WO2007012999A2 - A method and apparatus for authorizing to use a content - Google Patents

A method and apparatus for authorizing to use a content Download PDF

Info

Publication number
WO2007012999A2
WO2007012999A2 PCT/IB2006/052444 IB2006052444W WO2007012999A2 WO 2007012999 A2 WO2007012999 A2 WO 2007012999A2 IB 2006052444 W IB2006052444 W IB 2006052444W WO 2007012999 A2 WO2007012999 A2 WO 2007012999A2
Authority
WO
WIPO (PCT)
Prior art keywords
content
policy
use rights
pointer
rights
Prior art date
Application number
PCT/IB2006/052444
Other languages
French (fr)
Other versions
WO2007012999A3 (en
Inventor
Siyu Qiu
Hairong Yuan
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to EP06780111A priority Critical patent/EP1955245A2/en
Publication of WO2007012999A2 publication Critical patent/WO2007012999A2/en
Publication of WO2007012999A3 publication Critical patent/WO2007012999A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates generally to a method and apparatus for Digital Right Management (DRM) , and more particularly, to a method and apparatus for authorizing to use a digital content.
  • DRM Digital Right Management
  • Two basic DRM schemes have been employed at present: firstly, to perform DRM by encrypted contents, and secondly, to perform DRM in way of centralized control.
  • a digital content is encrypted first with a pre-assigned key, and then the encrypted digital content is distributed via an ordinary transfer channel.
  • a decryption key corresponding to the pre-assigned key is distributed to users of the digital content via a secure channel. In this way, the users of the digital content can use the digital content only upon receiving both the encrypted digital content and the decryption key for the corresponding use rights.
  • a centralized architecture is a DRM solution provided for large enterprises (such as content providers).
  • the digital contents to be authorized are placed in a centralized server, users or terminals requesting to use these digital contents have to be registered in the DRM system and the centralized server processes all requests for these digital contents.
  • the usage rules for the digital contents are established and maintained by the administrator of the DRM system according to the requirements from the owners of the digital contents.
  • the owners of the digital contents change the digital contents or the use rights of the digital contents, since the use rights for the contents are distributed once, the administrator of the DRM system has to redistribute the use rights of the digital contents.
  • AD Authorized Domain
  • a method and apparatus for authorizing to use a content is disclosed in a patent application WO2004/038568 filed by the applicant of the present application on Oct. 15 th , 2003, which is incorporated entirely herein by reference.
  • OMA Open Mobile Alliance
  • the OMA DRM system has to manage DRM agents first.
  • the users or terminals requesting to use the digital contents have to be registered and the users may receive and use the use rights defined by the owner of the digital content via the authorized terminal devices.
  • the registered DRM agents, users or terminals must be included.
  • the use rights defined by the owner of the digital content expired, the use rights cannot be changed.
  • An object of the present invention is to provide a novel method and apparatus for authorizing to use a digital content, which allows the owner of the content to authorize the users to use it in real time and flexibly, thus better protecting the intellectual property right of the owner of the digital content over the digital content.
  • the invention provides a method for authorizing to use a content, comprising the steps of: generating a pointer directing to a location where storing a policy of the use rights of the content; and associating the pointer with the content.
  • the policy of the use rights comprises the use rights of the content.
  • the policy of the use rights may comprise a real-time authorization process for acquiring a real-time authorization for the content from the owner of the content.
  • the owner of the content or a provider of the content may regularly or irregularly change the policy of the use rights, so as to form the policy of the use rights at different periods and of different versions.
  • the invention also provides a method for authorizing a user to use a content, comprising the steps of: receiving a request for using the content from the user; acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; acquiring the policy of the use rights according to the pointer; and acquiring the use rights of the content according to the policy of the use rights.
  • a user when attempting to use a digital content, a user has to obtain the latest policy of the use rights of the content so that the owner of the content may dynamically and flexibly authorize the users to use the digital content.
  • the invention also provides an apparatus for authorizing to use a content, comprising: pointer generation means for generating a pointer directing to a location where storing a policy of use rights of the content; and associating means for associating the pointer with the content.
  • the invention also provides an apparatus for authorizing a user to use a content, comprising: a means for receiving a request for using the content from the user; a means for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; a means for acquiring the policy of the use rights according to the pointer; and a execution means for acquiring the use rights of the content according to the policy of the use rights.
  • the invention also provides a computer program product for authorizing to use a content, the computer program product comprising: code for generating a pointer directing to a location where storing a policy of use rights of the content; and code for associating the pointer with the content.
  • the invention also provides a computer program product for authorizing a user to use a content, the computer program product comprising: code for receiving a request for using the content from the user; code for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; code for acquiring the policy of the use rights according to the pointer; and code for acquiring the use rights of the content according to the policy of the use rights.
  • the invention also provides an electronic certification for authorizing to use a content, comprising: code for generating a pointer directing to a location where storing a policy of use rights of the content; and code for associating the pointer with the content.
  • Fig. 1 is a flowchart showing the method for authorizing to use a content according to an embodiment of the present invention
  • Fig.2 is a flowchart showing the method for authorizing a user to use the content according to an embodiment of the present invention
  • Fig.3 is a flowchart showing the method for authorizing a user to use the content according to another embodiment of the present invention.
  • Fig.4 schematically illustrates an apparatus for authorizing to use a content according to an embodiment of the present invention.
  • Fig.5 schematically illustrates an apparatus for authorizing a user to use the content according to an embodiment of the present invention.
  • Fig. 1 is a flowchart showing the method for authorizing to use a content according to an embodiment of the present invention.
  • Step SIlO receive an input for the use rights of a content from the owner of the content.
  • the content may be a document, a digital picture or a digital video.
  • the content may be encrypted with various encryption methods.
  • the owner of the content may set the use rights of the content flexibly.
  • One or more input use rights are received from the owner of the content as follows: the content may be used when the terminal of the user has a CPU of a specific type; the content may be used when the operating system with which the user uses the content is of a specific type; the content may be used when the user is at a specific IP address; the content may be used at a specific time, for example, a certain moment of a day or a certain day in a week; the content may be used when the user is of a certain type, for example, the gender, age, occupation, nationality or the like of the user.
  • the use rights of the content input by the owner of the content may be one or more of the following: Do a certain operation (such as self-destroy%) after a number's view, such one time, two times... etc.; Do a certain operation (such as self-destroy%) after a time bomb; Do a certain operation (such as self-destroy%) after the user's a certain operation (every the contents be opened... etc.); Can be copied only once; Disable "save as” and
  • the use rights of the content may also set by the provider of the content such as an auctioneer is received. Secondly, generate the policy of the use rights according to the input (step S 120).
  • the policy of the use rights for the content defines to authorize a user to use the content in a specific manner under a specific condition.
  • the policy of the use rights may be the use rights of the content, or the policy of the use rights may be a real-time authorization process for obtaining the real-time authorization for the content from the owner of the content.
  • the real-time authorization process allows the user to contact the owner of the content according to a preset rule, so as to obtain a real-time authorization from the owner.
  • the preset rule may be to contact the owner of the content in the following sequence: for example, send an instant message to the owner of the content, send a multimedia short message to the owner of the content if no response thereto is received, send an email to the owner of the content if no response thereto is received and etc.
  • the policy of the use rights for the content may be the combination of the use rights of the content and the real-time authorization process. For example, after viewing the content for specific times, the user should contact the owner of the content according to the real-time authorization process, to obtain a real-time authorization from the owner if he/she still wants to view more.
  • the policy of the use rights may be a program developed with Java.
  • Java is a programming language introduced by Sun Inc. It is a language to be executed in an interpretation manner, having grammar rules similar to C++. Meanwhile, Java is a cross-platform programming language.
  • An application written with Java is referred as an "Applet”. After a compiler compiles an applet into a class file and stores it in a WWW page with a corresponding tag made in the HTML file, the user may run the applet directly online as long as he/she installs a Java client software. Java may run in any microprocessor, and an application developed with Java may be transmitted over the networks and run on any client.
  • the policy of the use rights may be an application developed with ASP (Active Server Pages), HTML, Flag or XML.
  • ASP Active Server Pages
  • HTML HyperText Markup Language
  • Flag XML
  • the location where storing the policy of the use rights may be a URL (Uniform Resource Locator), or any device connected to the Internet, such as a personal computer, mobile phone, laptop computer, or PDA.
  • URL Uniform Resource Locator
  • step S140 generate a pointer, the pointer directing to the location where storing the policy of the use rights for the content.
  • a pointer for the policy of the use rights is generated, the pointer directing to a location where storing the policy of the use rights for the content.
  • the pointer is embedded into the file header or metadata of the content, or embedded into the content in form of watermark.
  • the pointer may also be embedded into a software plug-in of a standard content creator that generates the content.
  • a standard content creator is an application or a CE appliance that can create a certain content, for example, Windows XP, Mac iMovie Pro or the like.
  • a plug-in of a standard content creator is a part of an application or a CE appliance, for setting the function of the standard content creator flexibly as required.
  • the electronic certification is used to authorize to use the content, including a code directing to the content and a code directing to a location storing the policy of the use rights for the content.
  • the electronic certification may include the content ID of the content, the content ID for identifying the content.
  • the electronic certification may include a specific address for storing the content, and all contents at the specific address use the same use rights policy.
  • the pointer is distributed to the user group.
  • the pointer may be conveyed to the specific user group via a standard distribution channel (for example, video broadcast, LAN, Internet, telephone line, satellite download and etc.) or via Email, or being stored on a specific storage medium (such as
  • the pointer is distributed to the public.
  • the owner of the content may convey the pointer to the public via a standard distribution channel (such as video broadcast, LAN, Internet, telephone line, satellite download or etc.).
  • a standard distribution channel such as video broadcast, LAN, Internet, telephone line, satellite download or etc.
  • the owner of the content or the provider of the content may update the policy of the use rights for the content regularly or irregularly after sending out the pointer.
  • the owner of the content may reset the policy of the use rights for the content no matter whether the user has used the content according to the original use rights policy for the content and whether the original use rights policy for the content expires.
  • the invention may be implemented by a suitably programmed computer, an application equipped with the computer being used to authorize to use a content.
  • the computer program product may be stored in a storage medium.
  • the computer program product comprises code for generating a pointer directing to a location where storing a use rights policy for the content; and code for associating the pointer with the content.
  • a part of the codes may be provided to a processor to form a machine so that the codes to be executed on the processor generate a means for implementing the above functions.
  • Fig.2 is a flowchart showing the method for authorizing a user of a content to use the content according to an embodiment of the present invention.
  • a request is received from a user, for requesting to use an encrypted content.
  • a pointer is acquired from the content, the pointer directing to a location where storing a use rights policy of the content.
  • the pointer is read out.
  • the pointer may be embedded into the content in the following fashions: the pointer is embedded in the file header or metadata of the content, or embedded into the content in form of watermark.
  • the pointer is read out of the file header of the content, the pointer directing to the location where storing the policy of the use rights for the content, for example, a specific server.
  • the pointer may originate from an electronic certification obtained by the user.
  • determine whether to obtain the current use rights policy according to the pointer (step S230).
  • the preset rule may be a default value, or originate from the electronic certification.
  • the preset rule may indicate that the user has to obtain the current use rights policy every time he/she uses the content, that the user has to obtain the current use rights policy after three times of use, or that the user has to obtain the current use rights policy after 200 minutes of use.
  • step S230 If the determination result of step S230 is positive, the specific server originates a request, according the location to which the pointer points and where the policy of the use rights is, to get the policy of the use rights for the content(step S240).
  • step S250 receive a reply from the server, and the policy of the use rights is obtained from the reply (step S250).
  • the policy of the use rights is that the video part of the content may be viewed for five times if the IP address of the user is from America.
  • step S260 execute the policy of the use rights(step S260).
  • a check is made whether the IP address of the user is from America. If yes, the user may obtain an authorization to view the video part of the content five times; and if no, the user cannot use the content.
  • the existing use rights policy may be the policy of the use rights obtained last time. For example, an existing use rights policy is set as that the video part of the content may be viewed once if the IP address of the user originates from America and the CPU of the device of the user is of a specific type.
  • step S280 executes the existing use rights policy (step S280).
  • a check is made whether the IP address of the user is from America, and meanwhile a check is made whether the CPU of the device of the user is of a specific type. If both of the above conditions are satisfied, the user obtains the key with which the video part of the content may be viewed once; otherwise, the user cannot use the content.
  • Fig.3 is a flowchart showing the method for authorizing a user to use the content according to another embodiment of the present invention.
  • receive a request from a user step S310.
  • a request is received from a user, to use the content.
  • acquire a pointer according to the request the pointer directing to a location where storing the current use rights policy of the content (step S320).
  • the policy of the use rights is a real-time authorization process, to obtain an authorization for the content from the owner of the content.
  • the real-time authorization process is used to contact the owner of the content according to a preset rule, to obtain the real-time authorization from the owner.
  • the preset rule is to contact the owner of the content in the following sequence: send an instant message to the owner of the content ; the constant message user name of the owner of the content m the MSN messenger system; and send a multimedia short message to the owner of the content if the reply to the instant message is not received from the owner of the content within 2 minutes, the phone number of the owner of the content being 139xxxxxxxx.
  • Sending instant message request comprises the following steps. (1) Access an instant messaging system as a user of the instant messaging system, to become an online user of the instant messaging system. Connect the server of the instant messaging system MSN messenger by using a client software of the instant messaging system, and the user has to input the username and password for the instant messaging system user in the instant messaging system. After the instant messaging system server validates the username and password for the instant messaging system, the user accesses the instant messaging system as a user of the instant messaging system, to become an online user of the instant messaging system. (2) Contact the owner of the content named as andv@ ⁇ hotn ⁇ aiLcom.
  • the instant messaging system server MSN messenger may send the connection information about the owner of the content with username as andv@hotmail.com to the user so that the user and the owner of the content may exchange instant messages directly.
  • an instant messaging system user and its peers may exchange instant messages indirectly via the instant messaging system server.
  • step S350 determine whether the reply to the instant message is received from the owner of the content within 2 minutes.
  • step S360 further determines whether the reply authorizes the user to use the content. If the reply to the instant message authorizes the user to use the content, send the authorization (such as an electronic certification) to the user (step S380). If the reply to the instant message is not received from the owner of the content or the reply to the instant message indicates that the owner of the content doesn't authorize the user to use the content, the user can't use the content. If the reply to the instant message is not received within 2 minutes from the owner, send a SMS to the phone number 139xxxxxxxx of the user according to a preset rule (step S370).
  • step S372 Determine whether the reply to the SMS is received from the owner within 2 minutes (step S372). If the reply to the SMS is received from the owner within 2 minutes, further determine is made whether the reply authorizes the user to use the content (step S374).
  • step S380 receive a use rights of the content (step S380).
  • the use rights of the content may take the form of an electronic certification. If the reply to the SMS is not received from the owner, or the reply to the
  • SMS indicates that the owner of the content doesn't authorize the user to use the content, the user can't use the content.
  • the invention may be implemented by a suitably programmed computer, an application equipped with the computer being used to authorize a user to use a content.
  • the computer program product for authorizing a user to use a content comprising: code for receiving a request for using the content from the user; code for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; code for acquiring the policy of the use rights according to the pointer; and code for acquiring the use rights of the content according to the policy of the use rights.
  • a part of the codes may be provided to a processor, to form a machine so that the codes to be executed on the processor generate a means for implementing the above functions.
  • Fig.4 schematically illustrates an apparatus for authorizing to use a content according to an embodiment of the present invention.
  • Fig.4 schematically illustrates the essential components of the authorization apparatus according to the present invention.
  • the authorization apparatus 400 has a pointer generation means 420 and an associating means 430.
  • the authorization apparatus 400 may further comprise a setting means 410, a storage means 440 and a distribution means 450.
  • the pointer generation means 420 is operable to generate a pointer, the pointer directing to a location where storing a use rights policy of the content.
  • the policy of the use rights for the content set by the setting means 410 is sent to the pointer generation means 420, to generate a pointer, the pointer directing to a specific location.
  • the specific location may be a URL (Uniform Resource Locator), or any device connected with the Internet, such as a personal computer, handset or laptop computer.
  • the associating means 430 is operable to associate the pointer with the content.
  • the associating means 430 may embed the pointer generated by the pointer generation means 420 into the content, for example, embed the pointer into the file header or metadata of the content, or embed the pointer into the content in form of watermark, or embed the pointer into the software plug-in of the standard content creator that generates the content.
  • the associating means 430 may generate an electronic certification for authorizing to use the content.
  • the electronic certification points to the content and points to the pointer.
  • the electronic certification may include the content ID of the content, for identifying the content.
  • the electronic certification may include a specific address for storing the content, and the same policy for use rights applies to all contents at the specific address.
  • the apparatus 400 may further comprise a setting means 410, for setting a use rights policy of the content.
  • the owner of the content may flexibly set the policy of the use rights for the content, and set the policy of the use rights for one or more contents.
  • the policy of the use rights includes the use rights of the content and the policy of the use rights may further comprise a real-time authorization process for obtaining the real-time authorization for the content from the owner of the content.
  • the setting means 410 may comprise an input means 412 and a policy generation means 414.
  • the input means receives an input for the use rights from the owner of the content or the provider of the content.
  • the policy generation means 414 generates the policy of the use rights according to the input.
  • the apparatus 400 further comprises a storage means 440, for storing the policy of the use rights into the location.
  • the apparatus 400 further comprises a distribution means 450. If the policy of the use rights is for a specific user group, the distribution means 450 distributes the pointer to the user group. If the policy of the use rights is for the general public, the distribution means 450 distributes the pointer to the general public.
  • Fig.5 schematically illustrates an apparatus for authorizing a user of a content to use the content according to an embodiment of the present invention.
  • the use authorization means 500 has a receiving means 510, a pointer acquisition means 520, a policy acquisition means 530 and an execution means 540.
  • the receiving means 510 is operable to receive a request for using a content from a user and may be a part of a standard content player.
  • the pointer acquisition means 520 acquires a pointer, the pointer directing to a location where storing the current use rights policy of the content.
  • the policy acquisition means 530 acquires the policy of the use rights according to the pointer. A determination is made whether to acquire the current use rights policy according to a preset rule.
  • the preset rule may be that the user has to obtain the current use rights policy every time he/she uses the content, that the user has to obtain the current use rights policy after three times of use, or that he has to obtain the current use rights policy after 200 minutes of use.
  • the execution means 540 acquires the use rights of the content according to the policy of the use rights.
  • the policy of the use rights includes the use rights of the content which may further comprise a real-time authorization process for acquiring the real-time authorization for the content from the owner of the content .
  • One application situation of the invention is that a painter creates a piece of artistic works, and he distributes the encrypted works to each gallery or auctioneer while distributing a pointer associated with the artistic works, the pointer directing to a location where store the current use rights policy of the artistic works.
  • the current use rights policy indicates that the artistic works may be viewed only once.
  • the current use rights policy of the artistic works changes to indicate that only the eight galleries or auctioneers that are interested in the artistic works and bargain may view the artistic works twice and others are not allowed to use the artistic works any more.

Abstract

The present invention provides a method for authorizing to use a content, comprising steps of: generating a pointer directing to a location where storing a policy of the use rights of the content; and associating the pointer with the content. The invention allows the owner of the digital content to authorize the digital content users to use the digital content in real time and flexibly, thus to protect the intellectual property right of the digital content owner over the digital content.

Description

A METHOD AND APPARATUS FOR AUTHORIZING TO USE A CONTENT
FIELD OF THE INVENTION
The present invention relates generally to a method and apparatus for Digital Right Management (DRM) , and more particularly, to a method and apparatus for authorizing to use a digital content.
BACKGROUND OF THE INVENTION
With rapid development of networking techniques and digital techniques, the amount of digital contents is soaring. Since digital contents are spread through electronic appliances or Internet, the owners of the digital contents wish their intellectual property right of the digital contents be protected when their digital contents are spread and used.
Two basic DRM schemes have been employed at present: firstly, to perform DRM by encrypted contents, and secondly, to perform DRM in way of centralized control. In the first DRM scheme, a digital content is encrypted first with a pre-assigned key, and then the encrypted digital content is distributed via an ordinary transfer channel. A decryption key corresponding to the pre-assigned key is distributed to users of the digital content via a secure channel. In this way, the users of the digital content can use the digital content only upon receiving both the encrypted digital content and the decryption key for the corresponding use rights. Further, when the owner of the digital content changes the digital content or the decryption key for the corresponding use rights, since the use rights of the content is distributed once, he has to redistribute the digital content and the decryption key for the corresponding use rights.
In the second DRM scheme, a centralized architecture is a DRM solution provided for large enterprises (such as content providers). In this solution, the digital contents to be authorized are placed in a centralized server, users or terminals requesting to use these digital contents have to be registered in the DRM system and the centralized server processes all requests for these digital contents. The usage rules for the digital contents are established and maintained by the administrator of the DRM system according to the requirements from the owners of the digital contents. Similarly, when the owners of the digital contents change the digital contents or the use rights of the digital contents, since the use rights for the contents are distributed once, the administrator of the DRM system has to redistribute the use rights of the digital contents. Many techniques for implementing AD (Authorized Domain) systems exist currently. For example, a method and apparatus for authorizing to use a content is disclosed in a patent application WO2004/038568 filed by the applicant of the present application on Oct. 15th, 2003, which is incorporated entirely herein by reference.
OMA (Open Mobile Alliance) also proposes a solution to protect digital contents. The OMA DRM system has to manage DRM agents first. The users or terminals requesting to use the digital contents have to be registered and the users may receive and use the use rights defined by the owner of the digital content via the authorized terminal devices. In this solution, when an issuer of a digital content defines a right object, the registered DRM agents, users or terminals must be included. Furthermore, before the use rights defined by the owner of the digital content expired, the use rights cannot be changed.
With growing popularity of digital electronic equipments and multimedia editing tools, more and more people and enterprises possess a large mount digital contents of their own, and they hope to share them with their families, friends, business partners or anyone else interested in their digital contents. In addition, the owner of a digital content may hope to change the use rights of his digital content in real time due to the occurrence of some events. It is, therefore, necessary to provide a novel method and apparatus for authorizing to use a digital content which allows the owner of the digital content dynamically and flexibly authorizes the users to use it.
OBJECT AND SUMMARY OF THE INVENTION
An object of the present invention is to provide a novel method and apparatus for authorizing to use a digital content, which allows the owner of the content to authorize the users to use it in real time and flexibly, thus better protecting the intellectual property right of the owner of the digital content over the digital content.
The invention provides a method for authorizing to use a content, comprising the steps of: generating a pointer directing to a location where storing a policy of the use rights of the content; and associating the pointer with the content. According to an embodiment of the invention, the policy of the use rights comprises the use rights of the content. Alternatively, the policy of the use rights may comprise a real-time authorization process for acquiring a real-time authorization for the content from the owner of the content. The owner of the content or a provider of the content may regularly or irregularly change the policy of the use rights, so as to form the policy of the use rights at different periods and of different versions.
The invention also provides a method for authorizing a user to use a content, comprising the steps of: receiving a request for using the content from the user; acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; acquiring the policy of the use rights according to the pointer; and acquiring the use rights of the content according to the policy of the use rights.
In accordance with the invention, when attempting to use a digital content, a user has to obtain the latest policy of the use rights of the content so that the owner of the content may dynamically and flexibly authorize the users to use the digital content.
The invention also provides an apparatus for authorizing to use a content, comprising: pointer generation means for generating a pointer directing to a location where storing a policy of use rights of the content; and associating means for associating the pointer with the content.
The invention also provides an apparatus for authorizing a user to use a content, comprising: a means for receiving a request for using the content from the user; a means for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; a means for acquiring the policy of the use rights according to the pointer; and a execution means for acquiring the use rights of the content according to the policy of the use rights.
The invention also provides a computer program product for authorizing to use a content, the computer program product comprising: code for generating a pointer directing to a location where storing a policy of use rights of the content; and code for associating the pointer with the content.
The invention also provides a computer program product for authorizing a user to use a content, the computer program product comprising: code for receiving a request for using the content from the user; code for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; code for acquiring the policy of the use rights according to the pointer; and code for acquiring the use rights of the content according to the policy of the use rights.
The invention also provides an electronic certification for authorizing to use a content, comprising: code for generating a pointer directing to a location where storing a policy of use rights of the content; and code for associating the pointer with the content.
Other objects and attainments together with a fuller understanding of the invention will become apparent and appreciated by referring to the following descriptions and claims taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
With reference to exemplary embodiments and the accompanying drawings, further descriptions will be made to the present invention and the related advantages.
In the figures: Fig. 1 is a flowchart showing the method for authorizing to use a content according to an embodiment of the present invention;
Fig.2 is a flowchart showing the method for authorizing a user to use the content according to an embodiment of the present invention;
Fig.3 is a flowchart showing the method for authorizing a user to use the content according to another embodiment of the present invention;
Fig.4 schematically illustrates an apparatus for authorizing to use a content according to an embodiment of the present invention; and
Fig.5 schematically illustrates an apparatus for authorizing a user to use the content according to an embodiment of the present invention. Throughout all the above drawings, like reference numerals will be understood to refer to like, similar or corresponding features or functions.
DETAILED DESCRIPTION OF THE INVENTION
Fig. 1 is a flowchart showing the method for authorizing to use a content according to an embodiment of the present invention.
First, receive an input for the use rights of a content from the owner of the content (Step SIlO).
The content may be a document, a digital picture or a digital video. The content may be encrypted with various encryption methods. The owner of the content may set the use rights of the content flexibly. One or more input use rights are received from the owner of the content as follows: the content may be used when the terminal of the user has a CPU of a specific type; the content may be used when the operating system with which the user uses the content is of a specific type; the content may be used when the user is at a specific IP address; the content may be used at a specific time, for example, a certain moment of a day or a certain day in a week; the content may be used when the user is of a certain type, for example, the gender, age, occupation, nationality or the like of the user.
The use rights of the content input by the owner of the content may be one or more of the following: Do a certain operation (such as self-destroy...) after a number's view, such one time, two times... etc.; Do a certain operation (such as self-destroy...) after a time bomb; Do a certain operation (such as self-destroy...) after the user's a certain operation (every the contents be opened... etc.); Can be copied only once; Disable "save as" and
"save" functions; Only viewable with certain IP address; Only the video part or the audio part of the content can be played, etc.
In this embodiment, the use rights of the content may also set by the provider of the content such as an auctioneer is received. Secondly, generate the policy of the use rights according to the input (step S 120).
The policy of the use rights for the content defines to authorize a user to use the content in a specific manner under a specific condition.
The policy of the use rights may be the use rights of the content, or the policy of the use rights may be a real-time authorization process for obtaining the real-time authorization for the content from the owner of the content. The real-time authorization process allows the user to contact the owner of the content according to a preset rule, so as to obtain a real-time authorization from the owner. The preset rule may be to contact the owner of the content in the following sequence: for example, send an instant message to the owner of the content, send a multimedia short message to the owner of the content if no response thereto is received, send an email to the owner of the content if no response thereto is received and etc.
Alternatively, the policy of the use rights for the content may be the combination of the use rights of the content and the real-time authorization process. For example, after viewing the content for specific times, the user should contact the owner of the content according to the real-time authorization process, to obtain a real-time authorization from the owner if he/she still wants to view more.
The policy of the use rights may be a program developed with Java. Java is a programming language introduced by Sun Inc. It is a language to be executed in an interpretation manner, having grammar rules similar to C++. Meanwhile, Java is a cross-platform programming language. An application written with Java is referred as an "Applet". After a compiler compiles an applet into a class file and stores it in a WWW page with a corresponding tag made in the HTML file, the user may run the applet directly online as long as he/she installs a Java client software. Java may run in any microprocessor, and an application developed with Java may be transmitted over the networks and run on any client.
Alternatively, the policy of the use rights may be an application developed with ASP (Active Server Pages), HTML, Flag or XML. Next, store the policy of the use rights to a location (step S 130).
The location where storing the policy of the use rights may be a URL (Uniform Resource Locator), or any device connected to the Internet, such as a personal computer, mobile phone, laptop computer, or PDA.
Next, generate a pointer, the pointer directing to the location where storing the policy of the use rights for the content (step S140).
A pointer for the policy of the use rights is generated, the pointer directing to a location where storing the policy of the use rights for the content.
Next, associate the pointer with the content (step S 150).
There are two ways to associate the pointer with the content: (1) embed the pointer into the content, and (2) generate an electronic certification authorizing to use the content.
(1) Embed the pointer into the content. The pointer is embedded into the file header or metadata of the content, or embedded into the content in form of watermark. In addition, the pointer may also be embedded into a software plug-in of a standard content creator that generates the content. A standard content creator is an application or a CE appliance that can create a certain content, for example, Windows XP, Mac iMovie Pro or the like. A plug-in of a standard content creator is a part of an application or a CE appliance, for setting the function of the standard content creator flexibly as required.
(2) Generate an electronic certification authorizing to use the content. The electronic certification is used to authorize to use the content, including a code directing to the content and a code directing to a location storing the policy of the use rights for the content.
The electronic certification may include the content ID of the content, the content ID for identifying the content. The electronic certification may include a specific address for storing the content, and all contents at the specific address use the same use rights policy.
Finally, distribute the pointer to users (S 160).
If the policy of the use rights is for a specific user group, the pointer is distributed to the user group. The pointer may be conveyed to the specific user group via a standard distribution channel (for example, video broadcast, LAN, Internet, telephone line, satellite download and etc.) or via Email, or being stored on a specific storage medium (such as
CD).
If the policy of the use rights is for the public, the pointer is distributed to the public.
The owner of the content may convey the pointer to the public via a standard distribution channel (such as video broadcast, LAN, Internet, telephone line, satellite download or etc.).
Since a pointer is conveyed to the user directing to a location where storing the policy of the use rights for the content, the owner of the content or the provider of the content may update the policy of the use rights for the content regularly or irregularly after sending out the pointer. The owner of the content may reset the policy of the use rights for the content no matter whether the user has used the content according to the original use rights policy for the content and whether the original use rights policy for the content expires.
In this manner, the owner of the content may change the policy of the use rights for the content in real time so that the user may use the content according to the latest use rights policy for the content. The invention may be implemented by a suitably programmed computer, an application equipped with the computer being used to authorize to use a content. The computer program product may be stored in a storage medium. The computer program product comprises code for generating a pointer directing to a location where storing a use rights policy for the content; and code for associating the pointer with the content. A part of the codes may be provided to a processor to form a machine so that the codes to be executed on the processor generate a means for implementing the above functions.
Fig.2 is a flowchart showing the method for authorizing a user of a content to use the content according to an embodiment of the present invention.
First, receive a request from a user (step S210).
A request is received from a user, for requesting to use an encrypted content. Second, acquire a pointer according to the request (step S220). According to the request from the user, a pointer is acquired from the content, the pointer directing to a location where storing a use rights policy of the content.
If the pointer is embedded in the content, the pointer is read out. The pointer may be embedded into the content in the following fashions: the pointer is embedded in the file header or metadata of the content, or embedded into the content in form of watermark.
Taking the pointer embedded in the file header of the content as an example, the pointer is read out of the file header of the content, the pointer directing to the location where storing the policy of the use rights for the content, for example, a specific server.
The pointer may originate from an electronic certification obtained by the user. Next, determine whether to obtain the current use rights policy according to the pointer (step S230).
It's to be determined whether to obtain the current use rights policy according to a preset rule. The preset rule may be a default value, or originate from the electronic certification. The preset rule may indicate that the user has to obtain the current use rights policy every time he/she uses the content, that the user has to obtain the current use rights policy after three times of use, or that the user has to obtain the current use rights policy after 200 minutes of use.
If the determination result of step S230 is positive, the specific server originates a request, according the location to which the pointer points and where the policy of the use rights is, to get the policy of the use rights for the content(step S240).
Next, receive a reply from the server, and the policy of the use rights is obtained from the reply (step S250). One example of the policy of the use rights is that the video part of the content may be viewed for five times if the IP address of the user is from America.
Next, execute the policy of the use rights(step S260). A check is made whether the IP address of the user is from America. If yes, the user may obtain an authorization to view the video part of the content five times; and if no, the user cannot use the content.
If the determination result of step S230 is negative, obtain an existing policy for use rights(step S270). The existing use rights policy may be the policy of the use rights obtained last time. For example, an existing use rights policy is set as that the video part of the content may be viewed once if the IP address of the user originates from America and the CPU of the device of the user is of a specific type.
Then, execute the existing use rights policy (step S280). A check is made whether the IP address of the user is from America, and meanwhile a check is made whether the CPU of the device of the user is of a specific type. If both of the above conditions are satisfied, the user obtains the key with which the video part of the content may be viewed once; otherwise, the user cannot use the content.
Fig.3 is a flowchart showing the method for authorizing a user to use the content according to another embodiment of the present invention. First, receive a request from a user (step S310). A request is received from a user, to use the content. Then, acquire a pointer according to the request, the pointer directing to a location where storing the current use rights policy of the content (step S320).
Next, obtain the current use rights policy of the content according to the pointer (step S330). The policy of the use rights is a real-time authorization process, to obtain an authorization for the content from the owner of the content. The real-time authorization process is used to contact the owner of the content according to a preset rule, to obtain the real-time authorization from the owner. The preset rule is to contact the owner of the content in the following sequence: send an instant message to the owner of the content ; the constant message user name of the owner of the content
Figure imgf000011_0001
m the MSN messenger system; and send a multimedia short message to the owner of the content if the reply to the instant message is not received from the owner of the content within 2 minutes, the phone number of the owner of the content being 139xxxxxxxx.
Next, send an instant message request to the owner of the content (step S340). Sending instant message request comprises the following steps. (1) Access an instant messaging system as a user of the instant messaging system, to become an online user of the instant messaging system. Connect the server of the instant messaging system MSN messenger by using a client software of the instant messaging system, and the user has to input the username and password for the instant messaging system user in the instant messaging system. After the instant messaging system server validates the username and password for the instant messaging system, the user accesses the instant messaging system as a user of the instant messaging system, to become an online user of the instant messaging system. (2) Contact the owner of the content named as andv@ϊhotn}aiLcom. By choosing the username of the owner of the content, the instant messaging system server MSN messenger may send the connection information about the owner of the content with username as andv@hotmail.com to the user so that the user and the owner of the content may exchange instant messages directly. Alternatively, an instant messaging system user and its peers may exchange instant messages indirectly via the instant messaging system server. (3) Send a request to the owner of the content with name
Figure imgf000012_0001
to use the content, the request comprising personal information of the user.
Next, determine whether the reply to the instant message is received from the owner of the content within 2 minutes (step S350).
If the reply to the instant message is received within 2 minutes, further determine whether the reply authorizes the user to use the content (step S360). If the reply to the instant message authorizes the user to use the content, send the authorization (such as an electronic certification) to the user (step S380). If the reply to the instant message is not received from the owner of the content or the reply to the instant message indicates that the owner of the content doesn't authorize the user to use the content, the user can't use the content. If the reply to the instant message is not received within 2 minutes from the owner, send a SMS to the phone number 139xxxxxxxx of the user according to a preset rule (step S370).
Determine whether the reply to the SMS is received from the owner within 2 minutes (step S372). If the reply to the SMS is received from the owner within 2 minutes, further determine is made whether the reply authorizes the user to use the content (step S374).
If the reply to the SMS permits the user to use the content, receive a use rights of the content (step S380). The use rights of the content may take the form of an electronic certification. If the reply to the SMS is not received from the owner, or the reply to the
SMS indicates that the owner of the content doesn't authorize the user to use the content, the user can't use the content.
Finally, store the use rights (step S390).
The invention may be implemented by a suitably programmed computer, an application equipped with the computer being used to authorize a user to use a content. The computer program product for authorizing a user to use a content, the computer program product comprising: code for receiving a request for using the content from the user; code for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; code for acquiring the policy of the use rights according to the pointer; and code for acquiring the use rights of the content according to the policy of the use rights.
A part of the codes may be provided to a processor, to form a machine so that the codes to be executed on the processor generate a means for implementing the above functions.
Fig.4 schematically illustrates an apparatus for authorizing to use a content according to an embodiment of the present invention.
Fig.4 schematically illustrates the essential components of the authorization apparatus according to the present invention. The authorization apparatus 400 has a pointer generation means 420 and an associating means 430. The authorization apparatus 400 may further comprise a setting means 410, a storage means 440 and a distribution means 450.
The pointer generation means 420 is operable to generate a pointer, the pointer directing to a location where storing a use rights policy of the content. The policy of the use rights for the content set by the setting means 410 is sent to the pointer generation means 420, to generate a pointer, the pointer directing to a specific location. The specific location may be a URL (Uniform Resource Locator), or any device connected with the Internet, such as a personal computer, handset or laptop computer.
The associating means 430 is operable to associate the pointer with the content. The associating means 430 may embed the pointer generated by the pointer generation means 420 into the content, for example, embed the pointer into the file header or metadata of the content, or embed the pointer into the content in form of watermark, or embed the pointer into the software plug-in of the standard content creator that generates the content.
The associating means 430 may generate an electronic certification for authorizing to use the content. The electronic certification points to the content and points to the pointer. The electronic certification may include the content ID of the content, for identifying the content. The electronic certification may include a specific address for storing the content, and the same policy for use rights applies to all contents at the specific address.
The apparatus 400 may further comprise a setting means 410, for setting a use rights policy of the content. The owner of the content may flexibly set the policy of the use rights for the content, and set the policy of the use rights for one or more contents. The policy of the use rights includes the use rights of the content and the policy of the use rights may further comprise a real-time authorization process for obtaining the real-time authorization for the content from the owner of the content. The setting means 410 may comprise an input means 412 and a policy generation means 414. The input means receives an input for the use rights from the owner of the content or the provider of the content. The policy generation means 414 generates the policy of the use rights according to the input. The apparatus 400 further comprises a storage means 440, for storing the policy of the use rights into the location.
The apparatus 400 further comprises a distribution means 450. If the policy of the use rights is for a specific user group, the distribution means 450 distributes the pointer to the user group. If the policy of the use rights is for the general public, the distribution means 450 distributes the pointer to the general public.
Fig.5 schematically illustrates an apparatus for authorizing a user of a content to use the content according to an embodiment of the present invention.
Fig.5 schematically illustrates the essential components of the use authorization apparatus according to the present invention. The use authorization means 500 has a receiving means 510, a pointer acquisition means 520, a policy acquisition means 530 and an execution means 540.
The receiving means 510 is operable to receive a request for using a content from a user and may be a part of a standard content player. The pointer acquisition means 520 acquires a pointer, the pointer directing to a location where storing the current use rights policy of the content.
The policy acquisition means 530 acquires the policy of the use rights according to the pointer. A determination is made whether to acquire the current use rights policy according to a preset rule. The preset rule may be that the user has to obtain the current use rights policy every time he/she uses the content, that the user has to obtain the current use rights policy after three times of use, or that he has to obtain the current use rights policy after 200 minutes of use.
The execution means 540 acquires the use rights of the content according to the policy of the use rights. The policy of the use rights includes the use rights of the content which may further comprise a real-time authorization process for acquiring the real-time authorization for the content from the owner of the content .
One application situation of the invention is that a painter creates a piece of artistic works, and he distributes the encrypted works to each gallery or auctioneer while distributing a pointer associated with the artistic works, the pointer directing to a location where store the current use rights policy of the artistic works. At this time, the current use rights policy indicates that the artistic works may be viewed only once. Ten days later, the current use rights policy of the artistic works changes to indicate that only the eight galleries or auctioneers that are interested in the artistic works and bargain may view the artistic works twice and others are not allowed to use the artistic works any more. Several days later, when the artistic works is sold to one of the galleries or auctioneers at an appropriate price, the current use rights policy of the artistic works becomes that only the gallery or auctioneer that bought the artistic works may view, copy and edit it and other galleries or auctioneers are not authorized to use the artistic works any more.
While detailed descriptions are made above to the invention in connection with specific embodiments, it is to be understood to those skilled in the art that various substitutions, modifications and variations to the above descriptions are apparent to fall within the spirit and scope of the invention.

Claims

CLAIMS:
1. A method for authorizing to use a content, comprising the steps of: a. generating a pointer directing to a location where storing a policy of use rights of the content; and b. associating the pointer with the content.
2. The method of claim 1, further comprising the step of: c. setting the policy of use rights.
3. The method of claim 2, wherein the step c comprising the steps of: receiving an input regarding to the use rights from the owner of the content; and generating the policy of use rights according to the input.
4. The method of claim 2, wherein the step c comprising the steps of: receiving an input regarding to the use rights from a provider of the content; and generating the policy of use rights according to the input.
5. The method of claim 3 or 4, further comprising the steps of: storing the policy of use rights to the location.
6. The method of claim 1, wherein the policy of use rights includes the use rights of the content.
7. The method of claim 1, wherein the policy of use rights comprises a real-time authorization process for acquiring a real-time authorization for the content from the owner of the content.
8. The method of claim 1, wherein the policy of use rights is dedicated to a specific user group, and further comprising the step of distributing the pointer to the user group.
9. The method of claim 1, wherein the policy of use rights is dedicated to the public, and further comprising the step of distributing the pointer to the public.
10. A method for authorizing a user to use a content, comprising the steps of: a. receiving a request for using the content from the user; b. acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; c. acquiring the policy of use rights according to the pointer; and d. acquiring the use rights of the content according to the policy of use rights.
11. The method of claim 10, wherein the policy of use rights includes the use rights of the content.
12. The method of claim 10, wherein the policy of use rights includes a real-time authorization process for obtaining a real-time authorization for the content from the owner of the content.
13. An apparatus for authorizing to use a content, comprising: pointer generating means for generating a pointer directing to a location where storing a policy of use rights of the content; and associating means for associating the pointer with the content.
14. The apparatus of claim 13, further comprising: setting means for setting the policy of use rights.
15. The apparatus of claim 14, wherein setting means comprises: receiving means for receiving an input regarding to the use rights from the owner of the content or a provider of the content; and policy generating means for generating the policy of use rights according to the input.
16. The apparatus of claim 15, wherein the setting means comprises: storing means for storing the policy of use rights to the location.
17. The apparatus of claim 13, wherein the policy of use rights comprises the use rights of the content.
18. The apparatus of claim 13, wherein the policy of use rights comprises a real-time authorization process for acquiring a real-time authorization for the content from the owner of the content.
19. The apparatus of claim 13, wherein the policy of use rights is dedicated to a specific user group, and further comprising distributing means for distributing the pointer to the user group.
20. The apparatus of claim 13, wherein the policy of use rights is dedicated to the public, and further comprising distributing means for distributing the pointer to the public.
21. An apparatus for authorizing a user to use a content, comprising: receiving means for receiving a request for using the content from the user; pointer acquiring means for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; policy acquiring means for acquiring the policy of use rights according to the pointer; and executing means for acquiring the use rights of the content according to the policy of use rights.
22. The apparatus of claim 21, wherein the policy of use rights includes the use rights of the content.
23. The apparatus of claim 21, wherein the policy of use rights includes a real-time authorization process for obtaining a real-time authorization for the content from the owner of the content.
24. A computer program product, for use in authorizing to use a content, the computer program product comprising: code for generating a pointer directing to a location where storing a policy of use rights of the content; and code for associating the pointer with the content.
25. A computer program product, for use in authorizing a user to use a content, the computer program product comprising: code for receiving a request for using the content from the user; code for acquiring a pointer according to the request, the pointer directing to a location where storing a policy of a current use rights of the content; code for acquiring the policy of use rights according to the pointer; and code for acquiring the use rights of the content according to the policy of use rights.
26. An electronic certificate, for use in authorizing to use a content, comprising: code for generating a pointer directing to a location where storing a policy of use rights of the content; and code for associating the pointer with the content.
PCT/IB2006/052444 2005-07-29 2006-07-18 A method and apparatus for authorizing to use a content WO2007012999A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP06780111A EP1955245A2 (en) 2005-07-29 2006-07-18 A method and apparatus for authorizing to use a content

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510088115.1 2005-07-29
CN200510088115 2005-07-29

Publications (2)

Publication Number Publication Date
WO2007012999A2 true WO2007012999A2 (en) 2007-02-01
WO2007012999A3 WO2007012999A3 (en) 2007-04-19

Family

ID=37546871

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2006/052444 WO2007012999A2 (en) 2005-07-29 2006-07-18 A method and apparatus for authorizing to use a content

Country Status (2)

Country Link
EP (1) EP1955245A2 (en)
WO (1) WO2007012999A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2367132B1 (en) * 2010-03-16 2015-11-11 Copyright Clearance Center, Inc. Automated rules-based rights resolution

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
WO2000058859A2 (en) * 1999-03-27 2000-10-05 Microsoft Corporation Digital license and method for obtaining/providing a digital license
EP1231532A2 (en) * 2001-02-09 2002-08-14 Sony Corporation Information processing system for licensing content
US20020124184A1 (en) * 2001-03-01 2002-09-05 Fichadia Ashok L. Method and system for automated request authorization and authority management
US20030130953A1 (en) * 2002-01-09 2003-07-10 Innerpresence Networks, Inc. Systems and methods for monitoring the presence of assets within a system and enforcing policies governing assets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
WO2000058859A2 (en) * 1999-03-27 2000-10-05 Microsoft Corporation Digital license and method for obtaining/providing a digital license
EP1231532A2 (en) * 2001-02-09 2002-08-14 Sony Corporation Information processing system for licensing content
US20020124184A1 (en) * 2001-03-01 2002-09-05 Fichadia Ashok L. Method and system for automated request authorization and authority management
US20030130953A1 (en) * 2002-01-09 2003-07-10 Innerpresence Networks, Inc. Systems and methods for monitoring the presence of assets within a system and enforcing policies governing assets

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2367132B1 (en) * 2010-03-16 2015-11-11 Copyright Clearance Center, Inc. Automated rules-based rights resolution

Also Published As

Publication number Publication date
WO2007012999A3 (en) 2007-04-19
EP1955245A2 (en) 2008-08-13

Similar Documents

Publication Publication Date Title
EP1509024B1 (en) Method for sharing rights objects between users
US7716288B2 (en) Organization-based content rights management and systems, structures, and methods therefor
US7522675B2 (en) Digital content preview generation and distribution among peer devices
US7310729B2 (en) Digital rights management license delivery system and method
US7392547B2 (en) Organization-based content rights management and systems, structures, and methods therefor
RU2395166C2 (en) Method for provision of access to coded content of one of multiple subscriber systems, device for access provision to coded content and method for generation of protected content packets
KR100806430B1 (en) System and method for reviewing received digital content
US20050027804A1 (en) Organization-based content rights management and systems, structures, and methods therefor
US7549062B2 (en) Organization-based content rights management and systems, structures, and methods therefor
JP2004046856A (en) Method for obtaining digital license corresponding to digital content
JP2004517377A (en) Control and management of digital assets
US20060230459A1 (en) System and method for password protecting an attribute of content transmitted over a network
WO2008060739A2 (en) Rights propagation and license management in conjunction with distribution of digital content
JP2004259284A (en) Review of user/group cached information related to issue of digital right management(drm) license of content
US9615116B2 (en) System, method and apparatus for securely distributing content
US20030126088A1 (en) Computer program storage medium, client computer, server, content distributing system and content distributing method
US8387148B2 (en) Secure rights protection for broadcast mobile content
US20060242074A1 (en) Encrypting digital rights management protected content
KR102447797B1 (en) System for managing document based on IPFS and method thereof
CN111932317A (en) Block chain based advertisement playing method, device, medium and electronic equipment
WO2007012999A2 (en) A method and apparatus for authorizing to use a content
JP2005182564A (en) Copyright management system, copyright management method, and copyright management program
KR20080004098A (en) Apparatus and method for manufacturing and accessing digital right management in portable terminal
KR20190001016A (en) Method and system for doubly encrypting and playing haptic effect data being provided to client's terminal via on-line network
JP2002132720A (en) Method and device for managing contents

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006780111

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2006780111

Country of ref document: EP