WO2011064362A1 - A method and system for accessing data in a network - Google Patents
A method and system for accessing data in a network Download PDFInfo
- Publication number
- WO2011064362A1 WO2011064362A1 PCT/EP2010/068412 EP2010068412W WO2011064362A1 WO 2011064362 A1 WO2011064362 A1 WO 2011064362A1 EP 2010068412 W EP2010068412 W EP 2010068412W WO 2011064362 A1 WO2011064362 A1 WO 2011064362A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- endpoint
- digital asset
- digital
- network
- access node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Definitions
- This invention relates to a method and system for accessing digital assets in a network, and relates particularly but not exclusively to accessing digital assets for use in a virtual world.
- Virtual worlds such as Second LifeTM, ForterraTM or MetaplaceTM, are computer-based simulated environments in which a user can interact with the virtual world and with other users, such that multiple users can have a shared experience in the virtual world. In this way virtual worlds can be thought of as interactive environments.
- each user is associated with an agent (known as an avatar) in the virtual world, where the agent is a persistent identity and persona for the user that interacts in the virtual world.
- a virtual world typically comprises regions which are persistent locations in the virtual world. Virtual regions are supplied by a number of different providers, including for example Rezzable at www.rezzable.com.
- a primitive defines the shape of the item, for example Figure 1 a shows a primitive which is a cube.
- a texture provides the colour and/or decoration of the item, for example Figure 1 b shows a texture that has been applied to the primitive cube of Figure 1 a. In this way the texture is used to define the appearance of the item when it is graphically rendered.
- One type of texture which can be applied to a primitive is a "sculpted prim", which defines surface positions for the primitive, such that the shape of the primitive is altered by the application of the sculpted prim, allowing more complex shapes to be defined than can be defined by the primitive alone.
- the texture is coded into a texture code which is applied to the primitive.
- An item may include further properties such as a script, as shown in Figure 1 c, written in any known scripting language for triggering processes in the virtual world, such as for triggering the output of an audio clip to the user.
- a region provides a persistent environment in the virtual world and usually contains many items which are defined by the properties as described above.
- the items in a region can be considered to be "digital assets" in the region.
- Content in the region defines a user experience for a user viewing the region.
- Content includes the digital assets as graphically renderable items in the user experience.
- the content also includes the software governing how users interact with items in a region and with other users in the region.
- Digital assets can be used in different regions of the virtual world and can be transferable between users in the virtual world. When digital assets are executed they graphically render objects in the virtual world.
- Grids can be used to provide regions in the virtual world and typically comprise a computing system with sufficient elements (such as a processor, a memory, a communication interface, etc) to host the region thereby providing the user experience to users viewing the region.
- a grid is capable of graphically rendering digital assets.
- the grid is typically managed by an entity which may (or may not) exercise control over how the digital assets are handled on the grid.
- the entity managing the grid may (or may not) be a separate entity to the creator of the digital assets used on the grid.
- Some digital assets are particularly desirable for users. For example if a digital assets creator has created a particularly desirable digital asset, such as a fashionable item of clothing for an avatar, then many users might wish to use the digital asset.
- the digital assets are not restricted to fashionable items of clothing.
- the digital assets can be any graphically renderable item that users may wish to use in the virtual world, such as animals, scenery, whole avatars, vehicles, poses, mannerisms, plantlife or text fonts, to name just some of the different types of digital assets which may be desirable.
- the digital assets creator transfers the digital assets to the user
- the digital assets creator no longer has control over how the digital assets are used.
- the digital assets creator supplies the digital assets over the network to the user.
- the digital assets creator might not want his digital assets to be used for some purposes in the virtual world, since this might for example affect the reputation of the digital assets creator.
- the lack of control over the future use of the digital assets may deter some digital assets creators from supplying the digital assets to users over the network.
- Digital assets can be transmitted and received by various terminals in the network and there is a problem as to how to identify trusted digital assets at a terminal in the network remote from the digital assets creator. Summary
- a method of transferring a graphically renderable digital asset across a network comprising at least one endpoint for utilising the digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark
- the method comprising: associating the digital trust mark, at a central access node of the network, with an indication of at least one specified endpoint for which usage of the digital asset is permitted, the central access node being independent of the at least one endpoint of the network; selecting the digital asset for use by a first endpoint; determining, at the central access node, whether the first endpoint is one of said at least one specified endpoint; and on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset to the first endpoint for use by the first endpoint.
- a network comprising: at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark; a central access node, independent of the at least one endpoint, for associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted; selecting means for selecting the digital asset for use by a first endpoint; and determining means for determining whether the first endpoint is one of said at least one specified endpoint, wherein the network is configured such that the digital asset is transferred to the first endpoint for use by the first endpoint on the basis that it is determined that the first endpoint is one of said at least one specified endpoint.
- a central access node in a network comprising at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark, the central access node being independent of the at least one endpoint and comprising: means for associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted; means for selecting the digital asset for use by a first endpoint; means for determining whether the first endpoint is one of said at least one specified endpoint; and means for transferring the digital asset to the first endpoint for use by the first endpoint on the basis that it is determined that the first endpoint is one of said at least one specified endpoint.
- a computer program product comprising computer readable instructions for execution at a central access node of a network, the network further comprising at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark and the central access node being independent of the at least one endpoint, wherein the instructions comprise instructions for: associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted; selecting the digital asset for use by a first endpoint; determining whether the first endpoint is one of said at least one specified endpoint; and on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset across the network to the first endpoint for use by the first endpoint.
- Embodiments of the present invention provide a central access node which can facilitate the distribution of digital assets between digital assets creators and endpoints in a network. Endpoints are for example users and/or grids.
- a registry keeps a list of trusted digital assets creators in the network, and can mark digital assets created by the trusted digital assets creators with a digital trust mark to indicate that the digital assets are trusted. Users can view a list of the trusted digital assets on the central access node and can see from the trust mark that the digital assets are from a trusted source (a trusted digital assets creator). Users can then identify the digital assets from the central access node in the knowledge that the central access node trusts the digital assets creator who created the digital assets.
- the digital assets creator can specify users to whom the digital assets can be supplied, such as only users in a particular geographical region (e.g. only users in the UK).
- the digital assets creator can also specify the regions (or grids) in which the digital assets may be used.
- the digital assets creator might not want his digital assets to be used in certain grids, for example if doing so may adversely affect his reputation.
- the digital assets creator can also specify how the digital assets can be used (e.g. whether the digital assets can be copied, modified or transferred etc).
- the details specified by the digital assets creator (such as who may access the digital assets and where/how the digital assets can be used) are stored at the registry.
- the central access node checks with the registry that the digital asset is allowed to be transferred to the user for use in a particular grid. In this way, the digital assets creator can control aspects of the usage of their digital assets after they are transmitted to the central access node.
- a digital assets creator can specify the endpoints (e.g. the users and/or the grids) in the network that are allowed to use their digital assets. This provides more trust for the digital assets creator that their digital assets will not be used in a way that is against their wishes.
- Figure 1 a is a representation of a primitive
- Figure 1 b is a representation of a primitive and a texture
- Figure 1 c is a representation of a primitive, a texture and a script
- Figure 2 is a representation of a system for accessing digital assets according to a preferred embodiment
- FIG. 3 is a flowchart for a process of transferring a digital asset across a network according to a preferred embodiment.
- the system 200 comprises a digital assets creator node 202 associated with a digital assets creator, a central access node 204, a registry 206 associated with the central access node 204, a central assets database 208 associated with the central access node 204, a user terminal 210 associated with a user, a grid 212, a gateway 214 associated with the grid 212 and a grid assets database 216 associated with the grid 212.
- the central access node 204 is connected to the digital access creator node 202, the user terminal 210 and the gateway 214 via network connections (such as over the internet).
- the central access node 204 is also connected to the registry 206 and the central assets database 208 via local connections (e.g. not over the internet).
- the user terminal 210 is further connected to the gateway 214 via a network connection.
- the grid 212 is connected to the gateway 214 and to the grid assets database 216 via local connections.
- step S302 the digital assets creator creates a digital asset.
- the digital asset could be any type of digital asset that is graphically renderable for use in the virtual world.
- the digital asset includes texture code which can be used to define its appearance in the virtual world when it is graphically rendered.
- the texture code may define the colour and/or pattern, or the surface positions (where the texture is a sculpted prim) to be applied to a primitive as described above.
- the registry 206 keeps a record (e.g. a register) of the digital assets creators that are trusted by the central access node 204.
- the registry 206 also keeps a record (e.g. a register) of the users in the system that are trusted by the central access node 204.
- the central access node 204 initially trusts all of the digital assets creators, but that trust can be taken away if the digital assets creator does something that is untrustworthy. For example if the digital assets creator creates digital assets which do not function correctly or which contain harmful code, or if the digital assets creator does not provide digital assets having agreed to supply the digital assets then the central access node 204 can determine that the digital assets creator is not trusted. The register stored at the registry 206 can be altered to indicate that the digital assets creator is not trusted.
- the central access node 204 does not initially trust any of the digital assets creators. Only when a digital assets creator proves to be trustworthy does the central access node 204 alter the registry 206 to indicate that the digital assets creator is trusted.
- the registry 206 may also store a quality rating for the digital assets creators.
- the central access node 204 might decide to increase a digital assets creator's quality rating if the digital assets from the digital assets creator are of a particularly high quality or if the digital assets creator consistently supplies digital assets of a sufficient quality.
- the central access node 204 might decide to decrease a digital assets creator's quality rating if the digital assets from the digital assets creator are of a particularly low quality or if the digital assets creator does not consistently supply digital assets of a sufficient quality.
- the quality rating of the digital assets creators can be displayed to users to help them to decide whether to access particular digital assets from the central access node as described in more detail below.
- the digital assets creator transmits the digital assets to the central access node 204 over the network.
- the central access node determines whether the digital assets creator is a trusted digital assets creator. In order to do this, the central access node 204 checks the registry 206 to determine whether the digital assets creator is in the list of trusted digital assets creators.
- step S308 the trust node adds a digital trust mark to the digital assets.
- the digital trust mark is added to the texture code of the digital assets.
- the digital trust mark can be considered to be metadata or a watermark, which authenticates the digital assets.
- the digital trust mark is applied to the texture code because the texture code is relatively complex (compared to the code of the primitive) and this allows the digital trust mark to be buried in the complex texture code. This helps to prevent users from producing imitation trust marks, and also means that if the digital assets are altered after the digital trust mark has been added then the digital trust mark will be altered to a detectable degree.
- step S310 the central access node 204 associates the digital trust mark in the digital asset with allowed endpoints for the digital asset.
- the allowed endpoints in the network for the digital asset may be (i) a list of users who are allowed to access the digital asset and (ii) a list of grids on which the digital asset is allowed to be used. These endpoints (e.g. the list of users and the list of grids) can be specified by the digital assets creator.
- the lists are stored in the registry 206. These lists can be used to allow the digital assets creator to specify who can use their digital assets and on which grids they can be used. Other details relating to the digital assets can also be stored in the registry 206.
- the digital assets creator can specify whether payment is required for access to the digital assets, and if payment is required then the amount of payment required can also be specified.
- a list of the digital assets stored in the central assets database 208 can be displayed at the central access node 204.
- a user associated with user terminal 210 can access the central access node 204 over the network and determine which digital assets are stored in the central assets database 208. If the user identifies a digital asset in the central assets database 208 that he would like to have access to, a request for access to the digital asset for use in a particular grid (e.g. grid 212) is sent to the central access node 204 from the user terminal 210. This request is received at the central access node 204 in step S314. In this way the user can select a digital asset from those displayed at the central access node 204.
- a particular grid e.g. grid 212
- the user will be influenced in his decision as to which digital assets to access on the basis of which digital assets are trusted by the central access node 204.
- the user will typically prefer to purchase digital assets that were created by a digital assets creator that is trusted by the central access node 204.
- step S316 the central access node 204 uses the registry 206 to determine whether the user is permitted to use the requested digital asset in the specified grid 212. In order to perform this determination the central access node 204 accesses the lists stored in the registry 206 which indicate for the particular digital asset which users are permitted to have access to the digital asset and on which grids the digital asset can be used. If the user is in the list of specified users and the grid 212 is in the list of specified grids stored at the registry 206 then it is determined that the user should be granted access to the digital asset and the method proceeds with step S318.
- step S326 in which the process ends.
- the digital assets creator has not given permission for the particular usage of the digital asset requested by the user then the user cannot have access to the digital asset for the particular usage.
- step S318 the user must provide payment for receiving the digital asset.
- Suitable payment mechanisms are known in the art for ensuring that the payment process is secure. Payment mechanisms such as PayPalTM can be used in which a trusted third party facilitates the payments.
- the user will provide payment to the central access node 204 in return for the digital asset. At least some of the payment can then be passed on to the digital assets creator (or other owner(s) of the digital assets) as appropriate.
- the digital assets creator can set the price for the digital assets which may vary according to the use to which the digital assets will be put. For example, a different price may be set for non-corporate, educational, military and recreational usage.
- step S320 a message is sent from the central access node 204 to the registry 206 to update the register in the registry 206 to reflect that the user is now an authorized owner of the digital asset. From then on the first user is allowed to use the digital assets as an authorized owner in the system.
- step S322 the digital asset is transferred from the central access node 204 to the grid 212 via the gateway 214.
- the gateway is used to regulate the data flow between the grid 212 and other nodes in the network such as the central access node 204 and the user terminal 210.
- Figure 2 shows only one grid (grid 212), but in other embodiments, the gateway 214 can be associated with more than one grid.
- the digital asset has been transferred to the grid 212 it can be stored in the grid assets database 216. The user then has permission to use the digital asset on the grid 212.
- step S324 the digital asset is executed on the grid 212 to provide a user experience to the user including the graphically rendered digital asset.
- step S324 the process ends.
- the user obtains the digital asset without requiring knowledge of who the digital assets creator is, but the user can have the confidence that the digital asset is from a trusted source because the digital assets includes the digital trust mark.
- An identification of the owner of the digital assets (which is usually initially the digital assets creator) is stored at the registry 206. In this way, the registry 206 can keep a record of the authorized owner(s) of the digital assets.
- identification of the new owner or licensee can be added to the registry 206 so that the registry 206 is aware that the new owner or licensee is authorized to use the digital assets.
- the specific usage of a digital asset can be controlled by the digital assets creator.
- the digital assets have usage rights associated with them defining how the digital asset can be used by the user.
- the usage rights might vary for different users and/or grids.
- the usage rights can be coded into different fields in the code of the digital asset. As an example, three fields may be used, those being a copy right field, a modify right field and a transfer right field.
- the copy right field specifies whether the user has the right to copy the digital asset.
- the modify right field specifies whether the user has the right to modify the digital asset.
- the transfer right field specifies whether the user has the right to transfer the digital asset on to other users in the network. The rights may be different for different users in the network.
- the transfer right might allow the digital asset to be transferred to a second user from the first user, but the second user might not have the right to transfer the digital asset on to further users in the network.
- the gateway 214 can also send a request to the central access node 204 to determine whether the user is an authorized owner/licensee of the digital asset.
- the central access node 204 can check the registry 206 to determine whether the user is an authorized owner/licensee of the particular digital asset.
- a user is allowed to use a digital asset at the grid 212 only if they are registered as an owner or a licensee of the digital asset at the central access node 204 (stored in the registry 206).
- the gateway 214 will refuse to allow the user to use the digital asset in the grid 212 if the user is not registered at the central access node as an authorized owner/licensee. However, in other embodiments, it is not required for the user to register himself as an authorized owner/licensee of the digital asset before using the digital asset in the grid 212.
- the user can use the digital asset in more than one grid in the network in accordance with the details stored in the registry 206.
- the digital asset can be exported from a first grid and imported to a second grid over the network. This allows the user to move through the virtual world, passing between regions running on different grids, and to transfer the digital asset between the grids accordingly.
- the system can control the usage of digital assets between multiple grids.
- the system might impose restrictions such that only authorized owners or authorized licensees (as stored in the registry 206) of the digital assets can use the digital assets at the grid 212.
- the grid 212 can perform a check of the digital trust mark in the texture of the digital asset to ensure that the digital asset has not been altered since the digital trust mark was added by the central access node 204 (to check that the texture has not been ripped). This ensures the authenticity of the digital asset that is used at the grid 212. Since the registry 206 stores the current owner(s) and/or licensee(s) of the digital assets, users wishing to obtain a digital asset can ensure (by checking with the central access node 204) that the user from whom they are obtaining the digital asset is an authorized owner (or licensee with rights to pass on those rights to other users) of the digital asset.
- the central access node 204 can assist in ensuring that the digital assets displayed at the central access node 204 are trusted, either by only accepting digital assets from trusted sources (as described above) or by highlighting those digital assets which are from trusted sources. Furthermore, the central access node 204 might only add digital assets to the central assets database 208 if they are received from an authorized owner of the digital assets (as registered in the registry 206).
- the central access node 204 is independent of the grid 212. Indeed, the central access node 204 can be used to control the access to digital assets for use on multiple grids. In this way, access to digital assets for use across many different grids can be controlled, rather than relying on separate mechanisms in each different grid.
- the registry 206 and the central assets database 208 are depicted as being separate from the central access node 204, in other embodiments, at least one of the registry 206 and the central assets database 208 are located at the central access node 204.
- the gateway 214 and the grid assets database 216 are depicted as being separate from the grid 212, in other embodiments, at least one of gateway 214 and the grid assets database 216 are located at the grid 212. While this invention has been particularly shown and described with reference to preferred embodiments, it will be understood to those skilled in the art that various changes in form and detail may be made without departing from the scope of the invention as defined by the appendant claims.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
A method of transferring a graphically renderable digital asset across a network is provided. The network comprises at least one endpoint for utilising the digital asset to thereby graphically render an object in an interactive environment and the digital asset includes a digital trust mark. The method comprises: associating the digital trust mark, at a central access node of the network, with an indication of at least one specified endpoint for which usage of the digital asset is permitted, the central access node being independent of the at least one endpoint of the network; selecting the digital asset for use by a first endpoint; determining, at the central access node, whether the first endpoint is one of said at least one specified endpoint; and on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset to the first endpoint for use by the first endpoint.
Description
A METHOD AND SYSTEM FOR ACCESSING DATA IN A NETWORK
Field of the Invention This invention relates to a method and system for accessing digital assets in a network, and relates particularly but not exclusively to accessing digital assets for use in a virtual world.
Background
Virtual worlds, such as Second Life™, Forterra™ or Metaplace™, are computer-based simulated environments in which a user can interact with the virtual world and with other users, such that multiple users can have a shared experience in the virtual world. In this way virtual worlds can be thought of as interactive environments. Typically, each user is associated with an agent (known as an avatar) in the virtual world, where the agent is a persistent identity and persona for the user that interacts in the virtual world. A virtual world typically comprises regions which are persistent locations in the virtual world. Virtual regions are supplied by a number of different providers, including for example Rezzable at www.rezzable.com.
Items within a virtual world are defined by a number of properties. A primitive defines the shape of the item, for example Figure 1 a shows a primitive which is a cube. A texture provides the colour and/or decoration of the item, for example Figure 1 b shows a texture that has been applied to the primitive cube of Figure 1 a. In this way the texture is used to define the appearance of the item when it is graphically rendered. One type of texture which can be applied to a primitive is a "sculpted prim", which defines surface positions for the primitive, such that the shape of the primitive is altered by the application of the sculpted prim, allowing more complex shapes to be defined than can be defined by the primitive alone. The texture is coded into a texture code which is applied to the primitive. An item may include further properties such as a script, as shown in Figure 1 c, written in any known scripting language for
triggering processes in the virtual world, such as for triggering the output of an audio clip to the user.
A region provides a persistent environment in the virtual world and usually contains many items which are defined by the properties as described above. The items in a region can be considered to be "digital assets" in the region. Content in the region defines a user experience for a user viewing the region. Content includes the digital assets as graphically renderable items in the user experience. The content also includes the software governing how users interact with items in a region and with other users in the region. Digital assets can be used in different regions of the virtual world and can be transferable between users in the virtual world. When digital assets are executed they graphically render objects in the virtual world. Grids can be used to provide regions in the virtual world and typically comprise a computing system with sufficient elements (such as a processor, a memory, a communication interface, etc) to host the region thereby providing the user experience to users viewing the region. In this way a grid is capable of graphically rendering digital assets. The grid is typically managed by an entity which may (or may not) exercise control over how the digital assets are handled on the grid. The entity managing the grid may (or may not) be a separate entity to the creator of the digital assets used on the grid.
Some digital assets are particularly desirable for users. For example if a digital assets creator has created a particularly desirable digital asset, such as a fashionable item of clothing for an avatar, then many users might wish to use the digital asset. The digital assets are not restricted to fashionable items of clothing. The digital assets can be any graphically renderable item that users may wish to use in the virtual world, such as animals, scenery, whole avatars, vehicles, poses, mannerisms, plantlife or text fonts, to name just some of the different types of digital assets which may be desirable.
This leads users to access digital assets from digital assets creators. However, typically the users do not know the digital assets creators. Some
digital assets creators will produce digital assets of a higher quality than other digital assets creators. When accessing the digital assets, the digital assets are transferred over a network (such as the internet) from the digital assets creator to a user terminal of the user. When accessing the digital assets over the network, the users do not know whether to trust the digital assets from a particular digital assets creator. Furthermore, the users are not sure whether the digital assets are genuine (i.e. whether they have been created by the digital assets creator), or whether the digital assets have been copied from a different digital assets creator. This is problematic and may deter some users from accessing the digital assets.
Furthermore, after the digital assets creator transfers the digital assets to the user, the digital assets creator no longer has control over how the digital assets are used. The digital assets creator supplies the digital assets over the network to the user. The digital assets creator might not want his digital assets to be used for some purposes in the virtual world, since this might for example affect the reputation of the digital assets creator. The lack of control over the future use of the digital assets may deter some digital assets creators from supplying the digital assets to users over the network.
Digital assets can be transmitted and received by various terminals in the network and there is a problem as to how to identify trusted digital assets at a terminal in the network remote from the digital assets creator. Summary
According to a first aspect of the invention there is provided a method of transferring a graphically renderable digital asset across a network, the network comprising at least one endpoint for utilising the digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark, the method comprising: associating the digital trust mark, at a central access node of the network, with an indication of at least one specified endpoint for which usage of the digital asset is permitted, the central access node being independent of the at least one
endpoint of the network; selecting the digital asset for use by a first endpoint; determining, at the central access node, whether the first endpoint is one of said at least one specified endpoint; and on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset to the first endpoint for use by the first endpoint.
According to a second aspect of the invention there is provided a network comprising: at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark; a central access node, independent of the at least one endpoint, for associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted; selecting means for selecting the digital asset for use by a first endpoint; and determining means for determining whether the first endpoint is one of said at least one specified endpoint, wherein the network is configured such that the digital asset is transferred to the first endpoint for use by the first endpoint on the basis that it is determined that the first endpoint is one of said at least one specified endpoint. According to a third aspect of the invention there is provided a central access node in a network, the network comprising at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark, the central access node being independent of the at least one endpoint and comprising: means for associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted; means for selecting the digital asset for use by a first endpoint; means for determining whether the first endpoint is one of said at least one specified endpoint; and means for transferring the digital asset to the first endpoint for use by the first endpoint on the basis that it is determined that the first endpoint is one of said at least one specified endpoint.
According to a fourth aspect of the invention there is provided a computer program product comprising computer readable instructions for execution at a
central access node of a network, the network further comprising at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark and the central access node being independent of the at least one endpoint, wherein the instructions comprise instructions for: associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted; selecting the digital asset for use by a first endpoint; determining whether the first endpoint is one of said at least one specified endpoint; and on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset across the network to the first endpoint for use by the first endpoint.
Embodiments of the present invention provide a central access node which can facilitate the distribution of digital assets between digital assets creators and endpoints in a network. Endpoints are for example users and/or grids. A registry keeps a list of trusted digital assets creators in the network, and can mark digital assets created by the trusted digital assets creators with a digital trust mark to indicate that the digital assets are trusted. Users can view a list of the trusted digital assets on the central access node and can see from the trust mark that the digital assets are from a trusted source (a trusted digital assets creator). Users can then identify the digital assets from the central access node in the knowledge that the central access node trusts the digital assets creator who created the digital assets.
When the digital assets creator adds the digital assets to the central access node the digital assets creator can specify users to whom the digital assets can be supplied, such as only users in a particular geographical region (e.g. only users in the UK). The digital assets creator can also specify the regions (or grids) in which the digital assets may be used. The digital assets creator might not want his digital assets to be used in certain grids, for example if doing so may adversely affect his reputation. The digital assets creator can also specify how the digital assets can be used (e.g. whether the digital assets can be copied, modified or transferred etc). The details specified by the digital
assets creator (such as who may access the digital assets and where/how the digital assets can be used) are stored at the registry. When a user requests access to a digital asset from the central access node, the central access node checks with the registry that the digital asset is allowed to be transferred to the user for use in a particular grid. In this way, the digital assets creator can control aspects of the usage of their digital assets after they are transmitted to the central access node.
There is therefore provided an improved system which allows users to identify trusted digital assets in a network. The system also allows digital assets creators to be confident that their digital assets will be used in a manner that is acceptable to them. Since digital assets creators and users have more trust in the system, the distribution of digital assets is encouraged. This will result in higher quality digital assets being used in the virtual world.
A digital assets creator can specify the endpoints (e.g. the users and/or the grids) in the network that are allowed to use their digital assets. This provides more trust for the digital assets creator that their digital assets will not be used in a way that is against their wishes.
Brief Description of the Drawings
For a better understanding of the present invention and to show how the same may be put into effect, reference will now be made, by way of example, to the following drawings in which:
Figure 1 a is a representation of a primitive;
Figure 1 b is a representation of a primitive and a texture;
Figure 1 c is a representation of a primitive, a texture and a script;
Figure 2 is a representation of a system for accessing digital assets according to a preferred embodiment; and
Figure 3 is a flowchart for a process of transferring a digital asset across a network according to a preferred embodiment.
Detailed Description of Preferred Embodiments
With reference to Figure 2 there is now described a preferred embodiment of a system 200 for carrying out the invention. The system 200 comprises a digital assets creator node 202 associated with a digital assets creator, a central access node 204, a registry 206 associated with the central access node 204, a central assets database 208 associated with the central access node 204, a user terminal 210 associated with a user, a grid 212, a gateway 214 associated with the grid 212 and a grid assets database 216 associated with the grid 212. The central access node 204 is connected to the digital access creator node 202, the user terminal 210 and the gateway 214 via network connections (such as over the internet). The central access node 204 is also connected to the registry 206 and the central assets database 208 via local connections (e.g. not over the internet). The user terminal 210 is further connected to the gateway 214 via a network connection. The grid 212 is connected to the gateway 214 and to the grid assets database 216 via local connections.
In operation and with reference to Figure 3 there is now described a method of transferring a digital asset across a network according to a preferred embodiment. The method steps shown in Figure 3 can be implemented in software, hardware or firmware in the network elements shown in Figure 2 as would be apparent to a person skilled in the art. In step S302 the digital assets creator creates a digital asset. The digital asset could be any type of digital asset that is graphically renderable for use in the virtual world. The digital asset includes texture code which can be used to define its appearance in the virtual world when it is graphically rendered. The texture code may define the colour and/or pattern, or the surface positions (where the texture is a sculpted prim) to be applied to a primitive as described above. In this way the digital asset represents a graphically renderable image or object in the interactive environment of the virtual world. It can require skill and be time consuming to create high quality digital assets. For these reasons, users other than the digital assets creator in the system may want to use the digital assets that have been created by the digital assets creator.
The registry 206 keeps a record (e.g. a register) of the digital assets creators that are trusted by the central access node 204. The registry 206 also keeps a record (e.g. a register) of the users in the system that are trusted by the central access node 204.
In some embodiments the central access node 204 initially trusts all of the digital assets creators, but that trust can be taken away if the digital assets creator does something that is untrustworthy. For example if the digital assets creator creates digital assets which do not function correctly or which contain harmful code, or if the digital assets creator does not provide digital assets having agreed to supply the digital assets then the central access node 204 can determine that the digital assets creator is not trusted. The register stored at the registry 206 can be altered to indicate that the digital assets creator is not trusted.
In other embodiments, the central access node 204 does not initially trust any of the digital assets creators. Only when a digital assets creator proves to be trustworthy does the central access node 204 alter the registry 206 to indicate that the digital assets creator is trusted.
The registry 206 may also store a quality rating for the digital assets creators. The central access node 204 might decide to increase a digital assets creator's quality rating if the digital assets from the digital assets creator are of a particularly high quality or if the digital assets creator consistently supplies digital assets of a sufficient quality. The central access node 204 might decide to decrease a digital assets creator's quality rating if the digital assets from the digital assets creator are of a particularly low quality or if the digital assets creator does not consistently supply digital assets of a sufficient quality. The quality rating of the digital assets creators can be displayed to users to help them to decide whether to access particular digital assets from the central access node as described in more detail below.
In step S304 the digital assets creator transmits the digital assets to the central access node 204 over the network. In step S306 the central access node determines whether the digital assets creator is a trusted digital assets creator. In order to do this, the central access node 204 checks the registry 206 to determine whether the digital assets creator is in the list of trusted digital assets creators.
If the digital assets creator is trusted by the central access node 204 then the method passes to step S308 in which the trust node adds a digital trust mark to the digital assets. The digital trust mark is added to the texture code of the digital assets. The digital trust mark can be considered to be metadata or a watermark, which authenticates the digital assets. The digital trust mark is applied to the texture code because the texture code is relatively complex (compared to the code of the primitive) and this allows the digital trust mark to be buried in the complex texture code. This helps to prevent users from producing imitation trust marks, and also means that if the digital assets are altered after the digital trust mark has been added then the digital trust mark will be altered to a detectable degree. In this way, if digital assets have an authentic, unaltered digital trust mark, a user can trust that the digital assets have been authenticated as being from a trusted digital assets creator by the central access node 204 and that the digital assets have not been altered since the digital trust mark was added to the texture code. The digital assets are stored in the central assets database 208. If the digital assets creator is not trusted by the central access node 204 then the method passes to step S326 in which the process ends. In this way, only trusted digital assets creators can store their digital assets at the central access node 204. In step S310 the central access node 204 associates the digital trust mark in the digital asset with allowed endpoints for the digital asset. For example, the allowed endpoints in the network for the digital asset may be (i) a list of users who are allowed to access the digital asset and (ii) a list of grids on which the digital asset is allowed to be used. These endpoints (e.g. the list of users and
the list of grids) can be specified by the digital assets creator. In step S312 the lists are stored in the registry 206. These lists can be used to allow the digital assets creator to specify who can use their digital assets and on which grids they can be used. Other details relating to the digital assets can also be stored in the registry 206. For example, the digital assets creator can specify whether payment is required for access to the digital assets, and if payment is required then the amount of payment required can also be specified.
A list of the digital assets stored in the central assets database 208 can be displayed at the central access node 204. In this way a user associated with user terminal 210 can access the central access node 204 over the network and determine which digital assets are stored in the central assets database 208. If the user identifies a digital asset in the central assets database 208 that he would like to have access to, a request for access to the digital asset for use in a particular grid (e.g. grid 212) is sent to the central access node 204 from the user terminal 210. This request is received at the central access node 204 in step S314. In this way the user can select a digital asset from those displayed at the central access node 204. It is likely that the user will be influenced in his decision as to which digital assets to access on the basis of which digital assets are trusted by the central access node 204. The user will typically prefer to purchase digital assets that were created by a digital assets creator that is trusted by the central access node 204.
In step S316 the central access node 204 uses the registry 206 to determine whether the user is permitted to use the requested digital asset in the specified grid 212. In order to perform this determination the central access node 204 accesses the lists stored in the registry 206 which indicate for the particular digital asset which users are permitted to have access to the digital asset and on which grids the digital asset can be used. If the user is in the list of specified users and the grid 212 is in the list of specified grids stored at the registry 206 then it is determined that the user should be granted access to the digital asset and the method proceeds with step S318.
However, if the user is not in the list of specified users or the grid 212 is not in the list of specified grids stored at the registry 206 then the user should not be granted access to the digital asset for use at the grid 212 and the method proceeds with step S326 in which the process ends. In this way, if the digital assets creator has not given permission for the particular usage of the digital asset requested by the user then the user cannot have access to the digital asset for the particular usage.
Where the digital assets creator has specified that payment is required for users to obtain the digital asset, then in step S318 the user must provide payment for receiving the digital asset. Suitable payment mechanisms are known in the art for ensuring that the payment process is secure. Payment mechanisms such as PayPal™ can be used in which a trusted third party facilitates the payments. Typically the user will provide payment to the central access node 204 in return for the digital asset. At least some of the payment can then be passed on to the digital assets creator (or other owner(s) of the digital assets) as appropriate.
The digital assets creator can set the price for the digital assets which may vary according to the use to which the digital assets will be put. For example, a different price may be set for non-corporate, educational, military and recreational usage.
When the digital assets have been provided to the first user and the payment has been completed the first user is an authorized owner of the digital assets. In step S320 a message is sent from the central access node 204 to the registry 206 to update the register in the registry 206 to reflect that the user is now an authorized owner of the digital asset. From then on the first user is allowed to use the digital assets as an authorized owner in the system.
In step S322 the digital asset is transferred from the central access node 204 to the grid 212 via the gateway 214. The gateway is used to regulate the data flow between the grid 212 and other nodes in the network such as the central access node 204 and the user terminal 210. Figure 2 shows only one grid
(grid 212), but in other embodiments, the gateway 214 can be associated with more than one grid. When the digital asset has been transferred to the grid 212 it can be stored in the grid assets database 216. The user then has permission to use the digital asset on the grid 212. In step S324 the digital asset is executed on the grid 212 to provide a user experience to the user including the graphically rendered digital asset. In step S324 the process ends.
In the method described above, the user obtains the digital asset without requiring knowledge of who the digital assets creator is, but the user can have the confidence that the digital asset is from a trusted source because the digital assets includes the digital trust mark.
An identification of the owner of the digital assets (which is usually initially the digital assets creator) is stored at the registry 206. In this way, the registry 206 can keep a record of the authorized owner(s) of the digital assets. When the digital assets are sold or licensed to another user in the system, identification of the new owner or licensee can be added to the registry 206 so that the registry 206 is aware that the new owner or licensee is authorized to use the digital assets.
The specific usage of a digital asset can be controlled by the digital assets creator. The digital assets have usage rights associated with them defining how the digital asset can be used by the user. The usage rights might vary for different users and/or grids. The usage rights can be coded into different fields in the code of the digital asset. As an example, three fields may be used, those being a copy right field, a modify right field and a transfer right field. The copy right field specifies whether the user has the right to copy the digital asset. The modify right field specifies whether the user has the right to modify the digital asset. The transfer right field specifies whether the user has the right to transfer the digital asset on to other users in the network. The rights may be different for different users in the network. For example, where a first user obtains a digital asset from the central access node 204 the transfer right might allow the digital asset to be transferred to a second user
from the first user, but the second user might not have the right to transfer the digital asset on to further users in the network.
When the user attempts to use a digital asset at the grid 212 the usage rights of the digital asset are used to determine whether the use of the digital asset is permitted. The gateway 214 can also send a request to the central access node 204 to determine whether the user is an authorized owner/licensee of the digital asset. The central access node 204 can check the registry 206 to determine whether the user is an authorized owner/licensee of the particular digital asset. In some embodiments, a user is allowed to use a digital asset at the grid 212 only if they are registered as an owner or a licensee of the digital asset at the central access node 204 (stored in the registry 206). In these embodiments, the gateway 214 will refuse to allow the user to use the digital asset in the grid 212 if the user is not registered at the central access node as an authorized owner/licensee. However, in other embodiments, it is not required for the user to register himself as an authorized owner/licensee of the digital asset before using the digital asset in the grid 212.
The user can use the digital asset in more than one grid in the network in accordance with the details stored in the registry 206. Where the user is allowed to use the digital asset in more than one grid, the digital asset can be exported from a first grid and imported to a second grid over the network. This allows the user to move through the virtual world, passing between regions running on different grids, and to transfer the digital asset between the grids accordingly. In this way, the system can control the usage of digital assets between multiple grids. The system might impose restrictions such that only authorized owners or authorized licensees (as stored in the registry 206) of the digital assets can use the digital assets at the grid 212. Before using a digital asset at the grid 212, the grid 212 can perform a check of the digital trust mark in the texture of the digital asset to ensure that the digital asset has not been altered since the digital trust mark was added by the central access node 204 (to check that the texture has not been ripped). This ensures the authenticity of the digital asset that is used at the grid 212.
Since the registry 206 stores the current owner(s) and/or licensee(s) of the digital assets, users wishing to obtain a digital asset can ensure (by checking with the central access node 204) that the user from whom they are obtaining the digital asset is an authorized owner (or licensee with rights to pass on those rights to other users) of the digital asset. The central access node 204 can assist in ensuring that the digital assets displayed at the central access node 204 are trusted, either by only accepting digital assets from trusted sources (as described above) or by highlighting those digital assets which are from trusted sources. Furthermore, the central access node 204 might only add digital assets to the central assets database 208 if they are received from an authorized owner of the digital assets (as registered in the registry 206).
There is therefore described a method and system for accessing digital assets over a network, in which trust can be provided by the use of the central access node 204. This includes trust from the digital assets creator's perspective in that the digital assets creator can specify how the digital assets that he has created will be put to use. It also includes trust from a user's perspective in that the user can trust that the digital assets have come from a trusted source. The central access node 204 is independent of the grid 212. Indeed, the central access node 204 can be used to control the access to digital assets for use on multiple grids. In this way, access to digital assets for use across many different grids can be controlled, rather than relying on separate mechanisms in each different grid.
Although in Figure 2 the registry 206 and the central assets database 208 are depicted as being separate from the central access node 204, in other embodiments, at least one of the registry 206 and the central assets database 208 are located at the central access node 204. Similarly, although in Figure 2 the gateway 214 and the grid assets database 216 are depicted as being separate from the grid 212, in other embodiments, at least one of gateway 214 and the grid assets database 216 are located at the grid 212.
While this invention has been particularly shown and described with reference to preferred embodiments, it will be understood to those skilled in the art that various changes in form and detail may be made without departing from the scope of the invention as defined by the appendant claims.
Claims
Claims
1. A method of transferring a graphically renderable digital asset across a network, the network comprising at least one endpoint for utilising the digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark, the method comprising:
associating the digital trust mark, at a central access node of the network, with an indication of at least one specified endpoint for which usage of the digital asset is permitted, the central access node being independent of the at least one endpoint of the network;
selecting the digital asset for use by a first endpoint;
determining, at the central access node, whether the first endpoint is one of said at least one specified endpoint; and
on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset to the first endpoint for use by the first endpoint.
2. The method of claim 1 wherein the at least one endpoint comprises at least one grid in the network for executing the digital asset to graphically render the object in the interactive environment.
3. The method of claim 1 or 2 wherein the at least one endpoint comprises at least one user in the network. 4. The method of any preceding claim further comprising storing the digital asset in a database local to the central access node.
5. The method of any preceding claim wherein the step of transferring the digital asset to the first endpoint comprises transferring the digital asset from the central access node to the first endpoint.
6. The method of any preceding claim wherein the digital asset comprises usage rights defining how the digital asset can be used by the first endpoint.
7. The method of claim 6 wherein the usage rights comprise at least one of a copy right, a modify right and a transfer right.
8. The method of any preceding claim wherein there is a plurality of said specified endpoints.
9. The method of any preceding claim further comprising:
transmitting the digital asset from a creator node to the central access node, the creator node being associated with a creator of the digital asset; determining that the creator is trusted at the central access node; and adding the digital trust mark to the digital asset.
10. The method of any preceding claim wherein the digital trust mark indicates that the digital asset is from a trusted source.
1 1. The method of any preceding claim wherein the digital trust mark is embedded in code of the digital asset.
12. The method of any preceding claim further comprising associating, at the central access node, the digital asset with an identification of an owner of the digital asset. 3. The method of any preceding claim further comprising:
calculating charges for transferring the digital asset to the first endpoint; receiving payment to cover the calculated charges; and
distributing at least some of the payment to the creator of the digital asset.
14. A network comprising:
at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark;
a central access node, independent of the at least one endpoint, for associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted;
selecting means for selecting the digital asset for use by a first endpoint; and
determining means for determining whether the first endpoint is one of said at least one specified endpoint,
wherein the network is configured such that the digital asset is transferred to the first endpoint for use by the first endpoint on the basis that it is determined that the first endpoint is one of said at least one specified endpoint.
15. The network of claim 14 wherein the at least one endpoint comprises at least one grid in the network for executing the digital asset to graphically render the object in the interactive environment.
16. The network of claim 15 further comprising an asset gateway associated with the at least one grid for controlling data flow to and from the at least one grid.
17. The network of any of claims 14 to 16 wherein the at least one endpoint comprises at least one user in the network.
18. The network of any of claims 14 to 17 wherein the central access node has means for storing the digital asset.
19. The network of any of claims 14 to 18 further comprising:
a creator node associated with a creator of the digital asset, the creator node being configured to transmit the digital asset to the central access node, wherein the central access node comprises means for determining that the creator is trusted at the central access node, and means for adding the digital trust mark to the digital asset.
20. A central access node in a network, the network comprising at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark, the central access node being independent of the at least one endpoint and comprising:
means for associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted;
means for selecting the digital asset for use by a first endpoint;
means for determining whether the first endpoint is one of said at least one specified endpoint; and
means for transferring the digital asset to the first endpoint for use by the first endpoint on the basis that it is determined that the first endpoint is one of said at least one specified endpoint. 21. A computer program product comprising computer readable instructions for execution at a central access node of a network, the network further comprising at least one endpoint for utilising a graphically renderable digital asset to thereby graphically render an object in an interactive environment, the digital asset including a digital trust mark and the central access node being independent of the at least one endpoint, wherein the instructions comprise instructions for:
associating the digital trust mark with an indication of at least one specified endpoint for which usage of the digital asset is permitted;
selecting the digital asset for use by a first endpoint;
determining whether the first endpoint is one of said at least one specified endpoint; and
on the basis that it is determined that the first endpoint is one of said at least one specified endpoint, transferring the digital asset across the network to the first endpoint for use by the first endpoint.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB0920945.3A GB0920945D0 (en) | 2009-11-30 | 2009-11-30 | A method and system for accessing data in a network |
| GB0920945.3 | 2009-11-30 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2011064362A1 true WO2011064362A1 (en) | 2011-06-03 |
Family
ID=41572904
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2010/068412 Ceased WO2011064362A1 (en) | 2009-11-30 | 2010-11-29 | A method and system for accessing data in a network |
Country Status (2)
| Country | Link |
|---|---|
| GB (1) | GB0920945D0 (en) |
| WO (1) | WO2011064362A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9005061B2 (en) | 2010-05-03 | 2015-04-14 | Schaeffler Technologies AG & Co. KG | Tensioning device |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001018628A2 (en) * | 1999-08-04 | 2001-03-15 | Blue Spike, Inc. | A secure personal content server |
| US20010051996A1 (en) * | 2000-02-18 | 2001-12-13 | Cooper Robin Ross | Network-based content distribution system |
| WO2001098903A1 (en) * | 2000-06-16 | 2001-12-27 | Entriq Limited BVI Abbot Building | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) |
| US20080140433A1 (en) * | 2001-04-20 | 2008-06-12 | Levy Kenneth L | Rights Management Systems and Methods Using Content Identifiers |
-
2009
- 2009-11-30 GB GBGB0920945.3A patent/GB0920945D0/en not_active Ceased
-
2010
- 2010-11-29 WO PCT/EP2010/068412 patent/WO2011064362A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001018628A2 (en) * | 1999-08-04 | 2001-03-15 | Blue Spike, Inc. | A secure personal content server |
| US20010051996A1 (en) * | 2000-02-18 | 2001-12-13 | Cooper Robin Ross | Network-based content distribution system |
| WO2001098903A1 (en) * | 2000-06-16 | 2001-12-27 | Entriq Limited BVI Abbot Building | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) |
| US20080140433A1 (en) * | 2001-04-20 | 2008-06-12 | Levy Kenneth L | Rights Management Systems and Methods Using Content Identifiers |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9005061B2 (en) | 2010-05-03 | 2015-04-14 | Schaeffler Technologies AG & Co. KG | Tensioning device |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0920945D0 (en) | 2010-01-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12489743B2 (en) | Avatar management system, avatar management method, program, and computer- readable recording medium | |
| US20230409679A1 (en) | Systems and methods for a tokenized virtual persona for use with a plurality of software applications | |
| JP3753885B2 (en) | Host system elements of the international cryptosystem | |
| US5982390A (en) | Controlling personality manifestations by objects in a computer-assisted animation environment | |
| US9660976B2 (en) | System and method for providing modifications to an offline virtual asset | |
| WO2023044496A1 (en) | Systems and methods for token content unlocking, biometric authentication using privacy-protecting tokens, ownership-based limitations of content access, policy-based time capsule technology, and content lock mechanisms | |
| US9531724B2 (en) | Systems and methods of assessing permissions in virtual worlds | |
| US8091142B2 (en) | Supplementary trust model for software licensing/commercial digital distribution policy | |
| US8745726B2 (en) | Identity verification in virtual worlds using encoded data | |
| US20260024077A1 (en) | Crypto Wallet Configuration Data Retrieval | |
| CN114398686B (en) | Blockchain-based file storage method, device, equipment, and storage medium | |
| US20230356091A1 (en) | Dynamic non-fungible tokens representing virtual characters, objects and land | |
| JP6746024B1 (en) | 3D model data management system, model distribution server, 3D service server, 3D model data management method, model distribution server program, and 3D service server program | |
| US12206787B2 (en) | System and method for identifying virtual goods | |
| JP2012510656A (en) | Data processing methods, systems, and simulation or analysis models | |
| WO2023074022A1 (en) | Avatar management system, avatar management method, program, and computer-readable recording medium | |
| CN121195274A (en) | Systems and methods for generating crypto token graphics | |
| CN118278537A (en) | Artificial intelligence content generation control using non-homogeneous pass | |
| JP7312484B2 (en) | Software multi-ownership account management method | |
| JP2006295274A (en) | Content distribution server and content distribution system provided with the same | |
| US20250094639A1 (en) | Permissions wizard for immersive content sharing economy hub | |
| WO2011064362A1 (en) | A method and system for accessing data in a network | |
| WO2022075154A1 (en) | Control method, control device, and program | |
| US20240378264A1 (en) | System and method for automatic mark management on the blockchain | |
| WO2023144770A2 (en) | System and method for identifying virtual goods |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10794916 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10794916 Country of ref document: EP Kind code of ref document: A1 |