CN1124534C - Content supplied as software objects for copyright protection - Google Patents

Content supplied as software objects for copyright protection Download PDF

Info

Publication number
CN1124534C
CN1124534C CN99803708A CN99803708A CN1124534C CN 1124534 C CN1124534 C CN 1124534C CN 99803708 A CN99803708 A CN 99803708A CN 99803708 A CN99803708 A CN 99803708A CN 1124534 C CN1124534 C CN 1124534C
Authority
CN
China
Prior art keywords
content information
software object
content
information
terminal user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN99803708A
Other languages
Chinese (zh)
Other versions
CN1292897A (en
Inventor
Y·E·什特伊恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN1292897A publication Critical patent/CN1292897A/en
Application granted granted Critical
Publication of CN1124534C publication Critical patent/CN1124534C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2812Exchanging configuration information on appliance services in a home automation network describing content present in a home automation network, e.g. audio video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/2847Home automation networks characterised by the type of home appliance used
    • H04L2012/2849Audio/video appliances

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Automation & Control Theory (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Information Transfer Between Computers (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

Content information such as a movie, an audio file or a textual message is supplied to an end-user in a software object that has an encapsulated procedure for end-user access of the content information in a runtime environment. The object can specify time frame for and manner wherein the content information is to be accessed. Since the procedure is encapsulated in the object together with the content data, and since transport of the object over the Internet is done after serializing, an adequate degree of security is provided against unauthorized play-out or copying.

Description

A kind of method that content-data is provided controlled visit
The present invention relates to a kind of a kind of method when providing terminal user that the method, particularly this content-data of controlled visit be provided to consumer electronic devices or multimedia computer to content-data.The invention still further relates to a kind of protection to digital data content avoid the method for unauthorized copying.
Here said term " content " and " content-data " are meant that those contain the data of the used information of terminal user, for example: alphanumeric text, figure, video, audio frequency, multimedia or the like.
In general, digital content is sent out or flow into user's terminal usually by cable, internet or write DVD approach such as (Digital video discs) from remote server.This content is handled and is drawn to terminal user through receiving trap (as: computing machine, set top box).By using the water level calibration method to carry out copyright protection: promptly add and to perceive as the user but can drawn (rendering) or the digital modification discerned of verification software and hardware to content.The method of another kind of protection content is to encrypt.By using a kind of special cryptographic algorithm that content-data is encoded before sending to its destination.And make data stream draw or storage before at terminal device or go up decrypted at intermediate processor (PC, cable box, set top box etc.).
More than these methods remain many problems.For example, water level stake is extremely sensitive to the modification of content.If digital content is revised by software/hardware, but do not feel the existence of water level stake, then water level stake can not guarantee still to keep original initial form.For instance, adjust picture size, preserve picture, applied compression technology etc. with different file layouts and also can influence water level stake and reduce its useful effect.Encryption method also faces many challenges.More powerful and perfect along with computing machine/processing hardware and software is even if famous algorithm also becomes out-of-date very soon and is eliminated.Another challenge is standardization.That is, in order to occupy the mass market with various seller, content protecting method must be a standard.But then, the encryption method of standard can be run ragged in the relatively short time and be decoded by the expert, thereby also just is easy to lose efficacy.
An object of the present invention is to provide a kind of alternative method that content-data is provided controlled visit.Another object of the present invention is to make digital content more be difficult to be duplicated or draw by undelegated commission merchant.The 3rd purpose of the present invention provides a safety and compatible rapidly method is distributed digital content.
To achieve these objectives, the invention provides a kind of providing or received content information, particularly via network, as the method for one or more software objects.In running environment, process is encapsulated in the object of message reference.That is to say that the process of terminal user visit information will be packed with content information and is delivered to terminal user.
We know that a software object includes the method or the process of a content-data and a deal with data.In Object oriented programming, method is exactly a process of having programmed (PROCEDURE), and this process is defined as the part of a class and is contained in such any one object.An object can have a plurality of methods.A method in the object is the given data of addressable this object only.So just guaranteed in application the integrality of data in this group objects.
Open distributed software structure such as HAVi, Java/JINI, allow all based on Home API, the CORBA etc. of COM or DCOM technology that (the Internet, home network, LAN (Local Area Network), wide area network etc.) carry out transmitting and converting to software object on network.The more information of representing about software, HAVi, use COM technology and OLE automatic control object, following patent document is cited as reference in this combination: U.S. patent sequence number No.08/731,624 (act on behalf of case number: PHA 23,169), the applying date 10/15/96, inventor: Paul Chambers and Saurabh Srivastava, denomination of invention: task-driven distributed multimedia custom system; U.S. patent sequence number No.09/146,020 (act on behalf of case number: PHA 23,492), the applying date 9/2/98, inventor: Yevgeniy Shteyn, denomination of invention: the low expression of data rate networks on high data rate HAVi network; U.S. patent sequence number No.09/165,683 (act on behalf of case number: PHA23,483), the applying date 10/2/98, inventor: Yevgeniy Shteyn, denomination of invention: the identification script that calls the Control Software object via the path of having the right; U.S. patent sequence number No.09/165,682 (act on behalf of case number: PHA 23,484), the applying date 10/2/98, inventor: Yevgeniy Shteyn, denomination of invention: control characteristic is mapped on the GUI element of form compatibility; And U.S. patent sequence number No.09/107,525 (attorney docket: PHA 23,438), the applying date 6/30/98, inventor: Yevgenyi Shteyn and GregoryGewickey, denomination of invention: the dynamic cancellation of equipment in the multiple communication protocol system.
When software object etc. is transferred on the machine, it just can be mutual with the system software of machine.For instance, a HAVi DCM can be uploaded on the FAV, and is performed in the running environment of JAVA.DCM can be programmed into the API instrument and realize drawing, stores, writes down or other processing about figure, video, audio frequency, text, image etc.In this case, software object just can be directly and rendering apparatus work and must in the middle of deciphering or revise.All operations is all controlled by object itself and can be hidden disagreeableness application.When content need be stored, object control store API just be called (for example: serialization, can see below).Because this object is being controlled storage (record) and handled, just must rebuild an object visits the content of having stored to host computer system, so its content just obtains having protected.Object can influence the mutual of the quality of record, number of times that content can be recorded or draw and other and host computer system.Software object also can be made into time-sensitive.For example: a movie objects can be rented, and just, it is drawn API and is used in the time an official hour length-movie only, as one day, or the like ...A controlling object does not need to comprise all contents.When content was very big, object can only keep quoting and retrieving location of content in needs.When must or being fit to, the link between object can control operation.For example, different film scenes are controlled by different objects.An object can be set to provide free (track) visit to some part of content, and other parts are then required to pay.With system resource is with good conditionsi alternately can be and be implemented based on user's preferential selection.It is the rank that depends on user capture that advertisement and sales promotion can be used as independently that object is inserted into.(for instance, by reservation).
We know that an object can be hidden binary code, if object client's running environment is known or object and equipment can be detected after mutual.For example, a rendering algorithm or scale-of-two upgrading preferably can be passed on the three medium machines of an operation Java Virtual Machine.
This kind is recommended by the method for object with data content delivery to a terminal, also is fit closely for other uses except being fit to copyright protection.As: email (electronic letter), teleconference (via phone) or video conference for safety factor can software object be exchanged for the basis.Similarly, electronic money trading also can carry out safely by the communication of software object.Electronic letter also can be used as software object and is implemented.
Object for example from the server end to the client, is realized by waiting as object serialization by the transmission of network.Object serialization among the Java supports the coding of each object to enter bit stream, and object can reach it, and it is also supported to come from the complementarity of the object figure of this stream and rebuilds.Serialization is as slightly continuing and being used for via socket or remote method invocation (RMI) (RMI) communication.Object coding protection individual and the instantaneous data of acquiescence, and support the evolution of class.One independently digital data stream is can be by non-existent user's malice on traditional sense pirate and duplicate.What all were sent out all is Bit String, and since process and content information can not from stream, be identified, so concerning most people, can not find the clue of its meaning.A class can realize that the external encode of himself increases security, its foreign format of individual responsibility (source:http: //www.javasoft.com/products/jdk/1.1/docs/guide/seriali-zat ion/index.html) then. therefore, a decrypting process can be packaged in the object with content data encrypted.This decrypting process just is called when receiving end, may also be replenished by the trace routine of affirmation recipient identity, decryption key or the rendering apparatus sequence number etc. of an encapsulation.
For clarity, we know via the Internet can download Applet, need a browser application that reside in the reception client to the user capture of Applet.This Applet is performed in browser application.Browser or plug-in card program are not the ingredients of this Applet.In this invention, software object is at receiver running environment (HAVi working time, Home API working time [=Windows OS] for instance,, Jini working time) uses himself program directly to activate in, and in working time, do not need browser or any client applications.
A kind of content information is offered the method for terminal user according to of the present invention, it is characterized in that described method comprises the steps:
Create software object, described software object has encapsulated content information and be used for the process of the described content information of end-user access in runtime environment; And described software object offered described interruption terminal user.
According to a kind of method that is used for received content information of the present invention, it is characterized in that described method comprises the steps:
Receiving software object, described software object have encapsulated content information and be used for the process of the described content information of end-user access in runtime environments; And use this process in running environment, to start the terminal user to visit content information.
Various favourable scheme of the present invention all is listed in appended claim and all possible combination thereof.For example, a video conference system can provide the video flowing of routine and the secure audio and/or the graph data of object encapsulation.
The present invention is further described in more detail by example with reference to the accompanying drawings, wherein:
Fig. 1-the 5th, method of the present invention obtains carrying out the calcspar of a system example.
Identical digital reference number shows similar or corresponding feature among the figure.
Fig. 1 is a calcspar of carrying out the HAVi system 100 of the inventive method.System 100 comprises a medium 102 and a FAV (complete AV node) 104, and FAV comprises a Digital Television in this example.FAV 104 has a Java Virtual Machine 106.Medium 102 comprise (as) impact damper, its storage from external system 100 (as) software object 108 that receives in the electronics mode of the Internet behind deserializing or DVD or other physical data carriers that comprises software object, here be the playing program that HAVi DCM 108 has content-data 110 and represented by drafting API112.The drafting that software object 108 is uploaded among the FAV 104 is handled, and draws API 104 with Java Virtual Machine 106 direct reciprocations in FAV 104.Having ready conditions of content visited can be based on security or user/power system capacity.In the pattern based on safety, object allows by api interface for to checking contributive broadcast or storage to call.An authority or the identifier that can be checked by object should be provided working time.For example, male parent (parental) control can be realized by a group objects of representing film different piece content.As another example, the Drawing Object that e-book can the restricted property of packaging belt requirement visit.
Fig. 2 is a calcspar that uses the Jini system 200 of JavaSpaces structure.JavaSpaces is functional the same with Java Virtual Machine and Java remote method invocation (RMI), and its structure is used to set up a distributed operation system and sets up thesaurus based on the Java object.The execution of JavaSpaces provides a mechanism, be used for storing the related object group and based on to specified domain match query value so that this group of objects is retrieved.This allows the JavaSpaces server to be used to storage and searching object on remote system.JavaSpaces API uses a kind of special bag to provide basic atom to handle, and multiple operation is crossed the bundle that multiple JavaSpaces carries out to be become as monatomic operation in groups.JavaSpaces structural support mechanism is handled, and allows multioperation and/or more newly arriving of many spaces to finish.The meaning of term " atomicity " be by certain handle that all operations occurs in groups or one do not occur.Jini also is the technology for the network equipment of a kind of SunMicrosystems of coming from.Jini is a kind of software engineering based on Java, auxiliary PC network and peripherals.When being inserted into network, the Jini enabled devices will be reported its existence.But prepare to use the network client slave unit of this equipment itself to require necessary software, ignore server or webmaster.This structure is the top that builds on already present network.
System 200 comprises JavaSpaces server 202 and 204, and passes through the client 206 that network 208 connects.JavaSpaces202 or 204 provides a continuation of having distributed and the object that writes in the java applet language to exchange mechanism.Object is written in the porch, and this inlet provides a grouping of having keyed in for the domain of dependence.The client can carry out shirtsleeve operation and write new inlet, searches existing inlet and deletion inlet from the space on the JavaSpaces server.But the user uses these instrument writing systems, and this system uses data stream to realize the distributed arithmetic rule; And can make the JavaSpaces system realize continuation to the user, when a suitable request, server 202 shifts (by serialization) to client 206 with an object.This just shifts and to rent inventory as the distribution of Java is a kind of renting specified.Unless the mandate grantee to server or resource cancels clearly, can be to server or resource authorization, resource of having rented or server authorizes are based on the time.Server will stop or resource is released when lease expiration.The notion of " renting " is useful especially in compartment system, and the different piece of cooperative groups all can not be communicated by letter in this case, for instance, because group or connection member's failure.According to the chart of Fig. 2, server 202 is rented server 204 with a stature object and is done storage temporarily and inferior object is rented interim storage of client 206 dos or drafting.This layout is with relevant as video (or audio frequency) order program service merchant, multi-player video game supplier etc.Similar client-server end structure can use the COM/DCOM technology based on a Windows operating system and a subsidiary COM client of Microsoft to set up.
Fig. 3 represents system 300, and it has COM/DCOM server 302 and COM client 304, and server 302 provides object accesses and object storage.Client 304 can be used COM or DCOM mechanism access server 302.When remote location, use DCOM.Access mechanism is transparent to client 304.Com object is transferred to client 304 to be handled, and suitable API is called in client 304 and its objective is and produce desirable content.Object has complete access to system resource and API, as the DirectShow assembly of Microsoft.
Fig. 4 is the arrangement plan of another system 400 of the present invention.System 400 comprises a server 402, is used to provide object and serves as object repository.System 400 also comprises client 404 and 406.System 400 is used for many customer interactions of (for example) content exchange, such as video conference.Content object is put in servers/stores storehouse 402 by client 404, and client 406 can be retrieved it from thesaurus 402.
Fig. 5 is the arrangement plan that disposes similar system 500 to system 400.System 500 comprises an object server 502 of serving client 504,506,508 and 510.The function of server 502 is to enable the effect of multi-client object interaction as an object thesaurus.Content object can be positioned in the server 502 by any client of 504-510 and can be retrieved by any client except that client 504-510.System 500 comprises that a relaying or replication server 512 are to serve client 514 and 516.Content object can be packaged or according to client 504-510 and 514-516 right of priority or access privileges and exposed interface.
About more information, the instructions of relevant Java, JavaSpaces and Jini structure, all Sun Microsystem, and all components object model instructions of Microsoft can be used as reference.

Claims (20)

1. one kind offers the method for terminal user to content information (110), it is characterized in that described method comprises the steps:
Create software object (108), described software object has encapsulated content information and be used for the process (112) of the described content information of end-user access in runtime environment (104); And
Described software object is offered described interruption terminal user.
2. 1 method as requested, wherein said process starts the conditional access to content information.
3. also comprise the steps: the described software object of serialization so that provide described software object electronically according to the process of claim 1 wherein by network (208).
4. according to the process of claim 1 wherein that described object also comprises a process that goes up the broadcast that starts content information at playback equipment (104).
5. according to the process of claim 1 wherein that described object also comprises one at storer (204; 206) start the process of the storage of content information in.
6. according to the process of claim 1 wherein that described providing is included in the electronic letter service.
7. according to the process of claim 1 wherein that described providing is included in the teleconference service.
8. according to the process of claim 1 wherein that described providing is included in the video conference service.
9. according to the process of claim 1 wherein that described content information comprises audio-frequency information.
10. according to the process of claim 1 wherein that described content information comprises video information.
11. according to the process of claim 1 wherein that described content information comprises film.
12. a method that is used for received content information (110) is characterized in that described method comprises the steps:
Receiving software object (108), described software object have encapsulated content information and be used for the process (112) of the described content information of end-user access in runtime environments (104); And
Use this process in running environment (104), to start the terminal user and visit content information.
13., also comprise the steps: to start conditional access to described content information by the conditional access process in described object according to the method for claim 12.
14. according to the method for claim 12, wherein said content information comprises audio-frequency information.
15. according to the method for claim 12, wherein said content information comprises video information.
16. according to the method for claim 12, wherein said content information comprises film.
17. according to the method for claim 12, wherein said content information comprises alphanumeric information.
18. method for preparing content information for the terminal user, it is characterized in that, this method is included in the software object content information (110) is packed, and described software object has encapsulated a described terminal user of startup in running environment (104) to visit the process of described information.
19. according to the method for claim 18, wherein said content information comprises film.
20. according to the method for claim 18, wherein said content information includes alphanumeric information.
CN99803708A 1998-11-10 1999-11-01 Content supplied as software objects for copyright protection Expired - Fee Related CN1124534C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US18953498A 1998-11-10 1998-11-10
US09/189,534 1998-11-10

Publications (2)

Publication Number Publication Date
CN1292897A CN1292897A (en) 2001-04-25
CN1124534C true CN1124534C (en) 2003-10-15

Family

ID=22697749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN99803708A Expired - Fee Related CN1124534C (en) 1998-11-10 1999-11-01 Content supplied as software objects for copyright protection

Country Status (5)

Country Link
EP (1) EP1046095A1 (en)
JP (1) JP2002529844A (en)
KR (1) KR20010034000A (en)
CN (1) CN1124534C (en)
WO (1) WO2000028398A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE518913C2 (en) * 2000-04-07 2002-12-03 Telia Ab Lending of local resource in a telecommunications and data communication system
JP3788201B2 (en) * 2000-06-07 2006-06-21 日本電信電話株式会社 Information capsule management method and storage medium storing information capsule management program
DE10028349A1 (en) * 2000-06-08 2001-12-20 Siemens Ag Method and arrangement for the secure use of a service
JP2002007325A (en) * 2000-06-23 2002-01-11 Shinkichi Morimoto Method and system for distributing digital contents
US7958213B1 (en) 2000-09-21 2011-06-07 Siemens Enterprise Communications, Inc. Processing electronic messages
NO316737B1 (en) * 2001-11-08 2004-04-19 Beep Science As Arrangement and procedure for content control of data objects, especially data objects in MMS messages
JP4532068B2 (en) * 2001-12-07 2010-08-25 パナソニック株式会社 Content distribution system and method
JP4039489B2 (en) 2002-01-12 2008-01-30 コアトラスト インコーポレーテッド Information protection method and system for multimedia contents
JP3950010B2 (en) * 2002-05-17 2007-07-25 株式会社エヌ・ティ・ティ・ドコモ Data processing apparatus, program, and recording medium
JP4629304B2 (en) 2002-10-30 2011-02-09 株式会社エヌ・ティ・ティ・ドコモ COMMUNICATION DEVICE, PROGRAM, AND RECORDING MEDIUM
KR100724439B1 (en) * 2005-03-22 2007-06-04 엘지전자 주식회사 Method of protecting rights object
WO2006133076A2 (en) * 2005-06-03 2006-12-14 Warner Bros. Entertainment Inc. System to ensure that all audio-visual optical disc types are properly screened for watermarks
CN100437612C (en) * 2005-10-31 2008-11-26 华为技术有限公司 Method and device for protecting content
BRPI0821205B1 (en) * 2007-12-20 2019-07-30 Koninklijke Philips N.V. METHODS FOR PROVIDING A DIGITAL PROGRAM AUTHORIZATION, FOR DELIVERING DIGITAL CONTENT ON A DEVICE AND FOR AUTHENTICATING THE VALIDITY OF THE DEVICE THAT DELIVERS DIGITAL CONTENT, AND DEVICE FOR RENDING A DIGITAL CONTENT.

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system

Also Published As

Publication number Publication date
EP1046095A1 (en) 2000-10-25
WO2000028398A1 (en) 2000-05-18
KR20010034000A (en) 2001-04-25
JP2002529844A (en) 2002-09-10
CN1292897A (en) 2001-04-25

Similar Documents

Publication Publication Date Title
US10430770B2 (en) System and method for distributing digital rights management digital content in a controlled network ensuring digital rights
CN1124534C (en) Content supplied as software objects for copyright protection
US8533860B1 (en) Personalized digital media access system—PDMAS part II
US7047241B1 (en) System and methods for managing digital creative works
US7062500B1 (en) Techniques for defining, using and manipulating rights management data structures
AU728776B2 (en) Techniques for defining, using and manipulating rights management data structures
US8887308B2 (en) Digital cloud access (PDMAS part III)
JP4888910B2 (en) Authorized domain generation method and system
US7770230B2 (en) System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software
CN101023409A (en) System and method for enabling device dependent rights protection
US20040143760A1 (en) Systems and methods for licensing one or more data streams from an encoded digital media file
JP5585898B2 (en) Flexible tokens used in content delivery
CA2616981C (en) System and method for managing encrypted content using logical partitions
CN101297281A (en) Grid network for distribution of files
WO1997014087A1 (en) System and methods for managing digital creative works
WO2002006931A2 (en) Controlling and managing digital assets
US7356847B2 (en) System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software
CN102047239A (en) Defining, distributing and presenting device experiences
US20020156712A1 (en) Parametric representation scheme and systems for description and reconstruction of an intellectual property management and protection system and corresponding protected media
CN1662980B (en) System for secure storage
KR101564731B1 (en) System and method for tracking a downloaded digital media file
Park et al. Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments
CN101529462A (en) Method and system for providing a content subscription service
US20110119772A1 (en) Media Content Transfer and Remote License Acquisition
EP1120731A2 (en) Method and system for content commercialization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee