Methods, systems, and devices for securing content

ABSTRACT

Methods, systems, and devices are disclosed for securing content in memory. When the content is received, the content includes a lock that prohibits reading the content from memory. Prior to expiration of the lock the content cannot be read from memory. At expiration, however, the content is then readable.

NOTICE OF COPYRIGHT PROTECTION

A portion of the disclosure of this patent document and its figurescontain material subject to copyright protection. The copyright ownerhas no objection to the facsimile reproduction by anyone of the patentdocument or the patent disclosure, but otherwise reserves all copyrightswhatsoever.

BACKGROUND

This application generally relates to pathfinding or routing inmultiplex communications and to interactive video distribution systemsand, more particularly, to storing and queuing arrangements and to videodistribution systems with local interaction.

Bandwidth is becoming a problem in the communications industry. Assubscribers demand more and more content, interactive services,on-demand services, and data services, the existing networkinfrastructure has trouble supplying adequate bandwidth. The industry ishard at work identifying new ways of increasing bandwidth. The industryis also striving to efficiently utilize current bandwidth capacity toprovide the services that subscribers desire.

Prepositioning content is one example of efficient utilization.Prepositioning content involves sending or shifting content during lullsin demand. As those of ordinary skill in the art recognize, networkbandwidth is constant, yet subscriber demand is not constant. Networkbandwidth is taxed during times of peak demand (e.g., during businesshours), yet nights and weekends have excess bandwidth. Because theoff-peak hours have excess available bandwidth, content and serviceproviders try to send, or preposition, content during these lulls indemand.

Security, however, is a concern with prepositioning. When content issent during lulls in demand, the subscriber may receive the contenthours, or even days, in advance. Network broadcast television shows, forexample, may be sent during the off-peak hours to conserve bandwidth.Broadcasters, advertisers, and marketers, however, often do not wanttheir media campaigns seen by customers/subscribers prior to schedulednetwork broadcast times. Even though broadcast programs and othercontent are prepositioned during off-peak hours, the content should besecured to prevent unauthorized or untimely access. What is needed,then, are methods, systems and products for securing content thatprohibit access prior to a scheduled date and time.

SUMMARY

The aforementioned problems, and other problems, are reduced, accordingto exemplary embodiments, by methods, systems, and devices that securecontent. These exemplary embodiments describe how movies, music,television programs, and, in general, content files may be secured toprohibit access until a scheduled date and time. When content isprepositioned to a subscriber's set-top box, television, computer, orother device, these exemplary embodiments secure that content torestrict or even prohibit reading the content from memory. The contentis unreadable until expiration of a lock. The lock is an electronic orsoftware mechanism that prevents an operating system from reading a filefrom memory until a scheduled date and/or time. The content file isunreadable prior to the scheduled date and time, but the content filemay be accessed at or afterwards the scheduled date and time. The lockthus allows network broadcast programs to be downloaded and securelystored during off-peaks hours. At the scheduled date and time (such asthe scheduled network broadcast for a sitcom episode), exemplaryembodiments release the lock and allow the content file to be read frommemory. So, even if the content is sent hours or even days in advance,exemplary embodiments prohibit access until expiration of the lock.Exemplary embodiments, however, may permit the subscriber to purchase anearly viewing or listening option that allows the subscriber toexperience the content prior to the scheduled date and time.

Exemplary embodiments secure content in memory. When content isreceived, the content includes a lock. The content is then stored in thememory. The lock, however, prohibits reading the content from the memoryuntil expiration of the lock. The content is unreadable from the memoryuntil the lock expires.

According to more exemplary embodiments, a device is also disclosed thatsecures content. The device comprises a processor communicating withmemory. The processor receives content having a lock. The lock prohibitsreading the content from the memory until expiration of the lock. Theprocessor stores the content in the memory, thereby securing thecontent.

Exemplary embodiments also include a computer-readable medium. Thecomputer-readable medium stores instructions for receiving and storingcontent. The content has a lock that prohibits reading the content frommemory until expiration of the lock. Prior to expiration the content isunreadable, thereby securing the content in the memory.

Other systems, methods, and/or devices according to exemplaryembodiments will be or become apparent to one with ordinary skill in theart upon review of the following drawings and detailed description. Itis intended that all such additional systems, methods, and/or devices beincluded within this description, be within the scope of the exemplaryembodiments, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages of the exemplaryembodiments are better understood when the following DetailedDescription is read with reference to the accompanying drawings,wherein:

FIG. 1 is a simplified schematic illustrating an operating environmentaccording to the exemplary embodiments;

FIG. 2 is a schematic illustrating a lock, according to exemplaryembodiments;

FIG. 3 is a schematic further illustrating the lock, according to moreexemplary embodiments;

FIG. 4 is a schematic further illustrating the lock, according to stillmore exemplary embodiments;

FIG. 5 is a schematic further illustrating the lock, according to yetmore exemplary embodiments;

FIGS. 6 and 7 are schematics showing application of the lock to networkbroadcasting, according to even more exemplary embodiments;

FIG. 8 is a block diagram of exemplary details of a device shown inFIGS. 1-7; and

FIGS. 9 and 10 are flowcharts illustrating a method of securing content,according to exemplary embodiments.

DETAILED DESCRIPTION

The exemplary embodiments now will be described more fully hereinafterwith reference to the accompanying drawings. The reader shouldrecognize, however, that exemplary embodiments may have many differentforms and should not be construed as limited to the embodiments setforth herein. These embodiments are provided so that this disclosurewill be thorough and complete and will fully convey to those of ordinaryskill in the art. Moreover, all statements herein reciting exemplaryembodiments, as well as specific examples thereof, are intended toencompass both structural and functional equivalents thereof.Additionally, it is intended that such equivalents include bothcurrently known equivalents as well as equivalents developed in thefuture (i.e., any elements developed that perform the same function,regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill inthe art that the diagrams, schematics, illustrations, and the likerepresent conceptual views or processes illustrating the exemplaryembodiments. The functions of the various elements shown in the figuresmay be provided through the use of dedicated hardware as well ashardware capable of executing associated software. Functions may becarried out through the operation of program logic, through dedicatedlogic, through the interaction of program control and dedicated logic,or even manually, the particular technique being selectable by exemplaryembodiments. Those of ordinary skill in the art further understand thatthe exemplary hardware, software, processes, methods, and/or operatingsystems described herein are for illustrative purposes and, thus, arenot intended to be limited to any particular named manufacturer.

The exemplary embodiments describe methods, systems, and devices thatsecure content. These exemplary embodiments describe how movies, music,television programs, and content files in general may be secured toprohibit access until a scheduled date and time. When content isprepositioned to a subscriber's set-top box, television, computer, orother device, these exemplary embodiments secure that content torestrict or even prohibit reading the content from memory. The contentis unreadable until expiration of a lock. The lock is an electronic orsoftware mechanism that prevents an operating system from reading a filefrom memory until a scheduled date and/or time. The content file isunreadable prior to the scheduled date and time, but the content filemay be accessed at or afterwards the scheduled date and time. The lockthus allows network broadcast programs to be downloaded and securelystored during off-peaks hours. At the scheduled date and time (such asthe scheduled network broadcast for a sitcom episode), exemplaryembodiments release the lock and allow the content file to be read frommemory. So, even if the content is sent hours or even days in advance,exemplary embodiments prohibit the subscriber from accessing the contentuntil expiration of the lock. Exemplary embodiments, however, may permitthe subscriber to purchase an early viewing or listening option thatallows the subscriber to experience the content prior to the scheduleddate and time.

FIG. 1 is a simplified schematic illustrating exemplary embodiments.FIG. 1 shows a device 10 receiving content 12 via a communicationsnetwork 14. Although the device 10 is generically shown, the device 10can be any consumer electronics device, appliance, orprocessor-controlled system. The device 10, for example, may be a set-tobox, a television, or a set-top box integrated with a television. Thedevice 10, however, may also be an analog/digital recorder, CD/DVDplayer/recorder, audio equipment, receiver, tuner, and/or any otherconsumer electronic device. The device 10 may also include any computer,peripheral device, camera, modem, storage device, telephone, personaldigital assistant, and/or mobile phone. The communications network 14may be a cable network operating in the radio-frequency domain and/orthe Internet Protocol (IP) domain. The communications network 14,however, may also include a distributed computing network, such as theInternet (sometimes alternatively known as the “World Wide Web”), anintranet, a local-area network (LAN), and/or a wide-area network (WAN).The communications network 14 may include coaxial cables, copper wires,fiber optic lines, and/or hybrid-coaxial lines. The communicationsnetwork 14 may even include wireless portions utilizing any portion ofthe electromagnetic spectrum and any signaling standard (such as theI.E.E.E. 802 family of standards).

As FIG. 1 shows, the device 10 receives the content 12 via thecommunications network 14. The content 12 may have any analog and/ordigital format and may be any type of file. The content 12, for example,may be a video file, television programming, streaming data, audiofiles, pictures, or any other media content. When the device 10 receivesthe content 12, the content 12 includes a lock 16. According to anexemplary embodiment, the lock 16 is an electronic or software mechanismthat prevents a processor 20 within the device 10 from reading a filefrom memory. The lock 16 secures the content such that when the content12 is stored in memory 18 of the device 10, the content is unreadableuntil expiration of the lock 16. That is, prior to expiration the lock16 prevents the processor 20 from reading the content 12 from the memory18. In this manner, the content 12 is securely stored and madeinaccessible by the lock 16. The lock 16 may even configure fileattributes that “hide” the content 12 from memory directory structures.When the lock 16 expires, however, the content 12 is then readable fromthe memory 18.

FIG. 2 is a schematic further illustrating a lock, according toexemplary embodiments. Here the lock 16 is defined by a date 21 and/orby a time 22. The processor 20 is unreadable to read the content 12 fromthe memory 18 prior to the date 21 and/or prior to the time 22. At thedefined date 21 and time 22, however, the lock 16 expires, thusreleasing the lock 16. If, for example, the lock 16 is defined as Jan.1, 2006 at 8 P.M., then the content 12 will be unreadable prior to thatdate and time. At the defined date 21 and time 22, however, the lock 16expires, and the content 12 may then be read from the memory 18.

FIG. 3 is a schematic further illustrating a lock, according to moreexemplary embodiments. Here the lock 16 is defined by an accessauthorization 24. The access authorization 24 prohibits an unauthorizedentity from reading the content 12 from the memory 18. If, for example,the access authorization 24 specifies a particular user, then anyone notmatching that particular user (via a username, account number, login, orother identifying information) is prohibited from accessing the content12. If any entity provides information that matches the accessauthorization 24, then that entity may retrieve the content 12 stored inthe memory 18.

FIG. 4 is a schematic further illustrating a lock, according to yet moreexemplary embodiments. Here the lock 16 comprises a flag 26. The flag 26is associated with the content 12, and the flag 24 is again defined bythe date 21 and/or by the time 22 at which the content 12 may be readfrom the memory 18. The flag 26 may also be defined by the accessauthorization (shown as reference numeral 24 in FIG. 3). The flag 26 maybe a file attribute or file property of the content 12.

Here the flag 26 cooperates with a scheduling service 28. The schedulingservice 28 is a computer program stored in the memory 18. The schedulingservice 28 compares a system clock 30 to the defined date 21 and/or thedefined time 22 of the flag 26. The system clock 30 provides a currentsystem date 32 and a current system time 34. If the system date 32 andthe system time 34 are prior to the defined date 21 and/or the definedtime 22 of the flag 26, then the flag 26 prohibits the content 12 frombeing read from memory 18. When, however, the system date 32 and thesystem time 34 equal the defined date 21 and defined time 22 of the flag26, the lock 16 expires and the content 12 is readable from the memory.

FIG. 5 is a schematic further illustrating a lock, according to yet moreexemplary embodiments. Here the lock 16 is defined by the date 21, thetime 22, and a task 40. As the device 10 receives and stores the content12, the lock 16 creates a task entry 42 in a table 44 of tasks. Thetable 44 of tasks is stored in the memory 18 of the device 10. Thescheduling service 28 compares the system date 32 and the system time 34with each entry in the table 44 of tasks. Each task entry 46 isassociated with a task time 48 and a task date 50. When the system date32 and the system time 34 match the task date 48 and the task time 50associated with any task entry, then the scheduling service 28 performsthe associated task.

In this embodiment, then, the lock 16 is defined by the date 21, thetime 22, and the task 40. The lock 16 creates the task entry 42 in thetable 44 of tasks. The scheduling service 28 continually compares thesystem date 32 and the system time 34 with the entries in the table 44of tasks. When the system date 32 and the system time 34 match the taskentry 42, the scheduling service 28 performs the task 40. As FIG. 5illustrates, here the task 40 changes a status 50 of the flag 26 toallow the content 12 to be read from memory 18. The status 50 changes afile attribute of the content 12 from “unreadable” to “readable,” thuspermitting the content 12 to be read from the memory 18. The task 40 mayeven include an execute function 52 that causes the content 12 toautomatically launch at the defined date 21 and/or at the defined time22. So, whatever the content 12 represents (e.g., video, music, or anapplication program), the content 12 is read from memory 18 andautomatically presented, or launched, for the user.

FIG. 6 is a schematic applying a lock to network broadcasting, accordingto still more exemplary embodiments. Here the device 10 is a set-top box60 (and perhaps integrated with a television) that receives the content12 via the communications network 14. Although the content 12 is shownas Internet Protocol television (“IPTV”) data packets 62, the content12, as before, may be any video, audio, or file having any format. Thecontent 12, in fact, may be any packetized information. The content 12for example, could be any content that serves as a control channel forcontrolling viewed media, e.g., television programming or other mediacontent. The Internet Protocol television data packets 62 correspondwith cable or broadcast television programming, although formatted in apacketizing scheme, as is known to those of ordinary skill in the art.Because the communications network 14 is bandwidth constrained, thecontent 12 may be communicated to the set-top box 60 during off-peakhours to conserve bandwidth.

The set-top box 60 stores the content 12. The set-top box 60 receivesthe Internet Protocol television data packets 62 and stores the packetsin the memory 18. Because the Internet Protocol television data packets62 may be received and stored during off-peak hours, the programmingcould be received hours, or even days, before a scheduled networkbroadcast. That is, the latest episode of “The Apprentice” might bereceived hours, or days, before its scheduled primetime showing. Networkbroadcasters, then, may wish to prevent subscribers, viewers, and usersfrom accessing the content 12 prior to its scheduled timeslot.

The lock 16 prohibits early access. When the Internet Protocoltelevision data packets 62 are received and stored, the downloaded fileincludes the lock 16. The lock 16, as earlier described, is defined bythe date 21, the time 22, and the task 40. The defined date 21 and thedefined time 22 correspond to the scheduled broadcast date and time forthe program (e.g., the network's scheduled broadcast time for “TheApprentice”). The task 40 is added to the table 44 of tasks, and thescheduling service 28 begins comparing entries. The scheduling service28 compares the system date 32 and the system time 34 with each taskentry in the table 44 of tasks. When the system date 32 and the systemtime 34 match the scheduled broadcast date and time for the program(again, the network's scheduled broadcast time for “The Apprentice”),the scheduling service 28 performs the task 40 associated with the lock16. The scheduling service 28, in this embodiment, changes a fileattribute from “unreadable” to “readable,” thus permitting the InternetProtocol television data packets 62 to be read from the memory 18. Thelatest episode of “The Apprentice,” for example, is now available forviewing. The task 40 may even include automatically reading andlaunching the latest episode, if so configured and if the set-top box 60is electrically powered and “on.” The subscriber, of course, may deferviewing to a later time, but the lock 16 prohibits the subscriber from“previewing” the episode prior to its schedule network broadcast dateand time.

FIG. 7 is a schematic further applying a lock to network broadcasting,according to even more exemplary embodiments. FIG. 7 is similar to FIG.6, although here the lock 16 includes an “early”viewing/listening/experiencing option 70. The lock 16, as earlierexplained, prohibits the subscriber from previewing movies, programs,music, and other content prior to a scheduled date and time. The earlyviewing option 70, however, allows the subscriber an opportunity toexperience the content 12 prior to the scheduled date and time.

The lock 16, as before, is defined by the date 21, the time 22, and thetask 40. Here, however, the task 40 includes a scheduled prompt 72. Thatis, the task 40 includes a nested sub-task 74 that is added to the table44 of tasks. When the system date 32 and the system time 34 match thedate and time associated with the sub-task 74, the scheduling service 28launches the scheduled prompt 72 routine. The scheduled prompt 72 isvisually or audibly presented on the device 10. The scheduled prompt 72prompts the subscriber to purchase an early viewing/listening option.The scheduled prompt 72 is visually and/or audibly presented to thesubscriber some minutes, hours, or days prior to the scheduled date andtime for the content 12. The network broadcaster, again using “TheApprentice” as an example, may offer some or all subscribers anopportunity to view the latest episode one (1) hour prior to thescheduled primetime slot. (One hour, of course, is only an example—thescheduled prompt 72 may occur at any time.) If the subscriber wishes topurchase this option, the subscriber enters the proper response thataccepts the early viewing option. The sub-task 74 then reconfigures thelock 16 such that the latest episode of the “The Apprentice” is readableone hour prior to the scheduled broadcast. If payment is required forthis early viewing option, then the service provider or some otherbilling entity makes the appropriate notations. Payment information(such as an account number, credit card number, communications address,telephone number, and/or payment amount) is communicated from the device10 to the service provider via the communications network 14.

The “early” viewing/listening/experiencing option 70 may be configured.The “early” viewing/listening/experiencing option 70, for example, maypermit the subscriber to preview all, or only a portion of, a movie,program episode, or other content. The lock 16, as earlier explained,prohibits the subscriber from previewing movies, programs, music, andother content prior to a scheduled date and time. The “early” option 70,however, may permit the subscriber to preview the first five (5) minutesof content without payment. That is, the subscriber may freely unlockonly a portion of “The Apprentice” (or some other content). After thatportion has been viewed, heard, or experienced, the subscriber isprompted to unlock the remaining content. The scheduled prompt 72prompts the subscriber to unlock the remaining portion. Payment or othercompensation may be required to unlock the remaining portion.

The lock 16 may also have other features. The lock 16 may have anauto-delete feature that automatically deletes the content 12 frommemory. The lock 16, for example, may create a task entry in the table44 of tasks that deletes the content 12 after an amount of time. Thecontent provider may not wish to have the content 12 indefinitelyavailable on the subscriber's device 10. The content provider, then,would configure the lock 16 to include a task that automatically deletesthe content 12 after a predetermined time or date.

The lock 16 may also disable copy commands. The content provider 12 maynot want the subscriber to copy the downloaded content 12 to anotherdevice or memory location. The lock 16, then, may also include a taskthat sets a file attribute as “read-only,” thus preventing the content12 from being copied or moved.

FIG. 8 is a block diagram of exemplary details of the device 10 shown inFIGS. 1-7. The device 10 can be any device, such as an analog/digitalrecorder, television, CD/DVD player/recorder, audio equipment, receiver,tuner, and/or any other consumer electronic device. The device 10 mayalso include any computer, peripheral device, camera, modem, storagedevice, telephone, personal digital assistant, and/or mobile phone. Thedevice 10 may also be configured as a set-top box (“STB”) receiver thatreceives and decodes digital signals. The device 10, in fact, can be anyprocessor-controlled electronic/electrical device that has an input 80for receiving the requested content (shown as reference numeral 12 inFIGS. 1-7). The input 80 may include a coaxial cable interface 82 forreceiving signals via a coaxial cable (not shown). The input 80 mayadditionally or alternatively include an interface to a fiber opticline, to a telephone line (such as an RJ-48/56), to other wiring, and toany male/female coupling. The device 10 includes one or more processors86 executing instructions 88 stored in a system memory device. Theinstructions 88, for example, are shown residing in a memory subsystem90. The instructions 88, however, could also reside in flash memory 92or a peripheral storage device 94. When the processor 86 executes theinstructions 88, the processor 86 may also establish the lock 16. Theprocessor 86 may establish the lock 16 by executing a set 96 of lockinstructions stored in the system memory device. The one or moreprocessors 86 may also execute an operating system that controls theinternal functions of the device 10. A bus 98 may communicate signals,such as data signals, control signals, and address signals, between theprocessor 86 and a controller 100. The controller 100 provides abridging function between the one or more processors 86, any graphicssubsystem 102 (if desired), the memory subsystem 90, and, if needed, aperipheral bus 104. The peripheral bus 104 may be controlled by thecontroller 100, or the peripheral bus 104 may have a separate peripheralbus controller 106. The peripheral bus controller 106 serves as aninput/output hub for various ports. These ports include the inputterminal 82 and perhaps at least one output terminal. The ports may alsoinclude a serial and/or parallel port 108, a keyboard port 110, and amouse port 112. The ports may also include one or more external deviceports 114, networking ports 116 (such as SCSI or Ethernet), and a USBport 118. The device 10 may also include an audio subsystem 120. Thedevice 10 may also include a display device (such as LED, LCD, plasma,or any other) to present instructions, messages, tutorials, and otherinformation to a user. The device 10 may further include one or moreencoders, one or more decoders, input/output control, logic, one or morereceivers/transmitters/transceivers, one or more clock generators, oneor more Ethernet/LAN interfaces, one or more analog-to-digitalconverters, one or more digital-to-analog converters, one or more“Firewire” interfaces, one or more modem interfaces, and/or one or morePCMCIA interfaces. Those of ordinary skill in the art understand thatthe program, processes, methods, and systems described herein are notlimited to any particular architecture or hardware.

The processors 86 may be implemented with a digital signal processor(DSP) and/or a microprocessor. Advanced Micro Devices, Inc., forexample, manufactures a full line of microprocessors (Advanced MicroDevices, Inc., One AME Place, P.O. Box 3453, Sunnyvale, Calif.94088-3453, 408.732.2400, 800.538.8450, www.amd.com). The IntelCorporation also manufactures a family of microprocessors (IntelCorporation, 2200 Mission College Blvd., Santa Clara, Calif. 95052-8119,408.765.8080, www.intel.com). Other manufacturers also offermicroprocessors. Such other manufacturers include Motorola, Inc. (1303East Algonquin Road, P.O. Box A3309 Schaumburg, Ill. 60196,www.Motorola.com), International Business Machines Corp. (New OrchardRoad, Armonk, N.Y. 10504, (914) 499-1900, www.ibm.com), and TransmetaCorp. (3940 Freedom Circle, Santa Clara, Calif. 95054,www.transmeta.com). Texas Instruments offers a wide variety of digitalsignal processors (Texas Instruments, Incorporated, P.O. Box 660199,Dallas, Tex. 75266-0199, Phone: 972-995-2011, www.ti.com) as well asMotorola (Motorola, Incorporated, 1303 E. Algonquin Road, Schaumburg,Ill. 60196, Phone 847-576-5000, www.motorola.com). There are, in fact,many manufacturers and designers of digital signal processors,microprocessors, controllers, and other componentry that are describedin this patent. Those of ordinary skill in the art understand that thiscomponentry may be implemented using any suitable design, architecture,and manufacture. Those of ordinary skill in the art, then, understandthat the exemplary embodiments are not limited to any particularmanufacturer's component, or architecture, or manufacture.

The memory (shown as memory subsystem 90, flash memory 92, or peripheralstorage device 94) may also contain an application program. Theapplication program cooperates with the operating system and with avideo display device to provide a Graphical User Interface (GUI). Thegraphical user interface provides a convenient visual and/or audibleinterface with a user of the device 10.

FIGS. 9 and 10 are flowcharts illustrating a method of securing content.The content is received, and the content has a lock that prohibitsreading the content from memory until expiration of the lock (Block200). The lock may be defined by a date prior to which the content isunreadable from the memory (Block 202). The lock may additionally oralternatively be defined by a time prior to which the content isunreadable from the memory (Block 204). The lock may additionally oralternatively be defined by an access authorization that prohibitsunauthorized reading the content from the memory (Block 206). The lockmay comprise a flag defined by a date and a time at which the contentmay be read from the memory, and prior to the flag the content isunreadable (Block 208). The lock may define a task, and the task isadded to a table of tasks (Block 210).

The flowchart continues with FIG. 10. A system date and a system timeare compared to the flag (Block 212). If the system date and the systemtime equal the flag, then a scheduling system executes any tasksassociated with the flag (Block 214). The scheduling system may change astatus of the flag to permit reading the content from the memory (Block216).

The lock 16 may be physically embodied on or in a computer-readablemedium. This computer-readable medium may include CD-ROM, DVD, tape,cassette, floppy disk, memory card, and large-capacity disk (such asIOMEGA®, ZIP®, JAZZ®, and other large-capacity memory products (IOMEGA®,ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W.Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com). Thiscomputer-readable medium, or media, could be distributed to end-users,licensees, and assignees. These types of computer-readable media, andother types not mention here but considered within the scope of theembodiments, allow the lock 16 to be easily disseminated. A computerprogram product for securing content files includes computer-readableinstructions stored on the computer-readable medium. Content isreceived, and the content has a lock that prohibits reading the contentfrom memory until expiration of the lock. The content is stored in thememory, thereby securing the content until expiration of the lock.

The lock may also be physically embodied on or in any addressable (e.g.,HTTP, I.E.E.E. 802.11, Wireless Application Protocol (WAP)) wire line orwireless device capable of presenting an IP address. Examples couldinclude a computer, a wireless personal digital assistant (PDA), anInternet Protocol mobile phone, or a wireless pager.

While exemplary embodiments have been described with respect to variousfeatures, aspects, and embodiments, those skilled and unskilled in theart will recognize the exemplary embodiments are not so limited. Othervariations, modifications, and alternative embodiments may be madewithout departing from the spirit and scope of the exemplaryembodiments.

1. A method of securing content, comprising: receiving the content, thecontent having a lock that prohibits reading the content from memoryuntil expiration of the lock; and storing the content in the memory,thereby securing the content in the memory.
 2. A method according toclaim 1, wherein the lock comprises a flag, the flag defined by a dateand a time at which the content may be read from the memory, and priorto the flag the content is unreadable from the memory.
 3. A methodaccording to claim 1, wherein the lock comprises a preview option thatpermits reading the content from the memory prior to the expiration ofthe lock.
 4. A method according to claim 1, wherein the lock comprises apreview option that permits reading only a portion of the content fromthe memory prior to the expiration of the lock.
 5. A method according toclaim 1, further comprising communicating payment information for apreview option, the preview option permitting reading the content fromthe memory prior to the expiration of the lock.
 6. A method according toclaim 2, further comprising comparing a system date and a system time tothe flag.
 7. A method according to claim 6, wherein when the system dateand the system time equal the flag, then changing a status of the flagto permit reading the content from the memory.
 8. A method according toclaim 1, further comprising automatically deleting the content from thememory after a predetermined time.
 9. A method according to claim 1,further comprising setting a file attribute of the content to disablecopying the content from the memory.
 10. A device, comprising: aprocessor communicating with memory, the processor receiving contenthaving a lock that prohibits reading the content from the memory untilexpiration of the lock, wherein the processor stores the content in thememory, thereby securing the content.
 11. A device according to claim10, wherein the lock comprises a flag, the flag defined by a date and atime at which the content may be read from the memory, and prior to theflag the content is unreadable from the memory.
 12. A device accordingto claim 10, wherein the lock comprises a preview option that permitsreading the content from the memory prior to the expiration of the lock.13. A device according to claim 10, wherein the lock comprises a previewoption that permits reading only a portion of the content from thememory prior to the expiration of the lock.
 14. A device according toclaim 10, wherein the processor communicates payment information for apreview option, the preview option permitting reading the content fromthe memory prior to the expiration of the lock.
 15. A device accordingto claim 11, wherein the processor compares a system date and a systemtime to the flag.
 16. A device according to claim 15, wherein when thesystem date and the system time equal the flag, then the processorchanges a status of the flag to permit reading the content from thememory.
 17. A device according to claim 10, wherein the processorautomatically deletes the content from the memory after a predeterminedtime.
 18. A device according to claim 10, wherein the processor sets afile attribute of the content to disable copying the content from thememory.
 19. A computer-readable medium storing instructions forperforming the steps of: receiving content having a lock that prohibitsreading the content from memory until expiration of the lock; andstoring the content in the memory, thereby securing the content in thememory.
 20. A computer-readable medium according to claim 19, furthercomprising instructions for defining the lock as a flag, the flagdefined by a date and a time at which the content may be read from thememory, and prior to the flag the content is unreadable from the memory.21. A computer-readable medium according to claim 19, further comprisinginstructions for a preview option that permits reading the content fromthe memory prior to the expiration of the lock.
 22. A computer-readablemedium according to claim 19, further comprising instructions for apreview option that permits reading only a portion of the content fromthe memory prior to the expiration of the lock.
 23. A computer-readablemedium according to claim 20, further comprising instructions forcomparing a system date and a system time to the flag, and when thesystem date and the system time equal the flag, then changing a statusof the flag to permit reading the content from the memory.
 24. Acomputer-readable medium according to claim 19, further comprisinginstructions for automatically deleting the content from the memoryafter a predetermined time.
 25. A computer-readable medium according toclaim 19, further comprising instructions for setting a file attributeof the content to disable copying the content from the memory.