US20060143132A1 - Method and apparatus to enable a market in used digital content - Google Patents
Method and apparatus to enable a market in used digital content Download PDFInfo
- Publication number
- US20060143132A1 US20060143132A1 US11/285,781 US28578105A US2006143132A1 US 20060143132 A1 US20060143132 A1 US 20060143132A1 US 28578105 A US28578105 A US 28578105A US 2006143132 A1 US2006143132 A1 US 2006143132A1
- Authority
- US
- United States
- Prior art keywords
- digital content
- user device
- user
- digital
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000004891 communication Methods 0.000 claims description 12
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 238000007726 management method Methods 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 description 7
- 230000001413 cellular effect Effects 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/081—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.
Description
- Digital content, such as music, games and video, are becoming more and more central to the world economy. The transaction of digital content is a general transfer of data and data communications over a network, such as the Internet.
- With regard to the rights to use the digital content, the prior art takes a defensive posture that is focused on guarding the digital content against unauthorized access, duplication and use. Limitations are placed on the use and distribution of a piece of digital content, and various means are used to attempt to enforce these limitations. Oftentimes, the limitations can be easily circumvented, and so enforcement can be difficult and therefore is mostly ineffective.
- Present methods for attaining rights to use a piece of digital content are focused on resolving digital rights issues as they pertain to digital content delivery between an end desktop computer and a controlling server. Little has been done to generate a digital rights management system that operates at least in part over a data telephony network.
- Therefore, there exists a need to provide a secured digital content data transmission system that allows recipients some secure control over transmission of digital content.
- The present invention provides methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing.
- In one embodiment, a method for deleting rights to one or more digital content items at a wireless user device in a digital rights management environment is provided. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.
- In another embodiment, the server generates a new digital key and encrypts the new digital key, a previously generated random number, and an id string associated with the user device using a digital key previously confirmed by use of at least two distinct networks. The server also determines the digital content items the user has user rights for and encrypts one or more digital content keys associated using the new digital key based on the determination. The encrypted new digital key and the encrypted one or more digital content keys are sent to the user device.
- The preferred and alternative embodiments of the present invention are described in detail below with reference to the following drawings.
-
FIG. 1 illustrates a block diagram of an example system formed in accordance with an embodiment of the present invention; -
FIG. 2 illustrates an exemplary diagram performed by some of the components shown inFIG. 1 for providing secure access between user devices and a digital rights management system; -
FIG. 3 illustrates a process for delivery of digital content performed by some of the components shown inFIG. 1 ; -
FIG. 4 illustrates a process for returning digital content in accordance with an embodiment of the present invention; and -
FIG. 5 illustrates an example process for purchasing of used digital content in accordance with an embodiment of the present invention. - Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing.
- In one embodiment, a mobile phone enables a consumer to engage in a retail transaction to purchase digital content that is downloaded to their phone over the air, such that a copy of the content then resides persistently on their phone for their ongoing use. Any consumer so enabled with a mobile phone may give up their rights to and access to a piece of digital content to which they had previously purchased legitimate rights from an electronic store in exchange for credit or payment. Analogous to the buying and selling of used compact discs (physical media), the electronic buying and selling of used digital content would entail the exchange of a finite supply of unique entities, in this case sequences of digital information, with the following properties: 1) each entity is unique, 2) each entity is in the possession of only one individual or organization at a time, 3) entities may not be copied and then successfully exchanged as if they were originals to gain additional value, 4) only certain authorized organizations may generate new entities (i.e., unauthorized organizations can not generate useful counterfeit entities).
- The content being bought and sold may take the form of music, pictures, ring tones, animations, video clips, icons, audio files, text information, multimedia combinations of any number of the previous types, or any other type of content for which a digital format may be defined.
- As shown in
FIG. 1 , asystem 20 performs secure transmission of digital content in order to allow for expanded commercial opportunities. Thesystem 20 includes a plurality ofuser devices server 28 via first andsecond data networks server 28 is a computer system with local memory that is also directly or indirectly in communication with one of a number of digital content provider/owners 42 and one or morefinancial institutions 44. In one embodiment, theserver 28 is in communication with the digital content provider/owners 42 and thefinancial institutions 44 over anetwork 40. Astore 48 is in data communication with theuser devices server 28. - The
user devices networks server 28. Theserver 28 authenticates eachuser device user devices user devices server 28. Theserver 28 either directly compensates digital content provider/owner for the sale of associated digital content to the users of theuser devices financial institution 44. - Information pertaining to users' rights to digital content is stored in a users'
rights storage unit 52 that is in direct or indirect or indirect data communication with theserver 28 or thestore 48. - Information pertaining to used digital content is stored in a
storage unit 50 that includes an inventory of used digital content or just a record of what digital content has been returned. Thestorage unit 50 is in direct or indirect or indirect data communication with theserver 28 or thestore 48. The devices - In one embodiment, the
networks network 40 is one of a private or public data network, such as the Internet. - In one embodiment, rights are attained according to the following process. As shown in
FIG. 2 , at ablock 120, a user device generates a random number and a first key. At ablock 122, the user device encrypts an identification (id) string associated with the user device and the random number using the first key. At ablock 126, the encrypted id string and random number are sent to the server via a first transmission means, i.e., afirst network 30. At ablock 128, the random number and the first key are sent unencrypted to theserver 28 via a second transmission means, i.e. thesecond network 32. Then at ablock 130, theserver 28 decrypts the received encrypted message using the first key received via the second transmission means. At ablock 134, theserver 28 generates a second key, if the decrypted random number matches the random number received via the second transmission means. At ablock 136, theserver 28 encrypts the random number, the id string, and the second key using the first key and at ablock 138, sends this new encrypted package to the user device. At ablock 140, the user device decrypts the received package using the first key and saves the second key. At ablock 144, theserver 28 creates and saves a new user record using the id string and stores the second key in the record. - As shown in
FIG. 3 , at ablock 200, auser device server 28. At ablock 202, theserver 28 retrieves the requested digital content. Theserver 28 may retrieve digital content from a local storage device or may retrieve it from the digital content provider/owners 42 or from some other source over thenetwork 40. At ablock 204, theserver 28 retrieves the second key stored for the user associated with the request, if the request is valid. At ablock 206, theserver 28 encrypts the requested digital content using a unique digital content key. At ablock 208, theserver 28 encrypts the unique digital content key using the retrieved second key and, at ablock 210, sends the encrypted unique digital content key and digital content to the user device that made the digital content request. At ablock 214, the user device decrypts the unique digital content key using the previously stored second key. At ablock 216, the user device decrypts the digital content using the unique digital content key. At adecision block 218, the user device determines if the entire digital content was received. If the entire digital content was not received, then atblock 220, the user device requests that theserver 28 resends and/or indicates an error. If the digital content was properly received, then atblock 224 theserver 28 completes a billing transaction. The steps of decrypting 214 and 216 may be performed when a user desires prentation of the digital content—afterblock -
FIG. 4 illustrates anexample process 300 performed in accordance with an embodiment of the present invention. First at 304, a user elects to return an item (digital content) to thestore 48 on their wireless terminal (user device 24). In one embodiment, the item was originally purchased from thestore 48, however, the item could have been purchased through other means, such as another user or another store. At 306, thestore 48 receives the user's request via any network connection or a direct connection. At 308, the store commands the database (unit 52) to check for existence of the user's rights to the item and to delete if present. Rights information pertains to rights that the user has previously attained for the digital content. A confirmation of the deletion is returned to thestore 48, at 310. If thestore 48 maintains inventory of used items at the used contentinventory storage unit 50, the inventory for that related used item is increased by 1, at 312. At 316, the inventory update is complete and thestore 48 is notified of the completed process. At 318, thestore 48 applies credit to an account balance associated to the user at thestorage unit 52 and feedback is sent to thestore 48, at 320. At 322, thestore 48 resets the DRM client on theuser device 24, invalidating all of the content keys stored on the phone. At 324, the DRM client proceeds with re-initialization cycle. At 326, re-initialization is complete, seeFIG. 2 . At 328, theuser device 48 requests re-delivery of owned content keys. The owned content keys are digital content keys associated with the digital content that the user still has rights to use. - At 330, a current key set is created based on the updated information in the
storage unit 52 and sent to theuser device 24 for completion; similar toFIG. 3 . A new second key is created, encrypted, sent, and decrypted in accordance with blocks 134-144,FIG. 2 . Then, the unique or owned content keys are encrypted using the new second key, sent to the user device and decrypted using the new second key. - At 332, the
user device 24 requests credit balance and at 334, thestore 48 reports credit balance to the user. - In an alternate embodiment, when the user elects to return a digital content item, the user device deletes the unique content key associated with the elected digital content item.
-
FIG. 5 illustrates aprocess 400 for purchasing digital content identified as used content and stored in the used contentinventory storage unit 50. At 404, a user browses the selection of available used content. At 406, thestore 48 receives request to view available used inventory based on a signal send from theuser device 24. At 408, thestore 48 checks current inventory for the used content from the used contentinventory storage unit 50 and results of the check are returned at 410. At 412, thestore 48 sends a menu of the currently stored inventory of used digital content and prices to theuser device 24 for presentation to the user. At 416, a user selects one or more of the digital content items for purchase. At 418, thestore 48 deducts credit from user's balance in thestore 48. If insufficient balance, user will be billed by a separate mechanism, such as a previously designated credit card. At 420, results of payment method are returned to thestore 48. At 422, 424, thestore 48 subtracts one from the used content inventory for the just sold item. At 426, thestore 48 commands a database (user's rights storage unit 52) to add the used item to the user's rights file. At 428, the store 238 receives confirmation of addition of the rights for the user. At 430, the purchased used content and content key are delivered touser device 24. - While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.
Claims (13)
1. A method for deleting rights to one or more digital content items at a wireless user device in a digital rights management environment, the method comprising:
receiving at a server in data communication a signal generated by a wireless user device and sent over a wireless telephony network, the signal indicates an election for returning at least one previously purchased digital content item;
deleting user rights for the at least one digital content item identified by the received signal; and
sending information to the user device that generated the signal, wherein access to the associated digital content item at the user device is removed according to the sent information.
2. The method of claim 1 , wherein deleting comprises deleting a digital content key associated with the elected at least one previously purchased digital content item, wherein deleting the digital content key is performed at the user device.
3. The method of claim 1 , wherein deleting comprises:
generating a new digital key;
encrypting the new digital key, a previously generated random number, and an id string associated with the user device using a digital key previously confirmed by use of at least two distinct networks;
determining the digital content items the user has user rights for; and
encrypting one or more digital content keys using the new digital key based on the determination,
wherein sending includes sending the encrypted new digital key to the user device and sending the encrypted one or more digital content keys to the associated user device.
4. The method of claim 1 , further comprising:
applying credit to an account associated with the user of the user device that generated the signal.
5. The method of claim 4 , further comprising:
reporting information of the account to the user of the user device.
6. The method of claim 1 , further comprising:
adding information related to the digital content item that was requested for deletion into a used content inventory database.
7. The method of claim 6 , further comprising:
allowing purchase of a digital content item associated with information stored in the used content inventory database.
8. A system for returning one or more digital content items from a wireless user device in a digital rights management environment, the system comprising:
one or more memory units for storing users' rights to digital content items; and
a processing device in data communication with the one or more memory units, the processing device comprising:
a communication component for receiving a signal generated by a wireless user device that indicates an election to return at least one previously purchased digital content item; and
a component for deleting user rights for the digital content item identified by the received signal,
wherein the communication component sends information to the user device that generated the signal, wherein the sent information removes access to the identified digital content item.
9. The system of claim 8 , wherein the component for deleting comprises:
a component for generating a new digital key and encrypting the new digital key, a previously generated random number, and an id string with the user device using a digital key previously confirmed by use of at least two distinct networks; and
a component for determining the digital content items the user has user rights for and encrypting one or more digital content keys associated using the new digital key based on the determination,
wherein the communication component sends the encrypted new digital key to the user device and sending the encrypted one or more digital content key to the associated user device.
10. The system of claim 8 , wherein the processing device further comprises:
a component for applying credit to an account associated with the user of the user device that generated the signal.
11. The system of claim 10 , wherein the component for applying credit comprises:
a component for reporting information of the account to the user of the user device.
12. The system of claim 8 , wherein the processing device further comprises:
a component for adding information related to the digital content item that was requested for deletion into a used content inventory database.
13. The system of claim 12 , wherein the component for adding information comprises:
a component for allowing purchase of a digital content item associated with information stored in the used content inventory database.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/285,781 US20060143132A1 (en) | 2004-11-30 | 2005-11-21 | Method and apparatus to enable a market in used digital content |
US15/650,489 US11411931B2 (en) | 2004-11-30 | 2017-07-14 | Method and apparatus to enable a market in used digital content |
US17/883,352 US20220376912A1 (en) | 2004-11-30 | 2022-08-08 | Method and apparatus to enable a market in used digital content |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US63170404P | 2004-11-30 | 2004-11-30 | |
US11/285,781 US20060143132A1 (en) | 2004-11-30 | 2005-11-21 | Method and apparatus to enable a market in used digital content |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/650,489 Continuation US11411931B2 (en) | 2004-11-30 | 2017-07-14 | Method and apparatus to enable a market in used digital content |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060143132A1 true US20060143132A1 (en) | 2006-06-29 |
Family
ID=36565637
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/285,781 Abandoned US20060143132A1 (en) | 2004-11-30 | 2005-11-21 | Method and apparatus to enable a market in used digital content |
US15/650,489 Active 2029-04-20 US11411931B2 (en) | 2004-11-30 | 2017-07-14 | Method and apparatus to enable a market in used digital content |
US17/883,352 Pending US20220376912A1 (en) | 2004-11-30 | 2022-08-08 | Method and apparatus to enable a market in used digital content |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/650,489 Active 2029-04-20 US11411931B2 (en) | 2004-11-30 | 2017-07-14 | Method and apparatus to enable a market in used digital content |
US17/883,352 Pending US20220376912A1 (en) | 2004-11-30 | 2022-08-08 | Method and apparatus to enable a market in used digital content |
Country Status (2)
Country | Link |
---|---|
US (3) | US20060143132A1 (en) |
WO (1) | WO2006060397A2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070288664A1 (en) * | 2006-05-09 | 2007-12-13 | Samsung Electronics Co., Ltd | Apparatus and method of securely moving security data |
US20080002829A1 (en) * | 2006-06-27 | 2008-01-03 | Nokia Corporation | Identifiers in a communication system |
US20090319770A1 (en) * | 2006-04-21 | 2009-12-24 | Nokia Siemens Networks Gmbh & Co., Kg. | Method, devices and computer program product for encoding and decoding media data |
US20100106610A1 (en) * | 2008-10-23 | 2010-04-29 | Nokia Corporation | Method and apparatus for transferring media |
US20110166960A1 (en) * | 2010-01-05 | 2011-07-07 | Milton Kim | Digital content recycling system |
US20120036358A1 (en) * | 2010-02-10 | 2012-02-09 | SecurenCrypt, LLC | Document encryption and decryption |
US20120051540A1 (en) * | 2010-08-24 | 2012-03-01 | Electronics And Telecommunications Research Institute | Conditional access system and method of using conditional access image |
US20180212937A1 (en) * | 2017-01-25 | 2018-07-26 | Beijing Baidu Netcom Science And Technology Co., Ltd. | Method and Device for Communicating Securely between T-Box Device and ECU Device in Internet of Vehicles System |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10333903B1 (en) | 2015-06-16 | 2019-06-25 | Amazon Technologies, Inc. | Provisioning network keys to devices to allow them to provide their identity |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4823388A (en) * | 1984-06-25 | 1989-04-18 | Kabushiki Kaisha Toshiba | Communications network using an enciphering and deciphering device |
US6085168A (en) * | 1997-02-06 | 2000-07-04 | Fujitsu Limited | Electronic commerce settlement system |
US20020077986A1 (en) * | 2000-07-14 | 2002-06-20 | Hiroshi Kobata | Controlling and managing digital assets |
US6424845B1 (en) * | 1998-06-19 | 2002-07-23 | Ncr Corporation | Portable communication device |
US20020138291A1 (en) * | 2001-03-21 | 2002-09-26 | Vijay Vaidyanathan | Digital file marketplace |
US20030004882A1 (en) * | 2000-11-06 | 2003-01-02 | Holler Anne Marie | Optimized server for streamed applications |
US20040054632A1 (en) * | 2000-10-25 | 2004-03-18 | Cedric Remy | Secure telematics payment method |
US20050005000A1 (en) * | 2003-02-14 | 2005-01-06 | Ryuzo Nakazumi | System and method for distributing digital contents, and an edge server |
US20050091069A1 (en) * | 2003-10-22 | 2005-04-28 | Chuang Thomas C. | System and method for renting or purchasing goods via a communications network |
US20050113067A1 (en) * | 2003-09-12 | 2005-05-26 | Michael Marcovici | Authenticating access to a wireless local area network based on security value(s) associated with a cellular system |
US20050154909A1 (en) * | 2002-04-26 | 2005-07-14 | Junbiao Zhang | Certificate based authentication authorization accounting scheme for loose coupling interworking |
US20050240533A1 (en) * | 2004-04-23 | 2005-10-27 | Microsoft Corporation | Trusted license removal in a content protection system or the like |
US20050281540A1 (en) * | 2004-06-18 | 2005-12-22 | Sony Corporation | Information management method, information playback apparatus, and information management apparatus |
US6983381B2 (en) * | 2001-01-17 | 2006-01-03 | Arcot Systems, Inc. | Methods for pre-authentication of users using one-time passwords |
US6996563B2 (en) * | 2000-04-11 | 2006-02-07 | Sony Corporation | Communication system, communication method, distribution apparatus, distribution method and terminal apparatus |
US20060031164A1 (en) * | 2004-07-29 | 2006-02-09 | Lg Electronics Inc. | Method for processing rights object in digital rights management system and method and system for processing rights object using the same |
US20060069652A1 (en) * | 2004-09-16 | 2006-03-30 | Sony Corporation | Copy component, program and method thereof |
US20060080257A1 (en) * | 2004-10-08 | 2006-04-13 | Level 3 Communications, Inc. | Digital content distribution framework |
US7031469B2 (en) * | 2001-12-27 | 2006-04-18 | Slam Dunk Networks, Inc. | Optimized enveloping via key reuse |
US7389273B2 (en) * | 2003-09-25 | 2008-06-17 | Scott Andrew Irwin | System and method for federated rights management |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US20050049973A1 (en) * | 2003-09-02 | 2005-03-03 | Read Mark A. | Method and program for automated management of software license usage by monitoring and disabling inactive software products |
JP4689966B2 (en) * | 2004-03-17 | 2011-06-01 | オリンパス株式会社 | Zoom lens and electronic imaging apparatus having the same |
FR2870412B1 (en) * | 2004-05-13 | 2006-09-15 | Gemplus Sa | TRANSFER OF DATA BETWEEN TWO CHIP CARDS |
US20100333116A1 (en) * | 2009-06-30 | 2010-12-30 | Anand Prahlad | Cloud gateway system for managing data storage to cloud storage sites |
-
2005
- 2005-11-21 US US11/285,781 patent/US20060143132A1/en not_active Abandoned
- 2005-11-30 WO PCT/US2005/043142 patent/WO2006060397A2/en active Application Filing
-
2017
- 2017-07-14 US US15/650,489 patent/US11411931B2/en active Active
-
2022
- 2022-08-08 US US17/883,352 patent/US20220376912A1/en active Pending
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4823388A (en) * | 1984-06-25 | 1989-04-18 | Kabushiki Kaisha Toshiba | Communications network using an enciphering and deciphering device |
US6085168A (en) * | 1997-02-06 | 2000-07-04 | Fujitsu Limited | Electronic commerce settlement system |
US6424845B1 (en) * | 1998-06-19 | 2002-07-23 | Ncr Corporation | Portable communication device |
US6996563B2 (en) * | 2000-04-11 | 2006-02-07 | Sony Corporation | Communication system, communication method, distribution apparatus, distribution method and terminal apparatus |
US20020077986A1 (en) * | 2000-07-14 | 2002-06-20 | Hiroshi Kobata | Controlling and managing digital assets |
US20040054632A1 (en) * | 2000-10-25 | 2004-03-18 | Cedric Remy | Secure telematics payment method |
US20030004882A1 (en) * | 2000-11-06 | 2003-01-02 | Holler Anne Marie | Optimized server for streamed applications |
US6983381B2 (en) * | 2001-01-17 | 2006-01-03 | Arcot Systems, Inc. | Methods for pre-authentication of users using one-time passwords |
US20020138291A1 (en) * | 2001-03-21 | 2002-09-26 | Vijay Vaidyanathan | Digital file marketplace |
US7031469B2 (en) * | 2001-12-27 | 2006-04-18 | Slam Dunk Networks, Inc. | Optimized enveloping via key reuse |
US20050154909A1 (en) * | 2002-04-26 | 2005-07-14 | Junbiao Zhang | Certificate based authentication authorization accounting scheme for loose coupling interworking |
US20050005000A1 (en) * | 2003-02-14 | 2005-01-06 | Ryuzo Nakazumi | System and method for distributing digital contents, and an edge server |
US20050113067A1 (en) * | 2003-09-12 | 2005-05-26 | Michael Marcovici | Authenticating access to a wireless local area network based on security value(s) associated with a cellular system |
US7389273B2 (en) * | 2003-09-25 | 2008-06-17 | Scott Andrew Irwin | System and method for federated rights management |
US20050091069A1 (en) * | 2003-10-22 | 2005-04-28 | Chuang Thomas C. | System and method for renting or purchasing goods via a communications network |
US20050240533A1 (en) * | 2004-04-23 | 2005-10-27 | Microsoft Corporation | Trusted license removal in a content protection system or the like |
US20050281540A1 (en) * | 2004-06-18 | 2005-12-22 | Sony Corporation | Information management method, information playback apparatus, and information management apparatus |
US20060031164A1 (en) * | 2004-07-29 | 2006-02-09 | Lg Electronics Inc. | Method for processing rights object in digital rights management system and method and system for processing rights object using the same |
US20060069652A1 (en) * | 2004-09-16 | 2006-03-30 | Sony Corporation | Copy component, program and method thereof |
US20060080257A1 (en) * | 2004-10-08 | 2006-04-13 | Level 3 Communications, Inc. | Digital content distribution framework |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8284935B2 (en) * | 2006-04-21 | 2012-10-09 | Nokia Siemens Networks Gmbh & Co. Kg | Method, devices and computer program product for encoding and decoding media data |
US20090319770A1 (en) * | 2006-04-21 | 2009-12-24 | Nokia Siemens Networks Gmbh & Co., Kg. | Method, devices and computer program product for encoding and decoding media data |
US20070288664A1 (en) * | 2006-05-09 | 2007-12-13 | Samsung Electronics Co., Ltd | Apparatus and method of securely moving security data |
US8775799B2 (en) * | 2006-05-09 | 2014-07-08 | Samsung Electronics Co., Ltd. | Apparatus and method of securely moving security data |
US20080002829A1 (en) * | 2006-06-27 | 2008-01-03 | Nokia Corporation | Identifiers in a communication system |
US9344881B2 (en) | 2006-06-27 | 2016-05-17 | Vringo Infrastrct Inc. | Identifiers in a communication system |
US20100106610A1 (en) * | 2008-10-23 | 2010-04-29 | Nokia Corporation | Method and apparatus for transferring media |
US20110166960A1 (en) * | 2010-01-05 | 2011-07-07 | Milton Kim | Digital content recycling system |
US8621214B2 (en) * | 2010-02-10 | 2013-12-31 | SecurenCrypt, LLC | Document encryption and decryption |
US20120036358A1 (en) * | 2010-02-10 | 2012-02-09 | SecurenCrypt, LLC | Document encryption and decryption |
US8924724B2 (en) | 2010-02-10 | 2014-12-30 | SecurenCrypt, LLC | Document encryption and decryption |
US20120051540A1 (en) * | 2010-08-24 | 2012-03-01 | Electronics And Telecommunications Research Institute | Conditional access system and method of using conditional access image |
US20180212937A1 (en) * | 2017-01-25 | 2018-07-26 | Beijing Baidu Netcom Science And Technology Co., Ltd. | Method and Device for Communicating Securely between T-Box Device and ECU Device in Internet of Vehicles System |
US10728229B2 (en) * | 2017-01-25 | 2020-07-28 | Beijing Baidu Netcom Science And Technology Co., Ltd. | Method and device for communicating securely between T-box device and ECU device in internet of vehicles system |
Also Published As
Publication number | Publication date |
---|---|
WO2006060397A2 (en) | 2006-06-08 |
US20180007018A1 (en) | 2018-01-04 |
WO2006060397A3 (en) | 2006-10-12 |
US11411931B2 (en) | 2022-08-09 |
US20220376912A1 (en) | 2022-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220376912A1 (en) | Method and apparatus to enable a market in used digital content | |
TW511023B (en) | Digital rights management within an embedded storage device | |
AU2001269856B2 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) | |
US7237255B2 (en) | Method and system to dynamically present a payment gateway for content distributed via a network | |
US7149545B2 (en) | Method and apparatus for facilitating over-the-air activation of pre-programmed memory devices | |
US7404084B2 (en) | Method and system to digitally sign and deliver content in a geographically controlled manner via a network | |
US7991697B2 (en) | Method and system to digitally sign and deliver content in a geographically controlled manner via a network | |
US7389531B2 (en) | Method and system to dynamically present a payment gateway for content distributed via a network | |
US7107462B2 (en) | Method and system to store and distribute encryption keys | |
US7415721B2 (en) | Separate authentication processes to secure content | |
US20030163684A1 (en) | Method and system to securely distribute content via a network | |
AU2001269856A1 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) | |
JP2005539291A (en) | Method for monitoring digital content provided by a content provider via a network | |
KR20110017466A (en) | Methods and apparatus for protected distribution of applications and media content | |
US8620816B2 (en) | Information vault, data format conversion services system and method | |
US8099762B2 (en) | Secure digital content trading systems and methods | |
US11831636B2 (en) | Systems and techniques for trans-account device key transfer in benefit denial system | |
GB2432434A (en) | Transfer of digital content in a copyright and royalty protecting system | |
AU2007234622B2 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM) | |
AU2007234620A1 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MELODEO, INC., WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VALENTI, WILLIAM L.;FLINCHEM, EDWARD P.;REEL/FRAME:021107/0945 Effective date: 20060208 |
|
AS | Assignment |
Owner name: INTEGIC TECHNOLOGIES LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MELODEO, INC.;REEL/FRAME:021210/0945 Effective date: 20080620 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |