AMENDED CLAIMS
[received by the International Bureau on 19 July 2002 (19.07.02); original claims 10-17 amended, new claims 18-24 added; remaining claims unchanged (5 pages)] 1. A system for providing content to a user having made a request for the content by way of a client computer, the system comprising: A. an intermediate server that receives the request for the content from the client computer, the intermediate server including: 1) a content component that interfaces with at least one content server to obtain the content in unmodified from the at least one content server; 2) a rules component that provides at least one rule with respect to usage of the content, the at least one rule being provided by an owner of the content; and 3) a wrap component that combines the at least one rule with the content to thereby provide a wrapped file to be output to the client computer; and B. the client computer including: 1) an operation system extension that detects the wrapped file being opened by the user and that allows the user to utilize the received content in the wrapped file in accordance with the at least one rule.
2. The system according to claim 1, wherein the at least one rule includes a maximum number of times that the content may be opened.
3. The system according to claim 1, wherein the at least one rule includes whether or not the content may be transferred to another computer.
4. The system according to claim 1, further comprising: C. a related information component that obtains information on the user and that provides additional content choices to be included with the wrapped file that are related to the content requested by the user or the information on the user.
5. The system according to claim 1, wherein the at least one rule includes whether or not the content may be transferred to another computer.
6. A method of providing content to a user having made a request for the content by way of a client computer, the method comprising:
67 AMENDED SHEET {ARTICLE 19) 3 A. receiving, by an intermediate server, the request for the content sent from the
4 client computer;
5 B. obtaining, by the intermediate server, the content from a content server;
6 C. determining, by the intermediate server, at least one rule to be included with the
7 content in a wrapped file to be sent to the client computer, the at least one rule
8 being based on the content and the at least one rule being stored in a memory at
9 the intermediate server;
10 D. combining, by the intermediate server, the rules with the content to thereby
11 provide the wrapped file;
12 E. outputting, by the intermediate server, the wrapped file to the client computer;
13 receiving the wrapped file at the client computer and storing the wrapped file;
14 detecting, by the client computer, an attempt to open the wrapped file by the user;
15 separating, by the client computer, the at least one rule and the content and storing
16 the at least one rule and the content; and
17 F. allowing the user to utilize the content subject to the at least one rule.
1 7. The method according to claim 6, wherein the at least one rule includes a maximum
2 number of times that the content maybe opened.
1 8. A method for changing from a first transmission rate to a second transmission in
2 transmitting information from a source to a destination, comprising:
3 A. transmitting a first file at a first data rate from the source to the destination;
4 B. detecting a change in available bandwidth for the destination;
5 C. buffering data from a second file that is identical in data content to the first file,
6 wherein the data is being buffered at a second data rate different from the first
7 data rate;
8 D. determining when in time data from the second file can be provided to the
9 destination instead of data from the first file so as to provide a substantially i o seamless transmission of data to the destination, the determining being done in li accordance with a forward-looking algorithm;
12 E. determining an exact location in the second file at which to start sending data to
13 the destination, in accordance with at least a frame rate for a video file or a
14 sampling rate for an audio file; and
68
AMENDED SHEET (ARTICLE 19} 5 F. providing data to the client from the buffered data of the second file, starting at 6 the exact location in the second file determined in the Part E.
1 9. A dynamic file access control and management system configured to access one or more
2 content sources including a set of files, said system comprising:
3 A a proxy system linked to said one or more content sources, said proxy system
4 comprising an access control module configured to selectively obtain a file from
5 said content sources as a function of an authorization of a user requesting said file
6 and a set of access policies;
7 B. a rights management module configured to generate a set of usage rights
8 associated with said file as a function of a set of predefined usage policies
9 associated with said file for said user; 0 C. at least one client device having a client module configured to interface to a client i operating system, said client module configured to selectively inhibit operating 2 system functions with respect to said file as a function of said usage rights; and 3 D. one or more communication means, via which said file and said usage rights are 4 provided to said client device.
1 10. The system according to claim 9, wherein said file and said usage rights are provided to
2 said client device via different communication means.
l 11. The system according to claim 9, wherein said files are static files.
l 12. The system according to claim 9, wherein said files are dynamic files.
1 13. The system according to claim 9, wherein said communication means includes a secure
2 transform configured to encrypt and encapsulate said file into a message as a function of a
3 session ID and said client is configured to extract said file from said message.
1 14. The system according to claim 9, wherein said proxy system further includes a user
2 interface, configured to facilitate creation and editing of said access policies and said usage
3 policies and association of said access policies and said usage policies with said files.
69 i 15. The system as in claim 9, wherein said client device is a device from a group comprising:
2 1) a personal computer;
3 2) a workstation;
4 3) a personal digital assistant;
5 4) an e-mail device;
6 5) a cellular telephone;
7 6) a Web enabled appliance; and
8 7) a server.
1 16. The system of claim 9, wherein said proxy system and at least one of said content sources
2 are hosted on the same computing device.
1 17. A method of dynamic file access control and management comprising:
2 A. to each of a set of files accessible from a set of content sources by a proxy system,
3 correlating one or more user and/or client device identifications and defining a set
4 of usage policies, wherein for a given file usage policies relate to selectively
5 enabling or disabling operations associated with said file;
6 B. by said proxy system, generating a set of usage rights associated with a target file
7 as a function of a set of usage policies associated with said target file and a user or
8 client device identification;
9 C. communicating said target file and said usage rights to a client device associated 0 with said identification; and i D. using a client module at said client device and configured to interface to a client 2 operating system, selectively inhibiting operating system functions with respect to 3 said target file as a function of said usage rights.
1 18. The method of claim 11, wherein in step C, said communicating is accomplished by
2 communicating said target file and said usage rights to said client device via different
3 communication means.
l 19. The method of claim 17, wherein said set of files include static files.
l
20. The method of claim 17, wherein said set of files include dynamic files.
70 D D SHEET ARTICLE 11
21. The method of claim 17, wherein said communicating is accomplished using a communication means that includes a secure transform, including encrypting and encapsulating said target file into a message as a function of a session ID and said client device is configured to extract said target file from said message.
22. The method of claim 17, wherein said proxy system further includes a user interface and step A include creating and/or editing said access policies and said usage policies and associating said access policies and said usage policies with said set of files using said user interface.
23. The method of claim 17, wherein said client device is a device from a group comprising: 1) a personal computer; 2) a workstation; 3) a personal digital assistant; 4) an e-mail device; 5) a cellular telephone; 6) a Web enabled appliance; and 7) a server. '
24. The method of claim 17, further comprising hosting said proxy system and at least one content source on the same computing device.
71 A ICLE 8