USRE42163E1 - Data management system - Google Patents
Data management system Download PDFInfo
- Publication number
- USRE42163E1 USRE42163E1 US11/446,604 US44660406A USRE42163E US RE42163 E1 USRE42163 E1 US RE42163E1 US 44660406 A US44660406 A US 44660406A US RE42163 E USRE42163 E US RE42163E
- Authority
- US
- United States
- Prior art keywords
- data
- user
- encrypted
- key
- label
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000013523 data management Methods 0.000 title claims description 41
- 238000000034 method Methods 0.000 claims description 76
- 238000012546 transfer Methods 0.000 claims description 50
- 238000004891 communication Methods 0.000 claims description 21
- 238000012217 deletion Methods 0.000 claims description 6
- 230000037430 deletion Effects 0.000 claims description 6
- 238000004519 manufacturing process Methods 0.000 claims 11
- 230000004044 response Effects 0.000 claims 8
- 238000012545 processing Methods 0.000 description 18
- 238000013500 data storage Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 12
- 238000007726 management method Methods 0.000 description 10
- 230000006399 behavior Effects 0.000 description 8
- 241000700605 Viruses Species 0.000 description 6
- 230000005764 inhibitory process Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32128—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44204—Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a system to ensure security of data in a computer network system. A center certifies a public-key of user of the system and distributes a secret-key. A first system comprises the center in a network, an information provider and a plurality of users. The center identifies utilization status by requests of the secret-key. The data is encrypted by the secret-key and is stored and transferred, while the data to be stored and transferred is encrypted by a secret-key different from the secret-key of the transferred data. An original data label is added to the original data, and an edit label is added to the edited data, and the center does not store the data and stores only the original data label and the edit label. A second system comprises a center and an information provider in a network, and a plurality of users utilizing the network. The center stores the original data and editing scenario, and also the original data label, user label and edit label. The data is not transferred between the users, but data label encrypted by the public-key is transferred. In electronic commerce system, every data is distributed through a mediator in the network, data which is transferred from a maker to a user is encrypted by a secret-key for encryption, and data which is transferred from the user to the maker is encrypted by a secret-key for re-encryption.
Description
This application is a Divisional of U.S. patent application Ser. No. 08/733,504 filed on Oct. 18, 1996, now U.S. Pat. No. 5,974,141, which is a continuation in part application of prior U.S. patent application Ser. No. 08/416,037 filed on Mar. 31, 1995, now abandoned.
1. Field of the Invention
The present invention relates to a data management system for managing digital data, and in particular to a system which can be applied to copyright management of copyrighted data, electronic commerce, and digital cash.
2. Background Art
As database systems store increasingly larger amount of information, database systems are becoming popular in which many computers, used to store various types of data independently, are connected via communication lines to share the data.
In such a database system, the information handled up to this point has been conventionally coded information that can be processed by a computer, and that contains a relatively small amount of information and monochrome binary data, such as facsimile information at most. And it was not possible to handle data containing a relatively large amount of information, such as data for natural pictures or animation. A technique is under development for digital processing of picture signals other than binary data which were handled only as analog signals in the past.
By digitizing the picture signal, it is possible to handle a picture signal, e.g., a television signal, by a computer. “Multimedia systems” is an emerging technology of the future capable of simultaneously handling the data handled by computers and digitized picture data.
Because picture data contains a much larger amount of information compared with character data and audio data, it is difficult to store or transfer or process the picture data by computer. For this reason, techniques for compressing or expanding picture data have been developed. Further, several standards for compression/expansion of picture data have been established. For example, the following standards have been established as common standards: JPEG point Photographic image coding Experts Group) standards for still pictures, H.261 standards for video conferences, MPEG1 (Moving Picture image coding Experts Group 1) standards for picture accumulation, and MPEG2 standards for current television broadcasting and high definition television broadcasting. These new techniques have made it possible to process digital picture data in real time.
For analog data, which has been widely used in the past, the control of copyrights during processing has not been an important issue because the quality of the analog data degrades each time the data is stored, copied, edited, or transferred. However, the quality of digital data does not degrade when the data is repeatedly stored, copied, edited, or transferred. Therefore, the management and control of copyrights during processing of digital data is an important issue.
In the past, there has been no adequate method for management and control of copyrights for digital data. It has been managed and controlled merely by copyright law or by contracts. In copyright law, only compensation for digital sound or picture recording devices has been prescribed.
It is possible not only to refer to the content of a database, but also to effectively utilize the data obtained from the database by storing, copying, or editing the data, and also transferring the edited data to the database with the edited data registered as new data. Further, it is possible to transfer edited data to other persons via an on-line means such as a communication link or via an off-line means such as a proper recording medium.
Conventional database system have dealt with only character data. However, in multimedia systems, sound data and picture data originally generated as analog data, are digitized and included in the database in addition to the other data in the database such as character data.
Under such circumstances, it is important to control copyrights of the data in the database. However, none of the prior art methods provides a complete copyright management and control for such operations as copying, editing, transferring, etc. of data.
In the past, computers have been used in relatively small scale for data communication. Computer communication system called “Internet” has shown a rapid progress in the past several years, and it is now being developed to a system closer and familiar to everybody. The information used in communication of this Internet system has been initially limited to character information only, but, with the progress of technique, audio data and picture data are now used. At present, even electronic commerce data or digital cash data, for which reliability and confidentiality are important factors, are now being used in the Internet system.
Under such circumstances, it has become necessary to establish new techniques to ensure and guarantee security to keep confidentiality and reliability of the processed data and also of the case where it is necessary to charge and collect fee.
In the information data, i.e. copyrighted data, for which fee is charged when utilizing such data, copyright is asserted in most cases, while there are information data such as personal mail, advertisement and propaganda data, etc., for which copyright is not positively asserted. For example, in case of a personal mail, for which copyright is not asserted, it is important to maintain privacy and to prevent falsification or forgery of the contents. Even in the data for advertisement and propaganda, which is usually not associated with assertion of copyright, damage or impairment may often occur due to falsification of the contents or business activities may be disturbed because of distribution of the data to the people other than those originally aimed or such trouble may be caused by false data.
As described above, it is essential in case of personal mail to stop falsification of contents, to prevent infringement of privacy and to exclude forgery. For the advertisement and propaganda data, it is necessary to prevent falsification of data contents, to restrict looking and to exclude forgery.
The prevention of infringement of privacy in the personal mail and the restriction of looking of the advertisement and propaganda data can be achieved by encryption of data. The prevention of forgery of the personal mail and the advertisement and propaganda data and the exclusion of falsification of the personal mail and the advertisement and propaganda data can be attained by confirmation (certification) of the sender or the transmitter of the data.
The Internet system is based on grass-roots concept and is a very fragile system as far as security of the system itself is concerned. Various systems for maintaining security of the Internet system have been proposed, and typical systems are PEM (Privacy Enhanced Mail) adopting hierarchical structure and PGP (Pretty Good Privacy) adopting horizontal distributed structure. These systems are effective to maintain confidentiality of data and to provide certification of the transmitting source, certification on non-falsification of the data, display of the first transmitter and control of public-key, while it is not possible by these systems to restrict re-utilization of data including data editing.
PEM, adopting hierarchical structure, comprises the most upper-level authority called IPRA (Internet PCA Registration Authority), a next upper-level authority called PCA (Policy Certification Authority), and the most lower-level authorities called Organizational, Residential and Personal respectively. Upper-level certification authorities issue a public-key certificate with digital signature on the data such as name of the lower-level authority for public-key of the lower-level authority, thus guaranteeing validity of the public-key.
PGP, adopting horizontal distributed structure, has no entity to correspond to the certification authority of PEM, and a reliable third person guarantees validity of the public-key by issuing a public-key certificate with digital signature to the data such as name of the public-key. In this PGP, there is a method called electronic fingerprinting to easily confirm the public-key. By this method, the public-key is hashed by one-way hash function such as MD 5 (Message Digest 5), and 16-byte hash value is confirmed by voice.
When PEM is compared with PGP, there is no problem on the certifier in PEM, which adopts hierarchical structure, but this is not necessarily a commonly used system in the Internet System, which is based on grass-roots concept. On the other hand, PGP is a simplified system, which can be widely used. However, this cannot be utilized in case there is no reliable person to sign.
With recent development of computer network system, individual computers, used on stand-alone basis in the past, are connected together through the network system, and database system to commonly share the data is now propagated. Further, distributed object system has been proposed, in which application program or basic software called operating system as well as data is also commonly shared through the network.
In the distributed object system, both data and software are supplied by a server as an object, which comprises program and data. In the distributed object system, there are two systems, i.e. a system called object container, in which operating system, application program and data are provided by a server and data processing and data storage are performed by a user terminal unit, which is an ordinary computer, and a system called server object, in which operating system, application program and data are provided by a server, and data processing is performed by a user terminal unit called network computer, while data storage is carried out by a server. The server object system is further developed to a system, in which data processing is also performed by the server, and the user terminal unit is provided only with input/output function, and the whole system functions as a single computer.
Another form of the network system called “license network” as rental network system, is considered. In this system, an enterprise providing network base such as communication lines also provides the systems other than communication lines such as fee charging system, security system, copyright management system, certification system, etc. And a service enterprise utilizes these services and carries out network business as if it is his own system.
In the present application, the inventor proposes a data management system for protecting copyright of digital data, for maintaining security in electronic commerce data and keeping security for digital cash data in an ordinary computer network system, a distributed object system and a license network system.
A first aspect of the data management system of the present invention comprises a data management center on a network, an original copyright owner or an information provider and a plurality of users who use the network. The data management center certifies public-key of network users, distributes secret-key for data encryption for presentation of a user label, and identifies data utilization status by the request of the secret-key. The data is stored and transferred after encrypted using the secret-key, and the data is to be stored and transferred by encryption using a secret-key different from the secret-key for the data which has been transferred. An original data label is added to original data, and an edit label is added to an edited data. The data management center does not store the data and stores only the original data label and the data relating to editing. A user label is used to request the secret key, but electronic fingerprinting of the user label may be used instead.
The second aspect of the data management system comprises a data management center on a network, an original copyright owner or an information provider and a plurality of users utilizing the network. The data management center certifies the public-key of the network users, and stores the original data and the editing scenario, and further stores the user label, the original data label and edit label. The data is not transferred between the users and the encrypted data label encrypted by the public-key is transferred. For transfer and for request of utilization, data label is used, while electronic fingerprinting of the data label may be used instead.
In electronic commerce system, every data is distributed through a mediator on a network, data which is transferred from a maker to a user is encrypted by by a secret-key for encryption, and data which is transferred from the user to the maker is encrypted by a secret-key for re-encryption.
FIG. 6A and FIG. 6B each represents a drawing for explaining encryption of object file.
FIG. 12A and FIG. 12B each represents a conceptional structure of a data management system of a fifth embodiment of the present invention.
The present invention is a digital data management system described with respect to copyright management. In the following description, numerous specific details are set forth to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention.
The following explanation is provided to illustrate various embodiments of the invention.
Certifier
In the present invention, it is necessary to have an entity which certifies copyright owner of original copyrighted data, an information provider (IP) of the original copyrighted data and a user of the original copyrighted data, and another entity which certifies those who edit the original copyrighted data. There may be a single certifier or a plurality of certifiers. When there are a plurality of certifiers, they can be virtually considered as a single entity by linking them with each other.
In this system, a set of public-key and private-key of each user and a secret-key different for each step of the use of the copyrighted data are used. Among these keys, the private-key is managed under responsibility of each user and corresponding public-key is performed digital signature by the certifier, so that the reliability is maintained. The public-key is controlled by a key management center generally called key library, and is distributed at the request of the user. It is possible to link a certifier having a certifying function with the key management center or to make the certifier also have a function of the key management center.
Crypt Key
Brief description is given below on a key system and a digital signature system used in the invention.
Secret key system is also called “common key system” because the same key is used for encryption and decryption. Because it is necessary to keep the key in secret, it is also called “secret-key system”. Typical examples of encryption algorithm that uses a secret-key are: DES (Data Encryption Standard) system of National Bureau of Standards, FEAL (Fast Encryption Algorithm) system of NTT, and MISTY system of Mitsubishi Electronic Corp. In the embodiments described below, the secret-key is referred as “Ks”.
In contrast, the public-key system is a cryptosystem which uses a public-key being made public and a private-key which is maintained in secret to those other than the owner of the key. One key is used for encryption and the other key is used for decryption. Typical example is RSA public-key system. In the embodiments described below, the public-key is referred as “Kb”, and the private-key is referred as “Kv”.
Here, the operation to encrypt a data M as data material to a cryptogram Ck using a crypt key K is expressed as:
Ck=E(M, K)
and the operation to decrypt the cryptogram Ck to the data M using a crypt key K is expressed as:
M=D(Ck, K).
Ck=E(M, K)
and the operation to decrypt the cryptogram Ck to the data M using a crypt key K is expressed as:
M=D(Ck, K).
Digital signature is a technique that applied the public-key system. In this system, a transfer source turns the data M to a hash value Hm by one-way hash function such as MD 5. Using a private-key Kv, the hash value Hm is encrypted to Chmkv and is transferred together with the data M to a transfer destination. The transfer destination decrypts the transferred encrypted hash value Chmkv to the hash value Hm using the public-key Kb and also turns the transferred data M to a hash value Hm′ using the same one-way hash function. If Hm=Hm′, it is judged that the transferred data is reliable. The hash value Hm obtained in this process can be uniquely obtained from the data M, and it is not possible to uniquely reproduce the data M from the hash value Hm.
In case the transfer source and the transfer destination can confirm each other, the reliability of the transfer data is maintained even when the hash value Hm is transferred without encrypting. This is called electronic fingerprinting, and is used for simplified certification.
Use of Keys
In the embodiments from the first to fifth (described in detail below), encryption/decryption/re-encryption of data storing inhibition of data, and storing of crypt keys are performed in devices other than those in a center. It is desirable that these operations are operated by automatically working a unique application program, by an application program contained in data, or for attaining higher security by operating system. Even higher security can be provided by performing these processings by using IC card or PC card.
Charging
To ensure to charge and collect a fee corresponding to the use of data, two methods are used: to charge a fee corresponding to the expected use prior to actual use, and to charge a fee corresponding to actual result of use after the use.
The method to charge a fee after the use can be implemented by metering post-payment in which the use results are recorded and fee is charged by checking the record of use, or by card prepayment in which a card with an amount of purchase entered in advance on it is used to subtract the entered amount corresponding to the actual use.
Further, the metering post-payment method is divided into two methods to install a recording unit on server side like charging for telephone calls and to install a recording unit on user terminal like charging electric fees.
The card prepayment method is divided into two methods in which prepayment is stored on server side as a credit card; and the prepayment is stored on user side as a prepaid card.
Storing of Keys
In the first to fourth embodiments (described in detail below), based on user information presented by the user when the user registers utilization of the system, the data management center prepares a user label and transmits it to the user. The user stores the user label, and a user's public-key, a user's private-key and a public-key of the data management center which are used in the system, in the user's own device. The optimal place for this storage is an IC card or a PC card, while it is also possible to store in a data storage unit in the device. A manner of storing crypt keys by IC card or PC card can ensure the higher security than that of managing keys by operating system.
In the following, a description is given on a system to manage data copyrights. When there are digital data other than copyrighted data, requiring confidentiality, certainty and reliability of communication contents, dealing contents, etc. such as electronic commerce data or digital cash data, the present invention can also be applied to those digital data.
In the network system using crypt key, an entity to store the crypt key and an entity to generate the crypt key are placed out of the network system and are utilized via the network system. In the embodiment described below, it is supposed that a single entity, i.e. data management center, also serves as all of these entities.
Label
In the present invention, labels are used to protect copyright of the data and to execute data copyright. First, description will be given on the labels, referring to FIGS. 1 , 2 and 3.
In this system, a user label of the system user is used. On the user label, information of the label owner is described as shown in FIG. 1A. If the label owner has the original copyright, information relating the original copyrighted data is added as shown in FIG. 1B. If the copyrighted data is an edited copyrighed data obtained by editing the original copyrighted data, information relating to the data of original copyright, information of edit tool and editing data (editing scenario) are further added as shown in FIG. 1C. It is also possible to add the edit tool (edition program) instead of the edit tool information as shown in FIG. 1D.
Among these labels, the label where only information of the label owner as shown in FIG. 1A is described is referred as “user label”, and the label with information relating copyrighted data as shown in FIG. 1B is referred to as “copyright label”, and the labels with information of the editing scenario is referred to as “edit label” as shown in FIG. 1C and FIG. 1D.
The user label is generated by the data management center according to the information of the user when the user joins the system. The copyright label is generated by the data management center when the author of the data presents the content to the data management center. The edit label is generated by the data management center, when the user who has edited the data presents the user label and the editing scenario to the data management center. These are transferred to each label owner and are stored at the data management center.
Encrypting
If the copyright label is attached to the header, it is possible to have extended label arrangement, in which a plurality of copyright labels are combined together as shown in FIG. 2D. If the label is integrated as shown in FIG. 2B , the label may not be accommodated in a single header which is limited in capacity when the copyright label becomes larger. In the extended label arrangement of combining a plurality of labels as shown in FIG. 2D , if there are too many labels, it exceeds the limit of packet size on Internet, causing difficulty in distribution.
There are the following two cases: a case where the copyright label is encrypted and used as shown in FIG. 3A and a case where it is used without being encrypted as shown in FIG. 3B. In FIGS. 3A and 3B , square framed portions show being encrypted. If the copyright label is not encrypted, the data copyrighted is encrypted.
Even when the copyright label is not encrypted, the copyright labels other than the finally added copyright label are encrypted in the extended label arrangement as shown in FIG. 2D and a multi-stage arrangement can be adopted, in which crypt key of the copyright labels added previously and encrypted is included in the copyright label added later as shown in FIG. 3C and FIG. 3D. By this arrangement, it is possible to confirm the content of the previously added copyright labels.
Data is encrypted and decrypted to protect the copyright, but encryption and decryption are tasks can put much burden on computers. If the data to be encrypted or decrypted is a text data mainly composed of characters, the burden of encryption and decryption is not so much, but if the data to be encrypted or decrypted is audio data or video data, especially moving picture data, the burden of encryption and decryption may be enormous. For this reason, even when high speed crypt algorithm is used, at present it is not practical to encrypt or decrypt in software the data other than text data i.e., moving picture data in real-time since it requires special type computer such as super-parallel type super-computer rather than generally used personal computers.
A description is now given on an arrangement of encryption and decryption of data referring to FIGS. 4A , 4B, 4C, 4D, 4E, 4F and 4G. In these figures, square framed portions are the portions to be encrypted.
In contrast, there is a method to encrypt the data header portion without encrypting the data body portion as shown in FIG. 4B. In this case, if the entire header is encrypted, the data cannot be recognized. Hence, a part of the header is not encrypted.
In order to reduce the burden in the arrangement of FIG. 4A , only the forward portion of the data body can be encrypted as shown in FIG. 4C. In this arrangement, it is only a part of the data body which must be encrypted or decrypted, and the burden of encryption and decryption is extremely reduced.
However, in the arrangement shown in FIG. 4E , the entire data body is encrypted, and the burden of encryption and decryption is very high as in the case of the arrangement shown in FIG. 4A. If the arrangement of FIG. 4E is combined together with the arrangement of FIG. 4C and only the forward portion of the data body is encrypted as shown in FIG. 4F , the burden of encryption and decryption is extremely reduced because it is necessary to encrypt or decrypt only a part of the data body.
In the arrangement of FIG. 4E , if a plurality of encrypted portions are provided in the data body as shown in FIG. 4G by combining with the arrangement of FIG. 4D , the effect is increased more.
A description regarding an encryption/decryption structure of data having general file form is provided referring to FIGS. 5A , 5B and 5C. In these figures, square framed portions are to be encrypted.
Data having a general file form consists of data body portion and data header portion, and further, copyright label connecting therewith or relating thereto, according to the present invention. FIG. 5A shows a method to use cryption in principle. Only data body is encrypted, and data label and data header are not encrypted, and similar to the arrangement of FIG. 4A , the burden of encryption and decryption is very high.
In contrast, there is a method to encrypt the data header portion without encrypting the data body portion as shown in FIG. 5B. In this case, if the entire header is encrypted, the data cannot be recognized. Hence, a part of the header is not encrypted. In this case, the copyright label also is not encrypted.
There is another method to encrypt the copyright label without encrypting the data body and data header portions as shown in FIG. 5C. In this case also, if the entire copyright label is encrypted, the relation to data which corresponds to the copyright label cannot be recognized. Hence, a part of the copyright label is not encrypted.
Further, there is a method of so-called object oriented programming performing various processings by using “object” integrated with data and program handling data, instead of a general form file consisting of data header and data body.
The object has basic conceptual structure as shown in FIG. 6A. A storing portion referred to as “slot” in an envelope referred to as “instance” accomodates data called “instance variable”. The slot is surrounded by one or more of procedures called “method” for referring, processing, binding and so on, and the instance variable can be referred to or operated only via “method”. This function is called “encapsulation”. Instruction from outside for make the “method” refer to or operate the instance variable is called “message”.
This means, in another view, the instance variable which is impossible to be referred to or operated without through “method” is protected by the “method”. Then, this can be used for encrypting the “method” and allowing the instance variable to be referred to or operated only by “message” which can decrypt the encrypted “method” as shown in FIG. 6B. In this case also, similarly to the case of data having general file form in FIG. 5C , since if entire “method” is encrypted, it is impossible to utilize “object”, a part of the “method” is not encrypted. In FIG. 6B , square framed portion is encrypted.
[Embodiment 1]
A description is given on a first embodiment referring to FIG. 7. To explain the principle, description is given first on a case where the user transfers original copyrighted data to the next user without editing it. The case where the user edits the original copyrighted data is described later.
Practically, the case where the original copyrighted data is not edited is combined with the case where the original copyrighted data is edited, and carried out as explained in the third embodiment (described below). In the system of the present embodiment, secret-key and public-key and private-key are used. Therefore, an entity to manage public-key and an entity to generate secret-key may be linked to or included in the data management center.
(1) An original author (data owner) A presents an original copyright label L0 and requests the data management center Cd to distribute an original secret-key Ks0. The original author may transfer or deposit the original copyrighted data to an information provider (IP) or to database so that the information provider or the database can play a role of the original author.
It is also possible that the original author A stores the original secret-key Ks0 and encrypts the original copyrighted data M0 without depending on the data management center Cd, while the original secret-key Ks0 must be stored at the data management center Cd to utilize the original copyrighted data M0 by the user (data user).
(2) When the distribution of the original secret-key Ks0 is requested, the data management center Cd encrypts the original secret-key Ks0 corresponding to the original copyright label L0 using a public-key Kba of the original author A:
Cks0kba=E(Ks0, Kba)
and distributes the encrypted original secret-key Cks0kba together with the original copyright label L0 to the original author A. The secret-key is hereafter, encrypted by a public-key of a distributed destination in order to be decrypted only by the distributed destination.
Cks0kba=E(Ks0, Kba)
and distributes the encrypted original secret-key Cks0kba together with the original copyright label L0 to the original author A. The secret-key is hereafter, encrypted by a public-key of a distributed destination in order to be decrypted only by the distributed destination.
In this case, the data management center Cd performs one-way hash on the original copyright label L0 using algorithm such as MD 5 and prepares an original copyright label fingerprint F0, e.g. the one having 16-byte data, and distributes it to the original author A. Thereafter, this electronic fingerprint is transferred together with the copyrighted data.
(3) When the encrypted original secret-key Cks0kba is distributed, the original author A decrypts the encrypted original secret-key Cks0kba using the private-key Kva of the original author A:
Ks0=D(Cks0kba, Kva),
encrypts the original copyrighted data M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0, Ks0),
and transfers the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprinting F0 to a first user U1.
Ks0=D(Cks0kba, Kva),
encrypts the original copyrighted data M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0, Ks0),
and transfers the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprinting F0 to a first user U1.
(4) When the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 are transferred, the first user U1 presents the original copyright label L0, the original copyright label fingerprint F0 and first user label Lu1, and requests the data management center Cd to distribute the original secret-key Ks0 and a first secret-key Ks1.
(5) When requested to distribute the original secret-key Ks0 and the first secret-key Ks1, the data management center Cd confirms validity of the presented original copyright label L0 by the original copyright label fingerprint F0, and registers the first user label Lu1. At the same time, the original secret-key Ks0 corresponding to the original copyright label L0 and the first secret-key Ks1 corresponding to the first user label Lu1 are encrypted using public-key Kb1 of the first user U1:
Cks0kb1=E(Ks0, Kb1)
Cks1kb1=E(Ks1, Kb1)
and distributes the encrypted original secret-key Csk0kb1 and the encrypted first secret-key Cks1kb1 to the first user U1.
Cks0kb1=E(Ks0, Kb1)
Cks1kb1=E(Ks1, Kb1)
and distributes the encrypted original secret-key Csk0kb1 and the encrypted first secret-key Cks1kb1 to the first user U1.
(6) When the encrypted original secret-key Csk0ksb1 and the encrypted first secret-key Cks1kb1 are distributed, the first user U1 decrypts the encrypted original secret-key Ck0kb1 and the encrypted first secret-key Cks1kb1 using private-key Kv1 of the first user U1:
Ks0=D(Csk0kb1, Kv1)
Ks1=D(Cks1kb1, Kv1).
Then, the encrypted original copyrighted data Cm0ks0 is decrypted using the decrypted original secret-key Ks0:
M0=D(Cm0ks0, Ks0)
and the decrypted original copyrighted data M0 is utilized.
Ks0=D(Csk0kb1, Kv1)
Ks1=D(Cks1kb1, Kv1).
Then, the encrypted original copyrighted data Cm0ks0 is decrypted using the decrypted original secret-key Ks0:
M0=D(Cm0ks0, Ks0)
and the decrypted original copyrighted data M0 is utilized.
In case the original copyrighted data M0 is stored or copied, it is encrypted using the decrypted first secret-key Ks1:
Cm0ks1=E(M0, Ks1).
This is stored or copied as the encrypted original copyrighted data Cm0ks1. In case the original copyrighted data M0 is to be transferred to a second user (next data user) U2, it is encrypted using the decrypted first secret-key Ks1 and is transferred together with the original copyright label L0, the original copyright label fingerprint F0 and the first user label Lu1, as the encrypted original copyrighted data Cm0ks1.
Cm0ks1=E(M0, Ks1).
This is stored or copied as the encrypted original copyrighted data Cm0ks1. In case the original copyrighted data M0 is to be transferred to a second user (next data user) U2, it is encrypted using the decrypted first secret-key Ks1 and is transferred together with the original copyright label L0, the original copyright label fingerprint F0 and the first user label Lu1, as the encrypted original copyrighted data Cm0ks1.
Each user may put digital signature which one-way hash value of the user's label is encrypted using user's private-key on the user's label to be presented to the data management center Cd. Then, the data management center decrypts the encrypted one-way hash value using the user's public-key, calculates the one-way hash value of the label and compares the two one-way hash values in order to verify validity of each user's label.
(7) When the encrypted original copyrighted data Cm0ks1, the original copyright label L0, the original copyright label fingerprint F0 and the first user label Lu1 are transferred, the second user U2 presents the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1 and the second user label Lu2, and requests the data management center Cd to distribute the first secret-key Ks1 and second secret-key Ks2.
(8) When requested to distribute the first secret-key Ks1 and the second secret-key Ks2, the data management center Cd confirms validity of the original copyright label L0 and the first user label Lu1 by the original copyright label fingerprint F0.
When it is confirmed that the first user label Lu1 is valid, the data management center Cd registers the second user label Lu2 and encrypts the first secret-key Ks1 corresponding to the first user label Lu1 and the second secret-key Ks2 corresponding to the second user label Lu2 using public-key Kb2 of the second user U2:
Cks1kb2=E(Ks1, Kb2)
Cks2kb2=E(Ks2, Kb2)
and distributes the encrypted first secret-key Cks1kb2 and the encrypted second secret-key Cks2kb2 to the second user U2.
Cks1kb2=E(Ks1, Kb2)
Cks2kb2=E(Ks2, Kb2)
and distributes the encrypted first secret-key Cks1kb2 and the encrypted second secret-key Cks2kb2 to the second user U2.
(9) When the encrypted first secret-key Cks1kb2 and the encrypted second secret-key Cks2kb2 are distributed, the second user U2 decrypts the encrypted first secret-key Cks1kb2 and the encrypted second secret-key Cks2kb2 using private-key Kv2 of the second user U2:
Ks1=D(Cks1kb2, Kv2)
Ks2=D(Cks2kb2, Kv2),
decrypts the encrypted original copyrighted data Cm0ks1 using the decrypted first secret-key Ks1:
M0=D(Cm0ks1, Ks1)
and utilizes the decrypted original copyrighted data M0.
Ks1=D(Cks1kb2, Kv2)
Ks2=D(Cks2kb2, Kv2),
decrypts the encrypted original copyrighted data Cm0ks1 using the decrypted first secret-key Ks1:
M0=D(Cm0ks1, Ks1)
and utilizes the decrypted original copyrighted data M0.
If the original copyrighted data M0 is to be stored or copied, it is encrypted using the decrypted second secret-key Ks2, and the encrypted original copyrighted data Cm0ks2 is stored or copied. If the original copyrighted data M0 is to be transferred to a third user U3, it is encrypted using the decrypted second secret-key Ks2, and the encrypted original copyrighted data Cm0ks2 is transferred to the third user U3 together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, and the second user label Lu2.
(10) When the encrypted original copyrighted data Cm0ks2 is transferred together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, and the second user label Lu2, the third user U3 presents the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, the second user label Lu2 and third user label Lu3, and requests the data management center Cd to distribute the second secret-key Ks2 and third secret-key Ks3.
(11) When requested to distribute the second secret-key Ks2 and the third secret-key Ks3, the data management center Cd confirms whether the original copyright label L0, the first user label Lu1 and the second user label Lu2 are valid or not, using the original copyright label fingerprint F0.
When it is confirmed that the second user label Lu2 is valid, the data management center Cd registers the third user label Lu3 and encrypts the second secret-key Ks2 corresponding to the second user label Lu2 and third secret-key Ks3 corresponding to the third user label Lu3 using public-key Kb3 of the third user U3:
Cks2kb3=E(Ks2, Kb3)
Cks3kb3=E(Ks3, Kb3).
Then, the encrypted second secret-key Cks2kb3 and the encrypted third secret-key Cks3kb3 are distributed to the third user U3.
Cks2kb3=E(Ks2, Kb3)
Cks3kb3=E(Ks3, Kb3).
Then, the encrypted second secret-key Cks2kb3 and the encrypted third secret-key Cks3kb3 are distributed to the third user U3.
(12) When the encrypted second secret-key Cks2kb3 and the encrypted third secret-key Cks3kb3 are distributed, the third user U3 decrypts the encrypted second secret-key Cks2kb3 and the encrypted third secret-key Cks3kb3 using private-key Kv3 of the third user U3:
Ks2=D(Cks2kb3, Kv3)
Ks3=D(Cks3kb3, Kv3)
and decrypts the encrypted original copyrighted data Cm0ks2 using the decrypted second secret-key Ks2:
M0=D(Cm0ks2, Ks2),
thus utilizes the decrypted original copyrighted data M0.
Ks2=D(Cks2kb3, Kv3)
Ks3=D(Cks3kb3, Kv3)
and decrypts the encrypted original copyrighted data Cm0ks2 using the decrypted second secret-key Ks2:
M0=D(Cm0ks2, Ks2),
thus utilizes the decrypted original copyrighted data M0.
If the original copyrighted data M0 is to be stored or copied, it is encrypted using the decrypted third secret-key Ks3, and the encrypted original copyrighted data Cm0ks3 is stored or copied. If the original copyrighted data M0 is to be transferred to a fourth user U4, it is encrypted using the decrypted third secret-key Ks3, and encrypted original copyrighted data Cm0ks3 is transferred to the fourth user U4 together with the original copyright label L0, the first user label Lu1, the second user label Lu2 and the third user label Lu3. Then, the same operation is repeated.
[Embodiment 2]
A description is provided below on a second embodiment, in which the key used to encrypt the copyrighted data is sent separately from the key used for decrypting the copyrighted data, referring to FIG. 8.
In the second embodiment, handling of keys, relation-ship between the original author, the information provider and the users as well as handling of labels are the same as in the first embodiment, and detailed description is not given here.
(1) The original author A presents the original copyright label L0 and requests the data management center Cd to distribute original secret-key Ks0.
(2) When requested to distribute the original secret-key Ks0, the data management center Cd prepares an original copyright label fingerprint F0 from the original copyright label L0, and encrypts the original secret-key Ks0 corresponding to the original copyright label L0 using public-key of the original author A:
Cks0kba=E(Ks0, Kba),
and distributes the encrypted original secret-key Cks0kba together with the original copyright label L0 to the original author A.
Cks0kba=E(Ks0, Kba),
and distributes the encrypted original secret-key Cks0kba together with the original copyright label L0 to the original author A.
(3) When the encrypted original secret-key Cks0kba is distributed, the original author A decrypts the encrypted original secret-key Cks0kba using private-key Kva of the original author A:
Ks0=D(Cks0kba, Kva)
and encrypts the original copyrighted data M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0, Ks0).
Then, the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 are transferred to the first user U1.
Ks0=D(Cks0kba, Kva)
and encrypts the original copyrighted data M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0, Ks0).
Then, the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 are transferred to the first user U1.
(4) When the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 are transferred, the first user U1 presents the original copyright label L0 and the original copyright label fingerprint F0 and first user label Lu1 and requests the data management center Cd to distribute the original secret-key Ks0.
(5) When requested to distribute the original secret-key Ks0, the data management center Cd confirms validity of the presented original copyright label L0 using the original copyright label fingerprint F0 and registers the first user label Lu1. At the same time, the original secret-key Ks0 corresponding to the original copyright label L0 is encrypted using public-key Kb1 of the first user U1:
Csk0kb1=E(Ks0, Kb1)
and the encrypted original secret-key Csk0kb1 is distributed to the first user U1.
Csk0kb1=E(Ks0, Kb1)
and the encrypted original secret-key Csk0kb1 is distributed to the first user U1.
(6) When the encrypted original secret-key Csk0kb1 is distributed, the first user U1 decrypts the encrypted original secret-key Ck0kb1 using private-key Kv1 of the first user U1:
Ks0=D(Csk0kb1, Kv1),
decrypts the encrypted original copyrighted data Cm0ks0 using the decrypted original secret-key Ks0:
M0=D(Cm0ks0, Ks0),
and utilizes the decrypted original copyrighted data M0.
Ks0=D(Csk0kb1, Kv1),
decrypts the encrypted original copyrighted data Cm0ks0 using the decrypted original secret-key Ks0:
M0=D(Cm0ks0, Ks0),
and utilizes the decrypted original copyrighted data M0.
(7) In case the original copyrighted data M0 is to be stored or copied, the original copyright label L0 and the original copyright label fingerprint F0, and the first user label Lu1 are presented again, and the distribution of the first secret-key Ks1 is requested to the data management center Cd.
(8) When requested to distribute the first secret-key Ks1, the data management center Cd confirms validity of the presented first user label Lu1 using the original copyright label fingerprint F0, and encrypts the first secret-key Ks1 corresponding to the registered first user label Lu1 using public-key Kb1 of the first user U1:
Cks1kb1=E(Ks1, Kb1)
and distributes the encrypted first secret-key Cks1kb1 to the first user U1.
Cks1kb1=E(Ks1, Kb1)
and distributes the encrypted first secret-key Cks1kb1 to the first user U1.
(9) When the encrypted first secret-key Cks1kb1 is distributed, the first user U1 decrypts the encrypted first secret-key Cks1kb1 using private-key Kv1 of the first user U1:
Ks1=D(Csk1kb1, Kv1)
and encrypts the original copyrighted data M0 using the decrypted first secret-key Ks1:
Cm0ks1=E(M0, Ks1)
Then, the encrypted original copyrighted data Cm0ks1 is stored or copied. In case the original copyrighted data M0 is to be transferred to the second user U2, it is encrypted using the decrypted first secret-key Ks1, and the encrypted original copyrighted data Cm0ks1 is transferred together with the original copyright label L0, the original copyright label fingerprint F0, and the first user label Lu1.
Ks1=D(Csk1kb1, Kv1)
and encrypts the original copyrighted data M0 using the decrypted first secret-key Ks1:
Cm0ks1=E(M0, Ks1)
Then, the encrypted original copyrighted data Cm0ks1 is stored or copied. In case the original copyrighted data M0 is to be transferred to the second user U2, it is encrypted using the decrypted first secret-key Ks1, and the encrypted original copyrighted data Cm0ks1 is transferred together with the original copyright label L0, the original copyright label fingerprint F0, and the first user label Lu1.
(10) When the encrypted original copyrighted data Cm0ks1, the original copyright label L0, the original copyright label fingerprint F0 and the first user label Lu1 are transferred, the second user U2 presents the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, and the second user label Lu2, and requests the data management center Cd to distribute the first secret-key Ks1.
(11) When requested to distribute the first secret-key Ks1, the data management center Cd confirms validity of the original copyright label L0 and the first user label Lu1 using the original copyright label fingerprint F0.
When it is confirmed that the first user label Lu1 is valid, the data management center Cd registers the second user label Lu2, encrypts the first secret-key Ks1 corresponding to the first user label Lu1 using public-key Kb2 of the second user:
Cks1kb2=E(Ks1, Kb2)
and distributes the encrypted first secret-key Cks1kb2 to the second user U2.
Cks1kb2=E(Ks1, Kb2)
and distributes the encrypted first secret-key Cks1kb2 to the second user U2.
(12) When the encrypted first secret-key Cks1kb2 is distributed, the second user U2 decrypts the encrypted first secret-key Cks1kb2 using private-key Kv2 of the second user U2:
Ks1=D(Cks1kb2, Kv2),
decrypts the encrypted original copyrighted data Cm0ks1 using the decrypted first secret-key Ks1:
M0=D(Cm0ks1, Ks1)
and utilizes the decrypted original copyrighted data M0.
Ks1=D(Cks1kb2, Kv2),
decrypts the encrypted original copyrighted data Cm0ks1 using the decrypted first secret-key Ks1:
M0=D(Cm0ks1, Ks1)
and utilizes the decrypted original copyrighted data M0.
(13) In case the original copyrighted data M0 is to be stored or copied, the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1 and the second user label Lu2 are presented again, and the distribution of second secret-key Ks2 is requested to the data management center Cd.
(14) When requested to distribute the second secret-key Ks2, the data management center Cd confirms validity of the presented second user label Lu2 using the original copyright label fingerprint F0, encrypts the second secret-key Ks2 corresponding to the registered second user label Lu2 using public-key Kb2 of the second secret-key Ks2:
Cks2kb2=E(Ks2, Kb2)
and distributes the encrypted second secret-key Cks2kb2 to the second user U2.
Cks2kb2=E(Ks2, Kb2)
and distributes the encrypted second secret-key Cks2kb2 to the second user U2.
(15) When the encrypted second secret-key Ckskb2 is distributed, the second user U2 decrypts the encrypted second secret-key Cks2kb2 using private-key Kv2 of the second user U2:
Ks2=D(Cks2kb2, Kv2),
encrypts the original copyrighted data M0 using the decrypted second secret-key Ks2:
Cm0ks2=E(M0, Ks2),
and stores or copies it as the encrypted original copyrighted data Cm0ks2. In case the original copyrighted data M0 is to be transferred to the third user U3, it is encrypted using the decrypted second secret-key Ks2, and transfers it as the encrypted original copyrighted data Cm0ks2 together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, and the second user label Lu2 to the third user U3.
Ks2=D(Cks2kb2, Kv2),
encrypts the original copyrighted data M0 using the decrypted second secret-key Ks2:
Cm0ks2=E(M0, Ks2),
and stores or copies it as the encrypted original copyrighted data Cm0ks2. In case the original copyrighted data M0 is to be transferred to the third user U3, it is encrypted using the decrypted second secret-key Ks2, and transfers it as the encrypted original copyrighted data Cm0ks2 together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, and the second user label Lu2 to the third user U3.
(16) When the encrypted original copyrighted data Cm0ks2 is transferred together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1 and the second user label Lu2, the third user U3 presents the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, the second user label Lu2 and the third user label Lu3 and requests the data management center Cd to distribute the second secret-key Ks2.
(17) When requested to distribute the second secret-key Ks2, the data management center Cd confirms whether the original copyright label L0, the first user label Lu1 and the second user label Lu2 are valid or not using the original copyright label fingerprint F0.
When it is confirmed that the second user label Lu2 is valid, the data management center Cd registers the third user label Lu3, encrypts the second secret-key Ks2 corresponding to the second user label Lu2 using public-key Kb3 of the third user U3:
Cks2kb3=E(Ks2, Kb3)
and distributes the encrypted second secret-key Cks2kb3 to the third user U3.
Cks2kb3=E(Ks2, Kb3)
and distributes the encrypted second secret-key Cks2kb3 to the third user U3.
(18) When the encrypted second secret-key Cks2kb3 is distributed, the third user U3 decrypts the encrypted second secret-key Cks2kb3 using private-key Kv3 of the third user U3:
Ks2=D(Cks2kb3, Kv3),
decrypts the encrypted original copyrighted data Cm0ks2 using the decrypted second secret-key Ks2:
M0=D(Cm0ks2, Ks2)
and utilizes the decrypted original copyrighted data M0.
Ks2=D(Cks2kb3, Kv3),
decrypts the encrypted original copyrighted data Cm0ks2 using the decrypted second secret-key Ks2:
M0=D(Cm0ks2, Ks2)
and utilizes the decrypted original copyrighted data M0.
(19) In case the original copyrighted data M0 is stored and copied, the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, the second user label Lu2 and the third user label Lu3 are presented again, and the distribution of the third secret-key Ks3 is requested to the data management center Cd.
(20) When requested to distribute the third secret-key Ks3, the data management center Cd confirms validity of the presented third user label Lu3 using the original copyright label fingerprint F0. The third secret-key Ks3 corresponding to the registered third user label Lu3 is encrypted using public-key Kb3 of the third user U3:
Cks3kb3=E(Ks3, Kb3)
and the encrypted third secret-key Cks3kb3 is distributed to the third user U3.
Cks3kb3=E(Ks3, Kb3)
and the encrypted third secret-key Cks3kb3 is distributed to the third user U3.
(21) When the encrypted third secret-key Cks3kb3 is distributed, the third user U3 decrypts the encrypted third secret-key Cks3kb3 using private-key Kv3 of the third user U3:
Ks3=K(Cks3kb3, Kv3),
encrypts the original copyrighted data M0 using the decrypted third secret-key ks3:
Cm0ks3=E(M0, Ks3),
and stores and copies it as the encrypted original copyrighted data Cm0ks3. In case the original copyrighted data M0 is transferred to the fourth user U4, it is encrypted using the decrypted third secret-key Ks3 and transfers it to the fourth user as the encrypted original copyrighted data Cm0ks3 together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, the second user label Lu2, and the third user label Lu3. Then, the same operation is repeated.
Ks3=K(Cks3kb3, Kv3),
encrypts the original copyrighted data M0 using the decrypted third secret-key ks3:
Cm0ks3=E(M0, Ks3),
and stores and copies it as the encrypted original copyrighted data Cm0ks3. In case the original copyrighted data M0 is transferred to the fourth user U4, it is encrypted using the decrypted third secret-key Ks3 and transfers it to the fourth user as the encrypted original copyrighted data Cm0ks3 together with the original copyright label L0, the original copyright label fingerprint F0, the first user label Lu1, the second user label Lu2, and the third user label Lu3. Then, the same operation is repeated.
In the above-mentioned embodiment, only the keys for decryption necessary for utilization of the copyrighted data are distributed at first. Accordingly, the operation is simplified for the user, who does not store, copy or transfer the copyrighted data.
It is also possible to simultaneously provide two systems so that the two systems can be adequately selected and utilized, i.e. a system where the keys for re-encryption is distributed at the same time as the keys for decryption as in the first embodiment, and a system where keys for re-encryption are separately distributed from those for decryption as in the second embodiment.
[Embodiment 3]
A description is provided below on a third embodiment where the user edits an original copyrighted data and transfers it to the next user, referring to FIG. 9 and FIG. 10.
The edit processing of the copyrighted data is performed by editing the original copyrighted data using a edit tool, which is an application program. The data of the edited copyrighted data obtained by editing can be expressed by data of the utilized original copyrighted data, the information of the used edit tool and the editing process data. Specifically, in case the edit tool is available, it is possible to reproduce the data of the edited copyrighted data by obtaining the original copyrighted data and the editing process data.
A description on editing digital data is provided below.
Because data is edited by using an edition program (edit tool) and thereby altering original data, edited data can be reproduced as the original data, edit tool and editing process data (editing scenario) are specified. In other words, unless the original data, edit tool and the editing scenario are specified, it is impossible to reproduce the edited data.
To produce new data from single original data, there are a case in which edited data {A′} is obtained by altering original data A; a case in which edited data {A+X} is obtained by adding data X to the original data A by a user; a case in which edited data {A″} is obtained by dividing the original data A into original data elements A1, A2, A3, . . . and changing the arrangement of the elements to such as A3, A2 and A1; and a case in which edited data {A1+X1+A2+X2+A3+X3 . . . } is obtained by dividing the original data A into original data elements A1, A2, A3, . . . , also dividing the data X of the user into X1, X2, X3, . . . and arranging these elements.
In these cases, alteration of original data, change of original data arrangement, combination of the original data with user data, and division of the original data and combination of it with the user data arise respectively a secondary exploitation right as a secondary copyright, which is necessary to be protected. The original copyright of the user, of course, exists in the data X added by the user.
To produce new data by combining a plurality of original data, there are a case in which edited data {A+B+C . . . } is obtained by simply combining original data A, B, C,. . . ; a case in which edited data such as {A+X} is obtained by adding data X to the original data A, B, C, . . . ; a case in which edited data {A1+B1+C1+ . . . +A2+B2+C2+ . . . +A3+B3+C3+ . . . } is obtained by dividing the original data A, B, C, . . . into original data elements A1, A2, A3, . . . , B1, B2, B3 . . . , and C1, C2, C3 . . . , combining them, and changing their arrangements; and a case in which edited data {A1+B1+C1+X1+ . . . +A2+B2+C2+X2+ . . . +A3+B3+C3+X3+ . . . } is obtained by dividing the original data A, B, C, . . . into original data elements A1, A2, A3, . . . , B1, B2, B3, . . . , and C1, C2, C3 . . . , combining with the elements of user data X1, X2, X3, . . . , and changing their arrangements.
Also in these cases, combination of a plurality of original data, combination of a plurality of original data with user data, division of a plurality of original data and change of the arrangements, and combination of divided plurality of original data with the user data arise respectively a secondary exploitation right as a secondary copyright, which is necessary to be protected. Also, the original copyright of the user, of course, exists in the data X1, X2, X3, . . . added by the user.
Further, there is a data linkage technique which links a plurality of data objects. In this data linkage technique, object linkage part is arranged in “slot” of data object referred to as “pad”. The “pad” is linked with other “pad” by the “slot”, the operation of which is called “slot connection” so that the objects are linked with each other.
Inter-relationship of a plurality of objects linked in this way is represented by a tree structure, and thus represented tree structure can be used for deletion or addition of the object.
While it is clear that original data and user data are data, the editing process: alteration of original data, arrangement change of original data, combination of original data with user data, division of original data and combination with user data, combination of a plurality of original data each other, combination of a plurality of original data with user data, division and arrangement change of a plurality of original data, and combination of divided plurality of original data with user data, are also data.
When noticing that editing scenario of data, such as arrangement of original data and process of editing, is also data, the secondary exploitation right on edited data can be protected by managing the user's copyright about data of editing process in addition to the original copyright of the author on the original data and the user's copyright on the user's data.
That is, it is possible to ensure to manage the copyrights of edited data as well as of original data, if it is regarded that the edited data is constituted of original data, user data and editing scenario, and thus, these original data, user data and editing scenario. In this case, the edition program used for editing data may be managed by the data management system of data copyrights, if necessary.
While the above data edition of original data can be performed by using an edition program corresponding to the original data, by handling the original data as object-oriented software which has recently been focused on, it is possible to facilitate further editing of data and manage more preferably copyrights of data. Moreover, by adopting agent-oriented software, a user can synthesize data with little labor.
The agent-oriented software, unlike the conventional one, is a program having autonomy, flexibility and cooperativeness, which is able to meet a user's request with its characteristics of autonomy, flexibility and cooperativeness in accordance with only a general instruction of the user without specifically giving every operation instruction to the software.
By incorporating the agent program into a basic system of a data copyright management system so that the database utilization of a user is monitored, and it is arranged that information including data utilization condition and charging is collected at the database or the copyright management center, using metering function placed in user terminal, and thus, it is possible to know the database utilization condition of the user at the database side or the copyright management center side and achieve more accurate copyright management. These agent program and its data are also necessary to be protected in copyrights, and therefore, are encrypted like original data.
In this third embodiment shown in FIG. 10 , the copyright label in the first and the second embodiments already described added with the editing scenario is called “edit label”, and this is treated in the same manner as the copyright label in the first embodiment.
The handling of keys, relationship between the original author, the information provider, and the user, as well as the handling of labels are the same as in the first embodiment, and detailed description is not given here.
(1) The original author A presents the original copyright label L0 and requests the data management center Cd to distribute original secret-key Ks0.
(2) When requested to distribute the original secret-key Ks0, the data management center Cd encrypts the original secret-key Ks0 corresponding to the original copyright label L0 using public-key Kba of the original author A:
Cks0kba=E(Ks0, Kba)
and distributes the encrypted original secret-key Cks0kba together with the original copyright label L0 to the original author A.
Cks0kba=E(Ks0, Kba)
and distributes the encrypted original secret-key Cks0kba together with the original copyright label L0 to the original author A.
In this case, the data management center Cd performs one-way hash to the original copyright label L0 using algorithm such as MD 5, for example, to 16-byte data amount, prepares an original copyright label fingerprint F0, and distributes it to the original author A. This electronic fingerprint is prepared on each of the original copyrighted data and edited copyrighted data each time the original copyrighted data is edited and edited copyrighted data is obtained and is transferred, together with the copyrighted data.
(3) When the encrypted original secret-key Cks0kba is distributed, the original author A decrypts the encrypted original secret-key Cks0kba using private-key Kva of the original author A:
Ks0=D(Cks0kba, Kva),
encrypts the original copyrighted data M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0, Ks0)
and transfers the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 to the first user U1.
Ks0=D(Cks0kba, Kva),
encrypts the original copyrighted data M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0, Ks0)
and transfers the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 to the first user U1.
(4) When the encrypted original copyrighted data Cm0ks0, the original copyright label L0 and the original copyright label fingerprint F0 are transferred, the first user U1 presents the original copyright label L0, the original copyright label fingerprint F0 and first user label Lu1 and requests the data management center Cd to distribute the original secret-key Ks0.
(5) When requested to distribute the original secret-key ks0, the data management center Cd confirms validity of the presented original copyright label L0 using the original copyright label fingerprint F0 and registers the first user label Lu1. At the same time, the original secret-key Ks0 corresponding to the original copyright label L0 is encrypted using public-key Kb1 of the first user U1:
Csk0kb1=E(Ks0, Kb1)
and the encrypted original secret-key Csk0kb1 is distributed to the first user U1.
Csk0kb1=E(Ks0, Kb1)
and the encrypted original secret-key Csk0kb1 is distributed to the first user U1.
(6) When the encrypted original secret-key Csk0kb1 is distributed, the first user U1 decrypts the encrypted original secret-key Csk0kb1 using private-key Kv1 of the first user U1:
Ks0=D(Csk0kb1, Kv1),
decrypts the encrypted original copyrighted data Cm0ks0 using the decrypted original secret-key Ks0:
M0=D(Cm0ks0, Ks0),
and edits the decrypted original copyrighted data M0 using the edit tool and obtains edited copyrighted data Me1.
Ks0=D(Csk0kb1, Kv1),
decrypts the encrypted original copyrighted data Cm0ks0 using the decrypted original secret-key Ks0:
M0=D(Cm0ks0, Ks0),
and edits the decrypted original copyrighted data M0 using the edit tool and obtains edited copyrighted data Me1.
The edited copyrighted data Me1 thus obtained contains copyright of the first user, who edited the data, and also copyright of the original author who prepared the original copyrighted data.
The copyright of the original author relating to the original copyrighted data M0 can be protected by the original copyright label L0 which has been registered, original copyright label fingerprint F0 and the original secret-key Ks0 corresponding to the original copyright label L0 and also by the first user label Lu1 and the first secret-key Ks1 corresponding to the first user label Lu1. However, because no key for encrypting the edited copyrighted data Me1 is available, the secondary copyright of the first user relating to the edited copyrighted data Me1 is not yet protected.
(7) To protect the secondary copyright of the first user relating to the edited copyrighted data Me1, label of the first user, who is the author of the edited copyrighted data, and its electronic fingerprinting are used in the third embodiment.
As was already described, the edited copyrighted data can be expressed by data of the utilized original copyrighted data, information of the used edit tool and the editing scenario (editing process data). Accordingly, these informations and editing scenario are entered in the first user label, i.e. the first edit label Le1.
Further, to protect secondary exploitation right as the secondary copyright in subsequent distribution process, the user U1 presents the first edit label Le1 to the data management center Cd so that the secondary exploitation right of the user U1 is registered.
(8) When the first edit label Le1 is presented, the data management center Cd confirms validity of the presented original copyright label L0 using the original copyright label fingerprint F0 and registers the first edit label Le1. At the same time, the electronic fingerprint F1 of the first edit label Le1 is prepared, and first edit secret-key Kse1 corresponding to the first edit label Le1 is encrypted by public-key Kb1 of the first user U1 at the data management center:
Ckse1kb1=E(Kse1, Kb1),
and the encrypted first edit secret-key Ckse1kb1 is distributed to the first user U1 together with the electronic fingerprint Fe1 of the first edit label Le1.
Ckse1kb1=E(Kse1, Kb1),
and the encrypted first edit secret-key Ckse1kb1 is distributed to the first user U1 together with the electronic fingerprint Fe1 of the first edit label Le1.
(9) When the encrypted first edit secret-key Ckse1kb1 and the electronic fingerprint Fe1 of the first edit label Le1 are distributed, the first user U1 decrypts the encrypted first edit secret-key Ckse1kb1 using private-key Kv1 of the first user U1:
Kse1=D(Ckse1kb1, Kv1),
encrypts the first edited copyrighted data Me1 using the decrypted first edit secret-key Kse1:
Cme1kse1=E(Me1, Kse1)
and transfers the encrypted first edited copyrighted data Cme1kse1 to the second user U2 together with the first edit label Le1, and the electronic fingerprint Fe1 of the first edit label Le1. Then, the same operation is repeated.
Kse1=D(Ckse1kb1, Kv1),
encrypts the first edited copyrighted data Me1 using the decrypted first edit secret-key Kse1:
Cme1kse1=E(Me1, Kse1)
and transfers the encrypted first edited copyrighted data Cme1kse1 to the second user U2 together with the first edit label Le1, and the electronic fingerprint Fe1 of the first edit label Le1. Then, the same operation is repeated.
In the third embodiment, only the first edit label Le1 and the electronic fingerprint Fe1 of the first edit label Le1 are transferred together with the encrypted first edited copyrighted data Cme1kse1 when edited data transfer, while it is possible to arrange in such manner that the other labels and electronic fingerprints can be simultaneously transferred.
In the editing by utilizing a plurality of copyrighted data as shown in FIG. 9 , operation is complicated because there are a large numbers of copyrighted data and it can be carried out as in the editing process using a single data. Description is not given here to avoid lengthy explanation.
In the systems of the first, the second and the third embodiments described above, the copyrighted data is encrypted using secret-key, and the secret-key for its decryption and secret-key for re-encryption used for storage, copying and transfer are distributed by the data management center based on the user label presented by the user.
The secret-key for decryption and the secret-key for re-encryption are encrypted by the user public-key, whose validity have been certified by the data management center in advance. Thus, these secret-keys are indirectly certified by the data management center. Because these secret-keys are used to encrypt the copyrighted data to be transferred, the copyrighted data to be transferred consequently is also certified by the data management center.
Because certification by the data management center is of absolute nature, it is a hierarchical type certification system represented by PEM.
On the other hand, the copyrighted data itself is transferred between the users without being transferred to the data management center, and that might well be said that the certification carried out in this process is a horizontal distributed type certification system represented by PGP.
As described above, it is possible by the system of the embodiments to attain a certification system, which has high reliability of the hierarchical type certification system and easiness to handle of the horizontal distributed type certification system.
The behavior and content of behavior of the users who utilize the copyrighted data are all identified at the data management-center by the user labels presented by the users. The utilization including editing of the copyrighted data is carried out via the data management center. Thus, the identity of the user can be reliably confirmed. By confirming the contents and course of behavior, contents and history of the copyrighted data can be certified. If this certification of the contents is applied to the electronic commerce, it is possible to certify the contents of dealings by data management center, i.e. to perform “electronic notarization”.
When digital signature is put on user label or on edit label, and if computer virus enters the user label or the edit label, the data of the label changes. As a result, hash value changes. Therefore, by verifying the digital signature, it is possible to detect intrusion of computer virus.
Even when digital signature is not given, if turning to hash value is performed, the user label or the edit label are made unavailable by the changed hash value, and intrusion of computer virus can be detected.
[Embodiment 3]
In case of distributed object system represented by license network system, the use of network computer to perform only input/output of data and data processing and not provided with data storage unit is adopted instead of conventional type computer, which possesses data storage unit of large capacity.
Further, the use of a network computer similar to a terminal unit of large size computer, having only input/output function of data and not provided with data processing unit is also considered. This network computer does not have data storage unit and cannot store or copy the copyrighted data.
Next, a description is given below on an embodiment, which can also be applied to a network computer not provided with data storage unit and used in the distributed object system. It is needless to say that this embodiment is also applicable to an ordinary computer provided with data storage unit.
To protect data copyright, it is necessary to use some sort of encryption technique to restrict unauthorized utilization of the copyrighted data. In the first, the second, and the third embodiments described above, to protect copyright in a system for an ordinary computer having data storage unit, encrypted copyrighted data and labels not encrypted as clues to utilize the copyrighted data are used.
In contrast, in a system for a network computer, which has only the function of the above-mentioned terminal unit, the copyrighted data is not stored, copied or transferred, and there is no need to encrypt the copyrighted data.
As already explained in the third embodiment, the editing of copyrighted data is performed by modifying the original copyrighted data using the edit tool, and data of the edited copyrighted data thus obtained can be expressed by the utilized original copyrighted data, information of the used edit tool and the editing scenario.
This is the same in the distributed object system. In case edited copyrighted data is produced by utilizing the copyrighted data in the database existing on the distributed object system, the edited copyrighted data can be reproduced by specifying the utilized database, the used original copyrighted data, information of the used edit tool and the editing scenario. The same applies to the case where a plurality of copyrighted data obtained from a single database or a plurality of databases are utilized.
A description is provided below on the fourth embodiment referring to FIG. 11. In this embodiment, the original copyright .owner and the information provider holding the copyrighted data are discriminated from the user who does not hold copyrighted data, and are arranged on the network side with the data management center and the like.
In the system of this embodiment, public-key and private-key are used. If original copyrighted data is transferred to a user, the original copyrighted data is encrypted by using a secret-key or a public-key of transferred destination for the purpose of security.
The first user U1 searches the copyrighted data and collects necessary copyrighted data utilizing the network, broadcasting or recording medium. The collected copyrighted data is simply stored temporarily on memory of the user U1. Even when data storage unit such as a hard disk drive is included in the device of the user U1, the copyrighted data is not stored in the data storage unit.
In order that the copyrighted data is not stored, when there is an attempt to store it, inhibition of storage of the copyrighted data is performed by destroying the copyrighted data on memory, changing data header on memory, turning the data to one-way hash value, changing file name to non-storable file name, etc.
While it is possible to inhibit the storage by data storage inhibition program, which is incorporated in the program of the copyrighted data having object structure, higher reliability is accomplished if the storage inhibition is performed by an operating system, which is related to the entire system or to the user's device.
A description is given below on a case-where a plurality of copyrighted data are utilized in the fourth embodiment.
(1), (2) The first user U1 presents the first user label Lu1 to the data management center, collects the original copyrighted data M0i (i=1, 2, 3, . . . ) from data library of the information provider IP in the system and obtains a edit tool Pe. In this case, the original copyrighted data M0i and the edit tool Pe are encrypted using public-key Kb1 of the first user U1:
Cm0ikb1=E(M0, Kb1)
Cpekb1=E(Pe, Kb1)
and the encrypted original copyrighted data Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed to the first user U1.
Cm0ikb1=E(M0, Kb1)
Cpekb1=E(Pe, Kb1)
and the encrypted original copyrighted data Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed to the first user U1.
In this case, the first user label Lu1 is referred, and utilizing conditions of the original copyrighted data M0i and the edit tool Pe are recorded at the data management center and are utilized for charging of a fee.
(3) When the encrypted original copyrighted data Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed, the first user U1 decrypts the distributed encrypted original copyrighted data Cm0ikb1 and the encrypted edit tool Cpekb1 using private-key Kv1 of the first user U1:
M0i=D(Cm0ikb1, Kv1)
Pe=D(Cpekb1, Kv1).
M0i=D(Cm0ikb1, Kv1)
Pe=D(Cpekb1, Kv1).
Using the decrypted edit tool Pe, the decrypted original copyrighted data M0i is edited, and a first edited copyrighted data M1i (i=1, 2, 3, . . . ) is obtained.
(4) Obtaining the first edited copyrighted data M1i, the first user U1 encrypts a first scenario S1i, which is the editing process data for the first edited copyrighted data M1i, using public-key Kbc of the data management center:
Cs1ikbc=E(S1i, Kbc)
and presents the encrypted first scenario Cs1ikbc together with the first user label Lu1 to the data management center, so that secondary copyright of the user U1 is registered.
Cs1ikbc=E(S1i, Kbc)
and presents the encrypted first scenario Cs1ikbc together with the first user label Lu1 to the data management center, so that secondary copyright of the user U1 is registered.
(5) When the encrypted first scenario Cs1ikbc is presented, the data management center Cd decrypts the encrypted first scenario Cs1ikbc using private-key Kvc of the data management center:
S1i=D(Cs1ikbc, Kvc),
prepares a first edit label Le1 based on the presented user label of the first user U1 and the decrypted first scenario S1i, stores it in the data management center Cd, encrypts the first edit label Le1 using public-key Kb1 of the first user U1:
Cle1kb1=E(Lei, Kb1),
and transfers the encrypted first edit label Cle1kb1 to the first user U1.
S1i=D(Cs1ikbc, Kvc),
prepares a first edit label Le1 based on the presented user label of the first user U1 and the decrypted first scenario S1i, stores it in the data management center Cd, encrypts the first edit label Le1 using public-key Kb1 of the first user U1:
Cle1kb1=E(Lei, Kb1),
and transfers the encrypted first edit label Cle1kb1 to the first user U1.
(6) When the encrypted first edit label Cle1kb1 is transferred, the first user U1 decrypts the encrypted first edit label Cle1kb1 using private-key Kv1 of the first user U1:
Le1=D(Cle1kb1, Kv1),
encrypts the decrypted first edit label Le1 using public-key Kb2 of the second user U2:
Cle1kb2=E(Le1, Kb2)
and transfers the encrypted first edit label Cle1kb2 to the second user U2, but the first edited copyrighted data M1i or the encrypted first edited copyrighted data is not transferred to the second user U2.
Le1=D(Cle1kb1, Kv1),
encrypts the decrypted first edit label Le1 using public-key Kb2 of the second user U2:
Cle1kb2=E(Le1, Kb2)
and transfers the encrypted first edit label Cle1kb2 to the second user U2, but the first edited copyrighted data M1i or the encrypted first edited copyrighted data is not transferred to the second user U2.
When the computer of the first user U1 is provided with a data storage unit, there is possibility that the collected copyrighted data or the edited copyrighted data may be stored in the storage unit, however, storage inhibition as described above is carried out to exclude storage, copying and transfer.
In this case, it is possible, instead of the encrypted first edit label Cle1kb2, to use electronic fingerprint F1, which is obtained by turning the first edit label to one-way hash value. In so doing, it is possible to perform simplified transfer of the edit label by telephone voice.
(7) When the encrypted first edit label Cle1kb2 is transferred, the second user U2 decrypts the transferred encrypted first edit label Cle1kb2 using the private-key Kv2 of the second user U2:
Le1=D(Cle1kb1, Kv2),
encrypts the first edit label Le1 using the private-Key Kv2 of the second user U2:
Cle1kv2=E(Le1, Kv1)
and presents the encrypted first edit label Cle1kv2 together with the second user label Lu2 to the data management center Cd.
Cle1kv2=E(Le1, Kv1)
and presents the encrypted first edit label Cle1kv2 together with the second user label Lu2 to the data management center Cd.
(8) When the encrypted first edit label Cle1kv2 and the second user label Lu2 are presented, the data management center Cd decrypts the presented encrypted first edit label Cle1kv2 using public-key Kb2 of the second user U2:
Le1=D(Cle1kv2, Kb2),
collects the original copyrighted data M0i shown on the decrypted first edit label Le1, edits the original copyrighted data M0i using the edit tool Pe based on the first scenario S1i described on the first edit label Le1, and reproduces the first edited copyrighted data M1i.
Le1=D(Cle1kv2, Kb2),
collects the original copyrighted data M0i shown on the decrypted first edit label Le1, edits the original copyrighted data M0i using the edit tool Pe based on the first scenario S1i described on the first edit label Le1, and reproduces the first edited copyrighted data M1i.
When the first edited copyrighted data M1i is reproduced, the data management center Cd encrypts the first edited copyrighted data M1i and the edit tool Pe using the public-key Kb2 of the second user U2:
Cm1ikb2=E(M1i, Kb2)
Cpekb2=E(Pe, Kb2)
and transfers the encrypted first edited copyrighted data Cm1ikb2 and the encrypted edit tool Cpekb2 to the second user U2.
Cm1ikb2=E(M1i, Kb2)
Cpekb2=E(Pe, Kb2)
and transfers the encrypted first edited copyrighted data Cm1ikb2 and the encrypted edit tool Cpekb2 to the second user U2.
(9) When the encrypted first edited copyrighted data Cm1ikb2 and the encrypted edit tool Cpekb2 are distributed, the second user U2 decrypts the distributed encrypted first edited copyrighted data Cm1ikb2 and the encrypted edit tool Cpekb2 using private-key Kv2 of the second user U2:
M1i=D(Cm1ikb2, Kv2)
Pe=D(Cpekb2, Kv1)
and edits the decrypted first edited copyrighted data M1i using the decrypted edit tool Pe, and the second edited copyrighted data M2i (i=1, 2, 3, . . . ) is obtained.
M1i=D(Cm1ikb2, Kv2)
Pe=D(Cpekb2, Kv1)
and edits the decrypted first edited copyrighted data M1i using the decrypted edit tool Pe, and the second edited copyrighted data M2i (i=1, 2, 3, . . . ) is obtained.
(10) When the second edited copyrighted data M2i is obtained, the second user U2 encrypts the second scenario S2i, which is editing process data of the second edited copyrighted data M2i, using the public-key Kbc of the data management center:
Cs2ikbc=E(S2i, Kbc)
and presents the encrypted second scenario Cs2ikbc together with the second user label Lu2 to the data management center Cd.
Cs2ikbc=E(S2i, Kbc)
and presents the encrypted second scenario Cs2ikbc together with the second user label Lu2 to the data management center Cd.
(11) When the encrypted second scenario Cs2ikbc is presented, the data management center Cd decrypts the encrypted second scenario Cs2ikbc using the private-key Kvc of the data management center Cd:
S2i=D(Cs2ikbc, Kvc),
prepares a second edit label Le2 based on the presented user label of the second user and the decrypted second scenario S2i, stores it in the data management center Cd, encrypts the second edit label Le2 using public-key Kb2 of the second user U2:
Cle2kb2=E(Le2, Kb2)
and transfers the encrypted second edit label Cle2kb2 to the second user U2.
S2i=D(Cs2ikbc, Kvc),
prepares a second edit label Le2 based on the presented user label of the second user and the decrypted second scenario S2i, stores it in the data management center Cd, encrypts the second edit label Le2 using public-key Kb2 of the second user U2:
Cle2kb2=E(Le2, Kb2)
and transfers the encrypted second edit label Cle2kb2 to the second user U2.
(12) When the encrypted second edit label Cle2kb2 is transferred, the second user U2 decrypts the encrypted second edit label Cle2kb2 using private-key Kv2 of the second user U2:
Le2=D(Cle2kb2, Kv2),
encrypts the decrypted second edit label Le2 using public-key Kb3 of the third user U3:
Cle2kb3=E(Le2, Kb3)
and transfers the encrypted second edit label Cle2kb3 to the third user U3. Then, the same operation is repeated.
Le2=D(Cle2kb2, Kv2),
encrypts the decrypted second edit label Le2 using public-key Kb3 of the third user U3:
Cle2kb3=E(Le2, Kb3)
and transfers the encrypted second edit label Cle2kb3 to the third user U3. Then, the same operation is repeated.
In the fourth embodiment using this distributed object system, the copyrighted data is not stored by the user, but it is stored only in the database. On the other hand, the user controls and stores only the information relating to user and editing, i.e. the edit label having information of the utilized original copyrighted data and the used edit tool, the editing scenario and the information of the user who has edited. Only this edit label is encrypted and transferred between the users. Therefore, the copyrighted data is not stored, copied or transferred.
Also, in the system of this embodiment, only the public-key and the private-key are used, and validity of this public-key is certified by the data management center in advance, and certification by the data management center is of absolute nature. Accordingly, it is a hierarchical type certification system represented by PEM.
The edit label to be transferred is encrypted by the user's public-key, the validity of which has been certified in advance, by the data management center, and it is transferred. Thus, its contents are reliable as it is indirectly certified by the data management center.
The edit label itself is transferred between the users without being transferred to the data management center, and it might well be said that it is horizontal distributed type certification system represented by PGP.
As described above, it is possible according to the system of this embodiment to attain a certification system, which has high reliability of the hierarchical type certification system and easiness to handle of the horizontal distributed type certification system.
Behavior and contents of behavior of the users utilizing the copyrighted data are all identified by the user label presented by the users at the data management center. The utilization including editing of the copyrighted data is carried out through the data management center. Accordingly, the identity of each user can be reliably confirmed, and by confirming the contents and the course of behavior, contents and history of the copyrighted data can be certified. When this certification of contents is applied to electronic commerce, it is possible to certify the contents of dealing by the data management center, i.e. to perform “electronic notarization”.
Further, in case digital signature is put on the user label or on the edit label, and if computer virus enters the user label or the edit label, the data of the label is changed, and as a result, change occurs in the hash value. Therefore, by verifying digital signature, it is possible to detect intrusion of computer virus.
Even when digital signature is not given, if turning to hash value is performed, the user label or the edit label are made unavailable depending upon the changed hash value. Thus, it is possible to detect intrusion of computer virus.
Because behavior and contents of behavior of the users utilizing the copyrighted data are all identified by the user label presented by the users at the data management center, every charging system on the above functions effectively.
[Embodiment 5]
An embodiment in which a system of the present invention is applied to the electronic commerce will be given. A basic case is at first, explained in which all of the processings are performed through mediator as a data management center, referring to FIG. 12A.
(1) User U looks a products catalogue of the mediator S via network, and requests the mediator S electronic commerce data Qm as dealing data including quotation for desired products and information of order form and payment terms.
(2) When requested the electronic commerce data Qm, the mediator S encrypts a request R of the electronic commerce data Qm and first secret-key Ks1 by using public-key Kbm of maker M:
Crkbm=E(R, Kbm)
Cks1kbm=E(Ks1, Kbm)
and transfers encrypted request Crkbm and encrypted first secret-key Cks1kbm to the maker M.
Crkbm=E(R, Kbm)
Cks1kbm=E(Ks1, Kbm)
and transfers encrypted request Crkbm and encrypted first secret-key Cks1kbm to the maker M.
(3) When received the encrypted request Crkbm and encrypted first secret-key Cks1kbm, the maker M decrypts the transferred encrypted request Crkbm and encrypted first secret-key Cks1kbm by private-key Kvm of the maker M:
R=E(Crkbm, Kvm)
Ks1=E(Cks1kbm, Kvm)
encrypts electronic commerce data Qm corresponding to the request R by using decrypted first secret-key Ks1:
Cqmks1=E(Am, Ks1)
and transfers encrypted electronic commerce data Cqmks1 to the mediator S.
R=E(Crkbm, Kvm)
Ks1=E(Cks1kbm, Kvm)
encrypts electronic commerce data Qm corresponding to the request R by using decrypted first secret-key Ks1:
Cqmks1=E(Am, Ks1)
and transfers encrypted electronic commerce data Cqmks1 to the mediator S.
(4) When received the encrypted electronic commerce data Cqmks1, the mediator S decrypts transferred encrypted electronic commerce data Cqmks1 by using the first secret-key Ks1:
Qm=D(Cqmks1, Ks1),
encrypts again the decrypted electronic commerce data Qm by using second secret-key Ks2:
Cqmks2=E(Qm, Ks2),
encrypts second secret-key Ks2 by using public-key Kbu of the user:
Cks2kbu=E(Ks2, Kbu)
and transfers encrypted electronic commerce data Cqmks2 and encrypted second secret-key Cks2kbu to the user U.
Qm=D(Cqmks1, Ks1),
encrypts again the decrypted electronic commerce data Qm by using second secret-key Ks2:
Cqmks2=E(Qm, Ks2),
encrypts second secret-key Ks2 by using public-key Kbu of the user:
Cks2kbu=E(Ks2, Kbu)
and transfers encrypted electronic commerce data Cqmks2 and encrypted second secret-key Cks2kbu to the user U.
(5) When received encrypted electronic commerce data Cqmks2 and encrypted second secret-key Cks2kbu, the user U decrypts encrypted second secret-key Cks2kbu by using private-key Kvu of user U:
Ks2=D(Cks2kbu, Kvu),
decrypts encrypted electronic commerce data Cqmks2 by using decrypted secret-key Ks2:
Qm=D(Cqmks2, Ks2),
edits electronic commerce data by entering order contents into electronic commerce data, makes order sheet Qu, encrypts the order sheet Qu, thus filled in, by using the second secret-key Ks2:
Cquks2=E(Qu, Ks2)
and transfers encrypted order sheet Cquks2 to mediator S.
Ks2=D(Cks2kbu, Kvu),
decrypts encrypted electronic commerce data Cqmks2 by using decrypted secret-key Ks2:
Qm=D(Cqmks2, Ks2),
edits electronic commerce data by entering order contents into electronic commerce data, makes order sheet Qu, encrypts the order sheet Qu, thus filled in, by using the second secret-key Ks2:
Cquks2=E(Qu, Ks2)
and transfers encrypted order sheet Cquks2 to mediator S.
(6) When received encrypted order sheet Cquks2, mediator S decrypts the encrypted order sheet Cquks2 by using the second secret-key Ks2:
Qu=D(Cquks2, Ks2),
encrypts decrypted order sheet Qu by using public-key Kbm of the maker M:
Cqukbm=(Qu, Kbm)
and transfers encryptd order sheet Cqukbm to the maker M.
Qu=D(Cquks2, Ks2),
encrypts decrypted order sheet Qu by using public-key Kbm of the maker M:
Cqukbm=(Qu, Kbm)
and transfers encryptd order sheet Cqukbm to the maker M.
When received encryptd order sheet Cqukbm, the maker M decrypts encryptd order sheet Cqukbm by using private-key Kvm of maker M:
Qu=E(Cqukbm, Kvm)
and the order is accepted and handled according to order contents of the decrypted order sheet Qu.
Qu=E(Cqukbm, Kvm)
and the order is accepted and handled according to order contents of the decrypted order sheet Qu.
Next, an example of exceptional case when a user orders directly to a maker will be explained, referring to FIG. 12B. In the exceptional case, steps before above-mentioned (4), in which encrypted electronic commerce data Cqmks2 and encrypted second secret-key Cks2kbu are transferred to user U, are same steps as basic case as shown in FIG. 12A. And therefore, same detailed description is not given here, and description of steps different from basic case is given.
(7) When received encrypted electronic commerce data Cqmks2 and encrypted second secret-key Cks2kbu, the user U decrypts encrypted second secret-key Cks2kbu by using private-key Kvu of the user U:
Ks2=D(Cks2kbu, Kvu),
decrypts encrypted electronic commerce data Cqmks2 by using decrypted second secret-key Ks2:
Qm=D(Cqmks2, Ks2),
enters order contents into decrypted electronic commerce data Qm, i.e., performing data editing, makes order sheet Qu, encrypts the order sheet Qu, thus filled in, by using the second secret-key Ks2:
Cquks2=E(Qu, Ks2)
and transfers encrypted order sheet Cquks2 to the maker M.
Ks2=D(Cks2kbu, Kvu),
decrypts encrypted electronic commerce data Cqmks2 by using decrypted second secret-key Ks2:
Qm=D(Cqmks2, Ks2),
enters order contents into decrypted electronic commerce data Qm, i.e., performing data editing, makes order sheet Qu, encrypts the order sheet Qu, thus filled in, by using the second secret-key Ks2:
Cquks2=E(Qu, Ks2)
and transfers encrypted order sheet Cquks2 to the maker M.
(8) When received encrypted order sheet Cquks2, the maker M transfers the encrypted order sheet Cquks2 to the mediator S.
(9) When received encrypted order sheet Cquks2, the mediator S decrypts the encrypted order sheet Cquks2 by using second secret-key Ks2:
Qu=D(Cquks2, Ks2),
encrypts decrypted order sheet Qu by using public-key Kbm of maker M:
Cqukbm=E(Qu, Kbm)
and transfers it to the maker M.
Qu=D(Cquks2, Ks2),
encrypts decrypted order sheet Qu by using public-key Kbm of maker M:
Cqukbm=E(Qu, Kbm)
and transfers it to the maker M.
When received encrypted order sheet Cqukbm, the maker M decrypts the encrypted order sheet Cqukbm by using private-key Kvm of maker M:
Qu=D(Cqukbm, Kvm)
and handles the order according to contents of the order sheet Qu.
Qu=D(Cqukbm, Kvm)
and handles the order according to contents of the order sheet Qu.
In this electronic commerce system, computer software handled via network other than commercial products, can be also applied in dealings. In this case, software P is encrypted by maker M by using private-key Kvm of the maker M:
Cpkvm=E(P, Kvm),
encrypted software Cpkvm is transferred to mediator S, encrypted software Cpkvm, thus transferred, is decrypted by the mediator S by using public-key Kbm of maker M:
P=D(Cpkvm, Kbm),
decrypted software P is encrypted by the mediator S by using public-key Kbu of user U:
Cpkbu=E(P, Kbu),
encrypted software Cpkbu is transferred to the user U, and the transferred encrypted software Cpkbu is decrypted by the user U by using private-key Kvu of user U:
P=D(Cpkbu, Kvu).
Cpkvm=E(P, Kvm),
encrypted software Cpkvm is transferred to mediator S, encrypted software Cpkvm, thus transferred, is decrypted by the mediator S by using public-key Kbm of maker M:
P=D(Cpkvm, Kbm),
decrypted software P is encrypted by the mediator S by using public-key Kbu of user U:
Cpkbu=E(P, Kbu),
encrypted software Cpkbu is transferred to the user U, and the transferred encrypted software Cpkbu is decrypted by the user U by using private-key Kvu of user U:
P=D(Cpkbu, Kvu).
Crypt keys for encrypted software which is stored in recording medium such as CD-ROM are distributed free, and the crypt keys can be further, applied in dealings in the electronic commerce system, in the manner of similar way for computor software described above.
In the basic case as described referring to FIG. 12A , since all of the dealing processings are performed through the mediator, various troubles caused in omitting the mediator among dealing processes can be previously prevented.
In exceptional case as described referring to FIG. 12B , further, in order that the maker receives the content of order sheet and handles the order, it is necessary that encrypted order sheet is transferred to the mediator and decrypted by the mediator. Therefore, the mediator takes part in the dealing processes without fail in this case also, and thus, various troubles caused in omitting the mediator among dealing processes can be previously prevented. The secret-key which is transferred, may be transferred incorporated in electronic commerce data other than transferred alone.
In each embodiment described hereinbefore, while data or label is encrypted/decrypted, the burden of encryption and decryption is rather high. In case that the data and label are transferred via network, these are encrypted by secret-key and in addition, are encrypted by public-key. Therefore, in order to utilize the transferred data and label, these are necessary to be decrypted by private-key and in addition, to be decrypted by secret-key.
In order to reduce the burden of encryption and decryption, while partly encrypting is described as shown in FIGS. 4A to 4G, if the processing ability of the user device is not high, even when partly encrypting, performing both processings of encryption/decryption by secret-key system, which is for copyright management, and encryption/decryption by public-key system, which is for data security, is yet difficult.
To cope with the above problems, encryption/decryption, which is processing other than encryption/decryption for protecting transferred data or label, may be performed, for example, by an entity in the network, and encrypted/decrypted data or label is transferred to a user.
While encryption/decryption for protecting transferred data or label is performed generally by public-key cryptosystem, this encryption/decryption is performed by a device of user.
Above processing of encryption/decryption performed by an entity in the network may be applied to the case of reproduction of edited copyrighted data in the third and forth embodiments.
In the third embodiment, encrypted copyrighted data and non-encrypted edit label including editing scenario are transferred from one user to next user. The non-encrypted edit label and corresponding secret-key are stored in data management center. The next user transfers transferred encrypted copyrighted data and non-encrypted edit label to the data management center, and therefore, the copyrighted data is decrypted, and thus, edited copyrighted data is reproduced based on decrypted copyrighted data and the edit label. Then, the edited copyrighted data is transferred to the next user.
In the fourth embodiment, encrypted edit label including editing scenario is only transferred from a user to next user. In contrast, the edit label is stored in the data management center. And therefore, the data management center, by transferred encrypted edit label to the data management center by the next user, collects necessary original data based on the edit label and reproduces edited copyrighted data, and then, transfers the edited copyrighted data to the next user.
It is understood that particular embodiments described herein should not limit the present invention thereby. This invention can be practiced in connection with any data management system.
Thus, a database copyright control system has been described, which is applicable to multimedia system.
Claims (91)
1. A system for managing digital data to be transferred from an owner of data to a user of data via broadcast, a communication network or data recording medium , said system comprising:
storage storing public-keys, private-keys, user labels and edit labels used in the data management system;
a data management center and the owner linked to a public-key the storage, and arranged on said a communication network;
wherein said data management center is configured to certifying public-keys of said owner and said presented by users of said system and storing said is further configured to access a first user label and said a first edit label associated with a first set of digital data;
a first user device configured to obtain ing said first set of digital data from said communication network by presenting said first user label to use said first set of digital data, wherein said first user device is further configured to edit ing the first set of digital data, and obtaining said first edit label from said data management center via said communication network by presenting said first user label and an editing scenario, ;
wherein said first set of digital data is not only temporarily stored in a said first user device of each of said user after using e of said first set of digital data by a first user, and wherein said first user device is configured to transfer said first edit label is transferred to a next user without said digital data for the next user's use of the edited said first set of digital data, wherein the first set of digital data is not transferred to the next user.
2. A data management system according to claim 1 , wherein said first set of digital data is not stored in the device of said user removed from the first user device by deletion of said first set of digital data from random access memory of the first user device.
3. A data management system according to claim 1 , wherein said first set of digital data is not stored in removed from a memory of the first user device of said user after said first set of digital data is converted to a one-way hash value.
4. A data management system according to claim 1 , wherein said data management center is further linked configured to generate a secret-key generator , and said first set of digital data is encrypted by using a the secret-key of said secret-key generator and stored in the device of said user .
5. A data management system according to claim 1 , wherein said first edit label is encrypted by using a public-key of said next user, and is transferred to said next user;
said next user decrypts the encrypted first edit label by using private-key of said next user and presents said decrypted first edit label to said data management center;
said data management center is configured to transfers the first set of digital data to said next user based on said first edit label;
said next user uses and edits said first set of digital data by using the editing scenario included in said first edit label.
6. A data management system according to claim 1 , wherein said first user transfers said first edit label to said next user;
said next user presents said first edit label to said data management center;
said data management center transfers said first set of digital data to said next user based on said first edit label;
said next user uses and edits said first set of digital data by using the editing scenario included in said first edit label.
7. A data management system according to claim 6 , wherein said first user performs device is configured to append a digital signature to said first edit label by using private-key of said first user.
8. A data management system according to claim 1 wherein there are a plurality of said digital data includes a plurality of sets of digital data.
9. A data management system according to claim 1 wherein the data management center is configured to charging e a data usage fee is performed by presenting said to the first user based on the first user label presented to said data management center by said first user.
10. A data management system according to claim 9 , wherein the charging a fee is performed by metering post-payment method after usage of the first set of digital data and is based on use results metering of said usage.
11. A data management system according to claim 10 , wherein the metering data based on use results said metering is stored in said data management center.
12. A data management system according to claim 10 , wherein the metering data based on use results said metering is stored in a said first user device of said user .
13. A data management system according to claim 9 , wherein the charging fee is performed by prepayment method prior to usage of said first set of digital data.
14. A data management system according to claim 13 , wherein the prepayment data relating to said charging is stored in said data management center.
15. A data management system according to claim 13 , wherein the prepayment data relating to said charging is stored in a said first user device of said user .
16. A data management system according to claim 1 wherein said first set of digital data has a general file structure and only a data body thereof only is encrypted.
17. A data management system according to claim 16 , wherein a part of said data body is encrypted.
18. A data management system according to claim 17 , wherein the part of said data body with encryption is repeatedly arranged in said data body.
19. A data management system according to claim 17 , wherein a plurality of parts of said data body with encryption is intermittently arranged in said data body.
20. A data management system according to claim 1 wherein said first set of digital data has a general file structure, and a data header and a data body thereof are encrypted.
21. A data management system according to claim 20 , wherein only a part of said data header and the entire part of said data body are encrypted.
22. A data management system according to claim 20 , wherein a part of said data header and a part of said data body are encrypted respectively.
23. A data management system according to claim 1 wherein said first set of digital data has a general file structure and only a data header thereof only is encrypted.
24. A data management system according to claim 23 , wherein the entire part of said data header is encrypted.
25. A data management system according to claim 23 , wherein only a part of said data header only is encrypted.
26. A data management system according to claim 1 , wherein said first set of digital data has a general file structure that includes said first user label, and wherein only said first user label is encrypted.
27. A data management system according to claim 26 , wherein only a part of said first user label is encrypted.
28. A data management system according to claim 1 wherein said first set of digital data has an object-formed file structure, and only a method is encrypted.
29. A system for electronic commerce between a maker and a user via a mediator, said system comprising:
a maker system including at least one computer system;
a user system including at least one computer system; and
a mediator system including at least one computer system;
said mediator system is linked to a first entity to manage public-keys and a second entity to generate secret-keys and is arranged on a communication network;
said user system is configured to requests electronic commerce data from said mediator system;
said mediator system is configured to transfers the request of said electronic commerce data together with a first secret-key of said second entity, which are encrypted by using a public-key of said maker system, to said maker system;
said maker system is configured to decrypts the encrypted first secret-key by using a private-key of said maker and system, encrypts said electronic commerce data using the decrypted first secret-key and transfers encrypted electronic commerce data to said mediator system;
said mediator system is configured to decrypts said encrypted electronic commerce data using said first secret-key, re-encrypts decrypted electronic commerce data using a second secret-key of said second entity, and transfers the re-encrypted electronic commerce data together with the second secret-key, which are encrypted using a public-key of said user system, to said user system;
said user system is configured to decrypts the encrypted second secret-key using a private-key of said user system, decrypts the re-encrypted electronic commerce data using the decrypted second secret-key, makes an order sheet by entering order content into the decrypted electronic commerce data, encrypts said order sheet using the second secret-key, and transfers the encrypted order sheet to said mediator system;
said mediator system is configured to decrypts said encrypted order sheet using said second secret-key, encrypt s the decrypted order sheet using the public-key of said maker system, and transfer s the encrypted order sheet to said maker system; and
said maker system is configured to decrypts the encrypted order sheet using the private-key of said maker , system and makes an order acceptance.
30. An electronic commerce system according to claim 29 , wherein said electronic commerce data has a general file structure and only a data body thereof is encrypted.
31. An electronic commerce system according to claim 30 , wherein a part of said data body is encrypted.
32. An electronic commerce system according to claim 31 , wherein the part of said data body with encryption is repeatedly arranged in said data body.
33. An electronic commerce system according to claim 31 , wherein a plurality of parts of said data body with encryption is intermittently arranged in said data body.
34. An electronic commerce system according to claim 29 , wherein said electronic commerce data has a general file structure, and a data header and a data body thereof are encrypted.
35. An electronic commerce system according to claim 34 , wherein only a part of said data header and the entire part of said data body are encrypted.
36. An electronic commerce system according to claim 34 , wherein a part of said data header and a part of said data body are encrypted respectively.
37. An electronic commerce system according to claim 29 , wherein said electronic commerce data has a general file structure and only a data header thereof is encrypted.
38. An electronic commerce system according to claim 37 , wherein the entire part of said data header is encrypted.
39. An electronic commerce system according to claim 37 , wherein only a part of said data header only is encrypted.
40. An electronic commerce system according to claim 29 , wherein said electronic commerce data has a general file structure and only label is encrypted.
41. An electronic commerce system according to claim 40 , wherein a part of said label only is encrypted.
42. An electronic commerce system according to claim 29 , wherein said electronic commerce data has an object-formed file structure and a method is encrypted.
43. A method, comprising:
certifying one or more public-keys of a first user;
said first user obtaining digital data from a communication network by presenting a user label to use said digital data, editing the digital data, and obtaining an edit label from said communication network by presenting said user label and an editing scenario;
not storing said digital data in a device of each of one or more users after using said digital data; and
transferring said edit label to a next user without said digital data for the next user's use of said digital data.
44. A method according to claim 43 , wherein said digital data is not stored in the device of said one or more users by deletion of said digital data.
45. A method according to claim 43 , wherein said digital data is not stored in the device of said one or more users after said digital data is converted to a one-way hash value.
46. A method according to claim 43 , further comprising encrypting said edit label by using a public-key of said next user, and transferring the encrypted edit label to said next user.
47. A method according to claim 43 , further comprising said first user performing digital signature to said edit label by using a private-key of said first user.
48. A method according to claim 43 , further comprising said one or more users paying a fee based on presenting said user label to a data management center by said one or more users.
49. A method according to claim 43 , wherein said digital data has a general file structure and at least a portion of a data body thereof only is encrypted.
50. A method according to claim 43 , wherein said digital data has a general file structure, and at least a portion of a data header and at least a portion of a data body thereof are encrypted.
51. A method according to claim 43 , wherein said digital data has a general file structure and at least a portion of a data header thereof only is encrypted.
52. A method according to claim 43 , wherein said digital data has a general file structure, and only at least a portion of said user label is encrypted.
53. A method according to claim 43 wherein said digital data has an object-formed file structure, and only at least a portion of a method surrounding a slot in said object-formed file structure is encrypted.
54. An apparatus, comprising:
means for certifying one or more public-keys of a first user;
means for said first user obtaining digital data from a communication network by presenting a user label to use said digital data, editing the digital data, and obtaining an edit label from said communication network by presenting said user label and an editing scenario;
means for not storing said digital data in a device of each user after using said digital data; and
means for transferring said edit label to a next user without said digital data for the next user's use of said digital data.
55. An apparatus according to claim 54 , wherein said means for not storing said digital data in the device of said one or more users after using said digital data comprises means for not storing said digital data in the device of said one or more users by deletion of said digital data.
56. An apparatus according to claim 54 , wherein said means for not storing said digital data in the device of said one or more users after using said digital data comprises means for not storing said digital data in the device of said one or more users after said digital data is converted to a one-way hash value.
57. An apparatus according to claim 54 , further comprising means for encrypting said edit label by using a public-key of said next user, and means for transferring the encrypted edit label to said next user.
58. An apparatus according to claim 54 , further comprising means for said first user performing digital signature to said edit label by using a private-key of said first user.
59. An apparatus according to claim 54 , further comprising means for said one or more users paying a fee based on presenting said user label to a data management center by said one or more users.
60. An apparatus according to claim 54 , wherein said digital data has a general file structure and further comprising means for encrypting only at least a portion of a data body thereof.
61. An apparatus according to claim 54 , wherein said digital data has a general file structure, and further comprising means for encrypting only at least a portion of a data header and at least a portion of a data body thereof.
62. An apparatus according to claim 54 , wherein said digital data has a general file structure and further comprising means for encrypting only at least a portion of a data header thereof.
63. An apparatus according to claim 54 , wherein said digital data has a general file structure, and further comprising means for encrypting only at least a portion of said user label.
64. An apparatus according to claim 54 , wherein said digital data has an object-formed file structure, and further comprising means for encrypting only at least a portion of a method surrounding a slot in said object-formed file structure.
65. An apparatus, comprising:
a computing device, said computing device capable of:
certifying one or more public-keys of a first user;
said first user obtaining digital data from a communication network by presenting a user label to use said digital data, editing the digital data, and obtaining an edit label from said communication network by presenting said user label and an editing scenario;
not storing said digital data in a device of each user after using said digital data; and
transferring said edit label to a next user without said digital data for the next user's use of said digital data.
66. An apparatus according to claim 65 wherein said computing device is further capable of not storing said digital data in the device of said one or more users by deletion of said digital data.
67. An apparatus according to claim 65 , wherein said computing device is further capable of not storing said digital data in the device of said one or more users after said digital data is converted to a one-way hash value.
68. An apparatus according to claim 65 , wherein said computing device is further capable of encrypting said edit label by using a public-key of said next user, and wherein said computing device is further capable of transferring the encrypted edit label to said next user.
69. An apparatus according to claim 65 , wherein said computing device is further capable of said first user performing digital signature to said edit label by using a private-key of said first user.
70. An apparatus according to claim 65 , wherein said computing device is further capable of said one or more users paying a fee based on presenting said user label to a data management center by said one or more users.
71. An apparatus according to claim 65 , wherein said digital data has a general file structure and wherein said computing device is further capable of encrypting only at least a portion of a data body thereof.
72. An apparatus according to claim 65 , wherein said digital data has a general file structure, and wherein said computing device is further capable of encrypting only at least a portion of a data header and at least a portion of a data body thereof.
73. An apparatus according to claim 65 , wherein said digital data has a general file structure and wherein said computing device is further capable of encrypting only at least a portion of a data header thereof.
74. An apparatus according to claim 65 , wherein said digital data has a general file structure and wherein said computing device is further capable of encrypting only at least a portion of said user label.
75. An apparatus according to claim 65 , wherein said digital data has an object-formed file structure, and wherein said computing device is further capable of encrypting only at least a portion of a method surrounding a slot in said object-formed file structure.
76. An article of manufacture comprising a non-transitory storage medium having instructions stored thereon that, in response to execution by a device, cause the device to perform operations including:
obtaining digital data from a communication network by presenting a user label to use said digital data, editing the digital data, and obtaining an edit label from said communication network by presenting said user label and an editing scenario;
removing said digital data from memory after using said digital data; and transferring said edit label to a next user without said digital data for the next user's use of said digital data.
77. An article of manufacture according to claim 76 , wherein said digital data is not stored in the device of said one or more users by deletion of said digital data.
78. An article of manufacture according to claim 76 , wherein said digital data is not stored in the device of said one or more users after said digital data is converted to a one-way hash value.
79. An article of manufacture according to claim 76 , further comprising encrypting said edit label by using a public-key of said next user, and transferring the encrypted edit label to said next user.
80. An article of manufacture according to claim 76 , wherein the operations further include:
appending a digital signature to said edit label by using a private-key.
81. An article of manufacture according to claim 76 , wherein the operations further include;
paying a data usage fee based on presenting said user label to a data management center.
82. An article of manufacture according to claim 76 , wherein said digital data has a general file structure and at least a portion of a data body thereof only is encrypted.
83. An article of manufacture according to claim 76 , wherein said digital data has a general file structure, and at least a portion of a data header and at least a portion of a data body thereof are encrypted.
84. An article of manufacture according to claim 76 , wherein said digital data has a general file structure and at least a portion of a data header thereof only is encrypted.
85. An article of manufacture according to claim 76 , wherein said digital data has a general file structure, and only at least a portion of said user label is encrypted.
86. An article of manufacture according to claim 76 , wherein said digital data has an object-formed file structure, and only at least a portion of a method surrounding a slot in said object-formed file structure is encrypted.
87. A system for managing digital data, comprising:
a data management center storing digital data, user labels, edit labels, and sets of edits corresponding to said digital data, wherein said stored digital data includes a first set of digital data, and wherein said user labels include a first user label associated with a first user;
a first computing device configured to obtain the first set of digital data from the data management center by presenting the first user label, wherein the first computing device is further configured to perform a first set of edits on the first set of digital data to produce an edited first set of digital data, and wherein the first computing device is further configured to obtain a first edit label for the edited first set of digital data from the data management center by presenting the first user label and the first set of edits; and
wherein said first set of digital data is only temporarily stored in a memory of the first computing device and is removed therefrom after utilization of the first set of digital data by the first computing device, and wherein the first edit label is transferable from the first computing device to a second computing device in order to facilitate a second user receiving the edited first set of digital data from the data management center at the second computing device.
88. The system according to claim 87 , wherein the data management center is configured to change a data usage fee to the first user based on the user presented to said data management center by said first user.
89. The system according to claim 87 , wherein said first set of digital data has a data header and a data body, wherein only the data body is encrypted.
90. The system according to claim 87 , wherein said first set of digital data has a general file structure that includes said first user label, and wherein only said first user label is encrypted.
91. A system for electronic commerce, comprising:
a first computing device configured to manage public-keys and to generate secret-keys; a second computing device configured to request electronic commerce data from said first computing device;
a third computing device configured to receive the request of said electronic commerce data together with a first secret-key from the first computing device, wherein the request and the first secret-key are encrypted by using a public-key of said third computing device;
wherein said third computing device is configured to decrypt the encrypted first secret-key by using a private-key of said third computing device, and to encrypt said requested electronic commerce data using the decrypted first secret-key and to transfer the encrypted electronic commerce data to said first computing device;
wherein said first computing device is configured to decrypt said encrypter electronic commerce data using said first secret-key, to re-encrypt decrypted electronic commerce data usinng a second secret-key, and to transfer the re-encrypted electronic commerce data together with the second secret-key to the second computing device, wherein the transferred electronic commerce data and the second secret-key are encrypted using a public-key of the second computing device;
wherein said second computing device is configured to decrypt the transferred second secret-key using a priviate-key of said second computing device, to decrypt the transferred electronic commerce data using the decrypted second secret-key, to generate a response relating to the decrypted electronic commerce data, to encrypt said response using the second secret-key, and to transfer the encrypted response to the first computing device;
wherein said first computing is configured to decrypt said encrypted response using said second secret-ksy, to re-encrypt the decrypted response using the public-key of said third computing device, and to transfer the re-encrypted response to said third computing device; and
wherein said third computing device is configured to decrypt the transferred response using the private key of said third computing device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/446,604 USRE42163E1 (en) | 1994-04-01 | 2006-06-01 | Data management system |
Applications Claiming Priority (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP6488994A JPH07271865A (en) | 1994-04-01 | 1994-04-01 | Method for managing copyright of data base |
JP6-64889 | 1994-04-01 | ||
JP23767394 | 1994-09-30 | ||
JP6-237673 | 1994-09-30 | ||
JP26419994 | 1994-10-27 | ||
JP26420194 | 1994-10-27 | ||
JP6-264201 | 1994-10-27 | ||
JP6-264199 | 1994-10-27 | ||
JP26995994 | 1994-11-02 | ||
JP6-269959 | 1994-11-02 | ||
US41603795A | 1995-03-31 | 1995-03-31 | |
US08/733,504 US5974141A (en) | 1995-03-31 | 1996-10-18 | Data management system |
US09/165,928 US6744894B1 (en) | 1994-04-01 | 1998-10-02 | Data management system |
US11/446,604 USRE42163E1 (en) | 1994-04-01 | 2006-06-01 | Data management system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/165,928 Reissue US6744894B1 (en) | 1994-04-01 | 1998-10-02 | Data management system |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE42163E1 true USRE42163E1 (en) | 2011-02-22 |
Family
ID=43597263
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/165,928 Ceased US6744894B1 (en) | 1994-04-01 | 1998-10-02 | Data management system |
US09/985,388 Abandoned US20020025044A1 (en) | 1994-04-01 | 2001-11-02 | Data management system |
US11/446,604 Expired - Fee Related USRE42163E1 (en) | 1994-04-01 | 2006-06-01 | Data management system |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/165,928 Ceased US6744894B1 (en) | 1994-04-01 | 1998-10-02 | Data management system |
US09/985,388 Abandoned US20020025044A1 (en) | 1994-04-01 | 2001-11-02 | Data management system |
Country Status (1)
Country | Link |
---|---|
US (3) | US6744894B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060018474A1 (en) * | 2004-07-21 | 2006-01-26 | Yoshihiro Hori | Method for transmission/reception of contents usage right information in encrypted form, and device thereof |
US20070174916A1 (en) * | 2005-10-28 | 2007-07-26 | Ching Peter N | Method and apparatus for secure data transfer |
US20100235689A1 (en) * | 2009-03-16 | 2010-09-16 | Qualcomm Incorporated | Apparatus and method for employing codes for telecommunications |
US8554684B2 (en) | 1994-04-01 | 2013-10-08 | Intarsia Software Llc | Controlling database copyrights |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US7036019B1 (en) * | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US7302415B1 (en) * | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
DE69532434T2 (en) * | 1994-10-27 | 2004-11-11 | Mitsubishi Corp. | Device for file copyright management system |
EP1691316A1 (en) | 1994-10-27 | 2006-08-16 | Intarsia Software LLC | Data copyright management system |
US8595502B2 (en) * | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US7801817B2 (en) * | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
EP0936805A1 (en) * | 1998-02-12 | 1999-08-18 | Hewlett-Packard Company | Document transfer systems |
JP4763866B2 (en) | 1998-10-15 | 2011-08-31 | インターシア ソフトウェア エルエルシー | Method and apparatus for protecting digital data by double re-encryption |
JP4195746B2 (en) * | 1998-12-11 | 2008-12-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Data billing system, content generation apparatus, data billing device and method |
US6876991B1 (en) | 1999-11-08 | 2005-04-05 | Collaborative Decision Platforms, Llc. | System, method and computer program product for a collaborative decision platform |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
US6973499B1 (en) * | 2000-04-07 | 2005-12-06 | Intertrust Technologies Corp. | Ticketing and keying for orchestrating distribution of network content |
US7421583B1 (en) * | 2000-06-19 | 2008-09-02 | Xerox Corp | System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof |
US7051211B1 (en) * | 2000-08-21 | 2006-05-23 | International Business Machines Corporation | Secure software distribution and installation |
US7359511B2 (en) * | 2000-12-18 | 2008-04-15 | Matsushita Electric Industrial Co., Ltd. | Encryption transmission system |
US7370366B2 (en) * | 2001-11-16 | 2008-05-06 | International Business Machines Corporation | Data management system and method |
JP3849528B2 (en) * | 2002-01-11 | 2006-11-22 | ヤマハ株式会社 | Electronic music apparatus and program |
CA2494299C (en) | 2002-08-06 | 2013-10-08 | Privaris, Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
JP4239747B2 (en) * | 2003-08-07 | 2009-03-18 | ソニー株式会社 | Information processing apparatus, content information management method, and computer program |
JP4186941B2 (en) * | 2005-03-23 | 2008-11-26 | ヤマハ株式会社 | Automatic performance data editing / playback apparatus and program for controlling the same |
JP2006267491A (en) * | 2005-03-23 | 2006-10-05 | Yamaha Corp | Device for reproducing automatic playing data and program for realizing control method thereof |
WO2008068078A1 (en) * | 2006-12-07 | 2008-06-12 | International Business Machines Corporation | Remote controller having an rfid tag |
US20090076904A1 (en) * | 2007-09-17 | 2009-03-19 | Frank David Serena | Embedding digital values for digital exchange |
JP2010034860A (en) * | 2008-07-29 | 2010-02-12 | Fujitsu Ltd | Ip network communicating method which has security function, and communicating system |
US10868672B1 (en) | 2015-06-05 | 2020-12-15 | Apple Inc. | Establishing and verifying identity using biometrics while protecting user privacy |
US11140171B1 (en) | 2015-06-05 | 2021-10-05 | Apple Inc. | Establishing and verifying identity using action sequences while protecting user privacy |
US11133932B2 (en) * | 2018-12-20 | 2021-09-28 | Sony Interactive Entertainment LLC | Secure data channel in a networked gaming system |
Citations (222)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4104721A (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4168396A (en) | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4225884A (en) | 1977-02-14 | 1980-09-30 | Telease, Inc. | Method and system for subscription television billing and access |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4278337A (en) | 1978-02-07 | 1981-07-14 | Canon Kabushiki Kaisha | Electric motor drive device for camera |
US4352952A (en) | 1978-06-12 | 1982-10-05 | Motorola Inc. | Data security module |
US4386233A (en) | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4465901A (en) | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
EP0121853A2 (en) | 1983-04-04 | 1984-10-17 | BURROUGHS CORPORATION (a Delaware corporation) | Data processing system having public encryption and private decryption keys |
JPS59169000U (en) | 1983-04-27 | 1984-11-12 | 日立照明株式会社 | Lighting equipment switching device |
US4527195A (en) | 1979-02-20 | 1985-07-02 | Payview Limited | Apparatus for encoding and decoding information |
JPS60102038U (en) | 1983-12-20 | 1985-07-11 | トラスト・トレ−デイング株式会社 | training equipment |
WO1985003830A1 (en) | 1984-02-23 | 1985-08-29 | American Telephone & Telegraph Company | Method and apparatus for subscription broadcast |
US4558176A (en) | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4567512A (en) | 1982-08-19 | 1986-01-28 | World Video Library, Inc. | Recorded program communication system |
US4588991A (en) | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
US4613901A (en) | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
EP0199410A1 (en) | 1985-04-19 | 1986-10-29 | La Radiotechnique Portenseigne | System for the secret transmission of audio signals, and television set for receiving such signals |
US4623918A (en) | 1983-05-02 | 1986-11-18 | Teleglobe Pay-Tv System, Inc. | Pay television system utilizing multi-frequency passive filters |
JPS62169540U (en) | 1986-04-16 | 1987-10-27 | ||
DE3717261A1 (en) | 1987-05-22 | 1987-11-19 | Paul Bamberg | Method for selecting television programmes by telephone |
US4709266A (en) | 1985-01-14 | 1987-11-24 | Oak Industries Inc. | Satellite scrambling communication network using geographically separated uplinks |
US4710955A (en) | 1985-11-25 | 1987-12-01 | General Instrument Corporation | Cable television system with two-way telephone communication path |
US4736422A (en) | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
EP0158167A3 (en) | 1984-03-21 | 1988-05-18 | Atalla Corporation | Document security system, method and apparatus |
US4751732A (en) | 1984-07-06 | 1988-06-14 | Kabushiki Kaisha Toshiba | Broadcasting system |
US4757534A (en) | 1984-12-18 | 1988-07-12 | International Business Machines Corporation | Code protection using cryptography |
US4759062A (en) | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US4791565A (en) | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
JPS6461782A (en) | 1987-08-31 | 1989-03-08 | Sharp Kk | Coded record reproducer |
JPS6441387U (en) | 1987-09-08 | 1989-03-13 | ||
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4829569A (en) | 1984-09-21 | 1989-05-09 | Scientific-Atlanta, Inc. | Communication of individual messages to subscribers in a subscription television system |
US4850017A (en) | 1987-05-29 | 1989-07-18 | International Business Machines Corp. | Controlled use of cryptographic keys via generating station established control values |
US4852154A (en) | 1986-02-04 | 1989-07-25 | Pacific Bell | Pay-per-view CATV system |
US4862268A (en) | 1980-03-31 | 1989-08-29 | General Instrument Corporation | Addressable cable television control system with video format data transmission |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US4864614A (en) | 1983-07-15 | 1989-09-05 | U.S. Philips Corporation | Authorising coded signals |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
WO1989009528A1 (en) | 1988-04-01 | 1989-10-05 | Scientific Atlanta, Inc. | Set-top interface transactions in an impulse pay per view television system |
US4890319A (en) | 1984-09-21 | 1989-12-26 | Scientific-Atlantic, Inc. | Method for controlling copying of protected information transmitted over a communications link |
US4890321A (en) | 1986-07-08 | 1989-12-26 | Scientific Atlanta, Inc. | Communications format for a subscription television system permitting transmission of individual text messages to subscribers |
EP0341801A3 (en) | 1985-10-29 | 1990-02-07 | Payview Limited | Video scrambling systems |
US4905277A (en) | 1981-12-29 | 1990-02-27 | Fujitsu Limited | Method for enciphering and deciphering instructions in a microcomputer, and a microcomputer used for effecting same |
WO1990002382A1 (en) | 1988-08-16 | 1990-03-08 | Indata, Corporation | Information distribution system |
USRE33189E (en) | 1981-11-19 | 1990-03-27 | Communications Satellite Corporation | Security system for SSTV encryption |
US4916737A (en) | 1988-11-14 | 1990-04-10 | Teleglobe Pay-Tv System, Inc. | Secure anti-piracy encoded television system and method |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4995080A (en) | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
US5008853A (en) | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5029207A (en) | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5036461A (en) | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
US5046093A (en) | 1989-09-05 | 1991-09-03 | General Instrument Corporation | CATV subscriber apparatus with intelligent remote control |
EP0391261A3 (en) | 1989-04-03 | 1991-10-09 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
US5060262A (en) | 1990-05-07 | 1991-10-22 | Bevins Jr George L | Video scrambling, audio masking and data transmission methods for wireless cable systems |
EP0459046A1 (en) | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
JPH03282989A (en) | 1990-03-30 | 1991-12-13 | Tonen Corp | Data storing method using memory card |
US5077665A (en) | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5083309A (en) | 1989-11-23 | 1992-01-21 | Schlumberger Industries | Method and a system enabling software to be run securely |
US5091938A (en) | 1990-08-06 | 1992-02-25 | Nec Home Electronics, Ltd. | System and method for transmitting entertainment information to authorized ones of plural receivers |
US5126566A (en) | 1990-04-06 | 1992-06-30 | Jeol Ltd. | Dimension measurement system utilizing scanning electron beam |
US5138659A (en) | 1991-05-02 | 1992-08-11 | General Instrument Corporation | Conversion of television signal formats with retention of common control data stream |
US5142579A (en) | 1991-01-29 | 1992-08-25 | Anderson Walter M | Public key cryptographic system and method |
US5144663A (en) | 1986-04-18 | 1992-09-01 | Kudelski S.A. Fabrique D'engregistreurs Nagra | Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof |
US5146497A (en) | 1991-02-27 | 1992-09-08 | Motorola, Inc. | Group rekey in a communication system |
EP0518365A2 (en) | 1991-06-14 | 1992-12-16 | Nippon Telegraph And Telephone Corporation | method of implementing use of electronic cash |
US5173939A (en) | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
WO1993007715A1 (en) | 1991-10-03 | 1993-04-15 | Thomson Consumer Electronics S.A. | Method and apparatus for customizing a device with a smart card |
US5204961A (en) | 1990-06-25 | 1993-04-20 | Digital Equipment Corporation | Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols |
JPH05122701A (en) | 1991-10-25 | 1993-05-18 | Canon Inc | Charging information processing unit |
US5220604A (en) | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5227893A (en) | 1990-10-31 | 1993-07-13 | International Business Machines Corporation | Pseudo-bar code control of image transmission |
US5231598A (en) | 1991-09-30 | 1993-07-27 | National Semiconductor Corporation | Direct digital synthesis measurement signal skew tester |
US5235641A (en) | 1990-03-13 | 1993-08-10 | Hitachi, Ltd. | File encryption method and file cryptographic system |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
JPH05298373A (en) | 1992-04-24 | 1993-11-12 | Olympus Optical Co Ltd | Portable type information terminal equipment |
GB2231244B (en) | 1989-04-10 | 1993-11-24 | Pioneer Electronic Corp | CATV system and CATV terminal unit |
US5270773A (en) | 1992-11-27 | 1993-12-14 | Xerox Corporation | Image producing device with security to prevent disclosure of sensitive documents |
US5291598A (en) | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
EP0532381B1 (en) | 1991-09-12 | 1994-03-30 | Gemplus Card International | Method and apparatus for certifying messages transmitted by a facsimile device |
US5301245A (en) | 1991-03-29 | 1994-04-05 | Pioneer Electronic Corporation | System for transmitting a commercial program in a CATV system |
EP0590763A1 (en) | 1992-07-27 | 1994-04-06 | Scitex Corporation Ltd. | Electronic separation scanner |
US5315657A (en) | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5323464A (en) | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
US5341425A (en) | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5345508A (en) | 1993-08-23 | 1994-09-06 | Apple Computer, Inc. | Method and apparatus for variable-overhead cached encryption |
US5347581A (en) | 1993-09-15 | 1994-09-13 | Gemplus Developpement | Verification process for a communication system |
US5349662A (en) | 1992-05-21 | 1994-09-20 | International Business Machines Corporation | Method of and apparatus for providing automatic detection of user activity |
US5353351A (en) | 1992-06-09 | 1994-10-04 | At&T Bell Laboratories | Secure teleconferencing |
EP0542298A3 (en) | 1991-11-15 | 1994-11-23 | Citibank Na | Electronic monetary system |
US5369702A (en) | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
EP0421808B1 (en) | 1989-10-06 | 1994-12-28 | André Peter Mansvelt | Funds transfer system |
US5381480A (en) | 1993-09-20 | 1995-01-10 | International Business Machines Corporation | System for translating encrypted data |
US5392351A (en) | 1992-03-16 | 1995-02-21 | Fujitsu Limited | Electronic data protection system |
US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
EP0649074A1 (en) | 1993-10-18 | 1995-04-19 | Xerox Corporation | A system and method to measure and accrue copyright royalties |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5414772A (en) | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5428685A (en) | 1992-01-22 | 1995-06-27 | Fujitsu Limited | IC memory card and method of protecting data therein |
WO1995020291A1 (en) | 1994-01-19 | 1995-07-27 | Highwater Fbi Limited | Method of and apparatus for manipulating digital data works |
US5438508A (en) | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5444782A (en) | 1993-03-09 | 1995-08-22 | Uunet Technologies, Inc. | Computer network encryption/decryption device |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
EP0665486A3 (en) | 1994-01-27 | 1995-09-13 | AT&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5455941A (en) | 1991-02-27 | 1995-10-03 | Canon Kabushiki Kaisha | System for detecting improper rewrites of data system for using separate reader writer passwords |
US5455863A (en) | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US5457746A (en) | 1993-09-14 | 1995-10-10 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5465299A (en) | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
US5475758A (en) | 1993-01-22 | 1995-12-12 | Fujitsu Limited | User authenticating system and method in wide area distributed environment |
US5475757A (en) | 1994-06-07 | 1995-12-12 | At&T Corp. | Secure data transmission method |
US5479514A (en) | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5497420A (en) | 1994-02-07 | 1996-03-05 | Le Groupe Vide/ otron Lte/ e | Cable TV system using passwords |
US5499340A (en) | 1994-01-12 | 1996-03-12 | Isogon Corporation | Method and apparatus for computer program usage monitoring |
US5504817A (en) | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
US5504933A (en) | 1992-10-27 | 1996-04-02 | Mitsubishi Corporation | Pay broadcasting system |
US5504816A (en) | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5504818A (en) | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
EP0354774B1 (en) | 1988-08-11 | 1996-04-10 | International Business Machines Corporation | Data cryptography using control vectors |
US5509073A (en) | 1992-11-26 | 1996-04-16 | Schlumberger Industries | Communications network |
US5511121A (en) | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
WO1996013113A1 (en) | 1994-10-12 | 1996-05-02 | Secure Computing Corporation | System and method for providing secure internetwork services |
US5515538A (en) | 1992-05-29 | 1996-05-07 | Sun Microsystems, Inc. | Apparatus and method for interrupt handling in a multi-threaded operating system kernel |
US5515441A (en) | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5532920A (en) | 1992-04-29 | 1996-07-02 | International Business Machines Corporation | Data processing system and method to enforce payment of royalties when copying softcopy books |
US5541994A (en) | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
WO1996023257A1 (en) | 1995-01-24 | 1996-08-01 | Tandem Computers Incorporated | Enhanced instrumentation software in fault tolerant systems |
EP0450841B1 (en) | 1990-03-29 | 1996-08-21 | Gte Laboratories Incorporated | Video control system |
US5553145A (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
WO1996027259A1 (en) | 1995-03-02 | 1996-09-06 | Signum Technologies Limited | Method of and apparatus for manipulating digital data works |
EP0506435B1 (en) | 1991-03-29 | 1996-10-23 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US5577121A (en) | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US5579223A (en) | 1992-12-24 | 1996-11-26 | Microsoft Corporation | Method and system for incorporating modifications made to a computer program into a translated version of the computer program |
US5581682A (en) | 1991-06-28 | 1996-12-03 | International Business Machines Corporation | Method for storing and retrieving annotations and redactions in final form documents |
US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5606613A (en) | 1994-12-22 | 1997-02-25 | Pitney Bowes Inc. | Method for identifying a metering accounting vault to digital printer |
EP0489385B1 (en) | 1990-12-06 | 1997-03-19 | EDICO S.r.l. | System for the transmission and reception of encoded television signals |
US5633934A (en) | 1993-12-09 | 1997-05-27 | Hember; John T. | Local area nework encryption decryption system |
US5636277A (en) | 1994-09-30 | 1997-06-03 | Fujitsu Limited | System for licensing to use software products |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
US5646999A (en) | 1994-10-27 | 1997-07-08 | Mitsubishi Corporation | Data coypright management method |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
EP0438154B1 (en) | 1990-01-19 | 1997-07-16 | Canon Kabushiki Kaisha | Multimedia network system |
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
EP0398645B1 (en) | 1989-05-15 | 1997-08-06 | International Business Machines Corporation | System for controlling access privileges |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
US5680452A (en) | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
US5689587A (en) | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
EP0813133A2 (en) | 1996-06-11 | 1997-12-17 | International Business Machines Corporation | A uniform mechanism for using signed content |
WO1997050036A1 (en) | 1996-06-27 | 1997-12-31 | Institute Of Systems Science | Computationally efficient method for trusted and dynamic digital objects dissemination |
US5706210A (en) | 1995-03-01 | 1998-01-06 | Fujitsu Limited | Network monitoring device |
US5715393A (en) | 1993-08-16 | 1998-02-03 | Motorola, Inc. | Method for remote system process monitoring |
US5740246A (en) | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US5745572A (en) | 1995-02-24 | 1998-04-28 | International Computers Limited | Cryptographic key management |
US5765152A (en) | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5765176A (en) | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
US5771383A (en) | 1994-12-27 | 1998-06-23 | International Business Machines Corp. | Shared memory support method and apparatus for a microkernel data processing system |
US5812762A (en) | 1995-03-31 | 1998-09-22 | Samsung Electronics Co., Ltd. | Personal computer having card read/write controller |
US5818933A (en) | 1995-07-07 | 1998-10-06 | Mitsubishi Denki Kabushiki Kaisha | Copyright control system |
US5825892A (en) | 1996-10-28 | 1998-10-20 | International Business Machines Corporation | Protecting images with an image watermark |
US5832083A (en) | 1994-09-09 | 1998-11-03 | Fujitsu Limited | Method and device for utilizing data content |
US5835601A (en) | 1994-03-15 | 1998-11-10 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
US5835765A (en) | 1995-05-31 | 1998-11-10 | Mitsubishi Denki Kabushiki Kaisha | Computer operation management system for a computer operating system capable of simultaneously executing plural application programs |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US5848155A (en) | 1996-09-04 | 1998-12-08 | Nec Research Institute, Inc. | Spread spectrum watermark for embedded signalling |
US5848158A (en) | 1995-06-02 | 1998-12-08 | Mitsubishi Corporation | Data copyright management system |
US5867579A (en) | 1994-10-27 | 1999-02-02 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5912969A (en) | 1994-03-31 | 1999-06-15 | Hitachi, Ltd. | Information receiving and recording/reproducing apparatus/method having function for limiting/delimiting for protecting copyright of recording information |
US5968175A (en) | 1994-03-29 | 1999-10-19 | Kabushiki Kaisha Toshiba | Software use method control system |
US5974141A (en) | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US5986690A (en) | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US6002772A (en) | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6026430A (en) | 1997-03-24 | 2000-02-15 | Butman; Ronald A. | Dynamic client registry apparatus and method |
US6044367A (en) | 1996-08-02 | 2000-03-28 | Hewlett-Packard Company | Distributed I/O store |
US6069952A (en) | 1994-09-30 | 2000-05-30 | Mitsubishi Corporation | Data copyright management system |
US6076077A (en) | 1995-10-27 | 2000-06-13 | Mitsubishi Corporation | Data management system |
US6091835A (en) | 1994-08-31 | 2000-07-18 | Penop Limited | Method and system for transcribing electronic affirmations |
US6097816A (en) | 1994-04-08 | 2000-08-01 | Mitsubishi Corporation | Crypt key system |
US6160891A (en) | 1997-10-20 | 2000-12-12 | Sun Microsystems, Inc. | Methods and apparatus for recovering keys |
JP3128541B2 (en) | 1991-02-06 | 2001-01-29 | イゲン,インコーポレーテッド | Apparatus for luminescence assay based on magnetic microparticles containing multiple magnets |
US6182218B1 (en) | 1994-12-13 | 2001-01-30 | Mitsubishi Corporation | Digital content management system using electronic watermark |
EP0551016B1 (en) | 1992-01-06 | 2001-03-14 | Canon Kabushiki Kaisha | Image processing method for adding an identification code to an image |
US6209092B1 (en) | 1997-01-27 | 2001-03-27 | U.S. Philips Corporation | Method and system for transferring content information and supplemental information relating thereto |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US20020021807A1 (en) | 1994-04-01 | 2002-02-21 | Mitsubishi Corporation | Method for controlling database copyrights |
JP3265241B2 (en) | 1997-09-10 | 2002-03-11 | シャープ株式会社 | Rice cooker and high frequency heating device |
US20020052850A1 (en) | 1994-10-27 | 2002-05-02 | Mitsubishi Corporation | Digital content management system and apparatus |
US6415271B1 (en) | 1993-02-10 | 2002-07-02 | Gm Network Limited | Electronic cash eliminating payment risk |
US20020122173A1 (en) | 2001-03-05 | 2002-09-05 | Donald Bruns | Method and apparatus for fiber alignment using light leaked from cladding |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
US6519623B1 (en) | 1996-10-31 | 2003-02-11 | International Business Machines Corporation | Generic semaphore for concurrent access by multiple operating systems |
US6560339B1 (en) | 1998-02-17 | 2003-05-06 | Canon Kabushiki Kaisha | Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method |
US20030144963A1 (en) | 1994-09-30 | 2003-07-31 | Mitsubishi Corporation | Data copyright management system |
US6603864B1 (en) | 1998-10-30 | 2003-08-05 | Fuji Xerox Co., Ltd. | Image processing apparatus and image processing method |
EP0715243B1 (en) | 1994-11-23 | 2003-08-06 | ContentGuard Holdings, Inc. | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US6615258B1 (en) * | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US6668324B1 (en) | 1999-12-13 | 2003-12-23 | Intel Corporation | System and method for safeguarding data within a device |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6851053B1 (en) | 1999-03-02 | 2005-02-01 | Microsoft Corporation | Multiparty conference authentication |
US6874089B2 (en) | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
EP0581227B1 (en) | 1992-07-28 | 2005-09-21 | Hitachi, Ltd. | Apparatus for the recording and/or the reproducing of video signals |
US20050262033A1 (en) | 2002-03-29 | 2005-11-24 | Kazuhiko Yamashita | Data recording apparatus, data recording method, program for implementing the method, and program recording medium |
US7024681B1 (en) | 1997-12-04 | 2006-04-04 | Verizon Laboratories Inc. | Method and apparatus for near video on demand |
US7036019B1 (en) | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US7093295B1 (en) | 1998-10-15 | 2006-08-15 | Makoto Saito | Method and device for protecting digital data by double re-encryption |
JP4181282B2 (en) | 1999-09-16 | 2008-11-12 | 株式会社東芝 | Electronic currency terminal |
JP4268844B2 (en) | 2003-07-15 | 2009-05-27 | Tdk株式会社 | Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component |
-
1998
- 1998-10-02 US US09/165,928 patent/US6744894B1/en not_active Ceased
-
2001
- 2001-11-02 US US09/985,388 patent/US20020025044A1/en not_active Abandoned
-
2006
- 2006-06-01 US US11/446,604 patent/USRE42163E1/en not_active Expired - Fee Related
Patent Citations (249)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4104721A (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4225884A (en) | 1977-02-14 | 1980-09-30 | Telease, Inc. | Method and system for subscription television billing and access |
US4168396A (en) | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4278337A (en) | 1978-02-07 | 1981-07-14 | Canon Kabushiki Kaisha | Electric motor drive device for camera |
US4352952A (en) | 1978-06-12 | 1982-10-05 | Motorola Inc. | Data security module |
US4527195A (en) | 1979-02-20 | 1985-07-02 | Payview Limited | Apparatus for encoding and decoding information |
US4465901A (en) | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4862268A (en) | 1980-03-31 | 1989-08-29 | General Instrument Corporation | Addressable cable television control system with video format data transmission |
US4386233A (en) | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
USRE33189E (en) | 1981-11-19 | 1990-03-27 | Communications Satellite Corporation | Security system for SSTV encryption |
US4905277A (en) | 1981-12-29 | 1990-02-27 | Fujitsu Limited | Method for enciphering and deciphering instructions in a microcomputer, and a microcomputer used for effecting same |
US4567512A (en) | 1982-08-19 | 1986-01-28 | World Video Library, Inc. | Recorded program communication system |
US4558176A (en) | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4588991A (en) | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
EP0121853A2 (en) | 1983-04-04 | 1984-10-17 | BURROUGHS CORPORATION (a Delaware corporation) | Data processing system having public encryption and private decryption keys |
JPS59169000U (en) | 1983-04-27 | 1984-11-12 | 日立照明株式会社 | Lighting equipment switching device |
US4623918A (en) | 1983-05-02 | 1986-11-18 | Teleglobe Pay-Tv System, Inc. | Pay television system utilizing multi-frequency passive filters |
US4613901A (en) | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
US4736422A (en) | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
US4864614A (en) | 1983-07-15 | 1989-09-05 | U.S. Philips Corporation | Authorising coded signals |
JPS60102038U (en) | 1983-12-20 | 1985-07-11 | トラスト・トレ−デイング株式会社 | training equipment |
WO1985003830A1 (en) | 1984-02-23 | 1985-08-29 | American Telephone & Telegraph Company | Method and apparatus for subscription broadcast |
EP0158167A3 (en) | 1984-03-21 | 1988-05-18 | Atalla Corporation | Document security system, method and apparatus |
US4791565A (en) | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4751732A (en) | 1984-07-06 | 1988-06-14 | Kabushiki Kaisha Toshiba | Broadcasting system |
US4890319A (en) | 1984-09-21 | 1989-12-26 | Scientific-Atlantic, Inc. | Method for controlling copying of protected information transmitted over a communications link |
US4829569A (en) | 1984-09-21 | 1989-05-09 | Scientific-Atlanta, Inc. | Communication of individual messages to subscribers in a subscription television system |
US4757534A (en) | 1984-12-18 | 1988-07-12 | International Business Machines Corporation | Code protection using cryptography |
EP0191162B1 (en) | 1984-12-18 | 1993-02-03 | International Business Machines Corporation | Method of software protection |
US4709266A (en) | 1985-01-14 | 1987-11-24 | Oak Industries Inc. | Satellite scrambling communication network using geographically separated uplinks |
EP0199410A1 (en) | 1985-04-19 | 1986-10-29 | La Radiotechnique Portenseigne | System for the secret transmission of audio signals, and television set for receiving such signals |
EP0341801A3 (en) | 1985-10-29 | 1990-02-07 | Payview Limited | Video scrambling systems |
US4710955A (en) | 1985-11-25 | 1987-12-01 | General Instrument Corporation | Cable television system with two-way telephone communication path |
US4852154A (en) | 1986-02-04 | 1989-07-25 | Pacific Bell | Pay-per-view CATV system |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
JPS62169540U (en) | 1986-04-16 | 1987-10-27 | ||
US5144663A (en) | 1986-04-18 | 1992-09-01 | Kudelski S.A. Fabrique D'engregistreurs Nagra | Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof |
US4890321A (en) | 1986-07-08 | 1989-12-26 | Scientific Atlanta, Inc. | Communications format for a subscription television system permitting transmission of individual text messages to subscribers |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
US4759062A (en) | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
DE3717261A1 (en) | 1987-05-22 | 1987-11-19 | Paul Bamberg | Method for selecting television programmes by telephone |
US4850017A (en) | 1987-05-29 | 1989-07-18 | International Business Machines Corp. | Controlled use of cryptographic keys via generating station established control values |
JPS6461782A (en) | 1987-08-31 | 1989-03-08 | Sharp Kk | Coded record reproducer |
JPS6441387U (en) | 1987-09-08 | 1989-03-13 | ||
US5008853A (en) | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
WO1989009528A1 (en) | 1988-04-01 | 1989-10-05 | Scientific Atlanta, Inc. | Set-top interface transactions in an impulse pay per view television system |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US4995080A (en) | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
EP0354774B1 (en) | 1988-08-11 | 1996-04-10 | International Business Machines Corporation | Data cryptography using control vectors |
WO1990002382A1 (en) | 1988-08-16 | 1990-03-08 | Indata, Corporation | Information distribution system |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US4916737A (en) | 1988-11-14 | 1990-04-10 | Teleglobe Pay-Tv System, Inc. | Secure anti-piracy encoded television system and method |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
EP0391261A3 (en) | 1989-04-03 | 1991-10-09 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
GB2231244B (en) | 1989-04-10 | 1993-11-24 | Pioneer Electronic Corp | CATV system and CATV terminal unit |
EP0398645B1 (en) | 1989-05-15 | 1997-08-06 | International Business Machines Corporation | System for controlling access privileges |
US5077665A (en) | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5046093A (en) | 1989-09-05 | 1991-09-03 | General Instrument Corporation | CATV subscriber apparatus with intelligent remote control |
EP0421808B1 (en) | 1989-10-06 | 1994-12-28 | André Peter Mansvelt | Funds transfer system |
US5083309A (en) | 1989-11-23 | 1992-01-21 | Schlumberger Industries | Method and a system enabling software to be run securely |
EP0430734B1 (en) | 1989-11-23 | 1995-09-27 | Schlumberger Industries | System and method to securely operate a computerprogram |
EP0438154B1 (en) | 1990-01-19 | 1997-07-16 | Canon Kabushiki Kaisha | Multimedia network system |
US5029207A (en) | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5235641A (en) | 1990-03-13 | 1993-08-10 | Hitachi, Ltd. | File encryption method and file cryptographic system |
EP0450841B1 (en) | 1990-03-29 | 1996-08-21 | Gte Laboratories Incorporated | Video control system |
JPH03282989A (en) | 1990-03-30 | 1991-12-13 | Tonen Corp | Data storing method using memory card |
US5126566A (en) | 1990-04-06 | 1992-06-30 | Jeol Ltd. | Dimension measurement system utilizing scanning electron beam |
US5060262A (en) | 1990-05-07 | 1991-10-22 | Bevins Jr George L | Video scrambling, audio masking and data transmission methods for wireless cable systems |
US5036461A (en) | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
EP0459046A1 (en) | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
US5204961A (en) | 1990-06-25 | 1993-04-20 | Digital Equipment Corporation | Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols |
US5091938A (en) | 1990-08-06 | 1992-02-25 | Nec Home Electronics, Ltd. | System and method for transmitting entertainment information to authorized ones of plural receivers |
US5091938B1 (en) | 1990-08-06 | 1997-02-04 | Nippon Denki Home Electronics | Digital data cryptographic system |
US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5220604A (en) | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
US5173939A (en) | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
US5315657A (en) | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
US5227893A (en) | 1990-10-31 | 1993-07-13 | International Business Machines Corporation | Pseudo-bar code control of image transmission |
EP0489385B1 (en) | 1990-12-06 | 1997-03-19 | EDICO S.r.l. | System for the transmission and reception of encoded television signals |
US5142579A (en) | 1991-01-29 | 1992-08-25 | Anderson Walter M | Public key cryptographic system and method |
JP3128541B2 (en) | 1991-02-06 | 2001-01-29 | イゲン,インコーポレーテッド | Apparatus for luminescence assay based on magnetic microparticles containing multiple magnets |
US5455941A (en) | 1991-02-27 | 1995-10-03 | Canon Kabushiki Kaisha | System for detecting improper rewrites of data system for using separate reader writer passwords |
US5146497A (en) | 1991-02-27 | 1992-09-08 | Motorola, Inc. | Group rekey in a communication system |
US5301245A (en) | 1991-03-29 | 1994-04-05 | Pioneer Electronic Corporation | System for transmitting a commercial program in a CATV system |
EP0506435B1 (en) | 1991-03-29 | 1996-10-23 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US5504818A (en) | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
US5138659A (en) | 1991-05-02 | 1992-08-11 | General Instrument Corporation | Conversion of television signal formats with retention of common control data stream |
EP0518365A2 (en) | 1991-06-14 | 1992-12-16 | Nippon Telegraph And Telephone Corporation | method of implementing use of electronic cash |
US5581682A (en) | 1991-06-28 | 1996-12-03 | International Business Machines Corporation | Method for storing and retrieving annotations and redactions in final form documents |
US5438508A (en) | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
EP0532381B1 (en) | 1991-09-12 | 1994-03-30 | Gemplus Card International | Method and apparatus for certifying messages transmitted by a facsimile device |
US5231598A (en) | 1991-09-30 | 1993-07-27 | National Semiconductor Corporation | Direct digital synthesis measurement signal skew tester |
WO1993007715A1 (en) | 1991-10-03 | 1993-04-15 | Thomson Consumer Electronics S.A. | Method and apparatus for customizing a device with a smart card |
JPH05122701A (en) | 1991-10-25 | 1993-05-18 | Canon Inc | Charging information processing unit |
EP0542298A3 (en) | 1991-11-15 | 1994-11-23 | Citibank Na | Electronic monetary system |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
EP0551016B1 (en) | 1992-01-06 | 2001-03-14 | Canon Kabushiki Kaisha | Image processing method for adding an identification code to an image |
US5428685A (en) | 1992-01-22 | 1995-06-27 | Fujitsu Limited | IC memory card and method of protecting data therein |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5392351A (en) | 1992-03-16 | 1995-02-21 | Fujitsu Limited | Electronic data protection system |
EP0561685B1 (en) | 1992-03-16 | 2005-02-09 | Fujitsu Limited | An electronic data protection system |
US5291598A (en) | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
JPH05298373A (en) | 1992-04-24 | 1993-11-12 | Olympus Optical Co Ltd | Portable type information terminal equipment |
US5532920A (en) | 1992-04-29 | 1996-07-02 | International Business Machines Corporation | Data processing system and method to enforce payment of royalties when copying softcopy books |
US5349662A (en) | 1992-05-21 | 1994-09-20 | International Business Machines Corporation | Method of and apparatus for providing automatic detection of user activity |
US5515538A (en) | 1992-05-29 | 1996-05-07 | Sun Microsystems, Inc. | Apparatus and method for interrupt handling in a multi-threaded operating system kernel |
US5353351A (en) | 1992-06-09 | 1994-10-04 | At&T Bell Laboratories | Secure teleconferencing |
EP0590763A1 (en) | 1992-07-27 | 1994-04-06 | Scitex Corporation Ltd. | Electronic separation scanner |
EP0581227B1 (en) | 1992-07-28 | 2005-09-21 | Hitachi, Ltd. | Apparatus for the recording and/or the reproducing of video signals |
US5323464A (en) | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5504933A (en) | 1992-10-27 | 1996-04-02 | Mitsubishi Corporation | Pay broadcasting system |
US5901339A (en) | 1992-10-27 | 1999-05-04 | Mitsubishi Corporation | Pay broadcasting system |
US5794115A (en) | 1992-10-27 | 1998-08-11 | Mitsubishi Corporation | Pay broadcasting system having a broadcasting station and a charging center |
US5509073A (en) | 1992-11-26 | 1996-04-16 | Schlumberger Industries | Communications network |
US5270773A (en) | 1992-11-27 | 1993-12-14 | Xerox Corporation | Image producing device with security to prevent disclosure of sensitive documents |
US5341425A (en) | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5465299A (en) | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
US5986690A (en) | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US5579223A (en) | 1992-12-24 | 1996-11-26 | Microsoft Corporation | Method and system for incorporating modifications made to a computer program into a translated version of the computer program |
US5475758A (en) | 1993-01-22 | 1995-12-12 | Fujitsu Limited | User authenticating system and method in wide area distributed environment |
US6415271B1 (en) | 1993-02-10 | 2002-07-02 | Gm Network Limited | Electronic cash eliminating payment risk |
US5444782A (en) | 1993-03-09 | 1995-08-22 | Uunet Technologies, Inc. | Computer network encryption/decryption device |
US5414772A (en) | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5455863A (en) | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
US5715393A (en) | 1993-08-16 | 1998-02-03 | Motorola, Inc. | Method for remote system process monitoring |
US5345508A (en) | 1993-08-23 | 1994-09-06 | Apple Computer, Inc. | Method and apparatus for variable-overhead cached encryption |
US5457746A (en) | 1993-09-14 | 1995-10-10 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5347581A (en) | 1993-09-15 | 1994-09-13 | Gemplus Developpement | Verification process for a communication system |
US5381480A (en) | 1993-09-20 | 1995-01-10 | International Business Machines Corporation | System for translating encrypted data |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5444779A (en) | 1993-10-18 | 1995-08-22 | Xerox Corporation | Electronic copyright royalty accounting system using glyphs |
EP0649074A1 (en) | 1993-10-18 | 1995-04-19 | Xerox Corporation | A system and method to measure and accrue copyright royalties |
US5369702A (en) | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5680452A (en) | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US5633934A (en) | 1993-12-09 | 1997-05-27 | Hember; John T. | Local area nework encryption decryption system |
US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5499340A (en) | 1994-01-12 | 1996-03-12 | Isogon Corporation | Method and apparatus for computer program usage monitoring |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
WO1995020291A1 (en) | 1994-01-19 | 1995-07-27 | Highwater Fbi Limited | Method of and apparatus for manipulating digital data works |
US5509074A (en) | 1994-01-27 | 1996-04-16 | At&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
EP0665486A3 (en) | 1994-01-27 | 1995-09-13 | AT&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5504816A (en) | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5497420A (en) | 1994-02-07 | 1996-03-05 | Le Groupe Vide/ otron Lte/ e | Cable TV system using passwords |
US5479514A (en) | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US5511121A (en) | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
US5835601A (en) | 1994-03-15 | 1998-11-10 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
US5968175A (en) | 1994-03-29 | 1999-10-19 | Kabushiki Kaisha Toshiba | Software use method control system |
US5912969A (en) | 1994-03-31 | 1999-06-15 | Hitachi, Ltd. | Information receiving and recording/reproducing apparatus/method having function for limiting/delimiting for protecting copyright of recording information |
US7036019B1 (en) | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US20020021807A1 (en) | 1994-04-01 | 2002-02-21 | Mitsubishi Corporation | Method for controlling database copyrights |
EP0677949B1 (en) | 1994-04-01 | 2003-05-28 | Mitsubishi Corporation | Method for controlling copyright of encrypted digital data |
US6097816A (en) | 1994-04-08 | 2000-08-01 | Mitsubishi Corporation | Crypt key system |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5504817A (en) | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
US5515441A (en) | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5475757A (en) | 1994-06-07 | 1995-12-12 | At&T Corp. | Secure data transmission method |
US5577121A (en) | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US6091835A (en) | 1994-08-31 | 2000-07-18 | Penop Limited | Method and system for transcribing electronic affirmations |
US5541994A (en) | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
US5832083A (en) | 1994-09-09 | 1998-11-03 | Fujitsu Limited | Method and device for utilizing data content |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
US6069952A (en) | 1994-09-30 | 2000-05-30 | Mitsubishi Corporation | Data copyright management system |
US20030144963A1 (en) | 1994-09-30 | 2003-07-31 | Mitsubishi Corporation | Data copyright management system |
EP0704785B1 (en) | 1994-09-30 | 2003-11-19 | Mitsubishi Corporation | Data copyright management system |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US5636277A (en) | 1994-09-30 | 1997-06-03 | Fujitsu Limited | System for licensing to use software products |
WO1996013113A1 (en) | 1994-10-12 | 1996-05-02 | Secure Computing Corporation | System and method for providing secure internetwork services |
US5864683A (en) | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
US6097818A (en) | 1994-10-27 | 2000-08-01 | Mitsubishi Corporation | Data copyright management method |
US6128605A (en) | 1994-10-27 | 2000-10-03 | Mitsubishi Corporation | Apparatus for data copyright management system |
EP0709760B1 (en) | 1994-10-27 | 2006-05-31 | Intarsia Software LLC | Data copyright management system |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
US5646999A (en) | 1994-10-27 | 1997-07-08 | Mitsubishi Corporation | Data coypright management method |
US5867579A (en) | 1994-10-27 | 1999-02-02 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6438694B2 (en) | 1994-10-27 | 2002-08-20 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
US20020052850A1 (en) | 1994-10-27 | 2002-05-02 | Mitsubishi Corporation | Digital content management system and apparatus |
US6408390B1 (en) | 1994-10-27 | 2002-06-18 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6463536B2 (en) | 1994-10-27 | 2002-10-08 | Mitsubishi Corporation | Data copyright management system |
US6721887B2 (en) | 1994-10-27 | 2004-04-13 | Mitsubishi Corporation | Data copyright management system |
US6272635B1 (en) | 1994-10-27 | 2001-08-07 | Mitsubishi Corporation | Data copyright management system |
EP0715241B1 (en) | 1994-10-27 | 2004-01-14 | Mitsubishi Corporation | Apparatus for data copyright management system |
EP0715243B1 (en) | 1994-11-23 | 2003-08-06 | ContentGuard Holdings, Inc. | System for controlling the distribution and use of digital works having a fee reporting mechanism |
EP0719045B1 (en) | 1994-12-13 | 2003-10-29 | Mitsubishi Corporation | Crypt key system for secure electronic transactions |
US5740246A (en) | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US6182218B1 (en) | 1994-12-13 | 2001-01-30 | Mitsubishi Corporation | Digital content management system using electronic watermark |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5606613A (en) | 1994-12-22 | 1997-02-25 | Pitney Bowes Inc. | Method for identifying a metering accounting vault to digital printer |
US5771383A (en) | 1994-12-27 | 1998-06-23 | International Business Machines Corp. | Shared memory support method and apparatus for a microkernel data processing system |
WO1996023257A1 (en) | 1995-01-24 | 1996-08-01 | Tandem Computers Incorporated | Enhanced instrumentation software in fault tolerant systems |
US5982891A (en) | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
US5745572A (en) | 1995-02-24 | 1998-04-28 | International Computers Limited | Cryptographic key management |
US5706210A (en) | 1995-03-01 | 1998-01-06 | Fujitsu Limited | Network monitoring device |
WO1996027259A1 (en) | 1995-03-02 | 1996-09-06 | Signum Technologies Limited | Method of and apparatus for manipulating digital data works |
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US5553145A (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
US5812762A (en) | 1995-03-31 | 1998-09-22 | Samsung Electronics Co., Ltd. | Personal computer having card read/write controller |
US5974141A (en) | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US5835765A (en) | 1995-05-31 | 1998-11-10 | Mitsubishi Denki Kabushiki Kaisha | Computer operation management system for a computer operating system capable of simultaneously executing plural application programs |
US5848158A (en) | 1995-06-02 | 1998-12-08 | Mitsubishi Corporation | Data copyright management system |
EP0746126B1 (en) | 1995-06-02 | 2004-12-22 | Mitsubishi Corporation | System for data copyright management using key distribution |
US6081794A (en) | 1995-06-02 | 2000-06-27 | Mitsubishi Corporation | Data copyright management system |
US5818933A (en) | 1995-07-07 | 1998-10-06 | Mitsubishi Denki Kabushiki Kaisha | Copyright control system |
US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6002772A (en) | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US5765152A (en) | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US6076077A (en) | 1995-10-27 | 2000-06-13 | Mitsubishi Corporation | Data management system |
US5689587A (en) | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
EP0813133A2 (en) | 1996-06-11 | 1997-12-17 | International Business Machines Corporation | A uniform mechanism for using signed content |
WO1997050036A1 (en) | 1996-06-27 | 1997-12-31 | Institute Of Systems Science | Computationally efficient method for trusted and dynamic digital objects dissemination |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US6044367A (en) | 1996-08-02 | 2000-03-28 | Hewlett-Packard Company | Distributed I/O store |
US5848155A (en) | 1996-09-04 | 1998-12-08 | Nec Research Institute, Inc. | Spread spectrum watermark for embedded signalling |
US5765176A (en) | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
US5825892A (en) | 1996-10-28 | 1998-10-20 | International Business Machines Corporation | Protecting images with an image watermark |
US6519623B1 (en) | 1996-10-31 | 2003-02-11 | International Business Machines Corporation | Generic semaphore for concurrent access by multiple operating systems |
US6209092B1 (en) | 1997-01-27 | 2001-03-27 | U.S. Philips Corporation | Method and system for transferring content information and supplemental information relating thereto |
US6026430A (en) | 1997-03-24 | 2000-02-15 | Butman; Ronald A. | Dynamic client registry apparatus and method |
JP3265241B2 (en) | 1997-09-10 | 2002-03-11 | シャープ株式会社 | Rice cooker and high frequency heating device |
US6615258B1 (en) * | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US6160891A (en) | 1997-10-20 | 2000-12-12 | Sun Microsystems, Inc. | Methods and apparatus for recovering keys |
US7024681B1 (en) | 1997-12-04 | 2006-04-04 | Verizon Laboratories Inc. | Method and apparatus for near video on demand |
US6560339B1 (en) | 1998-02-17 | 2003-05-06 | Canon Kabushiki Kaisha | Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6574609B1 (en) * | 1998-08-13 | 2003-06-03 | International Business Machines Corporation | Secure electronic content management system |
US7093295B1 (en) | 1998-10-15 | 2006-08-15 | Makoto Saito | Method and device for protecting digital data by double re-encryption |
US6603864B1 (en) | 1998-10-30 | 2003-08-05 | Fuji Xerox Co., Ltd. | Image processing apparatus and image processing method |
US6851053B1 (en) | 1999-03-02 | 2005-02-01 | Microsoft Corporation | Multiparty conference authentication |
JP4181282B2 (en) | 1999-09-16 | 2008-11-12 | 株式会社東芝 | Electronic currency terminal |
US6668324B1 (en) | 1999-12-13 | 2003-12-23 | Intel Corporation | System and method for safeguarding data within a device |
US20020122173A1 (en) | 2001-03-05 | 2002-09-05 | Donald Bruns | Method and apparatus for fiber alignment using light leaked from cladding |
US6874089B2 (en) | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
US20050262033A1 (en) | 2002-03-29 | 2005-11-24 | Kazuhiko Yamashita | Data recording apparatus, data recording method, program for implementing the method, and program recording medium |
JP4268844B2 (en) | 2003-07-15 | 2009-05-27 | Tdk株式会社 | Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component |
Non-Patent Citations (78)
Title |
---|
"Des Modes of Operation" U.S. FIPS Publication 81, Dec. 2, 1980, 23 pgs. |
Adachi, R., "Introduction to handcraft of Personal Computer" Natsume Publishing Co., 1983, pp. 141-155. |
Amendments in Japanese Application No. 2004-168776 dated Apr. 13, 2010, 4 pages. |
Anonymous, "Encryption of Information to be Recorded so as to Prevent Unauthorized Playback" Research Disclosure No. 335, Mar. 1992, Emsworth, GB, p. 219. |
Anonymous, "Security" Government Executive, National Journal, Inc. Washington, vol. 29, issue 1, Jan. 1997, pp. 35-37. |
Appeal and Amendment in Japanese Application No. 2004-168776 dated Aug. 27, 2007, 10 pages. |
Bellovin, S.M. et al., "Network Firewalls" IEEE Communications Magazine, vol. 32, No. 9, Oct. 1994, pp. 50-57. |
Bryan, John "A look at five different firewall products and services you can install today" www.byte.com/art/9504/sec10/art6.htm, Apr. 1995. |
Concise Explanation of Non-English Language Documents Under 37 C.F.R. § 1.98(a)(3) for NPL References 7, 10, 12-14. |
Decision on Appeal in Japanese Application No. 2004-168776 dated May 10, 2010, 2 pages. |
European Search Report for European Patent Application No. 97116728 dated Jun. 23, 1999, 4 pages. |
Fitch, K. "User Authentication and Software Distribution on the Web", ausweb97@scu.edu.au Nov. 5, 1996, pp. 1-12. |
Gale, Brent et al., "Satellite and Cable TV Scrambling and Descrambling" Baylin/Gale Productions, 2nd Edition, 1986, pp. 163-165. |
Grampp, F.T. et al., "Unix Operating System Security" AT&T Bell Laboratories Technical Journal, vol. 63, No. 8, Oct. 1984, New York, pp. 1649-1672. |
Harn, Lein, et al., "Software Authentication System for Information Integrity" Computers & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. II, Dec. 1, 1992, pp. 747-752, XP000332279. |
Hedberg, S.R. "HP's International Cryptography Framework: Compromise or Threat?" IEEE Computer, Jan. 1997, pp. 28-30. |
Kent, Stephen, T., "Internet Privacy Enhanced Mail", Association for Computing Machinery, Communications of the ACM, Aug. 1993, vol. 36, issue 9, pp. 48-61. |
Komatsu, Naohisa, et al., "A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature" Electronics & Communications in Japan Part I-Communications, vol. 73, No. 5, part 1, May 1, 1990, pp. 22-33. |
Lennil, P. "The IBM Microkernel Technology," OS/2 Developer, vol. 5, Nov. 1, 1993 (pp. 70-72, 74) XP000672962. |
Masuoka, Fujio, "Progressing Flash Memories" Kogyo Chosa-kai Co., Chapter 1: Semiconductor Memory, pp. 34-68, 1992. |
Matsumoto, Tsutomu et al., "Cryptographic Key Sharing" Technical Report of Institute of Electronics, Information and Communication Engineers (IEICE), Mar. 27, 1990, vol. 89, No. 482, pp. 33-47. |
Medvinsky, Gennady et al., "NetCash: A design for practical electronic currency on the Internet" University of Southern California Information Science Institute, Nov. 1993, pp. 2-7. |
Memon, Nasir, et al., "Protecting Digital Media Content" Association for Computing Machinery, Communications of the ACM, New York, Jul. 1998, vol. 41, issue 7, pp. 35-43. |
Menezes, Alfred, et al., "Handbook of Applied Cryptography" 1997, sec. 11.5.1, CRC Press, pp. 452-454. |
Morizaki, H., "Introduction to Electronic Devices" Gijustsu Hyoron Publishing Co., 1989, pp. 260-266. |
Murphy, Kathleen, "Digimarc Awarded Patent for Digital Watermarking" Business, Mar. 10, 1998, www.internetnews.com/bus-news/article.php/19611, 2 pgs. |
Neuman, Clifford B., Proxy-Based Authorization and Accounting for Distributed Systems, Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993, pp. 283-291. |
Notice of Reason for Rejection in Corresponding Japanese Patent Office Application No. 7-280984, mailed Jan. 20, 2004, English Translation. |
Office Action in European Application No. 97116728 dated Mar. 23, 2001. |
Official Action in European Application No. 97116728.3 dated Apr. 12, 2002, 4 pages. |
Official Action in Japanese Application No. 2004-168776 dated Aug. 29, 2006, 6 pages. |
Official Action in Japanese Application No. 2004-168776 dated May 29, 2007, 5 pages. |
Official Action in Japanese Application No. 2007-047674 dated May 31, 2010, 5 pages. |
Official inquiry from the appeal board in Japanese Application No. 2004-168776 dated Aug. 10, 2009, 3 pages. |
Ohtaki, Yasuhiro et al., "Cryptographic Management for Superdistribution" Technical Research Report of Electronic Information Communication Association, Mar. 8, 1991, vol. 90, No. 460, pp. 33-42. |
Response to Official Action in European Application No. 97116728.3 dated Apr. 12, 2002, mailed Aug. 8, 2002, 12 pages. |
Response to Official Action in European Application No. 97116728.3 dated Mar. 23, 2001, mailed Jan. 16, 2002, 13 pages. |
Response to Official Action in Japanese Application No. 2004-168776 dated Aug. 29, 2006, mailed Feb. 27, 2007, 6 pages. |
Response to Official inquiry from the appeal board in Japanese Application No. 2004-168776 dated Aug. 10, 2009, mailed Feb. 10, 2010, 9 pages. |
Rozenblit, M. "Secure Software Distribution" IEEE Network Operations and Management Symposium, vol. 2, Feb. 14-18, 1994, pp. 486-496. |
Rubin, A.D., "Secure Distribution of Electronic Documents in an Hostile Environment" Computer Communications, vol. 18, No. 6, Jun. 1995, pp. 429-434. |
Rubin, A.D., "Trusted Distribution of Software Over the Internet" Network and Distributed System Security, Feb. 16-17, 1995, San Diego, California, pp. 47-53. |
Schneier, Applied Crytography, first edition, Oct. 1993, Wiley, pp. 29-31, 42-56, 152, 153. |
Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C; John Wiley & Sons, Inc. 1996, Second Edition, pp. 357-368. |
Schneier, Bruce; One Way Hash Functions, John Wiley & Sons, Inc. 1996, pp. 429-430. |
Schneier, Bruce; One Way Hash Functions; John Wiley & Sons, Inc. 1996, pp. 129-130. |
Search Report in European Application No. 95116820, dated Dec. 23, 1998. |
Search Report in European Application No. 97116728.3 dated Jul. 5, 1999. |
Search Report in European Application No. 98104490 dated Aug. 6, 2001. |
Search Report in European Application No. 98107668, dated Jul. 31, 2001. |
Seki, Kazunori et al., "A Proposal of a New Distribution Scheme for Software Products", Keio Department of Instrumentation Engineering, Faculty of Science and Technology, Keio University, Research report made at the information Processing Association, Japan, Jul. 20, 1993, vol. 93, No. 64, pp. 19-28. |
Tatsuaki Okamoto, "Universal Electronic Cash", Technical Report of Institute of Electronics, Information and Communication Engineers (IEICE) Jul. 15, 1991, vol. 91, No. 127, pp. 39-47. |
Tirkel, A.Z. et al., "Electronic Water Mark", Conference Proceedings Dicta, Dec. 1993, pp. 666-673. |
U.S. Appl. No. 08/733,504, filed Oct. 18, 1996, Saito. |
U.S. Appl. No. 08/846,661, filed May 1, 1997, Saito. |
U.S. Appl. No. 08/895,493, filed Jul. 16, 1997, Saito. |
U.S. Appl. No. 09/362,955, filed Jul. 30, 1999, Saito. |
U.S. Appl. No. 09/476,334, filed Jan. 30, 2000, Saito. |
U.S. Appl. No. 09/665,902, filed Sep. 20, 2000, Saito. |
U.S. Appl. No. 09/985,279, filed Nov. 2, 2001, Saito. |
U.S. Appl. No. 10/013,507, filed Dec. 13, 2001, Saito. |
U.S. Appl. No. 10/170,677, filed Jun. 13, 2002, Saito. |
U.S. Appl. No. 11/404,124, filed Apr. 12, 2006, Saito. |
U.S. Appl. No. 11/441,973, filed May 25, 2006, Saito. |
U.S. Appl. No. 11/469,035, filed Aug. 31, 2006, Saito. |
U.S. Appl. No. 11/480,690, filed Jul. 3, 2006, Saito. |
U.S. Appl. No. 11/491,400, filed Jul. 20, 2006, Saito. |
U.S. Appl. No. 11/496,777, filed Jul. 31, 2006, Saito. |
U.S. Appl. No. 11/512,695, filed Aug. 29, 2006, Saito. |
U.S. Appl. No. 11/512,885, filed Aug. 29, 2006, Saito. |
U.S. Appl. No. 11/556,992, filed Nov. 6, 2006, Saito. |
U.S. Appl. No. 11/701,943, filed Feb. 1, 2007, Saito. |
U.S. Appl. No. 11/701,945, filed Feb. 1, 2007, Saito. |
U.S. Appl. No. 11/701,946, filed Feb. 1, 2007, Saito. |
Van Schyndel, R.G., et al., "A Digital Watermark" IEEE, Australia, 1994, pp. 86-90. |
Vigarie, J. "A Device for Real-Time Modification of . . . " 18th International Television Symposium and Technical Exhibition, Montreaux, Switzerland, Jun. 10-15, 1993, pp. 761-768. |
Wayner, P. "Digital Copyright Protection" AP Professional, 1997, pp. 1-7 and 14-17. |
Zhang, N.X. "Secure Code Distribution" IEEE Computer, Jun. 1997, pp. 76-79. |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8554684B2 (en) | 1994-04-01 | 2013-10-08 | Intarsia Software Llc | Controlling database copyrights |
US20060018474A1 (en) * | 2004-07-21 | 2006-01-26 | Yoshihiro Hori | Method for transmission/reception of contents usage right information in encrypted form, and device thereof |
US8363835B2 (en) * | 2004-07-21 | 2013-01-29 | Sanyo Electric Co., Ltd. | Method for transmission/reception of contents usage right information in encrypted form, and device thereof |
US20070174916A1 (en) * | 2005-10-28 | 2007-07-26 | Ching Peter N | Method and apparatus for secure data transfer |
US20100235689A1 (en) * | 2009-03-16 | 2010-09-16 | Qualcomm Incorporated | Apparatus and method for employing codes for telecommunications |
US20110231657A1 (en) * | 2009-03-16 | 2011-09-22 | Qualcomm Incorporated | Apparatus and method for employing codes for telecommunications |
Also Published As
Publication number | Publication date |
---|---|
US6744894B1 (en) | 2004-06-01 |
US20020025044A1 (en) | 2002-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE42163E1 (en) | Data management system | |
US5974141A (en) | Data management system | |
USRE43599E1 (en) | Data management system | |
US6076077A (en) | Data management system | |
EP0833241B1 (en) | Secure data management system | |
US6002772A (en) | Data management system | |
US6741991B2 (en) | Data management system | |
JP4562909B2 (en) | Safe delivery of digital expressions | |
US7986785B2 (en) | Data management | |
JP3625983B2 (en) | Data management system | |
US6069952A (en) | Data copyright management system | |
US6449717B1 (en) | Data copyright management system | |
US20070038575A1 (en) | Data copyright management system | |
US6789197B1 (en) | Apparatus for data copyright management system | |
JP3173352B2 (en) | Digital work distribution system | |
EP0878753A2 (en) | Data content dealing system | |
US20060282674A1 (en) | Data management system | |
JP2005124146A (en) | Access control for digital content | |
JPH08185448A (en) | System and device for managing data copyright | |
JP2005124150A (en) | Access control for digital content | |
JP2003509881A (en) | How to recover a master key from recorded electronic publications | |
JP4531449B2 (en) | Data management system | |
JP2003250136A (en) | Terminal device, video conference data management method, and program | |
JP4845772B2 (en) | Data management system | |
JP2004048557A (en) | Device, method and program of contents distribution and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FPAY | Fee payment |
Year of fee payment: 8 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
AS | Assignment |
Owner name: LF CAPITAL PARTNERS, LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 121 LLC;REEL/FRAME:049425/0896 Effective date: 20181219 |
|
AS | Assignment |
Owner name: PIRACY PROTECTION LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LF CAPITAL PARTNERS, LLC;REEL/FRAME:051364/0522 Effective date: 20190911 |