USRE41657E1 - Data management system - Google Patents

Data management system Download PDF

Info

Publication number
USRE41657E1
USRE41657E1 US10/170,677 US17067702A USRE41657E US RE41657 E1 USRE41657 E1 US RE41657E1 US 17067702 A US17067702 A US 17067702A US RE41657 E USRE41657 E US RE41657E
Authority
US
United States
Prior art keywords
data content
key
secret
user
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US10/170,677
Inventor
Makoto Saito
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Piracy Protection LLC
Xylon LLC
Original Assignee
Intarsia Software LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/733,504 external-priority patent/US5974141A/en
Priority claimed from US08/846,661 external-priority patent/US6076077A/en
Priority to US10/170,677 priority Critical patent/USRE41657E1/en
Application filed by Intarsia Software LLC filed Critical Intarsia Software LLC
Assigned to INTARSIA SOFTWARE LLC reassignment INTARSIA SOFTWARE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MITSUBISHI CORPORATION
Assigned to MITSUBISHI CORPORATION reassignment MITSUBISHI CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SAITO, MAKOTO
Priority to US11/701,943 priority patent/USRE43599E1/en
Publication of USRE41657E1 publication Critical patent/USRE41657E1/en
Application granted granted Critical
Assigned to XYLON LLC reassignment XYLON LLC MERGER (SEE DOCUMENT FOR DETAILS). Assignors: INTARSIA SOFTWARE LLC
Anticipated expiration legal-status Critical
Assigned to LF CAPITAL PARTNERS, LLC reassignment LF CAPITAL PARTNERS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASSETS 121 LLC
Assigned to PIRACY PROTECTION LLC reassignment PIRACY PROTECTION LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LF CAPITAL PARTNERS, LLC
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/605Copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Definitions

  • the present invention relates to a system for managing copyrights in dealing in copyrighted digital data content, i.e., dealing in original digital data content and edited digital data content.
  • Use of a data content includes not only referring to its contents but also normally effectively using by storing, copying, or editing obtained data content by a user. Moreover, it is possible to transmit data content which is edited by a user to another person via on-line basis by a communication line or via off-line basis using a proper recording medium. Furthermore, it is possible to transmit the edited data content to the database to be registered as new data content. In such a case, the user who has edited the data content may also be an information provider.
  • the inventor of the present invention proposed a system for managing a copyright by obtaining a permit key from a key control center via a public telephone line in Japanese Patent Laid-Open No. 46419/1994 (GB 2269302A) and Japanese Patent Laid-Open No. 141004/1994 (U.S. Pat. No. 5,504,933) and moreover, proposed an apparatus for managing the copyright in Japanese Patent Laid-Open No. 132916/1994 (GB 2272822A).
  • the database copyright management system of the above application in order to manage the copyright, either one or more of a program for managing the copyright, copyright information, and a copyright control message are used in addition to a use permit key corresponding to a requested use, and data content which has been transferred with encryption is decrypted to be used for viewing and editing, and the data content is encrypted again when used for storing, copying and transferring.
  • the copyright control message is displayed when utilization beyond the range of the user's request or authorized operation is found to give caution or warning to a user and the copyright management program performs monitoring and managing so that utilization beyond the range of the user's request or authorized operation is not performed.
  • the above-mentioned system comprises a key management center that manages a crypt key and a copyright management center that manages the database copyright.
  • a key management center that manages a crypt key and a copyright management center that manages the database copyright.
  • all of the data content delivered from a database is encrypted by a first crypt key
  • a first user who wishes to uses data content directly from the database requests the key management center the key corresponding to the specific usage by presenting information on the first user to the center.
  • the key management center transfers the information on the first user to the copyright management center.
  • the copyright management center transfers this information together with a copyright management program to the key control center.
  • the key control center On receiving the copyright management program, the key control center transfers the first crypt key and a second crypt key K2 corresponding to the specific usage together with the copyright management program to the first user via a communication network.
  • the first crypt key On receiving the first crypt key, the first user uses this key to decrypt the data content for usage.
  • the user uses the second crypt key to encrypt and decrypt data content when subsequently storing, copying or transmitting the data content.
  • the first and second crypt keys are abandoned. If the first user wishes to use the data content again, the first and second crypt keys are re-delivered to the user from the copyright management center. The re-delivery of the second crypt key indicates a confirmation that the data content has been copied or transferred to a second user, and this is recorded in the copyright management center.
  • the second user In requesting a secondary usage to the copyright management center, the second user presents the information on the first user and information on the original copyright to the copyright management center.
  • the copyright management center transmits to the second user a permit key corresponding to the specific usage, together with a second crypt key (viewing permit key), a third crypt key (a permit key corresponding to the specific usage), and the copyright management program which have been encrypted.
  • LAN Local Area Network
  • Internet is now organized in global scale, by which a plurality of networks are utilized as if they are a single network.
  • the access control method based on encryption is disclosed in U.S. Pat. Nos. 4,736,422, 5,224,163, 5,400,403, 5,457,746, and 5,584,023, in EP 438154 and EP 506435, and in Japanese Patent Laid-Open 145923/1993.
  • the access control method based on encryption and digital signature is described in U.S. Pat. Nos. 4,919,545 and 5,465,299.
  • Intranet is now being propagated, in which a plurality of LANs are connected with each other via Internet and these LANs are utilized as if they are a single LAN.
  • information exchange is performed via Internet, which basically provides no guarantee for prevention of piracy, and information is encrypted to prevent the piracy when secret information is exchanged.
  • both data content and software are supplied by a server as an object, which comprises program and data.
  • a system called object container in which operating system, application program and data content are provided by a server and data content processing and data content storage are performed by a user terminal unit, which is an ordinary computer
  • a system called server object in which operating system, application program and data content are provided by a server, and data content processing is performed by a user terminal unit called network computer, while data content storage is carried out by a server.
  • a system is further developed, in which data content processing is also performed by the server, and the user terminal unit is provided only with input/output function, and the whole system functions as a single computer.
  • object oriented programming performing various processing by using “object” integrated with data content and program handling data content, instead of general form file consisting of data header and data body.
  • a storing portion called as “slot” in an envelope called as “instance” accommodates data called as “instance variable”.
  • the slot is surrounded by one or more of procedures called as “method” for referring, processing, binding and so on, and the instance variable can be referred to or operated only via “method”. This function is called as “encapsulation”. Instruction from outside for make the “method” refer to or operate the instance variable is called as “message”.
  • license network As rental network system, is considered.
  • an enterprise providing network base such as communication lines also provides the systems other than communication lines such as fee charging system, security system, copyright management system, certification system, etc.
  • a service enterprise utilizes these services and carries out network business as if it is his own system.
  • Secret-key system is also called “common key system” because the same key is used for encryption and decryption, and because it is necessary to keep the key in secret, it is also called “secret-key system”.
  • Typical examples of encryption algorithm using secret-key are: DES (Data Encryption Standard) system of National Bureau of Standards, FEAL (Fast Encryption Algorithm) system of NTT, and MISTY system of Mitsubishi Electric Corp.
  • the secret-key is referred as “Ks”.
  • the public-key system is a cryptosystem using a public-key being made public and a private-key, which is maintained in secret to those other than the owner of the key.
  • One key is used for encryption and the other key is used for decryption.
  • Typical example is RSA public-key system.
  • the public-key is referred as “Kb”, and the private-key is referred as “Kv”.
  • the encryption technique is the means to exclude illegitimate use of data content, but perfect operation is not guaranteed. Thus, the possibility of illegitimate use of data content cannot be completely excluded.
  • electronic watermark technique cannot exclude the possibility of illegitimate use, but if illegitimate use is detected, it is possible to check the illegitimate use by verifying the content of electronic watermark, and there are a number of methods in this technique. These methods are described in Nikkei Electronics, No.683, 1997-2-24, pp.99-124, “‘Digital watermark’ to help stop to use illegal proprietary digital works in the multimedia age”. Also, description is given on this technique by Walter Bender et al., “Introducing data-hiding technology to support digital watermark for protecting copyrights”, IBM System Journal, vol. 35, Nos. 3 & 4, International Business Machines Corporation.
  • a data content is handled as an object, and the data content, functioning as an object, is edited in accordance with a edit program. Therefore, the edited data content can be expressed by the original data content and the editing scenario, which describes the edit detail based on an edit program.
  • the original data content to be utilized there are, in addition to the one stored in the database, those prepared originally by the data editor.
  • the data content prepared by the data editor can also be handled in the same manner as the other data by storing it in the database.
  • the user decrypts the encrypted editing scenario by using a crypt key obtained from a key management center, and obtains the original data content from the database in accordance with the editing scenario and reconstitutes the edited data content.
  • FIG. 1 is a block diagram of an embodiment of a data management system.
  • FIG. 2 illustrates an example of producing new data content using a plurality of data contents as objects.
  • FIG. 3 is a block diagram of another embodiment of a data management system.
  • FIG. 4 is an outlined block diagram of an embodiment of a data content dealing system.
  • FIG. 5 is an outlined block diagram of another embodiment of a data content dealing system.
  • FIG. 6 is an outlined block diagram of yet another embodiment of a data content dealing system.
  • FIG. 7 is an outlined block diagram of a system dealing in en editing scenario.
  • the present invention is a copyright management system for digital data.
  • numerous specific details are set forth to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention.
  • the edit processing of data content is performed by editing the original copyrighted data using an edit tool, which is an application program.
  • the edited data content obtained by editing can be expressed by the utilized original data content, the information of the used edit tool and the editing process data. Specifically, in case the edit tool is available, it is possible to reproduce the edited data content by obtaining the original copyrighted data and the editing process data.
  • edited data content can be reproduced as the original data content, edit tool and editing process data content (editing scenario) are specified. In other words, unless the original data content, edit tool and the editing scenario are specified, it is impossible to reproduce the edited data content.
  • edited data content ⁇ A′ ⁇ is obtained by altering original data content A
  • edited data content ⁇ A+X ⁇ is obtained by adding data content X to the original data content A by a user
  • edited data content ⁇ A′′ ⁇ is obtained by dividing the original data content A into original data content elements A 1 , A 2 , A 3 . . . and changing the arrangement of the elements to such as A 3 , A 2 and A 1
  • is obtained by dividing the original data content A into original data content elements A 1 , A 2 , A 3 , . . . , also dividing the data content X of the user into X 1 , X 2 , X 3 , . . . and arranging these elements.
  • edited data content ⁇ A+B+C . . . ⁇ is obtained by simply combining original data contents A, B, C, . . . ; a case in which edited data content such as ⁇ A+X ⁇ is obtained by adding data content X to the original data content A, B, C, . . . ; a case in which edited data content ⁇ A 1 +B 1 +C 1 + . . . +A 2 +B 2 +C 2 + . . . +A 3 +B 3 +C 3 + . . . ⁇ is obtained by dividing the original data content A, B, C, . . .
  • combination of a plurality of original data contents, combination of a plurality of original data contents with user data content, division of a plurality of original data contents and change of the arrangements, and combination of divided plurality of original data contents with the user data content arise respectively a secondary copyright, which is necessary to be protected.
  • the original copyright of the user of course, exists in the data content X 1 , X 2 , X 3 , . . . added by the user.
  • Embodiment 1 The description of Embodiment 1 is given below referring to the drawing.
  • FIG. 1 shows a schematic view of a data copyrights management system in which a user edits one original copyrighted data and transfers it to a next user.
  • reference numerals 1 , 2 , and 3 represent databases that store text data or binary, audio, and/or picture data constituting computer graphics screens or programs, which is not encrypted; 9 is a communication line such as a public telephone line provided by a communication company or a CATV line provided by a cable television company; 10 is a recording medium such as a flexible disk; 4 is a primary user terminal; 5 is a secondary user terminal; 6 is a tertiary user terminal; and 7 is an n-th user terminal device.
  • Reference numeral 8 represents a copyright management center for managing the data copyright.
  • the databases 1 , 2 , and 3 , copyright management center 8 , primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 , and n-th user terminal 7 are connected to communication line 9 .
  • encrypted data content is transmitted via the path shown by a broken line
  • requests are transmitted from user terminal 4 , 5 , 6 , or 7 to database 1 , 2 , or 3 and copyright management center 8 via the path shown by a solid line.
  • the permit key, copyright management program, and crypt key corresponding to a specific usage are transmitted from database 1 , 2 , or 3 and copyright management center 8 to user terminal 4 , 5 , 6 , or 7 via the path shown by an one-dot chain line.
  • the Embodiment 1 employs a first public-key Kb 1 , a first private-key Kv 1 corresponding to the first public-key Kb 1 , a second public-key Kb 2 , and a second private-key Kv 2 corresponding to the second public-key Kb 2 that are prepared by a first user, and a first secret-key Ks 1 and a second secret-key Ks 2 prepared by the database.
  • the database then transmits these encrypted data content Cmks 1 and the first and the second secret-keys Cks 1 kb 1 and Ck 2 kb 2 to the first user.
  • the data content does not involve the copyright of first user because no modifications have been made to the data content. If, however, first user produces new data content based on the data content obtained or using a means for combining the original data content with other data content, the new data content involves a secondary exploitation right for first user, and first user has the original copyright for this secondary work.
  • second user produces new data content based on the data content obtained from first user or combining with other data content
  • the new data content involves a secondary exploitation right for the second user, and the second user has the original copyright of this secondary work.
  • Databases 1 , 2 , and 3 store text data content or binary, digital audio, or digital picture data content constituting computer graphics screens or programs in unencrypted form. This data content is encrypted and supplied to the user terminal 4 via communication line 8 during a data content read operation in response to a request from first user terminal 4 .
  • first user extracts parts M 4 , M 5 and M 6 constituting data content from a plurality of data contents M 1 , M 2 and M 3 obtained from one or more databases, and produces new data content M 7 from these parts M 4 , M 5 and M 6 .
  • New data content M 7 involves a secondary copyright associated with the editing of original data content M 1 , M 2 and M 3 as well as the original copyright for original data content M 1 , M 2 and M 3 from which parts M 4 , M 5 and M 6 produce new data content M 7 .
  • the original data content M 1 , M 2 and M 3 are encrypted using each of the second secret-keys Ks 21 , Ks 22 , Ks 23 supplied with each of data content M 1 , M 2 and M 3 when used for operations other than display; i.e., store, edit, copy or transmit:
  • Cm 1 ks 21 E(M 1 ,Ks 21 )
  • Cm 2 ks 22 E(M 2 ,Ks 22 )
  • Cm 3 ks 23 E(M 3 ,Ks 23 ).
  • the data content parts M 4 , M 5 and M 6 , of original data content are also encrypted using each of the second secret-keys Ks 21 , Ks 22 , Ks 23 supplied with each of the original data content when used for operations other than display:
  • Cm 4 ks 21 E(M 4 ,Ks 21 )
  • Cm 5 ks 22 E(M 5 ,Ks 22 )
  • Cm 6 ks 23 E(M 6 ,Ks 23 ).
  • second user Upon receipt of the encrypted original data content parts Cm 4 ks 21 , Cm 5 ks 22 and Cm 6 ks 23 , and the edit program Pe, second user requests second secret-keys Ks 21 , Ks 22 , Ks 23 for decryption of the encrypted original data content parts Cm 4 ks 21 , Cm 5 ks 22 and Cm 6 ks 23 by presenting the edit program Pe with the digital signature, to the copyright management center 8 .
  • the digital signature Spe presented to the copyright management center is registered in the center as a valid procedure for authorizing the first user being a secondary copyright owner.
  • agent-oriented software a user can synthesize data content with little labor.
  • the agent-oriented software unlike the conventional one, is a program having autonomy, flexibility and cooperativeness, which is able to meet a user's request with its characteristics of autonomy, flexibility and cooperativeness in accordance with only a general instruction of the user without specifically giving every operation instruction to the software.
  • agent program By incorporating the agent program into a basic system of a data copyright management system so that the database utilization of a user is monitored, and it is arranged that information including data utilization condition and charging is collected at the database or the copyright management center, using metering function placed in user terminal, and thus, it is possible to know the database utilization condition of the user at the database side or the copyright management center side and achieve more accurate copyright management.
  • agent program and its data are also necessary to be protected in copyrights, and therefore, are encrypted like original data content.
  • the data on copyrights can be handled in the computer programming or processing as “object” integrated of program and data content.
  • Embodiment 2 is described referring to FIG. 3 .
  • This embodiment uses first secret-key Ks 1 , second secret-key Ks 2 , third secret-key Ks 3 , plaintext original copyright label Lc 0 and plaintext copyright management program Pc.
  • the data content used in the invention is the object comprising combined program and data content.
  • Data is supplied from information providers 15 , 15 , 15 . . . to database 11 and to primary users 13 .
  • data content is supplied from information providers 16 , 16 , 16 . . . via communication line 14 or via information record medium 17 such as CD-ROM or the like directly to primary users 13 without database 11 intervening.
  • the solid line, broken line and one-dot chain line in this FIG. 3 show the path for data content and requests for crypt keys, path of encrypted data content and path of crypt keys, respectively.
  • Primary users 13 are not merely users but can be information providers 15 or 16 that provide new data content (secondary copyrighted data) by combining or revising a plurality of obtained original data content.
  • the original data content provided by each of information providers 15 and 16 has been encrypted to protect the copyright. Therefore, the use of the encrypted original data content obtained by first user 13 needs to be decrypted. All of the crypt keys for the decryption are deposited in key control center 12 to be controlled by the center.
  • Primary users 13 who require use of encrypted original data content Cm 0 ks 1 make a request to key control center 12 via communication line 14 for distributing primary use permit keys K 1 indicating original copyright label Lc 0 .
  • key control center 12 charges as well as grasps the use condition of original data content and of the database used by primary users 13 .
  • Primary users 13 who require to edit original copyrighted data content M 0 make a request to key control center 12 for distributing second secret-key Ks 2 via communication line 14 .
  • Key control center 12 that receives the request for distributing second secret-key Ks 2 provides primary users 13 via communication line 14 .
  • Primary users 13 that have received second secret-key Ks 2 edit original data content M 0 and obtain halfway edited data content M 0 ′.
  • primary users 13 prepare third secret-key Ks 3 in order to execute the secondary copyright with reference to the data content edition concerning final editorial data content M 1 , and register third secret-key Ks 3 into key control center 12 .
  • the key control center 12 also may prepare third secret-key Ks 3 and distribute it in response to a request from primary users 13 .
  • Secondary users 19 who desire to use provided encrypted editorial data content Cm 1 ks 3 request key control center 12 for distributing third secret-key Ks 3 via communication line 14 .
  • Key control center 12 that has received the request for distributing third secret-keys Ks 3 from secondary users 19 distributes third secret-key Ks 3 to secondary users 19 via communication line 14 .
  • Embodiment 3 in which a user edits one original copyrighted data content and transfers it to a next user, is described as below referring to FIG. 4 .
  • This embodiment uses “user label”, “copyright label” and “edit label” in order to protect data content copyrights and execute the copyrights.
  • Information of the label owner is described in the user label; information relating copyrighted data content is described in the copyright label; and contains information of the edit tool and editing process data (editing scenario) are described in the edit label, which may be described edit tool (edit program) instead of edit tool information.
  • the user label is generated by the data management center according to the information of the user when the user joins the system.
  • the copyright label is generated by the data management center when the author of the data content presents the content to the data management center.
  • the edit label is generated by the data management center, when the user who has edited the data content presents the user label and the editing scenario to the data management center. These are transferred to each label owner and are stored at the data management center.
  • the original author A stores the original secret-key Ks 0 and encrypts the original data content M 0 without depending on the data management center, while the original secret-key Ks 0 must be stored at the data management center to utilize the original data content M 0 by the user (data content user).
  • the data management center performs one-way hash to the original copyright label Lc 0 using algorithm such as MD 5, for example, to 16-byte data content amount, prepares an original copyright label fingerprint F 0 , and sends it to the original author A.
  • This electronic fingerprint is prepared on each of the original data content and edited data content each time the original data content is edited and edited data content is obtained and is transferred, together with the data content.
  • the edited data content Me 1 thus obtained contains copyright of the first user, who edited the data content, and also copyright of the original author who prepared the original data content.
  • the edited data content can be expressed by data content of the utilized original data content, information of the used edit tool and the editing scenario (editing process data content). Accordingly, these informations and editing scenario are entered in the first user label, i.e. the first edit label Le 1 .
  • the user U 1 presents the first edit label Le 1 to the data management center so that the secondary exploitation right of the user U 1 is registered.
  • Each user may put digital signature which one-way hash value of the user's label is encrypted using user's private-key on the user's label to be presented to the data management center. Then, the data management center decrypts the encrypted one-way hash value using the user's public-key, calculates the one-way hash value of the label and compares the two one-way hash values in order to verify validity of each user's label.
  • the editing of data content is performed by modifying the original data content using the edit tool, and data content of the edited data content thus obtained can be expressed by the utilized original data content, information of the used edit tool and the editing scenario.
  • the edited data content can be reproduced by specifying the utilized database, the used original data content, information of the used edit tool and the editing scenario. The same applies to the case where a plurality of data content obtained from a single database or a plurality of databases are utilized.
  • the original copyright owner and the information provider holding the data content are discriminated from the user who does not hold data content, and are arranged on the network side with the data management center and the like.
  • public-key and private-key are used. If original data content is transferred to a user, the original data content is encrypted by using a secret-key or a public-key of transferred destination for the purpose of security.
  • the first user label Lu 1 is referred, and utilizing conditions of the original data content M 0 i and the edit tool Pe are recorded at the data management center and are utilized for charging of a fee.
  • the computer of the first user U 1 When the computer of the first user U 1 is provided with a data content storage unit, there is possibility that the collected data content or the edited data content may be stored in the storage unit, however, storage inhibition as described above is carried out to exclude storage, copying and transfer.
  • the data management center encrypts the first edited data content M 1 i and the edit tool Pe using the public-key Kb 2 of the second user U 2 :
  • Cm 1 ikb 2 E(M 1 i,Kb 2 )
  • Cpekb 2 E(Pe,Kb 2 ) and transfers the encrypted first edited data content Cm 1 ikb 2 and the encrypted edit tool Cpekb 2 to the second user U 2 .
  • the data content is not stored by the user, but it is stored only in the database.
  • the user controls and stores only the information relating to user and editing, i.e. the edit label having information of the utilized original data content and the used edit tool, the editing scenario and the information of the user who has edited. Only this edit label is encrypted and transferred between the users. Therefore, the data content is not stored, copied or transferred.
  • the original data content handled in this system is an object, and the edited data content is expressed as the original data content object linked by an editing scenario. Therefore, only the editing scenario is dealt in.
  • the user collects and links the original data content used in accordance with the editing scenario and reproduces the edited data content.
  • the original data content may be collected or linked by the user himself, but the burden on the user may be reduced if it is performed in the system side or by using an agent program.
  • a data content dealing center which serves as a core of the system, comprises a data content database, an editing scenario database, a key management center, and a data content dealing management center present on a network.
  • the key management center stores a secret key for encryption/decryption for the original data content, the user data content and the editing scenario and supplies it in response to the request of the user.
  • An editing scenario dealing management center prepares a catalog and advertises for the edited data content and performs sales management and collecting a fee to the user, and further, when necessary, collects and links the original data content according to the editing scenario and manages a label for the editing scenario to be stored in the editing scenario database
  • the original secret-key Ks 0 i may be prepared by the information provider IPi, or the information provider IPi may ask the key management center to generate it.
  • the key management center generates the original secret-key Ks 0 i
  • the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the original data content cannot be utilized as it is and posts it in the data content dealing center.
  • the user's data content may be added. Therefore, as the data content to be used for edit in this embodiment, there are, in addition to a single data content, a plurality of original data contents, and user's data content.
  • the edited data content comprises these data content and editing scenario, i.e. the details of editing. By obtaining these, it is possible to reproduce the edited data content.
  • the original data content is originally stored in the data content database of the data content dealing center. Accordingly, data which is not yet stored in the data content dealing center when newly generated by editing of the data content, is the user's data content and the editing scenario.
  • the original data content M 0 i is stored in the data content database of the data content dealing center. Accordingly, what is to be stored newly in the data content dealing center for executing secondary copyright of the first user includes the first editing scenario S 1 i and the first user data content Mu 1 i.
  • the first user or the data content dealing center may add watermark to the original data content M 0 i to check illegitimate use and may store it.
  • the database where the first secret-key Ks 1 i, the first editing scenario S 1 i and the first user data content Mu 1 i are to be stored may be the data content database where the original data content M 0 i is stored, or another scenario database may be provided to store them.
  • the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the first edited data content cannot be utilized as it is and posts it in the data content dealing center.
  • the original data content handled in the present system is an object, and the edited data content is expressed as the original data content object linked by the editing scenario. Therefore, only the editing scenario is dealt in.
  • the editing scenario has been purchased or lent, the user collects and links the original data content used in accordance with the editing scenario and reproduces the edited data content.
  • the original data content may be collected by the user himself, but the burden on the user may be reduced if it is performed in the system side or by using an agent program.
  • a data content dealing center which serves as a core of the system, comprises a key management center, a data content database, a data content dealing management center, an editing scenario database, and an editing scenario market management center present on the network.
  • the data content database stores the original data content provided by an information provider (IP) and supplies it to a data content editor.
  • IP information provider
  • the editing scenario database stores the editing scenario when the data content editor obtains the edited data content by utilizing the original data content or the editor's data content created by the data content editor and supplies it to the editing scenario sellers, who participate in auction.
  • the key management center stores a secret-key for encryption/decryption for the original data content, the editor's data content and the editing scenario and supplies it to the data content editor or the editing scenario seller.
  • the data content dealing management center prepares a catalog and advertises for the original data content and manages sales for the data content editor.
  • the editing scenario market management center prepares a catalog and advertises for the edited data content, and manages editing scenario auction and collects a fee. Further, the editing scenario market management center collects and links the original data content according to the editing scenario, when necessary, and also manages a lbel for the editing scenario which is to be stored in the editing scenario database.
  • the original secret-key Ks 0 i may be prepared by the information provider IPi, or the information provider IPi may ask the key management center to generate it.
  • the key management center generates the original secret-key Ks 0 i
  • the information provider or the data content dealing center may add watermark to the original data content M 0 i to check illegitimate use and may store it.
  • the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the original data content cannot be utilized as it is and posts it in the data content dealing center.
  • the data content of the data content editor may be added. Therefore, as the data content to be used for editing in this embodiment, there are, in addition to a single data content, a plurality of original data contents and the data content of the data content editor.
  • the edited data content comprises the data content and the editing scenario, i.e. the detail of editing. By obtaining these, it is possible to reproduce the edited data content.
  • the original data content is originally stored in the data content database of the data content dealing center. Accordingly, data which is not yet stored in the data content dealing center when newly generated by editing the data content, is the editor's data content of the data content editor and the editing scenario.
  • the data content dealing center it is possible to handle the editor's data content of the data content editor who has edited the data content in the same manner as the original data content, and the data content editor can be an information provider. Further, it is also possible to sell utilization right of the editing scenario and/or the editor's data content by auction in the market. In this case, the utilization right of the editing scenario and the editor's data content may be plural for a single edited data content.
  • the original data content M 0 i is stored in the data content database of the data content dealing center. Accordingly, what is to be stored newly in the data content dealing center is the editing scenario S 1 i and the editor's data content Medi.
  • the encrypted editing scenario Cseiksei (shown as “sei” in the figure), the encrypted editor's data content Cmeiksei (shown as “mei” in the figure), and the encrypted secret-key Ckseikbc (shown as “ksei” in the figure) are transferred to the data content dealing center.
  • the secret-key Ksei may be prepared by the data content editor Ei, or the data content editor Ei may ask the key management center to generate it.
  • the key management center generates the secret-key Ksei
  • the data content editor or the data content dealing center may add watermark to the editing scenario Sei and the editor's data content Medi to check illegitimate use and may store them.
  • the database where the secret-key Ksei, the editing scenario Sei and the editor's data content Medi are to be stored may be the data content database where the original data content M 0 i is stored, or another scenario database may be provided to store them.
  • the editing scenario market management center in the data content dealing center prepares a catalog by means to compress or to divide into parts so that the edited data content cannot be utilized as it is and posts it shown number of the selling utilization rights in the editing scenario market management center to announce the auction.
  • the utilization right of the editing scenario and the editor's data content may be plural for a single edited data content.
  • the content of the copyright label is changed from the one based on the data content editor label Lei to the one based on the editing scenario seller label Ldi.
  • the secret-key Ksei of the data content editor cannot be used any more, and the secret-key Ksdi of the editing scenario seller can be used substantially.
  • it instead of changing the content of the copyright label, it may be newly added based on the editing scenario seller label Ldi.
  • the editing scenario seller who purchases the encrypted editing scenario Cseiksdi executes thereafter the utilization right of the purchased editing scenario.
  • the original data content can also be sold by auction in the same manner as the editing scenario. However, it is preferable to avoid to sell to a specific seller because there may be a plurality of users utilizing the original data content.

Abstract

A system for dealing in an original data content and an edited data content. A data content is handled as an object, and the data content is edited by editing a data content, functioning as an object, in accordance with an edit program. The edited data content is expressed by the original data content and the editing scenario which describes editing detail by the edit program. Only the encrypted editing scenario is dealt in. Upon receipt of the encrypted editing scenario, a user decrypts the encrypted editing scenario using a crypt key obtained from a key management center, and obtains the original data content from the database in accordance with the editing scenario and re-constitutes the edited data content. In case there is the one who wishes sale of the editing scenario, its utilization right is sold by auction.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,076,077 filed as application Ser. No. 08/846,661 on May 1, 1997. The reissue applications are application Ser. No. 10/170,677 (the present application) directed toward Group I, a first divisional application Ser. No. 10/701,943 directed toward Group II, a second divisional application Ser. No. 10/701,945 directed toward Group III, and a third divisional application Ser. No. 10/701,946 directed toward Group IV, all of which are divisional reissues of U.S. Pat. No. 6,076,077, and all of which are commonly assigned to the assignee of the present invention.
ThisSaid application Ser. No. 08/846,661is a continuation-in-part of prior U.S. patent application Ser.application Ser. No. 08/549,271 filed on Oct. 27, 1995, now U.S. Pat. No. 5,646,999, and a continuation-in-part of prior U.S. patent application Ser.application Ser. No. 08/733,504 filed on Oct. 18, 1996, now U.S. Pat. No. 5,974,141 all of which are commonly assigned to the assignee of the present invention.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a system for managing copyrights in dealing in copyrighted digital data content, i.e., dealing in original digital data content and edited digital data content.
2. Background Art
Because analog data content is deteriorated in quality whenever storing, copying, editing, or transferring it, controlling copyrights associated with these operations has not been a serious problem. However, because digital data content is not deteriorated in quality after repeatedly storing, copying, editing, or transferring it, such controlling copyrights associated with these operation is a serious problem.
Because there has been hitherto no adequate method for controlling a copyright for digital data content, the copyright is handled by the copyright law or contracts. Even in the copyright law, compensation money for a digital-type sound- or picture-recorder is only systematized.
Use of a data content includes not only referring to its contents but also normally effectively using by storing, copying, or editing obtained data content by a user. Moreover, it is possible to transmit data content which is edited by a user to another person via on-line basis by a communication line or via off-line basis using a proper recording medium. Furthermore, it is possible to transmit the edited data content to the database to be registered as new data content. In such a case, the user who has edited the data content may also be an information provider.
Under these circumstances, how to deal in a copyright of data content in a database is a large problem. However, there has not been adequate copyright management means for solving the problem so far, particularly copyright management means completed for secondary utilization such as copying, editing, or transferring of the data content.
The inventor of the present invention proposed a system for managing a copyright by obtaining a permit key from a key control center via a public telephone line in Japanese Patent Laid-Open No. 46419/1994 (GB 2269302A) and Japanese Patent Laid-Open No. 141004/1994 (U.S. Pat. No. 5,504,933) and moreover, proposed an apparatus for managing the copyright in Japanese Patent Laid-Open No. 132916/1994 (GB 2272822A).
Moreover, a copyright management method for primary utilization of digital data content such as display (including process to sound) or storage including real-time transmission of the digital data content in a database system and secondary utilization of the digital data content such as copying, editing, or transferring of the digital data content by further developing the above invention is proposed in Japanese Patent Application No. 64889/1994 (U.S. patent application Ser. No. 08/416,037).
The database copyright management system of the above application in order to manage the copyright, either one or more of a program for managing the copyright, copyright information, and a copyright control message are used in addition to a use permit key corresponding to a requested use, and data content which has been transferred with encryption is decrypted to be used for viewing and editing, and the data content is encrypted again when used for storing, copying and transferring.
The copyright control message is displayed when utilization beyond the range of the user's request or authorized operation is found to give caution or warning to a user and the copyright management program performs monitoring and managing so that utilization beyond the range of the user's request or authorized operation is not performed.
The inventor also proposed in Japanese Patent Laid-open No. 185448/1996, EP publication No. EP 704785A2 (U.S. patent application Ser. No. 08/536,747) a system for specifically implementing a database copyright management system.
The above-mentioned system comprises a key management center that manages a crypt key and a copyright management center that manages the database copyright. According to this system, all of the data content delivered from a database is encrypted by a first crypt key, and a first user who wishes to uses data content directly from the database requests the key management center the key corresponding to the specific usage by presenting information on the first user to the center. In response to the primary usage request from the first user, the key management center transfers the information on the first user to the copyright management center. On receiving the information, the copyright management center transfers this information together with a copyright management program to the key control center. On receiving the copyright management program, the key control center transfers the first crypt key and a second crypt key K2 corresponding to the specific usage together with the copyright management program to the first user via a communication network. On receiving the first crypt key, the first user uses this key to decrypt the data content for usage. The user uses the second crypt key to encrypt and decrypt data content when subsequently storing, copying or transmitting the data content.
If data content is copied to an external record medium or transmitted without being stored, the first and second crypt keys are abandoned. If the first user wishes to use the data content again, the first and second crypt keys are re-delivered to the user from the copyright management center. The re-delivery of the second crypt key indicates a confirmation that the data content has been copied or transferred to a second user, and this is recorded in the copyright management center.
In requesting a secondary usage to the copyright management center, the second user presents the information on the first user and information on the original copyright to the copyright management center. The copyright management center transmits to the second user a permit key corresponding to the specific usage, together with a second crypt key (viewing permit key), a third crypt key (a permit key corresponding to the specific usage), and the copyright management program which have been encrypted.
On the other hand, it is widely practiced to establish LAN (Local Area Network) by connecting computers with each other in offices, organizations, companies, etc. Also, a plurality of networks are connected with each other, and Internet is now organized in global scale, by which a plurality of networks are utilized as if they are a single network.
In LAN used in an organization such as firms, secret information is often stored, which must not be disclosed to outsiders.
For this reason, it is necessary to arrange the secret information in such manner that only a specific group of users can gain access and use such information, and such access is generally placed under control to prevent leakage of secret information to outsiders.
There are roughly two methods to control the access: a method to control access with access permission, and a method to do it by encryption.
The method of access control by access permission is described in U.S. Pat. Nos. 5,173,939, 5,220,604, 5,224,163, 5,315,657, 5,414,772 and 5,438,508, in EP 506435, and in Japanese Patent Laid-Open 169540/1987.
The access control method based on encryption is disclosed in U.S. Pat. Nos. 4,736,422, 5,224,163, 5,400,403, 5,457,746, and 5,584,023, in EP 438154 and EP 506435, and in Japanese Patent Laid-Open 145923/1993. The access control method based on encryption and digital signature is described in U.S. Pat. Nos. 4,919,545 and 5,465,299.
Intranet is now being propagated, in which a plurality of LANs are connected with each other via Internet and these LANs are utilized as if they are a single LAN. In the intranet, information exchange is performed via Internet, which basically provides no guarantee for prevention of piracy, and information is encrypted to prevent the piracy when secret information is exchanged.
The prevention of information piracy during transmission by means of encryption is disclosed in U.S. Pat. Nos. 5,504,818 and 5,515,441, and the use of a plurality of crypt keys is described in U.S. Pat. Nos. 5,504,816, 5,353,351, 5,475,757, and 5,381,480. Also, performing re-encryption is described in U.S. Pat. No. 5,479,514.
When encrypting, management of crypt key including transfer and receipt of crypt key becomes an important issue. Generation of keys by IC card is disclosed in U.S. Pat. No. 5,577,121, and encryption/decryption by IC card is disclosed in U.S. Pat. Nos. 5,347,581 and 5,504,817.
Also, electronic watermark technique is described in EP 649074.
With recent development of computer network system, individual computers, used on stand-alone basis in the past, are connected together through the network system, and database system to commonly share the data is now propagated. Further, distributed object system has been proposed, in which application program or basic software called operating system as well as data is also commonly shared through the network.
In the distributed object system, both data content and software are supplied by a server as an object, which comprises program and data.
In the distributed object system, there are two systems, i.e. a system called object container, in which operating system, application program and data content are provided by a server and data content processing and data content storage are performed by a user terminal unit, which is an ordinary computer, and a system called server object, in which operating system, application program and data content are provided by a server, and data content processing is performed by a user terminal unit called network computer, while data content storage is carried out by a server. A system is further developed, in which data content processing is also performed by the server, and the user terminal unit is provided only with input/output function, and the whole system functions as a single computer.
Further, there is a method of so-called object oriented programming performing various processing by using “object” integrated with data content and program handling data content, instead of general form file consisting of data header and data body.
In object, a storing portion called as “slot” in an envelope called as “instance” accommodates data called as “instance variable”. The slot is surrounded by one or more of procedures called as “method” for referring, processing, binding and so on, and the instance variable can be referred to or operated only via “method”. This function is called as “encapsulation”. Instruction from outside for make the “method” refer to or operate the instance variable is called as “message”.
This means, in another view, the instance variable which is impossible to be referred to or operated without through “method” is protected by the “method”. Then, this can be used for encrypting the “method” and allowing the instance variable to be referred to or operated only by “message” which can decrypt the encrypted “method”.
In this case also, similarly to the case of data having general file form, since if entire “method” is encrypted, it is impossible to utilize “object”, a part of the “method” is not encrypted.
Another form of the network system called “license network” as rental network system, is considered. In this system, an enterprise providing network base such as communication lines also provides the systems other than communication lines such as fee charging system, security system, copyright management system, certification system, etc. And a service enterprise utilizes these services and carries out network business as if it is his own system.
Then, basic encryption-related technique used in the present invention will be described below.
Crypt Key
Secret-key system is also called “common key system” because the same key is used for encryption and decryption, and because it is necessary to keep the key in secret, it is also called “secret-key system”. Typical examples of encryption algorithm using secret-key are: DES (Data Encryption Standard) system of National Bureau of Standards, FEAL (Fast Encryption Algorithm) system of NTT, and MISTY system of Mitsubishi Electric Corp. In the embodiments described below, the secret-key is referred as “Ks”.
In contrast, the public-key system is a cryptosystem using a public-key being made public and a private-key, which is maintained in secret to those other than the owner of the key. One key is used for encryption and the other key is used for decryption. Typical example is RSA public-key system. In this specification, the public-key is referred as “Kb”, and the private-key is referred as “Kv”.
Here, the operation to encrypt data content, a plain text material M to a cryptogram Cmks using a secret-key Ks is expressed as:
Cmks=E(M,Ks).
The operation to decrypt the cryptogram Cmks to the plain text data content M using a crypt key Ks is expressed as:
M=D(Cmks,Ks).
Also, the operation to encrypt the plain text data content M to a cryptogram Cmkb using a public key Kb is expressed as:
Cmkb=E(M,Kb).
The operation to decrypt the cryptogram Cmkb to the plain text data content M using a private-key Kv is expressed as:
 M=D(Cmkv,Kv).
The operation to encrypt the plain text data content M to a cryptogram Cmkv using a private-key Kv is expressed as:
Cmkv=E(M,Kv),
and the operation to decrypt the cryptogram Cmkv to the plain text data content M using the public-key Kb is expressed as:
M=D(Cmkb,Kb).
The encryption technique is the means to exclude illegitimate use of data content, but perfect operation is not guaranteed. Thus, the possibility of illegitimate use of data content cannot be completely excluded.
On the other hand, electronic watermark technique cannot exclude the possibility of illegitimate use, but if illegitimate use is detected, it is possible to check the illegitimate use by verifying the content of electronic watermark, and there are a number of methods in this technique. These methods are described in Nikkei Electronics, No.683, 1997-2-24, pp.99-124, “‘Digital watermark’ to help stop to use illegal proprietary digital works in the multimedia age”. Also, description is given on this technique by Walter Bender et al., “Introducing data-hiding technology to support digital watermark for protecting copyrights”, IBM System Journal, vol. 35, Nos. 3 & 4, International Business Machines Corporation.
SUMMARY OF THE INVENTION
In the present application, it is proposed to provide a system for dealing in an original data content and an edited data content.
In the present application, a data content is handled as an object, and the data content, functioning as an object, is edited in accordance with a edit program. Therefore, the edited data content can be expressed by the original data content and the editing scenario, which describes the edit detail based on an edit program. As the original data content to be utilized, there are, in addition to the one stored in the database, those prepared originally by the data editor. The data content prepared by the data editor can also be handled in the same manner as the other data by storing it in the database. In this case, only the encrypted editing scenario is dealt in, and when the user obtains the encrypted editing scenario, the user decrypts the encrypted editing scenario by using a crypt key obtained from a key management center, and obtains the original data content from the database in accordance with the editing scenario and reconstitutes the edited data content.
In case there is the one who wishes sale of the editing scenario, its utilization right is sold by auction.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of an embodiment of a data management system.
FIG. 2 illustrates an example of producing new data content using a plurality of data contents as objects.
FIG. 3 is a block diagram of another embodiment of a data management system.
FIG. 4 is an outlined block diagram of an embodiment of a data content dealing system.
FIG. 5 is an outlined block diagram of another embodiment of a data content dealing system.
FIG. 6 is an outlined block diagram of yet another embodiment of a data content dealing system.
FIG. 7 is an outlined block diagram of a system dealing in en editing scenario.
DETAILED DESCRIPTION OF THE INVENTION
The present invention is a copyright management system for digital data. In the following description, numerous specific details are set forth to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention.
The preferred embodiments are described below referring to the accompanied drawings.
The edit processing of data content is performed by editing the original copyrighted data using an edit tool, which is an application program. The edited data content obtained by editing can be expressed by the utilized original data content, the information of the used edit tool and the editing process data. Specifically, in case the edit tool is available, it is possible to reproduce the edited data content by obtaining the original copyrighted data and the editing process data.
Description on editing digital data is given first.
Because digital data content is edited by using an edit program (edit tool) and thereby altering original data content, edited data content can be reproduced as the original data content, edit tool and editing process data content (editing scenario) are specified. In other words, unless the original data content, edit tool and the editing scenario are specified, it is impossible to reproduce the edited data content.
To produce new data content from single original data content, there are a case in which edited data content {A′} is obtained by altering original data content A; a case in which edited data content {A+X} is obtained by adding data content X to the original data content A by a user; a case in which edited data content {A″} is obtained by dividing the original data content A into original data content elements A1, A2, A3 . . . and changing the arrangement of the elements to such as A3, A2 and A1; and a case in which edited data content {A1+X1+A2+X2+A3+X3 . . . } is obtained by dividing the original data content A into original data content elements A1, A2, A3, . . . , also dividing the data content X of the user into X1, X2, X3, . . . and arranging these elements.
In these cases, alteration of original data content, change of original data content arrangement, combination of the original data content with user data content, and division of the original data content and combination of it with the user data content arise respectively a secondary copyright, which is necessary to be protected. The original copyright of the user, of course, exists in the data content X added by the user.
To produce new data content by combining a plurality of original data contents, there are a case in which edited data content {A+B+C . . . } is obtained by simply combining original data contents A, B, C, . . . ; a case in which edited data content such as {A+X} is obtained by adding data content X to the original data content A, B, C, . . . ; a case in which edited data content {A1+B1+C1+ . . . +A2+B2+C2+ . . . +A3+B3+C3+ . . . } is obtained by dividing the original data content A, B, C, . . . into original data content elements A1, A2, A3, . . . , B1, B2, B3, . . . , and C1, C2, C3, . . . , combining them, and changing their arrangements; and a case in which edited data content {A1+B1+C1+X1+ . . . +A2+B2+C2+X2+ . . . +A3+B3+C3+X3+ . . . } is obtained by dividing the original data content A, B, C, . . . into original data content elements A1, A2, A3, . . . , B1, B2, B3, . . . , and C1, C2, C, . . . , combining with the elements of user data content X1, X2, X3, . . . , and changing their arrangements.
Also in these cases, combination of a plurality of original data contents, combination of a plurality of original data contents with user data content, division of a plurality of original data contents and change of the arrangements, and combination of divided plurality of original data contents with the user data content arise respectively a secondary copyright, which is necessary to be protected. Also, the original copyright of the user, of course, exists in the data content X1, X2, X3, . . . added by the user.
Embodiment 1
The description of Embodiment 1 is given below referring to the drawing.
FIG. 1 shows a schematic view of a data copyrights management system in which a user edits one original copyrighted data and transfers it to a next user.
In the embodiment, reference numerals 1, 2, and 3 represent databases that store text data or binary, audio, and/or picture data constituting computer graphics screens or programs, which is not encrypted; 9 is a communication line such as a public telephone line provided by a communication company or a CATV line provided by a cable television company; 10 is a recording medium such as a flexible disk; 4 is a primary user terminal; 5 is a secondary user terminal; 6 is a tertiary user terminal; and 7 is an n-th user terminal device. Reference numeral 8 represents a copyright management center for managing the data copyright.
The databases 1, 2, and 3, copyright management center 8, primary user terminal 4, secondary user terminal 5, tertiary user terminal 6, and n-th user terminal 7 are connected to communication line 9. In FIG. 1, encrypted data content is transmitted via the path shown by a broken line, requests are transmitted from user terminal 4, 5, 6, or 7 to database 1, 2, or 3 and copyright management center 8 via the path shown by a solid line. The permit key, copyright management program, and crypt key corresponding to a specific usage are transmitted from database 1, 2, or 3 and copyright management center 8 to user terminal 4, 5, 6, or 7 via the path shown by an one-dot chain line.
The Embodiment 1 employs a first public-key Kb1, a first private-key Kv1 corresponding to the first public-key Kb1, a second public-key Kb2, and a second private-key Kv2 corresponding to the second public-key Kb2 that are prepared by a first user, and a first secret-key Ks1 and a second secret-key Ks2 prepared by the database. The database uses the first secret-key Ks1 to encrypt data content M:
Cmks1=E(M,Ks1)
and further encrypts the first secret-key Ks1 by the first public-key Kb1:
Cks1kb1=E(Ks1,Kb1)
and the second secret-key Ks2 by the second public-key Kb2:
Cks1kb2=E(Ks2,Kb2).
The database then transmits these encrypted data content Cmks1 and the first and the second secret-keys Cks1kb1 and Ck2kb2 to the first user.
The first user decrypts the encrypted first secret-key Cks1kb1 using the first private-key Kv1:
Ks1=D(Kv1,Cks1kb1),
and decrypts the encrypted data content Cmks1 by the decrypted first secret-key Ks1:
M=D(Ks1,Cmks1)
and use it. The user decrypts encrypted second secret-key Cks2kb2 by the second private-key Kv2:
Ks2=D(Kv2,Cks2kb2),
which is subsequently used as a key for encrypting/decrypting of storing, copying, or transmitting data content.
If the first user copies data content obtained and then supplies it to secondary user 5, the data content does not involve the copyright of first user because no modifications have been made to the data content. If, however, first user produces new data content based on the data content obtained or using a means for combining the original data content with other data content, the new data content involves a secondary exploitation right for first user, and first user has the original copyright for this secondary work.
Similarly, if second user produces new data content based on the data content obtained from first user or combining with other data content, the new data content involves a secondary exploitation right for the second user, and the second user has the original copyright of this secondary work.
Databases 1, 2, and 3 store text data content or binary, digital audio, or digital picture data content constituting computer graphics screens or programs in unencrypted form. This data content is encrypted and supplied to the user terminal 4 via communication line 8 during a data content read operation in response to a request from first user terminal 4.
The method of managing data copyrights obtained from a database is described in Japanese Patent Application 1994-237673 (Japanese Patent Laid Open 1996-185448, U.S. patent application Ser. No. 08/536,747, EP 704785A2).
As shown in FIG. 2, first user extracts parts M4, M5 and M6 constituting data content from a plurality of data contents M1, M2 and M3 obtained from one or more databases, and produces new data content M7 from these parts M4, M5 and M6.
First user supplies new data content M7 to second user; new data content M7 involves a secondary copyright associated with the editing of original data content M1, M2 and M3 as well as the original copyright for original data content M1, M2 and M3 from which parts M4, M5 and M6 produce new data content M7.
The original data content M1, M2 and M3 are encrypted using each of the second secret-keys Ks21, Ks22, Ks23 supplied with each of data content M1, M2 and M3 when used for operations other than display; i.e., store, edit, copy or transmit:
Cm1ks21=E(M1,Ks21)
Cm2ks22=E(M2,Ks22)
Cm3ks23=E(M3,Ks23).
The data content parts M4, M5 and M6, of original data content are also encrypted using each of the second secret-keys Ks21, Ks22, Ks23 supplied with each of the original data content when used for operations other than display:
Cm4ks21=E(M4,Ks21)
Cm5ks22=E(M5,Ks22)
Cm6ks23=E(M6,Ks23).
First user who has edited the data content provides a digital signature for edit program Pe using first Private-key Kv1:
Spe=D(Pe,Kv1)
and supplies encrypted original data content parts Cm4ks21, Cm5ks22 and Cm6ks23 to second user together with the edit program Pe with the digital signature, via communication line 9 or by storing into the recording medium 10.
Upon receipt of the encrypted original data content parts Cm4ks21, Cm5ks22 and Cm6ks23, and the edit program Pe, second user requests second secret-keys Ks21, Ks22, Ks23 for decryption of the encrypted original data content parts Cm4ks21, Cm5ks22 and Cm6ks23 by presenting the edit program Pe with the digital signature, to the copyright management center 8.
Data copyright management center identifies first user from the presented digital signature in the edit program Pe, using first public-key Kb1:
Pe=E(Spe,Kb1),
and determines if first user is a valid user to use the original data content to which the second secret-keys Ks21, Ks22, Ks23 correspond. If first user is the valid user, the center transmits the second secret-keys Ks21, Ks22, Ks23 to second user. Otherwise, it does not transmit the second secret-keys Ks21, Ks22, Ks23 to second user.
The digital signature Spe presented to the copyright management center is registered in the center as a valid procedure for authorizing the first user being a secondary copyright owner.
While the above data content edition of original data content can be performed by using an edit program corresponding to the original data content, by handling the original data content as object-oriented software, it is possible to facilitate further editing of data content and manage more preferably copyrights of data content.
Moreover, by adopting agent-oriented software, a user can synthesize data content with little labor.
The agent-oriented software, unlike the conventional one, is a program having autonomy, flexibility and cooperativeness, which is able to meet a user's request with its characteristics of autonomy, flexibility and cooperativeness in accordance with only a general instruction of the user without specifically giving every operation instruction to the software.
By incorporating the agent program into a basic system of a data copyright management system so that the database utilization of a user is monitored, and it is arranged that information including data utilization condition and charging is collected at the database or the copyright management center, using metering function placed in user terminal, and thus, it is possible to know the database utilization condition of the user at the database side or the copyright management center side and achieve more accurate copyright management. These agent program and its data are also necessary to be protected in copyrights, and therefore, are encrypted like original data content.
The data on copyrights can be handled in the computer programming or processing as “object” integrated of program and data content.
Embodiment 2
Embodiment 2 is described referring to FIG. 3. This embodiment uses first secret-key Ks1, second secret-key Ks2, third secret-key Ks3, plaintext original copyright label Lc0 and plaintext copyright management program Pc.
The data copyright management system shown in FIG. 3 comprises database 11, key control center 12, users 13, 13, 13 . . . and the network 14 that connects these entities. Database 11 receives data content from information providers(IP) 15, 15, 15. . . . However, in some cases, data content is supplied directly to users 13 from information providers 16, 16, 16 . . . via communication line 14 without database 11 intervening.
The data content used in the invention is the object comprising combined program and data content. Data is supplied from information providers 15, 15, 15 . . . to database 11 and to primary users 13. However, in some cases, data content is supplied from information providers 16, 16, 16 . . . via communication line 14 or via information record medium 17 such as CD-ROM or the like directly to primary users 13 without database 11 intervening.
The solid line, broken line and one-dot chain line in this FIG. 3 show the path for data content and requests for crypt keys, path of encrypted data content and path of crypt keys, respectively.
Primary users 13 are not merely users but can be information providers 15 or 16 that provide new data content (secondary copyrighted data) by combining or revising a plurality of obtained original data content.
In the data copyrights management system, the original data content provided by each of information providers 15 and 16 has been encrypted to protect the copyright. Therefore, the use of the encrypted original data content obtained by first user 13 needs to be decrypted. All of the crypt keys for the decryption are deposited in key control center 12 to be controlled by the center.
Each information provider 15 or 16 can adopt freely any cryptosystem. However, the cryptosystem described later and used after secondary utilization of data content is limited to one adopted by key control center 12.
In this system, plaintext original data content M0 is encrypted by first secret-key Ks1:
Cm0ks1=E(M0,Ks1),
and is provided to primary users 13 from information provider 15 via data content database 11 and communication line 14, or from information provider 16 via communication line 14, or via information recording medium 17 such as CD-ROM, together with original copyright label Lc0.
Original plaintext copyright label Lc0 is attached to encrypted original data content Cm0ks1 provided for primary users 13, and is used for obtaining primary use permit keys, etc. Namely, encrypted original data content Cm0ks1 includes plaintext original copyright label Lc0 and encrypted original data content Cm0ks1. The name of application programs in use, outlined explanation, fees and charging method are entered into plaintext original copyright label Lc0 in addition to general information including the name of original creator, title name and creation date. The number of a crypt key is also entered if necessary. Digital signature by original creator added to plaintext original copyright label Lc0 prevents false copyright claiming.
Primary users 13 who require use of encrypted original data content Cm0ks1 make a request to key control center 12 via communication line 14 for distributing primary use permit keys K1 indicating original copyright label Lc0.
Key control center 12 that has identified secret-key as first secret-key Ks1 to be distributed, by original copyright label Lc0 indicated, distributes this identified first secret-key Ks1 to primary users 13 via network system 14. Upon receipt of distributed primary use permit key K1, the devices of primary users 13 are turned to the copyright management mode, and the primary copyrighted data content becomes available for use to primary users 13.
On the other hand, key control center 12 charges as well as grasps the use condition of original data content and of the database used by primary users 13.
Primary users 13 decrypt encrypted primary copyrighted data content Cm0ks1 using first secret-key Ks1:
M0=D(Cm0ks1,Ks1),
and use it.
When decrypted original data content M0 is stored in primary users 13 devices, it is encrypted again by first secret-key Ks1
Cm0ks1=E(M0,Ks1)
and re-encrypted original data content Cm0ks1 is stored.
For repeated use of re-encrypted original data content Cm0ks1, repeated decryption and encryption are carried out using first secret-key Ks1.
Primary users 13 who require to edit original copyrighted data content M0 make a request to key control center 12 for distributing second secret-key Ks2 via communication line 14. Key control center 12 that receives the request for distributing second secret-key Ks2 provides primary users 13 via communication line 14. Primary users 13 that have received second secret-key Ks2 edit original data content M0 and obtain halfway edited data content M0′.
When halfway edited data content M0′ is stored in users 13 devices, it is encrypted by second secret-key Ks2:
Cm0′ks2=E(M0′,Ks2).
When the edit is finally completed, primary users 13 prepare third secret-key Ks3 in order to execute the secondary copyright with reference to the data content edition concerning final editorial data content M1, and register third secret-key Ks3 into key control center 12. The key control center 12 also may prepare third secret-key Ks3 and distribute it in response to a request from primary users 13.
When primary users 13 copy editorial data content M1 into external recording medium 18 or transfer it via communication line 14, they encrypt editorial data content using third secret-key Ks3:
Cm1ks3=E(Ks3,M1),
and provide it for secondary users 19.
Secondary users 19 who desire to use provided encrypted editorial data content Cm1ks3 request key control center 12 for distributing third secret-key Ks3 via communication line 14. Key control center 12 that has received the request for distributing third secret-keys Ks3 from secondary users 19 distributes third secret-key Ks3 to secondary users 19 via communication line 14.
Secondary users 19 who have received third secret-keys Ks3 decrypt encrypted editorial data content Cm1ks3 using third secret-key Ks3:
M1=D(Ks3,Cm1ks3)
and use it.
When using encrypted data content Cm1ks3 again, decryption and encryption are carried out using third secret-key Ks3 also in this case.
Embodiment 3
Embodiment 3 in which a user edits one original copyrighted data content and transfers it to a next user, is described as below referring to FIG. 4. This embodiment uses “user label”, “copyright label” and “edit label” in order to protect data content copyrights and execute the copyrights. Information of the label owner is described in the user label; information relating copyrighted data content is described in the copyright label; and contains information of the edit tool and editing process data (editing scenario) are described in the edit label, which may be described edit tool (edit program) instead of edit tool information.
The user label is generated by the data management center according to the information of the user when the user joins the system. The copyright label is generated by the data management center when the author of the data content presents the content to the data management center. The edit label is generated by the data management center, when the user who has edited the data content presents the user label and the editing scenario to the data management center. These are transferred to each label owner and are stored at the data management center.
  • (1) The original author A presents the original copyright label Lc0 and requests the data management center to distribute original secret-key Ks0. The original author may transfer or deposit the original data content to an information provider or to database so that the information provider or the database can play a role of the original author.
It is also possible that the original author A stores the original secret-key Ks0 and encrypts the original data content M0 without depending on the data management center, while the original secret-key Ks0 must be stored at the data management center to utilize the original data content M0 by the user (data content user).
  • (2) When requested to distribute the original secret-key Ks0, the data management center encrypts the original secret-key Ks0 corresponding to the original copyright label Lc0 using public-key Kb0 of the original author A:
    Cks0kb0=E(Ks0,Kb0)
    and sends the encrypted original secret-key Cks0kba together with the original copyright label Lc0 to the original author A.
In this case, the data management center performs one-way hash to the original copyright label Lc0 using algorithm such as MD 5, for example, to 16-byte data content amount, prepares an original copyright label fingerprint F0, and sends it to the original author A. This electronic fingerprint is prepared on each of the original data content and edited data content each time the original data content is edited and edited data content is obtained and is transferred, together with the data content.
  • (3) When the encrypted original secret-key Cks0kb0 is distributed, the original author A decrypts the encrypted original secret-key Cks0kb0 using private-key Kv0 of the original author A:
     Ks0=D(Cks0kb0,Kv0),
    encrypts the original data content M0 using the decrypted original secret-key Ks0:
    Cm0ks0=E(M0,Ks0)
    and transfers the encrypted original data content Cm0ks0, the original copyright label Lc0 and the original copyright label fingerprint F0 to the first user U1.
  • (4) When the encrypted original data content Cm0ks0, the original copyright label Lc0 and the original copyright label fingerprint F0 are transferred, the first user U1 presents the original copyright label Lc0, the original copyright label fingerprint F0 and first user label Lu1 and requests the data management center to distribute the original secret-key Ks0.
  • (5) When requested to distribute the original secret-key ks0, the data management center confirms validity of the presented original copyright label Lc0 using the original copyright label fingerprint F0 and registers the first user label Lu1. At the same time, the original secret-key Ks0 corresponding to the original copyright label Lc0 is encrypted using public-key Kb1 of the first user U1:
    Cks0kb1=E(Ks0,Kb1)
    and the encrypted original secret-key Cks0kb1 is distributed to the first user U1.
  • (6) When the encrypted original secret-key Cks0kb1 is distributed, the first user U1 decrypts the encrypted original secret-key Cks0kb1 using private-key Kv1 of the first user U1:
    Ks0=D(Cks0kb1,Kv1),
    decrypts the encrypted original data content Cm0ks0 using the decrypted original secret-key Ks0:
    M0=D(Cm0ks0,Ks0),
    and edits the decrypted original data content M0 using the edit tool and obtains edited data content Me1.
The edited data content Me1 thus obtained contains copyright of the first user, who edited the data content, and also copyright of the original author who prepared the original data content.
The copyright of the original author relating to the original data content M0 can be protected by the original copyright label Lc0 which has been registered, original copyright label fingerprint F0 and the original secret-key Ks0 corresponding to the original copyright label Lc0 and also by the first user label Lu1 and the first secret-key Ks1 corresponding to the first user label Lu1. However, because no key for encrypting the edited data content Me1 is available, the secondary copyright of the first user relating to the edited data content Me1 is not yet protected.
  • (7) To protect the secondary copyright of the first user relating to the edited data content Me1, label of the first user, who is the author of the edited data content, and its electronic fingerprinting are used in this embodiment.
As already described, the edited data content can be expressed by data content of the utilized original data content, information of the used edit tool and the editing scenario (editing process data content). Accordingly, these informations and editing scenario are entered in the first user label, i.e. the first edit label Le1.
Further, to protect secondary exploitation right as the secondary copyright in subsequent distribution process, the user U1 presents the first edit label Le1 to the data management center so that the secondary exploitation right of the user U1 is registered.
  • (8) When the first edit label Le1 is presented, the data management center confirms validity of the presented original copyright label Lc0 using the original copyright label fingerprint F0 and registers the first edit label Le1. At the same time, the electronic fingerprint F1 of the first edit label Le1 is prepared, and first edit secret-key Kse1 corresponding to the first edit label Le1 is encrypted by public-key Kb1 of the first user U1 at the data management center:
    Ckse1kb1=E(Kse1,Kb1),
    and the encrypted first edit secret-key Ckse1kb1 is distributed to the first user U1 together with the electronic fingerprint Fe1 of the first edit label Le1.
  • (9) When the encrypted first edit secret-key Ckse1kb1 and the electronic fingerprint Fe1 of the first edit label Le1 are distributed, the first user U1 decrypts the encrypted first edit secret-key Ckse1kb1 using private-key Kv1 of the first user U1:
    Kse1=D(Ckse1kb1,Kv1),
    encrypts the first edited data content Me1 using the decrypted first edit secret-key Kse1:
    Cme1kse1=E(Me1,Kse1)
    and transfers the encrypted first edited data content Cme1kse1 to the second user U2 together with the first edit label Le1, and the electronic fingerprint Fe1 of the first edit label Le1.
Then, the same operation is repeated.
Each user may put digital signature which one-way hash value of the user's label is encrypted using user's private-key on the user's label to be presented to the data management center. Then, the data management center decrypts the encrypted one-way hash value using the user's public-key, calculates the one-way hash value of the label and compares the two one-way hash values in order to verify validity of each user's label.
In this embodiment, only the first edit label Le1 and the electronic fingerprint Fe1 of the first edit label Le1 are transferred together with the encrypted first edited data content Cme1kse1 when edited data content transfer, while it is possible to arrange in such manner that the other labels and electronic fingerprints can be simultaneously transferred.
In the editing by utilizing a plurality of data content as shown in FIG. 2, operation is complicated because there are a large numbers of data content and it can be carried out as in the editing process using a single data content. Description is not given here to avoid lengthy explanation.
In the systems described above, the data content is encrypted using secret-key, and the secret-key for its decryption and secret-key for re-encryption used for storage, copying and transfer are distributed by the data management center based on the user label presented by the user.
Embodiment 4
In case of distributed object system represented by license network system, the use of network computer to perform only input/output of data content and data content processing and not provided with data content storage unit is adopted instead of conventional type computer, which possesses data content storage unit of large capacity.
Further, the use of a network computer similar to a terminal unit of large size computer, having only input/output function of data content and not provided with data content processing unit is also considered.
This network computer does not have data content storage unit and cannot store or copy the data content.
Next, description is given on an embodiment, which can also be applied to a network computer not provided with data content storage unit and used in the distributed object system. It is needless to say that this embodiment is also applicable to an ordinary computer provided with data content storage unit.
To protect data content copyright, it is necessary to use some sort of encryption technique to restrict unauthorized utilization of the data content.
In the Embodiment 3 described above, to protect copyright in a system for an ordinary computer having data storage unit, encrypted data content and labels not encrypted as clues to utilize the data content are used.
In contrast, in a system for a network computer, which has only the function of the above-mentioned terminal unit, the data content is not stored, copied or transferred, and there is no need to encrypt the data content.
As already explained, the editing of data content is performed by modifying the original data content using the edit tool, and data content of the edited data content thus obtained can be expressed by the utilized original data content, information of the used edit tool and the editing scenario.
In case edited data content is produced by utilizing the data content in the database existing on the distributed object system, the edited data content can be reproduced by specifying the utilized database, the used original data content, information of the used edit tool and the editing scenario. The same applies to the case where a plurality of data content obtained from a single database or a plurality of databases are utilized.
Description is given below on Embodiment 4 referring to FIG. 5.
In this embodiment, the original copyright owner and the information provider holding the data content are discriminated from the user who does not hold data content, and are arranged on the network side with the data management center and the like.
In the system of this embodiment, public-key and private-key are used. If original data content is transferred to a user, the original data content is encrypted by using a secret-key or a public-key of transferred destination for the purpose of security.
The first user U1 searches the data content and collects necessary data content utilizing the network, broadcasting or recording medium. The collected data content is simply stored temporarily on memory of the user U1. Even when data content storage unit such as a hard disk drive is included in the device of the user U1, the data content is not stored in the data content storage unit.
In order that the data content is not stored, when there is an attempt to store it, inhibition of storage of the data content is performed by destroying the data content on memory, changing data content header on memory, turning the data content to one-way hash value, changing file name to non-storable file name, etc.
While it is possible to inhibit the storage by data content storage inhibition program, which is incorporated in the program of the data content having object structure, higher reliability is accomplished if the storage inhibition is performed by an operating system, which is related to the entire system or to the user's device.
Description is given on a case where a plurality of data content are utilized in the fourth embodiment.
  • (1)(2) The first user U1 presents the first user label Lu1 to the data management center, collects the original data content M0i (i=1, 2, 3, . . . ) from data content library of the information provider IP in the system and obtains a edit tool Pe. In this case, the original data content M0i and the edit tool Pe are encrypted using public-key Kb1 of the first user U1:
    Cm0ikb1=E(M0i,Kb1)
    Cpekb1=E(Pe,Kb1)
    and the encrypted original data content Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed to the first user U1.
In this case, the first user label Lu1 is referred, and utilizing conditions of the original data content M0i and the edit tool Pe are recorded at the data management center and are utilized for charging of a fee.
  • (3) When the encrypted original data content Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed, the first user U1 decrypts the distributed encrypted original data content Cm0ikb1 and the encrypted edit tool Cpekb1 using private-key Kv1 of the first user U1:
    M0i=D(Cm0ikb1,Kv1)
    Pe=D(Cpekb1,Kv1).
    Using the decrypted edit tool Pe, the decrypted original data content M0i is edited, and a first edited data content M1i (i=1, 2, 3, . . . ) is obtained.
  • (4) Obtaining the first edited data content M1i, the first user U1 encrypts a first scenario S1i, which is the editing process data content for the first edited data content M1i, using public-key Kbc of the data management center:
    Cs1ikbc=E(S1i,Kbc)
    and presents the encrypted first scenario Cs1ikbc together with the first user label Lu1 to the data management center, so that secondary copyright of the user U1 is registered.
  • (5) When the encrypted first scenario Cs1ikbc is presented, the data management center decrypts the encrypted first scenario Cs1ikbc using private-key Kvc of the data management center:
    S1i=D(Cs1ikbc,Kvc),
    prepares a first edit label Le1 based on the presented user label of the first user U1 and the decrypted first scenario S1i, stores it in the data management center, encrypts the first edit label Le1 using public-key Kb1 of the first user U1:
    Cle1kb1=E(Lei,Kb1),
    and transfers the encrypted first edit label Cle1kb1 to the first user U1.
  • (6) When the encrypted first edit label Cle1kb1 is transferred, the first user U1 decrypts the encrypted first edit label Cle1kb1 using private-key Kv1 of the first user U1:
    Le1=D(Cle1kb1,Kv1),
    encrypts the decrypted first edit label Le1 using public-key Kb2 of the second user U2:
    Cle1kb2=E(Le1,Kb2)
    and transfers the encrypted first edit label Cle1kb2 to the second user U2, but the first edited data content M1i or the encrypted first edited data content is not transferred to the second user U2.
When the computer of the first user U1 is provided with a data content storage unit, there is possibility that the collected data content or the edited data content may be stored in the storage unit, however, storage inhibition as described above is carried out to exclude storage, copying and transfer.
In this case, it is possible, instead of the encrypted first edit label Cle1kb2, to use electronic fingerprint F1, which is obtained by turning the first edit label to one-way hash value. In so doing, it is possible to perform simplified transfer of the edit label by telephone voice.
  • (7) When the encrypted first edit label Cle1kb2 is transferred, the second user U2 decrypts the transferred encrypted first edit label Cle1kb2 using the private-key Kv2 of the second user U2:
    Le1=D(Cle1kb2,Kv2),
    encrypts the first edit label Le1 using the private-Key Kv2 of the second user U2:
    Cle1kv2=E(Le1,Kv2)
    and presents the encrypted first edit label Cle1kv2 together with the second user label Lu2 to the data management center.
  • (8) When the encrypted first edit label Cle1kv2 and the second user label Lu2 are presented, the data management center decrypts the presented encrypted first edit label Cle1kv2 using public-key Kb2 of the second user U2:
    Le1=D(Cle1kv2,Kb2),
    collects the original data content M0i shown on the decrypted first edit label Le1, edits the original data content M0i using the edit tool Pe based on the first scenario S1i described on the first edit label Le1, and reproduces the first edited data content M1i.
When the first edited data content M1i is reproduced, the data management center encrypts the first edited data content M1i and the edit tool Pe using the public-key Kb2 of the second user U2:
Cm1ikb2=E(M1i,Kb2)
Cpekb2=E(Pe,Kb2)
and transfers the encrypted first edited data content Cm1ikb2 and the encrypted edit tool Cpekb2 to the second user U2.
  • (9) When the encrypted first edited data content Cm1ikb2 and the encrypted edit tool Cpekb2 are distributed, the second user U2 decrypts the distributed encrypted first edited data content Cm1ikb2 and the encrypted edit tool Cpekb2 using private-key Kv2 of the second user U2:
    M1i=D(Cm1ikb2,Kv2)
    Pe=D(Cpekb2,Kv2)
    and edits the decrypted first edited data content M1i using the decrypted edit tool Pe, and the second edited data content M2i (i=1, 2, 3, . . . ) is obtained.
  • (10) When the second edited data content M2i is obtained, the second user U2 encrypts the second scenario S2i, which is editing process data content of the second edited data content M2i, using the public-key Kbc of the data management center:
    Cs2ikbc=E(S2i,Kbc)
    and presents the encrypted second scenario Cs2ikbc together with the second user label Lu2 to the data management center.
  • (11) When the encrypted second scenario Cs2ikbc is presented, the data management center decrypts the encrypted second scenario Cs2ikbc using the private-key Kvc of the data management center:
    S2i=D(Cs2ikbc,Kvc),
    prepares a second edit label Le2 based on the presented user label of the second user and the decrypted second scenario S2i, stores it in the data content management center, encrypts the second edit label Le2 using public-key Kb2 of the second user U2:
    Cle2kb2=E(Le2,Kb2)
    and transfers the encrypted second edit label Cle2kb2 to the second user U2.
  • (12) When the encrypted second edit label Cle2kb2 is transferred, the second user U2 decrypts the encrypted second edit label Cle2kb2 using private-key Kv2 of the second user U2:
    Le2=D(Cle2kb2,Kv2),
    encrypts the decrypted second edit label Le2 using public-key Kb3 of the third user U3:
    Cle2kb3=E(Le2,Kb3)
    and transfers the encrypted second edit label Cle2kb3 to the third user U3.
Then, the same operation is repeated.
In the Embodiment 4 using this distributed object system, the data content is not stored by the user, but it is stored only in the database. On the other hand, the user controls and stores only the information relating to user and editing, i.e. the edit label having information of the utilized original data content and the used edit tool, the editing scenario and the information of the user who has edited. Only this edit label is encrypted and transferred between the users. Therefore, the data content is not stored, copied or transferred.
It is also possible to simultaneously provide two systems so that the two systems can be adequately selected and utilized, i.e. a system where the keys for re-encryption is distributed at the same time as the keys for decryption, and a system where keys for re-encryption are separately distributed from those for decryption.
Embodiment 5
Description is given on an embodiment of a data content dealing system for dealing in an original data content and an edited data content obtained by editing the original data content by the user, referring to FIG. 6.
The original data content handled in this system is an object, and the edited data content is expressed as the original data content object linked by an editing scenario. Therefore, only the editing scenario is dealt in. Upon receipt of the editing scenario, the user collects and links the original data content used in accordance with the editing scenario and reproduces the edited data content. In this case, the original data content may be collected or linked by the user himself, but the burden on the user may be reduced if it is performed in the system side or by using an agent program.
A data content dealing center, which serves as a core of the system, comprises a data content database, an editing scenario database, a key management center, and a data content dealing management center present on a network.
The data content database stores the original data content provided by an information provider (IP) and supplies it in response to the request of the user.
The editing scenario database stores the editing scenario when the user obtained the edited data content by utilizing the original data content or user data content created by the user and supplies it in response to the request of the user.
The key management center stores a secret key for encryption/decryption for the original data content, the user data content and the editing scenario and supplies it in response to the request of the user.
A data content dealing management center prepares a catalog and advertises for the original data content or the edited data content and performs sales management and collecting a fee to the user, and also manages a copyright label of the data content to be stored in the data content database.
An editing scenario dealing management center prepares a catalog and advertises for the edited data content and performs sales management and collecting a fee to the user, and further, when necessary, collects and links the original data content according to the editing scenario and manages a label for the editing scenario to be stored in the editing scenario database
For the detailed operation of each component, which comprises these data content dealing centers, description is not given here because it is the same as already explained.
  • (1) The information provider IPi (i=1, 2, 3, . . . ; the same applies hereinafter) encrypts the original data content M0i using an original secret-key K0i:
    Cm0iks0i=E(M0i,Ks0i),
    encrypts the corresponding original secret-key Ks0i using a public key Kbc of the data content dealing center:
    Cks0ikbc=E(Ks0i,Kbc)
    and supplies the encrypted original data content Cm0iks0i (shown as “m0i” in the figure) and the encrypted original secret-key Cks0ikbc (shown as “ks0i” in the figure) to the data content dealing center.
The original secret-key Ks0i may be prepared by the information provider IPi, or the information provider IPi may ask the key management center to generate it. In case the key management center generates the original secret-key Ks0i, the generated original secret-key Ks0i is encrypted using a public key Kb0i of the information provider IPi:
Cks0ikb0i=E(Ks0i,Kb0i).
The encrypted original secret-key Cks0ikb0i is distributed to the information provider IPi, who decrypts it using a private-key Kv0i:
Ks0i=D(Cks0ikb0i,Kv0i)
and the decrypted original secret-key Ks0i is used for encryption of the original data content M0i.
The data content dealing center decrypts the supplied encrypted original secret-key Cks0ikbc using a private-key Kvc of the data content dealing center:
Ks0i=D(Cks0ikbc,Kvc),
decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
M0i=D(Cm0iks0i,Ks0i)
and stores the decrypted original data content M0i and the corresponding original secret-key Ks0i in the data content database.
The information provider or the data content dealing center may add watermark to the original data content M0i to check illegitimate use and may store it.
To promote utilization of the original data content, the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the original data content cannot be utilized as it is and posts it in the data content dealing center.
  • (2) After reviewing the original data content prepared in catalog, a first user U1i presents a first user label Lu1i and a public key Kb1i of the first user U1i, and by specifying the original data content to be utilized, requests for use to the data content dealing center.
  • (3) Upon receipt of the request for use of the original data content M0i, the data content dealing center confirms the user label Lu1i to check for fee charging and identification, and then, encrypts the original data content M0i using the corresponding original secret-key Ks0i:
    Cm0iks0i=E(M0i,Ks0i),
    encrypts the original secret-key Ks0i using a public-key Kb1i of the first user U1i:
    Cks0ikb1i=E(Ks0i,Kb1i)
    and distributes the encrypte original data content Cm0iks0i and the encrypted original secret-key Cks0ikb1i to the first user U1i, and also charges for the original data content utilization to the first user U1i.
  • (4) When the encrypted original data content Cm0iks0i and the encrypted original secret-key Cks0ikb1i have been distributed, the first user U1i decrypts the encrypted original secret-key Cks0ikb1i using a private-key Kv1i of the first user U1i:
    Ks0i=D(Cks0ikb1i,Kv1i),
    decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
    M0i=D(Cm0iks0i,Ks0i)
    and creates a new first edited data content M1i using the decrypted original data content M0i.
As described above, there are two cases to edit the data content: the case where a single original data content is used and the case where a plurality of original data contents are used. In these cases, the user's data content may be added. Therefore, as the data content to be used for edit in this embodiment, there are, in addition to a single data content, a plurality of original data contents, and user's data content. The edited data content comprises these data content and editing scenario, i.e. the details of editing. By obtaining these, it is possible to reproduce the edited data content.
Incidentally, the original data content is originally stored in the data content database of the data content dealing center. Accordingly, data which is not yet stored in the data content dealing center when newly generated by editing of the data content, is the user's data content and the editing scenario.
Therefore, by storing these in the data content dealing center, it is possible to handle the first user data content of the user who edited the data content in the same manner as the original data content, and the user can be also an information provider.
  • (5) The first edited data content M1i comprises the original data content M0i and a first editing scenario S1i. Further, in some cases, the first user data content Mu1i is added as a comprising element.
Among these elements, the original data content M0i is stored in the data content database of the data content dealing center. Accordingly, what is to be stored newly in the data content dealing center for executing secondary copyright of the first user includes the first editing scenario S1i and the first user data content Mu1i.
For this purpose, the first user U1i prepares a first secret-key Ks1i, encrypts the first editing scenario S1i and the first user data content Mu1i using the first secret-key Ks1i:
Cs1iks1i=W(S1i,Ks1i)
Cmu1iks1i=E(Mu1i,Ks1i),
encrypts the first secret-key Ks1i using a public-key Kbc of the data content dealing center:
Cks1ikbc=E(Ks1i,Kbc)
and transfers the encrypted first editing scenario Cs1iks1i (shown as “s1i” in the figure), the encrypted first user data content Cmu1iks1i (shown as “m1i” in the figure), and the encrypted first secret-key Cks1ikbc (shown as “ks1i” in the figure) to the data content dealing center.
The first secret-key Ks1i may be prepared by the first user U1i, or the first user U1i may ask the key management center to generate it. In case the key management center generates the first secret-key Ks1i, the first secret-key Ks1i is encrypted using the public-key Kb1i of the first user U1i:
Cks1ikb1i=E(Ks1i,Kb1i)
and the encrypted first secret-key Ck1ikb1i is distributed to the first user U1i. The first user U1i decrypts it using the private-key Kv1i:
Ks1i=D(Cks1ikb1i,Kv1i)
and the decrypted first secret-key K1i is used to encrypt the first editing scenario S1i and the first user data content Mu1i.
The data content dealing center decrypts the transferred encrypted first secret-key Cks1ikbc using a private-key Kvc of the data content dealing center:
Ks1i=D(Cks1ikbc,Kvc)
decrypts the encrypted first editing scenario Cs1iks1i and the encrypted first user data content Cmu1iks1i using the decrypted first secret-key Ks1i:
S1i=D(Cs1iks1i,Ks1i)
Mu1i=D(Cmu1iks1i,Ks1i)
and generates a first user data content label and a first editing scenario label according to the first user label, and the decrypted first secret-key Ks1i, the first editing scenario S1i, the first user data content Mu1i, the first user data content label and the first editing scenario label are stored in the database.
The first user or the data content dealing center may add watermark to the original data content M0i to check illegitimate use and may store it.
The database where the first secret-key Ks1i, the first editing scenario S1i and the first user data content Mu1i are to be stored may be the data content database where the original data content M0i is stored, or another scenario database may be provided to store them.
To promote utilization of the first edited data content, the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the first edited data content cannot be utilized as it is and posts it in the data content dealing center.
  • (6) After reviewing the original data content M0i and the first edited data content M1i prepared in catalog, a second user U2i presents a second user label Lu2i and a public-key Kb2i of the second user U2i. By specifying the original data content M0i and/or the first edited data content M1i to be utilized, a request for use is sent to the data content dealing center.
  • (7) Upon receipt of the request for use of the original data content M0i and/or the first edited data content M1i, the data content dealing center confirms the user label Lu2i to check for fee charging and identification. Then, the original data content M0i requested for use, is encrypted using the corresponding original secret-key Ks0i. The first editing scenario S1i and the first user data content Mu1i are encrypted using the first secret-key Ks1i, the original secret-key Ks0i is encrypted using a public-key Kb2i, and the first secret-key Ks1i is encrypted using the public-key Kb2i:
    Cm0iks0i=E(M0i,Ks0i)
    Cs1iks1i=E(S1i,Ks1i)
    Cmu1iks1i=E(Mu1i,Ks1i)
    Cks0ikb2i=E(Ks0i,Kb2i)
    Cks1ikb2i=E(Ks1i,Kb2i).
    Then, the encrypted original data content Cm0iks0i (shown as “m0i” in the figure), the encrypted first editing scenario Cs1iks1i (shown as “s1i” in the figure), the encrypted first user data content Cmu1iks1i (shown as “mu1i” in the figure), the encrypted original secret-key Cks0ikb2i and the encrypted first secret-key Cks1ikb2i are transferred to the second user U2i. And then, the data content dealing center charges for utilization of the original data content M0i and the first editing scenario S1i to the second user U2i.
  • (8) When the encrypted original data content Cm0iks0i, the encrypted first editing scenario Cs1iks1i, the encrypted first user data content Cmu1iks1i, the encrypted original secret-key Cks01kb2i and the encrypted first secret-key Cks1ikb2i have been transferred, the second user U2i decrypts the encrypted original secret-key Cks0ikb2i and the encrypted first secret-key Cks1ikb2i using a private-key Kv2i of the second user U2i:
    Ks0i=D(Cks0ikb2i,Kv2i)
    Ks1i=D(Cks1ikb2i,Kv1i).
    Next, the encrypted original data content Cm0iks0i is decrypted using the decrypted original secret-key Ks0i, and the encrypted first editing scenario Cs1iks1i and the encrypted first user data content Cmu1iks1i are decrypted using the decrypted first secret-key Ks1i:
    M0i=D(Cm0iks0i,Ks0i)
    S1i=D(Cs1iks1i,Ks1i)
    Mu1i=D(Cmu1iks1i,Ks1i)
    and a new second edited data content M2i is created by utilizing the decrypted original data content M0i, the first editing scenario S1i and the first user data content Mu1i.
The second user U2i prepares a second secret-key Ks2i and encrypts a new second editing scenario S2i and a second user data content Mu2i, not stored in the database of the data content dealing center, using the second secret-key Ks2i:
Cs2iks2i=E(S2i,Ks2i)
Cmu2iks2i=E(Mu2i,Ks2i).
Then, the second secret-key Ks2i is encrypted using the public-key Kbc of the data content dealing center:
Cks2ikbc=E(Ks2i,Kbc)
and the encrypted second editing scenario Cs2iks2i (shown as “s2i” in the figure), the encrypted second user data content Cmu2iks2i (shown as “mu2i” in the figure), and the encrypted second secret-key Cks2ikbc (shown as “ks2i” in the figure) are transferred to the data content dealing center
Then, the same procedure is repeated.
Embodiment 6
Description is given on this embodiment in which a data content editor sells a utilization right of an editing scenario by auction in the data content market, referring to FIG. 7. In the embodiment, the utilization right of an editing scenario is auctioned on the market in the system, and an editing scenario seller who obtains the utilization right of the editing scenario sells or lends the editing scenario to a user.
The original data content handled in the present system is an object, and the edited data content is expressed as the original data content object linked by the editing scenario. Therefore, only the editing scenario is dealt in. When the editing scenario has been purchased or lent, the user collects and links the original data content used in accordance with the editing scenario and reproduces the edited data content. In this case, the original data content may be collected by the user himself, but the burden on the user may be reduced if it is performed in the system side or by using an agent program.
A data content dealing center, which serves as a core of the system, comprises a key management center, a data content database, a data content dealing management center, an editing scenario database, and an editing scenario market management center present on the network.
The data content database stores the original data content provided by an information provider (IP) and supplies it to a data content editor.
The editing scenario database stores the editing scenario when the data content editor obtains the edited data content by utilizing the original data content or the editor's data content created by the data content editor and supplies it to the editing scenario sellers, who participate in auction.
The key management center stores a secret-key for encryption/decryption for the original data content, the editor's data content and the editing scenario and supplies it to the data content editor or the editing scenario seller.
The data content dealing management center prepares a catalog and advertises for the original data content and manages sales for the data content editor.
The editing scenario market management center prepares a catalog and advertises for the edited data content, and manages editing scenario auction and collects a fee. Further, the editing scenario market management center collects and links the original data content according to the editing scenario, when necessary, and also manages a lbel for the editing scenario which is to be stored in the editing scenario database.
For the detailed operation of each component, which comprises the data content dealing center, description is not given here because it is the same as already explained.
  • (1) The information provider IPi (i=1, 2, 3, . . . ; the same applies hereinafter) encrypts the original data content M0i using an original secret-key K0i:
    Cm0iks0i=E(M0i,Ks0i),
    encrypts the corresponding original secret-key Ks0i using a public-key Kbc of the data content dealing center:
    Cks0ikbc=E(Ks0i,Kbc)
    and supplies the encrypted original data content Cm0iks0i (shown as “m0i” in the figure) and the encrypted original secret-key Cks0ikbc (shown as “ks0i” in the figure) to the data content dealing center.
The original secret-key Ks0i may be prepared by the information provider IPi, or the information provider IPi may ask the key management center to generate it. In case the key management center generates the original secret-key Ks0i, the generated original secret-key Ks0i is encrypted using a public-key Kb0i of the information provider IPi:
Cks0ikb0i=E(Ks0i,Kb0i).
The encrypted original secret-key Cks0ikb0i is distributed to the information provider IPi, and is decrypted using a private-key Kv0i of the IP:
Ks0i=D(Cks0ikb0i,Kv0i)
and the decrypted original secret-key Ks0i is used for encryption of the original data content M0i.
The data content dealing center decrypts the supplied encrypted original secret-key Cks0ikbc using a private-key Kvc of the data content dealing center:
Ks0i=D(Cks0ikbc,Kvc),
decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
M0i=D(Cm0iks0i,Ks0i)
and stores the decrypted original data content M0i and the corresponding original secret-key Ks0i to the data content database.
The information provider or the data content dealing center may add watermark to the original data content M0i to check illegitimate use and may store it.
To promote utilization for editing of the original data content, the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the original data content cannot be utilized as it is and posts it in the data content dealing center.
  • (2) After reviewing the original data content, the data content editor Ei presents a data content editor label Lei and a public-key Kb1i of the data content editor Ei, and requests for utilization by specifying the original data content to be utilized, to the data content dealing center.
  • (3) Upon receipt of the request for utilization of the original data content M0i, the data content dealing center confirms the user label Lei to check for fee charging and identification. Then, the original data content M0i is encrypted using the corresponding original secret-key Ks0i:
    Cm0iks0i=E(M0i,Ks0i),
    encrypts the original secret-key Ks0i using a public-key Kbei of the data content editor Ei:
    Cks0ikbei=E(Ks0i,Kbei)
    and distributes the encrypted original data content Cm0iks0i and the encrypted original secret-key Cks0ikbei to the data content editor Ei, and further, charges a fee for the original data content utilization to the data content editor Ei and an end user.
  • (4) When the encrypted original data content Cm0iks0i and the encrypted original secret-key Cks0ikbei have been distributed, the data content editor Ei decrypts the encrypted original secret-key Cks0ikbei using a private-key Kvei of the data content editor Ei:
    Ks0i=E(Cks0ikbei,Kvei),
    decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
    M0i=D(Cm0iks0i,Ks0i)
    and creates an edited data content Mei utilizing the decrypted original data content M0i.
As described above, there are two cases to edit the data content: the case where a single original data content is used and the case where a plurality of original data contents are used. In these cases, the data content of the data content editor may be added. Therefore, as the data content to be used for editing in this embodiment, there are, in addition to a single data content, a plurality of original data contents and the data content of the data content editor. The edited data content comprises the data content and the editing scenario, i.e. the detail of editing. By obtaining these, it is possible to reproduce the edited data content.
Incidentally, the original data content is originally stored in the data content database of the data content dealing center. Accordingly, data which is not yet stored in the data content dealing center when newly generated by editing the data content, is the editor's data content of the data content editor and the editing scenario.
Therefore, by storing these in the data content dealing center, it is possible to handle the editor's data content of the data content editor who has edited the data content in the same manner as the original data content, and the data content editor can be an information provider. Further, it is also possible to sell utilization right of the editing scenario and/or the editor's data content by auction in the market. In this case, the utilization right of the editing scenario and the editor's data content may be plural for a single edited data content.
  • (5) The edited data content Mei comprises the original data content M0i and the editing scenario Sei. Further, in some cases, the editor's data content is added as a comprising element.
Among these elements, the original data content M0i is stored in the data content database of the data content dealing center. Accordingly, what is to be stored newly in the data content dealing center is the editing scenario S1i and the editor's data content Medi.
To sell the utilization right of the editing scenario S1i and the editor's data content Medi, the data content editor Ei prepares a secret-key Ksei, encrypts the editing scenario Sei and the editor's data content Medi using the secret-key Ksei:
Cseiksei=E(Sei,Ksei)
Smediksei=E(Medi,Ksei)
and encrypts the secret-key Ksei using the public-key Kbc of the data content dealing center:
Ckseikbc=E(Ksei,Kbc).
Then, the encrypted editing scenario Cseiksei (shown as “sei” in the figure), the encrypted editor's data content Cmeiksei (shown as “mei” in the figure), and the encrypted secret-key Ckseikbc (shown as “ksei” in the figure) are transferred to the data content dealing center.
The secret-key Ksei may be prepared by the data content editor Ei, or the data content editor Ei may ask the key management center to generate it. In case the key management center generates the secret-key Ksei, the generated secret-key Ksei is encrypted using the public-key Kbei of the data content editor Ei:
Ckseikbei=E(Ksei,Kbei)
and the encrypted secret-key Ckseikbei is distributed to the data content editor Ei. The data content editor Ei decrypts it using own private-key Kvei:
Ksei=D(Ckseikbei,Kvei)
and the decrypted secret-key Ksei is used to encrypt the editing scenario Sei and the data content editor's data content Medi.
The data content dealing center decrypts the transferred encrypted secret-key Ckseikbc using the private-key Kvc of the data content dealing center:
Ksei=D(Ckseikbc,Kvc).
Then, the encrypted editing scenario Cseiksei and the encrypted editor's data content Cmediksei are decrypted using the decrypted secret-key Ksei:
Sei=D(Cseiksei,Ksei)
Medi=D(Cmediksei,Ksei).
Then, a copyright label based on the data content editor label Lei is added to each of the decrypted secret-key Ksei, the editing scenario Sei and the editor's data content Medi, and these are stored in the database.
The data content editor or the data content dealing center may add watermark to the editing scenario Sei and the editor's data content Medi to check illegitimate use and may store them.
The database where the secret-key Ksei, the editing scenario Sei and the editor's data content Medi are to be stored may be the data content database where the original data content M0i is stored, or another scenario database may be provided to store them.
For auction of the editing scenario and the editor's data content, the editing scenario market management center in the data content dealing center prepares a catalog by means to compress or to divide into parts so that the edited data content cannot be utilized as it is and posts it shown number of the selling utilization rights in the editing scenario market management center to announce the auction.
  • (6) After reviewing the edited data content Mei prepared in catalog, each of a plurality of editing scenario sellers Di presents an editing scenario seller label Ldi and a public-key Kbdi of the editing scenario seller Di and requests to purchase the editing scenario Sei and the editor's data content Medi to the editing scenario market management center.
  • (7) Upon receipt of the request to purchase the editing scenario Sei and the editor's data content Medi, the editing scenario market management center confirms the editing scenario seller label Ldi to check for fee charging and identification, performs the auction in the market, and sells the utilization right of the editing scenario Sei and the editor's data content Medi to a plurality of editing scenario sellers Di.
As described above, the utilization right of the editing scenario and the editor's data content may be plural for a single edited data content.
The editing scenario seller Di, to whom it has been decided to sell, encrypts the secret-key Ksdi of the editing scenario seller Di using the public-key Kbc of the data content dealing center:
Cksdikbc=E(Ksdi,Kbc)
and transfers the encrypted secret-key Cksdikbc (shown as ksdi in the figure) to the editing scenario market management center.
  • (8) The editing scenario market management center decrypts the presented encrypted secret-key Cksdikbc using the private-key Kvc of the data content dealing center:
    Ksdi=D(Cksdikbc,Kvc)
    encrypts the editing scenario Sei and the editor's data content Medi using the decrypted secret-key Ksdi of the editing scenario seller Di:
    Cseiksdi=E(Sei,Ksdi)
    Cmediksdi=E(Medi,Ksdi)
    and sends the encrypted editing scenario Cseiksdi and encrypted editor's data content Cmediksdi to the editing scenario seller Di.
Also, the content of the copyright label is changed from the one based on the data content editor label Lei to the one based on the editing scenario seller label Ldi. As a result, the secret-key Ksei of the data content editor cannot be used any more, and the secret-key Ksdi of the editing scenario seller can be used substantially. In this case, instead of changing the content of the copyright label, it may be newly added based on the editing scenario seller label Ldi.
The editing scenario seller who purchases the encrypted editing scenario Cseiksdi executes thereafter the utilization right of the purchased editing scenario. The original data content can also be sold by auction in the same manner as the editing scenario. However, it is preferable to avoid to sell to a specific seller because there may be a plurality of users utilizing the original data content.
Then, the same procedure may be repeated if necessary.
In the data content dealing system described in each embodiment of the present application, in case that for a user device, a network computer without a storing unit such as a hard disk drive is used, the illegitimate use, i.e., using without pay or leakage of the data content hardly occurs. However, in case that for a user device, a general computer having a storing unit such as a hard disk drive is used, there is a possibility of problems such like these illegitimate use.
To cope with such problems, adopting a copyright management program and re-encryption of the data content is effective as the present inventor has proposed in the U.S. patent application Ser. No. 08/416,037 (EP 677949A2), and if adopting an arrangement referred to as a real-time OS or an embedded system which allows the copyright management program performing re-encryption to precede other application programs, the illegitimate use problems can be effectively avoided.
It is understood that particular embodiments described herein are illustrative and the present invention is not limited to these particular embodiments. It will be apparent to those skilled in the art that changes can be made in the various details described herein without departing from the scope of the invention. The present invention is defined by the claims and their full scope of equivalents.

Claims (4)

1. A method for dealing in data content using a data content dealing system, in which an original data content and an edited data content which a first user has edited are sold in a network to a second user, whereby:
said original data content comprises a data object;
said edited data content comprises said data object and an editing scenario describing editing details of said data object;
said data content dealing system comprises a data content dealing center and a database;
said data content dealing center comprises a key management center, a data content dealing management center and an editing scenario dealing management center;
said method comprising the steps of:
said key management center generating a secret-key, storing said secret-key and transferring of said secret-key;
said data content dealing management center advertising and selling said data content stored in said database;
said editing scenario dealing management center advertising and selling said editing scenario;
said first user creating said edited data content by utilizing said original data content stored in said database, encrypting an editing scenario of said edited data content by a secret-key which is to be deposited in said database, and depositing said secret-key to said key management center;
transferring said encrypted editing scenario and said secret-key to the second user who wishes to utilize said edited data content;
said second user decrypting said encrypted editing scenario by said secret-key and re-constituting said edited data content according to said decrypted editing scenario.
2. The method of claim 1, wherein said database comprises a data content database storing a data content and an editing scenario database storing an editing scenario.
3. The method of claim 1, wherein said step of transferring said encrypted editing scenario and said secret key to said second user comprises transferring said original data content to said second user together with said encrypted editing scenario and said secret-key.
4. A method of dealing in data content using a data content dealing system, in which a utilization right of an editing scenario of an edited data content which comprises an original data content edited by a data content editor is auctioned in a network to an editing scenario seller, whereby:
said original data content comprises a data object;
said edited data content comprises said data object and the editing scenario describing editing details of said data object;
said data content dealing system comprises a data content dealing center and a database;
said data content dealing center comprises a key management center, a data content dealing management center and an editing scenario market management center; said method comprising the steps of:
said key management center generating a secret-key, storing said secret-key and transferring said secret-key;
said data content dealing management center advertising and selling said original data content stored in said database;
said editing scenario market management center advertising and auctioning said editing scenario;
said data content editor producing the edited data content by utilizing said original data content stored in said database, encrypting the editing scenario of said edited data content by a secret-key of said data content editor, depositing said encrypted editing scenario of said edited data contend content to said database and depositing said secret-key with said key management center;
auctioning said utilization right of said editing scenario to said editing scenario seller who wishes to sell said utilization right of said editing scenario;
said editing scenario seller transferring a secret-key for said editing scenario to said key management center;
said editing scenario market management center changing said secret-key for said editing scenario from the secret-key of said data content editor to the secret-key of said editing scenario seller.
US10/170,677 1994-10-27 2002-06-13 Data management system Expired - Lifetime USRE41657E1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/170,677 USRE41657E1 (en) 1994-10-27 2002-06-13 Data management system
US11/701,943 USRE43599E1 (en) 1994-10-27 2007-02-01 Data management system

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP6-264201 1994-10-27
JP26420194 1994-10-27
US08/549,271 US5646999A (en) 1994-10-27 1995-10-27 Data coypright management method
US08/733,504 US5974141A (en) 1995-03-31 1996-10-18 Data management system
US08/846,661 US6076077A (en) 1995-10-27 1997-04-29 Data management system
US10/170,677 USRE41657E1 (en) 1994-10-27 2002-06-13 Data management system

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US08/549,271 Continuation-In-Part US5646999A (en) 1994-10-27 1995-10-27 Data coypright management method
US08/846,661 Reissue US6076077A (en) 1994-10-27 1997-04-29 Data management system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US08/846,661 Division US6076077A (en) 1994-10-27 1997-04-29 Data management system

Publications (1)

Publication Number Publication Date
USRE41657E1 true USRE41657E1 (en) 2010-09-07

Family

ID=17399897

Family Applications (7)

Application Number Title Priority Date Filing Date
US08/549,271 Expired - Lifetime US5646999A (en) 1994-10-27 1995-10-27 Data coypright management method
US08/888,074 Expired - Lifetime US6097818A (en) 1994-10-27 1997-07-03 Data copyright management method
US09/546,177 Expired - Lifetime US6272635B1 (en) 1994-10-27 2000-04-10 Data copyright management system
US09/873,453 Expired - Lifetime US6463536B2 (en) 1994-10-27 2001-06-05 Data copyright management system
US10/152,584 Expired - Lifetime US6721887B2 (en) 1994-10-27 2002-05-23 Data copyright management system
US10/170,677 Expired - Lifetime USRE41657E1 (en) 1994-10-27 2002-06-13 Data management system
US11/701,943 Expired - Lifetime USRE43599E1 (en) 1994-10-27 2007-02-01 Data management system

Family Applications Before (5)

Application Number Title Priority Date Filing Date
US08/549,271 Expired - Lifetime US5646999A (en) 1994-10-27 1995-10-27 Data coypright management method
US08/888,074 Expired - Lifetime US6097818A (en) 1994-10-27 1997-07-03 Data copyright management method
US09/546,177 Expired - Lifetime US6272635B1 (en) 1994-10-27 2000-04-10 Data copyright management system
US09/873,453 Expired - Lifetime US6463536B2 (en) 1994-10-27 2001-06-05 Data copyright management system
US10/152,584 Expired - Lifetime US6721887B2 (en) 1994-10-27 2002-05-23 Data copyright management system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/701,943 Expired - Lifetime USRE43599E1 (en) 1994-10-27 2007-02-01 Data management system

Country Status (4)

Country Link
US (7) US5646999A (en)
EP (3) EP1691316A1 (en)
JP (2) JPH08272745A (en)
DE (1) DE69535013T2 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070033143A1 (en) * 1995-10-27 2007-02-08 Intarsia Software Llc Digital content management system and apparatus
US20070083473A1 (en) * 2005-10-11 2007-04-12 Farrugia Augustin J Use of media storage structure with multiple pieces of content in a content-distribution system
US7970722B1 (en) 1999-11-08 2011-06-28 Aloft Media, Llc System, method and computer program product for a collaborative decision platform
US20120185759A1 (en) * 2011-01-13 2012-07-19 Helen Balinsky System and method for collaboratively editing a composite document
US8347098B2 (en) 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US8448254B2 (en) 1994-10-27 2013-05-21 Intarsia Software Llc Digital content management system and apparatus
US8554684B2 (en) 1994-04-01 2013-10-08 Intarsia Software Llc Controlling database copyrights
US20140208120A1 (en) * 1997-02-28 2014-07-24 Contentguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermarking
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US10417392B2 (en) 2006-05-03 2019-09-17 Apple Inc. Device-independent management of cryptographic information

Families Citing this family (181)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313251B2 (en) * 1993-11-18 2007-12-25 Digimarc Corporation Method and system for managing and controlling electronic media
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US6574350B1 (en) 1995-05-08 2003-06-03 Digimarc Corporation Digital watermarking employing both frail and robust watermarks
US6681028B2 (en) 1995-07-27 2004-01-20 Digimarc Corporation Paper-based control of computer systems
US6681029B1 (en) 1993-11-18 2004-01-20 Digimarc Corporation Decoding steganographic messages embedded in media signals
US5841978A (en) 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US6522770B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US5974141A (en) * 1995-03-31 1999-10-26 Mitsubishi Corporation Data management system
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US7036019B1 (en) * 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
US7302415B1 (en) 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
EP0704785B1 (en) * 1994-09-30 2003-11-19 Mitsubishi Corporation Data copyright management system
US6002772A (en) * 1995-09-29 1999-12-14 Mitsubishi Corporation Data management system
US6449717B1 (en) 1994-09-30 2002-09-10 Mitsubishi Corporation Data copyright management system
US6741991B2 (en) 1994-09-30 2004-05-25 Mitsubishi Corporation Data management system
US8094949B1 (en) 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
DE69532434T2 (en) 1994-10-27 2004-11-11 Mitsubishi Corp. Device for file copyright management system
EP1691316A1 (en) 1994-10-27 2006-08-16 Intarsia Software LLC Data copyright management system
US6789197B1 (en) 1994-10-27 2004-09-07 Mitsubishi Corporation Apparatus for data copyright management system
JPH08263438A (en) * 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US6721440B2 (en) 1995-05-08 2004-04-13 Digimarc Corporation Low visibility watermarks using an out-of-phase color
US6760463B2 (en) 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US6590996B1 (en) 2000-02-14 2003-07-08 Digimarc Corporation Color adaptive watermarking
US6738495B2 (en) * 1995-05-08 2004-05-18 Digimarc Corporation Watermarking enhanced to withstand anticipated corruptions
US6728390B2 (en) 1995-05-08 2004-04-27 Digimarc Corporation Methods and systems using multiple watermarks
JPH08329011A (en) * 1995-06-02 1996-12-13 Mitsubishi Corp Data copyright management system
US6788800B1 (en) 2000-07-25 2004-09-07 Digimarc Corporation Authenticating objects using embedded data
US6577746B1 (en) 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
US6411725B1 (en) 1995-07-27 2002-06-25 Digimarc Corporation Watermark enabled video objects
US7562392B1 (en) 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US7051086B2 (en) 1995-07-27 2006-05-23 Digimarc Corporation Method of linking on-line data to printed documents
US6408331B1 (en) 1995-07-27 2002-06-18 Digimarc Corporation Computer linking methods using encoded graphics
US6829368B2 (en) 2000-01-26 2004-12-07 Digimarc Corporation Establishing and interacting with on-line media collections using identifiers in media signals
US7171018B2 (en) 1995-07-27 2007-01-30 Digimarc Corporation Portable devices and methods employing digital watermarking
US8595502B2 (en) 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US7047241B1 (en) 1995-10-13 2006-05-16 Digimarc Corporation System and methods for managing digital creative works
US5943423A (en) * 1995-12-15 1999-08-24 Entegrity Solutions Corporation Smart token system for secure electronic transactions and identification
CN104376032A (en) * 1996-05-15 2015-02-25 英特托拉斯技术公司 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US6978370B1 (en) 1996-09-03 2005-12-20 Cryptography Research, Inc. Method and system for copy-prevention of digital copyright works
US6108637A (en) 1996-09-03 2000-08-22 Nielsen Media Research, Inc. Content display monitor
US5835595A (en) * 1996-09-04 1998-11-10 At&T Corp Method and apparatus for crytographically protecting data
US6006332A (en) * 1996-10-21 1999-12-21 Case Western Reserve University Rights management system for digital media
WO1998026537A1 (en) * 1996-12-12 1998-06-18 Ascom Systec Ag Method for electronically protected storage of data in a data bank
JP3625983B2 (en) * 1997-03-12 2005-03-02 三菱商事株式会社 Data management system
EP0901282B1 (en) 1997-09-03 2006-06-28 Hitachi, Ltd. Method for recording and reproducing electronic watermark information
JP3638770B2 (en) * 1997-12-05 2005-04-13 東京エレクトロンデバイス株式会社 Storage device with test function
US6804376B2 (en) 1998-01-20 2004-10-12 Digimarc Corporation Equipment employing watermark-based authentication function
US7689532B1 (en) 2000-07-20 2010-03-30 Digimarc Corporation Using embedded data with file sharing
US7602940B2 (en) 1998-04-16 2009-10-13 Digimarc Corporation Steganographic data hiding using a device clock
US7756892B2 (en) * 2000-05-02 2010-07-13 Digimarc Corporation Using embedded data with file sharing
US8584255B2 (en) * 1999-05-05 2013-11-12 Sony United Kingdom Limited Networked conditional access module
JPH11328033A (en) * 1998-05-20 1999-11-30 Fujitsu Ltd License transfer device
JP3565715B2 (en) * 1998-07-02 2004-09-15 松下電器産業株式会社 Broadcast system and broadcast transceiver
JP3216607B2 (en) * 1998-07-29 2001-10-09 日本電気株式会社 Digital work distribution system and method, digital work reproduction apparatus and method, and recording medium
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US8332478B2 (en) 1998-10-01 2012-12-11 Digimarc Corporation Context sensitive connected content
JP4763866B2 (en) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー Method and apparatus for protecting digital data by double re-encryption
US6427021B1 (en) 1998-12-02 2002-07-30 Pitney Bowes Inc. Recording graphical and tracking information on the face of a mailpiece
US6408287B1 (en) 1998-12-02 2002-06-18 Pitney Bowes Inc. Recording graphical information on the face of a mail piece and placing information about the graphical information in an information-based indicia
CN100405247C (en) * 1999-03-03 2008-07-23 索尼公司 Data processing device, data processing method, terminal, transmission method for data processing device
US6868497B1 (en) 1999-03-10 2005-03-15 Digimarc Corporation Method and apparatus for automatic ID management
US7073063B2 (en) 1999-03-27 2006-07-04 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like
US6829708B1 (en) 1999-03-27 2004-12-07 Microsoft Corporation Specifying security for an element by assigning a scaled value representative of the relative security thereof
US7103574B1 (en) * 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US7136838B1 (en) * 1999-03-27 2006-11-14 Microsoft Corporation Digital license and method for obtaining/providing a digital license
US20020019814A1 (en) 2001-03-01 2002-02-14 Krishnamurthy Ganesan Specifying rights in a digital rights license according to events
US6973444B1 (en) 1999-03-27 2005-12-06 Microsoft Corporation Method for interdependently validating a digital content package and a corresponding digital license
GB2349548A (en) 1999-04-27 2000-11-01 Roke Manor Research Downloading software to mobile telecommunication users
JP4362888B2 (en) * 1999-05-18 2009-11-11 ソニー株式会社 Information processing apparatus and method, and recording medium
US20020032734A1 (en) 2000-07-26 2002-03-14 Rhoads Geoffrey B. Collateral data combined with user characteristics to select web site
US6981214B1 (en) * 1999-06-07 2005-12-27 Hewlett-Packard Development Company, L.P. Virtual editor and related methods for dynamically generating personalized publications
US8103542B1 (en) 1999-06-29 2012-01-24 Digimarc Corporation Digitally marked objects and promotional methods
JP2001092721A (en) * 1999-09-17 2001-04-06 Fujitsu Ltd Device and method for controlling content use and computer readable recording medium having content use control program recorded thereon
US7194620B1 (en) * 1999-09-24 2007-03-20 Verizon Business Global Llc Method for real-time data authentication
US6608919B1 (en) 1999-11-10 2003-08-19 Digimarc Corporation Method and apparatus for encoding paper with information
US6625297B1 (en) 2000-02-10 2003-09-23 Digimarc Corporation Self-orienting watermarks
US6834308B1 (en) 2000-02-17 2004-12-21 Audible Magic Corporation Method and apparatus for identifying media content presented on a media playing device
US7599890B2 (en) * 2000-03-30 2009-10-06 Sanyo Electric Co., Ltd. Content data storage
US7200230B2 (en) * 2000-04-06 2007-04-03 Macrovision Corporation System and method for controlling and enforcing access rights to encrypted media
US6804377B2 (en) 2000-04-19 2004-10-12 Digimarc Corporation Detecting information hidden out-of-phase in color channels
GB0009634D0 (en) * 2000-04-19 2000-06-07 Infoclear Nv The info2clear system for on-line copyright management
US7111168B2 (en) 2000-05-01 2006-09-19 Digimarc Corporation Digital watermarking systems
DE10025626A1 (en) 2000-05-24 2001-11-29 Deutsche Telekom Ag Encrypt data to be stored in an IV system
US7111167B1 (en) 2000-06-30 2006-09-19 Intel Corporation Digital watermarks with values derived from remote platforms
US7039615B1 (en) 2000-09-28 2006-05-02 Microsoft Corporation Retail transactions involving digital content in a digital rights management (DRM) system
US7113900B1 (en) 2000-10-24 2006-09-26 Microsoft Corporation System and method for logical modeling of distributed computer systems
US7337332B2 (en) * 2000-10-24 2008-02-26 Nds Ltd. Transferring electronic content
US7606898B1 (en) 2000-10-24 2009-10-20 Microsoft Corporation System and method for distributed management of shared computers
US7562012B1 (en) 2000-11-03 2009-07-14 Audible Magic Corporation Method and apparatus for creating a unique audio signature
US7266704B2 (en) * 2000-12-18 2007-09-04 Digimarc Corporation User-friendly rights management systems and methods
WO2002051150A2 (en) 2000-12-18 2002-06-27 Matsushita Electric Industrial Co., Ltd. Encryption transmission system
US8055899B2 (en) 2000-12-18 2011-11-08 Digimarc Corporation Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
EP1223548A3 (en) * 2001-01-10 2004-02-11 Monolith Co., Ltd. Copyright information embedding method and apparatus
US20020094083A1 (en) * 2001-01-12 2002-07-18 Prabir Bhattacharya Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content
US7987510B2 (en) * 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
US20020141582A1 (en) * 2001-03-28 2002-10-03 Kocher Paul C. Content security layer providing long-term renewable security
EP1490767B1 (en) 2001-04-05 2014-06-11 Audible Magic Corporation Copyright detection and protection system and method
JP2003032639A (en) * 2001-05-09 2003-01-31 Monolith Co Ltd Image processing method and equipment, and contents recording method capable of being used for the method and the equipment
US7529659B2 (en) 2005-09-28 2009-05-05 Audible Magic Corporation Method and apparatus for identifying an unknown work
US7877438B2 (en) 2001-07-20 2011-01-25 Audible Magic Corporation Method and apparatus for identifying new media content
US8972481B2 (en) 2001-07-20 2015-03-03 Audible Magic, Inc. Playlist generation method and apparatus
US7063264B2 (en) 2001-12-24 2006-06-20 Digimarc Corporation Covert variable information on identification documents and methods of making same
US20030105739A1 (en) * 2001-10-12 2003-06-05 Hassane Essafi Method and a system for identifying and verifying the content of multimedia documents
US6925475B2 (en) * 2001-10-12 2005-08-02 Commissariat A L'energie Atomique Process and apparatus for management of multimedia databases
US20030108205A1 (en) * 2001-12-07 2003-06-12 Bryan Joyner System and method for providing encrypted data to a device
US8001052B2 (en) * 2001-12-10 2011-08-16 Dunkeld Bryan C System and method for unique digital asset identification and transaction management
AU2002366244A1 (en) 2001-12-18 2003-06-30 Digimarc Id System, Llc Multiple image security features for identification documents and methods of making same
WO2003056507A1 (en) 2001-12-24 2003-07-10 Digimarc Id Systems, Llc Systems, compositions, and methods for full color laser engraving of id documents
US7694887B2 (en) 2001-12-24 2010-04-13 L-1 Secure Credentialing, Inc. Optically variable personalized indicia for identification documents
US7728048B2 (en) 2002-12-20 2010-06-01 L-1 Secure Credentialing, Inc. Increasing thermal conductivity of host polymer used with laser engraving methods and compositions
DE10201441A1 (en) * 2002-01-16 2003-08-14 Infineon Technologies Ag Pushing device and method for moving
JP2003224556A (en) * 2002-01-28 2003-08-08 Toshiba Corp Communication equipment and communication control method
JPWO2003067486A1 (en) * 2002-02-04 2005-06-02 良貴 蘆田 Content management system for web links
JP4335492B2 (en) * 2002-03-05 2009-09-30 キヤノン株式会社 Moving picture management method and apparatus
US7277544B1 (en) * 2002-05-07 2007-10-02 Cinea, Inc. Local content security system
US7824029B2 (en) 2002-05-10 2010-11-02 L-1 Secure Credentialing, Inc. Identification card printer-assembler for over the counter card issuing
US20030221105A1 (en) * 2002-05-20 2003-11-27 Autodesk, Inc. Extensible mechanism for attaching digital signatures to different file types
GB2389204A (en) 2002-06-01 2003-12-03 Hewlett Packard Co Updating a trusted information state
US9349411B2 (en) * 2002-07-16 2016-05-24 Digimarc Corporation Digital watermarking and fingerprinting applications for copy protection
JP2004133576A (en) 2002-10-09 2004-04-30 Sony Corp Information processor, content distribution server, license server and method, and computer program
US7089429B2 (en) * 2002-11-25 2006-08-08 Nokia Corporation Creation of local usage rights voucher
WO2004049242A2 (en) 2002-11-26 2004-06-10 Digimarc Id Systems Systems and methods for managing and detecting fraud in image databases used with identification documents
US7712673B2 (en) 2002-12-18 2010-05-11 L-L Secure Credentialing, Inc. Identification document with three dimensional image of bearer
US8332326B2 (en) 2003-02-01 2012-12-11 Audible Magic Corporation Method and apparatus to identify a work received by a processing system
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7660982B1 (en) 2003-02-27 2010-02-09 Weinblatt Lee S Subscription broadcast security system
US7890543B2 (en) 2003-03-06 2011-02-15 Microsoft Corporation Architecture for distributed computing system and automated design, deployment, and management of distributed applications
US7689676B2 (en) 2003-03-06 2010-03-30 Microsoft Corporation Model-based policy application
US8122106B2 (en) 2003-03-06 2012-02-21 Microsoft Corporation Integrating design, deployment, and management phases for systems
US7072807B2 (en) 2003-03-06 2006-07-04 Microsoft Corporation Architecture for distributed computing system and automated design, deployment, and management of distributed applications
US20050270572A1 (en) * 2003-04-03 2005-12-08 Web Bindery Llc System and method for virtual print devices for command implementation
US20040236640A1 (en) * 2003-04-03 2004-11-25 Peter Kassan System for producing on-line content from web sites on demand
US20060005030A1 (en) * 2003-04-03 2006-01-05 Web Bindery Llc System and method for managing copyright information of electronic content
US20060041839A1 (en) * 2003-04-03 2006-02-23 Peter Kassan System and method for providing formatted print pages
CA2522551C (en) 2003-04-16 2009-12-22 Digimarc Corporation Three dimensional data storage
EP2570918A1 (en) 2003-07-07 2013-03-20 Rovi Solutions Corporation Reprogrammable security for controlling piracy and enabling interactive content
KR100493900B1 (en) * 2003-08-21 2005-06-10 삼성전자주식회사 Method for Sharing Rights Object Between Users
US7562230B2 (en) * 2003-10-14 2009-07-14 Intel Corporation Data security
US20050154906A1 (en) * 2003-11-05 2005-07-14 Patrick Kriech BIOS locked application media
CN1914850B (en) * 2004-01-29 2010-07-21 索尼株式会社 Information processing device and method
US7778422B2 (en) * 2004-02-27 2010-08-17 Microsoft Corporation Security associations for devices
CN100388153C (en) * 2004-03-02 2008-05-14 吴怡达 File control apparatus
US7744002B2 (en) 2004-03-11 2010-06-29 L-1 Secure Credentialing, Inc. Tamper evident adhesive and identification document including same
US7730207B2 (en) * 2004-03-31 2010-06-01 Microsoft Corporation Routing in peer-to-peer networks
US20050246529A1 (en) * 2004-04-30 2005-11-03 Microsoft Corporation Isolated persistent identity storage for authentication of computing devies
US8130746B2 (en) 2004-07-28 2012-03-06 Audible Magic Corporation System for distributing decoy content in a peer to peer network
CA2577057A1 (en) * 2004-08-13 2006-02-23 Wink International Llc Copyright license requesting
GB0421774D0 (en) 2004-09-30 2004-11-03 Ttp Communications Ltd Source code protection
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US7711965B2 (en) * 2004-10-20 2010-05-04 Intel Corporation Data security
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
JP2006267491A (en) * 2005-03-23 2006-10-05 Yamaha Corp Device for reproducing automatic playing data and program for realizing control method thereof
JP4186941B2 (en) * 2005-03-23 2008-11-26 ヤマハ株式会社 Automatic performance data editing / playback apparatus and program for controlling the same
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US7802144B2 (en) 2005-04-15 2010-09-21 Microsoft Corporation Model-based system monitoring
US8489728B2 (en) 2005-04-15 2013-07-16 Microsoft Corporation Model-based system monitoring
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US7797147B2 (en) 2005-04-15 2010-09-14 Microsoft Corporation Model-based system monitoring
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8549513B2 (en) 2005-06-29 2013-10-01 Microsoft Corporation Model-based virtual system provisioning
US7805375B2 (en) * 2005-08-22 2010-09-28 Microsoft Corporation Digital license migration from first platform to second platform
US20070083510A1 (en) * 2005-10-07 2007-04-12 Mcardle James M Capturing bibliographic attribution information during cut/copy/paste operations
US7818810B2 (en) * 2005-10-07 2010-10-19 International Business Machines Corporation Control of document content having extraction permissives
US7941309B2 (en) 2005-11-02 2011-05-10 Microsoft Corporation Modeling IT operations/policies
CN101449261B (en) * 2006-07-05 2012-11-21 艾格瑞系统有限公司 Systems and methods for multi-user access to a wireless storage device
US8010803B2 (en) * 2006-10-12 2011-08-30 Black Duck Software, Inc. Methods and apparatus for automated export compliance
WO2008068078A1 (en) * 2006-12-07 2008-06-12 International Business Machines Corporation Remote controller having an rfid tag
JP5147733B2 (en) * 2007-02-07 2013-02-20 パナソニック株式会社 RECORDING DEVICE, SERVER DEVICE, RECORDING METHOD, RECORDING MEDIUM RECORDING COMPUTER PROGRAM, AND INTEGRATED CIRCUIT
US8006314B2 (en) 2007-07-27 2011-08-23 Audible Magic Corporation System for identifying content of digital data
US20150006411A1 (en) * 2008-06-11 2015-01-01 James D. Bennett Creative work registry
JP2008263644A (en) * 2008-06-23 2008-10-30 Mitsubishi Corp Key management method, and key management apparatus
US8199651B1 (en) 2009-03-16 2012-06-12 Audible Magic Corporation Method and system for modifying communication flows at a port level
JP4544366B2 (en) * 2009-06-22 2010-09-15 ソニー株式会社 Content using device and information processing method
JP5621250B2 (en) * 2009-12-10 2014-11-12 富士通株式会社 Application software protection method and stream editing processing system
JP2010193506A (en) * 2010-04-14 2010-09-02 Intarsia Software Llc Data content distribution system
US9081778B2 (en) 2012-09-25 2015-07-14 Audible Magic Corporation Using digital fingerprints to associate data with a work
KR102329886B1 (en) * 2020-11-24 2021-11-22 주식회사 모블디 Multidimensional copyright management method and system
CN113992326B (en) * 2021-10-26 2023-05-16 福建师范大学 Non-interactive image editing validity detection method based on aggregation algorithm

Citations (223)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4104721A (en) 1976-12-30 1978-08-01 International Business Machines Corporation Hierarchical security mechanism for dynamically assigning security levels to object programs
US4168396A (en) 1977-10-31 1979-09-18 Best Robert M Microprocessor for executing enciphered programs
US4225884A (en) 1977-02-14 1980-09-30 Telease, Inc. Method and system for subscription television billing and access
US4278837A (en) 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4278337A (en) 1978-02-07 1981-07-14 Canon Kabushiki Kaisha Electric motor drive device for camera
US4352952A (en) 1978-06-12 1982-10-05 Motorola Inc. Data security module
US4386233A (en) 1980-09-29 1983-05-31 Smid Miles E Crytographic key notarization methods and apparatus
US4423287A (en) 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4465901A (en) 1979-06-04 1984-08-14 Best Robert M Crypto microprocessor that executes enciphered programs
EP0121853A2 (en) 1983-04-04 1984-10-17 BURROUGHS CORPORATION (a Delaware corporation) Data processing system having public encryption and private decryption keys
JPS59169000U (en) 1983-04-27 1984-11-12 日立照明株式会社 Lighting equipment switching device
US4527195A (en) 1979-02-20 1985-07-02 Payview Limited Apparatus for encoding and decoding information
JPS60102038U (en) 1983-12-20 1985-07-11 トラスト・トレ−デイング株式会社 training equipment
WO1985003830A1 (en) 1984-02-23 1985-08-29 American Telephone & Telegraph Company Method and apparatus for subscription broadcast
EP0158167A2 (en) * 1984-03-21 1985-10-16 Atalla Corporation Document security system, method and apparatus
US4558176A (en) 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
US4567512A (en) 1982-08-19 1986-01-28 World Video Library, Inc. Recorded program communication system
US4588991A (en) 1983-03-07 1986-05-13 Atalla Corporation File access security method and means
US4613901A (en) 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
EP0199410A1 (en) 1985-04-19 1986-10-29 La Radiotechnique Portenseigne System for the secret transmission of audio signals, and television set for receiving such signals
US4623918A (en) 1983-05-02 1986-11-18 Teleglobe Pay-Tv System, Inc. Pay television system utilizing multi-frequency passive filters
JPS62169540U (en) 1986-04-16 1987-10-27
DE3717261A1 (en) 1987-05-22 1987-11-19 Paul Bamberg Method for selecting television programmes by telephone
US4709266A (en) 1985-01-14 1987-11-24 Oak Industries Inc. Satellite scrambling communication network using geographically separated uplinks
US4710955A (en) 1985-11-25 1987-12-01 General Instrument Corporation Cable television system with two-way telephone communication path
US4736422A (en) 1983-06-30 1988-04-05 Independent Broadcasting Authority Encrypted broadcast television system
US4751732A (en) 1984-07-06 1988-06-14 Kabushiki Kaisha Toshiba Broadcasting system
US4757534A (en) 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US4759062A (en) 1986-10-06 1988-07-19 International Electronics Technology Corporation Arrangement for and method of protecting private security codes from unauthorized disclosure
US4791565A (en) 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software
US4799156A (en) 1986-10-01 1989-01-17 Strategic Processing Corporation Interactive market management system
JPS6461782A (en) 1987-08-31 1989-03-08 Sharp Kk Coded record reproducer
JPS6441387U (en) 1987-09-08 1989-03-13
US4827508A (en) 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US4829569A (en) 1984-09-21 1989-05-09 Scientific-Atlanta, Inc. Communication of individual messages to subscribers in a subscription television system
US4850017A (en) 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
US4852154A (en) 1986-02-04 1989-07-25 Pacific Bell Pay-per-view CATV system
US4862268A (en) 1980-03-31 1989-08-29 General Instrument Corporation Addressable cable television control system with video format data transmission
US4864615A (en) 1988-05-27 1989-09-05 General Instrument Corporation Reproduction of secure keys by using distributed key generation data
US4864614A (en) 1983-07-15 1989-09-05 U.S. Philips Corporation Authorising coded signals
US4864494A (en) 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
WO1989009528A1 (en) 1988-04-01 1989-10-05 Scientific Atlanta, Inc. Set-top interface transactions in an impulse pay per view television system
US4890321A (en) 1986-07-08 1989-12-26 Scientific Atlanta, Inc. Communications format for a subscription television system permitting transmission of individual text messages to subscribers
US4890319A (en) 1984-09-21 1989-12-26 Scientific-Atlantic, Inc. Method for controlling copying of protected information transmitted over a communications link
EP0341801A3 (en) 1985-10-29 1990-02-07 Payview Limited Video scrambling systems
US4905277A (en) 1981-12-29 1990-02-27 Fujitsu Limited Method for enciphering and deciphering instructions in a microcomputer, and a microcomputer used for effecting same
WO1990002382A1 (en) 1988-08-16 1990-03-08 Indata, Corporation Information distribution system
USRE33189E (en) 1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption
US4916737A (en) 1988-11-14 1990-04-10 Teleglobe Pay-Tv System, Inc. Secure anti-piracy encoded television system and method
US4919545A (en) 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4995080A (en) 1988-08-04 1991-02-19 Zenith Electronics Corporation Television signal scrambling system and method
US5008853A (en) * 1987-12-02 1991-04-16 Xerox Corporation Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment
US5029207A (en) 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5036461A (en) 1990-05-16 1991-07-30 Elliott John C Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
US5046093A (en) 1989-09-05 1991-09-03 General Instrument Corporation CATV subscriber apparatus with intelligent remote control
EP0391261A3 (en) 1989-04-03 1991-10-09 Nippon Telegraph And Telephone Corporation Method and apparatus for implementing electronic cash
US5060262A (en) 1990-05-07 1991-10-22 Bevins Jr George L Video scrambling, audio masking and data transmission methods for wireless cable systems
EP0459046A1 (en) 1990-05-31 1991-12-04 International Business Machines Corporation Computer software protection
JPH03282989A (en) 1990-03-30 1991-12-13 Tonen Corp Data storing method using memory card
US5077665A (en) * 1989-05-25 1991-12-31 Reuters Limited Distributed matching system
US5083309A (en) 1989-11-23 1992-01-21 Schlumberger Industries Method and a system enabling software to be run securely
US5091938A (en) 1990-08-06 1992-02-25 Nec Home Electronics, Ltd. System and method for transmitting entertainment information to authorized ones of plural receivers
US5126566A (en) 1990-04-06 1992-06-30 Jeol Ltd. Dimension measurement system utilizing scanning electron beam
US5138659A (en) 1991-05-02 1992-08-11 General Instrument Corporation Conversion of television signal formats with retention of common control data stream
US5142579A (en) 1991-01-29 1992-08-25 Anderson Walter M Public key cryptographic system and method
US5144663A (en) 1986-04-18 1992-09-01 Kudelski S.A. Fabrique D'engregistreurs Nagra Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof
US5146497A (en) 1991-02-27 1992-09-08 Motorola, Inc. Group rekey in a communication system
EP0518365A2 (en) 1991-06-14 1992-12-16 Nippon Telegraph And Telephone Corporation method of implementing use of electronic cash
US5173939A (en) 1990-09-28 1992-12-22 Digital Equipment Corporation Access control subsystem and method for distributed computer system using compound principals
WO1993007715A1 (en) 1991-10-03 1993-04-15 Thomson Consumer Electronics S.A. Method and apparatus for customizing a device with a smart card
US5204961A (en) 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
JPH05122701A (en) 1991-10-25 1993-05-18 Canon Inc Charging information processing unit
US5220604A (en) 1990-09-28 1993-06-15 Digital Equipment Corporation Method for performing group exclusion in hierarchical group structures
US5224163A (en) 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5227893A (en) 1990-10-31 1993-07-13 International Business Machines Corporation Pseudo-bar code control of image transmission
US5235641A (en) 1990-03-13 1993-08-10 Hitachi, Ltd. File encryption method and file cryptographic system
US5247575A (en) 1988-08-16 1993-09-21 Sprague Peter J Information distribution system
JPH05298373A (en) 1992-04-24 1993-11-12 Olympus Optical Co Ltd Portable type information terminal equipment
GB2231244B (en) 1989-04-10 1993-11-24 Pioneer Electronic Corp CATV system and CATV terminal unit
JPH05316102A (en) 1992-05-13 1993-11-26 Mega Chips:Kk Decoder
US5270773A (en) 1992-11-27 1993-12-14 Xerox Corporation Image producing device with security to prevent disclosure of sensitive documents
US5291598A (en) 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
EP0532381B1 (en) 1991-09-12 1994-03-30 Gemplus Card International Method and apparatus for certifying messages transmitted by a facsimile device
US5301245A (en) 1991-03-29 1994-04-05 Pioneer Electronic Corporation System for transmitting a commercial program in a CATV system
EP0590763A1 (en) 1992-07-27 1994-04-06 Scitex Corporation Ltd. Electronic separation scanner
US5315657A (en) 1990-09-28 1994-05-24 Digital Equipment Corporation Compound principals in access control lists
US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5323464A (en) * 1992-10-16 1994-06-21 International Business Machines Corporation Commercial data masking
US5341425A (en) 1992-12-02 1994-08-23 Scientific Atlanta, Inc. Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site
US5345508A (en) 1993-08-23 1994-09-06 Apple Computer, Inc. Method and apparatus for variable-overhead cached encryption
US5347581A (en) 1993-09-15 1994-09-13 Gemplus Developpement Verification process for a communication system
US5349662A (en) 1992-05-21 1994-09-20 International Business Machines Corporation Method of and apparatus for providing automatic detection of user activity
US5353351A (en) 1992-06-09 1994-10-04 At&T Bell Laboratories Secure teleconferencing
EP0542298A3 (en) 1991-11-15 1994-11-23 Citibank Na Electronic monetary system
US5369702A (en) 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
EP0421808B1 (en) 1989-10-06 1994-12-28 André Peter Mansvelt Funds transfer system
US5381480A (en) 1993-09-20 1995-01-10 International Business Machines Corporation System for translating encrypted data
US5392351A (en) 1992-03-16 1995-02-21 Fujitsu Limited Electronic data protection system
US5400403A (en) 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method
JPH0714045Y2 (en) 1989-04-05 1995-04-05 日産ディーゼル工業株式会社 Vehicle intake system
EP0649074A1 (en) 1993-10-18 1995-04-19 Xerox Corporation A system and method to measure and accrue copyright royalties
US5410602A (en) 1993-09-27 1995-04-25 Motorola, Inc. Method for key management of point-to-point communications
US5414772A (en) 1993-06-23 1995-05-09 Gemplus Development System for improving the digital signature algorithm
US5428685A (en) 1992-01-22 1995-06-27 Fujitsu Limited IC memory card and method of protecting data therein
US5428606A (en) 1993-06-30 1995-06-27 Moskowitz; Scott A. Digital information commodities exchange
WO1995020291A1 (en) 1994-01-19 1995-07-27 Highwater Fbi Limited Method of and apparatus for manipulating digital data works
US5438508A (en) 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
US5442706A (en) 1992-02-27 1995-08-15 Hughes Aircraft Company Secure mobile storage
US5444782A (en) 1993-03-09 1995-08-22 Uunet Technologies, Inc. Computer network encryption/decryption device
US5450493A (en) 1993-12-29 1995-09-12 At&T Corp. Secure communication method and apparatus
EP0665486A3 (en) 1994-01-27 1995-09-13 AT&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5455941A (en) 1991-02-27 1995-10-03 Canon Kabushiki Kaisha System for detecting improper rewrites of data system for using separate reader writer passwords
US5455863A (en) 1993-06-29 1995-10-03 Motorola, Inc. Method and apparatus for efficient real-time authentication and encryption in a communication system
US5457746A (en) 1993-09-14 1995-10-10 Spyrus, Inc. System and method for access control for portable data storage media
JPH07271865A (en) 1994-04-01 1995-10-20 Mitsubishi Corp Method for managing copyright of data base
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature
US5475757A (en) 1994-06-07 1995-12-12 At&T Corp. Secure data transmission method
US5475758A (en) 1993-01-22 1995-12-12 Fujitsu Limited User authenticating system and method in wide area distributed environment
US5479514A (en) 1994-02-23 1995-12-26 International Business Machines Corporation Method and apparatus for encrypted communication in data networks
US5485577A (en) 1994-12-16 1996-01-16 General Instrument Corporation Of Delaware Method and apparatus for incremental delivery of access rights
US5495533A (en) 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5497420A (en) 1994-02-07 1996-03-05 Le Groupe Vide/ otron Lte/ e Cable TV system using passwords
US5499340A (en) 1994-01-12 1996-03-12 Isogon Corporation Method and apparatus for computer program usage monitoring
US5504818A (en) 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5504817A (en) 1994-05-09 1996-04-02 Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications
US5504933A (en) 1992-10-27 1996-04-02 Mitsubishi Corporation Pay broadcasting system
US5504816A (en) 1994-02-02 1996-04-02 Gi Corporation Method and apparatus for controlling access to digital signals
EP0354774B1 (en) 1988-08-11 1996-04-10 International Business Machines Corporation Data cryptography using control vectors
US5509073A (en) 1992-11-26 1996-04-16 Schlumberger Industries Communications network
US5511121A (en) 1994-02-23 1996-04-23 Bell Communications Research, Inc. Efficient electronic money
WO1996013113A1 (en) 1994-10-12 1996-05-02 Secure Computing Corporation System and method for providing secure internetwork services
US5515538A (en) 1992-05-29 1996-05-07 Sun Microsystems, Inc. Apparatus and method for interrupt handling in a multi-threaded operating system kernel
US5515441A (en) 1994-05-12 1996-05-07 At&T Corp. Secure communication method and apparatus
US5532920A (en) * 1992-04-29 1996-07-02 International Business Machines Corporation Data processing system and method to enforce payment of royalties when copying softcopy books
JPH08185448A (en) 1994-09-30 1996-07-16 Mitsubishi Corp System and device for managing data copyright
US5541994A (en) 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
WO1996023257A1 (en) 1995-01-24 1996-08-01 Tandem Computers Incorporated Enhanced instrumentation software in fault tolerant systems
EP0450841B1 (en) 1990-03-29 1996-08-21 Gte Laboratories Incorporated Video control system
US5553145A (en) 1995-03-21 1996-09-03 Micali; Silvia Simultaneous electronic transactions with visible trusted parties
WO1996027259A1 (en) 1995-03-02 1996-09-06 Signum Technologies Limited Method of and apparatus for manipulating digital data works
EP0506435B1 (en) 1991-03-29 1996-10-23 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US5577121A (en) 1994-06-09 1996-11-19 Electronic Payment Services, Inc. Transaction system for integrated circuit cards
US5579223A (en) * 1992-12-24 1996-11-26 Microsoft Corporation Method and system for incorporating modifications made to a computer program into a translated version of the computer program
US5581682A (en) * 1991-06-28 1996-12-03 International Business Machines Corporation Method for storing and retrieving annotations and redactions in final form documents
US5584023A (en) 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism
US5604800A (en) 1995-02-13 1997-02-18 Eta Technologies Corporation Personal access management system
US5606613A (en) 1994-12-22 1997-02-25 Pitney Bowes Inc. Method for identifying a metering accounting vault to digital printer
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
EP0489385B1 (en) 1990-12-06 1997-03-19 EDICO S.r.l. System for the transmission and reception of encoded television signals
US5633934A (en) 1993-12-09 1997-05-27 Hember; John T. Local area nework encryption decryption system
US5636277A (en) 1994-09-30 1997-06-03 Fujitsu Limited System for licensing to use software products
US5642418A (en) 1995-02-21 1997-06-24 Bell Atlantic Network Services, Inc. Satellite television system and method
US5646999A (en) 1994-10-27 1997-07-08 Mitsubishi Corporation Data coypright management method
US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
EP0438154B1 (en) 1990-01-19 1997-07-16 Canon Kabushiki Kaisha Multimedia network system
US5651064A (en) 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media
EP0398645B1 (en) 1989-05-15 1997-08-06 International Business Machines Corporation System for controlling access privileges
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
US5680452A (en) 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
US5689587A (en) 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images
EP0813133A2 (en) 1996-06-11 1997-12-17 International Business Machines Corporation A uniform mechanism for using signed content
WO1997050036A1 (en) 1996-06-27 1997-12-31 Institute Of Systems Science Computationally efficient method for trusted and dynamic digital objects dissemination
US5706210A (en) 1995-03-01 1998-01-06 Fujitsu Limited Network monitoring device
US5715393A (en) 1993-08-16 1998-02-03 Motorola, Inc. Method for remote system process monitoring
US5740246A (en) 1994-12-13 1998-04-14 Mitsubishi Corporation Crypt key system
US5745572A (en) 1995-02-24 1998-04-28 International Computers Limited Cryptographic key management
US5765176A (en) 1996-09-06 1998-06-09 Xerox Corporation Performing document image management tasks using an iconic image having embedded encoded information
US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5771383A (en) 1994-12-27 1998-06-23 International Business Machines Corp. Shared memory support method and apparatus for a microkernel data processing system
US5812762A (en) 1995-03-31 1998-09-22 Samsung Electronics Co., Ltd. Personal computer having card read/write controller
US5818933A (en) 1995-07-07 1998-10-06 Mitsubishi Denki Kabushiki Kaisha Copyright control system
US5825892A (en) 1996-10-28 1998-10-20 International Business Machines Corporation Protecting images with an image watermark
US5832083A (en) 1994-09-09 1998-11-03 Fujitsu Limited Method and device for utilizing data content
US5835765A (en) 1995-05-31 1998-11-10 Mitsubishi Denki Kabushiki Kaisha Computer operation management system for a computer operating system capable of simultaneously executing plural application programs
US5835601A (en) 1994-03-15 1998-11-10 Kabushiki Kaisha Toshiba File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
US5841886A (en) 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US5848158A (en) 1995-06-02 1998-12-08 Mitsubishi Corporation Data copyright management system
US5848155A (en) 1996-09-04 1998-12-08 Nec Research Institute, Inc. Spread spectrum watermark for embedded signalling
US5867579A (en) 1994-10-27 1999-02-02 Mitsubishi Corporation Apparatus for data copyright management system
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US5910987A (en) 1995-02-13 1999-06-08 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5912969A (en) 1994-03-31 1999-06-15 Hitachi, Ltd. Information receiving and recording/reproducing apparatus/method having function for limiting/delimiting for protecting copyright of recording information
US5968175A (en) 1994-03-29 1999-10-19 Kabushiki Kaisha Toshiba Software use method control system
US5974141A (en) 1995-03-31 1999-10-26 Mitsubishi Corporation Data management system
US5986690A (en) 1992-12-09 1999-11-16 Discovery Communications, Inc. Electronic book selection and delivery system
US6002772A (en) 1995-09-29 1999-12-14 Mitsubishi Corporation Data management system
US6006328A (en) 1995-07-14 1999-12-21 Christopher N. Drake Computer software authentication, protection, and security system
US6026430A (en) 1997-03-24 2000-02-15 Butman; Ronald A. Dynamic client registry apparatus and method
US6044367A (en) 1996-08-02 2000-03-28 Hewlett-Packard Company Distributed I/O store
US6069952A (en) 1994-09-30 2000-05-30 Mitsubishi Corporation Data copyright management system
US6076077A (en) 1995-10-27 2000-06-13 Mitsubishi Corporation Data management system
US6091835A (en) 1994-08-31 2000-07-18 Penop Limited Method and system for transcribing electronic affirmations
US6097816A (en) 1994-04-08 2000-08-01 Mitsubishi Corporation Crypt key system
US6160891A (en) 1997-10-20 2000-12-12 Sun Microsystems, Inc. Methods and apparatus for recovering keys
JP3128541B2 (en) 1991-02-06 2001-01-29 イゲン,インコーポレーテッド Apparatus for luminescence assay based on magnetic microparticles containing multiple magnets
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
EP0551016B1 (en) 1992-01-06 2001-03-14 Canon Kabushiki Kaisha Image processing method for adding an identification code to an image
US6209092B1 (en) 1997-01-27 2001-03-27 U.S. Philips Corporation Method and system for transferring content information and supplemental information relating thereto
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
JP3265241B2 (en) 1997-09-10 2002-03-11 シャープ株式会社 Rice cooker and high frequency heating device
US20020052850A1 (en) 1994-10-27 2002-05-02 Mitsubishi Corporation Digital content management system and apparatus
US6415271B1 (en) 1993-02-10 2002-07-02 Gm Network Limited Electronic cash eliminating payment risk
US20020122173A1 (en) 2001-03-05 2002-09-05 Donald Bruns Method and apparatus for fiber alignment using light leaked from cladding
US6449717B1 (en) 1994-09-30 2002-09-10 Mitsubishi Corporation Data copyright management system
US6519623B1 (en) 1996-10-31 2003-02-11 International Business Machines Corporation Generic semaphore for concurrent access by multiple operating systems
US6560339B1 (en) 1998-02-17 2003-05-06 Canon Kabushiki Kaisha Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method
US20030144963A1 (en) 1994-09-30 2003-07-31 Mitsubishi Corporation Data copyright management system
US6603864B1 (en) 1998-10-30 2003-08-05 Fuji Xerox Co., Ltd. Image processing apparatus and image processing method
EP0715243B1 (en) 1994-11-23 2003-08-06 ContentGuard Holdings, Inc. System for controlling the distribution and use of digital works having a fee reporting mechanism
US6615258B1 (en) 1997-09-26 2003-09-02 Worldcom, Inc. Integrated customer interface for web based data management
US6668324B1 (en) 1999-12-13 2003-12-23 Intel Corporation System and method for safeguarding data within a device
US6741991B2 (en) 1994-09-30 2004-05-25 Mitsubishi Corporation Data management system
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US6789197B1 (en) 1994-10-27 2004-09-07 Mitsubishi Corporation Apparatus for data copyright management system
US6851053B1 (en) 1999-03-02 2005-02-01 Microsoft Corporation Multiparty conference authentication
US6874089B2 (en) 2002-02-25 2005-03-29 Network Resonance, Inc. System, method and computer program product for guaranteeing electronic transactions
EP0581227B1 (en) 1992-07-28 2005-09-21 Hitachi, Ltd. Apparatus for the recording and/or the reproducing of video signals
US20050262023A1 (en) 1994-04-01 2005-11-24 Intarsia Software Llc Method for controlling database copyrights
US7024681B1 (en) 1997-12-04 2006-04-04 Verizon Laboratories Inc. Method and apparatus for near video on demand
US7093295B1 (en) 1998-10-15 2006-08-15 Makoto Saito Method and device for protecting digital data by double re-encryption
JP4181182B2 (en) 2006-03-08 2008-11-12 ヤンマー農機株式会社 Normal combine
JP4268844B2 (en) 2003-07-15 2009-05-27 Tdk株式会社 Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4625276A (en) * 1983-08-31 1986-11-25 Vericard Corporation Data logging and transfer system using portable and resident units
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
JP2783558B2 (en) * 1988-09-30 1998-08-06 株式会社東芝 Summary generation method and summary generation device
US5761655A (en) * 1990-06-06 1998-06-02 Alphatronix, Inc. Image file storage and retrieval system
US5442778A (en) * 1991-11-12 1995-08-15 Xerox Corporation Scatter-gather: a cluster-based method and apparatus for browsing large document collections
US5440631A (en) * 1992-04-24 1995-08-08 Fijitsu Limited Information distribution system wherein storage medium storing ciphered information is distributed
WO1996015505A2 (en) * 1994-11-08 1996-05-23 Vermeer Technologies, Inc. An online service development tool with fee setting capabilities
US5740549A (en) * 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method
JP4181282B2 (en) 1999-09-16 2008-11-12 株式会社東芝 Electronic currency terminal

Patent Citations (252)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4104721A (en) 1976-12-30 1978-08-01 International Business Machines Corporation Hierarchical security mechanism for dynamically assigning security levels to object programs
US4225884A (en) 1977-02-14 1980-09-30 Telease, Inc. Method and system for subscription television billing and access
US4168396A (en) 1977-10-31 1979-09-18 Best Robert M Microprocessor for executing enciphered programs
US4278837A (en) 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4278337A (en) 1978-02-07 1981-07-14 Canon Kabushiki Kaisha Electric motor drive device for camera
US4352952A (en) 1978-06-12 1982-10-05 Motorola Inc. Data security module
US4527195A (en) 1979-02-20 1985-07-02 Payview Limited Apparatus for encoding and decoding information
US4465901A (en) 1979-06-04 1984-08-14 Best Robert M Crypto microprocessor that executes enciphered programs
US4862268A (en) 1980-03-31 1989-08-29 General Instrument Corporation Addressable cable television control system with video format data transmission
US4386233A (en) 1980-09-29 1983-05-31 Smid Miles E Crytographic key notarization methods and apparatus
US4423287A (en) 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
USRE33189E (en) 1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption
US4905277A (en) 1981-12-29 1990-02-27 Fujitsu Limited Method for enciphering and deciphering instructions in a microcomputer, and a microcomputer used for effecting same
US4567512A (en) 1982-08-19 1986-01-28 World Video Library, Inc. Recorded program communication system
US4558176A (en) 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
US4588991A (en) 1983-03-07 1986-05-13 Atalla Corporation File access security method and means
EP0121853A2 (en) 1983-04-04 1984-10-17 BURROUGHS CORPORATION (a Delaware corporation) Data processing system having public encryption and private decryption keys
JPS59169000U (en) 1983-04-27 1984-11-12 日立照明株式会社 Lighting equipment switching device
US4623918A (en) 1983-05-02 1986-11-18 Teleglobe Pay-Tv System, Inc. Pay television system utilizing multi-frequency passive filters
US4613901A (en) 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
US4736422A (en) 1983-06-30 1988-04-05 Independent Broadcasting Authority Encrypted broadcast television system
US4864614A (en) 1983-07-15 1989-09-05 U.S. Philips Corporation Authorising coded signals
JPS60102038U (en) 1983-12-20 1985-07-11 トラスト・トレ−デイング株式会社 training equipment
WO1985003830A1 (en) 1984-02-23 1985-08-29 American Telephone & Telegraph Company Method and apparatus for subscription broadcast
EP0158167A2 (en) * 1984-03-21 1985-10-16 Atalla Corporation Document security system, method and apparatus
US4791565A (en) 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software
US4751732A (en) 1984-07-06 1988-06-14 Kabushiki Kaisha Toshiba Broadcasting system
US4890319A (en) 1984-09-21 1989-12-26 Scientific-Atlantic, Inc. Method for controlling copying of protected information transmitted over a communications link
US4829569A (en) 1984-09-21 1989-05-09 Scientific-Atlanta, Inc. Communication of individual messages to subscribers in a subscription television system
US4757534A (en) 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
EP0191162B1 (en) 1984-12-18 1993-02-03 International Business Machines Corporation Method of software protection
US4709266A (en) 1985-01-14 1987-11-24 Oak Industries Inc. Satellite scrambling communication network using geographically separated uplinks
EP0199410A1 (en) 1985-04-19 1986-10-29 La Radiotechnique Portenseigne System for the secret transmission of audio signals, and television set for receiving such signals
EP0341801A3 (en) 1985-10-29 1990-02-07 Payview Limited Video scrambling systems
US4710955A (en) 1985-11-25 1987-12-01 General Instrument Corporation Cable television system with two-way telephone communication path
US4852154A (en) 1986-02-04 1989-07-25 Pacific Bell Pay-per-view CATV system
US4864494A (en) 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
JPS62169540U (en) 1986-04-16 1987-10-27
US5144663A (en) 1986-04-18 1992-09-01 Kudelski S.A. Fabrique D'engregistreurs Nagra Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof
US4890321A (en) 1986-07-08 1989-12-26 Scientific Atlanta, Inc. Communications format for a subscription television system permitting transmission of individual text messages to subscribers
US4799156A (en) 1986-10-01 1989-01-17 Strategic Processing Corporation Interactive market management system
US4759062A (en) 1986-10-06 1988-07-19 International Electronics Technology Corporation Arrangement for and method of protecting private security codes from unauthorized disclosure
US4827508A (en) 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
DE3717261A1 (en) 1987-05-22 1987-11-19 Paul Bamberg Method for selecting television programmes by telephone
US4850017A (en) 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values
JPS6461782A (en) 1987-08-31 1989-03-08 Sharp Kk Coded record reproducer
JPS6441387U (en) 1987-09-08 1989-03-13
US5008853A (en) * 1987-12-02 1991-04-16 Xerox Corporation Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment
WO1989009528A1 (en) 1988-04-01 1989-10-05 Scientific Atlanta, Inc. Set-top interface transactions in an impulse pay per view television system
US4864615A (en) 1988-05-27 1989-09-05 General Instrument Corporation Reproduction of secure keys by using distributed key generation data
US4995080A (en) 1988-08-04 1991-02-19 Zenith Electronics Corporation Television signal scrambling system and method
EP0354774B1 (en) 1988-08-11 1996-04-10 International Business Machines Corporation Data cryptography using control vectors
US5247575A (en) 1988-08-16 1993-09-21 Sprague Peter J Information distribution system
WO1990002382A1 (en) 1988-08-16 1990-03-08 Indata, Corporation Information distribution system
US4916737A (en) 1988-11-14 1990-04-10 Teleglobe Pay-Tv System, Inc. Secure anti-piracy encoded television system and method
US4919545A (en) 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
EP0391261A3 (en) 1989-04-03 1991-10-09 Nippon Telegraph And Telephone Corporation Method and apparatus for implementing electronic cash
JPH0714045Y2 (en) 1989-04-05 1995-04-05 日産ディーゼル工業株式会社 Vehicle intake system
GB2231244B (en) 1989-04-10 1993-11-24 Pioneer Electronic Corp CATV system and CATV terminal unit
EP0398645B1 (en) 1989-05-15 1997-08-06 International Business Machines Corporation System for controlling access privileges
US5077665A (en) * 1989-05-25 1991-12-31 Reuters Limited Distributed matching system
US5046093A (en) 1989-09-05 1991-09-03 General Instrument Corporation CATV subscriber apparatus with intelligent remote control
EP0421808B1 (en) 1989-10-06 1994-12-28 André Peter Mansvelt Funds transfer system
US5083309A (en) 1989-11-23 1992-01-21 Schlumberger Industries Method and a system enabling software to be run securely
EP0430734B1 (en) 1989-11-23 1995-09-27 Schlumberger Industries System and method to securely operate a computerprogram
EP0438154B1 (en) 1990-01-19 1997-07-16 Canon Kabushiki Kaisha Multimedia network system
US5029207A (en) 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5235641A (en) 1990-03-13 1993-08-10 Hitachi, Ltd. File encryption method and file cryptographic system
EP0450841B1 (en) 1990-03-29 1996-08-21 Gte Laboratories Incorporated Video control system
JPH03282989A (en) 1990-03-30 1991-12-13 Tonen Corp Data storing method using memory card
US5126566A (en) 1990-04-06 1992-06-30 Jeol Ltd. Dimension measurement system utilizing scanning electron beam
US5060262A (en) 1990-05-07 1991-10-22 Bevins Jr George L Video scrambling, audio masking and data transmission methods for wireless cable systems
US5036461A (en) 1990-05-16 1991-07-30 Elliott John C Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
EP0459046A1 (en) 1990-05-31 1991-12-04 International Business Machines Corporation Computer software protection
US5204961A (en) 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5091938B1 (en) 1990-08-06 1997-02-04 Nippon Denki Home Electronics Digital data cryptographic system
US5091938A (en) 1990-08-06 1992-02-25 Nec Home Electronics, Ltd. System and method for transmitting entertainment information to authorized ones of plural receivers
US5224163A (en) 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5173939A (en) 1990-09-28 1992-12-22 Digital Equipment Corporation Access control subsystem and method for distributed computer system using compound principals
US5220604A (en) 1990-09-28 1993-06-15 Digital Equipment Corporation Method for performing group exclusion in hierarchical group structures
US5315657A (en) 1990-09-28 1994-05-24 Digital Equipment Corporation Compound principals in access control lists
US5227893A (en) 1990-10-31 1993-07-13 International Business Machines Corporation Pseudo-bar code control of image transmission
EP0489385B1 (en) 1990-12-06 1997-03-19 EDICO S.r.l. System for the transmission and reception of encoded television signals
US5142579A (en) 1991-01-29 1992-08-25 Anderson Walter M Public key cryptographic system and method
JP3128541B2 (en) 1991-02-06 2001-01-29 イゲン,インコーポレーテッド Apparatus for luminescence assay based on magnetic microparticles containing multiple magnets
US5455941A (en) 1991-02-27 1995-10-03 Canon Kabushiki Kaisha System for detecting improper rewrites of data system for using separate reader writer passwords
US5146497A (en) 1991-02-27 1992-09-08 Motorola, Inc. Group rekey in a communication system
US5301245A (en) 1991-03-29 1994-04-05 Pioneer Electronic Corporation System for transmitting a commercial program in a CATV system
EP0506435B1 (en) 1991-03-29 1996-10-23 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US5504818A (en) 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5138659A (en) 1991-05-02 1992-08-11 General Instrument Corporation Conversion of television signal formats with retention of common control data stream
EP0518365A2 (en) 1991-06-14 1992-12-16 Nippon Telegraph And Telephone Corporation method of implementing use of electronic cash
US5581682A (en) * 1991-06-28 1996-12-03 International Business Machines Corporation Method for storing and retrieving annotations and redactions in final form documents
US5438508A (en) 1991-06-28 1995-08-01 Digital Equipment Corporation License document interchange format for license management system
EP0532381B1 (en) 1991-09-12 1994-03-30 Gemplus Card International Method and apparatus for certifying messages transmitted by a facsimile device
WO1993007715A1 (en) 1991-10-03 1993-04-15 Thomson Consumer Electronics S.A. Method and apparatus for customizing a device with a smart card
JPH05122701A (en) 1991-10-25 1993-05-18 Canon Inc Charging information processing unit
EP0542298A3 (en) 1991-11-15 1994-11-23 Citibank Na Electronic monetary system
US5453601A (en) 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
EP0551016B1 (en) 1992-01-06 2001-03-14 Canon Kabushiki Kaisha Image processing method for adding an identification code to an image
US5428685A (en) 1992-01-22 1995-06-27 Fujitsu Limited IC memory card and method of protecting data therein
US5442706A (en) 1992-02-27 1995-08-15 Hughes Aircraft Company Secure mobile storage
US5392351A (en) 1992-03-16 1995-02-21 Fujitsu Limited Electronic data protection system
EP0561685B1 (en) 1992-03-16 2005-02-09 Fujitsu Limited An electronic data protection system
US5291598A (en) 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
JPH05298373A (en) 1992-04-24 1993-11-12 Olympus Optical Co Ltd Portable type information terminal equipment
US5532920A (en) * 1992-04-29 1996-07-02 International Business Machines Corporation Data processing system and method to enforce payment of royalties when copying softcopy books
JPH05316102A (en) 1992-05-13 1993-11-26 Mega Chips:Kk Decoder
US5349662A (en) 1992-05-21 1994-09-20 International Business Machines Corporation Method of and apparatus for providing automatic detection of user activity
US5515538A (en) 1992-05-29 1996-05-07 Sun Microsystems, Inc. Apparatus and method for interrupt handling in a multi-threaded operating system kernel
US5353351A (en) 1992-06-09 1994-10-04 At&T Bell Laboratories Secure teleconferencing
EP0590763A1 (en) 1992-07-27 1994-04-06 Scitex Corporation Ltd. Electronic separation scanner
EP0581227B1 (en) 1992-07-28 2005-09-21 Hitachi, Ltd. Apparatus for the recording and/or the reproducing of video signals
US5323464A (en) * 1992-10-16 1994-06-21 International Business Machines Corporation Commercial data masking
US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5794115A (en) 1992-10-27 1998-08-11 Mitsubishi Corporation Pay broadcasting system having a broadcasting station and a charging center
US5504933A (en) 1992-10-27 1996-04-02 Mitsubishi Corporation Pay broadcasting system
US5901339A (en) 1992-10-27 1999-05-04 Mitsubishi Corporation Pay broadcasting system
US5509073A (en) 1992-11-26 1996-04-16 Schlumberger Industries Communications network
US5270773A (en) 1992-11-27 1993-12-14 Xerox Corporation Image producing device with security to prevent disclosure of sensitive documents
US5341425A (en) 1992-12-02 1994-08-23 Scientific Atlanta, Inc. Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature
US5986690A (en) 1992-12-09 1999-11-16 Discovery Communications, Inc. Electronic book selection and delivery system
US5579223A (en) * 1992-12-24 1996-11-26 Microsoft Corporation Method and system for incorporating modifications made to a computer program into a translated version of the computer program
US5475758A (en) 1993-01-22 1995-12-12 Fujitsu Limited User authenticating system and method in wide area distributed environment
US6415271B1 (en) 1993-02-10 2002-07-02 Gm Network Limited Electronic cash eliminating payment risk
US5444782A (en) 1993-03-09 1995-08-22 Uunet Technologies, Inc. Computer network encryption/decryption device
US5414772A (en) 1993-06-23 1995-05-09 Gemplus Development System for improving the digital signature algorithm
US5455863A (en) 1993-06-29 1995-10-03 Motorola, Inc. Method and apparatus for efficient real-time authentication and encryption in a communication system
US5428606A (en) 1993-06-30 1995-06-27 Moskowitz; Scott A. Digital information commodities exchange
US5400403A (en) 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method
US5715393A (en) 1993-08-16 1998-02-03 Motorola, Inc. Method for remote system process monitoring
US5345508A (en) 1993-08-23 1994-09-06 Apple Computer, Inc. Method and apparatus for variable-overhead cached encryption
US5457746A (en) 1993-09-14 1995-10-10 Spyrus, Inc. System and method for access control for portable data storage media
US5347581A (en) 1993-09-15 1994-09-13 Gemplus Developpement Verification process for a communication system
US5381480A (en) 1993-09-20 1995-01-10 International Business Machines Corporation System for translating encrypted data
US5410602A (en) 1993-09-27 1995-04-25 Motorola, Inc. Method for key management of point-to-point communications
US5369702A (en) 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
US5680452A (en) 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
EP0649074A1 (en) 1993-10-18 1995-04-19 Xerox Corporation A system and method to measure and accrue copyright royalties
US5444779A (en) 1993-10-18 1995-08-22 Xerox Corporation Electronic copyright royalty accounting system using glyphs
US5841886A (en) 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US5633934A (en) 1993-12-09 1997-05-27 Hember; John T. Local area nework encryption decryption system
US5584023A (en) 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism
US5450493A (en) 1993-12-29 1995-09-12 At&T Corp. Secure communication method and apparatus
US5499340A (en) 1994-01-12 1996-03-12 Isogon Corporation Method and apparatus for computer program usage monitoring
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
WO1995020291A1 (en) 1994-01-19 1995-07-27 Highwater Fbi Limited Method of and apparatus for manipulating digital data works
US5509074A (en) 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
EP0665486A3 (en) 1994-01-27 1995-09-13 AT&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5504816A (en) 1994-02-02 1996-04-02 Gi Corporation Method and apparatus for controlling access to digital signals
US5497420A (en) 1994-02-07 1996-03-05 Le Groupe Vide/ otron Lte/ e Cable TV system using passwords
US5479514A (en) 1994-02-23 1995-12-26 International Business Machines Corporation Method and apparatus for encrypted communication in data networks
US5511121A (en) 1994-02-23 1996-04-23 Bell Communications Research, Inc. Efficient electronic money
US5835601A (en) 1994-03-15 1998-11-10 Kabushiki Kaisha Toshiba File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
US5968175A (en) 1994-03-29 1999-10-19 Kabushiki Kaisha Toshiba Software use method control system
US5912969A (en) 1994-03-31 1999-06-15 Hitachi, Ltd. Information receiving and recording/reproducing apparatus/method having function for limiting/delimiting for protecting copyright of recording information
US20050262023A1 (en) 1994-04-01 2005-11-24 Intarsia Software Llc Method for controlling database copyrights
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
EP0677949B1 (en) 1994-04-01 2003-05-28 Mitsubishi Corporation Method for controlling copyright of encrypted digital data
JPH07271865A (en) 1994-04-01 1995-10-20 Mitsubishi Corp Method for managing copyright of data base
US20020021807A1 (en) 1994-04-01 2002-02-21 Mitsubishi Corporation Method for controlling database copyrights
US7036019B1 (en) 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
US6097816A (en) 1994-04-08 2000-08-01 Mitsubishi Corporation Crypt key system
US5495533A (en) 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5504817A (en) 1994-05-09 1996-04-02 Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications
US5515441A (en) 1994-05-12 1996-05-07 At&T Corp. Secure communication method and apparatus
US5475757A (en) 1994-06-07 1995-12-12 At&T Corp. Secure data transmission method
US5577121A (en) 1994-06-09 1996-11-19 Electronic Payment Services, Inc. Transaction system for integrated circuit cards
US6091835A (en) 1994-08-31 2000-07-18 Penop Limited Method and system for transcribing electronic affirmations
US5541994A (en) 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5832083A (en) 1994-09-09 1998-11-03 Fujitsu Limited Method and device for utilizing data content
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US6069952A (en) 1994-09-30 2000-05-30 Mitsubishi Corporation Data copyright management system
US6449717B1 (en) 1994-09-30 2002-09-10 Mitsubishi Corporation Data copyright management system
US5636277A (en) 1994-09-30 1997-06-03 Fujitsu Limited System for licensing to use software products
US20030144963A1 (en) 1994-09-30 2003-07-31 Mitsubishi Corporation Data copyright management system
EP0704785B1 (en) 1994-09-30 2003-11-19 Mitsubishi Corporation Data copyright management system
JPH08185448A (en) 1994-09-30 1996-07-16 Mitsubishi Corp System and device for managing data copyright
US6741991B2 (en) 1994-09-30 2004-05-25 Mitsubishi Corporation Data management system
WO1996013113A1 (en) 1994-10-12 1996-05-02 Secure Computing Corporation System and method for providing secure internetwork services
US5864683A (en) 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US6097818A (en) 1994-10-27 2000-08-01 Mitsubishi Corporation Data copyright management method
US6789197B1 (en) 1994-10-27 2004-09-07 Mitsubishi Corporation Apparatus for data copyright management system
US6721887B2 (en) 1994-10-27 2004-04-13 Mitsubishi Corporation Data copyright management system
US6408390B1 (en) 1994-10-27 2002-06-18 Mitsubishi Corporation Apparatus for data copyright management system
US5867579A (en) 1994-10-27 1999-02-02 Mitsubishi Corporation Apparatus for data copyright management system
EP0715241B1 (en) 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
EP0709760B1 (en) 1994-10-27 2006-05-31 Intarsia Software LLC Data copyright management system
US6272635B1 (en) 1994-10-27 2001-08-07 Mitsubishi Corporation Data copyright management system
US6438694B2 (en) 1994-10-27 2002-08-20 Mitsubishi Corporation Apparatus for data copyright management system
US5646999A (en) 1994-10-27 1997-07-08 Mitsubishi Corporation Data coypright management method
US20020052850A1 (en) 1994-10-27 2002-05-02 Mitsubishi Corporation Digital content management system and apparatus
US6463536B2 (en) 1994-10-27 2002-10-08 Mitsubishi Corporation Data copyright management system
US6424715B1 (en) 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
US6128605A (en) 1994-10-27 2000-10-03 Mitsubishi Corporation Apparatus for data copyright management system
EP0715243B1 (en) 1994-11-23 2003-08-06 ContentGuard Holdings, Inc. System for controlling the distribution and use of digital works having a fee reporting mechanism
EP0719045B1 (en) 1994-12-13 2003-10-29 Mitsubishi Corporation Crypt key system for secure electronic transactions
US5740246A (en) 1994-12-13 1998-04-14 Mitsubishi Corporation Crypt key system
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
US5485577A (en) 1994-12-16 1996-01-16 General Instrument Corporation Of Delaware Method and apparatus for incremental delivery of access rights
US5606613A (en) 1994-12-22 1997-02-25 Pitney Bowes Inc. Method for identifying a metering accounting vault to digital printer
US5771383A (en) 1994-12-27 1998-06-23 International Business Machines Corp. Shared memory support method and apparatus for a microkernel data processing system
WO1996023257A1 (en) 1995-01-24 1996-08-01 Tandem Computers Incorporated Enhanced instrumentation software in fault tolerant systems
US5604800A (en) 1995-02-13 1997-02-18 Eta Technologies Corporation Personal access management system
US5982891A (en) 1995-02-13 1999-11-09 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5910987A (en) 1995-02-13 1999-06-08 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5642418A (en) 1995-02-21 1997-06-24 Bell Atlantic Network Services, Inc. Satellite television system and method
US5745572A (en) 1995-02-24 1998-04-28 International Computers Limited Cryptographic key management
US5706210A (en) 1995-03-01 1998-01-06 Fujitsu Limited Network monitoring device
WO1996027259A1 (en) 1995-03-02 1996-09-06 Signum Technologies Limited Method of and apparatus for manipulating digital data works
US5651064A (en) 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media
US5553145A (en) 1995-03-21 1996-09-03 Micali; Silvia Simultaneous electronic transactions with visible trusted parties
US5812762A (en) 1995-03-31 1998-09-22 Samsung Electronics Co., Ltd. Personal computer having card read/write controller
US5974141A (en) 1995-03-31 1999-10-26 Mitsubishi Corporation Data management system
US5835765A (en) 1995-05-31 1998-11-10 Mitsubishi Denki Kabushiki Kaisha Computer operation management system for a computer operating system capable of simultaneously executing plural application programs
US6081794A (en) 1995-06-02 2000-06-27 Mitsubishi Corporation Data copyright management system
EP0746126B1 (en) 1995-06-02 2004-12-22 Mitsubishi Corporation System for data copyright management using key distribution
US5848158A (en) 1995-06-02 1998-12-08 Mitsubishi Corporation Data copyright management system
US5818933A (en) 1995-07-07 1998-10-06 Mitsubishi Denki Kabushiki Kaisha Copyright control system
US6006328A (en) 1995-07-14 1999-12-21 Christopher N. Drake Computer software authentication, protection, and security system
US6002772A (en) 1995-09-29 1999-12-14 Mitsubishi Corporation Data management system
US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US6076077A (en) 1995-10-27 2000-06-13 Mitsubishi Corporation Data management system
US5689587A (en) 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images
EP0813133A2 (en) 1996-06-11 1997-12-17 International Business Machines Corporation A uniform mechanism for using signed content
WO1997050036A1 (en) 1996-06-27 1997-12-31 Institute Of Systems Science Computationally efficient method for trusted and dynamic digital objects dissemination
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6044367A (en) 1996-08-02 2000-03-28 Hewlett-Packard Company Distributed I/O store
US5848155A (en) 1996-09-04 1998-12-08 Nec Research Institute, Inc. Spread spectrum watermark for embedded signalling
US5765176A (en) 1996-09-06 1998-06-09 Xerox Corporation Performing document image management tasks using an iconic image having embedded encoded information
US5825892A (en) 1996-10-28 1998-10-20 International Business Machines Corporation Protecting images with an image watermark
US6519623B1 (en) 1996-10-31 2003-02-11 International Business Machines Corporation Generic semaphore for concurrent access by multiple operating systems
US6209092B1 (en) 1997-01-27 2001-03-27 U.S. Philips Corporation Method and system for transferring content information and supplemental information relating thereto
US6026430A (en) 1997-03-24 2000-02-15 Butman; Ronald A. Dynamic client registry apparatus and method
JP3265241B2 (en) 1997-09-10 2002-03-11 シャープ株式会社 Rice cooker and high frequency heating device
US6615258B1 (en) 1997-09-26 2003-09-02 Worldcom, Inc. Integrated customer interface for web based data management
US6160891A (en) 1997-10-20 2000-12-12 Sun Microsystems, Inc. Methods and apparatus for recovering keys
US7024681B1 (en) 1997-12-04 2006-04-04 Verizon Laboratories Inc. Method and apparatus for near video on demand
US6560339B1 (en) 1998-02-17 2003-05-06 Canon Kabushiki Kaisha Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method
US6574609B1 (en) 1998-08-13 2003-06-03 International Business Machines Corporation Secure electronic content management system
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US7093295B1 (en) 1998-10-15 2006-08-15 Makoto Saito Method and device for protecting digital data by double re-encryption
US6603864B1 (en) 1998-10-30 2003-08-05 Fuji Xerox Co., Ltd. Image processing apparatus and image processing method
US6851053B1 (en) 1999-03-02 2005-02-01 Microsoft Corporation Multiparty conference authentication
US6668324B1 (en) 1999-12-13 2003-12-23 Intel Corporation System and method for safeguarding data within a device
US20020122173A1 (en) 2001-03-05 2002-09-05 Donald Bruns Method and apparatus for fiber alignment using light leaked from cladding
US6874089B2 (en) 2002-02-25 2005-03-29 Network Resonance, Inc. System, method and computer program product for guaranteeing electronic transactions
JP4268844B2 (en) 2003-07-15 2009-05-27 Tdk株式会社 Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component
JP4181182B2 (en) 2006-03-08 2008-11-12 ヤンマー農機株式会社 Normal combine

Non-Patent Citations (55)

* Cited by examiner, † Cited by third party
Title
"Des Modes of Operation" U.S. FIPS Publication 81, Dec. 2, 1980, 23 pgs.
"Internet Privacy Enhanced Mail", Association for Computing Machinery, Communications of the ACM, Aug. 1993, v36, Issue 8, p. 48-61. *
Adachi, R., "Introduction to handcraft of Personal Computer" Natsume Publishing Co., 1983, pp. 141-155.
Anonymous, "Encryption of Information to be Recorded so as to Prevent Unauthorized Playback" Research Disclosure No. 335, Mar. 1992, Emsworth, GB, p. 219.
Anonymous, "Security" Government Executive, National Journal, Inc. Washington, vol. 29, issue 1, Jan. 1997, pp. 35-37.
Bellovin, S.M. et al., "Network Firewalls" IEEE Communications Magazine, vol. 32, No. 9, Oct. 1994, pp. 50-57.
Bryan, John "A look at five different firewall products and services you can install today" www.byte.com/art/9504/sec10/art6.htm, Apr. 1995.
Fitch, K. "User Authentication and Software Distribution on the Web", ausweb97@scu.edu.au Nov. 5, 1996, pp. 1-12.
Gale, Brent et al., "Satellite and Cable TV Scrambling and Descrambling" Baylin/Gale Productions, 2nd Edition, 1986, pp. 163-165.
Grampp, F.T. et al., "Unix Operating System Security" AT&T Bell Laboratories Technical Journal, vol. 63, No. 8, Oct. 1984, New York, pp. 1649-1672.
Harn, Lein, et al., "Software Authenticationn System for Information Integrity" Computers & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. II, Dec. 1, 1992, pp. 747-752, XP000332279.
Hedberg, S.R. "HP's International Cryptography Framework: Compromise or Threat?" IEEE Computer, Jan. 1997, pp. 28-30.
Komatsu, Naohisa, et al., "A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature" Electronics & Communications in Japan Part I-Communications, vol. 73, No. 5, part 1, May 1, 1990, pp. 22-33.
Lennil, P. "The IBM Microkernel Technology," OS/2 Developer, vol. 5, Nov. 1, 1993 (pp. 70-72, 74) XP000672962.
Masuoka, Fujio, "Progressing Flash Memories" Kogyo Chosa-kai Co., Chapter 1: Semiconductor Memory, pp. 34-68.
Matsumoto, Tsutomu et al., "Cryptographic Key Sharing", Technical Report of Institute of Electronics, Information and Communication Engineers (IEICE), Mar. 27, 1990, vol. 89, No. 482, pp. 33-47.
Medvinsky, Gennady et al., "Netcash: A design for practical electronic currency on the Internet" University of Southern California Information Science Institute, Nov. 1993, pp. 2-7.
Memon, Nasir, et al., "Protecting Digital Media Content" Association for Computing Machinery, Communications of the ACM, New York, Jul. 1998, vol. 41, issue 7, pp. 35-43.
Menezes, Alfred, et al., "Handbook of Applied Cryptography" 1997, sec 11.5.1, CRC Press, pp. 452-454.
Messmer, Ellen, "IETF OKs standard for encryption", Network World, Feb. 15, 1993, v10, Iss 7. *
Morizaki, H., "Introduction to Electronic Devices" Gijustsu Hyoron Publishing Co., 1989, pp. 260-266.
Murphy, Kathleen, "Digimarc Awarded Patent for Digital Watermarking" Business, Mar. 10, 1998, www.internetnews.com/bus-news/article.php/19611, 2 pgs.
Neuman, Clifford B., Proxy-Based Authorization and Accounting for Distributed Systems, Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993, pp. 283-291.
Ohtaki, Yasuhiro et al., "Cryptographic Management for Superdistribution" Technical Research Report of Electronic Information Communication Association, Mar. 8, 1991, vol. 90, No. 460, pp. 33-42.
Rozenblit, M. "Secure Software Distribution" IEEE Network Operations and Management Symposium, vol. 2, Feb. 14-18, 1994, pp. 486-496.
Rubin, A.D., "Secure Distribution of Electronic Documents in an Hostile Environment" Computer Communications, vol. 18, No. 6, Jun. 1995, pp. 429-434.
Rubin, A.D., "Trusted Distribution of Software Over the Internet" Network and Distributed System Security, Feb. 16-17, 1995, San Diego, California, pp. 47-53.
Seki, Kazunori et al., "A Proposal of a New Distribution Scheme for Software Products", Keio Department of Instrumentation Engineering, Faculty of Science and Technology, Keio University, Research report made at the information Processing Association, Japan, Jul. 20, 1993, vol. 93, No. 64, pp. 19-28.
Tatsuaki Okamoto, "Universal Electronic Cash", Technical Report of Institute of Electronics, Information and Communication Engineers (IEICE) Jul. 15, 1991, vol. 91, No. 127, pp. 39-47.
Tirkel, A.Z. et al., "Electronic Water Mark", Conference Proceedings Dicta, Dec. 1993, pp. 666-673.
U.S. Appl. No. 08/733,504, filed Oct. 18, 1996, Saito.
U.S. Appl. No. 08/846,661, filed May 1, 1997, Saito.
U.S. Appl. No. 08/895,493, filed Jul. 16, 1997, Saito.
U.S. Appl. No. 09/362,955, filed Jul. 30, 1999, Saito.
U.S. Appl. No. 09/476,334, filed Jan. 30, 2000, Saito.
U.S. Appl. No. 09/665,902, filed Sep. 20, 2000, Saito.
U.S. Appl. No. 09/985,279, filed Nov. 2, 2001, Saito.
U.S. Appl. No. 10/013,507, filed Dec. 13, 2001, Saito.
U.S. Appl. No. 11/404,124, filed Apr. 12, 2006, Saito.
U.S. Appl. No. 11/441,973, filed May 25, 2006, Saito.
U.S. Appl. No. 11/446,604, filed Jun. 1, 2006, Saito.
U.S. Appl. No. 11/480,690, filed Jul. 3, 2006, Saito.
U.S. Appl. No. 11/491,400, filed Jul. 20, 2006, Saito.
U.S. Appl. No. 11/496,035, filed Aug. 31, 2006, Saito.
U.S. Appl. No. 11/496,777, filed Jul. 31, 2006, Saito.
U.S. Appl. No. 11/512,695, filed Aug. 29, 2006, Saito.
U.S. Appl. No. 11/512,885, filed Aug. 29, 2006, Saito.
U.S. Appl. No. 11/556,992, filed Nov. 6, 2006, Saito.
U.S. Appl. No. 11/701,943, filed Feb. 1, 2007, Saito.
U.S. Appl. No. 11/701,945, filed Feb. 1, 2007, Saito.
U.S. Appl. No. 11/701,946, filed Feb. 1, 2007, Saito.
Van Schyndel, R.G., et al., "A Digital Watermark" IEEE, Australia, 1994, pp. 86-90.
Vigarie, J. "A Device for Real-Time Modification of . . ."18th International Television Symposium and Technical Exhibition, Exhibition, Montreaux, Switzerland, Jun. 10-15, 1993, pp. 761-768.
Wayner, P. "Digital Copyright Protection" AP Professional, 1997, pp. 1-7 and 14-17.
Zhang, N.X. "Secure Code Distribution" IEEE Computer, Jun. 1997, pp. 76-79.

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8554684B2 (en) 1994-04-01 2013-10-08 Intarsia Software Llc Controlling database copyrights
US8448254B2 (en) 1994-10-27 2013-05-21 Intarsia Software Llc Digital content management system and apparatus
US20070033143A1 (en) * 1995-10-27 2007-02-08 Intarsia Software Llc Digital content management system and apparatus
US9589111B2 (en) * 1997-02-28 2017-03-07 Contentguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermarking
US20140208120A1 (en) * 1997-02-28 2014-07-24 Contentguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermarking
US8005777B1 (en) 1999-11-08 2011-08-23 Aloft Media, Llc System, method and computer program product for a collaborative decision platform
US8160988B1 (en) 1999-11-08 2012-04-17 Aloft Media, Llc System, method and computer program product for a collaborative decision platform
US7970722B1 (en) 1999-11-08 2011-06-28 Aloft Media, Llc System, method and computer program product for a collaborative decision platform
US10296879B2 (en) 2005-10-11 2019-05-21 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US8306918B2 (en) * 2005-10-11 2012-11-06 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US20070083473A1 (en) * 2005-10-11 2007-04-12 Farrugia Augustin J Use of media storage structure with multiple pieces of content in a content-distribution system
US11727376B2 (en) 2005-10-11 2023-08-15 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US10417392B2 (en) 2006-05-03 2019-09-17 Apple Inc. Device-independent management of cryptographic information
US8347098B2 (en) 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US10574458B2 (en) 2007-05-22 2020-02-25 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US20120185759A1 (en) * 2011-01-13 2012-07-19 Helen Balinsky System and method for collaboratively editing a composite document

Also Published As

Publication number Publication date
JPH08272745A (en) 1996-10-18
US6272635B1 (en) 2001-08-07
USRE43599E1 (en) 2012-08-21
US5646999A (en) 1997-07-08
US20020178372A1 (en) 2002-11-28
US20010027522A1 (en) 2001-10-04
EP0709760B1 (en) 2006-05-31
EP1691315A1 (en) 2006-08-16
JP2006085725A (en) 2006-03-30
EP1691316A1 (en) 2006-08-16
US6463536B2 (en) 2002-10-08
EP0709760A2 (en) 1996-05-01
US6721887B2 (en) 2004-04-13
DE69535013T2 (en) 2006-12-28
JP4101263B2 (en) 2008-06-18
EP0709760A3 (en) 1999-02-03
DE69535013D1 (en) 2006-07-06
US6097818A (en) 2000-08-01

Similar Documents

Publication Publication Date Title
USRE41657E1 (en) Data management system
US6076077A (en) Data management system
EP0878753A2 (en) Data content dealing system
USRE42163E1 (en) Data management system
US6002772A (en) Data management system
US5974141A (en) Data management system
US6069952A (en) Data copyright management system
US6449717B1 (en) Data copyright management system
US6741991B2 (en) Data management system
US20070038575A1 (en) Data copyright management system
US9245260B2 (en) Data copyright management
US8595502B2 (en) Data management system
EP0864959A2 (en) Data management system
JP3173352B2 (en) Digital work distribution system
EP0833241B1 (en) Secure data management system
JPH08185448A (en) System and device for managing data copyright
JP4431306B2 (en) Terminal device, video conference data management method, and program
JP4531449B2 (en) Data management system
JP2010193506A (en) Data content distribution system
JP4845772B2 (en) Data management system
JP2003242286A (en) Terminal device and program

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTARSIA SOFTWARE LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:016630/0356

Effective date: 20050208

AS Assignment

Owner name: MITSUBISHI CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SAITO, MAKOTO;REEL/FRAME:018169/0524

Effective date: 19961001

XAS Not any more in us assignment database

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:018169/0468

XAS Not any more in us assignment database

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:019960/0798

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: XYLON LLC, NEVADA

Free format text: MERGER;ASSIGNOR:INTARSIA SOFTWARE LLC;REEL/FRAME:036743/0455

Effective date: 20150813

AS Assignment

Owner name: LF CAPITAL PARTNERS, LLC, FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 121 LLC;REEL/FRAME:049425/0896

Effective date: 20181219

AS Assignment

Owner name: PIRACY PROTECTION LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LF CAPITAL PARTNERS, LLC;REEL/FRAME:051364/0522

Effective date: 20190911