Movatterモバイル変換


[0]ホーム

URL:


CA2272649A1 - Web site copy protection system and method - Google Patents

Web site copy protection system and method
Download PDF

Info

Publication number
CA2272649A1
CA2272649A1CA002272649ACA2272649ACA2272649A1CA 2272649 A1CA2272649 A1CA 2272649A1CA 002272649 ACA002272649 ACA 002272649ACA 2272649 ACA2272649 ACA 2272649ACA 2272649 A1CA2272649 A1CA 2272649A1
Authority
CA
Canada
Prior art keywords
user
work
license
access
web site
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002272649A
Other languages
French (fr)
Inventor
Jordan J. Glogau
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intellectual Protocols LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Publication of CA2272649A1publicationCriticalpatent/CA2272649A1/en
Abandonedlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

A copy protection system and method protect web sites and other works in computer readable medium from unauthorized access and/or reproduction. In particular, the copy protection system examines (5) a web site or other work in computer readable form to ascertain the web site structure and individual web site components (8). A web site owner (3) selects identified web site components (8, 9) for protection and provides a protection level (10) for these components. An end-user attempting (17) to access protected web site components is directed to obtain a license (23) wherein the copy protection system displays licensing terms to the end-user and administers a test (55) relating to the licensing terms (35). Upon passing the test (56), the copy protection system grants the end-user a license and enables the end-user to download software (57) that facilitates access and/or reproduction of the protected web site components. If the end-user does not obtain a license, the copy protection system permits the end-user to access and/or reproduce only unprotected web site components (31).

Description

PATENT APPLICATION
Title: Web Site Copy Protection System and Method 2 This application claims priority from L1.S. Provisional Patent Application Serial 3 No. 60/031,424, entitled "Web Site Copy Protection System and Method", filed November 4 21, l996. The disclosure of that provisional patent application is incorporated herein by reference in its entirety.

7 1. Technical Field 8 The present invention pertains to computer systems for protecting web sites or other 9 works in computer readable form from unauthorized access and/or reproduction. In particular, the present invention is directed toward a computer system for enabling only 11 licensed end-users to access protected material of an Internet web site wherein the 12 computer system may automatically present licensing terms to an unlicensed end-user and 13 grant a license to the unlicensed end-user upon the unlicensed end-user's acceptance of the 14 licensing terms.
2. Discussion of the State of the Art 16 Briefly, the growth of the World Wide Web (herein referred to as the Web) has 17 been an unprecedented event in the history of computers and telecommunications. Internet 18 traffic has increased from five terabytes (i.e., tera represents 10''- or one trillion) a day in I9 the fall of l994 to 250 terabytes a day in the summer of l996. Further, personal computer sales will surpass television sales in the United States for the first time in l996, while data 21 telecommunications traffic will similarly overtake voice traffic. Most of these events can 22 be attributed to the growth of the Internet and the Web.

1 Although the Web is a wonderful environment to transact business and disseminate 2 information, there are a number of disadvantages that make it unattractive.
Specifically, 3 there is typically no provision on the Internet, and the Web in particular, to protect material 4 from being indiscriminately copied and reproduced with impunity. Since the act of transferring files from one computer to another via the Internet involves essentially exact 6 reproduction of the material, it is difficult to protect that material from unauthorized use.
7 Although copyright protection may assist in deterring the unauthorized reproduction of 8 material, the computer industry has been restricted in enforcing copyrights in certain 9 situations; for example, it is lawful to reproduce material for purposes of back-ups (i.e., saving the material in case of data loss due to computer or memory failure).
Further, the 11 Internet enlarges the protection problem because of its worldwide nature and the fact that 12 the Internet is designed based in part on the concept of free reproduction.
Currently, the 13 software industry believes that the ratio of unauthorized reproductions to authorized 14 reproductions is approximately five to one.
Typically, a web site includes various types of works, such as text, images, art 16 work, audio and video. These works are generally eligible for copyright registration with 17 the appropriate authority (e.g., the Copyright Office) wherein the copyright for the works 18 automatically exists upon their creation, and registration of the work with the appropriate 19 authority (e.g., the Copyright Office) enables the copyright or web site owner to enforce the copyright. Although each web site work, and the entire web site itself, may be 21 protected by copyright, procedures are typically required to assist in enforcing the 22 copyright. For example, industry has utilized copy protection techniques wherein these 23 techniques prohibit unauthorized reproduction of protected material, but do not provide 24 additional legal protection (e.g., a contract or license) to enhance the copyright owners' enforcement of their rights. However, the existence of a license does not guarantee WO 98l25373 PCT/US97/21356 1 absolute protection since certain licenses, such as shrink wrap licenses (i.e., licenses 2 printed on packaging or displayed by software), may be unenforceable due to the fact that 3 the license is often ignored and not read by parties utilizing the protected material.
4 Therefore, the present invention is directed toward providing enhanced protection of a web site or other work in computer readable form against unauthorized reproductions. In 6 particular, the present invention permits only licensed end-users to access protected web 7 site material, automatically presents licensing terms to an unlicensed end-user and grants 8 a license to the unlicensed end-user upon the unlicensed end-user's acceptance of the 9 licensing terms. Further, the present invention provides a copying utility to licensed end-users for selective reproduction of protected web site material. The copying utility 11 functions in tandem with web site protection utilities as described below to ensure that only 12 appropriate web site material is accessed by licensed end-users, thereby protecting a web 13 site from unauthorized or unlicensed access and/or reproductions.

1 ~ Accordingly, it is an object of the present invention to selectively protect 16 components of a web site or other work in computer readable form from unauthorized 17 access and/or reproduction.
18 It is another object of the present invention to selectively grant licenses for 19 authorized access and/or reproduction of protected components of a web site or other work in computer readable form.
21 Yet another object of the present invention is to ensure comprehension and 22 acceptance of license agreement terms by unlicensed end-users such that licenses may be 1 granted to authorize the unlicensed end-users to access and/or reproduce protected 2 components of a web site or other work in computer readable form.
3 The aforesaid objects are achieved individually and in combination, and it is not 4 intended that the present invention be construed as requiring two or more of the obj ects to 5 be combined unless expressly required by the claims attached hereto.
6 According to the present invention, a copy protection system selectively protects 7 components of a web site or other work in computer readable form by limiting access 8 and/or reproduction of protected components to licensed or authorized end-users.
9 Specifically, the copy protection system includes a copy protection system server (e.g., a computer system that services client requests) having site examination server software and 11 licensing software, and end-user computer systems each associated with a corresponding 12 end-user. The copy protection system server, via site examination server software, 13 identifies web site components and provides protection to identified web site components 14 selected by a web site owner, while licensing software enables the copy protection system server to grant licenses that authorize end-users to access and/or reproduce web site 16 components protected by the copy protection system. A licensed end-user may download 17 site copying software to an associated end-user computer system from the copy protection 18 system server wherein the end-user computer system, via site copying software, interacts 19 with the copy protection system server to enable the licensed end-user to access and/or reproduce protected web site components.
21 Initially, the web site owner enters information relating to a web site the owner 22 desires to protect (e.g., the uniform resource locator (URL) of the web site) into a copy 23 protection system web site residing on the copy protection system server.
The information 24 relating to the owner web site may be entered into the copy protection system web site via 1 an Internet browser residing on a web site owner computer system. The copy protection 2 system server subsequently retrieves f les associated with the owner web site based on the 3 entered information and examines that web site to ascertain the web site structure and to 4 identify individual web site components. The web site owner, via the copy protection system web site and server, selects identified web site components for copy protection and 6 designates a level of protection desired for each selected web site component. Special tags 7 or codes are inserted by the copy protection system server within web site files associated 8 with the owner web site to indicate the web site components selected for protection. A
9 permission table is constructed for each web site protected by the copy protection system to store the protection status of web site components and authorized access information 11 (e.g., codes indicating whether or not an end-user possesses a license).
The permission 12 table is utilized by the copy protection system to determine whether or not an end-user 13 possesses a license authorizing the end-user to access and/or reproduce a protected web 14 site.
In response to an attempt by an unlicensed end-user to access a protected web site, 16 the unlicensed end-user is linked (i.e., transferred) to the copy protection system web site 17 wherein the unlicensed end-user may obtain a license for authorized access and/or 18 reproduction of protected web site components. Specifically, the copy protection system 19 server displays licensing agreement terms to the unlicensed end-user wherein clarification pages relating to and explaining the license agreement terms may further be displayed in 21 response to an indication that the unlicensed end-user does not understand a displayed 22 licensing agreement term. Subsequent to reviewing the license agreement terms and/or 23 associated clarification pages, the unlicensed end-user must pass an on-line test or quiz 24 administered by the copy protection system server in order to obtain the license. The copy protection system server examines test answers and grants the license to the unlicensed sUUS'~I'~UTE ~N~~T (RUB 28y 1 end-user in response to a correct answer for each test question. However, if test questions 2 are answered incorrectly, the copy protection system server displays clarification pages for 3 licensing agreement terms associated with each incorrectly answered test question. After 4 the unlicensed end-user reviews the license agreement terms and clarification pages relating to incorrectly answered test questions, a modified on-line test or quiz is 6 administered to the unlicensed end-user by the copy protection system server. The 7 unlicensed end-user must pass the modified test by correctly answering each test question 8 in order to obtain the license. Alternatively, the test or quiz may be administered via fax, 9 telephone, mail or in any other suitable manner wherein test answers may be graded by an external device (e.g., character or other type of reader).
11 Upon granting a license to an unlicensed end-user, the copy protection system 12 server modifies or places a special code within a cookie file (i.e, a file containing end-user 13 information associated with an end-user Internet browser) associated with the end-user to 14 indicate that the end-user possesses a license. Further, site copying software may be 1 S downloaded by a licensed end-user to an associated end-user computer system from the 16 copy protection system server to enable the end-user computer system to access and/or 17 reproduce protected web site components. The copy protection system, via site copying 18 software and site examination server software, verifies the information contained within 19 the end-user cookie file against the information contained within the permission table associated with the protected web site to enable the licensed end-user to access and/or 21 reproduce protected web site components in accordance with access privileges granted to 22 the end-user by the license. If the end-user does not obtain a license, the copy protection 23 system enables the unlicensed end-user to access only unprotected web site components.
24 Thus, the copy protection system enables web site owners to selectively determine web site 1 components to be accessed and/or reproduced, thereby preventing unauthorized 2 reproduction of those web site components.
3 The above and still further objects, features and advantages of the present invention 4 will become apparent upon consideration of the following detailed description of a specific embodiment thereof; particularly when taken in conjunction with the accompanying 6 drawings wherein like reference numerals in the various figures are utilized to designate 7 like components.

9 Fig. I is a view in perspective of an exemplary computer system employed by the present invention.
11 Fig. 2 is a functional block diagram of protected web sites, permission tables and 12 site copying software illustrating the manner in which permission tables are utilized to 13 determine end-user access rights for protected web site material according to the present 14 invention.
Fig. 3 is a block diagram of TCP/IP protocol layers.
16 Fig. 4 is a block diagram of an exemplary hierarchical structure of a web site.
17 Fig. 5 is an exemplary HTML file containing tags (i.e., web site formatting 18 instructions) for generating a web site page.
19 Figs. 6 - 10 comprise a procedural flow chart illustrating the manner in which the copy protection computer system grants licenses to end-users and enables only licensed 21 end-users to access protected web site components according to the present invention.

1 Fig. 11 is a system flow chart illustrating the manner in which the copy protection 2 computer system determines that an end-user is authorized to access protected web sites 3 according to the present invention.
4 Fig. 12 is a flow diagram illustrating the manner in which the copy protection computer system verifies end-user understanding of license terms before granting a license 6 according to the present invention.

8 An exemplary computer system employed by the present invention for 9 implementing web site copy protection is illustrated in Fig. 1.
Specifically, computer system 61 is a conventional IBM-compatible or other type of personal computer preferably 11 equipped with a monitor 63, base 65 (i.e., including the processor, memories, and internal 12 or external communication devices or modems), keyboard 69 and mouse 67. The copy 13 protection system (CPS) typically includes a plurality of computer systems 61 (e.g., a copy 14 protection system server or a third party server, a web site owner computer system and an end-user computer system), each computer system including a different portion of copy 16 protection software. Specifically, the copy protection system utilizes software that includes 17 independent but related components, namely site examination server software, site copying 18 software and licensing software. The site examination server software preferably resides 19 on the copy protection system server (e.g., a computer system that services client requests) and ascertains the protected web site structure, while site copying software is typically 21 downloaded from the copy protection system server onto an end-user computer system to 22 facilitate selective copying of protected web site material as described below. The 23 licensing software typically resides on the copy protection system server and grants end-1 users licenses to access protected web site material as described below.
Alternatively, site 2 examination server software may reside on a computer system server of a third party 3 possessing a license for site examination server software, or on a web site owner computer 4 system (i.e., a client version of the site examination server software residing on the web S site owner computer system). The site copying software enables selective reproduction of 6 web site material and works in conjunction with the site examination server software 7 similar in relation to a client-server application (i.e., an application where a computer 8 system or server processes requests from several client or end-user computer systems).
9 The site copying software is designed to function as a helper application or "plug-in" (i.e., IO software that extends the basic features of a software package and functions as though it I I is part of that package) to Internet browsers, such as Netscape, Mosaic, Internet Explorer 12 or other browser. However, the site copying software may also be a stand-alone program, I 3 or software developed by third parties having a license to develop such software. The site I4 examination server software examines a web site and constructs a permission table to I 5 define access schemes for web site components based on web site owner preferences. Each I6 protected web site is processed by the site examination server software to construct 17 individual permission tables for use by the site copying software as illustrated in Fig. 2.
I 8 The site copying software may be in the form of a stand-alone program 96, a "plug-in" 97 I 9 to an Internet browser, or a third party copying utility 98. Specifically, the site examination server software constructs individual permission tables 95 for each protected web site 90.
21 92, 94. Each permission table typically includes information relating to end-users licensed 22 for a respective web site and the protection afforded to the respective web site components.
23 When an end-user visits a protected web site 90, 92, 94 and desires local copies of web 24 site material, the site copying software 96 (e.g., a stand-alone version), 97 (e.g., a plug-in 1 version), or 98 (e.g., third party software) resident on the end-user computer system utilizes 2 permission tables 95 to determine end-user access rights and corresponding web site 3 components to copy to the end-user computer system based on the license and protection 4 information contained in the table. When the end-user does not possess a license, permission tables 95 either permit access to only unprotected web site components, or 6 totally deny access to the web site when all web site components are protected.
7 Each computer system may utilize any of the maj or platforms or operating systems, 8 such as Windows, Macintosh, Unix or OS2. Further, the computer systems containing the 9 site examination server software (e.g., the copy protection system server or third party server, or the web site owner computer system) and licensing software (e.g., the copy 11 protection system server) preferably include at a minimum an Intel 80486 or compatible 12 processor, eight megabytes of RAM, and sufficient disk storage (e.g., hard drive) to store 13 at least ten megabytes of data and web browser software. The computer system containing 14 the site copying software (e.g., the end-user computer system) is substantially similar to the computer system containing the site examining server software and licensing software 16 described above except that the computer system containing the site copying software 17 requires sufficient disk storage (i.e., hard drive) to store at least one megabyte of data and 18 web browser software. Moreover, the end-user of the computer system containing the site 19 copying software controls the allocation of disk storage used for local copies of protected web site material.
21 The copy protection system assists web site owners in protecting their web sites 22 from unauthorized reproduction. The main system concept is to enable an end-user to 23 locally reproduce web site material in a manner that is satisfactory to the web site owner.
24 The copy protection system provides a special web site copying utility (i.e., the site 1 copying software described above) to the end-user for enabling the end-user to produce 2 legitimate copies of web site material after the end-user agrees to be bound by a system 3 generated license. The use of other copying facilities is generally outside the scope of the 4 license and is prohibited unless specifically approved by the copy protection system provider. The following steps outline the manner in which web site material is protected.
6 1. Material on the web site is protected by copyright (i.e., upon creation of the 7 material and preferably registered with the appropriate authority (e.g., the 8 Copyright Office)).
9 2. A web site owner enters a web site into the copy protection system.
3. The web site is modified by the copy protection system (i.e., via the site 11 examination server software described above) to permit web site access by 12 authorized end-users.
13 4. An end-user attempts to access the protected web site.
14 4.1 The end-user is informed by the copy protection system (i.e., via the licensing software described above) of the terms and conditions for 16 accessing the site and the fact that site access includes the use of I7 copyrighted copying software (i.e., the site copying software described 18 above) registered with the appropriate authority (e.g., the Copyright 19 Office).
4.2 The end-user agrees to the terms and conditions of web site access 21 and indicates acceptance of the terms either on-line, or by telephone, fax or 22 mail.
23 4.3 The end-user downloads free copying software (e.g., the site 24 copying software described above) to the end-user computer system.

1 4.4 The end-user accesses web site information.
2 S. An unauthorized end-user reproduces protected web site material.
3 S.1 The unauthorized end-user is discovered.
4 5.2 The unauthorized end-user is informed of the violation (e.g., copyright violation for reproducing copyrighted material).
6 5.3 The unauthorized end-user is informed of the terms and conditions 7 for legitimate reproduction and use of the protected web site material.
8 5.3.1 The unauthorized end-user agrees to the terms and 9 conditions for legitimate reproduction and use of the protected material.
11 5.3.2 The unauthorized end-user does not agree to the terms and 12 conditions for legitimate reproduction and use of the protected 13 material, and legal remedies are pursued.
14 Briefly, the Web is a Client-Server service (i.e., a service wherein a computer system or server processes requests from several client or end-user computers) that 16 executes at the top of the Transmission Control/Internet protocol (TCP/IP) layers 100 as 17 illustrated in Fig. 3. The protocol layers dictate the manner in which computers 18 communicate with each other as described below. The TCP/IP layers are less complex 19 than the standard IOS model (i.e., another standard layered protocol) and have become the worldwide standard for communications among different computer systems.
Specifically, 21 the Internet Protocol, Datalink, and Physical layers 66, 68, 70 are associated with the 22 physical transfer of data across different media, such as modem, dedicated T1 (i.e., a 23 communication scheme for digital transmission) or LAN (i.e., local area network), and the 24 manner in which the different media handshake or communicate. Transport layer 64 WO 98l25373 PCTIUS97l21356 1 includes a Hypertext Transport Protocol (HTTP) that enables the Web to request and send 2 data from one computer to another, while Application level 62 includes a web browser 3 (i.e., software that enables an end-user to traverse the Web), such as Netscape, Mosaic, 4 Internet Explorer or other browser, residing on the client (i.e., end-user) system and a web server (i.e., software that enables the server to process client requests) residing on the 6 server system. An end-user at a client system typically enters an Internet address in the 7 appropriate field on a web browser window to request or visit a particular Internet web site.
8 The entered address usually contains the prefix "http" and is forwarded to an Internet 9 service, namely Domain Name Service (DNS), wherein the service stores the computer address of the computer, typically a server, containing the requested site.
The request is 11 then sent to the server residing at the computer address and containing the requested site 12 wherein the server downloads the site to the end-user computer via the Internet. The site 13 is then displayed on the end-user computer screen using the client web browser.
14 The structure of a web site is based on the standard tree structure utilized by most major and conventional computer operating systems. A typical hierarchical structure 72 16 utilized in conventional computer operating systems and demonstrating the manner in 17 which a majority of web sites are stored within those operating systems is illustrated in Fig.
18 4. A simple web site can consist of a single file, but generally a web site contains many 19 files. Specifically, structure 72 includes a top level or root node 74 having subordinate nodes 76 (web site), 78 (programs) and 80 (E-mail (i.e., electronic mail)).
Programs node 21 78 includes programs (e.g., common gateway interface (CGI) scripts that reside on the 22 server and are initiated by the web browser via user input) utilized by the web site to 2s perform various functions, such as animation, while E-mail node 80 typically contains 24 information relating to the transmission and reception of electronic mail.
Web site node 1 76 typically includes a subordinate node pertaining to a home page 82 with links to 2 subsequent nodes or pages of information, such as company background 84, products 86 3 and order forms 88. These links are known as Hyperlinks and are a powerful utility of the 4 Web enabling transference to various web pages. The links also enable return from 5 company background, products, and order form pages 84, 86, 88 to the home page 82 (i.e., 6 commonly referred to as the index since the home page enables transference to particular 7 locations in the web site, such as the company background, products and order form pages) 8 such that an end-user can easily restart traversal of the web site structure. Hyperlinks are 9 not limited to transference among locations within one's own site, but can transfer an end-10 user to any other page residing on the Web. Hyperlinks are similar to references and/or 11 footnotes encountered in written works except that the reference is available without 12 having to leave the main body of the work. In terms of the Internet, the web is the main 13 body with web pages being references and/or footnotes. Further, a web site may have 14 Hyperlinks to other Internet services, such as E-mail and File Transfer Protocol (FTP).
15 FTP is typically utilized to transfer files and download software. In addition, a web site 16 may include forms where an end-user enters information on a form and the web site 17 interacts with the end-user via a CGI script described above or other programming 18 protocols.
19 The web site files are written in accordance with a particular syntax that is central to the Web, namely the Hypertext Markup Language (HTML). HTML is a language 21 constructed of text that has delimiter codes incorporated into the language to represent a 22 procedural call. These procedural calls indicate the type of processing and/or arrangement 23 for text, graphic and related objects that form the web site. In particular, HTML utilizes 24 less than (i.e., "<") and greater than (i.e., ">") symbols as code delimiters with HTML
instructions or tags placed between these two symbols (e.g., (TITLE)). A small exemplary 1 HTML file showing different types of tags that indicate whether or not text is body matter.
2 a heading or a title is illustrated in Pig. 5. Other tags include links, and calls to graphics, 3 sound files and programs (e.g., CGI scripts). The tags enable the copy protection system 4 to identify various objects within a web site that may require protection.
Web sites typically include a plurality of various media types that are generally 6 each individually eligible for copyright registration. These media types commonly take the 7 form of works listed, by way of example only, in Table II below. For example, graphic 8 works are considered to be pictorial with copyright registration generally being 9 accomplished via form VA, while text and tables are considered to be literary material with copyright registration generally being obtained via form TX. The various types of works 11 shown in Table II are typically contained in files preferably having the designated file 12 extensions (i.e., NA indicates that there is no designated extension or an extension is not 13 applicable). A web site typically includes software that can process the files to attain the 14 desired effect (e.g., sound, picture, etc.). The various web site works described below may each have their own separate copyright registration dependent upon their commercial 16 value.

>:
2 ::::: ;. :: :.:::. :.:...;: <:> ;: .. . ;.
::::: >: :.: : . : . ::. ~I~~ . :.:.
. : : :~::. .. .:. :.. .. .... IIEQ~UI1~E~1 FI3It ::< : :: ; .:: ,.;.. :
'f'~.'"Fl~ f~F ~~: :
W~F3 :: :.. .:
.. .. ~)~~~t ::.:
. . ..
~

. .: ..:... , . :..
.::: >::. ::: >:::
:::..:>:.:;:. :: :. ~LfiTG . .
..:. :..:...
;..

3 Text, Tables HTML htm or html TX

4 Graphic GIF gif VA

Photograph JPEG jpg or jpeg VA

6 Audio Wave wav SR

7 Digital Music Midi mid PA

8 Audio Streaming Real Audio NA PA

9 Multimedia Shockwave NA PA

Program Java java TX

11 Program (Forms) CGI cgi TX

12 FTP (File Transfer)NA NA TX

13 Com uter AnimationNA NA VA

14 The copy protection system basically includes two phases that are performed in 1 S order to protect a web site. The first phase includes incorporating the web site into the 16 copy protection system and providing site copying software to licensed end-users for 17 facilitating reproduction of protected web site material. The second phase of the copy 18 protection system enables only licensed end-users to access protected web site matcrial.
19 Initially, a web site for which protection is desired is configured in a certain manner to restrict access to particular web site components in accordance with web site owner 21 preferences. Specifically, the copy protection system (i.e., via the site examination server 22 software described above) performs an initial examination of the web site and identifies 23 various web site components by media types or objects generally contained in Table II. A
24 subsequent inquiry is performed for each component to obtain from the web site owner whether or not the component is to be protected, and the level of protection desired (e.g., suBS~r~rr~ sH~~r ~u~E z~

1 the component level or distance from the root node within the web site hierarchical 2 structure requiring protection wherein subsequent levels of web site components coupled 3 to the higher level protected component are also protected). Generally, the web site owner 4 visits the copy protection system web site via a web browser residing on the owner computer system wherein the owner is prompted for the address of the web site requiring 6 protection. The owner subsequently enters the Uniform Resource Locator (URL, i.e., the 7 web site Internet address) for the web site into a dialog box or form to start the copy 8 protection process. The site examination server software retrieves and examines the whole 9 web site structure 72 (Fig. 4) including tags found in web site HTML files (Fig. 5) to identify various web site components. The HTML tags may indicate media types of, and 11 usually indicate files containing, web site components (c.g., image files, sound files, etc.).
12 The file extensions of web site media files may also indicate media types as described 13 above, by way of example only, in Table II. Subsequently, a series of questions is 14 presented to the web site owner in a dialog box, form or line prompts relating to inclusion and exclusion of web site components for copy protection. For example, certain graphics 16 of a utility nature should be ignored and automatically excluded from copy protection by 17 the system, such as bullets for bulleted lists and simple lines that are used as dividers on 18 the screen. These utility graphics can be excluded based on either their size (e.g., number 19 of bytes and/or length and width) and/or title. The site examination server software typically sets a protection flag (i.e., " Protection Tag" element of an HTMI, object data 21 structure described below) in order to indicate web site components that are to be protected 22 and the level of protection desired, while setting an ignore flag (i.e., "Ignore Flag" element 23 of an HTML object data structure described below) to bypass web site components that are 24 to be ignored. Further. the site copying software described above is made available for 1 downloading to end-user computer systems to enable end-users consenting to a license to 2 copy protected web site material.
3 Once a web site is configured and the copying software is available for 4 downloading as described above, end-users may attempt to visit a protected site. Upon visiting a protected site, the end-user is presented with terms and conditions for accessing 6 protected web site material and using the site copying software. The end-user must agree 7 to the terms and conditions prior to accessing the web site. However, one of the major 8 problems with licensing software is ascertaining the end-user's understanding of the terms 9 and conditions of the license. The copy protection system, via the licensing software, assists the end-user with comprehending the license terms by selectively displaying major 11 license components with a clarifying explanation, and testing the end-user on license 12 subject matter. The end-user endures this licensing procedure since each protected web 13 site is licensed by substantially the same terms, thereby requiring the procedure to only be 14 performed once to visit any protected site. The goal of the copy protection system is to ensure that end-users carefully read the license and understand the license terms. The 16 terms basically include the right to use the site copying software when the end-user desires 17 a local copy of web site material, however, the license terms must be upheld whether or 18 not the end-user uses the site copying software to produce local copies.
When the end-user 19 desires local copies of protected web site material at a later date, the end-user simply returns to a protected web site to download the site copying software as described below.

22 The copy protection system (i.e., via the site examination server software) utilizes 23 an overall data structure for the web site including a master list of HTML
tags or objects 24 encountered during examination of web site files. Each HTML object includes a record 1 having a component indicating whether or not that object is to be protected and the level 2 of protection desired (i.e., the "Protection Tag" element). The HTMI~ object further 3 includes the object media type and other related information (e.g., file location, ignore flag, 4 creation date, modification date, ownership, links, etc.). The HTML objects essentially 5 decompose a web site into its smaller components since each web site component may 6 require a different degree of protection, or no protection at all. Further, since large 7 protected web site components may usually be decomposed into protected and unprotected 8 web pages and/or files, a web site component that is an element of a larger protected web 9 site component may be protected under the larger component protection and not need 10 individual protection. For example, a newspaper may offer a top level headline web page lI for free viewing, however, detailed stories may only be available to end-users that I2 subscribe to the newspaper. In order for the end-user to maintain local copies of stories on 13 the end-user computer system, the end-user requires specialized software, similar to the site I4 copying software described above, to copy stories to the end-user computer system.
15 Once an end-user is authorized to access protected web sites, the end-user computer 16 system maintains a small End-User object (i.e., a small record) within a cookie file 17 associated with a web browser on the end-user computer system. The cookie file is 18 typically a simple ASCII file associated with Internet browsers that contains end-user I9 information (i.e., an End-User object described below having the user name and a code) 20 wherein the file can be read or written by the copy protection system software (e.g., the site 21 examination server software and the licensing software as described 22 below) when the end-user attempts to access a protected site. Typically, the cookie file is 23 examined when an end-user accesses a protected site to determine whether or not the end-24 user is entitled to access protected web site material. If the code is not present within the 1 cookie file, the user is directed to obtain a copy protection system license in order to 2 access protected web site material. The code is basically an encrypted key that is 3 associated with the user name contained within the permission tables described above.
4 In Object Oriented Programming (OOP), the data and data processing are stored as a single set of computer instructions. In other words, the data type and processing 6 instructions are merged. This feature enables creation of Client-Server applications, such 7 as the Web. The Gane/Sarson web site data structure outline for the web site, HTML and 8 End-User objects is illustrated below.
9 Web Site Ob,'~ect HTML Object List 11 HTML Obiects 12 File Location 13 Ignore Flag 14 Types Text .

16 Artwork 17 Photograph 18 Database 19 Link Program 21 Java Applet 22 Xactive 23 Creation Date 24 Modification Date Ownership 26 Links (Internal) 27 To 28 From 29 Protection Tag Yes/No 31 Level 32 End-User Object/Cookie File on End-User's Sstem 33 Name 34 Code (Encrypted Key) A procedural flow chart showing the operation of, and the manner in which a web 36 site is protected by, the copy protection system is illustrated in Figs. 6 -10. Specifically, 37 a web site owner initially determines at step 1 that information on the owner's web site SUBSTITUTE SI~E~T (RUtE 2~)~

I requires protection. The owner visits the copy protection system (CPS) web site at step 2 2 via the owner computer system web browser wherein the owner is presented (e.g., via 3 licensing software resident on the copy protection system server containing the system web 4 site) with terms for web site protection and conditions under which the copy protection system grants licenses to end-users for accessing a protected web site. When the owner 6 agrees to the protection terms and end-user licensing conditions at step 3, the site 7 examination server software loads the owner web site files at step 4, and examines the files 8 at step 5 to decompose the web site into its smaller components or objects based on HTML
9 tags within web site files as described above. An object table containing entries for web site objects is constructed by the site examination server software at step 6 from the web 11 site examination, and preferably stored in computer memory or a commercially available 12 or conventional database. The site examination server software may reside on the copy 13 protection system server, a third party server containing the owner web site and licensing 14 the site examination server software, or on the owner computer system in a client version.
I S It is to be understood that the references to software performing functions as used herein I 6 actually refer to a computer system performing the functions under control of that software.
17 Once web site objects are identified, the site examination server software presents 18 the owner with a series of inquiries to ascertain web site objects to be automatically 19 excluded from protection or ignored as described above. The web site objects are examined via the site examination server software and each obj ect that has not been 21 excluded (i.e., the "Ignore Flag" element of the HTML object data structure described 22 above is not set) is presented to the owner in an object loop (i.e., a series of computer 23 instructions that are repeated for each object) to ascertain whether or not protection for that 24 object is desired. Specifically, the object loop determines at step 7 whether or not each object has been processed. When objects have not been processed, the next object is suB~~~~ ~~~~ ~u~ ~~~

1 retrieved and the owner determines at step 8 whether or not the retrieved object requires 2 protection. If the owner enters information (e.g., via keyboard, mouse or any other 3 conventional input device) indicating that the object does not require protection, the 4 protection flag (i.e., the "Protection Tag" element of the HTML object data structure described above) is not set as indicated at step 9. However, if the owner enters information 6 indicating that the object requires protection, the owner subsequently enters the desired 7 protection level (e.g., the object level or distance from the root node within the web site 8 hierarchical structure requiring protection wherein subsequent levels of web site objects 9 coupled to the higher level protected object are also protected) at step 10, and the protection flag (i.e., the "Protection Tag" element of the HTML object data structure 11 described above) is set to indicate the level of protection required at step 11. The web site 12 owner is able to protect different portions of the web site based on the web site hierarchical 13 structure (Fig. 4) and the level of protection indicated for a particular web site object.
14 After the protection status of the object has been designated, the next object is retrieved for processing at step 7.
16 Referring to Fig. 7, when the owner has entered protection preferences for each web 17 site object, an access (i.e., permission) table indicating the protection status of each web 18 site object is constructed by site examination server software at step 12, and preferably 19 stored in a computer memory or commercially available or conventional database. The web site objects are examined in a second object loop within the site examination server 21 software in order to inspect the web site objects and modify corresponding web site files 22 (e.g., HTML files) associated with each protected object. Specifically, the second object 23 loop determines at step 13 whether or not each web site object has been processed. When 24 web site objects have not been processed, the next web site object is retrieved and its 1 protection flag (i.e., the "Protection Tag" element of~ the HTML object data structure 2 described above) examined at step 14 to determine whether or not the object is to be 3 protected. If the object requires protection, the corresponding portion of web site IITML
4 files are modified by site examination server software at step 16 to enable limited access S to that web site object. In particular, the web site is modified by embedding a special tag 6 or code within web site HTML files associated with the protected web site object. The tag 7 may comprise any characters or symbols that do not conflict with existing 1-ITML tags or 8 commands. The special tag indicates to site examination server software and site copying 9 software particular objects that are protected, thereby controlling access to protected web site components. The special tags basically identify web site components within HTML
11 web site files that should not be sent to unlicensed end-user computer systems for display 12 on end-user web browsers or storage in the end-user computer system. If the web site 13 object is not to be protected, web site files are not modified as indicated at step 15. After 14 the object is processed, the next object is retrieved for processing at step 13.
Upon modifying web site files in accordance with web site object protection 16 designations, the web site may handle access requests by end-users at step 43. Specifically, 17 when an end-user visits a protected site via an end-user web browser, the site examination 18 server software determines at step 44 whether or not the end-user has previously visited 19 a protected site and obtained a license. This is automatically determined by examining the end-user cookie file in the end-user web browser as illustrated in Fig. 11.
The cookie file 21 includes the end-user name and code as described above wherein the code indicates the 22 presence of an end-user license. Specifically, the end-user visits a protected web site 73 23 by requesting access via a web browser 77 residing on the end-user computer system. By 24 way of example only, web site 73 resides on a third party server containing a licensed copy 1 of site examination server software. The site examination server software examines end-2 user cookie file 79 and special tags within HTML web site files being accessed.
3 Subsequently, the site examination server software determines end-user access rights by 4 inspecting the access (i.e., permission) table associated with web site 73 in a local end-user 5 database 81 for the encryption key or code contained in the cookie file wherein the 6 existence of the key in the database indicates the presence of a license.
The site 7 examination server software may alternatively consult the access table for web site 73 in 8 end-user database 83 residing on the copy protection system server containing a copy 9 protection system web site 75. However, since database 81 is local to the server containing 10 site examination server software and web site 73, database 81 provides a faster overall 11 access time than database 83. The databases may be implemented by any conventional or 12 commercially available databases. The presence of an end-user license may also be 13 indicated in various other manners, such as by use of a password, end-user name, 14 information in a local file or other incorporated feature indicating the presence of a license.
15 Further, site examination server software and web site 73 may reside on the copy 16 protection system server, or on the owner computer system and function in substantially 17 the same manner described above to determine end-user access rights for protected web 18 site material.
19 Referring to Fig. 8, when an end-user visits a protected web site for the first time 20 at step 17, the end-user is "linked" (i.e., transferred) from the protected web site to the copy 21 protection system web site at step 21 where licensing software resident on the copy 22 protection system server presents the end-user with licensing terms for access to the 23 protected site at step 23. After viewing licensing terms, the end-user determines at step 24 24 the manner in which to fiuther view and execute the proposed license agreement. The end-1 user may execute the license as described below either on-line at step 18, or via fax, mail 2 or telephone at steps 20, 22, 60, respectively.
3 The copy protection system obviates the problems of end-user comprehension of 4 licenses described above via on-line execution at step 18. Specifically, each license section is typically presented to the end-user on a web page or form one section at a time. Once 6 each license section has been presented, a license agreement summary is displayed 7 emphasizing major license terms. Subsequently, a series of multiple choice questions 8 relating to subject matter of the license is displayed for the end-user to answer. The 9 licensing process should endure for five to ten minutes and is illustrated in Fig. 12.
Specifically, an overview page 45 is initially displayed and includes the procedure for 11 responding to questions, the complete agreement and a warning that failure to follow the 12 procedure may cause the end-user to restart the licensing process. The warning further 13 states that questions relating to main points of the license must be answered correctly in 14 order to obtain a license. After the overview page, a first license section 46 is displayed for review. The end-user is prompted as to whether or not the end-user understands that 16 license section. If the end-user enters information indicating that the end-user does not 17 understand that section, a clarify page 50 is displayed containing supplemental information 18 about the license section. Subsequent license sections 47, 48, 49, and corresponding 19 clarification pages 51, 52, 53 are respectively individually displayed for review by the end-user in substantially the same manner described above for license section 46 and clarify 21 page 50. After each license section has been reviewed by the end-user, a summary page 22 54 is displayed wherein the full license is summarized. A multiple choice test 55 is 23 administered on-line for the end-user relating to subject matter of the license. The end-24 user's answers are entered and examined for correctness at step ~6, wherein a relevant 1 clarification page 50, 51, 52, 53 corresponding to the license section that pertains to an 2 incorrectly answered question is respectively displayed. The end-user reviews license 3 sections pertaining to incorrectly answered questions and attempts to answer new questions 4 presented in a modified test at step 55 in substantially the same manner described above.
If the end-user answers the original or new questions correctly, a license is issued at step 6 57 and the end-user is permitted to access and download the site copying software. A new 7 test is generated for each end-user to ensure that each end-user has an individual 8 understanding of the agreement. The license may contain any number of sections with 9 corresponding clarification pages and may be granted in substantially the same manner described above. When the end-user is uncertain about the licensing procedure, the end-11 user can contact the copy protection system provider by electronic mail, fax, telephone or 12 mail. Further, each page displaying a license section includes an electronic mail, chat (i.e., 13 on-line conversation), or audio visual (AV) Internet option to facilitate contacting the copy 14 protection system provider.
Referring back to Fig. 8, similar license approval methods can be accomplished via 16 fax at step 20. In particular, the test can be requested from a fax back telephone number 17 and printed at an end-user location. The test includes multiple choice questions wherein 18 the end-user answers the questions on a form received with the test. The form containing 19 end-user answers is returned to the copy protection system center via fax where the test is automatically graded using bar code and optical character recognition (OCR) scanners in 21 conjunction with a computer system containing bar code and OCR software.
Alternatively, 22 regular ground mail may be utilized at step 22 to correspond with the copy protection 23 system center. The copy protection system center generates a new test for each end-user 24 to ensure individual end-user understanding of the license.

1 Another technique that may be implemented to execute the license utilizes 2 telephone coding on touch tone telephones at step 60. Specifically, the end-user obtains 3 the test and text about the license in preprinted form. wherein the test is customized such 4 that the end-user cannot copy answers from another source. The end-user calls the copy protection system center and is prompted to enter) via telephone keypad) a number 6 corresponding to a type of license desired. The license type and serial number is typically 7 present on the copy protection system computer screen, and may be further ascertained via 8 a screen printout. The serial number of the desired license is entered via the telephone 9 keypad, and the end-user is prompted to answer questions from the test. The end-user enters answers to test questions via the telephone keypad wherein the test is automatically 11 graded as described above via a computer system having a conventional device interpreting 12 tones (i.e., digits) entered by the end-user. The license is granted upon correctly answering 13 all of the questions wherein the end-user is given an access code for obviating the licensing 14 procedure and accessing protected web site material. This technique may alternatively be utilized for licensing software and/or other equipment, registering equipment with a 16 manufacturer, or for licenses that are part of an equipment purchase agreement, such as 17 modems, mass storage devices or computer systems. Further, this technique may be 18 employed when the end-user is totally off line and a license is required to access or 19 download software on-line, or to access equipment.
Refernng to Fig. 9, when the end-user enters information indicating that the end-21 user does not agree to license terms at step 25, the site examination server software 22 examines the access (i.e., permission) table for the protected web site as described above 23 to uncover protected web site objects (i.e., the "Protection Tag" element of the HTML
24 object data structure is set for protected objects) at step 26. If the access table includes 1 unprotected web site objects, the site examination server software constructs a limited 2 permission table at step 29 and enables an end-user to access unprotected objects at step 3 31. However, if ail web site objects within the access table are protected, then access by 4 the end-user is forbidden at step 27 and the web site visit is terminated.
Upon the end-user entering information indicating that the end-user agrees to 6 license terms at step 25, the licensing software modifies the end-user cookie file at step 58 7 (i.e., the file containing end-user information associated with the end-user Internet browser) 8 to contain the end-user object data structure with the end-user access information {i.e., 9 name and code) described above. This file is utilized to determine whether or not an end-user possesses a license as described above. The end-user determines at step 28 whether 11 or not to obtain local authorized copies of web site material for storage on the end-user 12 computer system. When the end-user desires to obtain local copies, the end-user 13 downloads (e.g., the download is typically accomplished by selecting a download function 14 from a web page) at step 30 the site copying software to the end-user computer system, and the end-user is permitted to access the protected site at step 32.
16 Upon determining at step 44 (Fig. 7) that the end-user has visited a protected site 17 (i.e., the cookie file is examined as described above), the end-user determines at step 40 18 whether or not to obtain local copies of protected web site material. If the end-user desires 19 local copies of protected web site material and determines at step 41 that the site copying software is not resident on the end-user computer system, the end-user downloads the site 21 copying software as described above to the end-user computer system at step 42. After the 22 site examination server software determines the end-user possesses a license, the end-user 23 is permitted to access the protected site at step 32. The end-user may automate obtaining 24 local copies of protected web site material by indicating in the end-user browser that WO 98l25373 PCTIUS97/21356 1 material from a particular web site is to be copied automatically upon visiting that site a 2 predetermined number of times. The end-user browser is typically supplemented with a 3 counter that maintains the number of times a site is visited. The end-user sets a variable 4 within the browser that indicates the number of visits required to automatically copy web 5 site material from a particular site. When the counter reaches the number of visits 6 indicated by the variable, the browser initiates the site copying software (e.g., a plug-in, 7 stand-alone program or third party software) to automatically produce local copies of web 8 site material. The copies are produced provided that the end-user is authorized or licensed 9 to make such copies. Alternatively, web site material may be copied upon end-user 10 request.
11 Referring to Fig. 10, when a protected web site includes File Transfer Protocol 12 (FTP) services (i.e., services to download data and/or software), the end-user determines 13 at step 33 whether or not to download available data and/or software from the protected 14 web site. If the end-user does not desire to download data and/or software at an FTP site, 15 the visit is terminated at step 39. However, upon the end-user determining to download 16 data andlor software, the site examination server software reminds the end-user of license 17 copying terms at step 34. Further, the protected web site may include additional local 18 terms and conditions for downloading data and/or software, such as terms related to 19 purchase of files and software. The local terms are typically displayed to the end-user via 20 software resident at the server containing the site. When no local terms exist at step 35, 21 the end-user may download data and/or software at step 37 via FTP services, and 22 subsequently terminate the visit at step 39. When the web site includes additional local 23 terms, the end-user determines at step 36 whether or not to agree to the additional local 24 terms. If the end-user enters information indicating that the end-user agrees to additional 1 local terms, data and/or software is downloaded at step 37 via FTP services, and the visit 2 is terminated at step 39; otherwise data and/or software is not downloaded as indicated at 3 step 38, and the visit is terminated at step 39.
4 The copy protection software (e.g., the site examination server software, site copying software and licensing software) is implemented in the'C' programming language, 6 however, the software may be developed in any of a number of high or low level 7 computing languages. Basically, the software includes independent, but related modules.
8 A first module, namely the site examination server software, examines the web site itself 9 and constructs a permission table in accordance with the web site owner's designation of protected web site components as described above. The site examination server software 11 may reside at the copy protection system server, a third party server (i.e., a a licensed copy 12 of the software) containing the protected web site, or on the web site owner computer 13 system (e.g., as a client version of the software). A second module, namely the site 14 copying software, resides on the end-user computer system and functions in conjunction with the site examination server software similar in relation to a client-server application.
16 The site examination server software constructs permission tables that are utilized by the 17 site copying software to determine end-user access rights to protected web site objects as 18 described above for Fig. 2. The site copying software may be implemented in various 19 computer languages, such as 'C', 'C++', or Java. A third module, namely the licensing software, resides on the copy protection system server and grants licenses to end-users to 21 access protected web site material as described above.
22 The site examination server software examines the web site to ascertain the web 23 site structure (Fig. 4) and identify web site components within web site files as described 24 above. This task can be performed by high level programming languages, such as 'C' or 1 'C++', and other utility languages that arc oriented towards system management 2 input/output tasks (e.g., Perl). Once a11 components or objects are encountered in a web 3 site, the site examination server software determines, with owner assistance as described 4 above, web site objects requiring copy protection. This calls for building a database or data structure that is well suited for 'C' or 'C++' computer languages. The site examination 6 server software may utilize a data structure to store protection information and/or 7 permission tables as described above, or use a database wherein an object oriented 8 programming language includes calls to the database as part of the object declaration in the 9 software (i.e., the computer instructions representing the calls are merged with the data or I 0 structure type as described above). Alternatively, since other computer languages have the 11 ability to make external database calls (e.g., Perl), the site examination server software can 12 be designed in a manner to function in conjunction with an external database, such as SQL) 13 to store protection information and/or permission tables. Further, the site examination 14 server software may be designed in a manner to interface and be initiated from a Java program since Java is platform independent, includes the capabilities described above, and 16 is designed specifically for the Internet. It is to be understood that the copy protection 17 software may be developed in any of the above described or other computer languages by 18 one of ordinary skill in the art based on the functional description and data structures 19 disclosed in the specification and flow charts illustrated in the drawings.
It will be appreciated that the embodiments described above and illustrated in the 21 drawings represent only a few of the many ways of implementing a web site copy 22 protection system and method.
23 The present invention is not to be limited to copy protection of web sites, but may 24 be utilized for copy protection of various other works, preferably in computer readable I form, in substantially the same manner described above. For example, the system may 2 (e.g., via software) examine computer readable forms of other works (e.g., works 3 associated with or stored in at least one computer file) and protect those works in 4 substantially the same manner described above.
The present invention may be implemented by an end-user's computer system in 6 combination with a web site owner computer system or any quantity of server or host 7 computer systems residing on the web or in communication with the end-user's computer $ system. The web site owner, server or host computer systems may perform the web site 9 processing and licensing as described above, while the end-user may communicate with the web site owner, server or host computer systems to download and utilize site copying 11 software through a web browser or other software residing on the end-user computer 12 system as described above. The end-user essentially visits the protected web site and/or 13 copy protection system via the web browser on the end-user's computer system or 14 communicates with the web site owner, server or host computer systems via modem or I 5 other communication device, and initiates access and/or the licensing procedure wherein 16 access to protected web site components is restricted to licensed or authorized end-users.
17 The server, host and other computer systems may be implemented by any conventional or 18 other processing systems having the capacity and storage to execute the copy protection 19 software (e.g., site examination server software, licensing software and site copying software). The software (e.g., site examination server software, licensing software and site 21 copying software) may be implemented in any suitable computer language enabling the 22 copy protection system to process the web site or other works and facilitate access and/or 23 reproduction of that web site in substantially the same manner described above.
24 Information may be entered into the copy protection system via keyboard, mouse, voice 1 recognition, touch screen or any other input device. Further, line prompts.
dialog boxes 2 and forms may be arranged in any fashion and have any layout or configuration. Moreover, 3 any type of input mechanism may be utilized to retrieve information from an end-user, 4 such as menus, windows or graphical user interfaces (GUI). The data structures, databases and tables may store and arrange any information in any manner, and may be implemented 6 by any data or storage structures or storage devices capable of storing information required 7 for copy protection.
8 The software logic or algorithms may be arranged in any manner capable of 9 selectively enabling limited access to protected components of web sites or other works in computer readable form. The copy protection system may examine the web site or other 11 works in any fashion capable of determining the structure of the work and the types of 12 works of the work components. The site copying and other software may be delivered to 13 an end-user via any suitable medium, such as CD-ROM. diskette, downloaded from the 14 Internet or a bulletin board (e.g., via carrier signals) or other transfer mechanism. The software (e.g., site examination server software, licensing software and site copying 16 software) may be installed and executed on a computer system in any conventional or other 17 manner (e.g., an install program, copying files, entering an execute command), and may 18 be implemented to be compatible with any operating system. Further, the permission 19 tables may be arranged in any fashion and may be implemented by any data or storage structure or device. Moreover, the code indicating a licensed end-user may be any type of 21 code or other indication of a license, while the protection level designation and other flags 22 may be any number, code or other characters capable of indicating the desired level or 23 status. The license indication may be implemented by storing any indication in any file or 24 at any memory location, or by any other techniques. In addition, web site or other files WO 98l25373 PCTIUS97121356 1 containing works may be modified in any manner to indicate protected components, or 2 separate files, tables or other data storage structures may be utilized to indicate protection 3 of work components.
4 The license terms and any other information may be displayed to an end-user in any 5 fashion wherein the license may include any quantity of clauses. The test or quiz may be 6 administered and graded in any fashion (e.g., automated or manually) wherein the test may 7 include any type (e.g., true/false, multiple choice, etc.) and any quantity of questions. A
8 license may be granted by the copy protection system based on achievement of any desired 9 test score. Further, the copy protection system may enable an end-user to take the test 10 and/or review license terms in any sequence.
11 From the foregoing description it will be appreciated that the invention makes 12 available a novel web site copy protection system and method wherein the system I3 selectively enables access and reproduction of protected web sites or other works in 14 computer readable form to licensed or authorized end-users.
15 Having described preferred embodiments of a new and improved web site copy 16 protection system and method, it is believed that other modifications, variations and 17 changes will be suggested to those skilled in the art in view of the teachings set forth 18 herein. It is therefore to be understood that all such variations, modifications and changes 19 are believed to fall within the scope of the present invention as defined by the appended 20 claims.

Claims (20)

WHAT IS CLAIMED IS:
1. A computer system for protecting a work in computer readable form from unauthorized access and/or reproduction, said computer system comprising:
input means for facilitating user entry of information associated with the work;
examination means for retrieving the work in computer readable form based on the entered information and examining the work to identify individual work components contained within the work;
work selection means for facilitating user selection of identified work components for protection;
licensing means for granting licenses to enable end-users to access and/or reproduce work components selected for protection;
permission means for storing authorized access information and information associated with a protection status for each work component, wherein the authorized access information relates to licenses granted by said licensing means; and access means for determining, based on the authorized access information, the presence of a license granted by said licensing means to an end-user and selectively permitting that end-user to access and/or reproduce work components in response to said license determination and the protection status information stored in said permission means.
2. The computer system of claim 1 wherein the work includes a web site.
3. The computer system of claim 1 wherein said licensing means includes:
license display means for displaying license terms to an end-user;

clarifying means for explaining license terms displayed by said license display means in response to an indication that the end-user does not understand a displayed license term;
test means for administering a test having test questions to the end-user relating to license terms displayed by said license display means; and license grant means for granting a license to enable the end-user to access and/or reproduce work components selected for protection in response to achieving a passing test score associated with the test.
4. The computer system of claim 3 wherein:
said test means includes:
test question means for administering test questions to an end-user;
answer receiving means for receiving answers to the administered test questions from the end-user;
grading means for determining correctness of the received answers;
answer explaining means for explaining a license term associated with each incorrectly answered test question detected by said grading means;
modified test means for administering a modified test having modified test questions to the end-user relating to license terms in response to the end-user achieving a failing test score associated with the test; and said license grant means includes:
modified grant means for granting a license to enable the end-user to access and/or reproduce work components selected for protection in response to achieving a passing test score associated with the modified test.
5. The computer system of claim 1 wherein:
said licensing means includes:
code means for associating a code with an end-user in response to said licensing means granting that end-user a license; and said access means includes:
verification means for determining the presence of a license granted by said licensing means to the end-user by verifying the code associated with the end-user against the authorized access information within said permission means to enable the end-user to access and/or reproduce work components selected for protection in response to verification of the code.
6. The computer system of claim 1 wherein said access means includes:
licensed access means for permitting the end-user to access and/or reproduce work components selected for protection in response to said determination that the end-user has been granted a license by said licensing means; and unlicensed access means for permitting the end-user to access and/or reproduce only unprotected work components indicated by the protection status information in response to said determination that the end-user has not been granted a license by said licensing means.
7. A program product apparatus having a computer readable medium with computer program logic recorded thereon for facilitating protection of a work in computer readable form from unauthorized access and/or reproduction, said program product apparatus comprising:
input means for facilitating user entry of information associated with the work;
examination means for retrieving the work in computer readable form based on the entered information and examining the work to identify individual work components contained within the work;
work selection means for facilitating user selection of identified work components for protection;
licensing means for granting licenses to enable end-users to access and/or reproduce work components selected for protection;
permission means for storing authorized access information and information associated with a protection status for each work component, wherein the authorized access information relates to licenses granted by said licensing means; and access means for determining, based on the authorized access information, the presence of a license granted by said licensing means to an end-user and selectively permitting that end-user to access and/or reproduce work components in response to said license determination and the protection status information stored in said permission means.
8. The apparatus of claim 7 wherein the work includes a web site.
9. A computer data signal embodied in a carrier wave and having computer program logic embedded therein for facilitating protection of a work in computer readable form from unauthorized access and/or reproduction, said computer data signal comprising:

input means for facilitating user entry of information associated with the work;
examination means for retrieving the work in computer readable form based on the entered information and examining the work to identify individual work components contained within the work;
work selection means for facilitating user selection of identified work components for protection;
licensing means for granting licenses to enable end-users to access and/or reproduce work components selected for protection;
permission means for storing authorized access information and information associated with a protection status for each work component, wherein the authorized access information relates to licenses granted by said licensing means; and access means for determining, based on the authorized access information, the presence of a license granted by said licensing means to an end-user and selectively permitting that end-user to access and/or reproduce work components in response to said license determination and the protection status information stored in said permission means.
10. The computer data signal of claim 9 wherein the work includes a web site.
11. A method for protecting, via a computer system, a work in computer readable form from unauthorized access and/or reproduction, said method comprising the steps of:
(a) entering information associated with the work into the computer system;
(b) retrieving the work in computer readable form, via the computer system, based on the entered information;

(c) examining the work, via the computer system, to identify individual work components contained within the work;
(d) facilitating user selection of identified work components for protection;
(e) granting licenses, via the computer system, to enable end-users to access and/or reproduce work components selected for protection;
(f) storing, via the computer system, authorized access information and information associated with a protection status for each work component, wherein the authorized access information relates to granted licenses;
(g) determining, via the computer system based on the authorized access information, the presence of a license granted to an end-user; and (h) selectively permitting the end-user to access and/or reproduce work components, via the computer system, in response to said license determination and the protection status information.
12. The method of claim 11 wherein the work includes a web site.
13. The method of claim 11 wherein step (e) further includes:
(e.1) displaying license terms to an end-user;
(e.2) explaining license terms displayed to the end user in response to an indication that the end-user does not understand a displayed license term;
(e.3) administering a test having test questions to the end-user relating to license terms displayed to the end-user; and (e.4) granting a license to enable the end-user to access and/or reproduce work components selected for protection in response to achieving a passing test score associated with the test.
14. The method of claim 13 wherein:
step (e.3) further includes:
(e.3.1) administering test questions to an end-user;
(e.3.2) receiving answers to the administered test questions from the end-user;
(e.3.3) determining correctness of the received answers;
(e.3.4) explaining a license term associated with each incorrectly answered test question; and (e.3.5) administering a modified test having modified test questions to the end-user relating to license terms in response to the end-user achieving a failing test score associated with the test; and step (e.4) further includes:
(e.4.1) granting a license to enable the end-user to access and/or reproduce work components selected for protection in response to achieving a passing test score associated with the modified test.
15. The method of claim 11 wherein:
step (e) further includes:
(e.1) associating a code with an end-user in response to granting that end-user a license; and step (g) further includes:
(g.1) determining the presence of a license granted to the end-user by verifying the code associated with the end-user against the authorized access information to enable the end-user to access and/or reproduce work components selected for protection in response to verification of the code.
16. The method of claim 11 wherein step (h) further includes:
(h.1) permitting the end-user to access and/or reproduce work components selected for protection in response to said determination that the end-user has been granted a license; and (h.2) permitting the end-user to access and/or reproduce only unprotected work components indicated by the protection status information in response to said determination that the end-user has not been granted a license.
17. A method for facilitating protection of a work in computer readable form from unauthorized access and/or reproduction, said method comprising the step of:
(a) forming a computer readable medium having computer program logic recorded thereon including input means for facilitating user entry of information associated with the work; examination means for retrieving the work in computer readable form based on the entered information and examining the work to identify individual work components contained within the work; work selection means for facilitating user selection of identified work components for protection; licensing means for granting licenses to enable end-users to access and/or reproduce work components selected for protection; permission means for storing authorized access information and information associated with a protection status for each work component, wherein the authorized access information relates to licenses granted by said licensing means; and access means for determining, based on the authorized access information, the presence of a license granted by said licensing means to an end-user and selectively permitting that end-user to access and/or reproduce work components in response to said license determination and the protection status information stored in said permission means.
18. The method of claim 17 wherein the work includes a web site.
19. A method for facilitating protection of a work in computer readable form from unauthorized access and/or reproduction, said method comprising the step of:
(a) forming a computer data signal embodied in a carrier wave and having computer program logic embedded therein including input means for facilitating user entry of information associated with the work; examination means for retrieving the work in computer readable form based on the entered information and examining the work to identify individual work components contained within the work; work selection means for facilitating user selection of identified work components for protection;
licensing means for granting licenses to enable end-users to access and/or reproduce work components selected for protection; permission means for storing authorized access information and information associated with a protection status for each work component, wherein the authorized access information relates to licenses granted by said licensing means; and access means for determining, based on the authorized access information, the presence of a license granted by said licensing means to an end-user and selectively permitting that end-user to access and/or reproduce work components in response to said license determination and the protection status information stored in said permission means.
20. The method of claim 19 wherein the work includes a web site.
CA002272649A1996-11-211997-11-21Web site copy protection system and methodAbandonedCA2272649A1 (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US3142496P1996-11-211996-11-21
US60/031,4241996-11-21
PCT/US1997/021356WO1998025373A2 (en)1996-11-211997-11-21Web site copy protection system and method

Publications (1)

Publication NumberPublication Date
CA2272649A1true CA2272649A1 (en)1998-06-11

Family

ID=21859386

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CA002272649AAbandonedCA2272649A1 (en)1996-11-211997-11-21Web site copy protection system and method

Country Status (2)

CountryLink
CA (1)CA2272649A1 (en)
WO (1)WO1998025373A2 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6298446B1 (en)1998-06-142001-10-02Alchemedia Ltd.Method and system for copyright protection of digital images transmitted over networks
US7130831B2 (en)1999-02-082006-10-31Copyright Clearance Center, Inc.Limited-use browser and security system
WO2000051033A2 (en)*1999-02-232000-08-31Planet-Intra.ComDynamic sites
US6766305B1 (en)1999-03-122004-07-20Curl CorporationLicensing system and method for freely distributed information
US6922781B1 (en)1999-04-302005-07-26Ideaflood, Inc.Method and apparatus for identifying and characterizing errant electronic files
US6460023B1 (en)*1999-06-162002-10-01Pulse Entertainment, Inc.Software authorization system and method
US7620980B1 (en)1999-07-212009-11-17Sun Microsystems, Inc.Secure data broker
US6609198B1 (en)1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US6668322B1 (en)1999-08-052003-12-23Sun Microsystems, Inc.Access management system and method employing secure credentials
US6892307B1 (en)1999-08-052005-05-10Sun Microsystems, Inc.Single sign-on framework with trust-level mapping to authentication requirements
US6691232B1 (en)1999-08-052004-02-10Sun Microsystems, Inc.Security architecture with environment sensitive credential sufficiency evaluation
GB2357599B (en)1999-12-232004-08-04IbmMethod for preventing parasitic usage of web page embedded files
WO2001069350A1 (en)*1999-12-242001-09-20Koninklijke Philips Electronics N.V.Method and system for controlling access to components of a multimedia scene
KR20010105500A (en)*2000-05-122001-11-29임경석A copying inhibit system for text imformation contents of internet homepage
US7051362B2 (en)*2000-05-162006-05-23Ideaflood, Inc.Method and system for operating a network server to discourage inappropriate use
US20030233462A1 (en)*2002-05-302003-12-18Herman ChienSystem and method for providing a digital rights scheme for browser downloads
KR100499056B1 (en)*2002-10-152005-07-04아르파(주)Screen capture prevention system and method for digital contents
US20040162785A1 (en)*2003-02-192004-08-19General Instrument CorporationMethods and apparatus for determining digital copy protection levels assigned to services received at a consumer appliance
US7516147B2 (en)2003-10-232009-04-07Sumisho Computer Systems CorporationURL system and method for licensing content
US8434154B1 (en)2012-04-112013-04-30RGI, Inc.Method and apparatus for distributing content across platforms in a regulated manner
EP3823234B1 (en)*2019-11-122025-09-24Accenture Global Solutions LimitedSystem and method for management of policies and user data during application access sessions

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5761499A (en)*1995-12-211998-06-02Novell, Inc.Method for managing globally distributed software components
US5765152A (en)*1995-10-131998-06-09Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US5754763A (en)*1996-10-011998-05-19International Business Machines CorporationSoftware auditing mechanism for a distributed computer enterprise environment

Also Published As

Publication numberPublication date
WO1998025373A3 (en)1998-10-22
WO1998025373A2 (en)1998-06-11

Similar Documents

PublicationPublication DateTitle
CA2272649A1 (en)Web site copy protection system and method
US5983351A (en)Web site copyright registration system and method
US6298446B1 (en)Method and system for copyright protection of digital images transmitted over networks
US6704797B1 (en)Method and system for distributing image-based content on the internet
US20030046407A1 (en)Electronic rights management
KR100920320B1 (en) Software to Operate Watermark Encoder and Decoder
US7757298B2 (en)Method and apparatus for identifying and characterizing errant electronic files
US7092969B2 (en)Management of source and derivative image data
US6567918B1 (en)Saved Web page security system and method
US20070162400A1 (en)Method and apparatus for managing digital content in a content management system
US20050262243A1 (en)System and method for management of a componentized electronic document retrievable over a network
US20020069365A1 (en)Limited-use browser and security system
WO1997014087A1 (en)System and methods for managing digital creative works
JP2003132173A (en)Electronic media container
EP1160644B1 (en)Data terminal equipment
KR100388137B1 (en)Extension of browser web page content labels and password checking to communications protocols
JP2001306528A (en) Content distribution method and system and recording medium recording content distribution program
JP3539146B2 (en) Use condition violation check method and apparatus for work, and storage medium storing program for use condition violation check for work
Cavazos et al.Copyright on the WWW: Linking and Liability
US20080071886A1 (en)Method and system for internet search
EP1001330A2 (en)Method and system for copyright protection of digital images transmitted over networks
JP2001154984A (en)Method and system for protecting copyright of digital image transmitted through network
Kidawara et al.Encapsulating multimedia contents and a copyright protection mechanism into distributed objects
PendletonComputer programs, internet copyright and trips border control
Kidawara¹ et al.Encapsulating Multimedia Contents and a Copyright Protection Mechanism into Distributed Objects

Legal Events

DateCodeTitleDescription
FZDEDiscontinued

[8]ページ先頭

©2009-2025 Movatter.jp