US20030225700A1 - System and method for graphical rights expressions - Google Patents
System and method for graphical rights expressions Download PDFInfo
- Publication number
- US20030225700A1 US20030225700A1 US10/388,171 US38817103A US2003225700A1 US 20030225700 A1 US20030225700 A1 US 20030225700A1 US 38817103 A US38817103 A US 38817103A US 2003225700 A1 US2003225700 A1 US 2003225700A1
- Authority
- US
- United States
- Prior art keywords
- recited
- rights expression
- graphical representation
- expression information
- glyph
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000014509 gene expression Effects 0.000 title claims abstract description 212
- 238000000034 method Methods 0.000 title claims abstract description 89
- 238000001514 detection method Methods 0.000 claims description 6
- 230000003068 static effect Effects 0.000 claims description 4
- 230000009471 action Effects 0.000 description 22
- 238000004891 communication Methods 0.000 description 15
- 230000000875 corresponding effect Effects 0.000 description 15
- 230000008569 process Effects 0.000 description 15
- 238000009877 rendering Methods 0.000 description 14
- 239000003086 colorant Substances 0.000 description 12
- 238000012545 processing Methods 0.000 description 11
- 238000001994 activation Methods 0.000 description 9
- 230000001276 controlling effect Effects 0.000 description 8
- 230000004075 alteration Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 7
- 230000004913 activation Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000015654 memory Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 230000002829 reductive effect Effects 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000006835 compression Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000003909 pattern recognition Methods 0.000 description 3
- 238000002360 preparation method Methods 0.000 description 3
- 230000010076 replication Effects 0.000 description 3
- 239000000758 substrate Substances 0.000 description 3
- KJLPSBMDOIVXSN-UHFFFAOYSA-N 4-[4-[2-[4-(3,4-dicarboxyphenoxy)phenyl]propan-2-yl]phenoxy]phthalic acid Chemical compound C=1C=C(OC=2C=C(C(C(O)=O)=CC=2)C(O)=O)C=CC=1C(C)(C)C(C=C1)=CC=C1OC1=CC=C(C(O)=O)C(C(O)=O)=C1 KJLPSBMDOIVXSN-UHFFFAOYSA-N 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000001429 visible spectrum Methods 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000010339 dilation Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000003628 erosive effect Effects 0.000 description 1
- 238000009432 framing Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000000877 morphologic effect Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1073—Conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
- H04N21/83555—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed using a structured language for describing usage rules of the content, e.g. REL
Definitions
- This invention generally relates to controlling use of content, or other items, through usage rights associated with the content or other items, and more particularly to a system and method for expressing usage rights for content or other items based symbolic representations, such as graphical representations, modulated signal representations, and the like.
- DRM Digital Rights Management
- U.S. Pat. No. 5,634,012 discloses a DRM system for controlling the distribution of digital content, wherein devices of the DRM system can include a repository associated therewith.
- a predetermined set of usage transaction steps define a protocol used by the repositories for enforcing usage rights associated with the content.
- Usage rights persist with the content and the usage rights associated with the content comprise a digital work.
- the usage rights can permit various manners of use of the content, such as a right to view or print or display the content, a right to use the content only once, a right to distribute or redistribute the content, and the like. Such usage rights can be made contingent on payment or other conditions.
- the invention is a method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression.
- the method comprises specifying rights expression information indicating a manner of use of an item and generating a graphical representation of the rights expression information.
- the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
- a system for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression comprises means for specifying rights expression information indicating a manner of use of an item and means for generating a graphical representation of the rights expression information.
- the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
- a rights expression comprising rights expression information indicating a manner of use of an item and a graphical representation of said rights expression information.
- the graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
- FIG. 1 is a schematic illustration of an exemplary Digital Rights Management system on which various embodiments of the present invention can be implemented;
- FIG. 2 illustrates a set of 8 symbols, derived from a circle, that can be used for expressing rights expressions
- FIG. 3 illustrates a set of 4 symbols, derived from a rectangle, that can be used for expressing rights expressions
- FIGS. 4 - 6 illustrate sets of 8 symbols, derived from circular structures, that can be used for expressing rights expressions
- FIGS. 7 - 8 illustrate sets of 8 symbols, derived from the 4 sides and 2 diagonals of square structures, that can be used for expressing rights expressions;
- FIG. 9 illustrates a set of 4 symbols, derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
- FIG. 10 illustrates a set of 4 symbols, derived from the 4 corners of a square structure, that can be used for expressing rights expressions
- FIG. 11 illustrates a set of 8 symbols, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
- FIG. 12 illustrates a set of 8 symbols, derived from a circular structure, that can be used for expressing rights expressions
- FIG. 13 illustrates a set of 5 symbols, using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions;
- FIG. 14 illustrates a set of 4 symbols, derived from a circular structure, that can be used for expressing rights expressions
- FIG. 15 illustrates a set of 12 symbols, derived from a star shape structure, in three different colors, Red (R), Green (G), and Blue (B), that can be used for expressing rights expressions;
- FIG. 16 illustrates an exemplary embodiment for combining the symbols shown in FIG. 15;
- FIG. 17 illustrates an exemplary message, read from left to right, for expressing rights expressions using the 4 symbols of the set shown in FIG. 10;
- FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set shown in FIG. 15;
- FIGS. 19 - 20 illustrate exemplary rights expressions for performing an action using the symbols of the set shown in FIG. 15;
- FIG. 21 illustrates an exemplary rights expression for the right to print 100 copies of 2 e-books with identification numbers 443 and 12 using the symbols of the set shown in FIG. 15;
- FIG. 22 illustrates an exemplary rights expression for the right to listen to music, such as playing or rendering the music, for 100 minutes for 2 pieces of music with identification numbers 443 and 13 using the symbols of the set shown in FIG. 15;
- FIG. 23 illustrates an exemplary rights expression for an e-book data record for an e-book with identification number 143 , whose owner has an IDENTIFICATION number 212 , using the symbols of the set shown in FIG. 15;
- FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, or industries, and can be custom-made for each application or industry using the symbols of the set shown in FIG. 15;
- FIGS. 25 - 26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
- U.S. Pat. No. 6,208,771 teaches method and apparatus for robust decoding of glyph address carpets
- No. 6,076,738 teaches self-clocking glyph shape codes
- No. 5,684,885 teaches binary glyph codes based on color relationships
- No. 5,864,127 teaches analog glyph detector and detector arrays
- No. 5,576,532 teaches interleaved and interlaced sync codes and address codes for self-clocking glyph codes
- No. 6,000,613 teaches self-clocking glyph code having composite glyphs for distributive encoding of multi-bit digital values
- No. 6,182,901 teaches orientational disambiguation for self-clocking glyph codes, No.
- 5,128,525 teaches convolution filtering for decoding self-clocking glyph shape codes
- No. 5,168,147 teaches binary image processing for decoding self-clocking glyph shape codes
- No. 5,091,966 teaches adaptively scaling for decoding spatially periodic self-clocking glyph shape codes.
- the exemplary embodiments described herein advantageously, leverage symbolic representations with rights expressions to express rights information related to items, such as digital content, services, abstract objects, resources, goods, and the like.
- the symbolic representations can be used to convey information, such as rights expression information, information about a grammar or language dealing with usage rights, information about access to information, and the like.
- the use of a rights expression for example, in the form of a license, and the like, can be used to define usage rights for specifying a permitted manner of use of an item, such as access to digital content, and the like.
- usage rights can be associated with one or more conditions, such as payment, and the like, that can be a prerequisite for exercising the specified manner of use of the item.
- a rights expression language such as eXtensible Rights Markup Language (XrML), and the like, for example, including predefined syntax and semantics, can be employed to express the usage rights.
- XrML eXtensible Rights Markup Language
- rights expression information corresponding to usage rights associated with content can be expressed via a graphical representation of the rights expression information.
- the graphical representation can include glyphs, machine and human-readable symbols, and other types of symbols to express the rights expression information.
- the rights expression information can be expressed via a modulated signal, such as modulated light and sound signals, and the like.
- the exemplary embodiments combine symbolic representations with rights expressions for conveying information about usage rights, conditions, access related to digital content, services, abstract objects, items, resources, and the like, in a flexible and robust manner.
- the DRM system 100 includes a user activation component in the form of an activation server 110 that issues a set of public and private key pairs 112 to a content user in a protected fashion.
- the user installs software that, for example, works with, or includes, a rendering application for a particular content format.
- the software is installed in a client environment 120 , for example, such as a computing device associated with the user.
- the software can be part of the DRM system 100 and can be used to access protected content 134 .
- the software can be activated.
- some information is exchanged between the activation server 110 and the client environment 120 .
- a client software component 122 can be downloaded and installed in the client environment 120 .
- the client software component 122 can be tamper resistant and can include the set of public and private key pairs 112 issued by the activation server 110 , as well as other components.
- a rights offer 132 can be associated with the protected content 134 and can specify usage rights 132 A that are available to an end-user, for example, when one or more corresponding conditions 132 B are satisfied.
- a license server 140 manages the encryption keys 112 and issues a license 142 for the protected content 134 .
- the license 142 can embody the actual granting of the usage rights 132 A to the end user.
- the rights offer 132 may grant the end user the right to view the protected content 134 on the condition of payment of a fee of five dollars, and the right to print the protected content on the condition of payment of a fee of ten dollars.
- the license 142 can be issued for the view right when the five dollar fee has been paid and/or for the print right when 10 dollar fee has been paid.
- the client component 122 interprets and enforces the rights that have been specified in the license 142 .
- Clear content 136 such as unprotected content, and the like, can be prepared, for example, with an application 138 , such as a document preparation application, installed on a computer 130 associated with a content publisher, a content distributor, a content service provider, or any other suitable party.
- Preparation of the clear content 136 can include specifying the usage rights 132 A and the conditions 132 B under which the clear content 136 can be used, associating the rights offer 132 with the clear content 136 , and protecting the clear content 136 with, for example, a cryptography algorithm to generate the protected content 134 .
- a rights language such as XrML, eXtensible Access Control Markup Language (XACML), Open Digital Rights Language (ODRL), and the like, can be used to specify the rights offer 132 .
- the rights offer 132 can be specified in any suitable manner.
- the phrase “specifying rights information”, as used herein, refers to creating, deriving, or other wise utilizing information that relates to rights expressions.
- the rights offer 132 can be in the form of a pre-defined specification, profile, template, and the like, that can be associated with the protected content 134 . Accordingly, the process of specifying the rights offer 132 can include any suitable process for associating rights, conditions, and the like, with content.
- the rights offer 132 associated with the protected content 134 and the encryption key 112 used to encrypt the clear content 136 can be transmitted to the license server 140 .
- a typical workflow for the DRM system 100 can include a user operating within the client environment 120 being activated for receiving the protected content 134 by the activation server 110 .
- the activation process results in the public and private key pair 112 , and, for example, some user and/or machine-specific information, and the like, being downloaded to the client environment 120 in the form of the client software component 122 .
- the activation process can be accomplished, for example, at any suitable time prior to the issuing of the license 142 .
- the user When the user wishes to use the protected content 134 , the user makes a request for the protected content 134 .
- the user might browse a Web site running on a Web server 150 , using a browser installed in the client environment 120 , and attempt to download the protected content 134 .
- the user may go through a series of steps possibly including a fee transaction, such as in the sale of content, other transactions, such as collection of information, and the like.
- the Web server 150 contacts the license server 140 , for example, through a secure communications channel, such as a channel using a Secure Sockets Layer (SSL).
- SSL Secure Sockets Layer
- the license server 140 then generates the license 142 for the protected content 134 and the Web server 150 downloads both the protected content 134 and the license 142 .
- the license 142 can include the appropriate usage rights of the usage rights 132 A and can be downloaded from the license server 140 or an associated device.
- the protected content 134 can be downloaded from the computer 130 associated with a publisher, distributor, or other party.
- the rights offer 132 can be persistent and remain associated with the protected content 134 .
- the client software component 122 in the client environment 120 can then proceed to interpret the license 142 and allow use of the protected content 134 based on the rights 132 A and the conditions 132 B specified in the license 142 .
- the interpretation and enforcement of the usage rights are further described in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,629,980, No. 5,634,012, No. 5,638,443, No. 5,715,403, No. 6,233,684, and No. 6,236,971.
- the above steps can take place sequentially, approximately simultaneously, in various orders, and the like.
- the DRM system 100 addresses security aspects of protecting the protected content 134 .
- the DRM system 100 can authenticate the license 142 that has been issued by the license server 140 .
- One way to accomplish such authentication is for the client software component 122 to determine if the licenses 142 can be trusted.
- the client software component 122 can include the capability to verify and/or validate the cryptographic signature, or other identifying characteristic of the license 142 .
- the client environment 120 and the license server 140 can receive the set of keys 112 , for example, in a tamper-resistant software package that can include other components, such as the client software component 122 for the activated client environment 120 to verify the signature of the license 142 .
- the DRM system 100 is of an exemplary nature and can be implemented in numerous other equivalent arrangements.
- the license 142 and the protected content 134 can be distributed from different entities.
- the rights offer 132 can be associated with the protected content 134 by a party other than the party preparing the protected content 134 .
- a clearinghouse 160 can be used to process payment transactions and verify payment prior to issuing the license 142 .
- the various processes and transactions can be performed, for example, via online and/or offline environments and/or combinations thereof. For example, an end user could download content to a computer and then transfer the content from the computer to a personal digital assistant (PDA).
- PDA personal digital assistant
- the end user could then buy a license for the content, for example, via a supermarket kiosk, a cash register, a prep-paid license card, and the like, and then transfer the license to the PDA.
- the end user could then activate the content for use on the PDA and/or the computer.
- the various devices can, but need not, communicate directly with one another and information can be exchanged in any suitable manner, such as by physically moving media between the devices.
- the devices and subsystems of the DRM system 100 of FIG. 1 can communicate, for example, over a communications network 170 , and can include, for example, any suitable servers, workstations, personal computers (PCs), laptop computers, PDAs, Internet appliances, set top boxes, modems, handheld devices, telephones, cellular telephones, wireless devices, other devices, and the like, capable of performing the processes of the disclosed exemplary embodiments.
- the devices and subsystems of the DRM system 100 can communicate with each other using any suitable protocol and can be implemented using a general purpose computer system.
- One or more interface mechanisms can be used in the DRM system 100 including, for example, Internet access, telecommunications in any suitable form, such as voice, modem, and the like, wireless communications media, and the like.
- communications network 170 can include, for example, wireless communications networks, cellular communications networks, satellite communications networks, Public Switched Telephone Networks (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, hybrid communications networks, combinations thereof, and the like.
- PSTNs Public Switched Telephone Networks
- PDNs Packet Data Networks
- the communications network 170 can be the same or different networks.
- the DRM system 100 of FIG. 1 is for exemplary purposes, as many variations of the specific hardware used to implement the disclosed exemplary embodiments are possible.
- the functionality of the devices and the subsystems of the DRM system 100 can be implemented via one or more programmed computer systems or devices.
- a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of the DRM system 100 .
- two or more programmed computer systems or devices can be substituted for any one of the devices and subsystems of the DRM system 100 .
- principles and advantages of distributed processing such as redundancy, replication, and the like, also can be implemented, as desired, for example, to increase the robustness and performance of the DRM system 100 .
- the exemplary embodiments of the present invention directed to symbolic representations for expressing rights information, such as the rights offer 132 , using graphical representations, such as glyph symbols, and the like, will now be described.
- the exemplary glyphs shown in FIGS. 2 - 24 can be generated in visible form, such as printed form, in digital form, such as electronic form, and the like.
- background and foreground symbols can be employed.
- background symbols can be configured to have no meaning to a human and can be employed for security purposes, such as to confuse possible hackers, while foreground symbols, which can be separated or distinguished from the background symbols based on predetermined patterns, placements, markers, codes, combination of pointers, and the like, can be configured and employed to express the rights expression information.
- random or semi-random noise, and the like can be employed in the symbols, for example, to provide further security functions or other functions.
- both the background and foreground symbols can have meaning to a human or machine, wherein the meaning of the background symbols can be used to interpret the meaning of the foreground symbols.
- the DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a predetermined manner, such as being printed on the same substrate as the first symbol, being printed at a certain physical location relative to the first symbol, and the like.
- a graphical representation of a rights expression can include a background portion and a foreground portion.
- the background portion for example, can be configured to have no meaning, unless a predetermined condition is satisfied, such as the day being Wednesday, and the like.
- the foreground portion can be configured to specify that “if you are scanning this item and its after Jul. 4, 2003, then also look at the background portion for additional information, otherwise continue to disregard the background portion.” Accordingly, various relationships between the background portion and the foreground portion can be specified with an appropriate rights expression, for example, using the graphical and other forms of the symbolic representations of the exemplary embodiments described herein.
- the symbols of exemplary embodiments also can be employed to convey redundant information.
- a corresponding reader can still be able to read the damaged ticket to extract the rights expression information based on redundant information that can be conveyed by the symbols.
- redundancy can be accomplished by overlapping or duplicating the information of some or all of the symbols to improve the accuracy of the ticket reader.
- the symbols can include a check-sum, error correction codes, and the like, for example, for verification and security purposes, to ensure that inconsistencies with the interpreted rights expression information can be resolved, and the like.
- the exemplary embodiments also are applicable for the rights expression information including digital information, such as electronic information, and the like.
- the exemplary embodiments can be used in cases where digital media, including the rights expression information, is damaged, where it is desired to have multiple ways to obtain a digital symbol, and the like.
- the symbols of the exemplary embodiments can be hidden as a non-obvious pattern, shape, and the like, in another image, pattern, and the like, which then can be detected by a suitable system, machine, device, and the like, having predetermined parameters and having predetermined knowledge about the parameters of the hidden information.
- the symbols can be part of a watermark in another image.
- Other technologies for example, special ink, such as heat sensitive ink, magnetic ink, invisible ink, ink visible under certain angles, different chemical conditions, different illumination, and the like, also can be employed for symbol generation, watermarking purposes, and the like.
- the symbols can convey information, for example, about licenses, grammar, rights expressions, rights assignments, payments, meta-data, content owners, histories regarding the content, the state of the content, encryption keys, expiration dates, digital signatures, conditions, constraints, parameters of a self-protecting document, digital works, content, digital content, resources, objects, and the like, that are available for end users to render, consume, use, distribute, and the like.
- the symbol patterns of the exemplary embodiments can be used to convey information about an action, a command, a function, a procedure, a module, a subroutine, executable code, and the like.
- the extracted information can instruct the transfer of funds to a specific account, for example, via the clearing house 160 , can instruct the transfer of an e-book to a specific address, can place a limit on distribution or transfers of content, for example, the protected content 134 , can add constraints for users of content, can destroy an encryption key, for example, the public/private key pairs 112 , after a predetermined number of times of usage of content, can stop or discontinue access to content, can transmit information about a content owner, can transmit information about content, can transmit information about a trademark owner, can transmit information about a copyright owner, can transmit information for adding up royalties and/or micro-payments, can instruct the sending of an e-mail back to a content owner about the status of content distribution, can be used combine or attach different sections, pieces,
- Such information can be recorded, updated, and the like, back onto the original content, recorded on the copies made of the original content, and the like.
- the exemplary embodiments can be employed in copy machines, cameras, video recorders, CD-writers, recording devices, duplication devices, replication devices, computing devices, rendering devices, and the like.
- the exemplary embodiments can employ spatially periodic self-clocking glyph shape codes, for example, as described in commonly-assigned U.S. Pat. No. 5,091,966, wherein decoding based on convolution filtering and morphological operations, such as erosion, dilation, opening, and closing operations, and the like, can be employed.
- decoding based on convolution filtering and morphological operations such as erosion, dilation, opening, and closing operations, and the like.
- such exemplary embodiments can tolerate a significant amount of image distortion and degrading high frequency noise.
- the exemplary embodiments also can reduce bit error rates in reading self-clocking glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,221,833, wherein a value assigned to a given glyph can be set to be different in just one bit position from values assigned to glyphs with which the given glyph is most likely to be confused.
- the exemplary embodiments can include glyphs that have a plurality of independently modulatable and readily distinguishable characteristics, such as substantially orthogonal characteristics, and the like, with appropriate design of symbol cells, such as an array of pixel positions with the corresponding pixel values for each glyph. Spatial synchronization and orientation determination, for example, for decoding purposes, can be achieved by markers or patterns, to reduce the propagation of errors.
- the exemplary embodiments can employ interleaved codes, interlaced codes, and the like, that can be encoded to facilitate the partitioning and correlation of data embedded within such glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,576,532.
- the exemplary embodiments also can employ composite glyphs and glyphs with different colors or shades, as further described herein.
- FIG. 2 illustrates a set 200 of 8 symbols 201 - 208 , derived from a circle, that can be used for expressing rights expressions.
- FIG. 3 illustrates a set 300 of 4 symbols 301 - 304 , derived from a rectangle, that can be used for expressing rights expressions.
- FIG. 4 illustrates a set 400 of 8 symbols 401 - 408 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 5 illustrates a set 500 of 8 symbols 501 - 508 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 6 illustrates a set 600 of 8 symbols 601 - 608 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 7 illustrates a set 700 of 8 symbols 701 - 708 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 8 illustrates a set 800 of 8 symbols 801 - 808 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 9 illustrates a set 900 of 4 symbols 901 - 904 , derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 10 illustrates a set 1000 of 4 symbols 1001 - 1004 , derived from the 4 corners of a square structure, that can be used for expressing rights expressions.
- FIG. 11 illustrates a set 1100 of 8 symbols 1101 - 1108 , derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions.
- FIG. 12 illustrates a set 1200 of 8 symbols 1201 - 1208 , derived from a circular structure, that can be used for expressing rights expressions.
- FIG. 13 illustrates a set 1300 of 5 symbols 1301 - 1305 , using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions.
- FIG. 14 illustrates a set 1400 of 4 symbols 1401 - 1404 , derived from a star shape structure, that can be used for expressing rights expressions.
- FIG. 15 illustrates a set 1500 of symbols, derived from the star shape structure of FIG. 14, that can be used for expressing rights expressions.
- each of the symbols 1401 - 1404 can be taken from the Red, Green, and Blue (RGB) color space.
- each of the 4 symbols 1401 - 1404 of the star shape of FIG. 14 can include the Red (R), Green (G), and/or Blue (B) colors.
- 12 symbols can be generated (for example, four symbols times three colors).
- complex symbols derived from the set 1500 of FIG. 15 and having overlapping colors can be generated, as shown in FIG. 16.
- two or more symbols of different colors can be combined so as to overlap on a physical location, to potentially produce part or all of a star shape, in different colors, or combination of colors for each part of the star shape.
- the color of the resulting horizontal symbol 1401 can be based on the combination of Green and Red symbols 1401
- the color of vertical symbol 1402 can be Green
- the color of the diagonal symbol 1403 can be Blue.
- the described combination can be used to represent a complex symbol 1601 , as shown in FIG. 16.
- a new set of complex symbols with many more choices for symbols than the set 1400 from FIG. 14, can be defined, as illustrated by FIG. 16.
- the number of complex symbols in the new set, as illustrated by FIG. 16, can be (2 12 ⁇ 1) or 4095 symbols, assuming that a blank space is not considered a symbol.
- the number of complex symbols in the new set, as illustrated by FIG. 16 can be (2 12 ⁇ 1) or 4095 symbols, assuming that a blank space is not considered a symbol.
- YMC Yellow, Magenta, and Cyan
- YMCK Yellow, Magenta, Cyan, and Black
- sensors, detectors, and the like can be used with relatively very high accuracy.
- angle detection can be made practically independent of color detection.
- errors in the angle detection can be made independent of errors in the color detection, and visa versa, advantageously, reducing error propagation, reducing the overall error rate for decoding and recognition of generated complex symbols or messages generated from the complex symbols, and the like.
- FIG. 17 An exemplary embodiment for increasing the number of members of a set is illustrated by way of example in FIG. 17.
- a message that can be read from left to right, having N words, and using the 4 symbols 1001 - 1004 of the set 1000 shown in FIG. 10 is illustrated.
- every 3 symbols, starting and reading from left to right represent a word, wherein the symbols represent the letters in a word, and each word includes 3 letters.
- the first word includes a sequence of symbols 1002 , 1004 , and 1001
- the second word includes a sequence of symbols 1003 , 1003 , and 1004
- the Nth word includes a sequence of symbols 1001 , 1002 , and 1003 , and the like.
- a set of words can be defined, wherein the number of words in the set is 4 3 or 64 (for example, four symbols with three symbols per word), assuming that a blank space is not used in a word.
- a physical-level error occurs, such as a extra line drawn on a part of the symbol, a line deleted from a part of the symbol, and the like, then one word or symbol can be confused with another one.
- This is more problematic for words with long length, such as words defined with a length of 100 symbols (for example, each word including 100 symbols in series).
- more markers for position, rotation, orientation, synchronization, and the like can be employed.
- parity codes, check-sum codes, error checking or correction schemes, and the like can be employed to help to reduce the error rate.
- some of the members of the set can be set aside, and not be used at all, for the sake of better recognition of the symbols or words, more certainty in recognition, less confusion, and the like.
- FIGS. 16 and 17 can be combined to further increase the number of members in a resulting set.
- grammar, rules, and the like can be added between the words defined in FIG. 17 to even further increase the number of members in the resulting set.
- grammar, rules, and the like can be used to specify relationships between words, order of words, meaning in the context, exceptions, and the like.
- General rules such as English grammar rules, computer language rules, algorithmic rules, grammars, such as Pascal, eXtensible Markup Language (XML), FOR-loop structures, and the like, also can be employed.
- the resulting relative large set of complex symbols or words can be used, for example, to map, represent, abbreviate, symbolize, to correspond to different complete messages, partial messages, English phrases, words, letters, partial words, compression tables, dictionaries in English or other languages, other symbols, other glypbs, other letters, other languages, logical expressions, computer commands, executables, pieces of code, other human readable languages or symbols, voices, sounds, voice recognition commands, instructions, rules, numbers, grammar, parameters of rights assignment or granting or controlling access to items, conditions, fees, dates, information about items or an owner of an item, to request for specific actions and doing those actions, such as transfer of fund or items, erasure of content, disabling or preventing access to items, with tables, databases, formulas, curves, translation schemes, predefined or dynamic mapping relationships, such non-static and variable mapping relationships, mapping relationships depending on context, situation, or other parameters, and the like.
- FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set 1500 shown in FIG. 15.
- a book identification (ID) number in a database is 245, which, for example, refers to a novel by a given author, and an access expiration date is Jul. 12, 2003.
- the first complex symbol can be used to express the phrase “Book (or resource) ID number”
- the second complex symbol can be used to express the integer “245”
- the third complex symbol can be used to express the phrase “Access/expiration date”
- the fourth complex symbol can be used to express day and month of the year (“July 12,” or 7-12)
- the fifth complex symbol can be used to express the year “2003.”
- any suitable expression, grammar, rule, and the like can be expressed based on the glyphs and/or the complex symbols of the exemplary embodiments, advantageously, to enable rights management, rights assignment, and the like.
- Additional exemplary expressions and/or grammar for rights assignment and management such as for the XrML language, grammar, expressions, statements, licenses, rights assignment, and the like, that can be expressed using the described exemplary embodiments, for example, are further described in commonly-assigned U.S. Pat. No. 5,715,403, No. 5,629,980, No. 6,236,971, No. 6,233,684, No. 5,634,012, No. 5,638,443, and No. 5,530,235.
- FIG. 19 illustrates an exemplary rights expression for performing an action expressed using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the action can be the sending of funds, 55 US Dollars, to account number 435 at a bank with ID number 212 , and the like.
- the expressed action can include any suitable type of action and can be complex in structure, for example, having hierarchical, logical, conditional, and the like, statements within its structure.
- FIG. 20 illustrates an exemplary rights expression for performing an action using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the action can be the erasing of an e-book file with the ID number 125 .
- the expressed action can include rights management actions, editing actions, combining actions, actions for transferring items, objects, or resources, and the like.
- FIG. 21 illustrates an exemplary rights expression for expressing the right to print 100 copies of 2 e-books with ID numbers 443 and 12 using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- logical phrases such as AND, OR, exclusive OR (XOR), and the like, can be employed within an exemplary rights expression.
- the glyphs employed can include their own internal logic, rules, grammar, structure, options, ordering, and the like.
- FIG. 22 illustrates an exemplary rights expression for expressing the right to listen to music, play music, render music, and the like, for 100 minutes, for 2 pieces of music with ID numbers 443 and 13, using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the music ID numbers are listed in series, one after the other, and the end of the list of ID numbers is flagged, indicated, and the like, by an glyph referred to as an “End of List of ID Nos.”
- an expressed list can be extensive, include many layers within each other, such as directories, and the like.
- FIG. 23 illustrates an exemplary rights expression for expressing an e-book data record for an e-book with ID number 143 , whose owner has an ID number 212 , using the symbols 1401 - 1404 of the set 1500 shown in FIG. 15.
- the end of the record is indicated, flagged, and the like, by a glyph referred to as “End of Data.”
- an expressed record can include additional information about the book, content owner, and the like, such as how to send payment to a content owner, and the like.
- the size of an expressed record can be of any suitable size, and the expressed record can be hierarchical, including its own directories, and the like.
- FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, industries, can be custom-made for each application or industry, and the like, using the symbols 1401 - 4104 of the set 1500 shown in FIG. 15.
- a glyph can be used to express what application the rights expression is intended for, such as e-books, movies, music, video, multimedia, and the like.
- the next glyph can be used to express the units employed for a given type of content, such a “Pages” for e-books, minutes for music and movies, Bytes for data, tracks for music, and the like.
- the next glyph can be used to express a range for the units, such as the range of pages of an e-book, and the like.
- the next two glyphs can be used to express the “Start” and “End” units for the ranges, such as 5 and 10, for expressing a range of “between pages 5 and 10,” in the case of an e-book, “between minutes 5 and 10,” in the case of a music file, and the like
- any suitable information also can be added, such as to indicate the name or the ID of an e-book, or content owner, information relevant to rights assignment or rights management, and the like.
- the glyphs of the exemplary embodiments can have flexible interpretations, can have multiple meanings, can depend on a context or application, and the like.
- the symbols, sets of symbols, and the like, of the exemplary embodiments, for example, as described with respect to FIGS. 2 - 24 can be correlated, associated, and the like, with corresponding information, such as rights expressions or portions thereof, and the like, for example, based on information that can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of DRM system 100 .
- One or more databases of the devices and subsystems of the DRM system 100 can store such information.
- the databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed herein, and the like.
- one or more glyphs can be employed so as to carry a secondary message, hidden message, and the like.
- a glyph in the case of airport security, such a glyph can be embedded on a passenger's ticket, in the case of library security, such a glyph can be embedded on a student's library card, and the like.
- a silent alarm in response to the passenger, an identified terrorist, presenting a ticket employing such a glyph, a silent alarm can be triggered to notify authorities to react to the situation in a manner that is not apparent to the terrorist.
- the exemplary embodiments can be employed to express various actions that can be initiated via a ticket, some of which may not be apparent to the ticket holder, advantageously, making it easier for authorities, and the like, to react to and/or control a given situation.
- the glyphs of the exemplary embodiments can be displayed in three dimensions, on paper, on a computer display, and the like, for example, using holographic technology, and the like.
- the glyphs of the exemplary embodiments can be secretly designed, such that it would be hard to replicate, or fake the glyphs, layers of security can be added, such as by employing watermarking, authentication, check-sum, and the like, schemes.
- the state, history, and the like,,of a system such as the DRM system 100 , content, and the like, can be encoded using the glyphs of the exemplary embodiments.
- the glyphs of the exemplary embodiments need not be printed nor be capable of being seen by a human eye, as long as the glyphs of the exemplary embodiments can be machine read, for example, using a suitable device, such as a scanner, wand, bar code reader, and the like.
- the glyphs or symbols of the exemplary embodiments need not be in forms that can be “seen” by a machine.
- the glyphs or symbols of the exemplary embodiments can be configured to be detected in some other way, such as being “heard,” and the like.
- the glyphs, symbols, words, messages, and the like, of the exemplary embodiments used to convey information can be encoded using light, sound, a series of sounds, light pulses, and the like, using at any suitable frequency, amplitude, and the like, can include ultraviolet waves, x-rays, microwaves, radio waves, and the like, can employ lasers, modulated or convoluted information, different colors or wavelengths, electric or magnetic field variations, and the like.
- Any suitable series of the glyphs, symbols, words, messages, and the like, of the exemplary embodiments employed can have its own grammar, rules, and the like, which provide a meaning to a transmitted message.
- a sound or light in a range of frequencies that a human ear or eye cannot detect can be employed for transmitting the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, during security applications, privacy applications, and the like.
- a transmitted message can be made transparent to a user or users, but at the same can be retrieved, understood, and the like, by a suitable sensor, detector, and the like.
- the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be expressed using any suitable human or machine sensing organ or device, and the like, so long as that the sensed information, message, and the like, can be quantized, digitized, expressed, and the like, based on numbers, bits, bytes, and the like.
- a device such as a touch tone telephone, and the like, can be used to transmit a sequence of sounds corresponding to the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, over a communications medium, such as a telephone line, and the like.
- the specific sounds including their sequence, duration, other factors, and the like, can be employed the represent the symbolic expression expressed by the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- an application can be used to enable a customer to engage in, for example, an online transaction that has the same effect as an application using the Internet for the online transaction, except that such a transaction can be sound based.
- rights expression information can be reduced to a series of numbers using various techniques.
- an unambiguous canonical rights expression can be converted into a binary format.
- such a binary format can be expressed as a sound, a series of sounds, and the like, and based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- a rights expression template, profile, and the like can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- such a rights expression template, profile, and the like can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- light, a series of light pulses, and the like at any suitable frequencies, including ultraviolet waves, x-rays, microwaves, radio waves, and the like, can be employed to express information, and, for example, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- the exemplary embodiments can be used to express information, such as rights expressions, and the like, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- information such as rights expressions, and the like
- any suitable rights expressions can be translated into the noted formats, and can be machine processed.
- the exemplary embodiments can provide increased efficiency, better matching of a resources to a target computational environment, such as matching a technology to a device employed, and the like.
- a user wishes to display on a personal computer screen a copy of the “Complete Works of William Shakespeare,” which the user has already obtained, and which resides in the hard drive of the personal computer of the user.
- the user can engage in an online transaction through the Internet, for example, visiting a corresponding Internet site, using the computer keyboard to provide certain information for representing a request for access to the work and the rights the user wishes to acquire, providing a credit card number to pay for the transaction, and downloading from the Internet site a digital license associated with the work authorizing the user the right to render the work by displaying the work on the personal computer screen.
- a computer program running on the personal computer can be used to interpret the license, and upon successful interpretation the user can be permitted to render the work.
- the above example can be accomplished by transmitting a series of sounds.
- the Internet site can transmit sound tones, which can be interpreted by a personal computer, other device, such as a mobile telephone, and the like, as corresponding a license granting the right to render the work.
- a touch-tone telephone system can be employed and configured to transmit and recognize the sound tones.
- Other devices can be employed and configured to transmit over a communications device other sounds, for example, with fine nuisances that are difficult to replicate, for example, for security purposes, and the like.
- a symbol in the form of a sound signal, a light signal, and the like can be transmitted and used, for example, during at checkout at an online store, and the like, to denote that an item, such as an e-book, music file, movie, and the like, is paid for and can be unlocked so as to function.
- an item such as an e-book, music file, movie, and the like
- the absence of such transmission can be used to prevent the item from being used.
- tones, frequencies, sequences of sounds or light, as noted above, and the like, as representations of symbols can be broadcast as a signal to initiate an action, series of actions, and the like.
- an owner of digital content such as a company
- a device such as a personal computer, and the like, can be offline, but can respond to the broadcast signal, for example, via a suitable device, and the like, capable of receiving the broadcasted signal.
- the broadcasted signal representation can be a command revoking or suspending licenses previously acquired authorizing devices to permit rendering or transfer of electronic files, digital works or content, specific digital works or content, and the like.
- the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be in printed or in visible form, such as in the case of a paper ticket with a glyph printed thereon, and the like.
- the ticket, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be in a digital form, such as an electronic form, and the like.
- an unauthorized person typically has to undertake a secondary activity, such as a second hacking attempt, a second decoding step, and the like, to unlock the information represented by the symbolic representation of a rights expression based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- a trusted communication session can be established between a repository, such as a personal computer, a smart card, and the like, employing the symbolic representation and a device, such as a reading device, scanning device, and the like, reading the symbolic representation.
- a trusted session can be dispensed with, for example, if it is not critical to maintain the security of the symbolic representation, if it is not critical to use a method to maintain security, and the like.
- symbolic representations such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments
- a highly complex symbol such as a multi-colored holograph
- the information represented therein can be made sufficiently complex, for example, so that such information cannot easily be discerned, the symbol cannot easily be counterfeited, and the like.
- a symbolic representation for example, can be in plain view, in plain view when rendered, and the like, and embody sensitive information without a need to encrypt such information.
- symbolic representations such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be secretly designed, such that replication, faking, and the like, are difficult to achieve, and additional layers of security can be employed, such as watermarking schemes, authentication schemes, check-sum schemes, and the like.
- the symbolic representations can include security aspects, and the like, that can be used in security methods and systems, and the like.
- the symbolic representations of the exemplary embodiments can be embedded into an item, such as digital content, and the like, or can be associated with the item using any suitable method, for example, such as the methods disclosed in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,634,012, No. 5,638,443, No. 5,715,403, and No. 5,629,980, and the like.
- the symbolic representation of the exemplary embodiments can be used to encode a security object that can be used to carry a secondary message, hidden message, and the like, and that can be represented in a human readable form, and the like.
- a security object can be printed on an airline ticket, boarding card, and the like, or can be represented in an electronic form, such as on a magnetic stripe of the airline ticket, boarding card, and the like.
- the airline ticket for example, such a security object can be used to notify authorities to react in a manner that is not apparent to the passenger holding the airline ticket.
- the security object can reside, digitally, in human readable a form, and the like, in an item, such as an identification card, smart card, repository, and the like, and, for example, can be used to express a right of entry into a certain building, and a condition that to enter the bearer must present a Maryland driver's license number 1234567890 issued in the name of John Smith.
- Information in or on the item can clearly reveal to a possessor, even an unauthorized possessor, that the item can be used to gain access to the building, but the condition that possession of the drivers license also is required can be hidden, for example, until a security officer reads the security object detailing same. Accordingly, an authorized possessor can be given enough information in eye-readable form, for example, to gain access to a building, but hidden information can be included in the form of the security object in order to catch an unauthorized possessor of the item.
- a parent can use the security object, for example, encoded in or on a child's library card, and the like, for example, to indicate to a librarian that the child only can borrow “G” rated videos, books, and the like.
- the librarian will able to detect the hidden message carried by the security symbol, while the child will not.
- the exemplary embodiments can be applied to any suitable situation where it is desirable that a possessor of an item bearing the security object, for example, not know the meaning of the security object, not know a full meaning of the security object, and the like.
- a company can issue a visitor an identification badge with such a security object encoded thereon, and can inform the visitor that the badge can only be used to gain access to building A.
- the security object when the visitor attempts to gain access to building B by presenting the badge to an appropriate device, such as a card reader, and the like, the security object can be used to trigger an alert not only to deny entry to the building B, but also to trigger some other action as defined by the security object, for example, such as to sound an alarm, to detain the person in the case of human intervention, and the like.
- human intervention can be involved, for example, in the case of security personnel having to examining the item, or no human intervention may be needed, for example, in the case of an automatic security system.
- the badge also can be encoded with a right, for example, represented by a glyph, to enter building A in a restricted manner, such as on specified days, at specified times, and the like.
- the exemplary embodiments described herein can be used to permit a digital work or content to be rendered, can be employed to allow access to a building, such as by opening a door, and the like.
- a condition for exercise of a usage right such as determining that a resource, such as a video file, or music file, being accessed, used, or acquired, has not been altered, or tampered with, for example, can be specified using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- a usage right can be used to specify that a video file can be rendered, played, and the like, an unlimited number of times on the condition that the rendering is performed prior to Jul. 4, 2003, and provided that, on each occasion that rendering is requested, a specified method determines that the video file has not been altered. If the file cannot be determined to be unaltered, then rendering can be denied and other consequences can follow, such as the DRM system 100 being programmed to lock down the file, and generate a report to the appropriate authority so that the suspected alteration can be investigated.
- the DRM system 100 can be configured to utilize a usage rights expression, for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like.
- a usage rights expression for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like.
- a condition can include, for example, determining that digital content in question has not been tampered with, has not been altered, and the like, and that the symbolic representation of the usage right has not been tampered with, has not been altered, and the like. Accordingly, if the DRM system 100 fails to determine that both that the digital content and the symbolic representation have not been altered, the exercise of the purported usage right can be denied.
- this exemplary embodiment provides a two-pronged layer of protection, because a person attempting gain unauthorized access or otherwise obtain something to which they are not entitled would have to pass two hurdles. For example, such unauthorized party would have to perform to forgeries or hack two things.
- a person wishing to exercise a usage right can present an item including a glyph representing such a usage right.
- the glyph can be in electronic form, in printed form, in a hard copy format, and the like.
- a DRM application such as the client component 122 , and the like, in addition to being configured to ensure that conditions for exercise of the usage right are satisfied, can be configured to determine that the glyph and/or the video file have not been altered in order to grant exercise of the usage right. If the DRM application determines that the glyph and/or the video file have been altered, the DRM application can be configured to prevent exercise of the usage right. If, however, the DRM application determines that the glyph and the video file have not been altered, the DRM application can be configured to allow the exercise of the usage right, for example, subject to successful completion of other processes employed by the DRM application.
- the determination of non-alteration can be employed before exercise of the usage right is allowed, thus, erring on the side of the usage right not being exercised if such a test fails.
- This approach can be varied, wherein the determination of non-alteration is not to be made, thus, erring on the side of permitting the exercise of the usage right.
- a hybrid approach is made possible. For example, a determination of non-alteration can be employed to exercise the full usage rights requested, but if such a determination fails, then some of the usage rights can be exercisable, while others may not. Thus, the exercisable usage rights can be configured as a subset of the full usage right, but need not be.
- the DRM system 100 can be configured to permit rendering by display of a file on a computer screen, but to not permit the file to be copied, moved, loaned, transferred, and the like.
- the DRM system 100 can be configured to generate an error report to an authorizing authority, such as a server, repository, device, and the like, where the report can be reviewed, automatically, based on human intervention, and the like.
- the report can be configured to detail the determinations made by the DRM system 100 , and the results of such determinations.
- the DRM system 100 then can permit exercise of the usage rights, if authorized to do so by the authorizing authority.
- the exemplary embodiments can be employed to ensure that an item, such as photographs, for example, police crime scene photographs, and the like, have not been altered.
- an item such as photographs, for example, police crime scene photographs, and the like
- it can be important to ensure that the photograph is not altered, but probably it can be even more important to ensure that if the photograph is altered that such alteration can be detected.
- the level of complexity employed in the symbolic representations of the exemplary embodiments depends on the level of security desired.
- the exemplary embodiments can be employed with objects other than photographs, video files, and the like, and in situations, other than evidentiary findings, and the like, as will be appreciated by those skilled in the relevant art(s).
- Any suitable method to detect if an item, such as a photograph, video file, and the like, has been tampered with can be employed with the exemplary embodiments.
- a verification method such as described in commonly assigned, co-pending, U.S. patent application Ser. No. 10/147,304 of Tadayon et al., entitled “METHOD AND APPARATUS FOR VERIFYING DATA INTEGRITY BASED ON DATA COMPRESSION PARAMETERS,” filed on May 17, 2002, the entire disclosure of which is hereby incorporated by reference herein, can be employed.
- Such a verification method can include determining one or more of various parameters resulting from, or used for, compression or other manipulation of the data and comparing the value or character of that parameter to the original value or character after transmission, processing and/or a period of time. Any compression scheme or other manipulation can be used. Further, combinations of the parameters can be used and processed in various manners through various logical processes.
- both background and foreground symbols can be configured to express a meaning, message, and the like.
- a meaning of the background symbol can be that when the background symbol is present the foreground symbol can be interpreted.
- both the background symbol and the foreground symbol can be configured to express a meaning.
- the DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a certain way, such as printed on a same substrate as the first symbol, printed at a certain physical location relative to the first symbol, and the like.
- each symbol can be configured to express part of the information being conveyed, for example, such that the information being conveyed can be distributed over a plurality of symbols, the information being conveyed can be distributed over a plurality of symbols in a redundant manner, and the like.
- all of the symbols can be configured to be in digital form, one of a plurality of symbols can be configured to be in digital form while the others are not, and the like.
- a paper ticket can include a printed symbol, which when read by an appropriate reader, machine, and the like, can be detected to represent a usage right.
- a condition to be satisfied in order to exercise the usage right can be the presentment to the reader, machine, and the like of a digital symbol, for example, included in a repository, such as a smart card, handheld device, and the like, or presentment of an additional printed symbol, and the like.
- a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey little or no information, but, instead, convey information on how to obtain information.
- the symbol can be configured as a pointer to another system, device, file, and the like.
- This exemplary embodiment can be useful where security is desired, because an unauthorized party, device, and the like, would have to hack, crack, and the like, multiple systems to obtain the information. For example, the unauthorized party would have to crack the symbol to determine that in order to obtain unauthorized access a second system must be compromised. The unauthorized party would then have to crack the second system.
- symbols can be configured as pointers to a system, device, place, and the like, where information can be obtained, a transaction is to take place, and the like.
- one or more symbols can be configured to convey Uniform Resource Locator (URL) information, for example, for a system, a device, a resource, a file, a document, a music file, a video file, a movie, an e-book, software, and the like.
- URL Uniform Resource Locator
- the symbol when a suitable reader, machine, and the like, reads the symbol, the symbol can be interpreted as representing the URL and appropriate actions can be taken, for example, such as directing a Web browser to the URL for gaining accessing a music file, video file, and the like.
- the present invention recognizes that there are situations where establishing a communications link with a server, repository, device, and the like, for example, over the Internet, via a telephone line, modem, and the like, may not practical or even possible.
- a user can attempt to gain access to an item, such as digital content, a service, and the like, by initiating an online transaction.
- the online transaction can result in the user gaining access to the item requested.
- the ability to communicate can be constrained. For example, a user may have received through the mail a disk including a movie file, a user may have on a hard drive of a personal computer, such as in the client environment 120 , a movie file, and the like.
- the owner of the movie file such as a movie studio, video store, and the like, for example, can have the user initiate an online transaction, transmit a credit card number to pay a fee for the accessing the movie, and receive a license that can permit rendering of the movie by viewing of the movie file on a screen of the personal computer.
- the user can employ a ticket, for example, including a license granting the user the right render the movie by viewing the movie file on the screen of the personal computer, and that can be read by the personal computer.
- the ticket can be in the form of a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. Depending on a level of security desired, the symbol can be made complex to deter counterfeiting.
- each use of the ticket can be recorded in a record, for example, on the ticket itself, in another repository, such as the personal computer of the user, and the like.
- Such a record can be configured to indicate the number of times the ticket has been used, wherein the ticket can be configured to be used one time, many times, and the like. For example, the user may have acquired the right to view ten movies distributed by a movie studio, movie store, and the like. This information can be recorded in the personal computer of the user.
- the number of views to which the user remains entitled can be reduced by one.
- the ticket need not record information concerning a use thereof, but rather information for authorizing use of the corresponding movie file.
- the ticket can be used to record information about use of the ticket.
- each use of the ticket to authorize rendering of the movie file can result in the number of authorized uses to be reduced by one and to be reflected on the ticket, wherein the rendering repository, such as the personal computer of the user, another repository device, and the like, need not record information concerning use.
- the ticket can be in digital form so that the use information can be recorded on the ticket.
- such use information can be a printed on the ticket, and the like.
- the ticket can be altered, information can be recorded on the ticket, and the like. Such alteration can be performed, for example, via mechanically means by the device reading the ticket, by human intervention, such as by a clerk at a kiosk, and the like.
- two tickets can be employed, wherein one ticket can be in digital form, and record information concerning use, and the other ticket can be in digital or printed hard copy form and provide information about the item to which access is desired.
- a movie studio can distribute a hard copy printed ticket which can employ one or more glyphs to express rights expression information concerning the usage rights, manners of use, conditions, and the like, associated with a movie file.
- the printed ticket can be presented together with the digital ticket to an appropriate device.
- the device can be configured to read the rights expression information that can be provided on either or both tickets based on the glyphs, process a transaction permitting the usage right to be exercised, such as rendering the movie by viewing the movie file on a screen of a personal computer, subject to applicable conditions, and record the use information, for example, on one or both of the tickets, on the rendering device, on another device, and the like.
- a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be employed to express rights expression information, for example, in a resource constrained system or environment, such as on devices having a small foot prints, handheld devices, systems having limited processing resources, and the like.
- a rights expression can be reduced to a suitable symbol, groups of symbols, sound, groups of sounds, light pulse, groups of light pulses, and the like, representing the rights expression information being expressed.
- a predetermined tone, set of tones, and the like can be used to represent an unambiguous canonical rights expression encoded in a binary format.
- an exemplary unambiguous canonical rights expression, encoded in a binary format can given by:
- a manner of use of an item can be specified with a symbol, such as the glyphs, symbols, words, messages, and the like, the exemplary embodiments.
- glyphs can be expressed in terms of sound, color, image, pulse, light, and the like, signals, wherein the amplitude, frequency, and width of the corresponding signals could be modified to modify an expressed message.
- information regarding rights, conditions, and the like can be expressed as three dimensional (3D) information, such as via a holographic glyph image, and the like.
- a symbol such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey rights expression information, such as an expiration date, and the like, for example, to prevent the display of information on a monitor of a computer, and the like.
- the glyph conveying the rights expression information can be displayed on the monitor of the computer, and can be scanned, wanded, and the like, via a suitable detector, hand-held scanner, and the like.
- rights expression information can be configured for use with an auction Web site, a storefront on the Internet, and the like.
- sound, light, a combination of light and sound, and the like can be is used for transmission of rights expression information.
- the movement of a user in a building can be monitored, and the presence of the user in a room can be monitored, detected, and the like, for example, using an iris scan, a smart card, voice recognition, biometrics, a device on the clothing of the user, and the like.
- a security level assigned to the room such as the Pentagon library
- items in the room such as top-secret files, and the like
- privileges of the user for gaining access to the corresponding information, data, services, and the like can be based on usage rights, conditions, restrictions, and the like, specified in the rights expression information transmitted in the room.
- a background signal for example, including noise, such as semi-random noise, random noise, a steganographically encoded signal, a scrambled signal, and the like, can be added to a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments that can be used to convey rights expression information.
- a flag, an indicator, and the like can be employed to indicate that the background signal can be neglected, for all or a part of the signal, by an appropriate scanner of the symbol conveying the rights expression information.
- the rights expression information can be represented as a video image or multimedia content consisting of video, sound, and text and having static and dynamic portions. Any of these elements of the multimedia content can, alone or in combination, be used to represent the rights expression information.
- the rights expression information can be expressed by being distributed throughout the portions or by being redundantly expressed by the portions for security and reliability.
- the symbolic representations of rights expressions in the exemplary embodiments can be used, for example, in a digital ticket that can be scanned or read by a machine.
- the symbolic representations can be customized to the needs of a specific group, company or industry, in which case the scanners or readers also can be specialized and customized for a specific purpose or task.
- the symbolic representations of rights expressions can be used to condense the amount of information, reduce the amount of hardware and/or software required to understand the information, and speed up the process for the convenience of the end user of the content, while providing relatively lower error rates and relatively higher precision.
- Barcode or symbol readers, pattern recognition engines, scanners, and the like can be employed, advantageously, with minor or no modifications to hardware and/or software for practicing the exemplary embodiments.
- the pattern recognition engines can include neural network, fuzzy logic techniques, and the like. Accordingly, available technologies can be used for the reader and recognition engine functions, which reduces the set-up costs for practicing the exemplary embodiments.
- processing the symbols expressing the rights information using the readers or pattern recognition processors, for example, to wand the symbol patterns and extract the rights expression information results in speed and reliability during the interpretation process for the end user of the content.
- the rights expression information can be output as plain English text, any other suitable human-readable language or form, such as voice or sound, and the like. Accordingly, the end user of the content does not have to know the rules and/or language related the rights expression information, drastically reducing the learning period for the end user, and thus, significantly reducing the operational expenses for the end user.
- the symbolic representations of the exemplary embodiments can be printed on a physical substrate, such as a piece of paper, or can be displayed on a computer monitor, for scanning by an appropriate reader, and the like.
- the rights expression information can be expressed with symbols in the form of parallel lines, bar codes with different widths, angles, ratios, perspectives, or distances, crossed lines, concentric circles, geometrical shapes, different colors, visible or invisible light sources with different wavelengths for representing different glyphs and shapes and for easy and fast optical recognition, Morse codes, laser pulses with different durations, Japanese characters, English characters, one-dimensional images, two-dimensional images, symbols, sets of symbols with specific angular relationships, sets of symbols with specific spatial relationships for defining different types of grammar or rules, rotational invariant symbols, spatial invariant symbols, symbols with more than one meaning, hidden meanings or meanings not readable by humans, or readable by specialized machines to keep some information secret, watermarks, steganographically encoded symbols, symbols accompanied by human-readable messages, symbols readable by machines
- different rights expression information or messages can be conveyed based on the order of the symbols, or placement of the symbols with respect to each other.
- the specific sequence of symbols can convey a specific situation or context, such as the information about an industry or purpose of the rights expression information.
- the symbolic representation can be in digital, such as electronic form, and the like, as well as in printed form, visible form, and the like.
- the symbols can be stored on some sort of electronic media, such a computer hard drive, server, floppy disk, smart card device, and the like.
- the symbolic representations can be generated using templates, a graphical user interface (GUI), and the like, advantageously, not requiring the end user of the content or providers of the content to have a complete knowledge of a rights expression language and/or grammar.
- GUI graphical user interface
- the recipe, algorithm, formula, and the like, used for the generation of the symbols could be in public domain or governed by a standards body, to encourage standardization of the symbols.
- the standards body then could set the parameters for shape or methods of generation of the symbols.
- the recipe, algorithm, formula, and the like, used for the generation of the symbols could be kept secret from the public, for example, to discourage unauthorized users from generating fake symbols and/or digital tickets.
- the symbol reader can be configured to reject the ticket as invalid.
- the rights expression information extracted from a symbol or symbols can instruct a scanner or reader to perform a predetermined action.
- a digital ticket can include a symbol or symbols corresponding to a rights expression indicating that a user has the right to print 4 copies of a report.
- the symbols also can instruct the reader to print another symbol on the digital ticket, print a new ticket, alter the ticket, and the like, so as to indicate that the user now has the right to print 3 more copies.
- the symbols themselves can have a grammar of their own, for example, a relationship internal to symbols themselves, used to express new meanings or extra information, for example, with respect to the neighboring symbols or a predetermined proximity to other specific symbols. For example, if a given symbol is within or exactly 2 symbols away from another symbol, such positional relationship could express further information that can be concluded from that sequence of symbols.
- a grammar can be based on the context or proximity of the symbols, with respect to each other or with respect to a marker, and the like.
- FIGS. 25 - 26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
- FIG. 25 is an exemplary flowchart for illustrating graphical, representation of rights expression information
- FIG. 26 an exemplary flowchart for illustrating modulated signal-based representation of rights expression information.
- the rights expression information can be specified.
- a graphical representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- the computer 130 of the DRM system 100 of FIG. 1 can be configured to perform the process for the graphical representation of rights expression information of FIG. 25.
- any suitable device, system and the like for example, such as one or more of the devices and subsystems of the DRM system 100 , can be configured to perform such processing.
- the rights expression information can be specified.
- a modulated signal-based representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- the computer 130 of the DRM system 100 of FIG. 1 can be configured to perform the process for the modulated signal-based representation of rights expression information of FIG. 26.
- any suitable device, system and the like for example, such as one or more of the devices and subsystems of the DRM system 100 , can be configured to perform such processing.
- the DRM system 100 can be used to store information relating to various processes described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of DRM system 100 .
- One or more databases of the devices and subsystems of the DRM system 100 can store the information used to implement the exemplary embodiments.
- the databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed above.
- All or a portion of the DRM system 100 can be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, micro-controllers, and the like, programmed according to the teachings of the disclosed exemplary embodiments.
- Appropriate software can be readily prepared by programmers of ordinary skill based on the teachings of the disclosed exemplary embodiments.
- the DRM system 100 can be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of component circuits.
- the exemplary embodiments described herein can be employed in offline systems, online systems, and the like, and in applications, such as TV applications, computer applications, DVD applications, VCR applications, appliance applications, CD player applications, and the like.
- the signals employed to transmit the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be configured to be transmitted within the visible spectrum of a human, within the audible spectrum of a human, not within the visible spectrum of a human, not within the audible spectrum of a human, combinations thereof, and the like.
Abstract
A system and method for creating a graphical representation of a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression. Rights expression information indicating a manner of use of an item is specified. A graphical representation of the rights expression information is then generated. The graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression.
Description
- The present invention claims benefit of priority under 35 U.S.C. §119(e) to commonly assigned, co-pending, U.S. Provisional Patent Application Serial No. 60/363,932 of Raley et al., entitled “USE OF RIGHTS EXPRESSIONS IN APPLICATIONS WITH PERFORMANCE CONSTRAINTS,” filed on Mar. 14, 2002, the entire disclosure of which is hereby incorporated by reference herein.
- 1. Field of the Invention
- This invention generally relates to controlling use of content, or other items, through usage rights associated with the content or other items, and more particularly to a system and method for expressing usage rights for content or other items based symbolic representations, such as graphical representations, modulated signal representations, and the like.
- 2. Description of Related Art
- One of the most important issues concerning the widespread distribution of digital content, such as documents, music, movies, software, information, and the like, in forms usable by computing devices, via electronic means, and the Internet in particular, is the provision of the ability to enforce the intellectual property rights during the distribution and use of the digital content. Technologies for resolving this problem are referred to as Digital Rights Management (DRM) herein. However, there are a number of issues to be considered in effecting a DRM system, such as authentication, authorization, accounting, payment and financial clearing, rights specification, rights verification, rights enforcement, and document protection issues, to name but a few.
- For example, in the world of printed documents and other physical content, a work created by an author is usually provided to a publisher, which formats and prints numerous copies of the work. The copies are then sent by a distributor to bookstores or other retail outlets, from which the copies are purchased by end users. While the low quality of copying and the high cost of distributing printed material have served as deterrents to unauthorized copying of most printed documents, it is much easier to copy, modify, and redistribute unprotected digital content with high quality. Therefore, there is a need for mechanisms to protect digital content.
- Difficulties associated with preventing, or even deterring, people from making unauthorized copies of electronic content within current general-purpose computing and communications systems, such as personal computers, workstations, and other devices connected over communications networks, such as local area networks (LANs), intranets, and the Internet, are widely recognized. Many attempts to provide hardware-based solutions to prevent unauthorized copying have proven to be unsuccessful. Moreover, the deployment of high bandwidth or broadband communications technologies and the development of what is presently known as the National Information Infrastructure (NII) is making it more convenient to distribute large documents electronically, including video files, such as full length motion pictures, and this makes it easier to proliferate unauthorized copying and distribution of digital content. Therefore, the need for further development of DRM technologies is becoming a high priority.
- Accordingly, commonly-assigned U.S. Pat. No. 5,634,012 discloses a DRM system for controlling the distribution of digital content, wherein devices of the DRM system can include a repository associated therewith. A predetermined set of usage transaction steps define a protocol used by the repositories for enforcing usage rights associated with the content. Usage rights persist with the content and the usage rights associated with the content comprise a digital work. The usage rights can permit various manners of use of the content, such as a right to view or print or display the content, a right to use the content only once, a right to distribute or redistribute the content, and the like. Such usage rights can be made contingent on payment or other conditions. However, there is still a further need for systems and methods for expressing and enforcing usage rights and/or conditions associated with content in a flexible and robust manner.
- The above and other needs are addressed by embodiments of the present invention, which provide an improved system and method for expressing usage rights for content or other items based on modulated or varied signals or graphical representations of the usage rights.
- Accordingly, in one aspect, the invention is a method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression. The method comprises specifying rights expression information indicating a manner of use of an item and generating a graphical representation of the rights expression information. The graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
- In another aspect, there is provided a system for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression. The system comprises means for specifying rights expression information indicating a manner of use of an item and means for generating a graphical representation of the rights expression information. The graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
- In another aspect, there is a rights expression comprising rights expression information indicating a manner of use of an item and a graphical representation of said rights expression information. The graphical representation is configured to be interpreted by an interpreter of a system for controlling use of the item to permit enforcement of the rights expression based on the rights expression information.
- Still other aspects, features, and advantages of the present invention are readily apparent from the following detailed description, simply by illustrating a number of exemplary embodiments and implementations, including the best mode contemplated for carrying out the present invention. The present invention is also capable of other and different embodiments, and its several details can be modified in various respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature, and not as restrictive.
- The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
- FIG. 1 is a schematic illustration of an exemplary Digital Rights Management system on which various embodiments of the present invention can be implemented;
- FIG. 2 illustrates a set of 8 symbols, derived from a circle, that can be used for expressing rights expressions;
- FIG. 3 illustrates a set of 4 symbols, derived from a rectangle, that can be used for expressing rights expressions;
- FIGS.4-6 illustrate sets of 8 symbols, derived from circular structures, that can be used for expressing rights expressions;
- FIGS.7-8 illustrate sets of 8 symbols, derived from the 4 sides and 2 diagonals of square structures, that can be used for expressing rights expressions;
- FIG. 9 illustrates a set of 4 symbols, derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
- FIG. 10 illustrates a set of 4 symbols, derived from the 4 corners of a square structure, that can be used for expressing rights expressions;
- FIG. 11 illustrates a set of 8 symbols, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions;
- FIG. 12 illustrates a set of 8 symbols, derived from a circular structure, that can be used for expressing rights expressions;
- FIG. 13 illustrates a set of 5 symbols, using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions;
- FIG. 14 illustrates a set of 4 symbols, derived from a circular structure, that can be used for expressing rights expressions;
- FIG. 15 illustrates a set of 12 symbols, derived from a star shape structure, in three different colors, Red (R), Green (G), and Blue (B), that can be used for expressing rights expressions;
- FIG. 16 illustrates an exemplary embodiment for combining the symbols shown in FIG. 15;
- FIG. 17 illustrates an exemplary message, read from left to right, for expressing rights expressions using the 4 symbols of the set shown in FIG. 10;
- FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the set shown in FIG. 15;
- FIGS.19-20 illustrate exemplary rights expressions for performing an action using the symbols of the set shown in FIG. 15;
- FIG. 21 illustrates an exemplary rights expression for the right to print 100 copies of 2 e-books with
identification numbers - FIG. 22 illustrates an exemplary rights expression for the right to listen to music, such as playing or rendering the music, for 100 minutes for 2 pieces of music with
identification numbers 443 and 13 using the symbols of the set shown in FIG. 15; - FIG. 23 illustrates an exemplary rights expression for an e-book data record for an e-book with
identification number 143, whose owner has anIDENTIFICATION number 212, using the symbols of the set shown in FIG. 15; - FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, or industries, and can be custom-made for each application or industry using the symbols of the set shown in FIG. 15; and
- FIGS.25-26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights.
- A system and method for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It is apparent to one skilled in the art, however, that the present invention can be practiced without these specific details or with equivalent arrangements. In some instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
- As noted above, authentication, authorization, accounting, payment and financial clearing, rights specification, rights verification, rights enforcement, and document protection issues should be addressed by a Digital Rights Management system. Commonly-assigned U.S. Pat. No. 5,530,235, No. 5,629,980, No. 5,634,012, No. 5,638,443, No. 5,715,403, No. 6,233,684, and No. 6,236,971, the entire disclosures of all of which are hereby incorporated by reference herein, disclose DRM systems addressing these and other issues.
- In addition, systems and methods have been developed for symbolic representation of information. For example, the name of a book, the price of a book, a street address, and the like, can be represented in terms of one dimensional or two dimensional bar codes, patterns, glyphs, alphabets, or other symbols, which can be machine-readable, human-readable, or both. Commonly-assigned U.S. Pat. No. 5,091,966, No. 5,128,525, No. 5,168,147, No. 5,221,833, No. 5,245,165, No. 5,444,779, No. 5,449,895, No. 5,449,896, No. 5,453,605, No. 5,521,372, No. 5,576,532, No. 5,684,885, No. 5,864,127, No. 6,000,613, No. 6,076,738, No. 6,182,901, and No. 6,208,771, the entire disclosures of all of which are hereby incorporated by reference herein, are directed to various types of glyphs and/or uses thereof.
- For example, U.S. Pat. No. 6,208,771 teaches method and apparatus for robust decoding of glyph address carpets, No. 6,076,738 teaches self-clocking glyph shape codes, No. 5,684,885 teaches binary glyph codes based on color relationships, No. 5,864,127 teaches analog glyph detector and detector arrays, No. 5,576,532 teaches interleaved and interlaced sync codes and address codes for self-clocking glyph codes, No. 6,000,613 teaches self-clocking glyph code having composite glyphs for distributive encoding of multi-bit digital values, No. 6,182,901 teaches orientational disambiguation for self-clocking glyph codes, No. 5,521,372 teaches framing codes for robust synchronization and addressing of self-clocking glyph codes, No. 5,453,605 teaches global addressability for self-clocking glyph codes, No. 5,449,896 teaches random access techniques for use with self-clocking glyph codes, No. 5,449,895 teaches explicit synchronization for self-clocking glyph codes, No. 5,221,833 teaches methods and means for reducing bit error rates in reading self-clocking glyph codes, No. 5,444,779 teaches electronic copyright royalty accounting system using glyphs, No. 5,245,165 teaches self-clocking glyph code for robustly encoding dual bit digital values, No. 5,128,525 teaches convolution filtering for decoding self-clocking glyph shape codes, No. 5,168,147 teaches binary image processing for decoding self-clocking glyph shape codes, and No. 5,091,966 teaches adaptively scaling for decoding spatially periodic self-clocking glyph shape codes.
- The exemplary embodiments described herein, advantageously, leverage symbolic representations with rights expressions to express rights information related to items, such as digital content, services, abstract objects, resources, goods, and the like. In addition, the symbolic representations can be used to convey information, such as rights expression information, information about a grammar or language dealing with usage rights, information about access to information, and the like. The use of a rights expression, for example, in the form of a license, and the like, can be used to define usage rights for specifying a permitted manner of use of an item, such as access to digital content, and the like. Such usage rights can be associated with one or more conditions, such as payment, and the like, that can be a prerequisite for exercising the specified manner of use of the item. A rights expression language, such as eXtensible Rights Markup Language (XrML), and the like, for example, including predefined syntax and semantics, can be employed to express the usage rights.
- According to exemplary embodiments, rights expression information corresponding to usage rights associated with content can be expressed via a graphical representation of the rights expression information. In further exemplary embodiments, the graphical representation can include glyphs, machine and human-readable symbols, and other types of symbols to express the rights expression information. In still further exemplary embodiments, the rights expression information can be expressed via a modulated signal, such as modulated light and sound signals, and the like. Advantageously, the exemplary embodiments combine symbolic representations with rights expressions for conveying information about usage rights, conditions, access related to digital content, services, abstract objects, items, resources, and the like, in a flexible and robust manner.
- Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views, and more particularly to FIG. 1 thereof, there is illustrated a
DRM system 100 that can be used in connection with the described exemplary embodiments to specify and enforce usage rights for content, services, or other property. In FIG. 1, theDRM system 100 includes a user activation component in the form of anactivation server 110 that issues a set of public and private key pairs 112 to a content user in a protected fashion. Typically, when the user uses theDRM system 100 for the first time, the user installs software that, for example, works with, or includes, a rendering application for a particular content format. - The software is installed in a
client environment 120, for example, such as a computing device associated with the user. The software can be part of theDRM system 100 and can be used to access protectedcontent 134. After the installation, the software can be activated. During the activation process, some information is exchanged between theactivation server 110 and theclient environment 120. Aclient software component 122 can be downloaded and installed in theclient environment 120. Theclient software component 122 can be tamper resistant and can include the set of public and private key pairs 112 issued by theactivation server 110, as well as other components. - A
rights offer 132 can be associated with the protectedcontent 134 and can specifyusage rights 132A that are available to an end-user, for example, when one or morecorresponding conditions 132B are satisfied. Alicense server 140 manages theencryption keys 112 and issues alicense 142 for the protectedcontent 134. Thelicense 142 can embody the actual granting of theusage rights 132A to the end user. For example, therights offer 132 may grant the end user the right to view the protectedcontent 134 on the condition of payment of a fee of five dollars, and the right to print the protected content on the condition of payment of a fee of ten dollars. Thelicense 142 can be issued for the view right when the five dollar fee has been paid and/or for the print right when 10 dollar fee has been paid. Theclient component 122 interprets and enforces the rights that have been specified in thelicense 142. -
Clear content 136, such as unprotected content, and the like, can be prepared, for example, with anapplication 138, such as a document preparation application, installed on acomputer 130 associated with a content publisher, a content distributor, a content service provider, or any other suitable party. Preparation of theclear content 136 can include specifying theusage rights 132A and theconditions 132B under which theclear content 136 can be used, associating the rights offer 132 with theclear content 136, and protecting theclear content 136 with, for example, a cryptography algorithm to generate the protectedcontent 134. A rights language, such as XrML, eXtensible Access Control Markup Language (XACML), Open Digital Rights Language (ODRL), and the like, can be used to specify therights offer 132. However, the rights offer 132 can be specified in any suitable manner. Note the phrase “specifying rights information”, as used herein, refers to creating, deriving, or other wise utilizing information that relates to rights expressions. Also, the rights offer 132 can be in the form of a pre-defined specification, profile, template, and the like, that can be associated with the protectedcontent 134. Accordingly, the process of specifying the rights offer 132 can include any suitable process for associating rights, conditions, and the like, with content. The rights offer 132 associated with the protectedcontent 134 and theencryption key 112 used to encrypt theclear content 136 can be transmitted to thelicense server 140. - A typical workflow for the
DRM system 100 can include a user operating within theclient environment 120 being activated for receiving the protectedcontent 134 by theactivation server 110. The activation process results in the public and privatekey pair 112, and, for example, some user and/or machine-specific information, and the like, being downloaded to theclient environment 120 in the form of theclient software component 122. The activation process can be accomplished, for example, at any suitable time prior to the issuing of thelicense 142. - When the user wishes to use the protected
content 134, the user makes a request for the protectedcontent 134. For example, the user might browse a Web site running on aWeb server 150, using a browser installed in theclient environment 120, and attempt to download the protectedcontent 134. During this process, the user may go through a series of steps possibly including a fee transaction, such as in the sale of content, other transactions, such as collection of information, and the like. When the appropriate conditions and other prerequisites, such as the collection of a fee and verification that the user has been activated, are satisfied, theWeb server 150 contacts thelicense server 140, for example, through a secure communications channel, such as a channel using a Secure Sockets Layer (SSL). Thelicense server 140 then generates thelicense 142 for the protectedcontent 134 and theWeb server 150 downloads both the protectedcontent 134 and thelicense 142. Thelicense 142 can include the appropriate usage rights of theusage rights 132A and can be downloaded from thelicense server 140 or an associated device. The protectedcontent 134 can be downloaded from thecomputer 130 associated with a publisher, distributor, or other party. The rights offer 132 can be persistent and remain associated with the protectedcontent 134. - The
client software component 122 in theclient environment 120 can then proceed to interpret thelicense 142 and allow use of the protectedcontent 134 based on therights 132A and theconditions 132B specified in thelicense 142. The interpretation and enforcement of the usage rights, for example, are further described in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,629,980, No. 5,634,012, No. 5,638,443, No. 5,715,403, No. 6,233,684, and No. 6,236,971. The above steps can take place sequentially, approximately simultaneously, in various orders, and the like. - The
DRM system 100 addresses security aspects of protecting the protectedcontent 134. In particular, theDRM system 100 can authenticate thelicense 142 that has been issued by thelicense server 140. One way to accomplish such authentication is for theclient software component 122 to determine if thelicenses 142 can be trusted. In other words, theclient software component 122 can include the capability to verify and/or validate the cryptographic signature, or other identifying characteristic of thelicense 142. During the activation step described above, theclient environment 120 and thelicense server 140 can receive the set ofkeys 112, for example, in a tamper-resistant software package that can include other components, such as theclient software component 122 for the activatedclient environment 120 to verify the signature of thelicense 142. - The
DRM system 100 is of an exemplary nature and can be implemented in numerous other equivalent arrangements. For example, thelicense 142 and the protectedcontent 134 can be distributed from different entities. As another example, the rights offer 132 can be associated with the protectedcontent 134 by a party other than the party preparing the protectedcontent 134. As a further example, aclearinghouse 160 can be used to process payment transactions and verify payment prior to issuing thelicense 142. Moreover, the various processes and transactions can be performed, for example, via online and/or offline environments and/or combinations thereof. For example, an end user could download content to a computer and then transfer the content from the computer to a personal digital assistant (PDA). The end user could then buy a license for the content, for example, via a supermarket kiosk, a cash register, a prep-paid license card, and the like, and then transfer the license to the PDA. The end user could then activate the content for use on the PDA and/or the computer. In such an offline scenario, the various devices can, but need not, communicate directly with one another and information can be exchanged in any suitable manner, such as by physically moving media between the devices. - The devices and subsystems of the
DRM system 100 of FIG. 1 can communicate, for example, over acommunications network 170, and can include, for example, any suitable servers, workstations, personal computers (PCs), laptop computers, PDAs, Internet appliances, set top boxes, modems, handheld devices, telephones, cellular telephones, wireless devices, other devices, and the like, capable of performing the processes of the disclosed exemplary embodiments. The devices and subsystems of theDRM system 100, for example, can communicate with each other using any suitable protocol and can be implemented using a general purpose computer system. One or more interface mechanisms can be used in theDRM system 100 including, for example, Internet access, telecommunications in any suitable form, such as voice, modem, and the like, wireless communications media, and the like. Accordingly,communications network 170 can include, for example, wireless communications networks, cellular communications networks, satellite communications networks, Public Switched Telephone Networks (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, hybrid communications networks, combinations thereof, and the like. In addition, thecommunications network 170 can be the same or different networks. - As noted above, it is to be understood that the
DRM system 100 of FIG. 1 is for exemplary purposes, as many variations of the specific hardware used to implement the disclosed exemplary embodiments are possible. For example, the functionality of the devices and the subsystems of theDRM system 100 can be implemented via one or more programmed computer systems or devices. To implement such variations as well as other variations, a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of theDRM system 100. On the other hand, two or more programmed computer systems or devices can be substituted for any one of the devices and subsystems of theDRM system 100. Accordingly, principles and advantages of distributed processing, such as redundancy, replication, and the like, also can be implemented, as desired, for example, to increase the robustness and performance of theDRM system 100. - The exemplary embodiments of the present invention directed to symbolic representations for expressing rights information, such as the
rights offer 132, using graphical representations, such as glyph symbols, and the like, will now be described. The exemplary glyphs shown in FIGS. 2-24 can be generated in visible form, such as printed form, in digital form, such as electronic form, and the like. For security or other purposes, for example, background and foreground symbols can be employed. For example, background symbols can be configured to have no meaning to a human and can be employed for security purposes, such as to confuse possible hackers, while foreground symbols, which can be separated or distinguished from the background symbols based on predetermined patterns, placements, markers, codes, combination of pointers, and the like, can be configured and employed to express the rights expression information. Also, random or semi-random noise, and the like, can be employed in the symbols, for example, to provide further security functions or other functions. - In addition, both the background and foreground symbols can have meaning to a human or machine, wherein the meaning of the background symbols can be used to interpret the meaning of the foreground symbols. Further, the
DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a predetermined manner, such as being printed on the same substrate as the first symbol, being printed at a certain physical location relative to the first symbol, and the like. - For example, according to an exemplary embodiment, a graphical representation of a rights expression can include a background portion and a foreground portion. The background portion, for example, can be configured to have no meaning, unless a predetermined condition is satisfied, such as the day being Wednesday, and the like. As another example, the foreground portion can be configured to specify that “if you are scanning this item and its after Jul. 4, 2003, then also look at the background portion for additional information, otherwise continue to disregard the background portion.” Accordingly, various relationships between the background portion and the foreground portion can be specified with an appropriate rights expression, for example, using the graphical and other forms of the symbolic representations of the exemplary embodiments described herein.
- The symbols of exemplary embodiments also can be employed to convey redundant information. For example, in the case of a paper ticket that is susceptible to being partially damaged, a corresponding reader can still be able to read the damaged ticket to extract the rights expression information based on redundant information that can be conveyed by the symbols. Such redundancy can be accomplished by overlapping or duplicating the information of some or all of the symbols to improve the accuracy of the ticket reader. In addition, the symbols can include a check-sum, error correction codes, and the like, for example, for verification and security purposes, to ensure that inconsistencies with the interpreted rights expression information can be resolved, and the like. The exemplary embodiments also are applicable for the rights expression information including digital information, such as electronic information, and the like. For example, the exemplary embodiments can be used in cases where digital media, including the rights expression information, is damaged, where it is desired to have multiple ways to obtain a digital symbol, and the like.
- The symbols of the exemplary embodiments, for example, can be hidden as a non-obvious pattern, shape, and the like, in another image, pattern, and the like, which then can be detected by a suitable system, machine, device, and the like, having predetermined parameters and having predetermined knowledge about the parameters of the hidden information. In further exemplary embodiments, the symbols can be part of a watermark in another image. Other technologies, for example, special ink, such as heat sensitive ink, magnetic ink, invisible ink, ink visible under certain angles, different chemical conditions, different illumination, and the like, also can be employed for symbol generation, watermarking purposes, and the like.
- In the exemplary embodiments, the symbols can convey information, for example, about licenses, grammar, rights expressions, rights assignments, payments, meta-data, content owners, histories regarding the content, the state of the content, encryption keys, expiration dates, digital signatures, conditions, constraints, parameters of a self-protecting document, digital works, content, digital content, resources, objects, and the like, that are available for end users to render, consume, use, distribute, and the like.
- In addition, the symbol patterns of the exemplary embodiments can be used to convey information about an action, a command, a function, a procedure, a module, a subroutine, executable code, and the like. For example, the extracted information can instruct the transfer of funds to a specific account, for example, via the
clearing house 160, can instruct the transfer of an e-book to a specific address, can place a limit on distribution or transfers of content, for example, the protectedcontent 134, can add constraints for users of content, can destroy an encryption key, for example, the public/private key pairs 112, after a predetermined number of times of usage of content, can stop or discontinue access to content, can transmit information about a content owner, can transmit information about content, can transmit information about a trademark owner, can transmit information about a copyright owner, can transmit information for adding up royalties and/or micro-payments, can instruct the sending of an e-mail back to a content owner about the status of content distribution, can be used combine or attach different sections, pieces, or chapters of content from different locations to produce a multimedia book or newsletter, and the like. Such information can be recorded, updated, and the like, back onto the original content, recorded on the copies made of the original content, and the like. The exemplary embodiments can be employed in copy machines, cameras, video recorders, CD-writers, recording devices, duplication devices, replication devices, computing devices, rendering devices, and the like. - As previously noted, the exemplary embodiments can employ spatially periodic self-clocking glyph shape codes, for example, as described in commonly-assigned U.S. Pat. No. 5,091,966, wherein decoding based on convolution filtering and morphological operations, such as erosion, dilation, opening, and closing operations, and the like, can be employed. Advantageously, such exemplary embodiments can tolerate a significant amount of image distortion and degrading high frequency noise.
- The exemplary embodiments also can reduce bit error rates in reading self-clocking glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,221,833, wherein a value assigned to a given glyph can be set to be different in just one bit position from values assigned to glyphs with which the given glyph is most likely to be confused.
- To have robust decoding and less error rate, the exemplary embodiments can include glyphs that have a plurality of independently modulatable and readily distinguishable characteristics, such as substantially orthogonal characteristics, and the like, with appropriate design of symbol cells, such as an array of pixel positions with the corresponding pixel values for each glyph. Spatial synchronization and orientation determination, for example, for decoding purposes, can be achieved by markers or patterns, to reduce the propagation of errors. For example, the exemplary embodiments can employ interleaved codes, interlaced codes, and the like, that can be encoded to facilitate the partitioning and correlation of data embedded within such glyph codes, for example, as described in commonly-assigned U.S. Pat. No. 5,576,532. The exemplary embodiments also can employ composite glyphs and glyphs with different colors or shades, as further described herein.
- Accordingly, FIG. 2 illustrates a
set 200 of 8 symbols 201-208, derived from a circle, that can be used for expressing rights expressions. FIG. 3 illustrates aset 300 of 4 symbols 301-304, derived from a rectangle, that can be used for expressing rights expressions. FIG. 4 illustrates aset 400 of 8 symbols 401-408, derived from a circular structure, that can be used for expressing rights expressions. FIG. 5 illustrates aset 500 of 8 symbols 501-508, derived from a circular structure, that can be used for expressing rights expressions. FIG. 6 illustrates aset 600 of 8 symbols 601-608, derived from a circular structure, that can be used for expressing rights expressions. FIG. 7 illustrates aset 700 of 8 symbols 701-708, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions. FIG. 8 illustrates aset 800 of 8 symbols 801-808, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions. FIG. 9 illustrates aset 900 of 4 symbols 901-904, derived from the 2 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions. FIG. 10 illustrates aset 1000 of 4 symbols 1001-1004, derived from the 4 corners of a square structure, that can be used for expressing rights expressions. FIG. 11 illustrates aset 1100 of 8 symbols 1101-1108, derived from the 4 sides and 2 diagonals of a square structure, that can be used for expressing rights expressions. FIG. 12 illustrates aset 1200 of 8 symbols 1201-1208, derived from a circular structure, that can be used for expressing rights expressions. FIG. 13 illustrates aset 1300 of 5 symbols 1301-1305, using one square and 4 different orientations of a triangle rotated at 0, 90, 180, and 270 degrees, that can be used for expressing rights expressions. FIG. 14 illustrates aset 1400 of 4 symbols 1401-1404, derived from a star shape structure, that can be used for expressing rights expressions. - FIG. 15 illustrates a
set 1500 of symbols, derived from the star shape structure of FIG. 14, that can be used for expressing rights expressions. In FIG. 15, each of the symbols 1401-1404 can be taken from the Red, Green, and Blue (RGB) color space. Thus, each of the 4 symbols 1401-1404 of the star shape of FIG. 14 can include the Red (R), Green (G), and/or Blue (B) colors. Accordingly, in a basic case, wherein no colors are combined, 12 symbols can be generated (for example, four symbols times three colors). To increase the number of members or symbols, however, complex symbols derived from theset 1500 of FIG. 15 and having overlapping colors can be generated, as shown in FIG. 16. - In FIG. 16, two or more symbols of different colors (for example, up to all 12 symbols) can be combined so as to overlap on a physical location, to potentially produce part or all of a star shape, in different colors, or combination of colors for each part of the star shape. For example, in FIG. 16, the color of the resulting
horizontal symbol 1401 can be based on the combination of Green andRed symbols 1401, the color ofvertical symbol 1402 can be Green, and the color of thediagonal symbol 1403 can be Blue. The described combination can be used to represent acomplex symbol 1601, as shown in FIG. 16. Thus, a new set of complex symbols with many more choices for symbols than the set 1400 from FIG. 14, can be defined, as illustrated by FIG. 16. Accordingly, the number of complex symbols in the new set, as illustrated by FIG. 16, can be (212−1) or 4095 symbols, assuming that a blank space is not considered a symbol. With more choices for complex symbols provided, as in the exemplary embodiment of FIG. 16, advantageously, correspondingly more complex and comprehensive symbolic representations for grammar, language, and the like, for the rights expressions can be generated. - In further exemplary embodiments, other color spaces, such as the Yellow, Magenta, and Cyan (YMC) color space, and the like, can be employed. Typically, the Yellow, Magenta, Cyan, and Black (YMCK) color space cannot be employed, because the information in the K component would overlap with information in combination of the YMC components, such that the contribution of K component would not be easily distinguished from that of the combination. This could result in confusion during the decoding process, because not a single and clear one-to-one relationship and interpretation may be determined.
- To detect the colors in the generated symbols, sensors, detectors, and the like, can be used with relatively very high accuracy. For the complex symbols, such as the
symbol 1601 of FIG. 16, angle detection can be made practically independent of color detection. Thus, errors in the angle detection can be made independent of errors in the color detection, and visa versa, advantageously, reducing error propagation, reducing the overall error rate for decoding and recognition of generated complex symbols or messages generated from the complex symbols, and the like. - An exemplary embodiment for increasing the number of members of a set is illustrated by way of example in FIG. 17. In FIG. 17, a message that can be read from left to right, having N words, and using the 4 symbols1001-1004 of the
set 1000 shown in FIG. 10 is illustrated. In this example, every 3 symbols, starting and reading from left to right, represent a word, wherein the symbols represent the letters in a word, and each word includes 3 letters. As shown in FIG. 17, for example, the first word includes a sequence ofsymbols symbols symbols - If a physical-level error occurs, such as a extra line drawn on a part of the symbol, a line deleted from a part of the symbol, and the like, then one word or symbol can be confused with another one. This is more problematic for words with long length, such as words defined with a length of 100 symbols (for example, each word including 100 symbols in series). In such cases, more markers for position, rotation, orientation, synchronization, and the like, can be employed. In addition, parity codes, check-sum codes, error checking or correction schemes, and the like, can be employed to help to reduce the error rate. Furthermore, some of the members of the set can be set aside, and not be used at all, for the sake of better recognition of the symbols or words, more certainty in recognition, less confusion, and the like.
- The exemplary embodiments of, for example, FIGS. 16 and 17 can be combined to further increase the number of members in a resulting set. In addition, grammar, rules, and the like, can be added between the words defined in FIG. 17 to even further increase the number of members in the resulting set. For example, grammar, rules, and the like, can be used to specify relationships between words, order of words, meaning in the context, exceptions, and the like. General rules, such as English grammar rules, computer language rules, algorithmic rules, grammars, such as Pascal, eXtensible Markup Language (XML), FOR-loop structures, and the like, also can be employed.
- The resulting relative large set of complex symbols or words can be used, for example, to map, represent, abbreviate, symbolize, to correspond to different complete messages, partial messages, English phrases, words, letters, partial words, compression tables, dictionaries in English or other languages, other symbols, other glypbs, other letters, other languages, logical expressions, computer commands, executables, pieces of code, other human readable languages or symbols, voices, sounds, voice recognition commands, instructions, rules, numbers, grammar, parameters of rights assignment or granting or controlling access to items, conditions, fees, dates, information about items or an owner of an item, to request for specific actions and doing those actions, such as transfer of fund or items, erasure of content, disabling or preventing access to items, with tables, databases, formulas, curves, translation schemes, predefined or dynamic mapping relationships, such non-static and variable mapping relationships, mapping relationships depending on context, situation, or other parameters, and the like.
- For example, FIG. 18 illustrates an exemplary rights expression for indicating an expiration date for access to an e-book using the symbols of the
set 1500 shown in FIG. 15. In FIG. 18, for example, a book identification (ID) number in a database is 245, which, for example, refers to a novel by a given author, and an access expiration date is Jul. 12, 2003. Accordingly, the first complex symbol can be used to express the phrase “Book (or resource) ID number,” the second complex symbol can be used to express the integer “245,” the third complex symbol can be used to express the phrase “Access/expiration date,” the fourth complex symbol can be used to express day and month of the year (“July 12,” or 7-12), and the fifth complex symbol can be used to express the year “2003.” - In a similar manner, any suitable expression, grammar, rule, and the like, can be expressed based on the glyphs and/or the complex symbols of the exemplary embodiments, advantageously, to enable rights management, rights assignment, and the like. Additional exemplary expressions and/or grammar for rights assignment and management, such as for the XrML language, grammar, expressions, statements, licenses, rights assignment, and the like, that can be expressed using the described exemplary embodiments, for example, are further described in commonly-assigned U.S. Pat. No. 5,715,403, No. 5,629,980, No. 6,236,971, No. 6,233,684, No. 5,634,012, No. 5,638,443, and No. 5,530,235.
- FIG. 19 illustrates an exemplary rights expression for performing an action expressed using the symbols1401-1404 of the
set 1500 shown in FIG. 15. For example, in FIG. 19, the action can be the sending of funds, 55 US Dollars, to accountnumber 435 at a bank withID number 212, and the like. According to an exemplary embodiment, the expressed action can include any suitable type of action and can be complex in structure, for example, having hierarchical, logical, conditional, and the like, statements within its structure. - FIG. 20 illustrates an exemplary rights expression for performing an action using the symbols1401-1404 of the
set 1500 shown in FIG. 15. For example, in FIG. 20, the action can be the erasing of an e-book file with theID number 125. According to an exemplary embodiment, the expressed action can include rights management actions, editing actions, combining actions, actions for transferring items, objects, or resources, and the like. - FIG. 21 illustrates an exemplary rights expression for expressing the right to print 100 copies of 2 e-books with
ID numbers set 1500 shown in FIG. 15. As shown in FIG. 21, logical phrases, such as AND, OR, exclusive OR (XOR), and the like, can be employed within an exemplary rights expression. According to an exemplary embodiment, the glyphs employed can include their own internal logic, rules, grammar, structure, options, ordering, and the like. - FIG. 22 illustrates an exemplary rights expression for expressing the right to listen to music, play music, render music, and the like, for 100 minutes, for 2 pieces of music with
ID numbers 443 and 13, using the symbols 1401-1404 of theset 1500 shown in FIG. 15. For example, in FIG. 22, the music ID numbers are listed in series, one after the other, and the end of the list of ID numbers is flagged, indicated, and the like, by an glyph referred to as an “End of List of ID Nos.” According to an exemplary embodiment, an expressed list can be extensive, include many layers within each other, such as directories, and the like. - FIG. 23 illustrates an exemplary rights expression for expressing an e-book data record for an e-book with
ID number 143, whose owner has anID number 212, using the symbols 1401-1404 of theset 1500 shown in FIG. 15. For example, in FIG. 23, the end of the record is indicated, flagged, and the like, by a glyph referred to as “End of Data.” According to an exemplary embodiment, an expressed record can include additional information about the book, content owner, and the like, such as how to send payment to a content owner, and the like. In addition, the size of an expressed record can be of any suitable size, and the expressed record can be hierarchical, including its own directories, and the like. - FIG. 24 illustrates an exemplary rights expression, wherein the same sets of symbols can have different meanings in different situations, contexts, applications, industries, can be custom-made for each application or industry, and the like, using the symbols1401-4104 of the
set 1500 shown in FIG. 15. For example, in FIG. 24, a glyph can be used to express what application the rights expression is intended for, such as e-books, movies, music, video, multimedia, and the like. The next glyph can be used to express the units employed for a given type of content, such a “Pages” for e-books, minutes for music and movies, Bytes for data, tracks for music, and the like. The next glyph can be used to express a range for the units, such as the range of pages of an e-book, and the like. The next two glyphs can be used to express the “Start” and “End” units for the ranges, such as 5 and 10, for expressing a range of “between pages 5 and 10,” in the case of an e-book, “between minutes 5 and 10,” in the case of a music file, and the like According to an exemplary embodiment, any suitable information also can be added, such as to indicate the name or the ID of an e-book, or content owner, information relevant to rights assignment or rights management, and the like. Thus, the glyphs of the exemplary embodiments can have flexible interpretations, can have multiple meanings, can depend on a context or application, and the like. - In an exemplary embodiment, the symbols, sets of symbols, and the like, of the exemplary embodiments, for example, as described with respect to FIGS.2-24, can be correlated, associated, and the like, with corresponding information, such as rights expressions or portions thereof, and the like, for example, based on information that can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems of
DRM system 100. One or more databases of the devices and subsystems of theDRM system 100 can store such information. The databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed herein, and the like. - In an exemplary embodiment, one or more glyphs can be employed so as to carry a secondary message, hidden message, and the like. For example, in the case of airport security, such a glyph can be embedded on a passenger's ticket, in the case of library security, such a glyph can be embedded on a student's library card, and the like. In the exemplary airport security embodiment, for example, in response to the passenger, an identified terrorist, presenting a ticket employing such a glyph, a silent alarm can be triggered to notify authorities to react to the situation in a manner that is not apparent to the terrorist. Accordingly, the exemplary embodiments can be employed to express various actions that can be initiated via a ticket, some of which may not be apparent to the ticket holder, advantageously, making it easier for authorities, and the like, to react to and/or control a given situation.
- In an exemplary embodiment, the glyphs of the exemplary embodiments can be displayed in three dimensions, on paper, on a computer display, and the like, for example, using holographic technology, and the like. In an exemplary embodiment, the glyphs of the exemplary embodiments can be secretly designed, such that it would be hard to replicate, or fake the glyphs, layers of security can be added, such as by employing watermarking, authentication, check-sum, and the like, schemes. In an exemplary embodiment, the state, history, and the like,,of a system, such as the
DRM system 100, content, and the like, can be encoded using the glyphs of the exemplary embodiments. - In an exemplary embodiment, the glyphs of the exemplary embodiments need not be printed nor be capable of being seen by a human eye, as long as the glyphs of the exemplary embodiments can be machine read, for example, using a suitable device, such as a scanner, wand, bar code reader, and the like. In a further exemplary embodiment, the glyphs or symbols of the exemplary embodiments need not be in forms that can be “seen” by a machine. For example, the glyphs or symbols of the exemplary embodiments can be configured to be detected in some other way, such as being “heard,” and the like.
- In an exemplary embodiment, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments used to convey information, for example, can be encoded using light, sound, a series of sounds, light pulses, and the like, using at any suitable frequency, amplitude, and the like, can include ultraviolet waves, x-rays, microwaves, radio waves, and the like, can employ lasers, modulated or convoluted information, different colors or wavelengths, electric or magnetic field variations, and the like. Any suitable series of the glyphs, symbols, words, messages, and the like, of the exemplary embodiments employed can have its own grammar, rules, and the like, which provide a meaning to a transmitted message. For example, a sound or light in a range of frequencies that a human ear or eye cannot detect, can be employed for transmitting the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, during security applications, privacy applications, and the like. In this way, a transmitted message can be made transparent to a user or users, but at the same can be retrieved, understood, and the like, by a suitable sensor, detector, and the like. In an exemplary embodiment, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments can be expressed using any suitable human or machine sensing organ or device, and the like, so long as that the sensed information, message, and the like, can be quantized, digitized, expressed, and the like, based on numbers, bits, bytes, and the like.
- For example, a device, such as a touch tone telephone, and the like, can be used to transmit a sequence of sounds corresponding to the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, over a communications medium, such as a telephone line, and the like. The specific sounds, including their sequence, duration, other factors, and the like, can be employed the represent the symbolic expression expressed by the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. Using this exemplary embodiment, an application can be used to enable a customer to engage in, for example, an online transaction that has the same effect as an application using the Internet for the online transaction, except that such a transaction can be sound based.
- According to an exemplary embodiment, rights expression information can be reduced to a series of numbers using various techniques. For example, an unambiguous canonical rights expression can be converted into a binary format. In an exemplary embodiment, such a binary format can be expressed as a sound, a series of sounds, and the like, and based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- In a further exemplary embodiment, a rights expression template, profile, and the like, can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. For example, an exemplary rights expression, in the form of a license granting the right to a specified manner use (for example, playing) of content (for example, an identified song) on an identified device, and the like, can be expressed, as follows:
<license> <grant > <cm:device cmid= “123”/> <cx:play/> <cm:song cmid= “456”/> </grant> <cm:issuerDevice> <cm.device cmid= “024”/> </cm:issuerDevice> </license> - Then, according to an exemplary embodiment, the corresponding template, profile, and the like, for example, wherein variables in the license are removed, can be generated, as follows:
<license> <grant> <cm:device cmid= “”/> <cx.play/> <cm:song cmid= “”/> </grant> <cm:issuerDevice> <cm:device cmid= “”/> </cm:issuerDevice> </license> - Thus, such a rights expression template, profile, and the like, advantageously, can be expressed using a sound, series of sounds, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. In a similar manner, according to a further exemplary embodiment, light, a series of light pulses, and the like, at any suitable frequencies, including ultraviolet waves, x-rays, microwaves, radio waves, and the like, can be employed to express information, and, for example, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- The exemplary embodiments, thus, can be used to express information, such as rights expressions, and the like, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. For example, any suitable rights expressions can be translated into the noted formats, and can be machine processed. Advantageously, the exemplary embodiments can provide increased efficiency, better matching of a resources to a target computational environment, such as matching a technology to a device employed, and the like.
- For example, according to an exemplary embodiment, a user wishes to display on a personal computer screen a copy of the “Complete Works of William Shakespeare,” which the user has already obtained, and which resides in the hard drive of the personal computer of the user. In an exemplary embodiment, the user can engage in an online transaction through the Internet, for example, visiting a corresponding Internet site, using the computer keyboard to provide certain information for representing a request for access to the work and the rights the user wishes to acquire, providing a credit card number to pay for the transaction, and downloading from the Internet site a digital license associated with the work authorizing the user the right to render the work by displaying the work on the personal computer screen. A computer program running on the personal computer can be used to interpret the license, and upon successful interpretation the user can be permitted to render the work.
- According to an exemplary embodiment, the above example can be accomplished by transmitting a series of sounds. In this exemplary embodiment, the Internet site can transmit sound tones, which can be interpreted by a personal computer, other device, such as a mobile telephone, and the like, as corresponding a license granting the right to render the work. A touch-tone telephone system can be employed and configured to transmit and recognize the sound tones. Other devices can be employed and configured to transmit over a communications device other sounds, for example, with fine nuisances that are difficult to replicate, for example, for security purposes, and the like.
- According to an exemplary embodiment, a symbol in the form of a sound signal, a light signal, and the like, can be transmitted and used, for example, during at checkout at an online store, and the like, to denote that an item, such as an e-book, music file, movie, and the like, is paid for and can be unlocked so as to function. Alternatively, the absence of such transmission can be used to prevent the item from being used.
- According to an exemplary embodiment, tones, frequencies, sequences of sounds or light, as noted above, and the like, as representations of symbols can be broadcast as a signal to initiate an action, series of actions, and the like. For example, an owner of digital content, such as a company, can broadcast a sound throughout a building, which can cause devices in the building to initiate transactions, such as to lock down electronic files, because a computer system has been determined to be compromised, and the like. In this example, a device, such as a personal computer, and the like, can be offline, but can respond to the broadcast signal, for example, via a suitable device, and the like, capable of receiving the broadcasted signal. In an exemplary embodiment, the broadcasted signal representation can be a command revoking or suspending licenses previously acquired authorizing devices to permit rendering or transfer of electronic files, digital works or content, specific digital works or content, and the like.
- According to the exemplary embodiments, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be in printed or in visible form, such as in the case of a paper ticket with a glyph printed thereon, and the like. According to a further exemplary embodiment, the ticket, the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be in a digital form, such as an electronic form, and the like.
- Employing digital representations of a rights expression based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, advantageously, provides security. For example, if an unauthorized party, such as a hacker, an unauthorized computer device, and the like, gains access to a symbolic representation of the rights expression in the form of the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, the unauthorized party is then faced with the task of interpreting the symbolic representation. By contrast, when employing a human readable rights expression representation, such as one employing an XML expression, and the like, an unauthorized party can view rights, conditions, other information, and the like, included in the rights expression. Thus, advantageously, an unauthorized person typically has to undertake a secondary activity, such as a second hacking attempt, a second decoding step, and the like, to unlock the information represented by the symbolic representation of a rights expression based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments.
- In the case of the rights expression based on a symbolic representation in digital form, for example, based on the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, a trusted communication session can be established between a repository, such as a personal computer, a smart card, and the like, employing the symbolic representation and a device, such as a reading device, scanning device, and the like, reading the symbolic representation. In this way, the information included in the symbolic representation can continue to be protected when the symbolic representation is interpreted. However, a trusted session can be dispensed with, for example, if it is not critical to maintain the security of the symbolic representation, if it is not critical to use a method to maintain security, and the like.
- The use of symbolic representations, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be a substitute for, or work in conjunction with, other kinds of security mechanisms, such as encryption, and the like. For example, a highly complex symbol, such as a multi-colored holograph, can be employed with the exemplary embodiments. In this exemplary embodiment, such a symbol can be literally seen, but the information represented therein can be made sufficiently complex, for example, so that such information cannot easily be discerned, the symbol cannot easily be counterfeited, and the like. Advantageously, such as a symbolic representation, for example, can be in plain view, in plain view when rendered, and the like, and embody sensitive information without a need to encrypt such information.
- In an exemplary embodiment, symbolic representations, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be secretly designed, such that replication, faking, and the like, are difficult to achieve, and additional layers of security can be employed, such as watermarking schemes, authentication schemes, check-sum schemes, and the like. Thus, in an exemplary embodiment, the symbolic representations, for example, can include security aspects, and the like, that can be used in security methods and systems, and the like. For example, the symbolic representations of the exemplary embodiments can be embedded into an item, such as digital content, and the like, or can be associated with the item using any suitable method, for example, such as the methods disclosed in commonly-assigned U.S. Pat. No. 5,530,235, No. 5,634,012, No. 5,638,443, No. 5,715,403, and No. 5,629,980, and the like.
- In an exemplary embodiment, the symbolic representation of the exemplary embodiments can be used to encode a security object that can be used to carry a secondary message, hidden message, and the like, and that can be represented in a human readable form, and the like. Such a security object can be printed on an airline ticket, boarding card, and the like, or can be represented in an electronic form, such as on a magnetic stripe of the airline ticket, boarding card, and the like. In the case of the airline ticket, for example, such a security object can be used to notify authorities to react in a manner that is not apparent to the passenger holding the airline ticket.
- Accordingly, various actions can be initiated with appropriate symbolic representations, some of which are not apparent to the passenger, making it easier for the authorities to react and control a given situation. In the case of a human readable security object, although the passenger can see the security object, the passenger would not know its import. However, when the security object is read by an appropriate device, viewed by a skilled person, and the like, the security object can reveal the hidden or secondary message, for example, such as a message indicating that the ticket holder should receive a secondary security check, a message alerting airline personnel that the ticket holder is a minor, a message alerting airline personnel that the ticket holder has special needs, and the like.
- In an exemplary embodiment, the security object can reside, digitally, in human readable a form, and the like, in an item, such as an identification card, smart card, repository, and the like, and, for example, can be used to express a right of entry into a certain building, and a condition that to enter the bearer must present a Maryland driver's license number 1234567890 issued in the name of John Smith. Information in or on the item can clearly reveal to a possessor, even an unauthorized possessor, that the item can be used to gain access to the building, but the condition that possession of the drivers license also is required can be hidden, for example, until a security officer reads the security object detailing same. Accordingly, an authorized possessor can be given enough information in eye-readable form, for example, to gain access to a building, but hidden information can be included in the form of the security object in order to catch an unauthorized possessor of the item.
- In an exemplary embodiment, a parent can use the security object, for example, encoded in or on a child's library card, and the like, for example, to indicate to a librarian that the child only can borrow “G” rated videos, books, and the like. In this exemplary embodiment, the librarian will able to detect the hidden message carried by the security symbol, while the child will not.
- The exemplary embodiments, can be applied to any suitable situation where it is desirable that a possessor of an item bearing the security object, for example, not know the meaning of the security object, not know a full meaning of the security object, and the like. For example, a company can issue a visitor an identification badge with such a security object encoded thereon, and can inform the visitor that the badge can only be used to gain access to building A. In this exemplary embodiment, when the visitor attempts to gain access to building B by presenting the badge to an appropriate device, such as a card reader, and the like, the security object can be used to trigger an alert not only to deny entry to the building B, but also to trigger some other action as defined by the security object, for example, such as to sound an alarm, to detain the person in the case of human intervention, and the like.
- In the exemplary embodiments, human intervention can be involved, for example, in the case of security personnel having to examining the item, or no human intervention may be needed, for example, in the case of an automatic security system. The badge also can be encoded with a right, for example, represented by a glyph, to enter building A in a restricted manner, such as on specified days, at specified times, and the like. Advantageously, the exemplary embodiments described herein, for example, can be used to permit a digital work or content to be rendered, can be employed to allow access to a building, such as by opening a door, and the like.
- In an exemplary embodiment, a condition for exercise of a usage right, such as determining that a resource, such as a video file, or music file, being accessed, used, or acquired, has not been altered, or tampered with, for example, can be specified using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. Such a condition can be used in connection with one or more other conditions and usage rights. For example, a usage right can be used to specify that a video file can be rendered, played, and the like, an unlimited number of times on the condition that the rendering is performed prior to Jul. 4, 2003, and provided that, on each occasion that rendering is requested, a specified method determines that the video file has not been altered. If the file cannot be determined to be unaltered, then rendering can be denied and other consequences can follow, such as the
DRM system 100 being programmed to lock down the file, and generate a report to the appropriate authority so that the suspected alteration can be investigated. - In an exemplary embodiment, the
DRM system 100 can be configured to utilize a usage rights expression, for example, which includes a condition for exercising some right, such as to gain access to a service, gain access to a computer site, gain access to a digital work or content, to render a digital work or content, and the like. Such a condition can include, for example, determining that digital content in question has not been tampered with, has not been altered, and the like, and that the symbolic representation of the usage right has not been tampered with, has not been altered, and the like. Accordingly, if theDRM system 100 fails to determine that both that the digital content and the symbolic representation have not been altered, the exercise of the purported usage right can be denied. Advantageously, this exemplary embodiment provides a two-pronged layer of protection, because a person attempting gain unauthorized access or otherwise obtain something to which they are not entitled would have to pass two hurdles. For example, such unauthorized party would have to perform to forgeries or hack two things. - In an exemplary embodiment, a person wishing to exercise a usage right, such as a right to view a video file, and the like, can present an item including a glyph representing such a usage right. The glyph can be in electronic form, in printed form, in a hard copy format, and the like. In this exemplary embodiment, a DRM application, such as the
client component 122, and the like, in addition to being configured to ensure that conditions for exercise of the usage right are satisfied, can be configured to determine that the glyph and/or the video file have not been altered in order to grant exercise of the usage right. If the DRM application determines that the glyph and/or the video file have been altered, the DRM application can be configured to prevent exercise of the usage right. If, however, the DRM application determines that the glyph and the video file have not been altered, the DRM application can be configured to allow the exercise of the usage right, for example, subject to successful completion of other processes employed by the DRM application. - In an exemplary embodiment, the determination of non-alteration can be employed before exercise of the usage right is allowed, thus, erring on the side of the usage right not being exercised if such a test fails. This approach, however, can be varied, wherein the determination of non-alteration is not to be made, thus, erring on the side of permitting the exercise of the usage right.
- In a further exemplary embodiment, however, a hybrid approach is made possible. For example, a determination of non-alteration can be employed to exercise the full usage rights requested, but if such a determination fails, then some of the usage rights can be exercisable, while others may not. Thus, the exercisable usage rights can be configured as a subset of the full usage right, but need not be. For example, the
DRM system 100 can be configured to permit rendering by display of a file on a computer screen, but to not permit the file to be copied, moved, loaned, transferred, and the like. As a further example, theDRM system 100 can be configured to generate an error report to an authorizing authority, such as a server, repository, device, and the like, where the report can be reviewed, automatically, based on human intervention, and the like. The report can be configured to detail the determinations made by theDRM system 100, and the results of such determinations. TheDRM system 100 then can permit exercise of the usage rights, if authorized to do so by the authorizing authority. - The exemplary embodiments, advantageously, can be employed to ensure that an item, such as photographs, for example, police crime scene photographs, and the like, have not been altered. In this exemplary embodiment, wherein a digital photograph is to be relied on, it can be important to ensure that the photograph is not altered, but probably it can be even more important to ensure that if the photograph is altered that such alteration can be detected. The more complex the symbol employed, the more difficult it is to effect an alteration in either the symbol or the digital content in a way that cannot be detected. Accordingly, the level of complexity employed in the symbolic representations of the exemplary embodiments depends on the level of security desired. The exemplary embodiments can be employed with objects other than photographs, video files, and the like, and in situations, other than evidentiary findings, and the like, as will be appreciated by those skilled in the relevant art(s).
- Any suitable method to detect if an item, such as a photograph, video file, and the like, has been tampered with can be employed with the exemplary embodiments. For example, a verification method, such as described in commonly assigned, co-pending, U.S. patent application Ser. No. 10/147,304 of Tadayon et al., entitled “METHOD AND APPARATUS FOR VERIFYING DATA INTEGRITY BASED ON DATA COMPRESSION PARAMETERS,” filed on May 17, 2002, the entire disclosure of which is hereby incorporated by reference herein, can be employed. Such a verification method, for example, can include determining one or more of various parameters resulting from, or used for, compression or other manipulation of the data and comparing the value or character of that parameter to the original value or character after transmission, processing and/or a period of time. Any compression scheme or other manipulation can be used. Further, combinations of the parameters can be used and processed in various manners through various logical processes.
- In an exemplary embodiment, both background and foreground symbols, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to express a meaning, message, and the like. For example, a meaning of the background symbol can be that when the background symbol is present the foreground symbol can be interpreted. However, both the background symbol and the foreground symbol can be configured to express a meaning. For example, the
DRM system 100 can be configured to interpret a first symbol if a second symbol is present in a certain way, such as printed on a same substrate as the first symbol, printed at a certain physical location relative to the first symbol, and the like. - In addition, each symbol can be configured to express part of the information being conveyed, for example, such that the information being conveyed can be distributed over a plurality of symbols, the information being conveyed can be distributed over a plurality of symbols in a redundant manner, and the like. Further, all of the symbols can be configured to be in digital form, one of a plurality of symbols can be configured to be in digital form while the others are not, and the like. For example, a paper ticket can include a printed symbol, which when read by an appropriate reader, machine, and the like, can be detected to represent a usage right. However, a condition to be satisfied in order to exercise the usage right can be the presentment to the reader, machine, and the like of a digital symbol, for example, included in a repository, such as a smart card, handheld device, and the like, or presentment of an additional printed symbol, and the like.
- In an exemplary embodiment, a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey little or no information, but, instead, convey information on how to obtain information. In this exemplary embodiment, for example, the symbol can be configured as a pointer to another system, device, file, and the like. This exemplary embodiment can be useful where security is desired, because an unauthorized party, device, and the like, would have to hack, crack, and the like, multiple systems to obtain the information. For example, the unauthorized party would have to crack the symbol to determine that in order to obtain unauthorized access a second system must be compromised. The unauthorized party would then have to crack the second system.
- Thus, in this exemplary embodiment, symbols can be configured as pointers to a system, device, place, and the like, where information can be obtained, a transaction is to take place, and the like. In an exemplary embodiment, for example, one or more symbols can be configured to convey Uniform Resource Locator (URL) information, for example, for a system, a device, a resource, a file, a document, a music file, a video file, a movie, an e-book, software, and the like. Accordingly, when a suitable reader, machine, and the like, reads the symbol, the symbol can be interpreted as representing the URL and appropriate actions can be taken, for example, such as directing a Web browser to the URL for gaining accessing a music file, video file, and the like.
- The present invention recognizes that there are situations where establishing a communications link with a server, repository, device, and the like, for example, over the Internet, via a telephone line, modem, and the like, may not practical or even possible. In this exemplary embodiment, a user can attempt to gain access to an item, such as digital content, a service, and the like, by initiating an online transaction. The online transaction can result in the user gaining access to the item requested. However, there may be the situation where the ability to communicate can be constrained. For example, a user may have received through the mail a disk including a movie file, a user may have on a hard drive of a personal computer, such as in the
client environment 120, a movie file, and the like. - In the above case, the owner of the movie file, such as a movie studio, video store, and the like, for example, can have the user initiate an online transaction, transmit a credit card number to pay a fee for the accessing the movie, and receive a license that can permit rendering of the movie by viewing of the movie file on a screen of the personal computer. However, it may not be practical, for example, for the user to initiate an online session, the user may not wish to initiate an online session, the user may not be able to initiate an online session, and the like. Thus, according to exemplary embodiment, the user can employ a ticket, for example, including a license granting the user the right render the movie by viewing the movie file on the screen of the personal computer, and that can be read by the personal computer.
- In an exemplary embodiment, the ticket can be in the form of a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. Depending on a level of security desired, the symbol can be made complex to deter counterfeiting. In addition, each use of the ticket can be recorded in a record, for example, on the ticket itself, in another repository, such as the personal computer of the user, and the like. Such a record can be configured to indicate the number of times the ticket has been used, wherein the ticket can be configured to be used one time, many times, and the like. For example, the user may have acquired the right to view ten movies distributed by a movie studio, movie store, and the like. This information can be recorded in the personal computer of the user. Then, after each rendering of a corresponding movie file, for example, respectively authorized by a ticket from the movie studio, the number of views to which the user remains entitled can be reduced by one. In this exemplary embodiment, the ticket need not record information concerning a use thereof, but rather information for authorizing use of the corresponding movie file.
- In a further exemplary embodiment, however, the ticket can be used to record information about use of the ticket. For example, each use of the ticket to authorize rendering of the movie file can result in the number of authorized uses to be reduced by one and to be reflected on the ticket, wherein the rendering repository, such as the personal computer of the user, another repository device, and the like, need not record information concerning use. In an exemplary embodiment, the ticket can be in digital form so that the use information can be recorded on the ticket. However, according to a further exemplary embodiment, such use information can be a printed on the ticket, and the like. In addition, so that the ticket cannot be used once the number of authorized uses have expired, for example, the ticket can be altered, information can be recorded on the ticket, and the like. Such alteration can be performed, for example, via mechanically means by the device reading the ticket, by human intervention, such as by a clerk at a kiosk, and the like.
- In an exemplary embodiment, two tickets can be employed, wherein one ticket can be in digital form, and record information concerning use, and the other ticket can be in digital or printed hard copy form and provide information about the item to which access is desired. For example, a movie studio can distribute a hard copy printed ticket which can employ one or more glyphs to express rights expression information concerning the usage rights, manners of use, conditions, and the like, associated with a movie file. The printed ticket can be presented together with the digital ticket to an appropriate device. Then, the device can be configured to read the rights expression information that can be provided on either or both tickets based on the glyphs, process a transaction permitting the usage right to be exercised, such as rendering the movie by viewing the movie file on a screen of a personal computer, subject to applicable conditions, and record the use information, for example, on one or both of the tickets, on the rendering device, on another device, and the like.
- In an exemplary embodiment, a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be employed to express rights expression information, for example, in a resource constrained system or environment, such as on devices having a small foot prints, handheld devices, systems having limited processing resources, and the like.
- As noted above, in an exemplary embodiment, a rights expression can be reduced to a suitable symbol, groups of symbols, sound, groups of sounds, light pulse, groups of light pulses, and the like, representing the rights expression information being expressed. For example, a predetermined tone, set of tones, and the like, can be used to represent an unambiguous canonical rights expression encoded in a binary format. For example, an exemplary unambiguous canonical rights expression, encoded in a binary format, can given by:
- 01 03 04 202103123 05 22 06 232103456 09 24 00 202103024,
- where:
01 <license> 03 <grant> 04 principal [Processing instruction] 202103123 <cm:device cmid “123”/> 05 right [Processing instruction] 22 <cx.play> 06 resource [Processing instruction] 232103456 <cm:song cmid=“456”/> 09 issuer [Processing instruction] 24 <cm:issuerDevice> 00 next level 202103024 <cm:device cmid “024”/> - According to an exemplary embodiment, a manner of use of an item can be specified with a symbol, such as the glyphs, symbols, words, messages, and the like, the exemplary embodiments. In addition, glyphs can be expressed in terms of sound, color, image, pulse, light, and the like, signals, wherein the amplitude, frequency, and width of the corresponding signals could be modified to modify an expressed message. Further, information regarding rights, conditions, and the like, can be expressed as three dimensional (3D) information, such as via a holographic glyph image, and the like.
- According to an exemplary embodiment, a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to convey rights expression information, such as an expiration date, and the like, for example, to prevent the display of information on a monitor of a computer, and the like. In this exemplary embodiment, the glyph conveying the rights expression information can be displayed on the monitor of the computer, and can be scanned, wanded, and the like, via a suitable detector, hand-held scanner, and the like. For example, such rights expression information can be configured for use with an auction Web site, a storefront on the Internet, and the like.
- According to an exemplary embodiment, sound, light, a combination of light and sound, and the like, can be is used for transmission of rights expression information. For example, the movement of a user in a building can be monitored, and the presence of the user in a room can be monitored, detected, and the like, for example, using an iris scan, a smart card, voice recognition, biometrics, a device on the clothing of the user, and the like. Then, according to a security level assigned to the room, such as the Pentagon library, items in the room, such as top-secret files, and the like, privileges of the user for gaining access to the corresponding information, data, services, and the like, can be based on usage rights, conditions, restrictions, and the like, specified in the rights expression information transmitted in the room.
- According to an exemplary embodiment, for security purposes, a background signal, for example, including noise, such as semi-random noise, random noise, a steganographically encoded signal, a scrambled signal, and the like, can be added to a symbol, such as the glyphs, symbols, words, messages, and the like, of the exemplary embodiments that can be used to convey rights expression information. In this exemplary embodiment, a flag, an indicator, and the like, can be employed to indicate that the background signal can be neglected, for all or a part of the signal, by an appropriate scanner of the symbol conveying the rights expression information.
- Further, the rights expression information can be represented as a video image or multimedia content consisting of video, sound, and text and having static and dynamic portions. Any of these elements of the multimedia content can, alone or in combination, be used to represent the rights expression information. The rights expression information can be expressed by being distributed throughout the portions or by being redundantly expressed by the portions for security and reliability.
- The symbolic representations of rights expressions in the exemplary embodiments can be used, for example, in a digital ticket that can be scanned or read by a machine. The symbolic representations can be customized to the needs of a specific group, company or industry, in which case the scanners or readers also can be specialized and customized for a specific purpose or task. As with bar codes designed for various industries with limited feature space so as to provide decisive, unambiguous, and fast interpretations, the symbolic representations of rights expressions can be used to condense the amount of information, reduce the amount of hardware and/or software required to understand the information, and speed up the process for the convenience of the end user of the content, while providing relatively lower error rates and relatively higher precision.
- Barcode or symbol readers, pattern recognition engines, scanners, and the like, can be employed, advantageously, with minor or no modifications to hardware and/or software for practicing the exemplary embodiments. The pattern recognition engines can include neural network, fuzzy logic techniques, and the like. Accordingly, available technologies can be used for the reader and recognition engine functions, which reduces the set-up costs for practicing the exemplary embodiments. Advantageously, processing the symbols expressing the rights information using the readers or pattern recognition processors, for example, to wand the symbol patterns and extract the rights expression information, results in speed and reliability during the interpretation process for the end user of the content.
- In addition, the rights expression information can be output as plain English text, any other suitable human-readable language or form, such as voice or sound, and the like. Accordingly, the end user of the content does not have to know the rules and/or language related the rights expression information, drastically reducing the learning period for the end user, and thus, significantly reducing the operational expenses for the end user.
- The symbolic representations of the exemplary embodiments can be printed on a physical substrate, such as a piece of paper, or can be displayed on a computer monitor, for scanning by an appropriate reader, and the like. The rights expression information can be expressed with symbols in the form of parallel lines, bar codes with different widths, angles, ratios, perspectives, or distances, crossed lines, concentric circles, geometrical shapes, different colors, visible or invisible light sources with different wavelengths for representing different glyphs and shapes and for easy and fast optical recognition, Morse codes, laser pulses with different durations, Japanese characters, English characters, one-dimensional images, two-dimensional images, symbols, sets of symbols with specific angular relationships, sets of symbols with specific spatial relationships for defining different types of grammar or rules, rotational invariant symbols, spatial invariant symbols, symbols with more than one meaning, hidden meanings or meanings not readable by humans, or readable by specialized machines to keep some information secret, watermarks, steganographically encoded symbols, symbols accompanied by human-readable messages, symbols readable by machines only, combinations thereof, and the like.
- In addition, different rights expression information or messages can be conveyed based on the order of the symbols, or placement of the symbols with respect to each other. For example, the specific sequence of symbols can convey a specific situation or context, such as the information about an industry or purpose of the rights expression information. The symbolic representation can be in digital, such as electronic form, and the like, as well as in printed form, visible form, and the like. The symbols can be stored on some sort of electronic media, such a computer hard drive, server, floppy disk, smart card device, and the like. The symbolic representations can be generated using templates, a graphical user interface (GUI), and the like, advantageously, not requiring the end user of the content or providers of the content to have a complete knowledge of a rights expression language and/or grammar.
- In addition, in further exemplary embodiments, the recipe, algorithm, formula, and the like, used for the generation of the symbols could be in public domain or governed by a standards body, to encourage standardization of the symbols. The standards body then could set the parameters for shape or methods of generation of the symbols. In other embodiments, however, the recipe, algorithm, formula, and the like, used for the generation of the symbols could be kept secret from the public, for example, to discourage unauthorized users from generating fake symbols and/or digital tickets. In further exemplary embodiments, if the parameters in the shape or placement of the symbols are not according to the set standard, the symbol reader can be configured to reject the ticket as invalid.
- In the exemplary embodiments, the rights expression information extracted from a symbol or symbols can instruct a scanner or reader to perform a predetermined action. For example, a digital ticket can include a symbol or symbols corresponding to a rights expression indicating that a user has the right to print 4 copies of a report. In this exemplary embodiment, once the user gets a first copy, the symbols also can instruct the reader to print another symbol on the digital ticket, print a new ticket, alter the ticket, and the like, so as to indicate that the user now has the right to print 3 more copies.
- In the exemplary embodiments, the symbols themselves can have a grammar of their own, for example, a relationship internal to symbols themselves, used to express new meanings or extra information, for example, with respect to the neighboring symbols or a predetermined proximity to other specific symbols. For example, if a given symbol is within or exactly 2 symbols away from another symbol, such positional relationship could express further information that can be concluded from that sequence of symbols. In other words, such grammar can be based on the context or proximity of the symbols, with respect to each other or with respect to a marker, and the like.
- FIGS.25-26 are exemplary flowcharts for illustrating the operation of the exemplary embodiments for expressing usage rights for content or other items based on modulated signals or graphical representations of the usage rights. For example, FIG. 25 is an exemplary flowchart for illustrating graphical, representation of rights expression information, and FIG. 26 an exemplary flowchart for illustrating modulated signal-based representation of rights expression information.
- Accordingly, in FIG. 25, at
step 2501, for example, the rights expression information can be specified. Then, atstep 2503, for example, a graphical representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. According to an exemplary embodiment, for example, thecomputer 130 of theDRM system 100 of FIG. 1 can be configured to perform the process for the graphical representation of rights expression information of FIG. 25. However, any suitable device, system and the like, for example, such as one or more of the devices and subsystems of theDRM system 100, can be configured to perform such processing. - Similarly, in FIG. 26, at
step 2601, for example, the rights expression information can be specified. Then, atstep 2603, for example, a modulated signal-based representation of the rights expression information can be generated, for example, using the glyphs, symbols, words, messages, and the like, of the exemplary embodiments. According to an exemplary embodiment, for example, thecomputer 130 of theDRM system 100 of FIG. 1 can be configured to perform the process for the modulated signal-based representation of rights expression information of FIG. 26. However, any suitable device, system and the like, for example, such as one or more of the devices and subsystems of theDRM system 100, can be configured to perform such processing. - The
DRM system 100, for example, as described with respect to FIGS. 1-26, can be used to store information relating to various processes described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and sub-systems ofDRM system 100. One or more databases of the devices and subsystems of theDRM system 100 can store the information used to implement the exemplary embodiments. The databases can be organized using data structures, such as records, tables, arrays, fields, graphs, trees, lists, and the like, included in one or more memories, such as the memories listed above. - All or a portion of the
DRM system 100, for example, as described with respect to FIGS. 1-26, can be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, micro-controllers, and the like, programmed according to the teachings of the disclosed exemplary embodiments. Appropriate software can be readily prepared by programmers of ordinary skill based on the teachings of the disclosed exemplary embodiments. In addition, theDRM system 100 can be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of component circuits. - Advantageously, the exemplary embodiments described herein can be employed in offline systems, online systems, and the like, and in applications, such as TV applications, computer applications, DVD applications, VCR applications, appliance applications, CD player applications, and the like. In addition, the signals employed to transmit the glyphs, symbols, words, messages, and the like, of the exemplary embodiments, can be configured to be transmitted within the visible spectrum of a human, within the audible spectrum of a human, not within the visible spectrum of a human, not within the audible spectrum of a human, combinations thereof, and the like.
- While the present invention have been described in connection with a number of embodiments and implementations, the present invention is not so limited but rather covers various modifications and equivalent arrangements, which fall within the purview of the appended claims.
Claims (99)
1. A method for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression, said method comprising:
specifying rights expression information indicating a manner of use of an item; and
generating a graphical representation of said rights expression information, wherein said graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
2. The method as recited in claim 1 , wherein said graphical representation comprises a glyph.
3. The method as recited in claim 2 , wherein said glyph comprises lines arranged in a predetermined order for representing said rights expression information.
4. The method as recited in claim 3 , wherein said lines include colored lines.
5. The method as recited in claim 2 , wherein said glyph comprises two-dimensional shapes arranged in a predetermined order for representing said rights expression information.
6. The method as recited in claim 5 , wherein said shapes include colored shapes.
7. The method as recited in claim 5 , wherein a spatial relationship of said shapes is used to convey said rights expression information.
8. The method as recited in claim 2 , wherein said glyph comprises a colored glyph.
9. The method as recited in claim 1 , wherein said graphical representation comprises a printable glyph.
10. The method as recited in claim 9 , further comprising:
printing said printable glyph on print media.
11. The method as recited in claim 10 , further comprising:
reading the printed printable glyph with a computing device to extract said rights expression information for enforcement of the rights expression.
12. The method as recited in claim 1 , wherein said graphical representation comprises a displayable glyph.
13. The method as recited in claim 12 , further comprising:
displaying said displayable glyph on a display device.
14. The method as recited in claim 13 , further comprising:
reading the displayed displayable glyph with a computing device to extract said rights expression information for enforcement of the rights expression.
15. The method as recited in claim 12 , further comprising:
displaying said displayable glyph in two dimensions.
16. The method as recited in claim 12 , further comprising:
displaying said displayable glyph in three dimensions.
17. The method as recited in claim 1 , wherein said graphical representation comprises a holographic glyph.
18. The method as recited in claim 17 , further comprising:
displaying said holographic glyph on a display device.
19. The method as recited in claim 17 , further comprising:
reading the displayed holographic glyph with a computing device to extract said rights expression information for enforcement of the rights expression.
20. The method as recited in claim 17 , further comprising:
printing said holographic glyph on print media.
21. The method as recited in claim 20 , further comprising:
reading the printed holographic glyph with a computing device to extract said rights expression information for enforcement of the rights expression.
22. The method as recited in claim 1 , wherein said graphical representation comprises a plurality of glyphs.
23. The method as recited in claim 22 , further comprising:
arranging said glyphs to form words corresponding to said rights expression information.
24. The method as recited in claim 23 , further comprising:
arranging said words to form sentences corresponding to said rights expression information.
25. The method as recited in claim 22 , further comprising:
arranging said glyphs so that that a plurality of arrangements correspond to a plurality of interpretations for said rights expression information.
26. The method as recited in claim 1 , wherein said graphical representation comprises a machine readable symbol.
27. The method as recited in claim 1 , wherein said graphical representation comprises a human readable symbol.
28. The method as recited in claim 1 , wherein said graphical representation comprises a symbol in digital form.
29. The method as recited in claim 1 , wherein said graphical representation comprises a printed symbol.
30. The method as recited in claim 1 , wherein said graphical representation comprises a symbol not discernable by a human.
31. The method as recited in claim 30 , wherein said symbol not discernable to a human comprises a symbol not visible by a human.
32. The method as recited in claim 1 , wherein said rights expression information further includes information relating to a history of the use of said item.
33. The method as recited in claim 1 , wherein said rights expression information further includes information relating to a state of the use of said item.
34. The method as recited in claim 1 , wherein said graphical representation comprises a symbol having a meaning hidden from a human.
35. The method as recited in claim 1 , further comprising:
embedding said graphical representation as part of a logo.
36. The method as recited in claim 1 , further comprising:
adding noise around said graphical representation to obfuscate detection of the rights expression information.
37. The method as recited in claim 1 , further comprising:
embedding said graphical representation as part of a watermark.
38. The method as recited in claim 1 , wherein said rights expression information includes conditions that must be satisfied in order to exercise a manner of use of at least one of digital content, a service, an abstract object, a resource, and goods.
39. The method as recited in claim 1 , further comprising:
configuring said graphical representation to include a background portion and a foreground portion.
40. The method as recited in claim 39 , further comprising:
configuring said foreground portion to represent said rights expression information, wherein said foreground portion is configured to be interpreted based on information represented in said background portion.
41. The method as recited in claim 1 , further comprising:
generating said graphical representation of said rights expression information including a first symbol that is interpreted if a second symbol is present in a predetermined manner.
42. The method as recited in claim 1 , further comprising:
determining that said graphical representation of said rights expression information is unaltered as a condition for interpretation of said graphical representation.
43. The method as recited in claim 1 , further comprising:
configuring said graphical representation as a pointer to one of another graphical representation associated with said rights expression information, and information associated with said rights expression information.
44. The method as recited in claim 1 , wherein said rights expression information is in the form of a template or profile.
45. A method as recited in claim 1 , wherein said graphical representation comprises dynamic video content.
46. A method as recited in claim 1 , wherein said graphical representation comprises dynamic multimedia content including a sound portion, a static image portion, a video, and a text portion, and wherein said rights expression information is expressed by each of said portions.
47. A method as recited in claim 46 , wherein said rights expression information is distributed throughout each of said portions.
48. A method as recited in claim 46 , wherein said rights expression information is redundantly expressed by each of said portions.
49. A system for creating a rights expression for association with an item for use in a system for controlling use of the item in accordance with the rights expression, said system comprising:
means for specifying rights expression information indicating a manner of use of an item; and
means for generating a graphical representation of said rights expression information, wherein said graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
50. The system as recited in claim 49 , wherein said graphical representation comprises a glyph.
51. The system as recited in claim 49 , wherein said glyph comprises lines arranged in a predetermined order for representing said rights expression information.
52. The system as recited in claim 51 , wherein said lines include colored lines.
53. The system as recited in claim 50 , wherein said glyph comprises two-dimensional shapes arranged in a predetermined order for representing said rights expression information.
54. The system as recited in claim 53 , wherein said shapes include colored shapes.
55. The system as recited in claim 53 , wherein a spatial relationship of said shapes is used to convey said rights expression information.
56. The system as recited in claim 50 , wherein said glyph comprises a colored glyph.
57. The system as recited in claim 49 , wherein said graphical representation comprises a printable glyph.
58. The system as recited in claim 57 , further comprising:
means for printing said printable glyph on print media.
59. The system as recited in claim 58 , further comprising:
means for reading the printed printable glyph to extract said rights expression information for enforcement of the rights expression.
60. The system as recited in claim 49 , wherein said graphical representation comprises a displayable glyph.
61. The system as recited in claim 60 , further comprising:
means for displaying said displayable glyph.
62. The system as recited in claim 61 , further comprising:
means for reading the displayed displayable glyph to extract said rights expression information for enforcement of the rights expression.
63. The system as recited in claim 60 , further comprising:
means for displaying said displayable glyph in two dimensions.
64. The system as recited in claim 60 , further comprising:
means for displaying said displayable glyph in three dimensions.
65. The system as recited in claim 49 , wherein said graphical representation comprises a holographic glyph.
66. The system as recited in claim 65 , further comprising:
means for displaying said holographic glyph.
67. The system as recited in claim 65 , further comprising:
means for reading the displayed holographic glyph to extract said rights expression information for enforcement of the rights expression.
68. The system as recited in claim 65 , further comprising:
means for printing said holographic glyph on print media.
69. The system as recited in claim 68 , further comprising:
means for reading the printed holographic glyph to extract said rights expression information for enforcement of the rights expression.
70. The system as recited in claim 49 , wherein said graphical representation comprises a plurality of glyphs.
71. The system as recited in claim 70 , further comprising:
means for arranging said glyphs to form words corresponding to said rights expression information.
72. The system as recited in claim 71 , further comprising:
means for arranging said words to form sentences corresponding to said rights expression information.
73. The system as recited in claim 70 , further comprising:
means for arranging said glyphs so that that a plurality of arrangements correspond to a plurality of interpretations for said rights expression information.
74. The system as recited in claim 49 , wherein said graphical representation comprises a machine readable symbol.
75. The system as recited in claim 49 , wherein said graphical representation comprises a human readable symbol.
76. The system as recited in claim 49 , wherein said graphical representation comprises a symbol in digital form.
77. The system as recited in claim 49 , wherein said graphical representation comprises a printed symbol.
78. The system as recited in claim 49 , wherein said graphical representation comprises a symbol not discernable by a human.
79. The system as recited in claim 78 , wherein said symbol not discernable to a human comprises a symbol not visible by a human.
80. The system as recited in claim 49 , wherein said rights expression information further includes information relating to a history of the use of said item.
81. The system as recited in claim 49 , wherein said rights expression information further includes information relating to a state of the use of said item.
82. The system as recited in claim 49 , wherein said graphical representation comprises a symbol having a meaning hidden from a human.
83. The system as recited in claim 49 , further comprising:
means for embedding said graphical representation as part of a logo.
84. The system as recited in claim 49 , further comprising:
means for adding noise around said graphical representation to obfuscate detection of the rights expression information.
85. The system as recited in claim 49 , further comprising:
means for embedding said graphical representation as part of a watermark.
86. The system as recited in claim 49 , wherein said rights expression information includes conditions that must be satisfied in order to exercise a manner of use of at least one of digital content, a service, an abstract object, a resource, and goods.
87. The system as recited in claim 49 , further comprising:
means for configuring said graphical representation to include a background portion and a foreground portion.
88. The system as recited in claim 87 , further comprising:
means for configuring said foreground portion to represent said rights expression information, wherein said foreground portion is configured to be interpreted based on information represented in said background portion.
89. The system as recited in claim 49 , further comprising:
means for generating said graphical representation of said rights expression information including a first symbol that is interpreted if a second symbol is present in a predetermined manner.
90. The system as recited in claim 49 , further comprising:
means for determining that said graphical representation of said rights expression information is unaltered as a condition for interpretation of said graphical representation.
91. The system as recited in claim 49 , further comprising:
means for configuring said graphical representation as a pointer to one of another graphical representation associated with said rights expression information, and information associated with said rights expression information.
92. The system as recited in claim 49 , wherein said means for specifying and said means for generating comprise devices of a computer system.
93. The system as recited in claim 49 , wherein said means for specifying and said means for generating comprise computer readable instructions recorded on a medium.
94. In a system for controlling use of the item in accordance with a rights expression associated with said item, a rights expression comprising:
rights expression information indicating a manner of use of an item; and
a graphical representation of said rights expression information, wherein said graphical representation is configured to be interpreted by an interpreter of a system for controlling use of said item to permit enforcement of said rights expression based on said rights expression information.
95. The system as recited in claim 49 , wherein said rights expression information is in the form of a template or profile.
96. A system as recited in claim 49 , wherein said graphical representation comprises dynamic video content.
97. A system as recited in claim 49 wherein said graphical representation comprises dynamic multimedia content including a sound portion, a static image portion, a video, and a text portion, and wherein said rights expression information is expressed by each of said portions.
98. A system as recited in claim 97 , wherein said rights expression information is distributed throughout each of said portions.
99. A system as recited in claim 97 , wherein said rights expression information is redundantly expressed by each of said portions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/388,171 US20030225700A1 (en) | 2002-03-14 | 2003-03-14 | System and method for graphical rights expressions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US36393202P | 2002-03-14 | 2002-03-14 | |
US10/388,171 US20030225700A1 (en) | 2002-03-14 | 2003-03-14 | System and method for graphical rights expressions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030225700A1 true US20030225700A1 (en) | 2003-12-04 |
Family
ID=28041836
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/388,226 Expired - Lifetime US7359884B2 (en) | 2002-03-14 | 2003-03-14 | Method and apparatus for processing usage rights expressions |
US10/388,167 Abandoned US20040015426A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights with sound signals |
US10/388,217 Abandoned US20030233169A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights using light signals |
US10/388,171 Abandoned US20030225700A1 (en) | 2002-03-14 | 2003-03-14 | System and method for graphical rights expressions |
US10/388,162 Active 2027-11-01 US8108313B2 (en) | 2002-03-14 | 2003-03-14 | Rights expression profile system and method using templates |
US12/204,393 Active 2025-04-17 US9626668B2 (en) | 2002-03-14 | 2008-09-04 | Rights expression profile system and method using templates |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/388,226 Expired - Lifetime US7359884B2 (en) | 2002-03-14 | 2003-03-14 | Method and apparatus for processing usage rights expressions |
US10/388,167 Abandoned US20040015426A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights with sound signals |
US10/388,217 Abandoned US20030233169A1 (en) | 2002-03-14 | 2003-03-14 | System and method for expressing usage rights using light signals |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/388,162 Active 2027-11-01 US8108313B2 (en) | 2002-03-14 | 2003-03-14 | Rights expression profile system and method using templates |
US12/204,393 Active 2025-04-17 US9626668B2 (en) | 2002-03-14 | 2008-09-04 | Rights expression profile system and method using templates |
Country Status (8)
Country | Link |
---|---|
US (6) | US7359884B2 (en) |
EP (4) | EP1490819A4 (en) |
JP (5) | JP4740543B2 (en) |
KR (3) | KR20040101312A (en) |
CN (4) | CN1653463B (en) |
AU (4) | AU2003221995A1 (en) |
BR (1) | BR0308409A (en) |
WO (4) | WO2003079270A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030210429A1 (en) * | 2002-05-10 | 2003-11-13 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program |
US20060069646A1 (en) * | 2004-09-28 | 2006-03-30 | Yoshinori Matsumoto | Method of controlling a terminal device |
US20070011094A1 (en) * | 2005-07-05 | 2007-01-11 | Xerox Corporation | Tools for accessing digital works |
US20070177188A1 (en) * | 2006-01-27 | 2007-08-02 | Sbc Knowledge Ventures, L.P. | Methods and systems to process an image |
EP1855225A1 (en) * | 2006-05-09 | 2007-11-14 | Ricoh Company, Ltd. | Computer apparatus |
US20080301003A1 (en) * | 2007-05-31 | 2008-12-04 | Daniel Harkabi | System for Online Buying |
US20090138109A1 (en) * | 2007-11-06 | 2009-05-28 | Lg Electronics Inc. | Apparatus providing function to delete files and method for deleting files thereof |
US8532978B1 (en) * | 2008-10-31 | 2013-09-10 | Afrl/Rij | Natural language interface, compiler and de-compiler for security policies |
US8819290B2 (en) | 2009-10-23 | 2014-08-26 | Zte Corporation | Method and system for transmitting compressed rights |
US20150379512A1 (en) * | 2013-02-22 | 2015-12-31 | Op-Palvelut Oy | Communication during payment procedure |
US9589124B2 (en) | 2014-05-29 | 2017-03-07 | Comcast Cable Communications, Llc | Steganographic access controls |
US20170310725A1 (en) * | 2003-10-16 | 2017-10-26 | Gula Consulting Limited Liability Company | Electronic media distribution system |
Families Citing this family (110)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7712024B2 (en) | 2000-06-06 | 2010-05-04 | Microsoft Corporation | Application program interfaces for semantically labeling strings and providing actions based on semantically labeled strings |
US7788602B2 (en) | 2000-06-06 | 2010-08-31 | Microsoft Corporation | Method and system for providing restricted actions for recognized semantic categories |
US7716163B2 (en) | 2000-06-06 | 2010-05-11 | Microsoft Corporation | Method and system for defining semantic categories and actions |
US7770102B1 (en) | 2000-06-06 | 2010-08-03 | Microsoft Corporation | Method and system for semantically labeling strings and providing actions based on semantically labeled strings |
US9038108B2 (en) | 2000-06-28 | 2015-05-19 | Verizon Patent And Licensing Inc. | Method and system for providing end user community functionality for publication and delivery of digital media content |
JP4774582B2 (en) * | 2000-06-30 | 2011-09-14 | ソニー株式会社 | Content management apparatus, content management method, and program storage medium |
US7778816B2 (en) | 2001-04-24 | 2010-08-17 | Microsoft Corporation | Method and system for applying input mode bias |
US7970260B2 (en) | 2001-06-27 | 2011-06-28 | Verizon Business Global Llc | Digital media asset management system and method for supporting multiple users |
US8972862B2 (en) * | 2001-06-27 | 2015-03-03 | Verizon Patent And Licensing Inc. | Method and system for providing remote digital media ingest with centralized editorial control |
US8990214B2 (en) | 2001-06-27 | 2015-03-24 | Verizon Patent And Licensing Inc. | Method and system for providing distributed editing and storage of digital media over a network |
KR20040101312A (en) * | 2002-03-14 | 2004-12-02 | 콘텐트가드 홀딩즈 인코포레이티드 | System and method for exprssing usage rights using modulated signals |
US7707496B1 (en) | 2002-05-09 | 2010-04-27 | Microsoft Corporation | Method, system, and apparatus for converting dates between calendars and languages based upon semantically labeled strings |
US7742048B1 (en) | 2002-05-23 | 2010-06-22 | Microsoft Corporation | Method, system, and apparatus for converting numbers based upon semantically labeled strings |
US7707024B2 (en) | 2002-05-23 | 2010-04-27 | Microsoft Corporation | Method, system, and apparatus for converting currency values based upon semantically labeled strings |
MXPA04012119A (en) * | 2002-06-03 | 2005-04-19 | Contentguard Holdings Inc | System and method for supplying and managing rights expressions. |
US7827546B1 (en) | 2002-06-05 | 2010-11-02 | Microsoft Corporation | Mechanism for downloading software components from a remote source for use by a local software application |
US7356537B2 (en) | 2002-06-06 | 2008-04-08 | Microsoft Corporation | Providing contextually sensitive tools and help content in computer-generated documents |
US7716676B2 (en) | 2002-06-25 | 2010-05-11 | Microsoft Corporation | System and method for issuing a message to a program |
US7392479B2 (en) * | 2002-06-27 | 2008-06-24 | Microsoft Corporation | System and method for providing namespace related information |
US7502945B2 (en) * | 2002-06-28 | 2009-03-10 | Microsoft Corporation | Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system |
US7209915B1 (en) | 2002-06-28 | 2007-04-24 | Microsoft Corporation | Method, system and apparatus for routing a query to one or more providers |
FR2848054A1 (en) * | 2002-11-29 | 2004-06-04 | France Telecom | SYSTEM AND METHOD FOR TRANSMITTING INFORMATION ASSOCIATED WITH RIGHTS OF USE |
US7322042B2 (en) * | 2003-02-07 | 2008-01-22 | Broadon Communications Corp. | Secure and backward-compatible processor and secure software execution thereon |
US8131649B2 (en) * | 2003-02-07 | 2012-03-06 | Igware, Inc. | Static-or-dynamic and limited-or-unlimited content rights |
US20100017627A1 (en) | 2003-02-07 | 2010-01-21 | Broadon Communications Corp. | Ensuring authenticity in a closed content distribution system |
US7779482B1 (en) | 2003-02-07 | 2010-08-17 | iGware Inc | Delivery of license information using a short messaging system protocol in a closed content distribution system |
US20040267384A1 (en) * | 2003-02-07 | 2004-12-30 | Broadon Communications, Inc. | Integrated console and controller |
US7783614B2 (en) | 2003-02-13 | 2010-08-24 | Microsoft Corporation | Linking elements of a document to corresponding fields, queries and/or procedures in a database |
US7711550B1 (en) | 2003-04-29 | 2010-05-04 | Microsoft Corporation | Methods and system for recognizing names in a computer-generated document and for providing helpful actions associated with recognized names |
US9553879B2 (en) * | 2003-06-06 | 2017-01-24 | Core Wireless Licensing S.A.R.L. | Method and apparatus to represent and use rights for content/media adaptation/transformation |
US7653936B2 (en) * | 2003-06-25 | 2010-01-26 | Microsoft Corporation | Distributed expression-based access control |
US7739588B2 (en) | 2003-06-27 | 2010-06-15 | Microsoft Corporation | Leveraging markup language data for semantically labeling text strings and data and for providing actions based on semantically labeled text strings and data |
US6898555B2 (en) * | 2003-07-14 | 2005-05-24 | Aladdin Knowledge Systems Ltd. | Method for indicating the integrity of use-information of a computer program |
US7813000B2 (en) * | 2003-12-30 | 2010-10-12 | Microsoft Corporation | Device color characterization profile format |
JP4333494B2 (en) * | 2004-06-17 | 2009-09-16 | ソニー株式会社 | Content reproduction apparatus, content reproduction method, content management apparatus, content management method, and computer program. |
GB0413848D0 (en) | 2004-06-21 | 2004-07-21 | British Broadcasting Corp | Accessing broadcast media |
EP1779258A4 (en) * | 2004-07-12 | 2016-03-02 | Samsung Electronics Co Ltd | Apparatus and method for processing digital rights object |
KR100608585B1 (en) | 2004-07-12 | 2006-08-03 | 삼성전자주식회사 | Method and apparatus for searching rights objects stored in portable storage device using object location data |
US8402283B1 (en) | 2004-08-02 | 2013-03-19 | Nvidia Corporation | Secure content enabled drive system and method |
US8359332B1 (en) * | 2004-08-02 | 2013-01-22 | Nvidia Corporation | Secure content enabled drive digital rights management system and method |
US7664751B2 (en) * | 2004-09-30 | 2010-02-16 | Google Inc. | Variable user interface based on document access privileges |
US7603355B2 (en) | 2004-10-01 | 2009-10-13 | Google Inc. | Variably controlling access to content |
US20060150153A1 (en) * | 2004-12-04 | 2006-07-06 | Micah Altman | Digital object verification method |
US8875309B1 (en) | 2004-12-15 | 2014-10-28 | Nvidia Corporation | Content server and method of providing content therefrom |
US8346807B1 (en) | 2004-12-15 | 2013-01-01 | Nvidia Corporation | Method and system for registering and activating content |
US8788425B1 (en) | 2004-12-15 | 2014-07-22 | Nvidia Corporation | Method and system for accessing content on demand |
US8751825B1 (en) | 2004-12-15 | 2014-06-10 | Nvidia Corporation | Content server and method of storing content |
US20060225055A1 (en) * | 2005-03-03 | 2006-10-05 | Contentguard Holdings, Inc. | Method, system, and device for indexing and processing of expressions |
US7526812B2 (en) * | 2005-03-24 | 2009-04-28 | Xerox Corporation | Systems and methods for manipulating rights management data |
DE102005015113A1 (en) * | 2005-04-01 | 2006-10-05 | Siemens Ag | Method for managing rights of use of electronic data objects by a rights purchaser |
US8893299B1 (en) | 2005-04-22 | 2014-11-18 | Nvidia Corporation | Content keys for authorizing access to content |
US8245051B2 (en) * | 2005-05-13 | 2012-08-14 | Microsoft Corporation | Extensible account authentication system |
DE102005033698A1 (en) * | 2005-07-19 | 2007-02-01 | Siemens Ag | Method for exporting usage rights to electronic data objects |
US7565358B2 (en) * | 2005-08-08 | 2009-07-21 | Google Inc. | Agent rank |
US9401080B2 (en) | 2005-09-07 | 2016-07-26 | Verizon Patent And Licensing Inc. | Method and apparatus for synchronizing video frames |
US9076311B2 (en) | 2005-09-07 | 2015-07-07 | Verizon Patent And Licensing Inc. | Method and apparatus for providing remote workflow management |
US7788590B2 (en) | 2005-09-26 | 2010-08-31 | Microsoft Corporation | Lightweight reference user interface |
US7992085B2 (en) | 2005-09-26 | 2011-08-02 | Microsoft Corporation | Lightweight reference user interface |
KR101322515B1 (en) * | 2005-09-29 | 2013-10-25 | 콘텐트가드 홀딩즈 인코포레이티드 | System and method for digital rights management using advanced copy with issue rights, and managed copy tokens |
KR100746014B1 (en) * | 2005-11-09 | 2007-08-06 | 삼성전자주식회사 | Digital rights management method and system |
US20070143228A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Licensing matrix |
US7921059B2 (en) * | 2005-12-15 | 2011-04-05 | Microsoft Corporation | Licensing upsell |
US8150816B2 (en) * | 2005-12-29 | 2012-04-03 | Nextlabs, Inc. | Techniques of optimizing policies in an information management system |
US20070156601A1 (en) * | 2006-01-03 | 2007-07-05 | International Business Machines Corporation | Method and system for providing interoperability between digital rights management systems |
US20070219908A1 (en) * | 2006-03-02 | 2007-09-20 | Yahoo! Inc. | Providing syndicated media to authorized users |
US8364965B2 (en) * | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US20070255659A1 (en) * | 2006-05-01 | 2007-11-01 | Wei Yen | System and method for DRM translation |
EP2033350A2 (en) | 2006-05-02 | 2009-03-11 | Broadon Communications Corp. | Content management system and method |
US7603350B1 (en) | 2006-05-09 | 2009-10-13 | Google Inc. | Search result ranking based on trust |
US7624276B2 (en) * | 2006-10-16 | 2009-11-24 | Broadon Communications Corp. | Secure device authentication system and method |
US7613915B2 (en) | 2006-11-09 | 2009-11-03 | BroadOn Communications Corp | Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed |
US8200961B2 (en) * | 2006-11-19 | 2012-06-12 | Igware, Inc. | Securing a flash memory block in a secure device system and method |
CN101246527B (en) * | 2007-02-15 | 2011-07-20 | 华为技术有限公司 | Method and system for providing and using copyright description |
US20090006109A1 (en) * | 2007-06-28 | 2009-01-01 | Yahoo! Inc. | Rights Engine Including Event Logs |
US8117094B2 (en) * | 2007-06-29 | 2012-02-14 | Microsoft Corporation | Distribution channels and monetizing |
BRPI0816777A2 (en) | 2007-09-12 | 2017-05-02 | Sony Corp | method and system of distributing content to one or more user devices |
US20090094147A1 (en) * | 2007-10-09 | 2009-04-09 | Fein Gene S | Multi-Computer Data Transfer and Processing to Support Electronic Content Clearance and Licensing |
US20090132403A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Licensing interface for user generated content |
US20090132422A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Machine-readable and enforceable license |
US20090132435A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Popularity based licensing of user generated content |
US20090210333A1 (en) * | 2008-02-14 | 2009-08-20 | Microsoft Corporation | Micro-licensing of composite content |
US8875013B2 (en) * | 2008-03-25 | 2014-10-28 | International Business Machines Corporation | Multi-pass validation of extensible markup language (XML) documents |
US20090254482A1 (en) * | 2008-04-07 | 2009-10-08 | Microsoft Corporation | Time-based licenses |
US8655826B1 (en) | 2008-08-01 | 2014-02-18 | Motion Picture Laboratories, Inc. | Processing and acting on rules for content recognition systems |
EP2164022A1 (en) * | 2008-09-02 | 2010-03-17 | Siemens Aktiengesellschaft | Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system |
US20100174818A1 (en) * | 2009-01-07 | 2010-07-08 | Microsoft Corporation | Input Service for Client Devices |
US8606792B1 (en) | 2010-02-08 | 2013-12-10 | Google Inc. | Scoring authors of posts |
US9244965B2 (en) | 2010-02-22 | 2016-01-26 | Thoughtwire Holdings Corp. | Method and system for sharing data between software systems |
US10657507B2 (en) * | 2010-05-17 | 2020-05-19 | Adobe Inc. | Migration between digital rights management systems without content repackaging |
FR2980865A1 (en) * | 2011-09-29 | 2013-04-05 | France Telecom | CONTENT DISTRIBUTION METHOD, OBTAINING DEVICE AND CORRESPONDING COMPUTER PROGRAM |
US9081974B2 (en) * | 2011-11-10 | 2015-07-14 | Microsoft Technology Licensing, Llc | User interface for selection of multiple accounts and connection points |
US20130144755A1 (en) * | 2011-12-01 | 2013-06-06 | Microsoft Corporation | Application licensing authentication |
US8725650B2 (en) * | 2012-01-26 | 2014-05-13 | Microsoft Corporation | Document template licensing |
US9172711B2 (en) * | 2012-02-13 | 2015-10-27 | PivotCloud, Inc. | Originator publishing an attestation of a statement |
US8627097B2 (en) | 2012-03-27 | 2014-01-07 | Igt | System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
US9177158B2 (en) * | 2012-11-07 | 2015-11-03 | Theplatform, Llc | Methods and systems for processing content rights |
JP6003699B2 (en) * | 2013-02-08 | 2016-10-05 | 富士通株式会社 | Test data generation program, method and apparatus |
US9742843B2 (en) | 2013-03-14 | 2017-08-22 | Thoughtwire Holdings Corp. | Method and system for enabling data sharing between software systems |
US10372442B2 (en) | 2013-03-14 | 2019-08-06 | Thoughtwire Holdings Corp. | Method and system for generating a view incorporating semantically resolved data values |
US10313433B2 (en) | 2013-03-14 | 2019-06-04 | Thoughtwire Holdings Corp. | Method and system for registering software systems and data-sharing sessions |
US10523490B2 (en) * | 2013-08-06 | 2019-12-31 | Agilepq, Inc. | Authentication of a subscribed code table user utilizing optimized code table signaling |
US9319727B2 (en) | 2013-10-29 | 2016-04-19 | Fx Networks, Llc | Viewer-authored content acquisition and management system for in-the-moment broadcast in conjunction with media programs |
US9305000B1 (en) * | 2014-03-27 | 2016-04-05 | Veritas Us Ip Holdings Llc | Creating and publishing service level representations of applications from operational representations |
EP3164942A1 (en) | 2014-07-02 | 2017-05-10 | Agilepq, Inc. | Data recovery utilizing optimized code table signaling |
US9514123B2 (en) | 2014-08-21 | 2016-12-06 | Dropbox, Inc. | Multi-user search system with methodology for instant indexing |
US9384226B1 (en) | 2015-01-30 | 2016-07-05 | Dropbox, Inc. | Personal content item searching system and method |
US9183303B1 (en) | 2015-01-30 | 2015-11-10 | Dropbox, Inc. | Personal content item searching system and method |
EP3465974A1 (en) | 2016-06-06 | 2019-04-10 | Agilepq, Inc. | Data conversion systems and methods |
SG10201806847PA (en) | 2018-08-13 | 2020-03-30 | Mastercard International Inc | Methods and systems for facilitating migration to centralized compliance content for integration with a plurality of digital applications |
CN117478427A (en) * | 2023-12-26 | 2024-01-30 | 广东省能源集团贵州有限公司 | Network security data processing method and system |
Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US5128525A (en) * | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5168147A (en) * | 1990-07-31 | 1992-12-01 | Xerox Corporation | Binary image processing for decoding self-clocking glyph shape codes |
US5221833A (en) * | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) * | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5444779A (en) * | 1993-10-18 | 1995-08-22 | Xerox Corporation | Electronic copyright royalty accounting system using glyphs |
US5449895A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Explicit synchronization for self-clocking glyph codes |
US5449896A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Random access techniques for use with self-clocking glyph codes |
US5453605A (en) * | 1993-12-22 | 1995-09-26 | Xerox Corporation | Global addressability for self-clocking glyph codes |
US5521372A (en) * | 1993-12-22 | 1996-05-28 | Xerox Corporation | Framing codes for robust synchronization and addressing of self-clocking glyph codes |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US5576532A (en) * | 1995-01-03 | 1996-11-19 | Xerox Corporation | Interleaved and interlaced sync codes and address codes for self-clocking glyph codes |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5684885A (en) * | 1995-09-27 | 1997-11-04 | Xerox Corporation | Binary glyph codes based on color relationships |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5745569A (en) * | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US5864127A (en) * | 1996-10-10 | 1999-01-26 | Xerox Corporation | Analog glyph detector and detector arrays |
US6000613A (en) * | 1991-12-27 | 1999-12-14 | Xerox Corporation | Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values |
US6076738A (en) * | 1990-07-31 | 2000-06-20 | Xerox Corporation | Self-clocking glyph shape codes |
US6182901B1 (en) * | 1993-12-22 | 2001-02-06 | Xerox Corporation | Orientational disambiguation for self-clocking glyph codes |
US6208771B1 (en) * | 1996-12-20 | 2001-03-27 | Xerox Parc | Methods and apparatus for robust decoding of glyph address carpets |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US6253193B1 (en) * | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US6311214B1 (en) * | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US6345104B1 (en) * | 1994-03-17 | 2002-02-05 | Digimarc Corporation | Digital watermarks and methods for security documents |
US6544294B1 (en) * | 1999-05-27 | 2003-04-08 | Write Brothers, Inc. | Method and apparatus for creating, editing, and displaying works containing presentation metric components utilizing temporal relationships and structural tracks |
Family Cites Families (232)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2258112A5 (en) | 1973-11-30 | 1975-08-08 | Honeywell Bull Soc Ind | |
CH624877A5 (en) * | 1977-05-13 | 1981-08-31 | Idc Chemie Ag | |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4159468A (en) * | 1977-11-17 | 1979-06-26 | Burroughs Corporation | Communications line authentication device |
GB2022969B (en) | 1978-04-12 | 1982-06-09 | Data Recall Ltd | Video display control apparatus |
US4361851A (en) | 1980-01-04 | 1982-11-30 | Asip William F | System for remote monitoring and data transmission over non-dedicated telephone lines |
AU556499B2 (en) | 1981-05-22 | 1986-11-06 | Data General Corporation | Data processing system |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4429385A (en) * | 1981-12-31 | 1984-01-31 | American Newspaper Publishers Association | Method and apparatus for digital serial scanning with hierarchical and relational access |
US4578531A (en) | 1982-06-09 | 1986-03-25 | At&T Bell Laboratories | Encryption system key distribution method and apparatus |
DE3474496D1 (en) * | 1983-06-30 | 1988-11-10 | Indep Broadcasting Authority | Encrypted broadcast television system |
US4658093A (en) | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4621321A (en) | 1984-02-16 | 1986-11-04 | Honeywell Inc. | Secure data processing system architecture |
LU86203A1 (en) * | 1985-12-11 | 1987-07-24 | Cen Centre Energie Nucleaire | METHOD AND APPARATUS FOR VERIFYING THE AUTHENTICITY OF DOCUMENTS LINKED TO A PERSON AND THE IDENTITY OF THEIR CARRIERS |
EP0257585B1 (en) | 1986-08-22 | 1992-11-25 | Nec Corporation | Key distribution method |
US5319710A (en) | 1986-08-22 | 1994-06-07 | Tandem Computers Incorporated | Method and means for combining and managing personal verification and message authentication encrytions for network transmission |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
JPH087720B2 (en) | 1986-09-16 | 1996-01-29 | 富士通株式会社 | Area access method for IC cards for multiple services |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5109413A (en) | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
EP0268139A3 (en) | 1986-11-05 | 1991-04-10 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US5390297A (en) * | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US4937863A (en) * | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US5247575A (en) * | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US4888638A (en) | 1988-10-11 | 1989-12-19 | A. C. Nielsen Company | System for substituting television programs transmitted via telephone lines |
US4953209A (en) * | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US4956863A (en) | 1989-04-17 | 1990-09-11 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
US5129083A (en) * | 1989-06-29 | 1992-07-07 | Digital Equipment Corporation | Conditional object creating system having different object pointers for accessing a set of data structure objects |
JP2870027B2 (en) | 1989-07-31 | 1999-03-10 | 日本電気株式会社 | Batch processing method by selecting multiple icons |
US5138712A (en) * | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
GB9004901D0 (en) * | 1990-03-05 | 1990-05-02 | Space Communications Sat Tel L | Television scrambler |
DE69121444T2 (en) | 1990-03-29 | 1997-03-13 | Gte Laboratories Inc | Monitoring system for the transmission of video signals |
US5174641A (en) | 1990-07-25 | 1992-12-29 | Massachusetts Institute Of Technology | Video encoding method for television applications |
US5058162A (en) | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
JPH05134957A (en) * | 1990-10-10 | 1993-06-01 | Fuji Xerox Co Ltd | Data management system |
JP3047116B2 (en) | 1990-11-15 | 2000-05-29 | 喜也 丸本 | Information distribution method |
DE69228350T2 (en) | 1991-05-08 | 1999-09-23 | Digital Equipment Corp | ADMINISTRATIVE INTERFACE AND FORMAT FOR LICENSE MANAGEMENT SYSTEM |
JP3032788B2 (en) * | 1991-05-08 | 2000-04-17 | ディジタル イクイプメント コーポレイション | License management system |
CA2109799A1 (en) * | 1991-05-24 | 1992-12-10 | Daniel Mark Nosenchuck | Optimizing compiler for computers |
US5260999A (en) | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5204897A (en) * | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
JPH05100939A (en) | 1991-07-31 | 1993-04-23 | Fuji Xerox Co Ltd | File system |
US5142578A (en) | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
US5276444A (en) * | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
US5557518A (en) | 1994-04-28 | 1996-09-17 | Citibank, N.A. | Trusted agents for open electronic commerce |
WO1993011480A1 (en) | 1991-11-27 | 1993-06-10 | Intergraph Corporation | System and method for network license administration |
JP3185806B2 (en) | 1991-12-13 | 2001-07-11 | ソニー株式会社 | Hi-Vision signal recording encoding method |
ATE292356T1 (en) * | 1992-01-08 | 2005-04-15 | Broadband Innovations Inc | METHOD AND DEVICE FOR GENERATING A MULTI-CHANNEL SIGNAL |
JP2659896B2 (en) | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Structured document copy management method and structured document copy management device |
US5412717A (en) | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5237611A (en) | 1992-07-23 | 1993-08-17 | Crest Industries, Inc. | Encryption/decryption apparatus with non-accessible table of keys |
US5287408A (en) * | 1992-08-31 | 1994-02-15 | Autodesk, Inc. | Apparatus and method for serializing and validating copies of computer software |
US5293422A (en) * | 1992-09-23 | 1994-03-08 | Dynatek, Inc. | Usage control system for computer software |
JP3358627B2 (en) | 1992-10-16 | 2002-12-24 | ソニー株式会社 | Information recording / reproducing device |
US5414852A (en) * | 1992-10-30 | 1995-05-09 | International Business Machines Corporation | Method for protecting data in a computer system |
GB9303595D0 (en) | 1993-02-23 | 1993-04-07 | Int Computers Ltd | Licence management mechanism for a computer system |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5386369A (en) * | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
JPH0736768A (en) | 1993-07-15 | 1995-02-07 | Matsushita Electric Ind Co Ltd | Electronic filing device |
US6135646A (en) | 1993-10-22 | 2000-10-24 | Corporation For National Research Initiatives | System for uniquely and persistently identifying, managing, and tracking digital objects |
US5625690A (en) * | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
US5495411A (en) * | 1993-12-22 | 1996-02-27 | Ananda; Mohan | Secure software rental system using continuous asynchronous password verification |
US5504816A (en) * | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5553143A (en) | 1994-02-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic licensing |
US5787172A (en) * | 1994-02-24 | 1998-07-28 | The Merdan Group, Inc. | Apparatus and method for establishing a cryptographic link between elements of a system |
US5563946A (en) | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5799087A (en) * | 1994-04-28 | 1998-08-25 | Citibank, N.A. | Electronic-monetary system |
US5636346A (en) * | 1994-05-09 | 1997-06-03 | The Electronic Address, Inc. | Method and system for selectively targeting advertisements and programming |
US5564038A (en) | 1994-05-20 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period |
US5477263A (en) | 1994-05-26 | 1995-12-19 | Bell Atlantic Network Services, Inc. | Method and apparatus for video on demand with fast forward, reverse and channel pause |
US5694546A (en) * | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
EP0690399A3 (en) | 1994-06-30 | 1997-05-02 | Tandem Computers Inc | Remote financial transaction system |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5838792A (en) | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5557678A (en) | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
JPH0854951A (en) | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Software used amount control device |
US5737420A (en) | 1994-09-07 | 1998-04-07 | Mytec Technologies Inc. | Method for secure data transmission between remote stations |
US6189037B1 (en) * | 1994-09-30 | 2001-02-13 | Intel Corporation | Broadband data interface |
US5640592A (en) * | 1994-09-30 | 1997-06-17 | Mitsubishi Kasei America, Inc. | System for transferring utility algorithm stored within a peripheral device to a host computer in a format compatible with the type of the host computer |
FI100137B (en) | 1994-10-28 | 1997-09-30 | Vazvan Simin | Real-time wireless telecom payment system |
US5727065A (en) * | 1994-11-14 | 1998-03-10 | Hughes Electronics | Deferred billing, broadcast, electronic document distribution system and method |
US6963859B2 (en) | 1994-11-23 | 2005-11-08 | Contentguard Holdings, Inc. | Content rendering repository |
JP4386898B2 (en) | 1994-12-13 | 2009-12-16 | インターシア ソフトウェア エルエルシー | Cryptographic key system |
US5485577A (en) * | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
SE504085C2 (en) | 1995-02-01 | 1996-11-04 | Greg Benson | Methods and systems for managing data objects in accordance with predetermined conditions for users |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5632681A (en) | 1995-03-07 | 1997-05-27 | International Business Machines Corporation | Universal electronic video game renting/distributing system |
US6157719A (en) | 1995-04-03 | 2000-12-05 | Scientific-Atlanta, Inc. | Conditional access system |
US6246767B1 (en) * | 1995-04-03 | 2001-06-12 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US6424717B1 (en) * | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
JPH08286927A (en) * | 1995-04-18 | 1996-11-01 | Hitachi Ltd | Assembler processing system |
US5717604A (en) | 1995-05-25 | 1998-02-10 | Wiggins; Christopher | Network monitoring system for tracking, billing and recovering licenses |
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
FR2736783B1 (en) * | 1995-07-13 | 1997-08-14 | Thomson Multimedia Sa | METHOD AND APPARATUS FOR RECORDING AND PLAYBACK WITH LARGE CAPACITY RECORDING MEDIUM |
US5764807A (en) * | 1995-09-14 | 1998-06-09 | Primacomp, Inc. | Data compression using set partitioning in hierarchical trees |
KR0166923B1 (en) | 1995-09-18 | 1999-03-20 | 구자홍 | Method and apparatus of preventing an illegal watching and copying in a digital broadcasting system |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US6279112B1 (en) | 1996-10-29 | 2001-08-21 | Open Market, Inc. | Controlled transfer of information in computer networks |
US5825876A (en) | 1995-12-04 | 1998-10-20 | Northern Telecom | Time based availability to content of a storage medium |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
WO1997025798A1 (en) * | 1996-01-11 | 1997-07-17 | Mrj, Inc. | System for controlling access and distribution of digital property |
US5870475A (en) | 1996-01-19 | 1999-02-09 | Northern Telecom Limited | Facilitating secure communications in a distribution network |
US5848378A (en) | 1996-02-07 | 1998-12-08 | The International Weather Network | System for collecting and presenting real-time weather information on multiple media |
US5987134A (en) | 1996-02-23 | 1999-11-16 | Fuji Xerox Co., Ltd. | Device and method for authenticating user's access rights to resources |
DE69703074T2 (en) * | 1996-03-18 | 2001-05-03 | News Datacom Ltd | CHIP CARD COUPLING FOR PAY-TV SYSTEMS |
US5673316A (en) | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
DE69702709T2 (en) | 1996-04-01 | 2001-04-05 | Macrovision Corp | METHOD FOR CONTROLLING COPY PROTECTION MEASURES IN DIGITAL TELEVISION NETWORKS |
US5751813A (en) | 1996-04-29 | 1998-05-12 | Motorola, Inc. | Use of an encryption server for encrypting messages |
US5850433A (en) | 1996-05-01 | 1998-12-15 | Sprint Communication Co. L.P. | System and method for providing an on-line directory service |
DE69737593T2 (en) | 1996-05-15 | 2007-12-20 | Intertrust Technologies Corp., Sunnyvale | Method and apparatus for accessing DVD content |
US5812398A (en) * | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites |
JP2810033B2 (en) | 1996-07-08 | 1998-10-15 | 村越 弘昌 | Operation management system and operation management method |
US5850443A (en) | 1996-08-15 | 1998-12-15 | Entrust Technologies, Ltd. | Key management system for mixed-trust environments |
FR2752655B1 (en) | 1996-08-20 | 1998-09-18 | France Telecom | METHOD AND EQUIPMENT FOR ALLOCATING A COMPLEMENTARY CONDITIONAL ACCESS TO A TELEVISION PROGRAM ALREADY WITH CONDITIONAL ACCESS |
GB2316503B (en) | 1996-08-22 | 2000-11-15 | Icl Personal Systems Oy | Software licence management |
US5812664A (en) | 1996-09-06 | 1998-09-22 | Pitney Bowes Inc. | Key distribution system |
US5850444A (en) | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US6052780A (en) | 1996-09-12 | 2000-04-18 | Open Security Solutions, Llc | Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information |
US5825879A (en) | 1996-09-30 | 1998-10-20 | Intel Corporation | System and method for copy-protecting distributed video content |
US6006332A (en) | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
JPH10133955A (en) | 1996-10-29 | 1998-05-22 | Matsushita Electric Ind Co Ltd | Portable medium driving device, its method, cooperative device of portable medium and network, and its method |
US6108372A (en) | 1996-10-30 | 2000-08-22 | Qualcomm Inc. | Method and apparatus for decoding variable rate data using hypothesis testing to determine data rate |
JP2000509588A (en) * | 1997-01-27 | 2000-07-25 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Method and system for transferring content information and related supplementary information |
GB9703193D0 (en) * | 1997-02-15 | 1997-04-02 | Philips Electronics Nv | Television |
US7062500B1 (en) * | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
NZ514853A (en) | 1997-03-21 | 2002-12-20 | Canal Plus Sa | Broadcast callback request carries receiver validation and callback response commands |
US6108420A (en) | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
JP3613929B2 (en) * | 1997-05-07 | 2005-01-26 | 富士ゼロックス株式会社 | Access credential authentication apparatus and method |
US20010011276A1 (en) * | 1997-05-07 | 2001-08-02 | Robert T. Durst Jr. | Scanner enhanced remote control unit and system for automatically linking to on-line resources |
US6112239A (en) * | 1997-06-18 | 2000-08-29 | Intervu, Inc | System and method for server-side optimization of data delivery on a distributed computer network |
GB9714227D0 (en) * | 1997-07-04 | 1997-09-10 | British Telecomm | A method of scheduling calls |
JP3613936B2 (en) * | 1997-07-07 | 2005-01-26 | 富士ゼロックス株式会社 | Access qualification authentication device |
JPH1131130A (en) | 1997-07-10 | 1999-02-02 | Fuji Xerox Co Ltd | Service providing device |
JP3641909B2 (en) | 1997-07-14 | 2005-04-27 | 富士ゼロックス株式会社 | Proof data generator |
US6584565B1 (en) | 1997-07-15 | 2003-06-24 | Hewlett-Packard Development Company, L.P. | Method and apparatus for long term verification of digital signatures |
WO1999009743A2 (en) | 1997-08-01 | 1999-02-25 | Scientific-Atlanta, Inc. | Conditional access system |
AU8670598A (en) | 1997-08-01 | 1999-02-22 | Scientific-Atlanta, Inc. | Verification of the source of program of information in a conditional access system |
EA002737B1 (en) * | 1997-08-05 | 2002-08-29 | Эникс Корпорейшн | Fingerprint collation |
JP3671611B2 (en) * | 1997-08-05 | 2005-07-13 | 富士ゼロックス株式会社 | Access credential authentication apparatus and method |
JP3622433B2 (en) * | 1997-08-05 | 2005-02-23 | 富士ゼロックス株式会社 | Access credential authentication apparatus and method |
US6091777A (en) * | 1997-09-18 | 2000-07-18 | Cubic Video Technologies, Inc. | Continuously adaptive digital video compression system and method for a web streamer |
IL121862A (en) * | 1997-09-29 | 2005-07-25 | Nds Ltd West Drayton | Distributed ird system for pay television systems |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6044466A (en) | 1997-11-25 | 2000-03-28 | International Business Machines Corp. | Flexible and dynamic derivation of permissions |
US6141754A (en) | 1997-11-28 | 2000-10-31 | International Business Machines Corporation | Integrated method and system for controlling information access and distribution |
US6084969A (en) | 1997-12-31 | 2000-07-04 | V-One Corporation | Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network |
EP1050133B2 (en) | 1998-01-02 | 2009-05-27 | Cryptography Research Inc. | Leak-resistant cryptographic method and apparatus |
JPH11205306A (en) | 1998-01-16 | 1999-07-30 | Fuji Xerox Co Ltd | Authentication system and authentication method |
JP3791169B2 (en) | 1998-01-29 | 2006-06-28 | 富士ゼロックス株式会社 | Authentication apparatus and method |
JP4113274B2 (en) * | 1998-02-05 | 2008-07-09 | 富士ゼロックス株式会社 | Authentication apparatus and method |
EP0934765A1 (en) | 1998-02-09 | 1999-08-11 | CANAL+ Société Anonyme | Interactive gaming system |
JP3867388B2 (en) | 1998-02-12 | 2007-01-10 | 富士ゼロックス株式会社 | Conditional authentication apparatus and method |
CA2425741C (en) | 1998-03-16 | 2006-05-23 | Intertrust Technologies Corporation | Methods and apparatus for continuous control and protection of media content |
US6189146B1 (en) * | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US7188358B1 (en) | 1998-03-26 | 2007-03-06 | Nippon Telegraph And Telephone Corporation | Email access control scheme for communication network using identification concealment mechanism |
US6282653B1 (en) | 1998-05-15 | 2001-08-28 | International Business Machines Corporation | Royalty collection method and system for use of copyrighted digital materials on the internet |
FI107984B (en) | 1998-05-20 | 2001-10-31 | Nokia Networks Oy | Prevention of illegal use of service |
JP3125746B2 (en) * | 1998-05-27 | 2001-01-22 | 日本電気株式会社 | PERSON INTERACTIVE DEVICE AND RECORDING MEDIUM RECORDING PERSON INTERACTIVE PROGRAM |
US6216112B1 (en) * | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6219652B1 (en) * | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
EP0964572A1 (en) | 1998-06-08 | 1999-12-15 | CANAL+ Société Anonyme | Decoder and security module for a digital transmission system |
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6865675B1 (en) | 1998-07-14 | 2005-03-08 | Koninklijke Philips Electronics N.V. | Method and apparatus for use of a watermark and a unique time dependent reference for the purpose of copy protection |
US6275531B1 (en) | 1998-07-23 | 2001-08-14 | Optivision, Inc. | Scalable video coding method and apparatus |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
AU5781599A (en) | 1998-08-23 | 2000-03-14 | Open Entertainment, Inc. | Transaction system for transporting media files from content provider sources tohome entertainment devices |
US6397333B1 (en) * | 1998-10-07 | 2002-05-28 | Infineon Technologies Ag | Copy protection system and method |
AU5262799A (en) * | 1998-10-08 | 2000-04-13 | Sony Computer Entertainment Inc. | Portable toy, portable information terminal, entertainment system, and recording medium |
US6327652B1 (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
JP2000215165A (en) | 1999-01-26 | 2000-08-04 | Nippon Telegr & Teleph Corp <Ntt> | Method and device for information access control and record medium recording information access control program |
EP1026898A1 (en) | 1999-02-04 | 2000-08-09 | CANAL+ Société Anonyme | Method and apparatus for encrypted transmission |
US6973444B1 (en) | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US7024393B1 (en) * | 1999-03-27 | 2006-04-04 | Microsoft Corporation | Structural of digital rights management (DRM) system |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US6920567B1 (en) * | 1999-04-07 | 2005-07-19 | Viatech Technologies Inc. | System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files |
JP2002541602A (en) | 1999-04-07 | 2002-12-03 | スイスコム モービル アーゲー | Methods and systems for ordering, loading, and using admission tickets |
AU4230300A (en) * | 1999-04-12 | 2000-11-14 | Reciprocal, Inc. | System and method for data rights management |
US6453305B1 (en) | 1999-05-21 | 2002-09-17 | Compaq Computer Corporation | Method and system for enforcing licenses on an open network |
US6536037B1 (en) * | 1999-05-27 | 2003-03-18 | Accenture Llp | Identification of redundancies and omissions among components of a web based architecture |
AU4661700A (en) | 1999-06-01 | 2000-12-18 | Cacheflow, Inc. | Content delivery system |
WO2001003044A1 (en) | 1999-07-06 | 2001-01-11 | Transcast International, Inc. | Enabling viewers of television systems to participate in auctions |
FR2796183B1 (en) | 1999-07-07 | 2001-09-28 | A S K | CONTACTLESS ACCESS TICKET AND MANUFACTURING METHOD THEREOF |
US6796555B1 (en) | 1999-07-19 | 2004-09-28 | Lucent Technologies Inc. | Centralized video controller for controlling distribution of video signals |
US20020056118A1 (en) * | 1999-08-27 | 2002-05-09 | Hunter Charles Eric | Video and music distribution system |
US6289455B1 (en) * | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
GB2354102B (en) | 1999-09-08 | 2004-01-14 | Barron Mccann Ltd | Security system |
US6401211B1 (en) * | 1999-10-19 | 2002-06-04 | Microsoft Corporation | System and method of user logon in combination with user authentication for network access |
US6246797B1 (en) | 1999-11-12 | 2001-06-12 | Picsurf, Inc. | Picture and video storage management system and method |
JP2001142720A (en) * | 1999-11-12 | 2001-05-25 | Ricoh Co Ltd | Computer system |
US6384829B1 (en) * | 1999-11-24 | 2002-05-07 | Fuji Xerox Co., Ltd. | Streamlined architecture for embodied conversational characters with reduced message traffic |
DE19956359A1 (en) | 1999-11-24 | 2001-05-31 | Alcatel Sa | Ticket booking using a virtual admission ticket |
US6738901B1 (en) | 1999-12-15 | 2004-05-18 | 3M Innovative Properties Company | Smart card controlled internet access |
US6996720B1 (en) * | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
KR100544177B1 (en) * | 2000-01-18 | 2006-01-23 | 삼성전자주식회사 | Method of controlling portable device having facilities of storing and playing digital contents by computer and portable device operation method thereby |
JP2001209820A (en) * | 2000-01-25 | 2001-08-03 | Nec Corp | Emotion expressing device and mechanically readable recording medium with recorded program |
JP2001294557A (en) * | 2000-02-10 | 2001-10-23 | Nippon Shokubai Co Ltd | METHOD FOR PRODUCING alpha,beta-UNSATURATED CARBOXYLIC ESTER AND CATALYST TO BE USED THEREFOR |
US10089620B2 (en) * | 2000-06-02 | 2018-10-02 | Panasonic Intellectual Property Management Co., Ltd. | Recording medium, license management apparatus, and recording and playback apparatus |
US7228427B2 (en) * | 2000-06-16 | 2007-06-05 | Entriq Inc. | Method and system to securely distribute content via a network |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7225231B2 (en) * | 2000-09-20 | 2007-05-29 | Visto Corporation | System and method for transmitting workspace elements across a network |
US6922670B2 (en) * | 2000-10-24 | 2005-07-26 | Sanyo Electric Co., Ltd. | User support apparatus and system using agents |
US7209893B2 (en) * | 2000-11-30 | 2007-04-24 | Nokia Corporation | Method of and a system for distributing electronic content |
US20020077984A1 (en) | 2000-12-19 | 2002-06-20 | Mark Ireton | Enabling protected digital media to be shared between playback devices |
US6912294B2 (en) * | 2000-12-29 | 2005-06-28 | Contentguard Holdings, Inc. | Multi-stage watermarking process and system |
US20020099545A1 (en) * | 2001-01-24 | 2002-07-25 | Levitt Benjamin J. | System, method and computer program product for damage control during large-scale address speech recognition |
US6575376B2 (en) * | 2001-02-16 | 2003-06-10 | Sybase, Inc. | System with improved methodology for providing international address validation |
US7580988B2 (en) * | 2001-04-05 | 2009-08-25 | Intertrust Technologies Corporation | System and methods for managing the distribution of electronic content |
US20020157002A1 (en) * | 2001-04-18 | 2002-10-24 | Messerges Thomas S. | System and method for secure and convenient management of digital electronic content |
US8001053B2 (en) | 2001-05-31 | 2011-08-16 | Contentguard Holdings, Inc. | System and method for rights offering and granting using shared state variables |
US7774280B2 (en) | 2001-06-07 | 2010-08-10 | Contentguard Holdings, Inc. | System and method for managing transfer of rights using shared state variables |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US20030023427A1 (en) * | 2001-07-26 | 2003-01-30 | Lionel Cassin | Devices, methods and a system for implementing a media content delivery and playback scheme |
EP1419459A2 (en) | 2001-08-10 | 2004-05-19 | Cellectivity Limited | Web interaction system which enables a mobile telephone to interact with web resources |
US20030046274A1 (en) * | 2001-08-30 | 2003-03-06 | Erickson John S. | Software media container |
US7974923B2 (en) * | 2001-11-20 | 2011-07-05 | Contentguard Holdings, Inc. | Extensible rights expression processing system |
US7840488B2 (en) * | 2001-11-20 | 2010-11-23 | Contentguard Holdings, Inc. | System and method for granting access to an item or permission to use an item based on configurable conditions |
US7558759B2 (en) * | 2001-11-20 | 2009-07-07 | Contentguard Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
JP4477822B2 (en) * | 2001-11-30 | 2010-06-09 | パナソニック株式会社 | Information converter |
US20030126086A1 (en) * | 2001-12-31 | 2003-07-03 | General Instrument Corporation | Methods and apparatus for digital rights management |
US20030158958A1 (en) * | 2002-02-20 | 2003-08-21 | Koninklijke Philips Electronics N.V. | Distributed storage network architecture using user devices |
KR20040101312A (en) * | 2002-03-14 | 2004-12-02 | 콘텐트가드 홀딩즈 인코포레이티드 | System and method for exprssing usage rights using modulated signals |
WO2004034223A2 (en) | 2002-10-09 | 2004-04-22 | Legal Igaming, Inc. | System and method for connecting gaming devices to a network for remote play |
FR2854870B1 (en) | 2003-05-16 | 2006-03-24 | S2F Flexico | IMPROVED METHOD AND DEVICE FOR PACKAGING, SACHETS OBTAINED AND THEIR APPLICATION |
JP5168039B2 (en) | 2008-09-12 | 2013-03-21 | 王子ホールディングス株式会社 | Thermal recording material |
-
2003
- 2003-03-14 KR KR10-2004-7014492A patent/KR20040101312A/en not_active Application Discontinuation
- 2003-03-14 AU AU2003221995A patent/AU2003221995A1/en not_active Abandoned
- 2003-03-14 JP JP2003577197A patent/JP4740543B2/en not_active Expired - Lifetime
- 2003-03-14 AU AU2003230651A patent/AU2003230651A1/en not_active Abandoned
- 2003-03-14 CN CN038108852A patent/CN1653463B/en not_active Expired - Lifetime
- 2003-03-14 US US10/388,226 patent/US7359884B2/en not_active Expired - Lifetime
- 2003-03-14 JP JP2003577196A patent/JP4290565B2/en not_active Expired - Fee Related
- 2003-03-14 KR KR1020047014430A patent/KR100960502B1/en active IP Right Grant
- 2003-03-14 EP EP03744684A patent/EP1490819A4/en not_active Withdrawn
- 2003-03-14 KR KR1020047014487A patent/KR100703521B1/en active IP Right Grant
- 2003-03-14 EP EP03716567A patent/EP1483715A4/en not_active Ceased
- 2003-03-14 US US10/388,167 patent/US20040015426A1/en not_active Abandoned
- 2003-03-14 US US10/388,217 patent/US20030233169A1/en not_active Abandoned
- 2003-03-14 EP EP03717978A patent/EP1488302A4/en not_active Withdrawn
- 2003-03-14 BR BR0308409-4A patent/BR0308409A/en not_active Application Discontinuation
- 2003-03-14 CN CN2013100202494A patent/CN103150492A/en active Pending
- 2003-03-14 WO PCT/US2003/007849 patent/WO2003079270A1/en active Application Filing
- 2003-03-14 EP EP03723739A patent/EP1483717A4/en not_active Withdrawn
- 2003-03-14 US US10/388,171 patent/US20030225700A1/en not_active Abandoned
- 2003-03-14 WO PCT/US2003/007848 patent/WO2003079156A2/en not_active Application Discontinuation
- 2003-03-14 AU AU2003225804A patent/AU2003225804A1/en not_active Abandoned
- 2003-03-14 CN CNA038107198A patent/CN1653462A/en active Pending
- 2003-03-14 AU AU2003220269A patent/AU2003220269A1/en not_active Abandoned
- 2003-03-14 WO PCT/US2003/007936 patent/WO2003077955A1/en not_active Application Discontinuation
- 2003-03-14 US US10/388,162 patent/US8108313B2/en active Active
- 2003-03-14 WO PCT/US2003/007847 patent/WO2003079269A1/en active Application Filing
- 2003-03-14 JP JP2003576008A patent/JP2005532610A/en active Pending
- 2003-03-14 CN CNA038110571A patent/CN1653465A/en active Pending
-
2008
- 2008-09-04 US US12/204,393 patent/US9626668B2/en active Active
-
2011
- 2011-03-09 JP JP2011051399A patent/JP2011150717A/en active Pending
-
2013
- 2013-05-08 JP JP2013098415A patent/JP2013157031A/en active Pending
Patent Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5128525A (en) * | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5168147A (en) * | 1990-07-31 | 1992-12-01 | Xerox Corporation | Binary image processing for decoding self-clocking glyph shape codes |
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US6076738A (en) * | 1990-07-31 | 2000-06-20 | Xerox Corporation | Self-clocking glyph shape codes |
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US6000613A (en) * | 1991-12-27 | 1999-12-14 | Xerox Corporation | Self-clocking glyph code having composite glyphs for distributively encoding multi-bit digital values |
US5221833A (en) * | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) * | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
US5444779A (en) * | 1993-10-18 | 1995-08-22 | Xerox Corporation | Electronic copyright royalty accounting system using glyphs |
US5449895A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Explicit synchronization for self-clocking glyph codes |
US5521372A (en) * | 1993-12-22 | 1996-05-28 | Xerox Corporation | Framing codes for robust synchronization and addressing of self-clocking glyph codes |
US6182901B1 (en) * | 1993-12-22 | 2001-02-06 | Xerox Corporation | Orientational disambiguation for self-clocking glyph codes |
US5449896A (en) * | 1993-12-22 | 1995-09-12 | Xerox Corporation | Random access techniques for use with self-clocking glyph codes |
US5453605A (en) * | 1993-12-22 | 1995-09-26 | Xerox Corporation | Global addressability for self-clocking glyph codes |
US6345104B1 (en) * | 1994-03-17 | 2002-02-05 | Digimarc Corporation | Digital watermarks and methods for security documents |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5576532A (en) * | 1995-01-03 | 1996-11-19 | Xerox Corporation | Interleaved and interlaced sync codes and address codes for self-clocking glyph codes |
US6253193B1 (en) * | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US6311214B1 (en) * | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US5684885A (en) * | 1995-09-27 | 1997-11-04 | Xerox Corporation | Binary glyph codes based on color relationships |
US5745569A (en) * | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US5864127A (en) * | 1996-10-10 | 1999-01-26 | Xerox Corporation | Analog glyph detector and detector arrays |
US6208771B1 (en) * | 1996-12-20 | 2001-03-27 | Xerox Parc | Methods and apparatus for robust decoding of glyph address carpets |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
US6544294B1 (en) * | 1999-05-27 | 2003-04-08 | Write Brothers, Inc. | Method and apparatus for creating, editing, and displaying works containing presentation metric components utilizing temporal relationships and structural tracks |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7290031B2 (en) * | 2002-05-10 | 2007-10-30 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program |
US20030210429A1 (en) * | 2002-05-10 | 2003-11-13 | Canon Kabushiki Kaisha | Information processing system, information processing apparatus, order information file use method, storage medium which stores information processing apparatus readable program that implements the method, and the program |
US10257243B2 (en) * | 2003-10-16 | 2019-04-09 | Gula Consulting Limited Liability Company | Electronic media distribution system |
US20170310725A1 (en) * | 2003-10-16 | 2017-10-26 | Gula Consulting Limited Liability Company | Electronic media distribution system |
US20060069646A1 (en) * | 2004-09-28 | 2006-03-30 | Yoshinori Matsumoto | Method of controlling a terminal device |
US7860801B2 (en) * | 2005-07-05 | 2010-12-28 | Xerox Corporation | Tools for accessing digital works |
US20070011094A1 (en) * | 2005-07-05 | 2007-01-11 | Xerox Corporation | Tools for accessing digital works |
US20070177188A1 (en) * | 2006-01-27 | 2007-08-02 | Sbc Knowledge Ventures, L.P. | Methods and systems to process an image |
US8661348B2 (en) * | 2006-01-27 | 2014-02-25 | At&T Intellectual Property I, L.P. | Methods and systems to process an image |
EP1855225A1 (en) * | 2006-05-09 | 2007-11-14 | Ricoh Company, Ltd. | Computer apparatus |
US7850084B2 (en) | 2006-05-09 | 2010-12-14 | Ricoh Company, Ltd. | Computer apparatus |
US20070284437A1 (en) * | 2006-05-09 | 2007-12-13 | Kensaku Yamamoto | Computer apparatus |
US20080301003A1 (en) * | 2007-05-31 | 2008-12-04 | Daniel Harkabi | System for Online Buying |
US20090138109A1 (en) * | 2007-11-06 | 2009-05-28 | Lg Electronics Inc. | Apparatus providing function to delete files and method for deleting files thereof |
US8532978B1 (en) * | 2008-10-31 | 2013-09-10 | Afrl/Rij | Natural language interface, compiler and de-compiler for security policies |
US8819290B2 (en) | 2009-10-23 | 2014-08-26 | Zte Corporation | Method and system for transmitting compressed rights |
US20150379512A1 (en) * | 2013-02-22 | 2015-12-31 | Op-Palvelut Oy | Communication during payment procedure |
US9589124B2 (en) | 2014-05-29 | 2017-03-07 | Comcast Cable Communications, Llc | Steganographic access controls |
US10467399B2 (en) | 2014-05-29 | 2019-11-05 | Comcast Cable Communications, Llc | Steganographic access controls |
US11372960B2 (en) | 2014-05-29 | 2022-06-28 | Comcast Cable Communications, Llc | Steganographic access controls |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030225700A1 (en) | System and method for graphical rights expressions | |
JP4800553B2 (en) | Certification watermark for applications related to print objects | |
EP1312030B1 (en) | Authentication watermarks for packaged products | |
US7770013B2 (en) | Digital authentication with digital and analog documents | |
JP3803378B2 (en) | Secure copy of confidential documents | |
EP1078312B1 (en) | Apparatus for making and apparatus for reading a digital watermark and method of making and reading a digital watermark | |
EP1075757B1 (en) | Digital authentication with analog documents | |
US6233684B1 (en) | System for controlling the distribution and use of rendered digital works through watermaking | |
AU2001277147A1 (en) | Authentication watermarks for printed objects and related applications | |
Kwok et al. | Intellectual property protection for electronic commerce applications. | |
US6674859B1 (en) | Device and method for the protected output of electronically transmitted and stored documents | |
Nanjundan et al. | Perspective Chapter: Text Watermark Analysis–Concept, Technique, and Applications | |
Halyal | Digital Libraries and Copyright Issues | |
Garofalakis et al. | Digital robbery; authors are not unprotected | |
Shaw | JISC Technology Applications Programme (JTAP)—Overview of Watermarks, Fingerprints, and Digital Signatures | |
JP2005535959A (en) | Digital content containing information of potential value to buyers and method of creating it | |
Mishra | Deterring Text Document Piracy with Text Watermarking | |
JP2005535960A (en) | Digital content containing information of potential value to buyers and method of creating it |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CONTENTGUARD-HOLDINGS, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LAO, GUILLERMO;TADAYON, BIJAN;HAM, MANUEL;AND OTHERS;REEL/FRAME:014295/0875;SIGNING DATES FROM 20030602 TO 20030609 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |