WO2003010637A1 - Method and computer system for secure distribution of digital data - Google Patents

Method and computer system for secure distribution of digital data Download PDF

Info

Publication number
WO2003010637A1
WO2003010637A1 PCT/EP2001/008563 EP0108563W WO03010637A1 WO 2003010637 A1 WO2003010637 A1 WO 2003010637A1 EP 0108563 W EP0108563 W EP 0108563W WO 03010637 A1 WO03010637 A1 WO 03010637A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
user
carrier
system server
key code
Prior art date
Application number
PCT/EP2001/008563
Other languages
French (fr)
Inventor
Frank Jacob
Original Assignee
Frank Jacob
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Frank Jacob filed Critical Frank Jacob
Priority to PCT/EP2001/008563 priority Critical patent/WO2003010637A1/en
Publication of WO2003010637A1 publication Critical patent/WO2003010637A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Definitions

  • the invention refers to a method and a computer system for decrypting media data stored on a computer-readable data carrier.
  • the major problem of such an encryption system resides in that if the original purchaser copies the data carrier and provides this copy along with the correct key code to another person, that the other person is then also able to install the data carrier content on his local computer. Accordingly, the software provider cannot prevent that many copies are made of his original software stored on the data carrier. This problem arises for any encrypted media data stored on a data carrier when the original purchaser receives the key code along with the data carrier from the provider.
  • the invention provides a computer system comprising at least one system server having a system server database storing decryption key codes of a plurality of data carriers wherein said system server is connected via a data network to at least one local computer of a user, said local computer including reading means for a data carrier which stores a data carrier key code for identification of the data carrier and encrypted media data, wherein the system server sends a decryption key code corresponding to the data carrier key code for the decryption of the encrypted media data when the data carrier key code is valid.
  • system server database includes a member database and a data carrier database.
  • the member database stores a plurality of user personal ID numbers (PIN) and corresponding personal data of the users, value data and transaction data.
  • PIN user personal ID numbers
  • the data carrier database stores a plurality of carrier key codes to identify the data carriers and for each carrier key code a corresponding verified user personal ID number identifying the user, value data, value timing data indicating whether the value data of the data carrier is valid and a decryption key code for decrypting media data stored on the data carrier which is identified by the carrier key code.
  • the data carrier database stores, in a preferred embodiment of the computer system, an identification flag for each carrier key code which indicates whether the carrier key code is valid.
  • a user interface program which is stored on the data carrier is executed on the local computer of the user, wherein the user interface program establishes a data communication link between the local computer and the system server via the data network by means of a network browser.
  • a system server input mask is displayed to the user after a personal ID number which has been input by the user has been verified by the system server.
  • the data of the user stored in the member database is displayed on a screen of the local computer to the user when selected by the user in the system server input mask.
  • the value data read from the data carrier is credited to a value data account of a user in the member database of the system server when the value timing data indicates that the value data is still valid and the personal identification number input by the user has been verified by the system server.
  • the value data of the data carrier which has been credited to a value data account are marked to be invalid in the data carrier database of the system server.
  • the value data is credited to a value data account of a provider in the member database of the system server when a purchase transaction has been performed between the local computer of the user and a server of the provider, or of the computer system accordingly.
  • the value data stored in the carrier database of the system server comprises preferably coupon data for purchasing goods and services from the servers of providers connected to the data network, or servers of the computer system offering goods and services of the providers.
  • the data network addresses of the provider servers accepting the coupons are stored corresponding to the coupon data in the member database of the system server.
  • the value data stored in the carrier database of the system server comprises network money data for purchasing goods and services from servers of providers connected to the data network.
  • the system server automatically establishes a data communication link between the local computer of a user and the server of a provider in accordance with the coupon data stored in the data carrier read by the local computer.
  • the purchase transactions of each user are monitored by the system server and stored as purchase history data in the member database.
  • the decryption key code is sent from the system server to the local computer of the user after the user has received information data.
  • the system server monitors whether the user has received the information data through interactive transactions of the user and stores the information data received by the user as information history data in the member database.
  • an information purchase transaction is performed between a first user and a second user when selected by both users, wherein the purchase history data and/or the information history data of the first user stored in the member database is transmitted to the second user and in exchange value data is credited to a value data account of the first user from the value data account of the second user.
  • the value data is preferably credited to a value data account of the user by means of a value data deposit procedure.
  • the system server is connected to a telecommunication network comprising at least one terminal.
  • the value data deposit procedure comprises the following steps, namely establishing a telecommunication link between the terminal of the telecommunication network and the system server, verifying a personal identification number input by means of the terminal by the system server, verifying a key code by the system server, verifying whether value data corresponding to the key code is still valid by the system server, crediting the value data to the value data account of the user in the member database when the value data is still valid.
  • the key code input by the user is in a first embodiment of the computer system according to the present invention a carrier key code of a data carrier inserted to the terminal of the telecommunication network and the value data is stored on the data carrier.
  • a key code published by a provider is input manually by the user via, for example, a telephone key pad, after that user has input his member PIN, and the value data corresponding to the provider's published key code is deposited into the account of that user.
  • the telecommunication network is a telephone network.
  • the data network is a local area network, a wide area network or the internet.
  • the invention further provides a method for decrypting media data stored on a computer-readable data carrier comprising the following steps, namely executing a user interface program stored on the data carrier on a local computer of a user which is connected to a data network, establishing a data communication link between the local computer and a system server via the data network, reading a carrier key code stored on the data carrier by the local computer and transmitting the carrier key code to the system server via the data network, verifying by the system server whether the transmitted carrier key code is valid, sending a decrypting key code for the decryption of encrypted media data stored on the data carrier from the system server to the local computer of the user via the data network when the transmitted carrier key code is valid, decrypting the encrypted media data by means of the sent decryption key code on the local computer.
  • the decryption key code is sent from the system server to the local computer after the user has received information data.
  • the system server monitors whether the user has received the information data through interactive transactions of the user.
  • an indication flag is set indicating that the carrier key code is invalid after the corresponding decryption key code has been transmitted from the system server to the local computer.
  • the system server verifies whether the user has a valid personal ID number.
  • the decryption key code for decrypting of encrypted media data stored on the data carrier is sent from the system server to the local computer of the user via the data network when the personal ID number of the user is valid.
  • the invention further provides a computer-readable data carrier for a local computer of a user connected to a data network comprising a data carrier key code identifying the data carrier, an user interface program providing access for the user to at least one system server via the data network, wherein the system server has a data carrier database storing decryption key codes of a plurality of data carriers.
  • the computer-readable data carrier preferably comprises further encrypted media data, wherein the decryption key code for decrypting the media data is stored in the data carrier database of the system server corresponding to the data carrier key code of said data carrier.
  • the data carrier further comprises information data for interactive information exchange of the user via the data network, and the decryption key code for decrypting the media data of the data carrier is sent from the system server to the local computer when the user has received the information data.
  • the encrypted media data comprises encrypted audio data, encrypted image data, encrypted movie data, encrypted text data, encrypted software data.
  • the information data comprises advertisement data and interactive learning programs .
  • the data carrier further comprises value data.
  • This value data preferably comprises coupon data for purchasing goods and services from servers of providers via the data network.
  • the value data comprises network money data.
  • the data carrier is a data medium for storing digital data.
  • Fig. 1 shows computer system according to the present invention
  • Fig. 2 shows a media data carrier content of a computer- readable data carrier according to the present invention and the value data carrier content of a data carrier to deposit value data on a user value data account;
  • Fig. 3 shows the data content of a member database of a computer system according to the present invention
  • Fig. 4 shows the data content of a data carrier database of the computer system according to the present invention
  • Fig. 5 shows a flowchart of the method according to the present invention
  • Fig. 6 shows an interface program mask displayed to a user according to the present invention
  • Fig. 7 shows a flowchart of an access procedure to the system server website according to the present invention
  • Fig. 8 shows a flowchart of a pin assignment procedure according to the present invention
  • Fig. 9 shows an access procedure to a media content according to the present invention.
  • Fig. 10 shows an access media content procedure according to the present invention
  • Fig. 11 shows a display of information data to the user according to the present invention
  • Fig. 12 shows an access media screen displayed to a user according to the present invention
  • Fig. 13 shows an access coupon data procedure according to the present invention
  • Fig. 14 shows an access coupon data procedure according to the present invention
  • Fig. 15 shows a coupon redemption procedure according to the present invention
  • Fig. 16 shows an input mask displayed to a user according to the present invention
  • Fig. 17 shows a flowchart of an access account procedure according to the present invention.
  • Fig. 18 shows an access account displayed to a user according to the present invention.
  • Fig. 19 shows a deposit procedure to deposit value data from the value data carrier
  • Fig. 20 shows a deposit procedure using printed carrier
  • Fig. 21 shows a flow chart of a trading procedure
  • Fig. 22 shows a flow chart of a transfer procedure
  • Fig. 23 shows a viewing of history procedure
  • Fig. 24 shows an example of an account balance displayed to an user
  • Fig. 25 shows a display of an account deposit to an user
  • Fig 26 shows a display of an account history to an user
  • Fig. 27 shows a display of an account trade to an user
  • Fig. 28 shows a display of an account transfer to an user according to the present invention
  • a computer system 1 comprises at least one system server 2 having a system server database 3.
  • the system server database 3 includes a member database 4 and a data carrier database 5.
  • the member database 4 stores a plurality of user personal ID numbers and corresponding personal data of registerd users.
  • the member database 4 stores further value data and transaction data.
  • the data carrier database 5 connected to the system server 2 stores a plurality of carrier key codes to identify data carriers and for each carrier key code a corresponding verified user personal ID number identifying a user.
  • the data carrier database 5 stores further value data, value timing data indicating whether the value data of the data carrier is valid and decryption key codes for decrypting media data stored on the data carrier which is identified by the carrier key code.
  • the data carrier database 5 preferably stores an indication flag for each carrier key code which indicates whether the carrier key code is valid.
  • the system server 2 of the computer system 1 is connected via a link 6 to data network 7.
  • the data network 7 may be any network such as a , local area network LAN, a wide area network WAN or the Internet.
  • Several company servers 8 of providers are connected via a link 9 to network 7 of the computer system 1.
  • the network 7 is connected via a link 10 to a terminal 11 of a separate telecommunication network such as a telephone network.
  • a plurality of local computers 12 is connected via links 13 to the data network 7.
  • the local computer 12 of a user is connected to a reading means 14 for a data carrier 15.
  • the local computer 12 of a user is further connected to a display screen 16, a memory 17 and a keyboard 18.
  • the data carrier 15 is a computer-readable data carrier and can be any data carrier or data medium which is capable of storing digital data.
  • the data carrier 15 is for example a CD-ROM, DVD or a magnetic card for storing digital data.
  • Fig. 2 shows the data content of a data carrier 15 read by the reading means 14 in principle.
  • the computer-readable data carrier 15 stores a computer-readable interface program 15a, encrypted media data 15b, a carrier key code 15c for identification of the data carrier 15.
  • the computer-readable data carrier 15 will further contain, in a preferred embodiment, information data 15d and value data 15e.
  • the encrypted media data 15b comprises e.g. encrypted audio data, encrypted image data, encrypted movie data, encrypted text data and encrypted software data such as computer programs.
  • the carrier key code 15c is unique for any computer- readable data carrier 15.
  • the information data 15d stored on the computer-readable data carrier 15 can be any information data such as advertisement data or e.g. an interactive learning program displayed to the user.
  • the value data 15e stored on the computer-readable data carrier 15 comprises coupon data for purchasing goods and services from a server 8 of a provider via the data network 7.
  • the value data 15e can further comprise network money data.
  • Fig. 2b shows the data content of a value data carrier.
  • Each registered user of the computer system holds a value data account stored in the member database 4 of the system server 2.
  • the user may insert a value data carrier 19 into a terminal 11.
  • Value data can be stored on a data carrier 15, a magnetic card such as a phone card, or on any published (paper) coupon because each unique key code corresponds to a specific, pre-determined value in the data carrier data base 5 connected to the data network 7.
  • the value data carrier comprises a carrier key code 19a for identifying the value data carrier 19 and value data 19b for deposit into an account.
  • the system server 2 is connected to a member database 4 and a data carrier database 5 as shown in Fig. 1.
  • Fig. 3 shows the data content of the member database 4.
  • the member database 4 further stores personal data of the user.
  • the personal data comprises at least essential data like user name, E-mail address, age of the user, gender and other data deemed to be essential. Further, the personal data may comprise volunteer data like address of the user, interests of the user and further data input by the user.
  • the member database 4 includes a value data account 4c.
  • Each user registered by the system server 2 has a value data account to store coupon data of providers and network money data accepted by all users of the computer system 1 including the providers of goods and services connected via the company server 8 to the network 7.
  • the member database 4 further stores transaction data 4d like purchase history data and information data displayed to the user.
  • the system server 2 monitors whether the user has received information data through interactive transactions of the user and stores the information data received by the user as information history data in the member database 4.
  • the purchase history data and/or the information history data of the first user stored in the member database 4 may be transmitted to the second user and in exchange value data is credited to a value data account 4c of the first user from the value data account of the second user. This makes it possible for a user to sell his purchase history to another user who is interested in such an information, for instance a marketing company.
  • Fig. 4 shows the data content of the data carrier database 5 in detail.
  • the data carrier database 5 stores for each data carrier 15 supplied to the users a unique carrier key code 5a.
  • Each computer-readable data carrier 15 which has been produced receives a unique carrier key code 5a which is stored in the data carrier database 5.
  • the data carrier database 5 further stores a user personal ID number 5b of the user of the data carrier, i.e. the user which inserts the data carrier 15 into the reading means 14 for the first time.
  • the data carrier database 5 further stores value data 5c such as coupon data and network money data stored on the data carrier 15 or other value data coupon recognized by the computer system identified by the data carrier key code 5a.
  • Value timing data 5d which are also stored in the data carrier database 5 indicate whether the coupon data and/or the network money data are still valid. Coupon data may for example be only valid for a predetermined time period. A company which is the provider of goods and services which decides to distribute coupons into the market may want to limit the validity time period of the coupon data.
  • the data carrier database 5 further stores a decryption key code 5e for decrypting media data on the data carrier identified by the carrier key code 5a.
  • the system server 2 has a system server database 3 which includes the data carrier database 4 as shown in Fig. 4.
  • This data carrier database 4 many decryption key codes 5e for a plurality of data carriers 15 are stored.
  • the user has either to manually input the key code corresponding to each carrier as in via a telephone key pad, or, consequently, insert the data carrier 15 into the reading means 14 of his local computer 12 and establish a link to the network 7.
  • each key code stored in the data carrier data base 15 is related to the PIN of each member account upon its initial activation, the flag Fig. 4, 5f signals the system when a user attempts multiple access to the value data in each carrier for which multiple access is not granted.
  • the user interface program 15a stored on the computer-readable data carrier 15 is executed on the local computer 12 of the user, while the local computer 12 is connected to the data network 7.
  • the user interface program automatically establishes a data communication link between the local computer 12 and the system server 2 via the data network 7.
  • the carrier key code 5a stored on the computer-readable data carrier 15 is read by the local computer 12 and transmitted to the system server 2 via the data network 7.
  • the system server 2 verifies whether the received data carrier key code 5a is valid by searching the connected data carrier database 5.
  • the data carrier database 5 stores an identification flag for each carrier key code 5a which indicates whether the carrier key code is valid.
  • the system server 2 sends a corresponding decryption key code 5e stored in the data carrier database 5 for the decryption of the encrypted media data stored on the data carrier 15 to the local computer 12 of the user via the data network 7.
  • the encrypted media data are decrypted by means of the transmitted -decryption key code on the local computer 12 for their further use.
  • the indication flag is re-set indicating that the carrier key code 5a is no longer valid. Should then the data carrier 15 be inserted by another user into his local computer 12 to attempt to make a further copy of the encrypted media data on the data carrier, the copying of the encrypted media data is prohibited because the indication flag indicates that the carrier key code of the data carrier 15 is invalid and consequently the system server will not send the corresponding decryption key code 5e.
  • the indication flag may be substituted by a counter which indicates how many copies of the data carrier content may be drawn. It may be indicated on the data carrier 15 that a predetermined number N of copies are allowed by the data content provider. For each performed copy or installation of the data content of the data carrier 15, the counter is decremented until the counter has the value zero. In case that the counter has reached the data value zero, no further encryption key codes are sent by the system server 2 to a local computer 12.
  • the user may increment the counter of the data carrier database for more copies by transferring network money data to the system server 2.
  • a media data content provider such as a software provider
  • the data content provider can receive additional money for further copies of the data carrier content.
  • the data content provider can monitor which users have installed their media data. This provides a very good opportunity for further marketing activities of the data content provider.
  • Fig. 5 shows a flowchart of the handling of data carriers 15 according to the present invention.
  • the computer-readable data carrier 15 is read by the reading means 14 on the local computer 12 in a step SI.
  • step S2 the interface program 15a stored on the computer-readable data carrier 15 is loaded into the local computer 12 and activated.
  • an interface input mask is displayed on the display screen 16 of the local computer 12.
  • Fig. 6 shows an example of an interface program mask displayed to the user on a screen 16 of the local computer 12.
  • the interface program mask displayed to the user comprises the welcome section and click-areas to subprocedures .
  • step S4 it is checked whether the user has clicked to the "go to website" as displayed on the screen 16. In case that the user wishes to go to the system server website, the access to the server website is performed in a step S5. In a step S6, it is checked whether the user has clicked to "free media”. In case that the user wishes to have access to the encrypted media content of the data carrier 15, an access media content subprocedure is activated in step S7.
  • step S8 the program flow branches in step S8 to an access coupon data procedure S9.
  • step S10 the program checks whether the user has clicked to "my account". In case that the user wishes to have access to his account, an access account subprocedure is activated in step Sll. When the user wishes to terminate, the program stops in step S12.
  • Fig. 7 shows the access to the server website performed in step S5 in detail.
  • a data link is established between the local computer 12 and the system server 2 in a step S51 via a web browser.
  • a further input mask is displayed on the screen 16 of the local computer 12 in step S5-2 prompting the user to input his personal identification number.
  • step S5-3 the system server 2 asks the user whether he has a personal ID number. In case that the user does not already have a registered personal identification number, the pin assignment procedure S5-4 commences. In the event the user already has an assigned personal identification number, he is prompted in step S5-5 to input his personal identification number.
  • the input personal identification number is verified in a pin verification procedure S5-6.
  • the system server 2 checks whether the input personal identification number is correct. If the personal identification number is correct, the interface program is activated in step S5-8, whereas, when the input personal identification number is not correct, the procedure stops in a step S5-9.
  • Fig. 8 shows the pin assignment procedure S5-4 shown in Fig. 7 in detail.
  • the user has to input necessary personal data in a step S5-4-1.
  • This essential personal data comprises, for instance, the user's name, the E- mail address, the age of the user and the gender.
  • the system server 2 sends a verification E-mail to the local computer 12 to prove whether the input E-mail address is correct.
  • the system server 2 checks whether the returned E-mail is received from the indicated E-mail address or not. In case that the input E-mail address cannot be verified, the procedure stops in a step S544.
  • step S5-4-5 the essential personal data is stored in a step S5-4-5 in the member database 4 of the system server 2.
  • a personal identification number generated by the system server 2 is transmitted to the local computer 12. The procedure stops with step S5-4-7.
  • Fig. 9 shows the access to media content procedure S7 in detail. After a start step S7-0, a data link is established between the local computer 12 and the system server 2 via a web browser in a step S7-1.
  • step S7-2 the data carrier key code 15c of the inserted data carrier 15 is read by the reading means 14 of the local computer 12.
  • step S7-3 the data carrier key code 15c stored on the data carrier 15 is verified by the system server 2 in a carrier key code verification procedure.
  • the system server 2 compares the carrier key code 15c of the computer-readable data carrier
  • step S7-4 it is checked whether the carrier key code 15c is valid or not. In case that the carrier key code is not valid, the procedure stops in step S7-5. In case that the carrier key code 15c is correct, the system server 2 checks whether the user has a personal identification number in step S7-6. In case that the user does not have a personal identification number, the program proceeds with the pin assignment procedure S5-4 as shown in Fig. 8. If the user has a personal identification number, the user inputs the personal identification number and sends it to the system server 2 in step S7-7. The personal identification number received by the system server 2 is checked in a pin verification procedure S7- 8. In step S7-9, it is checked whether the personal identification number is valid or correct or not. In case that the number is not valid or correct, the procedure terminates in step S7-10. In case that the pin number is valid and correct, an access media data procedure is activated in step S7-11.
  • Fig. 10 shows the access media data content procedure in detail.
  • information data which may be stored as information data 15d, on the data carrier 15 is displayed interactively to the user under control of the system server 2 in step S7-11-1.
  • the system server 2 monitors whether the user has received the information data through interactive transactions of the user. The user may be asked, for example, to answer questions or to press keys on the keyboard 18 of the local computer 12 or to operate his mouse. In this way, the system server 2 can monitor whether the user has seen the information data displayed to him on the display screen 16.
  • the information data can also be acoustically supplied to the user.
  • the information data can be, for instance, advertisement data of companies which sell goods and services. In other applications, the information data can be learning programs stored on the data carrier 15 or general information useful to the public.
  • a possible application could be learning programs for children who have to solve problems interactively in the learning program and who receive as a reward access to encrypted data carrier content, such as cartoon films.
  • the information data is advertisement data of a company.
  • a company sponsors the production of the data carrier 15 and directly or indirectly pays for the encrypted media data stored on the data carrier 15.
  • users who want to have access to the encrypted media data agree to view and interact with the advertisement data of the company stored or contained on the carrier.
  • the system server 2 transmits the decryption key code 5e stored in the data carrier database 5 for the encrypted media data corresponding to the carrier code 5a.
  • the carrier key code 5a stored in the data carrier database 5 is identical to the valid carrier key code 15c of the data carrier 15.
  • the decryption key code 5e for the encrypted media data is transmitted in step S7-11-2 from the system server 2 via the data network 7 to the local computer 12.
  • the media access interface is constructed using a "flash animation"
  • a new scene previously not available containing buttons to activate the media data could be made to appear to the user.
  • a numeric code could be sent from the system server 2 to the local computer 12 to be input into an appropriate field by the user which then activates a sub-interface through which the user can access media data stored on the data carrier.
  • step S7-11-3 the decryption of the encrypted media data on the data carrier 15 by means of the transmitted decryption code is performed in the local computer 12.
  • the user has options to store the decrypted media data, transferred from the carrier 15, into a RAM or permanent memory of the local computer 12 for his further use.
  • the user who does not want to use up storage capacity on his local computer 12 may view videos, listen to music files, etc. by reading such data directly from the data carrier or may transfer the media data immediately into the local computer hard drive under the conditions set by the computer system, or system server 2.
  • the access media content procedure terminates in step S7-11-5.
  • Fig. 11 shows the display of information data on the display screen 16 during the access media content procedure as shown in Fig. 10.
  • the user can look at an advertisement on an information viewer screen on his display screen 16. He receives general information how to decrypt the media data content on his data carrier 15.
  • the displayed text may be "To decrypt the content on this disk, just watch and interact with the advertisements you see on the screen on the left. When you are done, you will receive a key to unlock the free media. Select a category on the buttons below the screen.”
  • the user may choose between different kinds of media data encrypted on the data carrier 15. He may choose to listen to music or to watch movies. Other user access options like access to the coupon section or to his personal account are also displayed to the user on the display screen 16.
  • the access media content procedure is activated when the user clicks to "play".
  • the user may, for instance, watch to look at a new cartoon movie on the data carrier 15. He clicks to "movies” and receives information data on the viewer screen.
  • This information data may, for instance, be advertisement data of the company sponsoring a cartoon film or a learning program for kids.
  • the user interacts with the program for instance by answering questions, by performing orders, or by pressing buttons displayed on the viewer screen.
  • the user is "rewarded” by gaining access to the encrypted media data, i.e. the cartoon movie .
  • Fig. 12 shows the access media screen displayed to the user on the display screen 16 after the interactive procedure has been completed.
  • the user may choose to listen or view the encrypted media data or save the decrypted media data. Further options may include purchasing additional media data contents by the same artist or to visit the homepage of the artist. The user may also choose to send a message to the artist.
  • Fig. 13 shows a flowchart of the access coupon data procedure in step S9 as shown in Fig. 5.
  • Coupon data is provided for purchasing goods and services from company servers 8 connected to the network 7.
  • a company may decide to advertise by sponsoring data carriers and to include coupon data on the sponsored data carriers 15.
  • This coupon data is an incentive for users to visit the homepage of the company and to make goods and services of the company more popular.
  • step S9-0 After start step S9-0, a link is established between the local computer 12 of the user and the system server 2 via web browser in step S9-1.
  • step S9-2 a data carrier key code 15c is read from the inserted data carrier 15.
  • the carrier key code 15c is verified in a carrier key code verification procedure S9-3.
  • step S9-4 it is checked whether the carrier key code 15c is valid or not. If the carrier code 15c of the data carrier 15 is not valid, the procedure stops in step S9-5. In case that the carrier key code 15c is valid, it is checked in step S9-6, whether the user has a personal identification number. When the user has no personal identification number, he has to perform a pin assignment procedure S9-7. In case that the user has a personal identification number, the personal identification number is input by the user on the local computer 12 and then transmitted to the system server 2 in step S9-8. In a further step S9-9, the input personal identification number is verified by the system server 2. In step S9-10, it is checked whether the input pin number is valid and correct or not. If the user pin number is not valid or correct, the procedure stops in step S9-11. If the user pin number is valid and correct, an access coupon data procedure S9-12 is activated.
  • Fig. 14 shows the access coupon data procedure S9-12 in detail.
  • Coupon data corresponding to the carrier key code 15c of the inserted data carrier 15 is read from the data carrier database 5 of the system server 2 in step 9-12-1.
  • the data carrier database 5 stores for each carrier key code 5a corresponding coupon data in a value data field.
  • step S9-12-3 it is checked by the system server 2 whether the coupon data 5c stored as value data 15e on the data carrier 15 is still valid or not. In case that the coupon data is no longer valid, the procedure stops in step S9-12-4. In case that the coupon data is still valid, the coupon data stored on the data carrier 15 is credited to the value data account 4c of the user having the verified pin number 4a in a step S9-12-5. After the coupon data has been credited to the user account in step S9-12-5, the coupon data 4c corresponding to the carrier key code of the inserted data carrier 15 and to the pin number of the user is marked to be invalid in step S9- 12-6. This ensures that the user cannot cash in the coupon data several times.
  • step S9-12-7 the user is asked whether he wants to redeem the credited coupon or not. In case that the user does not want to redeem the credited coupon, the procedure stops in step S9-12-8. If the user wants to redeem his coupon, the coupon redemption procedure S9-12-9 is activated.
  • Fig. 15 shows a flowchart of the coupon redemption procedure S9-12-9 in detail.
  • a data link between the local computer 12 and a company website corresponding to the coupon data is established in a step S9-12-9-1.
  • step S9-12-9-2 an input mask is displayed to the user showing offers of the companies which accept the coupons.
  • step S9-12-9-3 the user selects from offers which are covered by the credited coupon data.
  • step S9-12-9-4 the coupon data credited as value data in the value data account 4c of the user is transferred to the value account 4c of the company in exchange of the selected goods or services.
  • Fig. 16 shows an example of an input mask of companies offering coupons. The user may click on the logo of each of several companies to see what special offers and coupons are available to him.
  • Fig. 17 shows the access account procedure Sll as shown in Fig. 5 in detail.
  • step Sll-0 After a start step Sll-0, a link between the local computer 12 and the system server 2 is established via a web browser in step Sll-1.
  • step Sll-2 the user inputs his personal identification number.
  • the input personal identification number is verified by the personal identification verification procedure Sll-3.
  • step Sll-4 it is checked whether the input personal identification number is valid and correct or not. If the input personal identification number is not valid or correct, the procedure stops in step Sll-5.'If the pin number is valid and correct, an account transaction procedure is activated in step Sll-6.
  • Fig. 18 shows the options for the user in the access account procedure Sll-6.
  • the user can choose between several options. He can get information about his value data account by clicking to "balance”.
  • the system server searches the member database 4 and displays the coupon data and network money data available to the respective user as shown in Fig. 24.
  • Fig. 19 shows a deposit procedure A performing a value data deposit by means of value data carrier.
  • the value data deposit procedure may comprise the following steps in a preferred embodiment.
  • the user inserts a value data carrier 19 as shown in Fig. 2b into terminal 11 of a telecommunication network connected to the data network 7.
  • a telecommunication link is then established between the terminal of the telecommunication network and the system server 2.
  • the system server 2 verifies a personal identification number input by means of the terminal 11. Then the system server 2 verifies, for instance, a carrier key code 19a of the value data carrier.
  • the system server 2 verifies whether the value data stored on the value data carrier 19 is still valid or not. In case that the value data, which may be network money data or coupon data, is still valid, the value data is credited to the value data account of the user in the member database 4.
  • a key code verified by the system server 2 may alternatively be published by a provider and the value data stored in a value data account of the provider.
  • Fig. 20 shows a deposit procedure using a key code printed in a newspaper.
  • the user may execute deposits into his account from any value data carrier 19, from his bank account, credit card, debit card or any other source integrated into the computer system.
  • Fig. 26 the user can see what transactions he has performed, i.e. which goods and services he has purchased from different companies or, alternatively, which advertisements he has interacted with as shown in Fig. 23.
  • Fig. 21 If the user clicks to "trade" in the input mask of Fig. 18, he has the possibility to sell his purchase or ad viewing history to any user who has interest in such an information as shown in Fig. 27. These users could be other members of the system, marketing institutes, or PR agencies. In exchange of the purchase or ad viewing history of the user, he may receive value data from the accounts of these users. The trading procedure is shown in Fig. 21.
  • the computer system 1 solves several problems which address the distribution of any media content.
  • Creative media data such as brand name music, video, animation, photography, movies and other media of all kinds may be distributed to a plurality of users for free in exchange of looking at advertisement data.
  • the user may copy the decrypted media data content which has been stored in the memory 17 of his local computer by transmitting the data content via the network to another user or to burn it onto another data carrier e.g. by means of CD-burner, these steps are time consuming, involve additional effort and costs.
  • the incentive to carry out the required copying process is largely removed because the data carrier 15 containing the encrypted media data is preferably made available for free or for a subsidized price. It provides marketing companies with a platform to feature "TV-style" rich media advertisements using the Internet that is not reliant upon a high speed broadband network connection, typically required by a user to view movies or access other bandwidth- intensive media data directly from the Internet.
  • the computer system 1 drives customers to the website (s) of participating companies through the use of digital coupon data stored on the data carriers.
  • the computer system 1 further provides users with an ability to use cash for online purchasing, through the purchase of network money (value data carriers) .
  • the computer system 1 provides a new application for the encryption/decryption technology of data carriers. Only after the user interacts via an interface on a data network, can he access the data stored on a local carrier. This opens many new possibilities for the use of the data medium, e.g. for the education of users.
  • the provider and producers of media data contents are able to monitor exactly how many copies of the data carriers are made by the users. This increases the income possibilities of media data providers dramatically.
  • the computer system 1 provides users with the ability to convert their personal information data into money value data, or information currency, to be utilized for their benefit within the system.
  • the computer system 1 further provides artists, authors and companies seeking to attract potential customers with a direct, alternative and effective channel for the marketing and distribution of their works, products and services to an audience of users motivate by the incentives the system provides.

Abstract

Computer system comprising at least one system server having a system server data base storing decryption key codes of a plurality of data carriers,wherein said system server is connected via a data network to at least one local computer of a user, said local computer including reading means for a data carrier which stores a data carrier key code for identification of the data carrier and encrypted media data, wherein the system server sends a decryption key code corresponding to the data carrier key code for decryption of the encrypted media data when the data carrier code is valid.

Description

METHOD AND COMPUTER SYSTEM FOR SECURE DISTRIBUTION OF DIGITAL DATA
The invention refers to a method and a computer system for decrypting media data stored on a computer-readable data carrier.
There are different programs known with which one can operate a remote computer over a data network. These programs were developed for example for operating a device from a remote location, checking for software versions installed on a remote computer or to monitor the user of a remote device over a network.
Software providers use encryption systems on data carriers to avoid unauthorized copies of the software programs. Such encryption systems require the user to enter the key code which is usually printed on the container of the data carrier. In an installation process, the user enters the key code printed on the container in an initial data access procedure. If the key code is not entered by the user or is false, the installation of the software program is prohibited.
The major problem of such an encryption system resides in that if the original purchaser copies the data carrier and provides this copy along with the correct key code to another person, that the other person is then also able to install the data carrier content on his local computer. Accordingly, the software provider cannot prevent that many copies are made of his original software stored on the data carrier. This problem arises for any encrypted media data stored on a data carrier when the original purchaser receives the key code along with the data carrier from the provider.
Accordingly, it is the main object of the present invention to provide a method and a computer system which enables the provider of a data carrier with encrypted media data to control the number of copies made of the encrypted media data
This object is achieved by a computer system comprising the features of main claim 1 and a method for decrypting media data having the features of method claim 27.
The invention provides a computer system comprising at least one system server having a system server database storing decryption key codes of a plurality of data carriers wherein said system server is connected via a data network to at least one local computer of a user, said local computer including reading means for a data carrier which stores a data carrier key code for identification of the data carrier and encrypted media data, wherein the system server sends a decryption key code corresponding to the data carrier key code for the decryption of the encrypted media data when the data carrier key code is valid.
In a preferred embodiment, the system server database includes a member database and a data carrier database.
In a preferred embodiment of the computer system, the member database stores a plurality of user personal ID numbers (PIN) and corresponding personal data of the users, value data and transaction data.
In a further preferred embodiment of the computer system according to the present invention, the data carrier database stores a plurality of carrier key codes to identify the data carriers and for each carrier key code a corresponding verified user personal ID number identifying the user, value data, value timing data indicating whether the value data of the data carrier is valid and a decryption key code for decrypting media data stored on the data carrier which is identified by the carrier key code.
The data carrier database stores, in a preferred embodiment of the computer system, an identification flag for each carrier key code which indicates whether the carrier key code is valid.
In a further preferred embodiment of the computer system according to the present invention, a user interface program which is stored on the data carrier is executed on the local computer of the user, wherein the user interface program establishes a data communication link between the local computer and the system server via the data network by means of a network browser.
In a preferred embodiment of the computer system, a system server input mask is displayed to the user after a personal ID number which has been input by the user has been verified by the system server.
In a still preferred embodiment, the data of the user stored in the member database is displayed on a screen of the local computer to the user when selected by the user in the system server input mask.
In a preferred embodiment of the computer system according to the present invention, the value data read from the data carrier is credited to a value data account of a user in the member database of the system server when the value timing data indicates that the value data is still valid and the personal identification number input by the user has been verified by the system server. In a further embodiment of the computer system according to the present invention, the value data of the data carrier which has been credited to a value data account are marked to be invalid in the data carrier database of the system server.
In a further embodiment of the computer system according to the present invention, the value data is credited to a value data account of a provider in the member database of the system server when a purchase transaction has been performed between the local computer of the user and a server of the provider, or of the computer system accordingly.
The value data stored in the carrier database of the system server comprises preferably coupon data for purchasing goods and services from the servers of providers connected to the data network, or servers of the computer system offering goods and services of the providers.
In a preferred embodiment of the computer system according to the present invention, the data network addresses of the provider servers accepting the coupons are stored corresponding to the coupon data in the member database of the system server.
In a further preferred embodiment of the computer system, the value data stored in the carrier database of the system server comprises network money data for purchasing goods and services from servers of providers connected to the data network.
In a further embodiment of the computer system according to the present invention, the system server automatically establishes a data communication link between the local computer of a user and the server of a provider in accordance with the coupon data stored in the data carrier read by the local computer. In a preferred embodiment of the computer system according to the present invention, the purchase transactions of each user are monitored by the system server and stored as purchase history data in the member database.
In a further embodiment of the computer system according to the present invention, the decryption key code is sent from the system server to the local computer of the user after the user has received information data.
In a preferred embodiment of the computer system according to the present invention, the system server monitors whether the user has received the information data through interactive transactions of the user and stores the information data received by the user as information history data in the member database.
In a further preferred embodiment of the computer system according to the present invention, an information purchase transaction is performed between a first user and a second user when selected by both users, wherein the purchase history data and/or the information history data of the first user stored in the member database is transmitted to the second user and in exchange value data is credited to a value data account of the first user from the value data account of the second user.
The value data is preferably credited to a value data account of the user by means of a value data deposit procedure.
In a preferred embodiment of the computer system according to the present invention, the system server is connected to a telecommunication network comprising at least one terminal. In the computer system according to the present invention, the value data deposit procedure comprises the following steps, namely establishing a telecommunication link between the terminal of the telecommunication network and the system server, verifying a personal identification number input by means of the terminal by the system server, verifying a key code by the system server, verifying whether value data corresponding to the key code is still valid by the system server, crediting the value data to the value data account of the user in the member database when the value data is still valid.
The key code input by the user is in a first embodiment of the computer system according to the present invention a carrier key code of a data carrier inserted to the terminal of the telecommunication network and the value data is stored on the data carrier.
In a second embodiment of the computer system according to the present invention, a key code published by a provider is input manually by the user via, for example, a telephone key pad, after that user has input his member PIN, and the value data corresponding to the provider's published key code is deposited into the account of that user.
In a preferred embodiment of the computer system according to the present invention, the telecommunication network is a telephone network.
In a preferred embodiment of the computer system according to the present invention, the data network is a local area network, a wide area network or the internet. The invention further provides a method for decrypting media data stored on a computer-readable data carrier comprising the following steps, namely executing a user interface program stored on the data carrier on a local computer of a user which is connected to a data network, establishing a data communication link between the local computer and a system server via the data network, reading a carrier key code stored on the data carrier by the local computer and transmitting the carrier key code to the system server via the data network, verifying by the system server whether the transmitted carrier key code is valid, sending a decrypting key code for the decryption of encrypted media data stored on the data carrier from the system server to the local computer of the user via the data network when the transmitted carrier key code is valid, decrypting the encrypted media data by means of the sent decryption key code on the local computer.
In a preferred embodiment of the method according to the present invention, the decryption key code is sent from the system server to the local computer after the user has received information data.
In a preferred embodiment of the method according to the present invention, the system server monitors whether the user has received the information data through interactive transactions of the user.
In a preferred embodiment of the method according to the present invention, an indication flag is set indicating that the carrier key code is invalid after the corresponding decryption key code has been transmitted from the system server to the local computer. In a further embodiment of the method according to the present invention, the system server verifies whether the user has a valid personal ID number.
In a still further embodiment of the method according to the present invention, the decryption key code for decrypting of encrypted media data stored on the data carrier is sent from the system server to the local computer of the user via the data network when the personal ID number of the user is valid.
The invention further provides a computer-readable data carrier for a local computer of a user connected to a data network comprising a data carrier key code identifying the data carrier, an user interface program providing access for the user to at least one system server via the data network, wherein the system server has a data carrier database storing decryption key codes of a plurality of data carriers.
The computer-readable data carrier according to the present invention preferably comprises further encrypted media data, wherein the decryption key code for decrypting the media data is stored in the data carrier database of the system server corresponding to the data carrier key code of said data carrier.
In a preferred embodiment of the computer-readable data carrier according to the present invention, the data carrier further comprises information data for interactive information exchange of the user via the data network, and the decryption key code for decrypting the media data of the data carrier is sent from the system server to the local computer when the user has received the information data. In a preferred embodiment of the computer-readable data carrier according to the present invention, the encrypted media data comprises encrypted audio data, encrypted image data, encrypted movie data, encrypted text data, encrypted software data.
In a preferred embodiment of the computer-readable data carrier according to the present invention, the information data comprises advertisement data and interactive learning programs .
In a further embodiment of the computer-readable data carrier according to the present invention, the data carrier further comprises value data.
This value data preferably comprises coupon data for purchasing goods and services from servers of providers via the data network.
In a still further embodiment of the computer-readable data carrier according to the present invention, the value data comprises network money data.
In a preferred embodiment of the computer-readable data carrier, the data carrier is a data medium for storing digital data.
In a preferred embodiment, the computer system, the method for decrypting media data and the computer-readable data carrier according to the present invention are explained in detail with respect to the enclosed Figures.
Fig. 1 shows computer system according to the present invention; Fig. 2 shows a media data carrier content of a computer- readable data carrier according to the present invention and the value data carrier content of a data carrier to deposit value data on a user value data account;
Fig. 3 shows the data content of a member database of a computer system according to the present invention;
Fig. 4 shows the data content of a data carrier database of the computer system according to the present invention;
Fig. 5 shows a flowchart of the method according to the present invention;
Fig. 6 shows an interface program mask displayed to a user according to the present invention;
Fig. 7 shows a flowchart of an access procedure to the system server website according to the present invention;
Fig. 8 shows a flowchart of a pin assignment procedure according to the present invention;
Fig. 9 shows an access procedure to a media content according to the present invention;
Fig. 10 shows an access media content procedure according to the present invention;
Fig. 11 shows a display of information data to the user according to the present invention;
Fig. 12 shows an access media screen displayed to a user according to the present invention; Fig. 13 shows an access coupon data procedure according to the present invention;
Fig. 14 shows an access coupon data procedure according to the present invention;
Fig. 15 shows a coupon redemption procedure according to the present invention;
Fig. 16 shows an input mask displayed to a user according to the present invention;
Fig. 17 shows a flowchart of an access account procedure according to the present invention;
Fig. 18 shows an access account displayed to a user according to the present invention.
Fig. 19 shows a deposit procedure to deposit value data from the value data carrier;
Fig. 20 shows a deposit procedure using printed carrier;
Fig. 21 shows a flow chart of a trading procedure;
Fig. 22 shows a flow chart of a transfer procedure;
Fig. 23 shows a viewing of history procedure;
Fig. 24 shows an example of an account balance displayed to an user
Fig. 25 shows a display of an account deposit to an user
Fig 26 shows a display of an account history to an user Fig. 27 shows a display of an account trade to an user
Fig. 28 shows a display of an account transfer to an user according to the present invention
As can be seen from Fig. 1, a computer system 1 according to the present invention comprises at least one system server 2 having a system server database 3. The system server database 3 includes a member database 4 and a data carrier database 5. The member database 4stores a plurality of user personal ID numbers and corresponding personal data of registerd users. The member database 4 stores further value data and transaction data. The data carrier database 5 connected to the system server 2 stores a plurality of carrier key codes to identify data carriers and for each carrier key code a corresponding verified user personal ID number identifying a user. The data carrier database 5 stores further value data, value timing data indicating whether the value data of the data carrier is valid and decryption key codes for decrypting media data stored on the data carrier which is identified by the carrier key code. The data carrier database 5 preferably stores an indication flag for each carrier key code which indicates whether the carrier key code is valid.
The system server 2 of the computer system 1 is connected via a link 6 to data network 7. The data network 7 may be any network such as a, local area network LAN, a wide area network WAN or the Internet. Several company servers 8 of providers are connected via a link 9 to network 7 of the computer system 1. In a preferred embodiment, the network 7 is connected via a link 10 to a terminal 11 of a separate telecommunication network such as a telephone network. A plurality of local computers 12 is connected via links 13 to the data network 7. The local computer 12 of a user is connected to a reading means 14 for a data carrier 15. The local computer 12 of a user is further connected to a display screen 16, a memory 17 and a keyboard 18. The data carrier 15 is a computer-readable data carrier and can be any data carrier or data medium which is capable of storing digital data. The data carrier 15 is for example a CD-ROM, DVD or a magnetic card for storing digital data.
Fig. 2 shows the data content of a data carrier 15 read by the reading means 14 in principle. In a preferred embodiment, the computer-readable data carrier 15 stores a computer-readable interface program 15a, encrypted media data 15b, a carrier key code 15c for identification of the data carrier 15. The computer-readable data carrier 15 will further contain, in a preferred embodiment, information data 15d and value data 15e.
The encrypted media data 15b comprises e.g. encrypted audio data, encrypted image data, encrypted movie data, encrypted text data and encrypted software data such as computer programs. The carrier key code 15c is unique for any computer- readable data carrier 15.
The information data 15d stored on the computer-readable data carrier 15 can be any information data such as advertisement data or e.g. an interactive learning program displayed to the user.
The value data 15e stored on the computer-readable data carrier 15 comprises coupon data for purchasing goods and services from a server 8 of a provider via the data network 7. The value data 15e can further comprise network money data.
Fig. 2b shows the data content of a value data carrier. Each registered user of the computer system holds a value data account stored in the member database 4 of the system server 2. To deposit value data on his value data account, the user may insert a value data carrier 19 into a terminal 11. Value data can be stored on a data carrier 15, a magnetic card such as a phone card, or on any published (paper) coupon because each unique key code corresponds to a specific, pre-determined value in the data carrier data base 5 connected to the data network 7. The value data carrier comprises a carrier key code 19a for identifying the value data carrier 19 and value data 19b for deposit into an account.
The system server 2 is connected to a member database 4 and a data carrier database 5 as shown in Fig. 1. Fig. 3 shows the data content of the member database 4. For each registered user of a local computer 12 connected to the data network 7, the member database 4 holds the user personal ID number. The member database 4 further stores personal data of the user. The personal data comprises at least essential data like user name, E-mail address, age of the user, gender and other data deemed to be essential. Further, the personal data may comprise volunteer data like address of the user, interests of the user and further data input by the user. For each user, the member database 4 includes a value data account 4c. Each user registered by the system server 2 has a value data account to store coupon data of providers and network money data accepted by all users of the computer system 1 including the providers of goods and services connected via the company server 8 to the network 7. The member database 4 further stores transaction data 4d like purchase history data and information data displayed to the user. The system server 2 monitors whether the user has received information data through interactive transactions of the user and stores the information data received by the user as information history data in the member database 4. During an information purchase transaction performed between a first user and a second user of the computer system, the purchase history data and/or the information history data of the first user stored in the member database 4 may be transmitted to the second user and in exchange value data is credited to a value data account 4c of the first user from the value data account of the second user. This makes it possible for a user to sell his purchase history to another user who is interested in such an information, for instance a marketing company.
Fig. 4 shows the data content of the data carrier database 5 in detail. The data carrier database 5 stores for each data carrier 15 supplied to the users a unique carrier key code 5a. Each computer-readable data carrier 15 which has been produced receives a unique carrier key code 5a which is stored in the data carrier database 5. The data carrier database 5 further stores a user personal ID number 5b of the user of the data carrier, i.e. the user which inserts the data carrier 15 into the reading means 14 for the first time. The data carrier database 5 further stores value data 5c such as coupon data and network money data stored on the data carrier 15 or other value data coupon recognized by the computer system identified by the data carrier key code 5a. Value timing data 5d which are also stored in the data carrier database 5 indicate whether the coupon data and/or the network money data are still valid. Coupon data may for example be only valid for a predetermined time period. A company which is the provider of goods and services which decides to distribute coupons into the market may want to limit the validity time period of the coupon data.
The data carrier database 5 further stores a decryption key code 5e for decrypting media data on the data carrier identified by the carrier key code 5a.
With the computer system 1 according to the present invention as shown in Fig. 1, it is possible to prohibit pirate copies of the data carrier 15, and hence, unauthorized use of the value data and media data stored on the data carrier 15. The system server 2 has a system server database 3 which includes the data carrier database 4 as shown in Fig. 4. On this data carrier database 4, many decryption key codes 5e for a plurality of data carriers 15 are stored. To access the value data stored on a carrier recognized within the computer system, the user has either to manually input the key code corresponding to each carrier as in via a telephone key pad, or, consequently, insert the data carrier 15 into the reading means 14 of his local computer 12 and establish a link to the network 7. Since each key code stored in the data carrier data base 15 is related to the PIN of each member account upon its initial activation, the flag Fig. 4, 5f signals the system when a user attempts multiple access to the value data in each carrier for which multiple access is not granted. To access the media data on data carrier 15 the user interface program 15a stored on the computer-readable data carrier 15 is executed on the local computer 12 of the user, while the local computer 12 is connected to the data network 7. The user interface program automatically establishes a data communication link between the local computer 12 and the system server 2 via the data network 7. After the establishment of the data communication link, the carrier key code 5a stored on the computer-readable data carrier 15 is read by the local computer 12 and transmitted to the system server 2 via the data network 7. The system server 2 verifies whether the received data carrier key code 5a is valid by searching the connected data carrier database 5. The data carrier database 5 stores an identification flag for each carrier key code 5a which indicates whether the carrier key code is valid. In the event the carrier key code 5a of the inserted data carrier 15 is still valid, the system server 2 sends a corresponding decryption key code 5e stored in the data carrier database 5 for the decryption of the encrypted media data stored on the data carrier 15 to the local computer 12 of the user via the data network 7. In a further step, the encrypted media data are decrypted by means of the transmitted -decryption key code on the local computer 12 for their further use. When the decryption key code 5e has been sent to the user, the indication flag is re-set indicating that the carrier key code 5a is no longer valid. Should then the data carrier 15 be inserted by another user into his local computer 12 to attempt to make a further copy of the encrypted media data on the data carrier, the copying of the encrypted media data is prohibited because the indication flag indicates that the carrier key code of the data carrier 15 is invalid and consequently the system server will not send the corresponding decryption key code 5e.
This ensures that the data contained on the media carrier 15 is only accessible to the original user/member, that additional copies of the data can be prohibited and that copies made of the data carrier will be ineffective.
In a further embodiment of the computer system according to the present invention, the indication flag may be substituted by a counter which indicates how many copies of the data carrier content may be drawn. It may be indicated on the data carrier 15 that a predetermined number N of copies are allowed by the data content provider. For each performed copy or installation of the data content of the data carrier 15, the counter is decremented until the counter has the value zero. In case that the counter has reached the data value zero, no further encryption key codes are sent by the system server 2 to a local computer 12. In a preferred embodiment of the computer system 1 according to the present invention, the user may increment the counter of the data carrier database for more copies by transferring network money data to the system server 2. With the computer system 1 according to the present invention as shown in Fig. 1, it is possible for a media data content provider, such as a software provider, to control exactly the number of copies of the data content made by one or several users. The data content provider can receive additional money for further copies of the data carrier content. Furthermore, the data content provider can monitor which users have installed their media data. This provides a very good opportunity for further marketing activities of the data content provider.
Fig. 5 shows a flowchart of the handling of data carriers 15 according to the present invention. -
After a start step SO, the computer-readable data carrier 15 is read by the reading means 14 on the local computer 12 in a step SI.
In a step S2, the interface program 15a stored on the computer-readable data carrier 15 is loaded into the local computer 12 and activated.
In a step S3, an interface input mask is displayed on the display screen 16 of the local computer 12.
Fig. 6 shows an example of an interface program mask displayed to the user on a screen 16 of the local computer 12. The interface program mask displayed to the user comprises the welcome section and click-areas to subprocedures .
In a step S4, it is checked whether the user has clicked to the "go to website" as displayed on the screen 16. In case that the user wishes to go to the system server website, the access to the server website is performed in a step S5. In a step S6, it is checked whether the user has clicked to "free media". In case that the user wishes to have access to the encrypted media content of the data carrier 15, an access media content subprocedure is activated in step S7.
If the user has clicked to "coupon offers", the program flow branches in step S8 to an access coupon data procedure S9.
In step S10, the program checks whether the user has clicked to "my account". In case that the user wishes to have access to his account, an access account subprocedure is activated in step Sll. When the user wishes to terminate, the program stops in step S12.
Fig. 7 shows the access to the server website performed in step S5 in detail. After a start step S5-0, a data link is established between the local computer 12 and the system server 2 in a step S51 via a web browser. Then a further input mask is displayed on the screen 16 of the local computer 12 in step S5-2 prompting the user to input his personal identification number.
In step S5-3, the system server 2 asks the user whether he has a personal ID number. In case that the user does not already have a registered personal identification number, the pin assignment procedure S5-4 commences. In the event the user already has an assigned personal identification number, he is prompted in step S5-5 to input his personal identification number.
The input personal identification number is verified in a pin verification procedure S5-6. In a further step S5-7, the system server 2 checks whether the input personal identification number is correct. If the personal identification number is correct, the interface program is activated in step S5-8, whereas, when the input personal identification number is not correct, the procedure stops in a step S5-9.
Fig. 8 shows the pin assignment procedure S5-4 shown in Fig. 7 in detail. After a start step S5-4-0, the user has to input necessary personal data in a step S5-4-1. This essential personal data comprises, for instance, the user's name, the E- mail address, the age of the user and the gender. In a further step S5-4-2, the system server 2 sends a verification E-mail to the local computer 12 to prove whether the input E-mail address is correct. In a step S5-4-3, the system server 2 checks whether the returned E-mail is received from the indicated E-mail address or not. In case that the input E-mail address cannot be verified, the procedure stops in a step S544. In case that the input personal data is correct, the essential personal data is stored in a step S5-4-5 in the member database 4 of the system server 2. In a further step S5-4-6, a personal identification number generated by the system server 2 is transmitted to the local computer 12. The procedure stops with step S5-4-7.
Fig. 9 shows the access to media content procedure S7 in detail. After a start step S7-0, a data link is established between the local computer 12 and the system server 2 via a web browser in a step S7-1.
In a further step S7-2, the data carrier key code 15c of the inserted data carrier 15 is read by the reading means 14 of the local computer 12.
In a further step S7-3, the data carrier key code 15c stored on the data carrier 15 is verified by the system server 2 in a carrier key code verification procedure. In the carrier key code verification procedure S7-3, the system server 2 compares the carrier key code 15c of the computer-readable data carrier
15 with the carrier key code 5a stored in the data carrier database 5 as shown in Fig. 4.
In step S7-4, it is checked whether the carrier key code 15c is valid or not. In case that the carrier key code is not valid, the procedure stops in step S7-5. In case that the carrier key code 15c is correct, the system server 2 checks whether the user has a personal identification number in step S7-6. In case that the user does not have a personal identification number, the program proceeds with the pin assignment procedure S5-4 as shown in Fig. 8. If the user has a personal identification number, the user inputs the personal identification number and sends it to the system server 2 in step S7-7. The personal identification number received by the system server 2 is checked in a pin verification procedure S7- 8. In step S7-9, it is checked whether the personal identification number is valid or correct or not. In case that the number is not valid or correct, the procedure terminates in step S7-10. In case that the pin number is valid and correct, an access media data procedure is activated in step S7-11.
Fig. 10 shows the access media data content procedure in detail. After a start step S7-11-0, information data which may be stored as information data 15d, on the data carrier 15 is displayed interactively to the user under control of the system server 2 in step S7-11-1. The system server 2 monitors whether the user has received the information data through interactive transactions of the user. The user may be asked, for example, to answer questions or to press keys on the keyboard 18 of the local computer 12 or to operate his mouse. In this way, the system server 2 can monitor whether the user has seen the information data displayed to him on the display screen 16. The information data can also be acoustically supplied to the user. The information data can be, for instance, advertisement data of companies which sell goods and services. In other applications, the information data can be learning programs stored on the data carrier 15 or general information useful to the public.
A possible application could be learning programs for children who have to solve problems interactively in the learning program and who receive as a reward access to encrypted data carrier content, such as cartoon films.
In another application, the information data is advertisement data of a company. A company sponsors the production of the data carrier 15 and directly or indirectly pays for the encrypted media data stored on the data carrier 15. In exchange, users who want to have access to the encrypted media data agree to view and interact with the advertisement data of the company stored or contained on the carrier.
After the user has received the information data in step S7- 11-1 the system server 2 transmits the decryption key code 5e stored in the data carrier database 5 for the encrypted media data corresponding to the carrier code 5a. The carrier key code 5a stored in the data carrier database 5 is identical to the valid carrier key code 15c of the data carrier 15. The decryption key code 5e for the encrypted media data is transmitted in step S7-11-2 from the system server 2 via the data network 7 to the local computer 12. For example, if the media access interface is constructed using a "flash animation", then a new scene previously not available containing buttons to activate the media data could be made to appear to the user. In an alternative embodiment, a numeric code could be sent from the system server 2 to the local computer 12 to be input into an appropriate field by the user which then activates a sub-interface through which the user can access media data stored on the data carrier.
In a step S7-11-3, the decryption of the encrypted media data on the data carrier 15 by means of the transmitted decryption code is performed in the local computer 12.
In a further step S7-11-4, the user has options to store the decrypted media data, transferred from the carrier 15, into a RAM or permanent memory of the local computer 12 for his further use. The user who does not want to use up storage capacity on his local computer 12 may view videos, listen to music files, etc. by reading such data directly from the data carrier or may transfer the media data immediately into the local computer hard drive under the conditions set by the computer system, or system server 2.
The access media content procedure terminates in step S7-11-5.
Fig. 11 shows the display of information data on the display screen 16 during the access media content procedure as shown in Fig. 10. The user can look at an advertisement on an information viewer screen on his display screen 16. He receives general information how to decrypt the media data content on his data carrier 15. The displayed text may be "To decrypt the content on this disk, just watch and interact with the advertisements you see on the screen on the left. When you are done, you will receive a key to unlock the free media. Select a category on the buttons below the screen."
The user may choose between different kinds of media data encrypted on the data carrier 15. He may choose to listen to music or to watch movies. Other user access options like access to the coupon section or to his personal account are also displayed to the user on the display screen 16. The access media content procedure is activated when the user clicks to "play". The user may, for instance, watch to look at a new cartoon movie on the data carrier 15. He clicks to "movies" and receives information data on the viewer screen. This information data may, for instance, be advertisement data of the company sponsoring a cartoon film or a learning program for kids. The user interacts with the program for instance by answering questions, by performing orders, or by pressing buttons displayed on the viewer screen. After the interactive procedure has been terminated, the user is "rewarded" by gaining access to the encrypted media data, i.e. the cartoon movie .
Fig. 12 shows the access media screen displayed to the user on the display screen 16 after the interactive procedure has been completed. The user may choose to listen or view the encrypted media data or save the decrypted media data. Further options may include purchasing additional media data contents by the same artist or to visit the homepage of the artist. The user may also choose to send a message to the artist.
Fig. 13 shows a flowchart of the access coupon data procedure in step S9 as shown in Fig. 5. Coupon data is provided for purchasing goods and services from company servers 8 connected to the network 7. A company may decide to advertise by sponsoring data carriers and to include coupon data on the sponsored data carriers 15. This coupon data is an incentive for users to visit the homepage of the company and to make goods and services of the company more popular.
After start step S9-0, a link is established between the local computer 12 of the user and the system server 2 via web browser in step S9-1. In a step S9-2, a data carrier key code 15c is read from the inserted data carrier 15.
The carrier key code 15c is verified in a carrier key code verification procedure S9-3.
In a step S9-4, it is checked whether the carrier key code 15c is valid or not. If the carrier code 15c of the data carrier 15 is not valid, the procedure stops in step S9-5. In case that the carrier key code 15c is valid, it is checked in step S9-6, whether the user has a personal identification number. When the user has no personal identification number, he has to perform a pin assignment procedure S9-7. In case that the user has a personal identification number, the personal identification number is input by the user on the local computer 12 and then transmitted to the system server 2 in step S9-8. In a further step S9-9, the input personal identification number is verified by the system server 2. In step S9-10, it is checked whether the input pin number is valid and correct or not. If the user pin number is not valid or correct, the procedure stops in step S9-11. If the user pin number is valid and correct, an access coupon data procedure S9-12 is activated.
Fig. 14 shows the access coupon data procedure S9-12 in detail. After a start step S9-12-0, coupon data corresponding to the carrier key code 15c of the inserted data carrier 15 is read from the data carrier database 5 of the system server 2 in step 9-12-1. The data carrier database 5 stores for each carrier key code 5a corresponding coupon data in a value data field. In a further step S9-12-2, it is verified whether the coupon data on the data carrier 15 is still valid or not. It may be that the coupon data has ceased being valid due to a predetermined time period having been exceeded. The coupon data on the data carrier may, for instance, only be valid for one month from the date of user activation of the carrier containing the coupon. Coupon data stored as value data 15e on the data carrier 15 as shown in Fig. 2 will have to be used, i.e. ΛΛ cashed in" within a certain time period as indicated by the value timing data 5d stored in the data carrier database 5 of the system server 2.
In a step S9-12-3, it is checked by the system server 2 whether the coupon data 5c stored as value data 15e on the data carrier 15 is still valid or not. In case that the coupon data is no longer valid, the procedure stops in step S9-12-4. In case that the coupon data is still valid, the coupon data stored on the data carrier 15 is credited to the value data account 4c of the user having the verified pin number 4a in a step S9-12-5. After the coupon data has been credited to the user account in step S9-12-5, the coupon data 4c corresponding to the carrier key code of the inserted data carrier 15 and to the pin number of the user is marked to be invalid in step S9- 12-6. This ensures that the user cannot cash in the coupon data several times. In a step S9-12-7, the user is asked whether he wants to redeem the credited coupon or not. In case that the user does not want to redeem the credited coupon, the procedure stops in step S9-12-8. If the user wants to redeem his coupon, the coupon redemption procedure S9-12-9 is activated.
Fig. 15 shows a flowchart of the coupon redemption procedure S9-12-9 in detail.
After a start step S9-12-9-0, a data link between the local computer 12 and a company website corresponding to the coupon data is established in a step S9-12-9-1.
In a step S9-12-9-2, an input mask is displayed to the user showing offers of the companies which accept the coupons. In a step S9-12-9-3, the user selects from offers which are covered by the credited coupon data.
In a further step S9-12-9-4, the coupon data credited as value data in the value data account 4c of the user is transferred to the value account 4c of the company in exchange of the selected goods or services.
The coupon redemption procedure terminates in step S9-12-9-5.
Fig. 16 shows an example of an input mask of companies offering coupons. The user may click on the logo of each of several companies to see what special offers and coupons are available to him.
One major advantage for companies which offer coupons using the computer system 1 for their goods and service is that the user/members will be drawn to their website (s).
Fig. 17 shows the access account procedure Sll as shown in Fig. 5 in detail.
After a start step Sll-0, a link between the local computer 12 and the system server 2 is established via a web browser in step Sll-1.
In a step Sll-2, the user inputs his personal identification number.
The input personal identification number is verified by the personal identification verification procedure Sll-3.
In a step Sll-4, it is checked whether the input personal identification number is valid and correct or not. If the input personal identification number is not valid or correct, the procedure stops in step Sll-5.'If the pin number is valid and correct, an account transaction procedure is activated in step Sll-6.
Fig. 18 shows the options for the user in the access account procedure Sll-6. The user can choose between several options. He can get information about his value data account by clicking to "balance". When the user clicks to "balance", the system server searches the member database 4 and displays the coupon data and network money data available to the respective user as shown in Fig. 24.
If the user clicks on "deposit", several deposit options are made available to the user as shown in Fig. 25. Fig. 19 shows a deposit procedure A performing a value data deposit by means of value data carrier. The value data deposit procedure may comprise the following steps in a preferred embodiment. The user inserts a value data carrier 19 as shown in Fig. 2b into terminal 11 of a telecommunication network connected to the data network 7. A telecommunication link is then established between the terminal of the telecommunication network and the system server 2. The system server 2 verifies a personal identification number input by means of the terminal 11. Then the system server 2 verifies, for instance, a carrier key code 19a of the value data carrier. In a further step, the system server 2 verifies whether the value data stored on the value data carrier 19 is still valid or not. In case that the value data, which may be network money data or coupon data, is still valid, the value data is credited to the value data account of the user in the member database 4.
A key code verified by the system server 2 may alternatively be published by a provider and the value data stored in a value data account of the provider. Fig. 20 shows a deposit procedure using a key code printed in a newspaper.
The user may execute deposits into his account from any value data carrier 19, from his bank account, credit card, debit card or any other source integrated into the computer system.
If the user clicks to "history" in the input mask shown in Fig. 18, the user is able to view his history of transactions. As can be seen in Fig. 26 the user can see what transactions he has performed, i.e. which goods and services he has purchased from different companies or, alternatively, which advertisements he has interacted with as shown in Fig. 23.
If the user clicks to "trade" in the input mask of Fig. 18, he has the possibility to sell his purchase or ad viewing history to any user who has interest in such an information as shown in Fig. 27. These users could be other members of the system, marketing institutes, or PR agencies. In exchange of the purchase or ad viewing history of the user, he may receive value data from the accounts of these users. The trading procedure is shown in Fig. 21.
If the user clicks to "transfer" in the input mask of Fig. 18, he may transfer assets to another user or into a bank account or into a credit card as shown in Fig. 28. The transfer procedure can be seen in Fig. 22 in detail.
The computer system 1 according to the present invention solves several problems which address the distribution of any media content. Creative media data such as brand name music, video, animation, photography, movies and other media of all kinds may be distributed to a plurality of users for free in exchange of looking at advertisement data. Even though it may be possible for the user to copy the decrypted media data content which has been stored in the memory 17 of his local computer by transmitting the data content via the network to another user or to burn it onto another data carrier e.g. by means of CD-burner, these steps are time consuming, involve additional effort and costs. The incentive to carry out the required copying process is largely removed because the data carrier 15 containing the encrypted media data is preferably made available for free or for a subsidized price. It provides marketing companies with a platform to feature "TV-style" rich media advertisements using the Internet that is not reliant upon a high speed broadband network connection, typically required by a user to view movies or access other bandwidth- intensive media data directly from the Internet.
The computer system 1 according to the present invention drives customers to the website (s) of participating companies through the use of digital coupon data stored on the data carriers. The computer system 1 further provides users with an ability to use cash for online purchasing, through the purchase of network money (value data carriers) .
The computer system 1 according to the present invention provides a new application for the encryption/decryption technology of data carriers. Only after the user interacts via an interface on a data network, can he access the data stored on a local carrier. This opens many new possibilities for the use of the data medium, e.g. for the education of users.
The provider and producers of media data contents are able to monitor exactly how many copies of the data carriers are made by the users. This increases the income possibilities of media data providers dramatically.
The computer system 1 according to the present invention provides users with the ability to convert their personal information data into money value data, or information currency, to be utilized for their benefit within the system.
The computer system 1 according to the present invention further provides artists, authors and companies seeking to attract potential customers with a direct, alternative and effective channel for the marketing and distribution of their works, products and services to an audience of users motivate by the incentives the system provides.

Claims

Claims :
1. Computer system comprising
at least one system server having a system server data base storing decryption key codes of a plurality of data carriers, wherein said system server is connected via a data network to at least one local computer of a user, said local computer including reading means for a data carrier which stores a data carrier key code for identification of the data carrier and encrypted media data, wherein the system server sends a decryption key code corresponding to the data carrier key code for decryption of the encrypted media data when the data carrier code is valid.
2. Computer system according to claim 1, wherein the system server data base includes a member data base and a data carrier data base.
3. Computer system according to claim 2, wherein the member data base stores a plurality of user personal ID numbers and corresponding personal data of the users, value data and transaction data.
4. Computer system according to claim 3, wherein the data carrier data base stores a plurality of carrier key codes to identify the data carriers and for each carrier key code a corresponding verified user personal ID number identifying the user, value data, value timing data indicating whether the value data of the data carrier is valid and a decryption key code for decrypting media data stored on the data carrier which is identified by the carrier key code.
5. Computer system according to claim 4, wherein the data carrier data base stores an identification flag for each carrier key code, which indicates whether the carrier key code is valid.
6. Computer system according to claim 1, wherein an user interface program stored on the data carrier is executed on the local computer of the user, wherein the user interface program establishes a data communication link between the local computer and the system server via the data network by means of a network browser.
7. Computer system according to claim 1, wherein a system server input mask is displayed to the user after a personal ID number input by the user has been verified by the system server.
8. Computer system according to claim 3, wherein the data of the user stored in the member data base is displayed on a screen of the local computer to the user when selected by the user in the system server input mask.
9. Computer system according to claim 3, wherein the value data read from the data carrier is credited to a value data account of an user in the member data base of the system server when the value timing data indicates that the value data is still valid and the personal identification number input by the user has been verified by the system server.
10. Computer system according to claim 9, wherein the value data of the data carrier which has been credited to a value data account are marked to be invalid in the data carrier data base of the system server.
11. Computer system according to claim 9, wherein the value data is credited to a value data account of a provider in the member data base of the system server when a purchase transaction has been performed between the local computer of the user and a server of the provider.
12. Computer system according to claim 4, wherein the value data stored in the data carrier data base of the system server comprises coupon data for purchasing goods and services from servers of providers connected to the data network.
13. Computer system according to claim 12, wherein the data network addresses of the provider servers accepting the coupons are stored corresponding to the coupon data in the member data base of the system server.
14. Computer system according to claim 4, wherein the value data stored in the carrier data base of the system server comprises network money data for purchasing goods and services from servers of providers connected to the data network.
15. Computer system according to claims 12 to 14, wherein the system server establishes automatically a data communication link between the local computer of a user and the server of a provider in accordance with the coupon data stored in the data carrier read by the local computer.
16. Computer system according to claims 12 - 15, wherein the purchase transactions of each user are monitored by the system server and stored as purchase history data in the member data base .
17. Computer system according to claim 1, wherein the decryption key code is sent from the system server to the local computer of the user after the user has received information data.
18. Computer system according to claim 17, wherein the system server monitors whether the user has received the information data through interactive transactions of the user and stores the information data received by the user as information history data in the member data base.
19. Computer system according to claims 16 to 18, wherein an information purchase transaction is performed between a first user and a second user when selected by both users, wherein the purchase history data and/or the information history data of the first user stored in the member data base is transmitted to the second user and in exchange value data is credited to a value data account of the first user from the value data account of the second user.
20. Computer system according to claim 3, wherein value data is credited to a value data account of the user by means of a value data deposit procedure.
21. Computer system according to claim 1, wherein the system server is connected to a telecommunication network comprising at least one terminal.
22. Computer system according to claims 20 and 21, wherein the value data deposit procedure comprises the following steps: establishing a telecommunication link between the terminal of the telecommunication network and the system server, verifying an personal identification number input by means of the terminal by the system server, verifying a key code by the system server, verifying whether value data corresponding to the key code is still valid by the system server, crediting the value data to the value data account of the user in the member data base when the value data is still valid.
23. Computer system according to claim 22, wherein the key code is a carrier key code of data carrier inserted to the terminal of the telecommunication network and wherein the value data is stored on the data carrier.
24. Computer system according to claim 22, wherein the key code is published by a provider and the value data is stored in the value data account of the provider.
25. Computer system according to claim 21, wherein the telecommunication network is a telephone network.
26. Computer system according to claim 1, wherein the data network is a local area network, a wide area network or the Internet .
27. Method for decrypting media data stored on a computer readable data carrier comprising the following steps:
(a) executing an user interface program stored on the data carrier on a local computer of an user which is connected to a data network;
(b) establishing a data communication link between the local computer and a system server via the data network;
(C) reading a carrier key code stored on the data carrier by the local computer and transmitting the carrier key code to the system server via the data network;
(d) verifying by the system server whether the transmitted carrier key code is valid;
(e) sending a decryption key code for decryption of encrypted media data stored on the data carrier from the system server to the local computer of the user via the data network when the transmitted carrier key code is valid;
(f) decrypting the encrypted media data by means of the sent decryption key code on the local computer.
28. Method for decrypting media data according to claim 27, wherein the decryption key code is sent from the system server to the local computer after the user has received information data.
29. Method for decrypting media data according to claim 28, wherein the system server monitors whether the user has received the information data through interactive transactions of the user.
30. Method for decrypting media data according to claim 27, wherein an indication flag is set indicating that the carrier key code is invalid after the corresponding decryption key code has been transmitted from the system server to the local computer.
31. Method for decrypting media data according to claim 27, wherein the system server verifies whether the user has a valid personal ID number.
32. Method for decrypting media data according to claim 31, wherein the decryption key code for decrypting of encrypted media data stored on the data carrier is sent from the system server to the local computer of the user via the data network when the personal ID number of the user is valid.
33. Computer readable data carrier for a local computer of a user connected to a data network comprising a data carrier key code identifying the data carrier; a user interface program providing access for the user to at least one system server via the data network, wherein the system server has a data carrier data base storing decryption key codes of a plurality of data carriers.
34. Computer readable data carrier according to claim 33, wherein the data carrier further comprises encrypted media data, wherein the decryption key code for decrypting the media data is stored in the data carrier data base of the system server corresponding to the data carrier key code of said data carrier.
35. Computer readable data carrier according to claim 33, wherein the data carrier further comprises information data for interactive information exchange of the user via the data network, and wherein the decryption key code for decrypting the media data of the data carrier is sent form the system server to the local computer when the user has received the information data.
36. Computer readable data carrier according to claim 33, wherein the data network is a local area network, a wide area network or the internet.
37. Computer readable data carrier according to claim 33, wherein the encrypted media data comprises encrypted music data, encrypted film data, encrypted text data, encrypted software data.
38. Computer readable data carrier according to claim 33, wherein the information data comprises advertisement data and interactive learning programs.
39. Computer readable data carrier according to claim 33, wherein the data carrier further comprises value data.
40. Computer readable data carrier according to claim 39, wherein the value data comprises coupon data for purchasing goods and services from servers of providers via the data network.
41. Computer readable data carrier according to claim 39, wherein the value data comprises network-money data.
42. Computer readable data carrier according to claim 33, wherein the data carrier is a medium for storing digital data.
PCT/EP2001/008563 2001-07-24 2001-07-24 Method and computer system for secure distribution of digital data WO2003010637A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/EP2001/008563 WO2003010637A1 (en) 2001-07-24 2001-07-24 Method and computer system for secure distribution of digital data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2001/008563 WO2003010637A1 (en) 2001-07-24 2001-07-24 Method and computer system for secure distribution of digital data

Publications (1)

Publication Number Publication Date
WO2003010637A1 true WO2003010637A1 (en) 2003-02-06

Family

ID=8164515

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2001/008563 WO2003010637A1 (en) 2001-07-24 2001-07-24 Method and computer system for secure distribution of digital data

Country Status (1)

Country Link
WO (1) WO2003010637A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2389928A (en) * 2002-06-21 2003-12-24 Spero Comm Ltd Data stored in encrypted form on a data carrier may be accessed by a user when a remote server provides permission
WO2005006158A1 (en) * 2003-07-10 2005-01-20 Koninklijke Philips Electronics N.V. Method of and system for distributing a content item
US20220270474A1 (en) * 2006-10-06 2022-08-25 Universal Electronics Inc. Star cluster codeset database for universal remote control devices

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0561685A2 (en) * 1992-03-16 1993-09-22 Fujitsu Limited An electronic data protection system
EP0583140A1 (en) * 1992-08-11 1994-02-16 International Business Machines Corporation System for seamless processing of encrypted and non-encrypted data and instructions
WO1996041445A1 (en) * 1995-06-07 1996-12-19 Spyrus, Inc. System and method for access control for data storage media

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0561685A2 (en) * 1992-03-16 1993-09-22 Fujitsu Limited An electronic data protection system
EP0583140A1 (en) * 1992-08-11 1994-02-16 International Business Machines Corporation System for seamless processing of encrypted and non-encrypted data and instructions
WO1996041445A1 (en) * 1995-06-07 1996-12-19 Spyrus, Inc. System and method for access control for data storage media

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2389928A (en) * 2002-06-21 2003-12-24 Spero Comm Ltd Data stored in encrypted form on a data carrier may be accessed by a user when a remote server provides permission
WO2005006158A1 (en) * 2003-07-10 2005-01-20 Koninklijke Philips Electronics N.V. Method of and system for distributing a content item
JP2007519057A (en) * 2003-07-10 2007-07-12 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Method and system for distributing content items
US20220270474A1 (en) * 2006-10-06 2022-08-25 Universal Electronics Inc. Star cluster codeset database for universal remote control devices

Similar Documents

Publication Publication Date Title
US10692095B2 (en) Systems and methods of task cues
US10360570B2 (en) System and method for conducting a gift value transaction
US8321291B2 (en) Method, system and computer readable medium for facilitating a transaction between a customer, a merchant and an associate
US5855008A (en) Attention brokerage
US6141006A (en) Methods for executing commercial transactions in a network system using visual link objects
US6061057A (en) Network commercial system using visual link objects
US7316032B2 (en) Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
Araujo et al. Developing trust in internet commerce
US20020123956A1 (en) Method and system for creating and verifying derivative contract terms using party relationships
US20130041737A1 (en) Electronic coupon system and method
WO2009140391A2 (en) Desktop alert with interactive bona fide dispute initiation through chat session facilitated by desktop application
US20090138357A1 (en) Method and apparatus for system communications application between digital magazines, catalogs, and/or books and digital advertising brokers
US20140046741A1 (en) Method and system for facilitating creation and promotion of creative works
WO2011009113A2 (en) Apparatus and method for anonymously presenting targeted advertisements and desirable media content in association with a virtual currency
JP2002511967A (en) Digital content sales, delivery and maintenance system
US20080288371A1 (en) Internet based method and process for facilitating the presentation, sale, purchase, development and management of creative ideas concepts and content
WO2003010637A1 (en) Method and computer system for secure distribution of digital data
KR20020049380A (en) Method for intermediation of personal information through network and apparatus thereof
Burns Publishers and technology: Face to face
AU1501901A (en) Method of distributing advertisements
KR20010092625A (en) A moving picture electronic mail transfer system of electronic commerce
AU2309101A (en) Method of targeting online offers to a consumer in response to coupons possessed by the consumer
AU2309301A (en) Method for managing personal privacy in a computer network
GB2460085A (en) Method and apparatus for displaying certified digital content

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ PL PT RO RU SE SG SI SK SL TJ TM TR TT TZ UA US UZ VN YU ZA

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZW AM AZ BY KG KZ MD TJ TM AT BE CH CY DE DK ES FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 69 EPC (EPO FORM 1205A OF 260504)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP