 by browsing to a URL, or via a dialog box which appear at the end of the viewer installation, to complete the registration.
  • the ViewerID is sent to server 12 to be stored (registered) in a record of the Respondent table 30 of the database with the RespondentID received in the E-mail invitation (step 42 ).
  • the user is also asked during registration for their E-mail address and any other information to be stored in this record.
  • the VeiwerID may be generated by a call to the Win 32 system API CoCreateGUD.
  • the ViewerID is generated to uniquely identify the client computer system 18 , and may be based on: the current date and time, a clock sequence and related persistent state to deal with retrograde motion of clocks, a forcibly incremented counter to deal with high-frequency allocations, and the truly globally unique IEEE machine identifier, obtained from a network card, or other highly variable machine states.
  • the registration process now ties together, in Respondent table 30 of database 20 , the user's original E-mail address, the RespondentID sent to the user at the start of the registration process, and the ViewerID generated during viewer installation. If the user changes his E-mail address, the user must re-register his copy of the viewer, as described above.
  • the same set of API calls are used to download encrypted content from the referenced URL's. Further, at module 48 , once the content is downloaded, the content is stored in the client computer's cache directory. These files are accessed using the URLCacheAPI. After the content is downloaded and decrypted, the keyboard, mouse and focus control are handled by hooks to the Win 32 API and the VB 6 runtime DLL library.
  • the Decryption Control Module 50 utilizes Window's CryptAPI to call to the viewer from the Window operating system for decrypting the data of encrypted file in accordance with a received decryption key, and Window's AdvAPI call to send the decrypted image to the screen of the display 51 of the client computer system 18 .
  • the Event Control Module 52 When a decrypted image is displayed on the screen, the Event Control Module 52 , via the Win 32 API, monitors interrupt events 53 from the mouse and keyboard (i.e., user interface).
  • the Focus Control Module 54 is activated if the user switches focus away from the content viewer, such as the Alt-Tab, pressing of the left button on the mouse, clicking on another window on the screen or the screen's desktop.
  • the Focus Control Module 54 in response to a switch in focus from the user, immediately stops the viewer from showing the decrypted content information, and instead shows a protection image in the window of the content viewer, such as a gray screen with a copyright notice or other information.
  • the content protection system sends to a client computer system 18 an E-mail invitation to participate in a survey based on the records in the Invitation Table for the SurveyID associated with the survey (step 56 ).
  • the Key server locates each RespondentID to participate in the survey using the records of the invitation table associated with the SurveyID of the survey, and then related records in the Respondent Table for E-mail address associated with the RespondentID.
  • the E-mail invitation in addition to a message requesting their participation in the survey, includes the SurveyID and RespondentID and the URL of the survey server 22 ( FIG. 2 ). Although this invitation is preferably E-mail, the same information may be sent to the user through regular mail or other advertising media.
  • the invitation contains a network address of the survey server which references the SurveyfD of the survey.
  • the address may be in an embedded hyperlink upon which the user clicks upon to contact the survey server and receive the HTML page with the survey.
  • the RespondentID may be an embedded as a parameter in the URL, or the opening dialog box of the survey may request it from the user. (The RespondentID may have been given to the user, such as by display to the user, at the earlier described registration process).
  • the web browser of the client computer system operates in accordance with the HTML code of the survey to enable the viewer, which then sends a request to the web site of the content protection system for the encrypted files based upon the SurveyID (step 57 ).
  • the HTML code for the survey (or the content viewer) operates the viewer to send a request, via the Internet, to the Key server 15 ( FIG. 1 ) for the decryption key for the downloaded file (step 59 ).
  • the request includes the RespondentID and ViewerID which was stored with the viewer when installed, the SurveyID of the survey, and the ContentID of the encrypted content file.
  • the Key server 15 receives, via the Internet 16 , the request from the client computer system 18 , and sends the decryption key from the record of the Content table 28 having the ContentID to the client computer system requesting the key if the Key server:
  • condition 1 confirms matching of ID's to that of the request to identify preselected invited survey participants
  • conditions 2 - 4 represent examples of business rules to authorize sending of the key. Any number or different business rules may be used, and are not limited to those specified above. For example, although preferably conditions 1 - 4 must be true, the system may operate using only conditions 1 and 4 , if no associated record for the SurveyID are present in the Exposure Limit table or the View Content table, respectively.
  • the key is received by the viewer of the client computer system, the viewer decrypts in real time the encrypted file, opens a viewer window, and shows (graphic or text) or plays (video, animation, or audio) the decrypted content information on the display screen of the computer system (step 62 ).
  • the viewer may call a player installed at the client computer system, such as Microsoft Media Player, in accordance with the type of decrypted content information, if needed to utilize the decrypted content information.
  • a player installed at the client computer system such as Microsoft Media Player
  • the viewer checks the interrupts received from the keyboard and mouse (or other user interface device of the client computer system) and ignores the interrupts which would enable the user at the client computer potential access to the decrypted content information. If interrupt signals representing the right mouse key, print screen key, or screen scraper are received by the windows operating system, the viewer discards the interrupts. If the window loses focus, such as by the user clicking, via the mouse, on another window on the screen, the viewer window displays only a screen with a copyright notice or other message. Play of display resumes when the viewer again receives focus, such as by the user clicking, via the mouse, on the viewer window.
  • the user can close the viewer window and proceed to answer the questions of the survey.
  • the user submits the answers by clicking on a button on the survey page, which sends the answers to the survey server and a message to the content protection system, i.e., Key server, that the survey was completed with the RespondentID, SurveyID and ViewerID.
  • the survey complete field of the record in the invitation table 29 having the RespondentID, SurveyID and ViewerlD is updated with the date and time the message was received.
  • the client computer system 18 Upon receiving a survey invitation, if the client computer system 18 cannot call the content viewer software (since it has not been installed), the HTML code of the survey will not operate. The Key server 15 will allow the installation and registration of the content viewer. However, the client computer system 18 will still not decrypt the content for this particular survey, since there will be no corresponding record in the invitation table of database 20 . Once registered, the client computer system 18 may receive future invitations to participate in surveys with protected content that the user will be able to complete successfully.
  • the data structures of the tables of the database 20 described above are exemplary. Other data structures may be used with different tables for storing the information described therein.

Abstract

A system for protecting information over the Internet, or other public network, is provided at a web site addressable by one or more client computer systems. Each client computer system connects to the web site to receive a respondent identifier and viewer software. When the viewer software is installed at the client computer system, it generates a unique viewer identifier identifying the client computer system. The viewer identifier is sent to the web site for registering the viewer identifier with the respondent identifier. The web site has a database and one or more web servers coupled to the database. The database stores registration information including the viewer identifier and associated respondent identifiers for the client computer systems, encrypted content information files and keys to decrypt such files, survey invitation information for each of the surveys, and exposure limit information. The client computer system receives an E-mail invitation to participate in a survey. In response to receiving a survey in accordance with the E-mail invitation, the client computer system enables the content viewer to connect to the web site of the content protection system and download a file with the encrypted content information for that survey. The viewer software then sends a request to the content protection system for a key to decrypt the downloaded content information file. The content protection system determines based on the respondent, viewer and survey identifiers and associated exposure limit information whether to send a decryption key. If so, a decryption key is sent to the client computer system and the viewer uses the key to decrypt the encrypted content information file, and then opens a viewer window to show the decrypted content information on the display of the computer system. During viewing, the viewer ignores interrupts from the user interface of the computer which typically allow the user to access information and thereby enable copying. If the user selects another window other than the window of the viewer, the viewer stops showing the decrypted content and displays a protection image in its place.

Description

  • This application is a Continuation of U.S. patent application Ser. No. 09/630,422, filed Aug. 1, 2000, which claims the benefit of priority to U.S. Provisional Patent Application No. 60/146,691, filed August 2, 1999, which is herein incorporated by reference.
  • FIELD OF THE INVENTION
  • The present invention relates to a system (and method) for protecting information over the Internet or other public networks, and relates particularly to, a system for protecting the viewing of information at a computer system which is connected over the Internet to the system. The invention is especially suitable for conducting surveys over the Internet via a computer in which part of the survey viewed on the display of the computer must be protected from unauthorized viewing and copying. The invention may also be applied to any other application where viewing of information at a computer requires authorization and protection from copying, where rights to limited viewing of the information are received via the Internet. Viewing is generally defined herein as displaying graphics, text, video, or other information with any accompanying audio.
  • BACKGROUND OF THE INVENTION
  • Conventionally, surveys or polls are a series of questions on a form presented to individuals, called voters, to sample the views of people in a given region or country for political, commercial or entertainment purposes. Surveys are typically conducted either in person, mail, or via telephone to a great number of individual voters. With the development of the Internet and its growing widespread use, surveys can now be taken by persons at their computer. For example, a system for conducting surveys over the Internet is described in U.S. patent application Ser. No. 09/243,064, filed Feb. 2, 1999. Often surveys are used to test concepts, such as the packaging of a new food product, before companies make an investment in the product or to determine the best way to advertise the product. It is important in concept test surveys that the information used to convey the content of the concept be prevented from view by competitors who could use the information to the disadvantage of the company supporting the survey. This is easy in conventional surveys where the viewed information is provided in a protected environment of in-person polling. However, in surveys conducted over the Internet, the environment of the typical web browser software enables a user easily to copy downloaded information of a survey to a storage file, E-mail, or printer. Thus, it would be desirable to conduct a survey over the Internet in which content information of the survey is protected from unauthorized viewing or copying.
  • Complicated systems for downloading digital works to computer systems have been developed capable of providing billing and payment to the owners of the digital works based on usage, such as copying or displaying, which may be metered. For example, U.S. Pat. Nos. 5,629,980, 5,638,443, and 5,715,403 describe a system for controlling the distribution and use of digital works in which usage rights are permanently attached to each digital work stored in repositories, and rendering systems receiving a digital work have access to the work in accordance with the usage rights attached to the work. In another example, U.S. Pat. No. 5,982,891 provides a system for virtual distribution to electronic appliances, such as computers, to enable payment for use, and reporting of use, of content distributed to such electronic appliances. The electronic appliance can have a secure processing unit to provide a processing environment offering tamper resistance. In the electronic appliance, access to distributed content is not allowed unless control information, rules and controls, for that content is present at the appliance specifying usage. These systems, which may use encryption/decryption techniques, are complex in order that they can support traditional commercial distribution and transaction methods for digital works. Unauthorized copying of digital works is primarily prevented by the usage or control information which must be present, or permanently attached, to digital works.
  • SUMMARY OF THE INVENTION
  • It is the principal object of the present invention to provide an improved system for protecting information over the Internet from unauthorized viewing and copying.
  • It is another object of the present invention to provide an improved system for protecting information over the Internet transmitted to a computer as part of a survey.
  • A still further object of the present invention is to provide an improved system for protecting information over the Internet transmitted in a content file to a computer in which no specific usage control information, i.e., information defining how the content file may be used, is provided, or otherwise associated with the transmitted content file, in contrast with prior art distribution systems for digital works.
  • Yet another object of the present invention is to provide an improved system for protecting information over the Internet in which a network computer can enable a client computer having received an encrypted content files to be authenticated by the network computer using a plurality of identifiers before the client computer can receive a key to decrypt the content file.
  • A further object of the present invention is to provide an improved system for protecting information in which a computer receiving a content file has focus control to protect displayed information from the content file from being readily accessed and thereby copied.
  • Briefly described, the content protection system embodying the present invention includes a web site addressable by one or more client computer systems for connecting to the content protection system over the Internet or other public network. Each client computer system connects to the web site and receives a respondent identifier and viewer software. When the viewer software is installed at the client computer system, it generates a unique viewer identifier identifying the client computer system. The viewer identifier is sent to the web site for registering the viewer identifier with the respondent identifier. The web site has a database and one or more web servers coupled to the database. The database stores registration information including the viewer identifier and associated respondent identifiers for the client computer systems, encrypted content information files and keys to decrypt such files, survey invitation information for each of the surveys, and exposure limit information to determine whether content information can be viewed by a client computer system. Based on the survey invitation information, if the user of the client computer system has been selected to participate in a survey, the client computer system receives an E-mail invitation to participate including a unique survey identifier associated with the survey and the respondent identifier of the client computer system. The survey may represent any program which requires content information to be viewed in a secure environment. In response to receiving a survey, in accordance with the E-mail invitation, from the web site, or another web site, the client computer system enables the content viewer to connect to the web site of the content protection system and download a file with the encrypted content information for that survey. The downloaded file has no associated information regarding usage of the file by the client computer system. The encrypted content information is identified by a unique content identifier. The encrypted file may alternatively be provided from another source on the client computer system, such as a disk or CDROM. The viewer software sends a request to the content protection system for a key to decrypt the downloaded content information file, and includes in the request the respondent, viewer, survey, and content identifiers. The content protection system determines whether the respondent, viewer and survey identifiers match corresponding identifiers of the participants invited to take the survey stored in the database of the system, determines based on the exposure limit information whether the content information can be viewed at the client computer system, and if the survey has not yet been taken by the user at the client computer system. If so, the decryption key is sent to the client computer system and the viewer uses the key to decrypt the encrypted content information file, and then opens a viewer window to show (graphic or text) or play (video, animation, or audio) the decrypted content information on the display of the computer system. If not, an error message is sent to the client computer system.
  • During viewing, the viewer ignores interrupts from the keyboard and mouse which typically allow the user to access information and thereby enable copying, such as a print screen key, right mouse button, or screen scraper. If the user selects another window other than the window of the viewer, the viewer stops showing the decrypted content and displays a protection image in its place. Thus, the content information is protected from authorized viewing by encryption and protected from unauthorized copying by limiting the ability of the user access to only viewing.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing objects, features and advantages of the invention will become more apparent from a reading of the following description in connection with the accompanying drawings in which:
  • FIG. 1 is a block diagram of the system according to the present invention illustrating the network connection of components of the system with client computer systems;
  • FIG. 2 is a block diagram of the content protection system of FIG. 1 with a survey server and one of the client computer systems;
  • FIG. 3 illustrates the tables of the database of the content protection system of FIG. 1;
  • FIG. 4 is a flow chart showing the encryption by the Content Encryption server of FIG. 1;
  • FIG. 5 is a flow chart showing the operation for downloading and registering of the viewer software from the content protection system to one of the client computer systems;
  • FIG. 6 is a block diagram of one of the client computer system of FIGS. 1 and 2 showing the installed viewer software; and
  • FIG. 7 is a flow chart showing the operation of the system for protecting content information received as part of a survey.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring to FIG. 1, the system 10 of the present invention is shown having multiple web servers 12, 13, 14, and 15 at a web site which are capable of establishing a network connection over the Internet 16 or other public network with one or more client computer systems 18. Client computer system 18 represents a desktop, laptop, WebTV, or other computer system having typical web browser software, such as Microsoft Explorer or NetScape Navigator, and network interface, such as a modem, or T1/T2 data line to an Internet Service Provider, for communicating to web sites at Internet addresses associated with such sites. The web servers 12-15 are connected to a LAN 17 and have access to database 20. The Download and Register Content Viewer server 12 is coupled to the Internet 16 and has an Internet address or URL enabling a user at client computer system 18 to connect to the web server 12 and download a file referred to as content viewer software. The Registration server 13 updates and maintains registration information in the database 20 identifying the client computer system and installed content viewer software at the client computer system. The Content Encryption server 14 provides for assigning a unique identifier to each content file representing information, such as an image, text, video, audio, or animation, encrypting the content file, determining a decryption key for the encrypted content file, and storing the content file at a URL on the server 14 or another web site on the Internet. The server 14 also allows a client computer system 18 to receive an encrypted content file at the URL associated with the file. The Key server 15 has a URL addressable by the viewer software installed at the client computer system 18 to request the decryption key associated with a downloaded encrypted file. The database 20 stores in addition to registration information and information about each encrypted content file, exposure limit information on the rules regarding when the content may be viewed and how many times the content may be viewed at a client computer system, and survey and invitation information defining the survey requiring viewing of content files and the participants (registered client computer systems) selected for each survey, as will be described later in connection to FIG. 3. The database 20 may be stored in memory, such as the hard drive or RAM, of a computer or another server, or may be contained in memory of one of servers 12-15.
  • One or more administrative computers represented by computer 21 can be coupled to LAN 17. The administrative computer 21 can send content files to the content encryption server 14 for encryption, and update the database with regards to the survey, invitation information and exposure limit information.
  • Referring to FIG. 2, the content protection system 10 of the present invention operates to enable a user to view encrypted content files which are called as part of a survey received from a survey server 22. A survey represents an HTML file which is downloaded to the client server and viewed via the web browser of the client computer system. Each survey has a unique identifier called a SurveyID. The survey may be addressed in reference to a SurveyID, or the SurveyID may be referred in the downloaded HTML file. The survey represents questions and each question has an answer set having buttons or text entry fields, which simulates a written survey. A submit button at the bottom of the survey page on the screen may be clicked upon by the user, such as via a mouse, to send the selected answers to each question to the survey server 22 for tabulation. The survey may be conducted over the Internet as described in U.S. patent application Ser. No. 09/243,064, filed Feb. 2, 1999, which is herein incorporated by reference. A survey, which requires the user to view a content file encrypted by the content protected system before answering one or more questions, may automatically enable the content viewer, if installed on the client computer system, to connect to the URL of the content protection system's Content Encryption server 14 to first obtain the encrypted content file and then request the decryption key from the Key server 15. The user at a client computer system 18 can receive an invitation, such as in an E-mail message, to link to the address of the survey server, or the user can address the survey server. Although reference is made to a survey, the survey may represent any program or file which requires information to be viewed. Further, the survey server may be a separate web site, or can be included in the web site of the content protection system.
  • Records of multiple tables are stored in database 20 shown in FIG. 3. The records of the Exposure Limit 25 and ContentView 26 tables store exposure limit information. The records of the Respondent table 30 store registration information. The records of the Survey 27 and Invitation 29 tables store survey and invitation information. The records of the SurveyContent 24 and Content 28 tables store the information regarding the content files. Each table is related to each other by one or more identifiers defined as follows: ContentID is an identifier to an encrypted content file; SurveyID is the identifier of a particular survey; RespondentID is an identifier for an invitation to take a survey or view secure content; ViewerID is an identifier which uniquely identifies a client computer system for an instance of the viewer software downloaded to a client computer system. The RespondentID need not be unique, but when combined with the ViewerID may be considered unique in representing a survey participant.
  • The SurveyContent table 24 has two data fields, SurveyID and ContentID. Each record in the SurveyContent table links a particular survey having the SurveyID to an encrypted content file having the ContentID. The Exposure Limit Table 25 has records with the following data fields: ContentID; SurveyID; EndDate, the last date which the encrypted file associated with the ContentID of the record can be viewed; EndHour, the time (hour and minute) on the EndDate when the encrypted file associated with the ContentID of the record can no longer be viewed; StartDate, the first date which the encrypted file of the ContentID of the record can be viewed; StartHour, the time (hour and minute) on the StartDate when the encrypted file associated with the ContentID of the record can be viewed; and No Viewing, a number indicating the number of times the encrypted file associated with the ContentID can be viewed by a client computer system. The View Content table 26 has records with the following data fields: ContentID; SurveyID; RespondentID; and Count, the number of times the client computer system associated with the RespondentID has viewed the content file associated with the ContentID for the survey associated with the SurveyID of this record. The Survey table 27 has three data fields: SurveyID; SurveyURL, the network address of the survey at the survey server; and SurveyName, the name of the survey. The Content table 28 has records with the following data fields: ContentID; ContentName, the name of the encrypted content file associated with the ContentID of this record; and Unlocking Key, the decryption key associated with the encrypted content file associated with the ContentID of this record; ContentURL, the network address where the encrypted content file of the ContentID of this record can be accessed. The Invitation Table 29 has records with the following data fields: RespondentID; SurveyID; ViewerID; Survey Complete, the date and time when the survey associated with the SurveyID was completed at the client computer system having the RespondentID and associated ViewerID; and Survey Start, the date and time when the survey associated with the SurveyID was started at the client computer system having the RespondentID for the associated viewer software ViewerID. The Respondent Table 30 has records with the following data fields: RespondentID; ViewerID associated with the RespondentID; and E-mail, the E-mail address of the RespondentID. In the example of tables 25-30 shown in FIG. 3, each of the types of different data fields are indicated by “Ir” for an integer number, “D” for date, “T” for time, “VA” for variable alphanumeric followed by a number indicating the maximum character length, and “A32”, for a fixed length alphanumeric of 32 characters. The database tables 25-30 will further be described in connection with FIGS. 5 and 7.
  • Referring to FIG. 4, the administrative computer 21 can send unencrypted (clear text) content file to the Content Encryption server 14 with a ContentID and name to be associated with the content file. The content file may contain data in the form of text, graphics, video, or audio, and can represent a commercial or advertisement for a product or service. The Content Encryption server 14 processes the unencrypted content file 32 in accordance with an encryption algorithm 33 to provide an encrypted content file 34, a decryption (unencryption) key 35, and an encrypted ContentID 36. The encryption algorithm 33 may be any type of typical encryption algorithm requiring an unencryption key associated with an encrypted file. For example, the encryption algorithm may be in accordance with the Federal Data Encryption Standard (DES). Server 14 creates a record in the Content table 28 specifying the ContentID, the Content Name, Decryption key, and the URL where the encrypted content file is stored. For a survey, multiple records are provided in the Invitation table 29 for the survey's SurveyID, where each record has a ViewerID associated with a particular client computer system and a RespondantID associated with the VeiwerID for that survey. In this manner, the participates are selected for a survey. This selection may be made randomly from the pool of records of the Respondent table 30 by server 14, or the administrative computer may select each of the participants from the records of the Respondent table. The records in Respondent table 30 in addition to E-mail addresses may have data fields storing other information entered at registration, such as age or sex, or other information typically used to select participants in polling.
  • For each survey (or program) requiring the viewing of one or more encrypted content files, the administrative computer 21 adds a record to the SurveyContent table 24 of the database linking the encrypted content file, ContentID, with the particular survey, SurveyID. Further, a record in the Exposure Limit table 25 is created specifying for the encrypted content file, ContentID, and SurveyID, the number of viewings for each client computer system, the start date and time of the content file may be viewed, and end date and time the content file may be viewed. Further, each survey, SurveyID, may have a record in the Survey table 27 specifying the URL associated with the survey at the survey server 22, and the name of the survey. The URL may be specified by the administrative computer or by the server 14. The administrative computer may be programmed with an administrative interface for updating (adding, deleting, or changing) the records in the tables 25-30 of database 20 in which edit fields correspond to the data fields of the tables.
  • Before a user can participate in the survey requiring viewing of the information of a content file, the content viewer must be installed on their computer system 18. To receive the content viewer software, the content control system 10 sends from server 12 to the client computer system of a user an E-mail invitation to participate in a survey in the future with the URL of the server 12 (step 38), as shown in FIG. 5. Each E-mail invitation contains a RespondentID. The URL of server 12 enables the web browser of the client computer system 18 to link to a page at server 12 which enables the user to send a request to download of the content viewer software (step 39). This request includes the RespondentID received via the E-mail Invitation. In response to receiving the request, server 12 sends the content viewer program with an installation program (step 40). The client computer system 18 receives the content viewer and installation software, and the installation program of the viewer is manually executed by the user at the client computer system 18 to install the viewer in memory of the computer, such that it can be called when needed by a survey received from the survey server 22 (step 41). The installation program registers the content viewer in the Windows registry of the client computer system with a specific application type so a file with the same extension can invoke the viewer. The registration process generates a unique ViewerID to identify the client computer system 18, such as described below. After installation of the viewer, the E-mail invitation asks the client computer user to register the content viewer with server 12 by browsing to a URL, or via a dialog box which appear at the end of the viewer installation, to complete the registration. By connecting to this URL, the ViewerID is sent to server 12 to be stored (registered) in a record of the Respondent table 30 of the database with the RespondentID received in the E-mail invitation (step 42). The user is also asked during registration for their E-mail address and any other information to be stored in this record.
  • The VeiwerID may be generated by a call to the Win32 system API CoCreateGUD. The ViewerID is generated to uniquely identify the client computer system 18, and may be based on: the current date and time, a clock sequence and related persistent state to deal with retrograde motion of clocks, a forcibly incremented counter to deal with high-frequency allocations, and the truly globally unique IEEE machine identifier, obtained from a network card, or other highly variable machine states. Thus, the registration process now ties together, in Respondent table 30 of database 20, the user's original E-mail address, the RespondentID sent to the user at the start of the registration process, and the ViewerID generated during viewer installation. If the user changes his E-mail address, the user must re-register his copy of the viewer, as described above.
  • Referring to FIG. 6, the client computer system 18 and installed content viewer software 44 is shown. The client computer system 18 operates on the window operating system or platform, typically referred to as the Win32 environment. The computer 18 has memory (RAM or hard disk drive) storing the encrypted content file 46 downloaded from the web site of the content protection system. Alternatively, the encrypted content file may be stored on a disk or CDROM received via a disk or CDROM drive of the client computer system 18. The content viewer 44 has several modules, and operates using API and DLL functions (or calls to programs) in Win32, as shown in FIG. 6. In the Traffic/Cache Control Module 48, the communication with the content encryption server 14 is conducted using WinInet API calls, as typical of network communication between a web server and a client computer. Once the communication is established, the same set of API calls are used to download encrypted content from the referenced URL's. Further, at module 48, once the content is downloaded, the content is stored in the client computer's cache directory. These files are accessed using the URLCacheAPI. After the content is downloaded and decrypted, the keyboard, mouse and focus control are handled by hooks to the Win32API and the VB6 runtime DLL library. The Decryption Control Module 50 utilizes Window's CryptAPI to call to the viewer from the Window operating system for decrypting the data of encrypted file in accordance with a received decryption key, and Window's AdvAPI call to send the decrypted image to the screen of the display 51 of the client computer system 18. When a decrypted image is displayed on the screen, the Event Control Module 52, via the Win32API, monitors interrupt events 53 from the mouse and keyboard (i.e., user interface). The Focus Control Module 54 is activated if the user switches focus away from the content viewer, such as the Alt-Tab, pressing of the left button on the mouse, clicking on another window on the screen or the screen's desktop. The Focus Control Module 54 in response to a switch in focus from the user, immediately stops the viewer from showing the decrypted content information, and instead shows a protection image in the window of the content viewer, such as a gray screen with a copyright notice or other information.
  • Referring to FIG. 7, the operation of the system will now be described. The content protection system sends to a client computer system 18 an E-mail invitation to participate in a survey based on the records in the Invitation Table for the SurveyID associated with the survey (step 56). The Key server locates each RespondentID to participate in the survey using the records of the Invitation table associated with the SurveyID of the survey, and then related records in the Respondent Table for E-mail address associated with the RespondentID. The E-mail invitation, in addition to a message requesting their participation in the survey, includes the SurveyID and RespondentID and the URL of the survey server 22 (FIG. 2). Although this invitation is preferably E-mail, the same information may be sent to the user through regular mail or other advertising media. The invitation contains a network address of the survey server which references the SurveyfD of the survey. In the case where an E-mail invitation is used, the address may be in an embedded hyperlink upon which the user clicks upon to contact the survey server and receive the HTML page with the survey. The RespondentID may be an embedded as a parameter in the URL, or the opening dialog box of the survey may request it from the user. (The RespondentID may have been given to the user, such as by display to the user, at the earlier described registration process). Upon receipt of the survey, the web browser of the client computer system operates in accordance with the HTML code of the survey to enable the viewer, which then sends a request to the web site of the content protection system for the encrypted files based upon the SurveyID (step 57). In response, the content protection system, such as server 14, queries for all records of the SurveyContent table having the SurveyID and locates the ContentID associated with the SurveyID. In addition, the SurveyStart field of the record of the Invitation table for the RespondentID is updated with the current date and time to show that the survey has commenced. The record of the Content table having the ContentID is then accessed to locate the URL where the encrypted content information file will be found. This URL points to a file which contains the location of the encrypted content. This encrypted content file is then downloaded from this URL address to the client computer system, via the content viewer, at the client computer system (step 58). If multiple records were located in the Content table for the SurveyID, each encrypted content file is separately downloaded to the client computer system immediately prior to processing.
  • After receiving the downloaded file, the HTML code for the survey (or the content viewer) operates the viewer to send a request, via the Internet, to the Key server 15 (FIG. 1) for the decryption key for the downloaded file (step 59). The request includes the RespondentID and ViewerID which was stored with the viewer when installed, the SurveyID of the survey, and the ContentID of the encrypted content file.
  • At steps 60-61, the Key server 15 receives, via the Internet 16, the request from the client computer system 18, and sends the decryption key from the record of the Content table 28 having the ContentID to the client computer system requesting the key if the Key server:
  • 1) can locate the RespondentID, SurveyID and ViewerID of the request in the same record of the Invitation table 29;
  • 2) the current date and time is within the specified time period, i.e., date and time range (StartDate, StartHour, and EndDate, EndHour), of the record of the Exposure Limit table 25 for the ContentID and SurveyID of the request;
  • 3) if a record is present in the View Content table 26 having the ContentID, SurveyID, and RespondentID of the request, that the Count field of the record is less than the No Viewing field of the record in the Exposure Limit table 25 for the ContentID and SurveyID of the request; and,
  • 4) the Survey Complete field of the Invitation table 29 having the RespondentID, SurveyID and ViewerlD of the request, is not set to a date and time (i.e., indicating that the survey has not yet been taken).
  • If either conditions 1-4 are not true, an error message is sent to the client computer system 18 from the Key server 15. After sending the key, if a record exists in the View Content table 26 for the ContentID, SurveyID, and RespondentID of the request, the Key server increments the count value by one, otherwise the Key server adds a record in the View Content table for the ContentID, SurveyID, and RespondentID and the count value is set to one. Thus, condition 1 confirms matching of ID's to that of the request to identify preselected invited survey participants, while conditions 2-4 represent examples of business rules to authorize sending of the key. Any number or different business rules may be used, and are not limited to those specified above. For example, although preferably conditions 1-4 must be true, the system may operate using only conditions 1 and 4, if no associated record for the SurveyID are present in the Exposure Limit table or the View Content table, respectively.
  • The key is received by the viewer of the client computer system, the viewer decrypts in real time the encrypted file, opens a viewer window, and shows (graphic or text) or plays (video, animation, or audio) the decrypted content information on the display screen of the computer system (step 62). The viewer may call a player installed at the client computer system, such as Microsoft Media Player, in accordance with the type of decrypted content information, if needed to utilize the decrypted content information. However, if an error message is received by the client computer system instead of a key, it is also displayed on the display screen.
  • During viewing, the viewer checks the interrupts received from the keyboard and mouse (or other user interface device of the client computer system) and ignores the interrupts which would enable the user at the client computer potential access to the decrypted content information. If interrupt signals representing the right mouse key, print screen key, or screen scraper are received by the windows operating system, the viewer discards the interrupts. If the window loses focus, such as by the user clicking, via the mouse, on another window on the screen, the viewer window displays only a screen with a copyright notice or other message. Play of display resumes when the viewer again receives focus, such as by the user clicking, via the mouse, on the viewer window.
  • After viewing is completed, the user can close the viewer window and proceed to answer the questions of the survey. The user submits the answers by clicking on a button on the survey page, which sends the answers to the survey server and a message to the content protection system, i.e., Key server, that the survey was completed with the RespondentID, SurveyID and ViewerID. The survey complete field of the record in the Invitation table 29 having the RespondentID, SurveyID and ViewerlD is updated with the date and time the message was received.
  • Upon receiving a survey invitation, if the client computer system 18 cannot call the content viewer software (since it has not been installed), the HTML code of the survey will not operate. The Key server 15 will allow the installation and registration of the content viewer. However, the client computer system 18 will still not decrypt the content for this particular survey, since there will be no corresponding record in the Invitation table of database 20. Once registered, the client computer system 18 may receive future invitations to participate in surveys with protected content that the user will be able to complete successfully.
  • In this manner, user interaction with the client computer system 18, via its user interface, is limited during display by the viewer to prevent access to the decrypted content file, and thereby possibly unauthorized electronic copying or printing. As the focus control limits access, no specific usage control information, defining how the content file may be used at the client computer, need be associated or attached with each content file in the client computer system, as in complex prior art distribution systems for digital works. Thus, the content file is not transmitted to the client computer system 18 with usage control information.
  • The data structures of the tables of the database 20 described above are exemplary. Other data structures may be used with different tables for storing the information described therein.
  • From the foregoing description, it will be apparent that an improved system for protecting information over the Internet has been provided. Variations and modifications of the herein described system and other applications for the invention will undoubtedly suggest themselves to those skilled in the art. Accordingly, the foregoing description should be taken as illustrative and not in a limiting sense.

Claims (39)

1. A system for protecting information received over a network comprising:
at least one first computer system connected to said network;
a plurality of second computer systems capable of connecting to said first computer system through said network in which each of said second computers has a user interface to enable the user of the second computer to interact with the second computer system;
means for registering one or more of said second computer systems by uniquely identifying each of said second computer systems with the user of the second computer system;
means for selecting one or more of said registered second computer systems; means for sending content information from the first computer system via said network to at least one of said selected registered second computer systems without associated information defining the use of said content information by said second computer systems; and
means for enabling display of the received content information at the registered second computer system which receives the content information and limiting the user interface of the second computer system to operate responsive to the user of the second computer system to prevent copying of the content information when said received content information is being displayed.
2. The system according to claim 1 wherein said content information sent to said one of said registered second computer systems is encrypted, further comprising:
means at said second computer system for requesting a key from said first computer system for decrypting said received encrypted content information;
means at said first computer system for sending a key to decrypt the encrypted content information to the second computer system which requested the key; and
means at the second computer system for decrypting the encrypted content information in accordance with the received key, in which said second computer system when displaying the decrypted content information ignores signals from the user interface capable of enabling access to the decrypted content information.
3. The system according to claim 2 wherein one or more of said registered second computer systems are selected by said selecting means to view the content information, and said key sending means only sends said key to said selected second computer systems.
4. The system according to claim 2 wherein said key sending means only sends said key during a certain time period.
5. The system according to claim 2 wherein said key sending means only send said key to said second computer system a certain number of times.
6. The system according to claim 1 wherein said display enabling means at said second computer systems is provided by viewer software installed at the second computer system, and said registering means is enabled when said viewer software is installed.
7. The system according to claim 1 wherein said sending means, and display enabling means are enabled by viewer software installed at the second computer system.
8. The system according to claim 7 wherein said viewer software is automatically executed in response to executing a program received by said second computer system via the network.
9. The system according to claim 1 wherein said second computer systems each have a display, and said display enabling means provides for playing said content information is a window on the display.
10. The system according to claim 9 wherein said display enabling means disables playing of said content information in said window when the user of the second computer system selects another window on the display.
11. The system according to claim 10 wherein said display enabling means places a protection image in the window when said playing of said content information in said window is disabled.
12. The system according to claim 1 wherein said first computer system comprises one or more server computers and a database coupled to at least one of said server computers storing at least information representing the registered second computer systems and information related to the users of each of said registered second computer systems.
13. The system according to claim 1 wherein said second computer systems each have means for interfacing to said network and capable of connecting to said first computer system at one or more network addresses.
14. The system according to claim 1 wherein said network represents a public network.
15. The system according to claim 1 wherein said content information is part of a survey.
16. The system according to claim 15 wherein said first computer system comprises one or more server computers capable of communicating with said plurality of second computer systems via said network, and a database coupled to at least one of said network computers containing at least information defining the registered second computer systems, information identifying which of the registered ones of said second computer systems are associated with participants for the survey, and information determining whether the survey was taken by the participants, in which said content information is sent encrypted by said first computer system, said first computer system has means for sending to said second computer systems a key to decrypted the encrypted file when, in accordance with said database, said second computer system is associated with one of the participants for the survey not having taken the survey, and said second computer system has means for decrypting said encrypted content information in accordance with said key for displaying the decrypted content information.
17. A method for protecting information received over a network, such as the Internet, comprising the steps of:
providing at least one first computer system;
providing a plurality of second computer systems capable of connecting to said first computer system through said network in which each of said second computers has a user interface to enable the user of the second computer to interact with the second computer system;
registering one or more of said second computer systems by uniquely identifying each of said second computer systems with the user of the second computer system;
selecting one or more of said registered second computer systems,
sending content information from the first computer system to at least one of said selected registered second computer systems without associated information defining the use of said content information by said second computer systems; and
displaying of the received content information at the registered second computer system which receives the content information and limiting the user interface of the second computer system to operate responsive to the user of the second computer system to prevent copying of the content information when said received content information is being displayed.
18. The method according to claim 17 wherein said content information sent to said one of said registered second computer systems is encrypted, said method further comprising the steps of:
requesting at said second computer system a key from said first computer system for decrypting said received encrypted content information;
sending from said first computer system a key to decrypt the encrypted content information to the second computer system which requested the key; and
decrypting at the second computer system the encrypted content information in accordance with the received key, in which said second computer system when displaying the decrypted content information ignores signals from the user interface capable of enabling access to the decrypted content information.
19. The method according to claim 18 wherein said key sending step only sends said key to the selected second computer systems which requested the key.
20-25. (canceled)
26. A system for protecting an information file received over a public network from a World Wide Web site by one or more computer systems capable of communicating via the network to the web site, said system comprising:
a web site connected to the network which uniquely registers one or more of said computer systems identifying said computer system to said web site and stores in a database encrypted information files and their associated keys, in which said web site is capable of sending said encrypted information file to registered computer systems, and sending a key to decrypt an encrypted information file to one of said registered second computer system when said second computer system is authorized to receive the key;
each of said computer system being capable of connecting to said web site through the Internet and registered with said web site to send a request to said web site for a certain encrypted information file and to receive the encrypted information file, and then request a key from said web site to decrypt the file, and in response to receiving the key, decrypts the encrypted information file and plays the file through a window on the display of the computer system; and
each of said computer systems having a display and a user interface in which, when said file is played, signals from the user interface at the second computer system are ignored which enable access to the decrypted file, and when another window is selected than the window displaying the decrypted file, disables the playing of the decrypted file.
27. An Internet web site for supporting concept surveys which are capable of connecting to one or more client computer systems comprising:
one or more computer servers capable of connecting to the Internet in which said client computer system are registered with said web site; and
a database coupled to one or more of said servers which stores encrypted information files representing parts of one or more surveys and their associated keys, in which said web site is capable of sending said encrypted information file to registered client computer systems for carrying out a survey received by said client computer systems, and sending a key to decrypt an encrypted information file to one of said registered second computer system when said second computer system is authorized to receive the key to enable the client computer system to play the information file as part of the survey, in which said survey represents one or more questions answerable by the user of the client computer system.
28. (canceled)
29. The web site according to claim 27 wherein at least one of said computer servers provides downloadable viewer software to client computer systems capable of requesting and receiving said encrypted information file from said web site, and requesting and receiving said key to decrypt said encrypted information file from said web site, and for displaying said decrypted information file in which during said display the operation of the user interface of the client computer system is limited to prevent copying of the decrypted information file.
30. A system for conducting a survey over a network comprising:
at least one first computer system connected to said network;
a plurality of second computer systems capable of connecting to said first computer system through said network in which said second computer systems are registered at said first computer system;
means for sending a survey from said first computer system to at least one of said registered second computers;
means for downloading an encrypted file from said first computer system to said one of said registered second computer systems in which said encrypted file is stored at said one of said registered second computer systems for use in said survey;
means at said one of said registered second computer systems for requesting a key from said first computer system to decrypt said encrypted file when said one of said registered second computer systems is associated with a participant preselected to take said survey;
means for receiving a key at said one of said registered second computers from said first computer system; and
means at said one of said registered second computer systems for decrypting the encrypted file in accordance with said key and playing the decrypted file as part of the survey at said one of said registered second computer systems, in which said survey represents one or more questions answerable by the user of the client computer system.
31. The system according to claim 30 wherein said network represents the Internet, and said first computer system represents one or more computer servers addressable via the Internet.
32. The system according to claim 30 further comprising means at said one of said registered second computer systems for sending answers to said survey to said first computer system.
33. A system for conducting a survey at a computer connected to the Internet comprising a first computer system representing one or more computer servers, and at least one second computer system capable of connecting to said first computer system through the Internet, and said first computer system has memory storing at least one survey and one or more downloadable files, said first computer system having keys for decrypting each of said files when encrypted, in which said files are downloadable and the keys are available from at least one network address, wherein:
said first computer system sends said survey to the second computer system via the Internet which references a network address to obtain a file for said survey; and
said second computer system has memory and downloads said file from said network address for storage in said memory of said second computer system in which said file is encrypted, said second computer system requests a key to decrypt said encrypted file from a network address where said key is available, receives a key when said second computer system is associated with a participant selected to take said survey, and decrypts the file in accordance with said key and plays the decrypted file as part of the survey.
34. The system according to claim 33 wherein said second computer system further comprises a display and plays the decrypted file in a window on said display, and protects said window from being accessed by the user of the second computer system when another window on the display is selected.
35. The system according to claim 33 wherein said second computer system is registered with said first computer system for receiving said survey prior to said second computer system receiving said survey.
36. The system according to claim 33 wherein said first computer system sends the key to the second computer system when said key has been requested during a certain period of time.
37. The system according to claim 33 wherein said first computer system sends the key to the second computer system when the second computer system has not already received the encrypted file a preset number of times.
38. The system according to claim 33 wherein said first computer system sends the key to the computer when a participant has not taken the survey.
39. A system for conducting surveys comprising:
at least one first computer system connected to said network representing one or more computer servers;
a plurality of second computer systems each capable of connecting to said first computer system through said network;
a database registering uniquely said second computer systems and associating each of said registering second computer systems with data describing one or more characteristics of the user of the second computer system;
said first computer system enabling selection of one or more users from said database as participants to take a survey comprising one or more questions; and
said first computer system is capable of sending the survey and sending encrypted content information via the network to at least one of said registered second computer systems associated with a user selected to participate in the survey, in which said second computer system downloads the survey from a first network address associated with said first computer system, requests a key from a second network address associated with said first computer system for decrypting said content information, and when said key is received said second computer system utilizes said key to decrypt said content information and then outputs said decrypted content information as part of said survey in which one or more questions of said survey relates to said outputted content information.
40. The system according to claim 39 wherein each of said second computer systems has a user interface which limits the second computer system to operate responsive to the user of the second computer system to prevent copying of the content information while said received content information is being outputted.
41. The system according to claim 39 wherein said one or more characteristics of the user comprises at least one of age or sex of the user.
42. The system according to claim 1 wherein said user interface has at least one input device, and said means for enabling display and limiting the user interface operates to limit one or more user interactions via said at least one input device with said second computer system when said received content information is being displayed.
43. The system according to claim 42 wherein said at least one input device comprises at least one of a keyboard having keys or a mouse having buttons, and said one or more user interactions limited are in response to certain one or more of said keys or buttons selectable by the user.
44. The method according to claim 17 wherein said limiting the user interface limits one or more user interactions via at least one input device of the user interface when said received content information is being displayed.
US11/639,824 1999-08-02 2006-12-15 System for protecting information over the internet Abandoned US20070101139A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/639,824 US20070101139A1 (en) 1999-08-02 2006-12-15 System for protecting information over the internet

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14669199P 1999-08-02 1999-08-02
US09/630,422 US7171567B1 (en) 1999-08-02 2000-08-01 System for protecting information over the internet
US11/639,824 US20070101139A1 (en) 1999-08-02 2006-12-15 System for protecting information over the internet

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/630,422 Continuation US7171567B1 (en) 1999-08-02 2000-08-01 System for protecting information over the internet

Publications (1)

Publication Number Publication Date
US20070101139A1 true US20070101139A1 (en) 2007-05-03

Family

ID=37682013

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/630,422 Expired - Lifetime US7171567B1 (en) 1999-08-02 2000-08-01 System for protecting information over the internet
US11/639,824 Abandoned US20070101139A1 (en) 1999-08-02 2006-12-15 System for protecting information over the internet

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/630,422 Expired - Lifetime US7171567B1 (en) 1999-08-02 2000-08-01 System for protecting information over the internet

Country Status (1)

Country Link
US (2) US7171567B1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060021062A1 (en) * 2004-06-21 2006-01-26 Jang Hyun S Method of downloading contents and system thereof
US20060121878A1 (en) * 2002-12-17 2006-06-08 Kelly Declan P Mobile device that uses removable medium for playback of content
US20080002829A1 (en) * 2006-06-27 2008-01-03 Nokia Corporation Identifiers in a communication system
US20090254945A1 (en) * 2008-04-08 2009-10-08 Sony Corporation Playback apparatus, playback method, program, recording medium, server, and server method
US20100211774A1 (en) * 2009-02-13 2010-08-19 Mitsubishi Electric Corporation Information gathering system, terminal unit, program for information gathering, and program for a terminal
US20100262824A1 (en) * 2009-04-13 2010-10-14 Bhaktha Ram Keshavachar System and Method for Software Protection and Secure Software Distribution
US20110196892A1 (en) * 2008-10-23 2011-08-11 Huawei Technologies Co., Ltd. Method and apparatus for content sharing
US20140089203A1 (en) * 2007-01-16 2014-03-27 Voltage Security, Inc. Format-preserving cryptographic systems
CN104781821A (en) * 2012-09-07 2015-07-15 蒂弗萨Ip公司 Snippet matching in file sharing networks
WO2017112484A1 (en) * 2015-12-22 2017-06-29 Wal-Mart Stores, Inc. Data breach detection system
US20180278424A1 (en) * 2017-03-22 2018-09-27 Verizon Patent And Licensing Inc. Controlling access to content in a network
US10749674B2 (en) 2017-09-29 2020-08-18 Micro Focus Llc Format preserving encryption utilizing a key version
US11170876B2 (en) * 2010-10-09 2021-11-09 MEI Research, Ltd. System to dynamically collect and synchronize data with mobile devices

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6987842B1 (en) * 1999-10-04 2006-01-17 Mankovitz Roy J Electronic television program guide delivery system using telephone network idle time
US6917961B2 (en) 2000-03-30 2005-07-12 Kettera Software, Inc. Evolving interactive dialog box for an internet web page
US8621001B2 (en) 2000-03-30 2013-12-31 Ebay Inc. System and method for dynamically changing the content of an information display
US7451094B2 (en) * 2000-05-22 2008-11-11 Royall & Company Method for electronically surveying prospective candidates for admission to educational institutions and encouraging interest in attending
JP3393604B2 (en) * 2000-09-01 2003-04-07 株式会社インターナショナルビジネスリンク Service provision method
US7493499B1 (en) * 2003-05-22 2009-02-17 Copyright Clearance Center, Inc. Method and apparatus for secure delivery and rights management of digital content
US7308504B2 (en) * 2003-07-07 2007-12-11 Sun Microsystems, Inc. System and method for dynamically disabling partially streamed content
US7324648B1 (en) 2003-07-08 2008-01-29 Copyright Clearance Center, Inc. Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site
JP2005151459A (en) * 2003-11-19 2005-06-09 Canon Inc Image processing system and its image data processing method
WO2005088891A2 (en) * 2004-03-15 2005-09-22 Matsushita Electric Industrial Co., Ltd. Encryption device and key distribution device and system
US9060096B2 (en) * 2007-07-26 2015-06-16 The Directv Group, Inc. Method and system for forming a content stream with conditional access information and a content file
US20090067625A1 (en) * 2007-09-07 2009-03-12 Aceurity, Inc. Method for protection of digital rights at points of vulnerability in real time
US20090080665A1 (en) * 2007-09-25 2009-03-26 Aceurity, Inc. Method of Generating Secure Codes for a Randomized Scrambling Scheme for the Protection of Unprotected Transient Information
US8108777B2 (en) 2008-08-11 2012-01-31 Microsoft Corporation Sections of a presentation having user-definable properties
US8544109B2 (en) * 2008-08-12 2013-09-24 So-Net M3 Usa Methods and systems involving survey administration
US10419722B2 (en) 2009-04-28 2019-09-17 Whp Workflow Solutions, Inc. Correlated media source management and response control
US10565065B2 (en) 2009-04-28 2020-02-18 Getac Technology Corporation Data backup and transfer across multiple cloud computing providers
US8311983B2 (en) * 2009-04-28 2012-11-13 Whp Workflow Solutions, Llc Correlated media for distributed sources
US10127524B2 (en) 2009-05-26 2018-11-13 Microsoft Technology Licensing, Llc Shared collaboration canvas
WO2011103561A2 (en) 2010-02-22 2011-08-25 Lockify, Inc. Encryption system using web browsers and untrusted web servers
US9124554B2 (en) * 2010-03-09 2015-09-01 At&T Intellectual Property I, L.P. Mobility network operator service delivery hub
US20110225636A1 (en) * 2010-03-09 2011-09-15 Keith Chad C Method For Automating Onboarding Application Developers To Sales Distribution Channel
US9906838B2 (en) * 2010-07-12 2018-02-27 Time Warner Cable Enterprises Llc Apparatus and methods for content delivery and message exchange across multiple content delivery networks
US8479298B2 (en) * 2010-07-30 2013-07-02 At&T Intellectual Property I, L.P. Method for encrypting and embedding information in a URL for content delivery
US9383888B2 (en) 2010-12-15 2016-07-05 Microsoft Technology Licensing, Llc Optimized joint document review
US9118612B2 (en) 2010-12-15 2015-08-25 Microsoft Technology Licensing, Llc Meeting-specific state indicators
US9864612B2 (en) 2010-12-23 2018-01-09 Microsoft Technology Licensing, Llc Techniques to customize a user interface for different displays
US9544158B2 (en) * 2011-10-05 2017-01-10 Microsoft Technology Licensing, Llc Workspace collaboration via a wall-type computing device
US8682973B2 (en) 2011-10-05 2014-03-25 Microsoft Corporation Multi-user and multi-device collaboration
US9996241B2 (en) 2011-10-11 2018-06-12 Microsoft Technology Licensing, Llc Interactive visualization of multiple software functionality content items
US10198485B2 (en) 2011-10-13 2019-02-05 Microsoft Technology Licensing, Llc Authoring of data visualizations and maps
CN105871805A (en) * 2015-12-11 2016-08-17 乐视云计算有限公司 Anti-stealing-link method and device

Citations (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4104721A (en) * 1976-12-30 1978-08-01 International Business Machines Corporation Hierarchical security mechanism for dynamically assigning security levels to object programs
US4588991A (en) * 1983-03-07 1986-05-13 Atalla Corporation File access security method and means
US4757534A (en) * 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US4796220A (en) * 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US4850017A (en) * 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
US4864494A (en) * 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US4926476A (en) * 1989-02-03 1990-05-15 Motorola, Inc. Method and apparatus for secure execution of untrusted software
US4933969A (en) * 1987-03-03 1990-06-12 Hewlett-Packard Company Data authentication and protection system
US5008853A (en) * 1987-12-02 1991-04-16 Xerox Corporation Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment
US5034980A (en) * 1987-10-02 1991-07-23 Intel Corporation Microprocessor for providing copy protection
US5077665A (en) * 1989-05-25 1991-12-31 Reuters Limited Distributed matching system
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US5124984A (en) * 1990-08-07 1992-06-23 Concord Communications, Inc. Access controller for local area network
US5155680A (en) * 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
US5163096A (en) * 1991-06-06 1992-11-10 International Business Machines Corporation Storage protection utilizing public storage key control
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5224163A (en) * 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5235641A (en) * 1990-03-13 1993-08-10 Hitachi, Ltd. File encryption method and file cryptographic system
US5270773A (en) * 1992-11-27 1993-12-14 Xerox Corporation Image producing device with security to prevent disclosure of sensitive documents
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
US5293422A (en) * 1992-09-23 1994-03-08 Dynatek, Inc. Usage control system for computer software
US5301245A (en) * 1991-03-29 1994-04-05 Pioneer Electronic Corporation System for transmitting a commercial program in a CATV system
US5313521A (en) * 1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5343527A (en) * 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
US5361091A (en) * 1990-09-28 1994-11-01 Inteletext Systems, Inc. Interactive home information system for distributing video picture information to television viewers over a fiber optic telephone system
US5381480A (en) * 1993-09-20 1995-01-10 International Business Machines Corporation System for translating encrypted data
US5388211A (en) * 1989-04-28 1995-02-07 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5390297A (en) * 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US5392351A (en) * 1992-03-16 1995-02-21 Fujitsu Limited Electronic data protection system
US5400403A (en) * 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method
US5438508A (en) * 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US5442541A (en) * 1993-07-23 1995-08-15 Xerox Corporation Enabling features over common communication channel
US5444779A (en) * 1993-10-18 1995-08-22 Xerox Corporation Electronic copyright royalty accounting system using glyphs
US5457746A (en) * 1993-09-14 1995-10-10 Spyrus, Inc. System and method for access control for portable data storage media
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature
US5469571A (en) * 1991-07-15 1995-11-21 Lynx Real-Time Systems, Inc. Operating system architecture using multiple priority light weight kernel task based interrupt handling
US5473691A (en) * 1993-11-05 1995-12-05 Microsoft Corporation System and method for computer data transmission
US5483658A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
US5490216A (en) * 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5497479A (en) * 1989-04-28 1996-03-05 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5499340A (en) * 1994-01-12 1996-03-12 Isogon Corporation Method and apparatus for computer program usage monitoring
US5499298A (en) * 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
US5504816A (en) * 1994-02-02 1996-04-02 Gi Corporation Method and apparatus for controlling access to digital signals
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5509073A (en) * 1992-11-26 1996-04-16 Schlumberger Industries Communications network
US5509074A (en) * 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5524238A (en) * 1994-03-23 1996-06-04 Breakout I/O Corporation User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the field accessed
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5694470A (en) * 1993-11-17 1997-12-02 Telub Teknik Ab System for reading encrypted information, and unit for use in such a system
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5734380A (en) * 1996-09-27 1998-03-31 Adams; James S. Method for controlling the presentation of displays in a multi-window computer environment
US5740252A (en) * 1995-10-13 1998-04-14 C/Net, Inc. Apparatus and method for passing private demographic information between hyperlink destinations
US5768503A (en) * 1995-09-25 1998-06-16 International Business Machines Corporation Middleware program with enhanced security
US5818935A (en) * 1997-03-10 1998-10-06 Maa; Chia-Yiu Internet enhanced video system
US5825890A (en) * 1995-08-25 1998-10-20 Netscape Communications Corporation Secure socket layer application program apparatus and method
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5881287A (en) * 1994-08-12 1999-03-09 Mast; Michael B. Method and apparatus for copy protection of images in a computer system
US5889952A (en) * 1996-08-14 1999-03-30 Microsoft Corporation Access check system utilizing cached access permissions
US5889860A (en) * 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key
US5893098A (en) * 1994-09-14 1999-04-06 Dolphin Software Pty Ltd System and method for obtaining and collating survey information from a plurality of computer users
US5925126A (en) * 1997-03-18 1999-07-20 Memco Software, Ltd. Method for security shield implementation in computer system's software
US5933829A (en) * 1996-11-08 1999-08-03 Neomedia Technologies, Inc. Automatic access of electronic information through secure machine-readable codes on printed documents
US5944794A (en) * 1994-09-30 1999-08-31 Kabushiki Kaisha Toshiba User identification data management scheme for networking computer systems using wide area network
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US5978476A (en) * 1996-09-17 1999-11-02 Altera Corporation Access restriction to circuit designs
US5982891A (en) * 1995-02-13 1999-11-09 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5987134A (en) * 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
US5987232A (en) * 1995-09-08 1999-11-16 Cadix Inc. Verification server for use in authentication on networks
US5987125A (en) * 1997-12-15 1999-11-16 Western Atlas International, Inc. Method for communicating seismic data
US5999711A (en) * 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines
US5999971A (en) * 1997-06-25 1999-12-07 Inforonics, Inc. Apparatus and method for identifying clients accessing network sites
US6009526A (en) * 1996-09-24 1999-12-28 Choi; Seung-Ryeol Information security system for tracing the information outflow and a method for tracing the same
US6023509A (en) * 1996-09-30 2000-02-08 Intel Corporation Digital signature purpose encoding
US6023765A (en) * 1996-12-06 2000-02-08 The United States Of America As Represented By The Secretary Of Commerce Implementation of role-based access control in multi-level secure systems
US6023763A (en) * 1997-04-23 2000-02-08 Fisher Controls International, Inc. Method of and apparatus for protecting and upgrading software using a removable hardlock
US6078891A (en) * 1997-11-24 2000-06-20 Riordan; John Method and system for collecting and processing marketing data
US6102287A (en) * 1998-05-15 2000-08-15 International Business Machines Corporation Method and apparatus for providing product survey information in an electronic payment system
US6134661A (en) * 1998-02-11 2000-10-17 Topp; William C. Computer network security device and method
US6141754A (en) * 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US6167523A (en) * 1997-05-05 2000-12-26 Intel Corporation Method and apparatus for forms data validation and processing control
US6272547B1 (en) * 1994-05-19 2001-08-07 British Telecommunications Public Limited Company High level control of file transfer protocol with capability for repeated transfer attempts
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6308270B1 (en) * 1998-02-13 2001-10-23 Schlumberger Technologies, Inc. Validating and certifying execution of a software program with a smart card
US20020069365A1 (en) * 1999-02-08 2002-06-06 Christopher J. Howard Limited-use browser and security system
US6477504B1 (en) * 1998-03-02 2002-11-05 Ix, Inc. Method and apparatus for automating the conduct of surveys over a network system
US6584199B1 (en) * 1997-12-31 2003-06-24 Lg Electronics, Inc. Conditional access system and method thereof
US20040210472A1 (en) * 2002-07-25 2004-10-21 Lew Ark L. System and method for conducting a real-time survey

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5710884A (en) * 1995-03-29 1998-01-20 Intel Corporation System for automatically updating personal profile server with updates to additional user information gathered from monitoring user's electronic consuming habits generated on computer during use
WO2001097439A1 (en) * 2000-06-14 2001-12-20 Commercial Electronics Llc A method and system for viewer identification and data collection verification

Patent Citations (97)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4104721A (en) * 1976-12-30 1978-08-01 International Business Machines Corporation Hierarchical security mechanism for dynamically assigning security levels to object programs
US4588991A (en) * 1983-03-07 1986-05-13 Atalla Corporation File access security method and means
US4757534A (en) * 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US4864494A (en) * 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US5155680A (en) * 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US4796220A (en) * 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US4933969A (en) * 1987-03-03 1990-06-12 Hewlett-Packard Company Data authentication and protection system
US4850017A (en) * 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
US5034980A (en) * 1987-10-02 1991-07-23 Intel Corporation Microprocessor for providing copy protection
US5390297A (en) * 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US5008853A (en) * 1987-12-02 1991-04-16 Xerox Corporation Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US4926476A (en) * 1989-02-03 1990-05-15 Motorola, Inc. Method and apparatus for secure execution of untrusted software
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5388211A (en) * 1989-04-28 1995-02-07 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5497479A (en) * 1989-04-28 1996-03-05 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5077665A (en) * 1989-05-25 1991-12-31 Reuters Limited Distributed matching system
US5235641A (en) * 1990-03-13 1993-08-10 Hitachi, Ltd. File encryption method and file cryptographic system
US5124984A (en) * 1990-08-07 1992-06-23 Concord Communications, Inc. Access controller for local area network
US5224163A (en) * 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5361091A (en) * 1990-09-28 1994-11-01 Inteletext Systems, Inc. Interactive home information system for distributing video picture information to television viewers over a fiber optic telephone system
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
US5301245A (en) * 1991-03-29 1994-04-05 Pioneer Electronic Corporation System for transmitting a commercial program in a CATV system
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5163096A (en) * 1991-06-06 1992-11-10 International Business Machines Corporation Storage protection utilizing public storage key control
US5438508A (en) * 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US5469571A (en) * 1991-07-15 1995-11-21 Lynx Real-Time Systems, Inc. Operating system architecture using multiple priority light weight kernel task based interrupt handling
US5392351A (en) * 1992-03-16 1995-02-21 Fujitsu Limited Electronic data protection system
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
US5375240A (en) * 1992-04-07 1994-12-20 Grundy; Gregory Information distribution system
US5313521A (en) * 1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network
US5490216A (en) * 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration
US5293422A (en) * 1992-09-23 1994-03-08 Dynatek, Inc. Usage control system for computer software
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5509073A (en) * 1992-11-26 1996-04-16 Schlumberger Industries Communications network
US5270773A (en) * 1992-11-27 1993-12-14 Xerox Corporation Image producing device with security to prevent disclosure of sensitive documents
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature
US5483658A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
US5442541A (en) * 1993-07-23 1995-08-15 Xerox Corporation Enabling features over common communication channel
US5400403A (en) * 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method
US5457746A (en) * 1993-09-14 1995-10-10 Spyrus, Inc. System and method for access control for portable data storage media
US5381480A (en) * 1993-09-20 1995-01-10 International Business Machines Corporation System for translating encrypted data
US5444779A (en) * 1993-10-18 1995-08-22 Xerox Corporation Electronic copyright royalty accounting system using glyphs
US5343527A (en) * 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
US5473691A (en) * 1993-11-05 1995-12-05 Microsoft Corporation System and method for computer data transmission
US5694470A (en) * 1993-11-17 1997-12-02 Telub Teknik Ab System for reading encrypted information, and unit for use in such a system
US5499340A (en) * 1994-01-12 1996-03-12 Isogon Corporation Method and apparatus for computer program usage monitoring
US5509074A (en) * 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5504816A (en) * 1994-02-02 1996-04-02 Gi Corporation Method and apparatus for controlling access to digital signals
US5499298A (en) * 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
US5524238A (en) * 1994-03-23 1996-06-04 Breakout I/O Corporation User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the field accessed
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US6272547B1 (en) * 1994-05-19 2001-08-07 British Telecommunications Public Limited Company High level control of file transfer protocol with capability for repeated transfer attempts
US5999711A (en) * 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines
US5881287A (en) * 1994-08-12 1999-03-09 Mast; Michael B. Method and apparatus for copy protection of images in a computer system
US5893098A (en) * 1994-09-14 1999-04-06 Dolphin Software Pty Ltd System and method for obtaining and collating survey information from a plurality of computer users
US5944794A (en) * 1994-09-30 1999-08-31 Kabushiki Kaisha Toshiba User identification data management scheme for networking computer systems using wide area network
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5982891A (en) * 1995-02-13 1999-11-09 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
US5825890A (en) * 1995-08-25 1998-10-20 Netscape Communications Corporation Secure socket layer application program apparatus and method
US5987232A (en) * 1995-09-08 1999-11-16 Cadix Inc. Verification server for use in authentication on networks
US5768503A (en) * 1995-09-25 1998-06-16 International Business Machines Corporation Middleware program with enhanced security
US5740252A (en) * 1995-10-13 1998-04-14 C/Net, Inc. Apparatus and method for passing private demographic information between hyperlink destinations
US5987134A (en) * 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
US5889952A (en) * 1996-08-14 1999-03-30 Microsoft Corporation Access check system utilizing cached access permissions
US5978476A (en) * 1996-09-17 1999-11-02 Altera Corporation Access restriction to circuit designs
US6009526A (en) * 1996-09-24 1999-12-28 Choi; Seung-Ryeol Information security system for tracing the information outflow and a method for tracing the same
US5734380A (en) * 1996-09-27 1998-03-31 Adams; James S. Method for controlling the presentation of displays in a multi-window computer environment
US6023509A (en) * 1996-09-30 2000-02-08 Intel Corporation Digital signature purpose encoding
US5889860A (en) * 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key
US5933829A (en) * 1996-11-08 1999-08-03 Neomedia Technologies, Inc. Automatic access of electronic information through secure machine-readable codes on printed documents
US6023765A (en) * 1996-12-06 2000-02-08 The United States Of America As Represented By The Secretary Of Commerce Implementation of role-based access control in multi-level secure systems
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5818935A (en) * 1997-03-10 1998-10-06 Maa; Chia-Yiu Internet enhanced video system
US5925126A (en) * 1997-03-18 1999-07-20 Memco Software, Ltd. Method for security shield implementation in computer system's software
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6023763A (en) * 1997-04-23 2000-02-08 Fisher Controls International, Inc. Method of and apparatus for protecting and upgrading software using a removable hardlock
US6167523A (en) * 1997-05-05 2000-12-26 Intel Corporation Method and apparatus for forms data validation and processing control
US5999971A (en) * 1997-06-25 1999-12-07 Inforonics, Inc. Apparatus and method for identifying clients accessing network sites
US6078891A (en) * 1997-11-24 2000-06-20 Riordan; John Method and system for collecting and processing marketing data
US6141754A (en) * 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US5987125A (en) * 1997-12-15 1999-11-16 Western Atlas International, Inc. Method for communicating seismic data
US6584199B1 (en) * 1997-12-31 2003-06-24 Lg Electronics, Inc. Conditional access system and method thereof
US6134661A (en) * 1998-02-11 2000-10-17 Topp; William C. Computer network security device and method
US6308270B1 (en) * 1998-02-13 2001-10-23 Schlumberger Technologies, Inc. Validating and certifying execution of a software program with a smart card
US6477504B1 (en) * 1998-03-02 2002-11-05 Ix, Inc. Method and apparatus for automating the conduct of surveys over a network system
US6102287A (en) * 1998-05-15 2000-08-15 International Business Machines Corporation Method and apparatus for providing product survey information in an electronic payment system
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6353892B2 (en) * 1998-06-14 2002-03-05 Alchemedia Ltd. Copy protection of digital images transmitted over networks
US20020069365A1 (en) * 1999-02-08 2002-06-06 Christopher J. Howard Limited-use browser and security system
US20040210472A1 (en) * 2002-07-25 2004-10-21 Lew Ark L. System and method for conducting a real-time survey

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060121878A1 (en) * 2002-12-17 2006-06-08 Kelly Declan P Mobile device that uses removable medium for playback of content
US8014761B2 (en) * 2002-12-17 2011-09-06 Koninklijke Philips Electronics, N.V. Mobile device that uses removable medium for playback of content
US7921464B2 (en) * 2004-06-21 2011-04-05 Lg Electronics Inc. Method of downloading contents and system thereof
US20060021062A1 (en) * 2004-06-21 2006-01-26 Jang Hyun S Method of downloading contents and system thereof
US20080002829A1 (en) * 2006-06-27 2008-01-03 Nokia Corporation Identifiers in a communication system
US9344881B2 (en) 2006-06-27 2016-05-17 Vringo Infrastrct Inc. Identifiers in a communication system
US20140089203A1 (en) * 2007-01-16 2014-03-27 Voltage Security, Inc. Format-preserving cryptographic systems
US20160247150A1 (en) * 2007-01-16 2016-08-25 Voltage Security, LLC Format-preserving cryptographic systems
US9208491B2 (en) * 2007-01-16 2015-12-08 Voltage Security, Inc. Format-preserving cryptographic systems
US20090254945A1 (en) * 2008-04-08 2009-10-08 Sony Corporation Playback apparatus, playback method, program, recording medium, server, and server method
US20110196892A1 (en) * 2008-10-23 2011-08-11 Huawei Technologies Co., Ltd. Method and apparatus for content sharing
US8332423B2 (en) * 2008-10-23 2012-12-11 Huawei Technologies, Co., Ltd. Method and apparatus for content sharing
US20100211774A1 (en) * 2009-02-13 2010-08-19 Mitsubishi Electric Corporation Information gathering system, terminal unit, program for information gathering, and program for a terminal
US9172684B2 (en) 2009-02-13 2015-10-27 Mitsubishi Electric Corporation Information gathering system
US8572365B2 (en) * 2009-02-13 2013-10-29 Mitsubishi Electric Corporation Information gathering system, terminal unit, program for information gathering, and program for a terminal
US8533859B2 (en) * 2009-04-13 2013-09-10 Aventyn, Inc. System and method for software protection and secure software distribution
US20100262824A1 (en) * 2009-04-13 2010-10-14 Bhaktha Ram Keshavachar System and Method for Software Protection and Secure Software Distribution
US9520990B2 (en) 2009-04-13 2016-12-13 Aventyn, Inc. System and method for software protection and secure software distribution
US11170876B2 (en) * 2010-10-09 2021-11-09 MEI Research, Ltd. System to dynamically collect and synchronize data with mobile devices
US11915801B2 (en) 2010-10-09 2024-02-27 MEI Research, Ltd. System to dynamically collect and synchronize data with mobile devices
CN104781821A (en) * 2012-09-07 2015-07-15 蒂弗萨Ip公司 Snippet matching in file sharing networks
WO2017112484A1 (en) * 2015-12-22 2017-06-29 Wal-Mart Stores, Inc. Data breach detection system
US10482283B2 (en) 2015-12-22 2019-11-19 Walmart Apollo, Llc Data breach detection system
US10198595B2 (en) 2015-12-22 2019-02-05 Walmart Apollo, Llc Data breach detection system
US11153282B2 (en) * 2017-03-22 2021-10-19 Verizon Patent And Licensing Inc. Controlling access to content in a network
US20180278424A1 (en) * 2017-03-22 2018-09-27 Verizon Patent And Licensing Inc. Controlling access to content in a network
US10749674B2 (en) 2017-09-29 2020-08-18 Micro Focus Llc Format preserving encryption utilizing a key version

Also Published As

Publication number Publication date
US7171567B1 (en) 2007-01-30

Similar Documents

Publication Publication Date Title
US7171567B1 (en) System for protecting information over the internet
AU779120B2 (en) System for protecting information over the internet
US6170014B1 (en) Computer architecture for managing courseware in a shared use operating environment
EP0852440B1 (en) Network data transmission systems
CN1327373C (en) Method of protecting and managing digital contents and system for using thereof
US7149722B1 (en) Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system
US20020128903A1 (en) Encrypted coupons
US20010052077A1 (en) Universal mobile ID system and method for digital rights management
WO2001001286A2 (en) A system, method and article of manufacture for an internet based distribution architecture
JP2002352094A (en) Usage permission assigning system for digital literary work
JPH10512074A (en) System and method for secure transaction management and electronic rights protection
WO2001001227A1 (en) A system, method and article of manufacture for tracking software sale transactions of an internet-based retailer for reporting to a software publisher
US20030126033A1 (en) System, method and article of manufacture for software source authentication for return purposes
US20030046189A1 (en) System and method for a server to enable and disable client computer features
EP1170924A2 (en) Data display method and system
AU2005201442B2 (en) System for protecting information over the internet
JP2002334255A (en) Electronic contents distribution system, implementation device therefor, processing program therefor and recording medium
WO2001001319A1 (en) A system, method and article of manufacture for a customer profile-tailored support interface in an electronic software distribution environment
KR100902730B1 (en) Online survey method using digital contents
JP2002007912A (en) Digital content rental system and method
WO2001001225A1 (en) A system, method and article of manufacture for automatically generating a tailored license agreement
WO2001001316A2 (en) A system, method and article of manufacture for an electronic software distribution, post-download payment scheme with encryption capabilities
Polley Facilitating the use of cadastral data through the World Wide Web
Johnson-Laird Commercial Web sites and the law: The twain shall meet
SHARED Darago et al.

Legal Events

Date Code Title Description
AS Assignment

Owner name: DOT ASSETS NO. 2 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HARRIS INTERACTIVE INC.;REEL/FRAME:020753/0524

Effective date: 20070618

AS Assignment

Owner name: HARRIS INTERACTIVE, INC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAYER, LEONARD;MATHIAS, NELSON;FROST, DAVID;REEL/FRAME:023811/0879

Effective date: 20000818

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION