Digital Reg of Texas, LLC v. Adobe Systems Incorporated et al
Filing
1
COMPLAINT against AVG Technologies USA, Inc., Adobe Systems Incorporated, Electronic Arts, Inc., Symantec Corporation, UbiSoft Entertainment, Inc., Valve Corporation, Zynga Game Network Inc., Zynga, Inc. ( Filing fee $ 350 receipt number 0540-3078865.), filed by Digital Reg of Texas, LLC. (Attachments: # 1 Exhibit 1, # 2 Exhibit 2, # 3 Exhibit 3, # 4 Exhibit 4, # 5 Exhibit 5, # 6 Exhibit 6, # 7 Exhibit 7, # 8 Civil Cover Sheet)(Albritton, Eric)
111111
1111111111111111111111111111111111111111111111111111111111111
US006751670Bl
(54)
United States Patent
(10)
Patterson
(12)
(45)
TRACKING ELECTRONIC COMPONENT
5,784,460
5,790,790
5,794,207
5,796,952
5,889,943
5,958,005
5,958,051
6,014,688
6,021,491
6,035,329
6,073,256
6,075,862
6,178,442
6,192,396
6,256,672
6,266,692
6,289,461
6,304,897
6,314,454
6,332,156
6,389,541
6,684,248
Patrick E. Patterson, Arlington, VA
(US)
(75)
Inventor:
(73)
Assignee: DRM Technologies, L.L.c., Tucson,
AZ (US)
( *)
Notice:
(21)
Appl. No.: 09/199,150
(22)
Filed:
(51)
(52)
Int. CI? ................................................ G06F 15/16
U.S. CI. ......................... 709/229; 709/206; 705/51;
713/168
Field of Search ................................. 709/219, 206,
709/217,245,229,223,224,202,225;
713/200,201,179,202,165,168; 714/38;
380/3, 28; 705/51
(58)
Subject to any disclaimer, the term of this
patent is extended or adjusted under 35
U.S.c. 154(b) by 0 days.
Nov. 24, 1998
(56)
References Cited
U.S. PATENT DOCUMENTS
4,471,163
4,528,643
4,558,176
4,658,093
4,683,553
4,796,220
4,999,806
5,033,084
5,057,935
5,191,611
5,337,357
5,615,264
5,671,276
5,671,279
5,677,953
5,708,709
5,708,780
5,715,314
5,724,424
5,778,173
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
*
*
9/1984
7/1985
12/1985
4/1987
7/1987
1/1989
3/1991
7/1991
10/1991
3/1993
8/1994
3/1997
9/1997
9/1997
10/1997
1/1998
1/1998
2/1998
3/1998
7/1998
Donald et al. .. ... ... ... 178/22.08
Freeny, Jr................... 364/900
Arnold et al. .. ... ... ... 178/22.08
Hellman .. ..... ... ... ... ...... 380/25
Mollier .......................... 380/4
Wolfe ......................... 364/900
Chernow et al. ........... 364/900
Beecher ......................... 380/4
Williams .................... 358/402
Lang . ... ... ..... ... ... ... ...... 380/25
Chou et al. ... ..... ... ... ... ... 380/4
Kazmierczak et al. ... ... ... 380/4
Eyer et al. . ..... ... ... ... ... ... 380/4
Elgamal .. ..... ... ... ... ...... 380/23
Dolphin ... ..... ... ... ... ..... ... 380/4
Rose . ... ... ..... ... ... ... ..... ... 380/4
Levergood et al. .... 395/200.12
Payne et al. .................. 380/24
Gifford . ..... ... ... ... ... ...... 380/24
Apte ..................... 395/187.01
175
Patent No.:
US 6,751,670 Bl
Date of Patent:
Jun. 15,2004
A
A
A
A
A
A
A
A
A
A
A
A
B1
B1
B1
B1
B1
B1
B1
B1
B1
B1
7/1998 Blumenthal et al. ........... 380/4
* 8/1998 Smith et al. ................ 709/206
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
8/1998
8/1998
3/1999
9/1999
9/1999
1/2000
2/2000
3/2000
6/2000
6/2000
1/2001
2/2001
7/2001
7/2001
9/2001
10/2001
11/2001
12/2001
5/2002
1/2004
Walker et al. ................ 705/23
Davis et al. ........... 395/200.54
Ji et al. ...................... 713/201
Thorne et al. .............. 709/202
Renaud et al. .............. 713/200
Venkatraman et al. ...... 709/206
Renaud ...................... 713/179
Mages et al. ............... 709/217
Sesma ......................... 714/38
Yoshida et al. ............... 380/28
Yamazaki ................... 709/203
Kohler ....................... 709/206
Redpath ..................... 709/206
Greenstein .................. 709/206
Dixon ........................ 713/201
Venkatraman et al. ...... 709/206
Wang et al. ................ 358/402
Cho et al. ................... 709/203
Patterson . ... ... ..... ... ... ... 705/53
Janacek et al. ............. 709/225
OTHER PUBLICATIONS
InterTrust Technology; http://www.intertrust.com/technology/tech.html (8 pages).*
InterTrust Technologyies;http://www.intertrust.com technology/rs_howitworks.html (8 pages).*
Netdox Brochure, "Certified Verified Anytime" (12 pages).
Netdox Brochure 1997-Doxit Service Overview (5 pages).
(List continued on next page.)
Primary Examiner-Ario Etienne
Assistant Examiner-Abdullahi E. Salad
(74) Attorney, Agent, or Firm-McGuireWoods LLP
(57)
ABSTRACT
A method of tracking electronic content includes producing
a file of electronic content and executable instructions that
collect notification information and attempt to transmit the
notification information to an address when triggered by an
event. The executable instructions deny access to the electronic content until the notification information is transmitted successfully.
78 Claims, 19 Drawing Sheets
US 6,751,670 Bl
Page 2
OlliER PUBLICATIONS
Tumbleweed Software, "POSTA"; http://www.posta.com/
posta/posta_overview.htm, (3 pages).
InterTrust Technology "MetaTrust Overview"; http:www.intertrust.com/technology/tech.html (8 pages).
InterTrust Technologies Corporation: Overview: InterTrust
Powers The New Digital Economy, A Piece of the TickVersion 2.0, Oct. 9, 1998 (38 pages).
Sibert et aI., DigiBox: A Self-Protecting Container for
Information Commerce, Proceedings of the First USENIX
Workshop on Electronic Commerce, New York, New York,
Jul. 1995 (14 pages).
Vbox White Paper, http://www.previewsystems.com/products/vbox/whitepaper/white_paper.html, (13 pages).
Overview of Release Software's Services (3 pages).
Setting Up a Web Store: A White Paper for Software
Resellers; 1997 Release Software Corp.; pp. 1-17 http://
www.releasesoftware.com/whitep/resellerwhitepaper.rtf.
Setting Up a Web Store: A White Paper for Software
Developers and Publishers; 1997 Release Software Corp.;
pp. 1-18; http://www.releasesoftware.com/whitep/isvwhitepaper.rtf.
* cited by examiner
100
d
•
rJl
•
~
~
.....
.....
~
=
~
'""'"
~Ul
ELECTRONIC CONTENT
(E.G., TEXT, GRAPHICS, AUDIO,
VIDEO, AND/OR EXECUTABLE
PROGRAM FILES
N
C
C
~
1---105
'JJ.
=-
~
~
.....
'"
o"'"
....,
'""'"
\C
NOTIFICATION INSTRUCTIONS
THAT COLLECT AND TRANSMIT
NOTIFICATION INFORMATION.
1--- 11 0
e
rJ'l
-..CJ\
-....l
(I)
J-'
FIG. 1
CJ\
-....l
Q
~
I--"
u.s. Patent
JUll.15,2004
Sheet 2 of 19
Wr-
a.Z
OW
....,J-
wo..
>0
ZW
We:::
LO
---.... N
~
.
0
u.
Z
-
Z
~
~
0
o
o
~
~
U.
()
-
I-
0
Z
....
W~
~O
...J~
Ww
>0::
~O
.-..
US 6,751,670 Bl
u.s. Patent
Jun. 15,2004
US 6,751,670 Bl
Sheet 3 of 19
.c
L{)
~
)~
UJ
CL
0
.....JIWz
'-'I
>w
zwo..
o
0
~
(
)
WICLZ
)
oU
ZW
O·a::
OLLJ
....J-
WCL
I---~
>0
ZW
wo::
0
W
U)
ro
0
0
u..
.c
0
(of)
~'"'
Z
z
0
~
u
-
(of)
~~
ZZ
00
~~
0::2:
u:o::
-0
I-u..
Oz
)
r--..-.
\,
z-
~
o
r------ O(!).
-
~-
u..
u..
I0
Z
UJo::
~O
....J~
UJ w
>0::
aJU
o
------. N
~
f 137
130b
f
SITE DESIGNATED
FOR RECEIPT OF
NOTIFICATION INFORMATION
NOTIFICATION
INFORMATION
5
d
•
rJl
•
f135
I..
I
~
~
.....
.....
SECOND ENVELOPE
RECIPIENT
~
=
~
130a
ilr
NOTIFICATION
INFORMATION
~
15b
100
...
'""'"
~Ul
N
C
C
~
~
'JJ.
=-
~
~
.....
~
o
....,
'""'"
\C
ENVELOPE
CREATOR
I~
7
)
)
120
115a
)
100
FIG.2C
ENVELOPE
RECIPIENT
e
rJ'l
)
-..CJ\
""-l
125
0..,
(I)
I--"
""-l
Q
~
I--"
u.s. Patent
Jun. 15,2004
US 6,751,670 Bl
Sheet 5 of 19
134
NOTIFICATION
SERVER
136
10
130b NOTIFICATION
INFO.
NOTIF.
INFORMATION
130a
ACCESS
GRANTING
MESSAGE
ENVELOPE
RECIPIENT
ENVELOPE
CREATOR
10
120
115a
100
FIG.2D
125
u.s. Patent
Jun. 15,2004
Sheet 6 of 19
/ 145
RECEIVE ENVELOPE
PASSWORD
!
/150
RECEIVE IDENTIFICATION
OF ELECTRONIC CONTENT 105
FOR INcLUSION IN ENVELOPE
!
/155
COMPRESS ELECTRONIC
CONTENT
!
/160
ENCRYPT ELECTRONIC
CONTENT
!
/165
DETERMINE SITE TO
RECEIVE NOTIFICATION
INFO.
!
/167
OTHER CONFIGURING INFO.
!
/170
BUILD ENVELOPE
!
~
r---100
FIG. 3
US 6,751,670 Bl
u.s.
Patent
Jun. 15,2004
US 6,751,670 Bl
Sheet 7 of 19
175
Y
COLLECT NOTIFICATION
INFORMATION
215
ATIEMPT TO TRANSMIT
NOTIFICATION INFO.
220
235
DENY
ACCESS
180
PROMPT FOR
PASSWORD
N
230
205
TRANSMIT
NOTIFICATION
INFO.
STORE INDICATOR
OF SUCCESSFUL
TRANSMISSION
DENY
ACCESS
GRANT ACCESS
(E.G., DECOMPRESS
AND DECRYPT
ELECTRONIC
CONTENT)
TRANSMIT
NOTIFICATION
INFORMATION
FIG. 4
210
200
u.s. Patent
Jun. 15,2004
US 6,751,670 Bl
Sheet 8 of 19
510
DETERMINE
ADDRESS OF
CONNECTED ~--.
DEVICE
TRY TO TRANSMIT
OVER DEFAULT
PORT
506
TRY TO
TRANSMIT
VIA DEVICE
Y
DONE
Y
DONE
FIG. 5
514
NOTIFY
USER
d
270
Q~1El
UNTITLED - VIA EXPRESS
FILE
EDIT VIEW
HELP
•
rJl
•
~
~
.....
.....
~
=
275
255
Ir!;~;m260
NEW
COVER
290a
SAVE TO
DESKTOP
285
CREATE NEW ENVELOPE'
~
C:\PROGRAM FILES\DESKGATE\VIAEXPRESS\
ENVELOPE NAME: I SAMPLE
I
I
OK
I
ICANCEL I
o
290b
P
E
N
~
'""'"
~Ul
N
C
C
~
280~
[BROWSE. .. I
~
MAIL
'JJ.
=-
~
~
(I
.....
\C
o
....,
'""'"
\C
HELP
ADD FILE
e
rJ'l
WELCOME TO VIAEXPRESS
250
FIG.6A
-..CJ\
""-l
(I)
I--"
0..,
""-l
Q
~
I--"
u.s. Patent
Jun. 15,2004
Sheet 10 of 19
US 6,751,670 Bl
en
en
w
a::
n.
X
oct:
~----------------~~--=r------------~W
II
10 a. W ZI
~--------------~~)~----~-------------4>
8
(]')
N
~
W
~
o
o
....J
W
~
d
[;J~18l1
SAMPLE - VIA EXPRES
EILE
EDIT VIEW
HELP
•"
NEW
i
f);.,
'/:.:\'.:/?' tN
..
~.=f::.:>~:.
COVER
~
HELLO
~
~
m
.....
.....
~
275
BOOK.PDF
(
105a
~
.
II
(
105b
I
•
rJl
•
I
I
OK
7
ICANCELI
~
SAVE TO
DESKTOP
;:295
VIAEXPRESS PACKAGE
PASSWORD:
=
,-.
lEI
280+-L
=
?
'""'"
Ul
~
~
N
C
C
~
o
P
MAIL
N
'JJ.
=-
~
~
E
e
~
.....
•
''""'"
"
o"'"
....,
'""'"
\C
HELP
ADD FILE
e
\Jl
WELCOME TO VIAEXPRESS
250
FIG.6C
-..CJ\
""-l
(I)
I--"
0..,
""-l
Q
~
I--"
d
[d~[gJ
SAMPLE - VIA EXPRESS
HELP
FILE
EDIT VIEW
r-i~
•
HELLO
BOOK. PDF
IEl.
SAVE TO
DESKTOP
FINISHED ENVELOPE COVER
SETUP BANNERI CERTIFIED E-MAIL IOUTPUT BUTTON
ri~
~r2
-COVEt-<
P
E
o CERTIFIED E-MAIL
ENTER E-MAIL ADDRESS FOR RETURN RECEIPT:
I
.0
275 ~ M.:.U/?2;:;;YJ
'SUnON PROPERTIES
NEW
•
m
r--.
280+--1 _
1 \l
"~~
"0
+--300
P
CONTENT 10:
--_.
~
MAIL
~.
-
~
•
rJl
•
~
~
.....
.....
~
=
~
~
'""'"
~Ul
N
C
C
~
'JJ.
=-
~
~
.....
'N "
""'
o
....,
'""'"
\C
ADD FILE
10k II CANCElli
HELP
HELP
e
rJ'l
-..CJ\
""-l
I
FOR HELP. PRESS F1
250/
FIG.6D
(I)
WELCOME TO VIAEXPRESS
I--"
0..,
""-l
Q
~
I--"
u.s.
Patent
Jun. 15,2004
US 6,751,670 Bl
Sheet 13 of 19
..-
(9
LL
0
0
..-
,~
«
>~
(f)
z
0::
CO
IT
.......
I--
....J
~
w
:::>
W
a. ~~
<..:>
IQ])J~
w
()
>~
0::
[i
o
l--
::::>
<..:>
~
o
::c
C/)
d
•
rJl
•
~
LOTUS CC:MAIL - rNEW MESSAGEClFILE EDIT TEXT MESSAGE ATTACHMENTS
TOOLS WINDOW
HELP
~
~
.....
.....
~
=
~
=
?
'""'"
~Ul
50
60
70
80
N
C
c
~
'JJ.
=-
~
~
.....
'~
""'"
o
....,
'""'"
\C
e
rJ'l
-..CJ\
""-l
(I)
I--"
FIG.6F
0..,
""-l
Q
~
I--"
u.s. Patent
Jun. 15,2004
Sheet 15 of 19
US 6,751,670 Bl
..0
o
N
M
w
(!)
z
w
Oa...WZ
Oa..WZ
«
(/)
w
CO
>
0
N
Z
v :::::l
N
~
CO
LO
0=:
0
it
C")
en
(/)
a..
w .....I
0=: W
a... ::I: I
X
W
~W
> lL.1
-...J
"
LO
N
M
d
•
rJl
•
[g]
CERTIFIED E-MAIL RECEIPT FORM
~
~
.....
.....
~
=
ACCESS: AUTHORIZATION FORM
-r
I
*ENTER YOUR NAME
*ENTER YOUR EMAIL ADDRESS I
*ENTER YOUR ORGANIZATION I
+~
335
340
345
~
=
?
'""'"
Ul
~
N
C
C
~
THE SENDER WILL BE NOTIFIED IMMEDIATELY
'JJ.
=-
~
~
.....
'""'"
0'1
o
....,
I
SEND
I
'""'"
\C
IREADY
e
rJ'l
330
-..CJ\
""-l
(I)
I--"
FIG.6H
0..,
""-l
Q
~
I--"
d
g~~
GlI1!1~
Q. LOTUS
[::::J FILE
CC:MAIL -lMES-SAGE - REGISTERED EMAIL NOTIFICATIONj--EDIT TEXT MESSAGE ATTACHMENTS
TOOLS WINDOW HELP
•
rJl
•
~
~
.....
.....
~
=
11/17/98
~
1~~~M~Llvl
'""'"
~Ul
!SUBJECT: IIREGJSTERED EMAIL NOTIFICATION
o
I
10
,I
~-
I
20
.1
I
30
1
I
40
,I
I
50
.1
60
,I
70
I
I •
..
.L.
80
I
I
•
I
~
1
t=,
DESKGATE CERTIFIED EMAIL NOTIFICATION
SERIAL#:
TIME STAMP:
PACKAGE 10:
N
C
C
'JJ.
=-
~
~
2441668DG
.....
111698162130
'""'"
-..J
0
SAMPLE.EXE
....,
'""'"
\C
ROB GREENBERG
NAME:
EMAIL:
GREENBERG@FR.COM
ORGANIZATION:
FISH & RICHARDSON, P.C.I
e
rJ'l
INBOX 015
I FOLOERS27f681 BBOARD NOTIFY OFF/12
FIG. 61
~
11118/98 10:13 AM
I []]]
-..CJ\
'""-l
(I)
J-'
CJ\
'""-l
Q
~
I-"
d
~VIAEXPRESS UNIVERSAL ENVELOPE
FILE
HELP
\l1J~
Vol
(')
•
rJl
•
ld~1R1
~
~
.....
.....
~
~
=
CLICK HERE FOR
YOUR FREE COPYI
~
=
UNIVERSAL ENVELOPE CONTENTS:
BOOK. PDF
o BYTES NOVEMBER 17. 1998
?
10-
HELLO.TXT
---
--
o BYTES NOVEMBER 13, 1998
....
105a
'""'"
~Ul
N
c
c
105b
~
'JJ.
=-
~
~
....
'""'"
00
0
....,
<31
I
2 TOTAL ITEMS, 0 BYTES TOTAL
I~
SAVE FILES TO ...
1
'""'"
\C
1~
IWWW.VIAEXPRESS.COM
I
e
rJ'l
-..CJ\
""-l
332
(I)
FIG.6J
I--"
0..,
""-l
Q
~
I--"
u.s. Patent
Jun. 15,2004
...,r
..J
,..
US 6,751,670 Bl
Sheet 19 of 19
120
_ 360
u
I
J
J
1-~370
[385
395c
~
400,--
a;b
MEMORY
f--~
PROCESSOR
INSTRUCTIONS FOR
PRODUCING AN EXECUTABLE
FILE FROM ELECTRONIC
CONTENT AND
NOTIFICATION INSTRUCTIONS
~
~_v
'----
~
'----
FIG. 7
395a
-r--100
~
US 6,751,670 B1
1
2
TRACKING ELECTRONIC COMPONENT
The method may further include determining an address
to receive the notification information. Such determining
may performed by interactively receiving an address from a
user. Such determining also may be determined by automatically identifying the address as the address of the user
creating the file.
The executable instructions that transmit notification
information may dynamically determine how to transmit the
notification information via an intermediate device (e.g., a
proxy server and a firewall).
In general, in another aspect, a method of tracking access
to electronic content includes encrypting electronic content,
determining an address for receipt of notification
information, and producing a file that includes the encrypted
electronic content, and executable instructions. The executable instructions collect notification information and attempt
to transmit the notification information to the determined
address in response to an attempt to access the electronic
content on a computer that has not previously accessed the
electronic content. The notification instructions decrypt the
encrypted electronic content after transmitting notification
information successfully.
In general, in another aspect, a method for tracking access
to electronic content includes receiving notification information from a recipient of a file including electronic content,
the notification information being transmitted in response to
an attempt to access the electronic content. The notification
information includes an identifier that identifies a user or
computer system. The method also includes determining an
address for receipt of the notification information and transmitting the notification information to the determined
address.
Embodiments may include one or more of the following.
An access granting message may be transmitted. The identifier that identifies a user or computer system included in the
notification information may be used to verify that an
authorized user produced the file. The identifier may also be
used to update information (e.g., a usage charge) corresponding to the identifier.
In general, in another aspect, a computer-implemented
method of regulating access to electronic content includes
collecting notification information in response to an attempt
to access the electronic content, attempting to transmit the
collected notification information to an address, and selectively granting access to the electronic content based on a
result of the attempted transmission of the notification
information.
In general, in another aspect, a method of tracking access
to electronic content includes creating a file that includes
electronic content and causes access to the electronic content
to be denied until notification information has been successfully transmitted. The method also includes transmitting the
file to a set of addresses that includes at least one address and
receiving notification information.
In general, in another aspect, a computer-implemented
method of regulating access to e-mail includes detecting an
attempt by a message recipient to access received e-mail,
attempting to collect notification information from the
recipient, and selectively granting access to the e-mail based
on a result of the attempt to collect notification information.
In general, in another aspect, a computer program, disposed on a computer readable medium, tracks electronic
content. The computer program including computer program instructions for causing a computer to produce a file
that includes electronic content and executable instructions
that collect notification information and attempt to transmit
TECHNI CAL FIELD
This invention relates to tracking electronic content, for
example, content included with or attached to an electronic
mail message.
S
BACKGROUND
Electronic mail (e-mail) enables computer users to conveniently share information. Frequently, however, network
packets carrying e-mail are dropped due to network traffic or
physical transmission problems. Even when successfully
delivered, recipients sometimes delete or otherwise fail to
read received e-mail. Thus, a user sending e-mail often
cannot not be sure the intended recipient ever read or
received the e-mail.
Some e-mail software packages, such as cc:MaiFM available from Lotus™ Corporation of Cambridge, Mass., provide a "return receipt" option when sending e-mail. E-mail
software that receives e-mail specifying "return receipt" can
automatically send back a receipt message indicating that
the intended recipient received the e-mail. Some software
packages permit an administrator or user to disable "return
receipt" functions and, thus, prevent transmission of receipts
back to e-mail senders.
E-mail contents can include text messages entered in an
e-mail editor and/or attachment files ( attachments). Recent
surveys indicate that more than 50% of information transmitted via e-mail is transmitted in the form of attachments.
Many e-mail software packages enable a user receiving an
e-mail attachment to easily forward received attachments to
other recipients. Thus, an attachment may be quickly disseminated to a large number of individuals unknown to the
user originally sending the attachment.
10
15
20
25
30
35
SUMMARY OF THE INVENTION
In general, in one aspect, a method of tracking electronic
content includes producing a file that includes electronic
content and executable instructions. The executable instructions collect notification information and attempt to transmit
the notification information to an address when triggered by
an event. The executable instructions deny access to the
electronic content until the notification information is transmitted successfully.
Embodiments may include one or more of the following.
The executable instructions may deny access until an access
granting message is received in response to the successful
transmission of notification information. The trigger event
may include an attempt to access (e.g., view, use, or list) the
electronic content, for example, from a computer or user that
has not previously accessed the electronic content.
The executable instructions may collect notification information by querying a computer and/or interactively collecting information from a user. Such information may include
demographic information (e.g., a name, an e-mail address,
and an organization identifier) or system information (e.g., a
network address).
The electronic content may be encrypted. Encrypted content may be accompanied by instructions decrypt the content. The electronic content may be compressed. Compressed content may be accompanied by instructions that
decompress the content. The electronic content may include
at least one file of data, text, graphics, audio, video, or an
executable instructions. The file may be transmitted via
e-mail (e.g., as an e-mail attachment).
40
45
50
55
60
65
US 6,751,670 B1
3
4
the notification information to an address when triggered by
notification instructions 110 that control and report access to
the electronic content 105. The envelope file 100 may be
an event. The executable instructions deny access to the
transmitted to other users or computers, for example, as an
electronic content until the notification information is transattachment to an e-mail message. The envelope 100 may
mitted successfully.
5 also be transmitted via a network service such as FTP (File
In general, in another aspect, a computer program, disTransfer Protocol) or HTTP (HyperText Transfer Protocol)
posed on a computer readable medium, regulates access to
or other mechanisms such as physical transfer of a floppy
electronic content. The computer program includes instrucdisk storing the envelope or a direct modem connection
tions for causing a processor to collect notification informabetween computers. A recipient of the envelope 100 may
tion in response to an attempt to access the electronic 10 attempt to access (e.g., view, use, or list) content 105
content, attempt to transmit the collected notification inforincluded in the envelope 100. The notification instructions
mation to an address, and selectively grant access to the
110 included in the envelope 100 may respond to the access
electronic content based on a result of the attempted transattempt by collecting notification information (e.g., a user
mission of the notification information.
name) and attempting to transmit the collected information
Advantages include one or more of the following.
15 to a network address designated during envelope 100 creTransmitting electronic content in envelopes permits
ation. The notification instructions 110 may be configured
during creation of the envelope 115 to grant or deny access
access to electronic content to be tracked in perpetuity. That
is, regardless of how an envelope is passed on by different
to the electronic content 105 based on the results of the
attempted transmission of the notification information 140.
recipients, the envelope creator, or a user designated by the
envelope creator, receives notification information describ- 20
The executable notification instructions 110 included in
ing each recipient who attempts to access the electronic
an envelope 100 may include computer platform-specific
content in the envelope.
instructions. For example., an envelope 100 may include
binary instructions 110 that program any PC-compatible
By including its own set of executable instructions the
computer. The executable instructions, however, need not be
envelope can be used by existing e-mail software packages
without modification. Additionally, the executable 25 targeted to a particular computer platform. For example, the
instructions 110 may be Java commands. The executable
instructions, for example, those that dynamically determine
instructions are placed in the envelope 100 such that an
how to reach a network through intermediate devices (e.g.,
attempt to execute the envelope file 100 (e.g.,
a firewall), make the task of preventing transmission of
"C:\envelope.exe") causes execution of the executable
notification information extremely difficult without com30 instructions.
pletely severing a network connection.
Referring to FIG. 2A, an envelope 100 may be transmitted
The notification information provided by an envelope can
from an envelope creator 120 to an envelope recipient 125,
include any information that can be acquired by querying a
for example, by including the envelope 100 as an attachment
computer system or user. The information collected can
to an e-mail message 115a. Attempted access to the content
provide valuable marketing data describing the attributes of
35 of the envelope 100 by the recipient 125 causes execution of
users accessing the electronic content.
the notification instructions 110 of the envelope that collect
Receipt of notification information not only communiand transmit notification information 130a from the recipicates receipt of a file but also of attempted access or other
ent 125 to the envelope creator 120. Such information 130a
attempted functions (e.g., printing, saving, and deleting).
may include system information (e.g., a network address
The use of a notification server enables envelopes to 40 and/or other data stored on a system) and/or demographic
control access to electronic content, for example, by limiting
information such as a user's name, e-mail address, street
the number of times a particular user can access electronic
address, and/or organization. The envelope creator 120 and
content.
recipient 125 may use the same or different computer
Other advantages of the invention will become apparent
systems.
in view of the following description, including the figures, 45
Including an envelope 100 as an e-mail attachment 115a
and the claims.
offers an envelope creator 120 a "certified receipt" functionality that transmits notification information 130a indicating
DESCRIPTION OF THE DRAWINGS
that not only has a recipient received the envelope 100, but
FIG. 1 is a diagram of an envelope.
that the recipient has also accessed (or attempt to access) the
FIGS. 2A-2D are diagrams illustrating transmission of 50 envelope contents 105. The notification instructions 110
included in the envelope 100 can be configured during
notification information.
creation to report events other than attempted access to
FIG. 3 is a flow chart of a procedure for creating enveenvelope contents 105 such as an attempt to save contents
lopes.
105 to a file, an attempt to delete envelope contents 105,
FIG. 4 is a flow chart of a procedure for controlling access
and/or an attempt to print envelope contents 105. For
to electronic content based on successful transmission of 55
example, the notification instructions 110 may monitor
notification information.
viewing of electronic content 105 and transmit notification
FIG. 5 is a flow chart of a procedure for transmitting
information 130a that summarizes the viewing (e.g., which
notification information.
pages of a document were read) when viewing ends.
FIGS. 6A-6J are screenshots of envelope creation and 60
An envelope 100 can be included as an e-mail attachment
use.
115a using any e-mail software package that supports
FIG. 7 is a diagram of a computer platform.
attachments (e.g., Lotus™ cc:MaiPM, MicrosoftTM
Exchange, and Eudora). Because the envelope 100 includes
DETAILED DESCRIPTION
its own independently executable notification instructions
Referring to FIG. 1, an envelope file 100 (envelope) 65 110 that control electronic content 105 access and transmission of notification information 130a, 130b, the envelope
includes electronic content 105 (e.g., data, text, graphics,
100 provides a notification mechanism independent of the
audio, video, or executable instructions) and executable
US 6,751,670 B1
5
6
capabilities of any particular e-mail software package. This
136 can also store information describing particular enveindependence offers a number of benefits. For example,
lopes by storing envelope IDs as they are received.
because the functionality provided by an envelope 100 is
To facilitate use of a notification server 134, each enveindependent of the e-mail package used to transmit or
lope 100 may include an identifier indicating the user or
receive e-mail, users can continue to use an e-mail package 5 computer system 120 that created the envelope 100, the
of their choice without modification and still receive notiaddress of the notification server 134, and the address
fication information 130 from an envelope 100.
specified during envelope creation that ultimately receives
Additionally, because the envelope 100 need not rely on
the notification information. The notification server 134 can
functions provided by any e-mail software package, defeating the notification scheme implemented by an envelope 100 10 match the identifier included in the notification information
BOa with an identifier in its table 136 to verify legitimate
becomes much more difficult than re-configuring an e-mail
envelope production or compute usage charges. The notifisoftware package (e.g., an administrator clicking on a checkcation server 134 can then re-transmit the notification inforbox control that prevents transmission of return receipt
mation BOa to the address designated by an envelope
messages).
creator during envelope creation.
Referring to FIG. 2B, after transmission to a recipient 15
Referring to FIG. 3, a procedure 140 produces an enve125, the envelope 100 remains a convenient way to transmit
lope 100. The procedure 140 may prompt (145) an envelope
electronic content 105 included in the envelope 100 to
creator to designate a password for password protection of
others. Thus, a recipient 125 can easily re-transmit the
the electronic content 105. The notification instructions 110
received electronic content 105 to one or more new recipients 135 by forwarding the received envelope 100 in a new 20 use the designated password to deny access to an envelope's
100 electronic contents 105 to a recipient who fails to
e-mail message 115b. The notification instructions 110,
provide the designated password. Thus, unless a recipient
however, remain packaged with the electronic content 105 in
receives an envelope's 100 password, for example, via a
the envelope 115 and continue to control access to the
phone call or separately transmitted e-mail message, the
electronic content 105 and transmit notification information
BOb collected from the different recipients 135 that receive 25 recipient cannot access the electronic contents 105 of the
envelope 100.
the forwarded envelope 100. Thus, the notification instrucAfter receiving identification (150) of electronic content
tions 110 collect and transmit notification information BOb
105 for inclusion in an envelope 100, the procedure 140 may
to an envelope creator 120 each time a different user or
compress (155) the electronic content 105 to minimize the
computer accesses the electronic content 105 even though
the recipient 135 did not receive the envelope directly from 30 size (e.g., number of bytes) of the envelope 100 and, thus,
speed transmission of the envelope 100 across network
the envelope 100 creator. Thus, the notification information
lines. The procedure 140 may use anyone of a variety of
BOa, BOb received by an envelope creator 120 can produce
compression algorithms such-as PKZip compression. The
a list of the different users and computers that access a
procedure 140 also may encrypt (160) the electronic content
particular envelope's electronic content 105 as an envelope
100 is passed on to different recipients. The information 35 105 to provide security both during transmission over public
network lines and to prevent attempts to bypass the notifireported can provide invaluable marketing data that tracks
cation instructions 110 and access an envelope's content 105
the number and demographic attributes of users accessing a
before successfully transmitting notification information
particular set of electronic content 105.
BOa, BOb. The password designated by an envelope creReferring to FIG. 2C, an envelope 100 creator may
configure the envelope 100 to transmit collected notification 40 ator may act as the encryption key, providing extra protection against unauthorized access. The procedure 140 may
information BOa, BOb, to an address 137 other than the
use any of a variety of encryption algorithms such as
address 120 of the envelope creator 120. Additionally, the
Blowfish, DES (Data Encryption Standard), or PKZip
envelope 100 creator can configure the envelope 100 to
encryption. The terms compression and encryption are not
broadcast the notification information BOa, BOb to many
45 mutually exclusive. That is compressing data (i.e., making
different addresses (not shown).
the size of an envelope smaller) may also serve to encrypt
Referring to FIG. 2D, the notification instructions 110
the data.
included in an envelope 100 may transmit notification
The procedure 140 may determine (165) a network
information BOa via a notification server 134 instead of
address that will receive the notification information BOa,
directly to an address 120 designated during envelope creation. The notification instructions 110 may be configured to 50 BOb. By default, the procedure 140 may assume that the
user executing the envelope producing procedure 140 should
deny access until an access granting message 132 is received
receive the notification information BOa, BOb. For
from the notification server 134. The notification server 134
example, the procedure 140 may query a system configumay automatically transmit an access granting message 132
ration file (e.g., a Windows™ registry) to determine the
upon receipt of notification information BOa. Alternatively,
the notification server 134 may process the notification 55 e-mail address of the envelope creator. However, an envelope creator may expressly designate a different address at
information BOa before transmitting an access granting
the time the envelope is created.
message 132. The use of a notification server 134 to transmit
The procedure 140 may receive other envelope configuraccess granting messages 136 provides a method of coning (167) information from an envelope creator. For
trolling access (e.g., limiting the number of people who can
access an envelope 100) without requiring server software to 60 example, the creator may specify than the envelope 100 need
not successfully transmit notification information BOa,
continually run on an envelope creator's computer.
130b before granting access to the envelope's electronic
The notification server 134 may include a table 136 that
content 105. The creator may even specify that no notificaenables the server 134 to track use of envelopes and/or
tion information BOa, BOb should ever be transmitted by
envelope production software. The table 136 can include
information describing users of the envelope production 65 the envelope 100.
software. For example, the table 136 can store identifiers
The procedure 140 then builds (170) the envelope 100 to
include data corresponding to the identified electronic concorresponding to authorized envelope creators. The table
US 6,751,670 B1
7
8
tent 105 and notification instructions 110. The notification
notification information BOa, BOb. The notification
instructions 110 included in the envelope 100 may vary
instructions 130 may interactively collect notification infordepending on the envelope's 100 specified configuration.
mation 140 from a recipient through a GUI dialog (see FIG.
For example, an envelope 100 including compressed and
6H). The notification instructions 130 also may collect
encrypted data corresponding to the electronic content 105 5 information by querying the recipient's computer system.
may include notification instructions 110 that decompress
For example, the notification instructions 130 may examine
and decrypt the data 105 when granting access to the content
registry information to retrieve a wide variety of system and
105.
demographic information.
Other implementations of procedure 140 perform the
After collecting (215) the notification information BOa,
actions shown in different orders. Further, some implemen10 BOb, the notification instructions 110 attempt (220) to
tations omit actions shown. Additionally, other implementransmit the collected notification information BOa, BOb to
tations may include different configuration capabilities. For
the address specified during an envelope's creation (165
example, an envelope 100 creator may configure the enveFIG. 3). An attempt to transmit the notification information
lope 100 to collect different notification information BOa,
BOa, BOb may fail immediately and return a network
BOb.
15 service error code (e.g., a port timeout error code).
Referring to FIG. 4, the notification instructions 110
Additionally, even though transmission does not result in a
included in an envelope 100 can be configured to control
network service error, the computer sending the notification
access to the electronic content 105. Typically, an envelope
information BOa, BOb may not receive a network acknowl100 will include compressed and/or encrypted electronic
edgment message that indicates successful transmission and
content 105. Further, different electronic content 105
20 receipt of the notification information BOa, BOb. Further,
included in an envelope may use different file formats (e.g.,
notification instructions 110 configured to grant access only
electronic content may include a JPEG file and a file that
upon receipt of an access granting message may fail to
includes sound data). Thus, an envelope recipient usually
receive the access granting message 132 after a period of
cannot easily access the electronic content 105 by direct
time. The notification instructions 110 may be configured
examination. Instead, the recipient must execute the notifi25 during envelope creation to deny access based on any of
cation instructions 110 of an envelope 115 to gain access
these circumstances, alone or in combination. If, however,
(e.g., extract the electronic content 105 from the envelope).
the attempted transmission succeeds (225) or an access
For example, a recipient may save an envelope 100 received
granting message 136 is received, the notification instrucas an attachment as a file and execute the file using platform
tions 110 can store (230) data indicating successful access.
specific commands (e.g., "C:\envelope.exe"). Many e-mail 30
The notification instructions 130 may prompt (180) a
packages, such as cc:MaiFM, can launch executable files
recipient for entry of the password, if any, designated during
from within the e-mail package.
envelope 100 creation (145 FIG. 3). Entry of a correct
When executed, notification instructions 110 can deterpassword (185) can cause the notification instructions 11 to
mine (175) whether a previous attempt to access the elecgrant (195) access to an envelope's electronic content 105.
tronic content 105 resulted in success (e.g., success trans35 Granting access may include decompressing and decrypting
mission of notification information BOa, BOb or receipt of
the electronic content 105. As previously discussed, events
an access granting message 136). If so, the notification
other than attempted access may trigger collection and
instructions 110 may grant access (195) to the electronic
transmission: of notification information BOa, BOb. For
content 105 without re-collecting and/or re-transmitting
example, as shown notification information BOa, BOb may
notification information BOa, BOb. If, however, a previous
attempt to access the electronic content 105 did not result in 40 be transmitted after entry of an incorrect password (205) or
after each successful access to electronic content 105 (200).
success, the notification instructions 110 attempt to collect
Different implementations of the instructions 110 may not
(215) and transmit (220) the notification information BOa,
perform the same actions or perform actions in the same
BOb.
Many different techniques exist for determining (175) 45 order as shown. For example, prompting for a password
(180) may occur prior to a determination (175) of whether
whether a previous access attempt resulted in successful. For
notification information BOa, BOb was successfully transexample, each envelope 100 may include an envelope ID.
mitted.
The envelope ID may be produced during envelope creation
Referring to FIG. 5, an envelope's notification instrucby combining a timestamp produced during envelope production with a machine identification code of the computer 50 tions 110 have no prior knowledge of the place a recipient's
computer holds in a network configuration. For example,
used to produce the envelope (e.g., a network address). The
some computers connect directly to a public network (e.g.,
notification instructions can store (230) the envelope ID on
the Internet) while others connect via intermediate devices
a computer system (e.g., in the registry) after successful
such as protective proxy servers or firewalls. Thus, the
transmission of notification information 140. By examining
a computer system for prior storage of an envelope's enve- 55 notification instructions 110 include instructions 220 that
dynamically determine how to navigate through a network
lope ID, the instructions 110 can determine (175) whether a
configuration to a public network. The ability to adapt to
previous access attempt succeeded. The determination (175)
different configurations makes it more difficult for an adminmay be a computer system-based or a user-based inquiry.
istrator or recipient to prevent transmission of notification
For example, by storing a user identification code along with
the envelope ID, the notification instructions 110 can dis- 60 information BOa, BOb.
tinguish between different users of the same computer
The instructions 220 transmit notification information
system. Thus, the notification instructions 110 do not repeatBOa, BOb by determining how a recipient's computer
edly require re-transmission of notification information
connects to a network (502). For example, the instructions
BOa, BOb by users who already have successfully trans220 can check a computer system's registry to see if proxy
mitted notification information 140.
65 service is enabled or disabled. If disabled, the instructions
If the instructions 110 determine (175) that no previous
220 can try to transmit notification information via commuaccess attempt succeeded, the instructions 110 collect (215)
nication ports customarily used for network use (e.g., port
US 6,751,670 B1
9
10
1080 which is typically reserved for Internet
envelope 115 by interacting with a graphical user interface
communication) (510). If such efforts fail, the instructions
provided by the notification instructions. Continuing the
may try other commonly used ports or notify the user that
vault motif, the screen shows a pair of access doors 320a,
transmission was unsuccessful (504).
320b each having "open" buttons 315a, 315b. The doors
If proxy service is enabled, notification information 130a, 5 320a, 320b may also include a graphic image (e.g., a panda)
130b must be sent to the network via an intermediate device.
or series of images specified by the creator of the envelope
Thus, the instructions 220 attempt to determine the address
100. Selecting either "open" button 280a, 280b can signify
of the intermediate device (504). For example, the instrucattempted access to the electronic content 105 and thus
tions 220 may examine the registry to determine how
cause collection and attempted transmission of the notificadifferent network services access the Internet from the 10 tion information 130a, 130b by the notification instructions
computer system. For example, instructions 220 may exam110.
ine the address stored in a Hkey_Classes_Root/Internet/
As shown in FIG. 6H, notification instructions 110 optionNetscape/ProxyServer registry entry to see how a
ally may collect demographic information via a dialog 330
Netscape™ browser accesses the Internet through the interthat includes text controls for entry of a person's name 335,
mediate device. After determining the address of the intermediate device, the instructions 220 attempt to transmit the 15 e-mail address 340, and organization 345. As previously
described, collection of information may be performed
notification information 110 (506) via the determined
instead of, or in addition to system calls or examination of
address. If the transmission fails (508), the instructions 220
configuration files.
may make another attempt using a different registry entry
Referring to FIG. 61, the envelope creator or other address
corresponding to a different network service (e.g.,
MicrosoftTM Explorer). Alternatively, the instructions 220 20 designated during envelope creation receives an e-mail
message containing the notification information.
may query the user for the address of the intermediate
device.
Referring to FIG. 61, after successful transmission of the
collected notification information, the graphical user interReferring to FIGS. 6A-61, an intuitive graphical user
interface facilitates production of an envelope 100 from 25 face presents the envelope recipient with a list of the
electronic content 105a, 105b included in the envelope 100
electronic content 105. The interface uses a vault metaphor
during envelope creation. The recipient can view the
that presents each envelope 100 as storing electronic concontent, for example, by selecting (e.g., clicking on) an
tents 105 behind access doors 290a, 290b.
electronic content icon 105a, 105b or can save (e.g., by
Referring to FIG. 6A, in addition to a menu bar 270, the
interface screen 250 includes buttons (e.g., 255) that initiate 30 selecting button 332) the electronic content 105a, 105b to
specified files.
tasks needed to create an envelope 100. As shown, the
interface screen 250 includes a "New" button 255. Selecting
Referring to FIG. 7, a computer platform 120 suitable for
executing instructions 140 that produce an envelope 100
the "New" button (e.g., moving a mouse and clicking on the
includes a digital computer 400 having memory 390 and a
button) initiates creation of a new envelope 100. As shown,
a dialog 285 enables an envelope creator to name the new 35 processor 385. The digital computer 400 also includes a
envelope 100 (e.g., "Sample"). A directory of the same name
mass storage device 395a (e.g., a hard disk) that includes the
(e.g., "Sample") is created on the user's computer to store
instructions 140 for creating an envelope from electronic
files added to the envelope.
content. In the course of operation, instructions 140 are
transferred from the mass storage device 395a to memory
Referring to FIG. 6B, an envelope creator has added
electronic content 105 including a text file 105a and an 40 390 and processor 385 for execution. Of course, a wide
variety of mass storage devices such as a floppy disk 395b
Adobe™ PDF file 105b. The user can add electronic content
or a CD-ROM 395c may store the instructions 110.
105a, 105b by selecting an "Add File" button 265 and
browsing through system directories and selecting files, by
The computer platform 120 also may include a monitor
interacting with items in the menu bar 270, or by dragging360 for displaying the graphical user interface screens 365
and-dropping files into the interface screen 250.
45 and electronic content 105. The user may interact with the
graphical user interface 365 via a keyboard 375 and/or a
Referring to FIG. 6C, after adding electronic content
pointing device such as a mouse 370. The computer platform
105a, 105b, the user selects either a "Save to Desktop"
120 also includes a network connection 380 that permits
button 275 or a "Mail" button 280 to generate an instance of
transmission of the executable file to other computers.
an envelope 100. As shown, a dialog 295 may prompt the
user to designate an envelope password to protect the 50
Other embodiments are within the scope of the following
electronic contents 105a, 105b. As shown in FIG. 6D, a
claims. For example, rather than implementing the instrucdialog also may request specification of an address 300 for
tions that construct an envelope as a stand-alone application,
receipt of the notification information 130a, 130b.
different implementations may integrate the instructions
Selecting the "Mail" button 280 launches a linked e-mail
directly into an e-mail software package. Such a e-mail
client (e.g., cc:MaiFM) and causes it to create a new message 55 software package expands traditional e-mail packages capabilities beyond receiving a "return receipt" message. For
having the envelope 100 as an attachment. Then, the user
can optionally enter text and/or add other attachments before
example, these packages can provide mechanisms that regulate access to e-mail content and track access to the e-mail
sending the e-mail message and attachments according to
the particular protocol of the e-mail client. Alternatively, as
content via notification information received from recipients
shown in FIG. 6E, selecting the "Save to Desktop" button 60 accessing the content.
saves the envelope 100 to a system desktop 305 or directory.
In one embodiment, an e-mail system could provide a
A user can then e-mail the envelope 100 as an attachment by
"certified receipt" feature as a native function. Upon genmanually including the envelope 100 in an e-mail message.
erating an email message, a user-could designate (e.g., by
As shown in FIG. 6F, a user has attached an envelope to a
using pull-down menu functions or by clicking appropriate
Lotus™ cc:MaiFM e-mail message.
65 check-boxes) that the text of the email message itself, and/or
the content of one or more attachments to the email, require
As shown in FIG. 6G, after transmission to a recipient, a
"certified receipt" before the recipient could view or otherrecipient can attempt to access electronic content 105 in an
US 6,751,670 B1
11
12
wise access the content. The message sender optionally
19. The method of claim 18, wherein transmitting the file
could designate the nature and type of notification informavia e-mail comprises transmitting the file as an e-mail
tion to be collected from the recipient, as well as the identity
attachment.
or address of one or more parties that are to receive the
20. The method of claim 1, further comprising, determinnotification information.
5 ing the address.
What is claimed is:
21. The method of claim 20, wherein determining the
1. A method of tracking electronic content, the method
address comprises interactively receiving an address from a
comprising the steps of:
user.
producing a file that includes electronic content, and
22. The method of claim 20, wherein determining the
executable instructions that collect notification infor- 10 address comprises automatically identifying the address as
mation and attempt to transmit notification information
the address of the user creating the file.
to an address when triggered by an event, the execut23. The method of claim 1, wherein the instructions that
able instructions denying access to the electronic contransmit notification information comprise instructions that
tent until the notification information is transmitted;
dynamically determine how to transmit the notification
and
15 information via an intermediate device.
transmitting notification information when the electronic
24. The method of claim 23, wherein an intermediate
content is accessed by a successive recipient to the
device comprises at least one of the following: a proxy
address,
server and a firewall.
wherein the address is an address other than that of an
25. A method of tracking access to electronic content, the
immediate sender of the electronic content.
2. The method of claim 1, wherein the executable instruc- 20 method comprising the steps of:
encrypting electronic content;
tions further deny access until an access granting message is
received in response to the successful transmission of notidetermining an address for receipt of notification inforfication information.
mation; and
3. The method of claim 1, wherein the trigger event
producing a file that includes the encrypted electronic
25
comprises an attempt to access the electronic content.
content, and executable instructions that collect notifi4. The method of claim 3, wherein an attempt to access the
cation information, and attempt to transmit the notifielectronic content comprises an attempt to view, use, or list
cation information to the determined address in
the electronic content.
response to an attempt to access the electronic content
5. The method of claim 3, wherein the trigger event
on a computer that has not previously accessed the
comprises an attempt to access the electronic content on a 30
electronic content, the notification instructions decryptcomputer that has not previously been used to access the
ing the encrypted electronic content after transmitting
electronic content.
notification information successfully, and transmitting
6. The method of claim 3, wherein the trigger event
notification information when the electronic content is
comprises an attempt to access the electronic content by a
accessed by a successive recipient to an address other
user who has not previously accessed the electronic content. 35
than that of an immediate sender of the electronic
7. The method of claim 1, wherein the executable instruccontent.
tions that collect notification information comprise instruc26. The method of claim 25, wherein decrypting the
tions for querying a computer for notification information.
encrypted electronic content after transmitting notification
8. The method of claim 1, wherein the executable instrucinformation successfully comprises decrypting the elections that collect notification information comprise instruc- 40
tronic content after receiving an access granting message.
tions for interactively collecting information from a user.
27. A method for tracking access to electronic content, the
9. The method of claim 1, wherein the notification informethod comprising:
mation comprises demographic information.
receiving notification information from a recipient of a
10. The method of claim 9, wherein demographic inforfile including electronic content, the notification information comprises at least one of the following: a name, an 45
mation being collected by executable instructions and
e-mail address, and an organization identifier.
being transmitted in response to an attempt to access
11. The method of claim 1, wherein the notification
the electronic content, the notification information
information comprises system information.
including an identifier that identifies a user or computer
12. The method of claim 11, wherein system information
system
50
comprises a network address.
transmitting the notification information when the elec13. The method of claim 1, wherein the electronic content
tronic content is accessed by a successive recipient to
comprises compressed electronic content.
an address other than that of the immediate sender of
14. The method of claim 13, wherein the executable
the electronic content;
instructions comprise instructions that cause the electronic
determining an address for receipt of the notification
content to be decompressed after successfully transmitting 55
information; and
the notification information.
transmitting the notification information to the deter15. The method of claim 1, wherein the electronic content
mined address, the executable instructions denying
comprises encrypted electronic content.
access to the electronic content until the notification
16. The method of claim 15, wherein the executable
information is transmitted.
instructions comprise instructions that cause the received 60
28. The method of claim 27, further comprising transmitelectronic content to be decrypted after successfully transting access granting messages.
mitting the notification information.
29. The method of claim 27, further comprising
17. The method of claim 1, wherein the electronic content
comprises information included in at least one file of data,
verifying that the identifier that identifies a user or com65
text, graphics, audio, video, or an executable program.
puter system included in the notification information
18. The method of claim 1, further comprising, transmitcorresponds to an authorized user of the software for
ting the file via e-mail.
producing the file.
US 6,751,670 B1
13
14
30. The method of claim 27, further comprising
sending the notification information to an intermediate
server that routes the notification information to the address.
updating information corresponding to the identifier that
45. A method of tracking access to electronic content, the
identifies a user or computer system included in the
method comprising:
notification information.
creating a file that includes electronic content and causes
31. The method of claim 30, wherein updating comprises 5
access to the electronic content to be denied until
computing a usage charge.
notification information collected by executable
32. A computer-implemented method of regulating access
instructions has been successfully transmitted;
to electronic content, the method comprising:
transmitting the file to at least one address; and
collecting notification information from a recipient and
receiving notification information from a successive
successive recipients of the electronic content in 10
recipient other than that of the immediate sender of the
response to an attempt to access the electronic content;
electronic content.
attempting to transmit the collected notification informa46. The method of claim 45, wherein transmitting the file
tion to an address other than that of the immediate
sender of the electronic content when triggered by an 15 comprises transmitting the file bye-mail.
47. The method of claim 45, wherein receiving notificaevent; and
tion information comprises receiving notification inform a selectively granting access to the electronic content based
tion collected from an address other than an address in the
on a result of the attempted transmission of the notifiset of addresses.
cation information,
48. The method of claim 45, wherein creating the file
wherein executable instructions collect the notification 20 comprises receiving a password that protects the electronic
information and selectively deny access to the eleccontents.
tronic content until the notification information is trans49. The method of claim 45, wherein creating the file
mitted.
comprises receiving identification of the electronic content
33. The method of claim 32 in which access to the
for inclusion in the file.
electronic content is granted if the attempted transmission is 25
50. The method of claim 45, wherein creating the file
successful and access to the electronic content is denied if
comprises compressing the electronic content.
the attempted transmission is unsuccessful.
51. The method of claim 50, wherein creating the file
34. The method of claim 32 in which access to the
comprises including information in the file needed to
electronic is granted if the attempted transmission results in
decompress of the compressed electronic content.
receipt of an access granting message and access to the 30
52. The method of claim 45, wherein creating the file
electronic content is denied if the attempted transmission
comprises encrypting he electronic content.
does not result in receipt of an access granting message.
53. The method of claim 52, wherein creating the file
35. The method of claim 32 in which access to the
comprises including information in the file needed to
electronic content is denied if no notification information is
decrypt the encrypted electronic content.
35
collected.
54. The method of claim 52, wherein encrypting the
36. The method of claim 32 in which the electronic
electronic content comprises encrypting the electronic concontent is included in an attachment to an e-mail message.
tent using a password as encryption key.
37. The method of claim 36, in which the attempt to
55. The method of claim 45, wherein creating the file
transmit the collected notification information comprises
comprises determining an address that receives the notifisending the notification information to an address associated 40 cation information.
with an originator of the e-mail message.
56. The method of claim 45, wherein creating the file
38. The method of claim 36 in which the attempt to
comprises receiving a password that protects the electronic
transmit the collected notification information comprises
contents;
sending the notification information to an address other than
receiving identification of the electronic contents for
an address associated with an originator of the e-mail 45
inclusion in the file;
message.
compressing the electronic contents;
39. The method of claim 38 in which the other address is
encrypting the electronic contents according to the
designated by the originator of the e-mail message.
received password; and
40. The method of claim 32 further comprising, prior to
determining an address that receives the notification inforthe collection of notification information, detecting that a 50
mation.
user of a computer system is attempting to access electronic
57. A computer-implemented method of regulating access
content embedded in an e-mail attachment.
to e-mail, the method comprising:
41. The method of claim 32 further comprising providing
detecting an attempt by a message recipient to access
subsequent access to the electronic content, without
received e-mail; and
re-collecting or re-transmitting notification information, if 55
attempting to collect notification information from the
the notification information already has been collected and
recipient and any successive recipient other than that of
transmitted successfully.
the immediate sender of electronic content,
42. The method of claim 32 further comprising deactivating the collection and transmission of notification inforwherein executable instructions collect the notification
mation after the notification information has been collected 60
information and attempts to transmit notification inforand transmitted successfully.
mation to an address when triggered by an event, the
executable instructions denying access to the electronic
43. The method of claim 42 further comprising
re-activating the collection and transmission of notification
content until the notification information is transmitted.
58. The method of claim 57 in which access to the e-mail
information if the electronic content is forwarded to another
65 is granted if the attempted collection is successful and access
computer or another user.
to the e-mail is denied if the attempted collection is unsuc44. The method of claim 32 in which the attempt to
cessful.
transmit the collected notification information comprises
US 6,751,670 B1
15
16
59. The method of claim 57 further comprising, if the
attempt to collect notification information is successful,
selectively granting access to the e-mail based on the content
of the collected notification information.
60. The method of claim 57 further comprising, if the
attempt to collect notification information is successful:
attempting to transmit the collected notification information; and
selectively granting access to the e-mail based on a result
of the transmission attempt.
61. The method of claim 57 further comprising notifying
an originator of the e-mail that access to the e-mail has been
granted to the message recipient.
62. A computer program, disposed on a computer readable
medium, for tracking electronic content, the computer program including computer program instructions for causing a
computer to:
produce a file that includes electronic content, and executable instructions that collect notification information
from successive recipients, and attempt to transmit the
notification information to an address other than that of
the immediate sender of the electronic content when
triggered by an event, the executable instructions denying access to the electronic content until the notification
information is transmitted successfully.
63. The computer program of claim 62, wherein the
executable instructions further deny access until an access
granting message is received in response to the successful
transmission of notification information.
64. The computer program of claim 62, wherein the
trigger event comprises an attempt to access the electronic
content.
65. The computer program of claim 62, wherein the
executable instructions that transmit notification information
comprise instructions that dynamically determine how to
transmit the notification information via an intermediate
device.
66. A computer program, disposed on a computer readable
medium, for regulating access to electronic content, the
computer program including instructions for causing a processor to:
collect notification information from a recipient and successive recipients in response to an attempt to access
the electronic content;
attempt to transmit the collected notification information
when triggered by an event to an address other than that
of the immediate sender of the electronic content; and
selectively grant access to the electronic content based on
a result of the attempted transmission of the notification
information,
wherein executable instructions collect the notification
information and selectively deny access to the electronic content until the notification information is transmitted.
67. The computer program of claim 66 in which access to
the electronic content is granted if the attempted transmission is successful and access to the electronic content is
denied if the attempted transmission is unsuccessful.
68. The computer program of claim 66 in which access to
the electronic content is granted if the attempted transmis-
sion results in receipt of an access granting message and
access to the electronic content is denied if the attempted
transmission does not result in receipt of an access granting
message.
69. The computer program of claim 66 in which access to
the electronic content is denied if no notification information
is collected.
70. The computer program of claim 66 in which the
electronic content is included in an attachment to an e-mail
message.
71. The computer program of claim 66, in which the
attempt to transmit the collected notification information
comprises sending the notification information to an address
associated with an originator of the e-mail message.
72. The computer program of claim 66 in which the
attempt to transmit the collected notification information
comprises sending the notification information to an address
other than an address associated with an originator of the
e-mail message.
73. The computer program of claim 66 in which the
attempt to transmit the collected notification information
comprises sending the notification information to an intermediate server that routes the notification information to the
address.
74. A method of tracking electronic content, the method
comprising the steps of:
producing an envelope that includes electronic content
and executable instructions;
sending the envelope by a sender to a first recipient;
transmitting the envelope from the first recipient to one or
more successive recipients; and
transmitting notification information to another address
other than an address from which the envelope was
transmitted to the one or more successive recipients,
wherein the executable instructions collects notification
information from a computer of each successive recipient and attempts to transmit the collected notification
information to the another address when triggered by
an event, and
wherein the executable instructions denies access to the
electronic content at each successive recipient until one
of an access granting message is received and the
notification message is successfully transmitted.
75. The method of claim 74, further including the step of
retransmitting the envelope from the one or more successive
recipient to another successive recipient.
76. The method of claim 74, wherein the executable
instructions grants partial access to the electronic content
before an access granting message is received.
77. The method of claim 74, wherein the one or more
successive recipient notification information includes at
least one of successive recipient demographic attributes,
successive recipient computer user identifier, summary of
electronic content viewing, and successive recipient computer identifier.
78. The method of claim 74, wherein the triggering event
includes one of attempting to access the electronic content,
viewing the electronic content, using the electronic content,
and listing the electronic content.
5
10
15
20
25
30
35
40
45
50
55
60
* * * * *
UNITED STATES PATENT AND TRADEMARK OFFICE
CERTIFICATE OF CORRECTION
PATENT NO.
: 6,751,670 Bl
DATED
: June 15, 2004
INVENTOR(S) : Patrick E. Patterson
Page 1 of 1
It is certified that error appears in the above-identified patent and that said Letters Patent is
hereby corrected as shown below:
Title page, Item [54], and Column 1 ,line 1,
Title, delete "Component" and insert -- Content --.
Signed and Sealed this
Seventeenth Day of August, 2004
JONW.DUDAS
Acting Director of the United States Patent and Trademark Office
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?