Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


^3* 


Patent <^/W ; 
Attorney's Docket No. 032406-002 /) (iv' 


IN THE UNITED STATES PATENT AND TRADEMARK OFFICE 



Group Art Unit: 2171 RECE|VE[) 
Examiner: VonBuhr.M. JAN 2 6 2001 

Technology Center 2100 


In re Patent Application of 

Karl L. GINTER, et al. 

Application No.: 09/411,205 

Filed: October 4, 1999 

For: SYSTEMS AND METHODS FOR 
SECURE TRANSACTION 
MANAGEMENT AND ELECTRONIC 
RIGHTS PROTECTION 


AMENDMENT AND REQUEST FOR INTERFERENCE 


Assistant Commissioner for Patents 
Washington, D.C. 20231 

Sir: 


In response to the Office Action dated December 19, 2000, please amend the above- 
identified application as follows: 
IN THE SPECIFICATION : 

On page 1, before the heading "Field(s) of the Invention(s)," insert the following 
jaragraph: 



"71 


This application is a continuation of Application No. 09/208,017 filed December 


/ 1<#9, which is a continuation of Application No. 08/388,107 filed February 13, 1995, 


now abandoned. -- 


Attorney Docket No. 032406-00? 
Application No. 09/411.205 


IN THE CLAIMS : 


Please cancel claims 1-90 of the application as originally filed and add new claims 


91-148 as follows: 


-91. A method for managing a data object so as to comply with control conditions 
for usage of the data object, comprising the steps of: 

storing the data object in a memory device, where it is accessible by means of a 
data object provider's data processor; 

providing a variable number of control conditions for usage of the data object; 
creating, by said data processor, a general set of control data for the data object 
based on said variable number of control conditions for usage, said general set of control 
data comprising at least one or more usage control elements defining usages of 
the data object which comply with said variable number of control conditions, 

storing said general set of control data in a memory device, where it is 
accessible by said data processor; 

concatenating the general set of control data with a copy of the data object; and 
encrypting at least the copy of the data object and said one or more usage 
control elements to create a secure data package which is ready for transfer to a user. 

92. A method as set forth in claim 91, wherein the step of encrypting comprises 
encrypting the data object and the general set of control data. 


-2- 



Attorney Docket No. 032406-002 
Application No. 09/411.205 

93. A method as set forth in claim 91, wherein the step of creating control data 
comprises creating an identifier which uniquely identifies the general set of control data. 

94. A-method as set forth in claim 91 , wherein the step of creating a general set of 
control data comprises creating a security control element which identifies a security 
process to be applied before usage of the data object is allowed. 

95. A method as set forth in claim 91, wherein the step of creating a general set of 
control data comprises creating a format control element which identifies the format of the 
control data. 

96. A method as set forth in claim 91, further comprising the steps of receiving in 
said data processor a request for authorization for usage by a user; comparing the usage for 
which authorization is requested with said one or more usage control elements of the 
general set of control data and granting the authorization if the usage for which 
authorization is requested complies with the usages defined by said one or more usage 
control elements. 

97. A method as set forth in claim 96, further comprising the step of securing 
payment for the requested authorization for usage before granting the authorization. 

-3 - 


Attorney Docket No. 032406-007 
Application No. 09/411.205 


98. A method as set forth in claim 91 , comprising the further steps of: 
receiving the data package in a user's data processor; 

storing the data package in a memory device where it is accessible by means of 
the user's data processor; 

decrypting said one or more usage control elements; 

checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the general set of control data; 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the general set of control data, the data object 
and enabling the requested usage, otherwise disabling it. 

99. A method as set forth in claim 98, comprising the further steps of 
reconcatenating, after the usage of the data object, the data object and the one or more 
usage control elements, reencrypting at least the data object and the one or more usage 
control elements, and storing the thus-repackaged data package in the memory of the user's 
data processor. 


100. A method for controlling the usage by a user of a data object so as to comply 
with control conditions for usage of the data object, comprising the steps of: 

providing a variable number of control conditions for usage of the data object; 


4 - 


Attorney Docket No. 032406-00? 
Application No. 09/41 1.20S 


storing a data package in a memory device, where it is accessible by means of 
a data processor of the user, said data package comprising the data object and control data, 
which comprises at least one usage control element defining a usage of the data object 
which complies with the variable number of control conditions, the data object and said at 
least one usage control element being encrypted; 

receiving a request by the user for usage of the data object; 

decrypting the control data; 

checking, in response to the request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the control data, the data object and 
enabling the requested usage, otherwise disabling it. 

101. A method as set forth in claim 100, wherein the usage control element is 
updated after the at least one usage of the data object. 

102. A method as set forth in claim 100, wherein said control data comprises an 
indication of the number of times the user ,s authorized to use the data object in accordance 
with said at least one usage control element; 


Attorney Docket No. 032406-002 
Application No. 09/411.205 

wherein the requested usage of the data object is only enabled when said 
number of times is one or more; and 

wherein said number of times is decremented by one when the requested usage 

is enabled. . 


103. A method as set forth in claim 100, wherein the control data comprise a 
security control element, and further comprising the step of carrying out, before each usage 
of the data object, a security procedure defined in the security control element. 

104. A method as set forth in claim 100, wherein the step of checking whether the 
requested usage complies with the usage defined by the at least one usage control element 
comprises the step of checking that the user's data processor is capable of carrying out a 
security procedure specified in a security control element of the at least one usage control 
element, and if not, disabling the usage. 

105. A method as set forth in claim 100, comprising the further steps of 
reconcatenating, after the usage of the data object, the data object and the one or more 
usage control elements, reencrypting at least the data object and the one or more usage 
control elements, and storing the thus-repackaged data package in the memory of the user's 
data processor. 


-6- 


Attorney Docket No. 032406-002 
Application No. 09/411.205 


106. A sys,em for managing a data object so as ,o compiy wifl, c„n„„, conditions 
for usage of the das, object, comprising means for providing a variabie number of c-auro, 

conditions; 

first means in the data object provider's data processor for creating a general 
set of control data for the data object based on the variable number of control conditions 
for usage, said general set of control data comprising at least one or more usage 
control elements defining usages of the data object which comply with the variable number 

of control conditions; 

storing means, which are accessible by means of said data processor, for 
storing the data object and the general set of control 
data; 

concatenating means for concatenating the general set of control data with a 
copy of the data object; and 

encrypting means for encrypting the copy of the data object and at least said 
one or more usage control elements to create a secure data package, which is ready for 

transfer to a user. 


107. A system as set forth in claim 106, wherein the general set of control data 
comprises a control data element which defines the right to further distribution of the data 


object by the user. 


- 7 - 


Attorney Docket No. 032406-007 
Application No. 09/411.20^ 


108. A system for controlling the usage by a user of a data object so as to comply 
with control conditions for usage of the data object, comprising: 

means for providing variable number of control conditions; 
storing means for storing a data package which comprises a data object and a 
control data comprising at least one usage control element defying a usage of the data 
object which complies with the variable number of control conditions; 

means for decrypting the at least one usage control element and the data 

object; 

checking means for checking whether a usage requested by the user complies 
with the usage defined by said at least one usage control element: 

enabling means for enabling the usage requested by the user when the usage 
complies with the usage defined by said at least one usage control element; and 

disabling means for disabling the usage requested by the user when the usage 
does not comply with the usage defined by said at least one usage control element. 

109. A system as set forth in claim 108, further comprising means for repackaging 
the data object after usage thereof. 


1 10. A method for controlling the usage by a user of data objects so as to comply 
with predetermined conditions for usage of the data objects, comprising the steps of: 


- 8 - 


Attorney Docket No. 032406-00? 
Application No. 09/411 .205 


storing at least two data packages in a memory device, where they are 
accessible by a data processor of the user, each said data package comprising a data object 
and a user set of control data, which comprises at least one usage control element defining 
a usage of the data object which complies with the predetermined conditions, the data 
object and said at least one usage control elements being encrypted; 

decrypting the usage control elements of the user sets of control data; 

examining the usage control elements of said at least two data packages to find 

a match; 

using, in response to the finding of a match, the data processor to carry out an 
action, which is specified in the user sets of control data. 

1 1 1 . A method as set forth in claim 1 10, comprising the further steps of updating 
the at least one usage control element of each data package, concatenating after the usage 
of the data objects, each of the data objects and its at least one usage control element, 
reencrypting each of the concatenated data objects and its at least one usage control element 
and transferring the repackaged data objects to their creators. 

112. A method for managing a data object so as to comply with predetermined 
conditions for usage of the data object, comprising the steps of: 

storing the data object in a memory device, where it is accessible by means of 
a data object provider's data processor; 


Attorney Docket No. 032406-007 
Application No. 09/41 1.20S 


providing control conditions for usage of the data object; 

creating, by said data processor, a general set of control data for the data 
object based on said control conditions for usage, said general set of control data 
comprising at least one or more usage control elements defining usages of the data object 
which comply with said control conditions; 

storing said general set of control data in a memory device, where it is 
accessible by said data processor; 

concatenating the general set of control data with a copy of the data object; 

encrypting at least the copy of the data object and said one or more usage 
control elements to create a secure data package which is ready for transfer to a user; 

creating, in response to a request for authorization for usage of the data object 
by a user, a user set of control data, which comprises at least a subset of the general set of 
control data, including at least one of said usage control elements: 

using the user set of control data instead of the general set of control data in 
said concatenating step; 

using the at least one or more usage control element of the user set of control 
data instead of the one or more usage control elements of the general set of control data in 
the encrypting step; and 

checking, before allowing transfer of the data package to the user, that said 
request for authorization for usage of the data object has been granted. 


10- 


Attorney Docket No. 032406-00? 
• Application No. 09/411 ?0S 


1 13. A method as set forth in claim 1 12, wherein the data object is composed of at 
least two constituent data objects and wherein the user set of control data, in response to a 
request for authorization for usage of one of said constituent data objects by a user, is 
created only for that constituent data object and concatenated only with a copy of that 
constituent data object. 

1 14. A method as set forth in claim 112, wherein the data provider's data processor 
is connected to a data network and the request for authorization is received from a data 
processor of the user, which is also connected to the data network, further comprising the 
step of transferring the data package through the data network to the user's data processor. 

1 15. A method as set forth in claim 1 12, wherein the data object is a composite 
data object including at least two constituent data object, and wherein the step of creating a 
general set of control data comprises the step of creating a respective general set of control 
data for each of the constituent data objects and the composite data object and wherein the 
step of creating a user set of control data comprises the step of creating a respective user 
set of control data for each of the constituent data objects and the composite data object. 

1 16. A method as defined in claim 1 12, comprising the further step of storing a 
copy of the user set of control data in the data object provider's processor. 


- 11 - 


Attorney Docket No. 032406-00? 
Application No. 09/411.20S 


117. A method as defined in claim 112, comprising the further steps of: 
receiving the data package in a user's data processor; 
storing the data package in a memory device where it is accessible by means 
of the user's data processor; 

decrypting the at least one usage control element of the user set of control 

data; 

checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the user set of control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the user set of control data, the data 
object and enabling the requested usage, otherwise disabling it. 

118. A method as set forth in claim 112, further comprising: 
receiving the data package in a user's data processor; 
storing the data package in a memory device where it is accessible by means 
of the user's data processor; 

decrypting the at least one usage control element of the user set of control 

data; 


- 12- 


Attorney Docket No. 032406-002 
Application No. 09/411 205 

checking, in response to a request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the user set of control data; 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the user set of control data, the data 
object and enabling the requested usage, otherwise disabling it; and 

reconcatenating, after the usage of the data object, the data object and the one 
or more usage control elements of the user set of control data, and reencrypting at least the 
data object and the one or more usage of the user set of control data. 


1 19. A system for managing a data object so as to comply with control conditions 
for usage of the data object, comprising: 

first means in the data object provider's data processor for creating a general 
set of control data for the data object based on the predetermined conditions for usage, said 
general set of control data comprising at least one or more usage control elements defining 
usages of the data object which comply with the predetermined conditions; 

storing means, which are accessible by means of said data processor, for 
storing the data object and the general set of control data; 

concatenating means for concatenating the general set of control data with a 
copy of the data object; 


- 13 - 


Attorney Docket No. 032406-00? 
Application No. 09/41 1 ?.OS 


encrypting means for encrypting the copy of the data object and at least said 
one or more usage control elements to create a secure data package, which is ready for 
transfer to a user; 

second means in said data processor for creating, in response to a request for 
authorization for usage of the data object by a user, a user set of control data, which 
comprises at least a subset of the general set of control data, which subset comprises at 
least one of said usage control elements; 

using the user set of control data instead of the general set of control data in 
the storing means; 

using the user set of control data instead of the general set of control data in 
the concatenating means; 

using the user set of control data instead of the general set of control data in 
the encrypting means; and 

checking means in said data processor for checking that said request for 
authorization for usage of the data object has been granted before allowing transfer of the 
data package to the user. 

120. A method for managing an object so as to comply with control conditions for 
usage of the object, comprising the steps of: 

storing the object in a storage device, where it is accessible by means of an 
object provider's electronic appliance; 

- 14 - 


Attorney Docket No. 032406-002 
Application No. 09/411.205 


providing a variable number of control conditions for usage of the object; 

creating, by said electronic appliance, a general set of control data for the 
object based on said variable number of control conditions for usage, said general set of 
control data comprising at least one or more usage control elements defining usages of 
the object which comply with said variable number of control conditions, 

storing said general set of control data in a storage device, where it is 
accessible by said electronic appliance; 

containerizing the general set of control data with a copy of the object; and 

encrypting at least the copy of the object and said one or more usage control 
elements to create a secure container which is ready for transfer to a user. 

121 . A method as set forth in claim 120, wherein the step of encrypting comprises 
encrypting the object and the general set of control data. 

122. A method as set forth in claim 120, wherein the step of creating control data 
comprises creating an identifier which uniquely identifies the general set of control data. 

123. A method as set forth in claim 120, wherein the step of creating a general set. 
of control data comprises creating a security control element which identifies a security 
process to be applied before usage of the object is allowed. 


- 15- 


Attorney Docket No. 032406-002 
Application No. 09/411.205 


124. A method as set forth in claim 120, wherein the step of creating a general set 
of control data comprises creating a format control element which identifies the format of 
the control data. 

125. A method as set forth in claim 120, further comprising the steps of receiving in 
said electronic appliance a request for authorization for usage by a user; comparing the 
usage for which authorization is requested with said one or more usage control elements of 
the general set of control data and granting the authorization if the usage for which 
authorization is requested complies with the usages defined by said one or more usage 
control elements. 

126. A method as set forth in claim 125, further comprising the step of securing 
payment for the requested authorization for usage before granting the authorization. 

127. A method as set forth in claim 120, comprising the further steps of: 

receiving the container in a user's electronic appliance; 
storing the container in a storage device where it is accessible by means of the 
user's electronic appliance; 

decrypting said one or more usage control elements; 


- 16- 


Attorney Docket No. 032406-no? 
Application No. 09/41 1 ,9m 


checking, in response to a request by the user for usage of the object, whether 
the requested usage complies with the usage defined by the at least one usage control 
element of the general set of control data; 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the general set of control data, the 
object and enabling the requested usage, otherwise disabling it. 

128. A method as set forth in claim 127, comprising the further steps of 
recontainerizing, after the usage of the object, the object and the one or more usage control 
elements, reencrypting at least the object and the one or more usage control elements, and 
storing the thus-recomainerized container in the storage of the user's electronic appliance. 

129. A method for controlling the usage by a user of an object so as to comply with 
control conditions for usage of the object, comprising the steps of: 

providing a variable number of control conditions for usage of the object; 
storing a container in a storage device, where it is accessible by means of an 
electronic appliance of the user, said container comprising the object and control data, 
which comprises at least one usage control element defining a usage of the object which 
complies with the variable number of control conditions, the object and said at least one 
usage control element being encrypted; 

receiving a request by the user for usage of the object; 


17 


Attorney Docket No. 032406-00? 
Application No. 09/41 1.205 


decrypting the control data; 

checking, in response to the request by the user for usage of the object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage 
defined by the at least one usage control element of the control data, the object and 
enabling the requested usage, otherwise disabling it. 

130. A method as set forth in claim 129, wherein the usage control element is 
updated after the at least one usage of the object. 

131 . A method as set forth in claim 129, wherein said control data comprises an 
indication of the number of times the user is authorized to use the object in accordance 
with said at least one usage control element; 

wherein the requested usage of the object is only enabled when said number of 
times is one or more; and 

wherein said number of times is decremented by one when the requested usage 

is enabled. 


- 18 - 


Attorney Docket No. 032406-00?. 
Application No. 09/411.205 


132. A method as set forth in claim 129, wherein the control data comprise a 
security control element, and further comprising the step of carrying out, before each usage 
of the object, a security procedure defined in the security control element. 

133. A method as set forth in claim 129, wherein the step of checking whether the 
requested usage complies with the usage defined by the at least one usage control element 
comprises the step of checking that the user's electronic appliance is capable of carrying 
out a security procedure specified in a security control element of the at least one usage 
control element, and if not, disabling the usage. 

134. A method as set forth in claim 129, comprising the further steps of 
^containerizing, after the usage of the object, the object and the one or more usage control 
elements, reencrypting at least the object and the one or more usage control elements, and 
storing the thus-recontainerized container in the storage of the user's electronic appliance. 

135. A system for managing an object so as to comply with control conditions for 
usage of the object, comprising means for providing a variable number of control 
conditions; 

first means in the object provider's electronic appliance for creating a general 
set of control data for the object based on the variable number of control conditions for 
usage, said general set of control data comprising at least one or more usage control 

- 19- 


Appl^aoaftea 8M4ltt/aM ^ 


elements defmingu« a geAefi^^^^ blQ4ar9)1)i ^ tte^hk^ef ^ 0lr6ita in 

condate)B6Qring means; 

storin W^i^ta^ 
storitfethemyuetiziijgthBegfiBpral set of control data; 

encr^^j^ferig^j^,^^^^ tesf for 

user container to the user.- 


136. A system as set forth in claim 135, wherein the general set of control data 
comprises a control data element which defines the right to further distribution of the 

object by the user. 

137. A system for controlling the usage by a user of an object so as to comply with 
control conditions for usage of the object, comprising: 

means for providing variable number of control conditions; 

storing means for storing a container which comprises an object and a control 
data comprising at least one usage control element defying a usage of the object which 
complies with the variable number of control conditions; 

means for decrypting the at least one usage control element and the object; 


# 



set of i 


r 


JmZ^ ^^f^n^SL^mMmP^ « least the object 

- - one USB flBttU&VUT by .e user when the usage 

complies with the usage defined by said at least one usage control element; and 

148 - te^&fl^msm m t mm ^»fc| e 

^a^Wto*.* by said at least one usage control element. 

first means in the object provider's electronic appliance for creating a general 

to'^'JteHffi Wai^ said 
'^^g&^tSS^^^. ™ or more usage control elements defining 
usages of the object which comply with the predetermined conditions; 

139. A^^i^gf^^^ o l0s electroni 8o a^ mfor 

MS^^ the steps of: 

copy of the object; 

by an electron,* appliance of the user, each said container comprising an object and a user 
setofcontrol^OT^ 

tR/emffi^ 
user; 

one usage control elements being encrypted; 

for authon Z atio„ mi us M| ofthe ^ s^.o^^ ^ & 

comprises at least a subset ofthe genera, set of control data, which subset comprises at 
least one of said usage control elements; 


'-it 


ttorc^tatous*^^^ one usagecontrol 

element of the user set of control data; and 
140. **W*"to«ar^^ 

^^bfeg^^^^^^^^ contfoi eiementj reencryptiflg each 

of the contained objects and its at least one usage control element and transferring the 
reconMne^e^^gc^figttifirfltoifln^rn 141, further comprising: 
receiving the container in a user's electronic appliance; 

hi . sjpriagKfe mm^^mm^mm *tos^imvm&WBa* of the 

^^m»miQ^lmm object, comprising the steps of: 

*WrJflSia & tbBj 8 c^flss Sflfrigigfe^r^mftnfeQjfc^^ VfShm^n 
<&Jject provider's data processor; 

<?JKfiHtflg g i 1 fbn?PePe^dftfeMq^s 6 ^^^^ fag e 0 f the object, whether 

the re q uested <^gP®Pfeia^ 

^^m^^iMmMms for usage, said general set of control data 

d©filp# ^t!hs^ale§St I Qnq:e«!8fl(«s]troI element of the user set of control data, the object 
and enabling ^^«8^e^f ^^j^ ^ ^ . . $ 

accessible by said electronic appliance; 

containerizing the general set of control data with a copy of the object; 


Ammy 8§§k§t N§ : mm=m 
ApplieiiiQB N§ : gmuj^ 


comprise ^tfg^^ 

ele 0 te«Ha« PP t« B « 5 ecure container which is ready for transfer to a user; 

creating, in response to a request for authorization for usage of the object by a 

*"*^.»»««^^ a genera] set of 


control data oor 


afiAsnMlWgjtms and 0* composte objec. and wherein the s.ep of creating a use, 
« »f dBptefc^wta.,,, *********** 

the encrypting step; and 

145. **^te<fe(^ 


of at least 


.wo consrtae*,*^ "i^^^^,*^^^^ „ a requK[ for 
aufto r i 2 a Ii on*^o TOiMsto ^^^^ Ws ^ 6 ^^^ 
■umfi.^Jfeaw)^^ onJy wit „ a Mpy of ^ objKt 

decrypung .he a. leasl one usage con.rol elemen. of me user set of comrol 
<«: >43. A me,hod as se, for,h in ciaun .41, wherern Ih e dara provider's eiecronrc 
appiiance is cor.ec.ed ,o a da. „e,w„ rk and the reo.ues, f„, a Ulh or i2 a,ion is received from 
an eiecronic appiiance of *e use,, which is aiso connected ,o .he da, network, firmer 

--2*-- 


Attorney Docket No. 032406-Of)? 
Application No. 09/411 70S 


comprising the step of transferring the container through the data network to the user's 
electronic appliance. 


144. A method as set forth in claim 141, wherein the object is a composite object 
including at least two constituent objects and wherein the step of creating a general set of 
control data comprises the step of creating a respective general set of control data for each 
of the constituent objects and the composite object and wherein the step of creating a user 
set of control data comprises the step of creating a respective user set of control data for 
each of the constituent objects and the composite object. 

145. A method as defined in claim 141, comprising the further step of storing a 
copy of the user set of control data in the object provider's processor. 

146. A method as defined in claim 141, comprising the further steps of: 

receiving the container in a user's electronic appliance; 
storing the container in a storage device where it is accessible by means of the 
user's electronic appliance; 

decrypting the at least one usage control element of the user set of control 

data; 


-24- 


Ae ^mmi^mmB^mk^mMi^f^^m m contro1 

element of the ^aS^fifiW^b^quest for authorization for usage of the object by a 
user, a use^STO^tRoiej^n^H^gcrrfpe^i^^ mskm M^Mmm of 

data, the object 

and enabling th^^^^.^g^p ^ M . Qf ^ ^ Qf ^ ^ ^ 

said containerizing step; 

147. A mtfgg mm ^dB^^u^fflBBOtot of the user set of control 
data insteimXimfewmm^ BSfArfefeimiS flHfegSienl set of control data in 
the encryrBflgi^fe^eafiQPtainer in a storage device where it is accessible by means of the 

user's electroni^jBHyaicq^ a]Iowing transfer Qf ^ ^ ^ ^ ^ ^ 

request foPmwmm %im^mB^mfik^m^sSd^. 

user set of control 

data; 

142Pl?«c}aaM#SBPWftl«« tomtit, ftnerSSn ffle W$m<it &rr$S&tf^tat 
the t^^fdt«eftgf>^ m^mPm^qaast for 

elefflftBbfitoM^alS W^Mid constituent objects by a user, is created only for that 

constituenfl@f$if&i9gd ^fiSJrlSP&rfJVtUqtffiic^dfsaM 68rSPta W$&e usage 
defined by the at least one usage control element of the user set of control data, the object 
and enab^.th^ mmm^m^m^&m^mm^t^ data provider , s dectronic 
appliance is connected to a data network and the request for authorization is received from 
an electronic appliance of the user, which is also connected to the data network, further 

"2523 - 


SSmOA t^MMmWmn^ at least the obj ect 
and the one or more usage of the user set of control data. 

140. A method as set forth in claim 139, comprising the further steps of updating 

u^^^afpSiSg 3nd itS at ,east «* -age control element, reencrypting each 

jas^^^afo Me predetermined conditions for usage said 

general set of control data comprising at least one or more usage control elements defining 
usages ofVhe otje^ttc^ 

— ^^^^^i%^ b , said elearonic appuance for 

storing the object ^°^k\%lt%?i^&^ heTe il is acce ^ble by means of an 
object provider's data processor- 
containerizing means' for containerizing the general set of control data with a 

copy of the ob{e r c°t! iding C ° ntr01 C ° nditions for 

usage of the object; 

jornpnsing a, ,eas, one or more usage con.ro, Cemems defining usages of fc objec , w „ ich 

comply with said control conditions- 
second means in said efectronic appliance for creating, in response to a request 

for authorizat^ temiFmtti&M 

accessible by said electronic appliance- 
compnses atieast a subset of ifffe set of control data, which subset comprises at 

least one of saidus* age Snfrol'efeS; 561 ° f COntTo1 data a copy of the object; 


th^iflbftl^Hayefined by said at least one usage control element; 
tifPSl^m^Wme, defined by said at least one usage control element; and 

ti&m%WfflteaB$&S ^age defined by said at least one usage control element. 

checking means in said electronic appliance for checking that said request for 
aumori^fcntoiiie^s^^ of ^ 

c6fti8?}t&Wm$4&. -object after usage thereof. 


139. A method for controlling the usage by a user of objects so as to comply with 
predetermined conditions for usage of the objects, comprising the steps of: 

storing at least two containers in a storage device, where they are accessible 
by an electronic appliance of the user, each said container comprising an object and a user 
set of control data, which comprises at least one usage control element defining a usage of 
the object which complies with the predetermined conditions, the object and said at least 
one usage control elements being encrypted; 

decrypting the usage control elements of the user sets of control data; 
examining the usage control elements of said at least two containers to find a 

match;