CN101142589A - Digital rights management using network topology testing - Google Patents
Digital rights management using network topology testing Download PDFInfo
- Publication number
- CN101142589A CN101142589A CNA200480040496XA CN200480040496A CN101142589A CN 101142589 A CN101142589 A CN 101142589A CN A200480040496X A CNA200480040496X A CN A200480040496XA CN 200480040496 A CN200480040496 A CN 200480040496A CN 101142589 A CN101142589 A CN 101142589A
- Authority
- CN
- China
- Prior art keywords
- receiving trap
- time
- probability
- message
- programmed instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
A method and system for preventing unauthorized use of copyrighted digital information includes transmitting verification data from a source to a receiving device. The verification data includes a secure source identifier. A reply message from the receiving device includes a secure confirmation of receipt for the verification data and a secure identifier of the receiving device. An elapsed time is determined between the time of transmission of verification data and the time of receipt of the reply message. Authorization to use or receive the digital content is based at least in part on the elapsed time.
Description
The cross reference of related application
[0001] the application requires the right of priority of the U.S. Provisional Patent Application submitted on November 26th, 2003 number 60/525651 according to the 35th piece of 119 (e) bar of United States code, clearly incorporates this application full content into this paper by reference at this.
Background of invention
Technical field
[0002] the present invention relates to a kind of method and system in broadband network upper domination number letter power data distribution, it is based on the situation of relative proximity or determining of geographic position to the receiving trap of source apparatus and request content.
Background technology
[0003] recent development of broadband technology has made the low cost that can carry out higher value content on broadband network distribute local and remotely.For example, the practical day by day very wide consumer-elcetronics devices of " plug and play " technology allowed band easily is connected to digital cable network.Therefore, the set-top box in past may become the distribution node of broadband network.But, the increase of efficiency of broadband communication, and in family, office and other places and between the growth of networked systems applications, also increased via broadband connection digital content from the long-range danger that is distributed to non-client with charge again of client with charge.Can be hindered the video display suppliers to digital content on the networked system by a large amount of bootleggings and the worry of distributing again and this transmission method is used for their content.In order to utilize the advantage of broadband distribution, new content protecting and copy management system should guarantee to use the broadband distribution network that content is distributed to another client or another location again.
[0004] also wishes to prevent that digital content is distributed to outside the geographic area of qualification again.For example, the receiver that the sport event broadcasting in certain area " being hacked (interruption) " may be connected to broadband network receives, and distributes again in the interruption area via broadband network.General position-based of traditional business model or geographic area about permission and distributing contents on radio network.(Designated Market Areas, DMA), TV is licensed on the access module of having ready conditions according to the designated market area that limits the geographic area based on Nielsen.For example, disapproving Los Angeles TV station broadcasts to New York audience.The also regular restricted right of coming to limit based on geographic range content of the TV of pay-per-use for example is limited to the subscriber house or family in the specific region.
[0005] on broadband network only again broadcasting or the distributing contents signal may be without any need for content replication again.Therefore, be devoted to prevent that traditional copy protection method of content replication from can not effectively prevent the distribution again of this content or broadcasting again.
[0006] therefore, be desirable to provide a kind of method and system, it determines to receive on the network relative proximity or the geographic position of any interconnection device of copyright digital content with rational degree of confidence.In system for numeral copyright management, also wish to utilize about the information of the relative proximity situation of interconnection device or relate to the geographical location information of one or more interconnection devices.
Summary of the invention
[0007] the invention provides a kind of system and method, it is used for determining to receive on the network geographic position or the relative proximity situation of the device of copyright digital content.Then, position or neighbor information can be used to determine that receiving trap is whether within the predetermined geographic scope or the contiguous source apparatus that is authorized to visit this content.
[0008] in an embodiment of the present invention, determine to send the time that comprises the message of encrypting unique identifier according to system's time function safe in utilization of this invention to request unit.This message can send by various known safety communicating methods (for example passing through encrypting messages).Request unit receives this message, with its encryption unique identifier it is made amendment, and by known safety communicating method this message is returned source apparatus.In case source apparatus has received answer message, source apparatus will confirm that the message that responds original transmission has sent message based on unique identifier, and this message may only be requested device and revised.Then, source apparatus measure to send origination message and receive reply between elapsed time, and safe in utilization, renewable network characteristic table and Measuring Time determine together receiving trap be local or from source apparatus in-plant, moderate distance or probability at a distance.Based on the relative distance of determining and the permission geographic range of request content, the visit to request content will be permitted or refuse to source apparatus.
[0009] in addition or alternatively, receiving trap also can time function safe in utilization, thereby when source apparatus receives message, message is added timestamp (stamp).When receiving and differentiate answer message, source apparatus can only be measured the mistiming between source apparatus transmitting time and the receiving trap time of reception.This mistiming also can and be used about the information of network characteristic together, to determine the relative proximity situation of receiving trap.In addition, perhaps in alternate embodiment, the message delivery time of replying message also can be used for determining the device proximity.
[0010] said method can not provide the accurate measurement of distance between source apparatus and the receiving trap.Usually, the time delay in the communication network only part is definite by the distance between the node, and also can be by network topology and composition and transient networks condition influence.For example, near device has relatively long time delay, and device far away to have relatively short time delay also be possible, this depends on intermediate topology.
[0011], can determine information according to the message that exchanges between emitter and the receiving trap about the go-between topology in order to address this problem.Some topological characteristic (comprising the typical transmission time) can be stored in the renewable table of a safety.Such canned data can be used with the transmission time of determining and measuring of the network topology that is used to transmit, and determined that with bigger degree of accuracy receiving trap is on hand or a long way off.
[0012] can represent contiguous estimation by probabilistic manner.For example, the simple estimation of the probable distance of " there is 95% confidence level a long way off in device " expression.According to embodiments of the invention, before source apparatus was taken action, the confidence level of user's definable expectation was as desired threshold value.For example, may require " device nearby " to have 95% degree of confidence.In addition, the definition of " at a distance " can be set by source apparatus; For example 200 feet, 100 meters, or the like.Then, source apparatus can determine in user-defined confidence level that two devices are " on hand " or " a long way off ".If relative distance is defined in nearby, the performed affairs of source apparatus will for example transmit video content on deciding near situation so.In alternate embodiment, can be device at a distance and enable video transmission or affairs.
[0013] in another embodiment, this system and method permit user determine one or more request units in the geographic area with respect to source apparatus and position relative to each other.In this embodiment, source apparatus and request unit use existing audiovisual input sink (AV receiver) for example geoceiver, cable receiver, DSL receiver, MMDS receiver or other receivers are determined their own positions with respect to AV receiver known location.In alternate embodiment, perhaps in addition, each device can use known location technology, and for example their initial geographic position is determined in automatic number identification (ANI).ANI comprises the follower head client database (back-office headenddatabase) of customer address and associated phone number.In the ANI system, receiving trap is configured to periodically call out headend office, and it uses the number verification unit address of database and input, as known in the art.
[0014], just can use and relatively come to determine relative distance between source apparatus and all request unit and the relative distance between the request unit oneself between the time delay of aforesaid transmission message and return messages in case determined known geographic position.Then, the user can determine source apparatus and the residing position of request unit with high probability in conjunction with this information.For example, this system can be used to determine device whether be positioned at certain TV market or two request units whether close each other or away from.
[0015] by the following detailed description of preferred embodiment of research, the understanding more comprehensively that will provide the geographic position to determine method to those skilled in the art, with and the realization of attendant advantages and purpose.Accompanying drawing will at first briefly be described, and will be with reference to the accompanying drawings.
Description of drawings
[0016] Fig. 1 is a process flow diagram, and it has illustrated based on elapsed time between the transmission of messages, prevents from copyright numerical information is carried out the illustrative steps of the method for unauthorized access.
[0017] Fig. 2 is a process flow diagram, and the statistical probability that it has illustrated based on the relative distance between source apparatus and the request unit prevents from copyright information is carried out the illustrative steps of the alternative method of unauthorized access.
[0018] Fig. 3 is a process flow diagram, and it has illustrated the statistics of relative distance between the coupling apparatus and from the initial position message of audiovisual receiver, has prevented from copyright information is carried out the illustrative steps of the alternative method of unauthorized access.
[0019] Fig. 4 is piece figure, and it shows according to example system of the present invention.
[0020] Fig. 5 is piece figure, and it shows the example system of using the audiovisual receiver to determine source apparatus and the initial geographic position of request unit.
Embodiment
[0021] the invention provides a kind of method and system, it is used for the geographic position of definite network equipment or the relative proximity situation of interconnection device, and is the such information of digital copyright management use on the network, has overcome the limitation of prior art.In the following detailed description, the components identical numbering is used to describe the similar elements that appears among one or more figure.
[0022] Fig. 1 shows method 100, and it is based on determining with the relative proximity situation in source whether the user is authorized to accessed content.In step 102, the potential user connects from the specific digital content of source apparatus request by telecommunication network.For example, can connect this request of reception via internet, LAN (Local Area Network), cable system, satellite data link or other networks well known in the art.
[0023] in step 104, source apparatus sends query messages to request unit.This query messages can be used for collecting the information about the transmission time of message between source apparatus and the request unit, this information is used for determining subsequently the relative proximity situation of request unit.The minimum encryption safe unique identifier that comprises source apparatus of this message.It also can comprise the timestamp of expression time of being sent out of this message and to the demand of additional data, for example from the reception query messages of request unit and the timestamp that transmits a reply message.
[0024] in step 106, request unit reception and response are from the inquiry of source apparatus.Request unit transmits a reply message to source apparatus.Reply message and comprise the affirmation of origination message and the encryption safe unique identifier of request unit.In addition, according to the source query demand, reply message and also can comprise the timestamp when expression receives this message, the timestamp when message is sent out is replied in expression, perhaps other information of response source inquiry.
[0025] in step 108, message is replied in checking.For example, source apparatus can be confirmed that this message comprises effective affirmation of original query message and confirm that the unique identifier of request unit is effective.Then, requestor identifier can be identified, the database of the known subscribers by this identifier relatively and special content for example, the perhaps known licensee of this identifier and special content resist technology relatively.
[0026] in case message is verified, measures elapsed time between the transmission of messages.In step 110, source apparatus measure in the following transmission any one or a plurality of between elapsed time: transmission of (step 110a) query messages and request unit receive between the query messages; Transmission and source apparatus that (step 110b) replys message receive between the answer message; Or (step 110c) source sends query messages and reception is replied between the message.For example, in the elapsed time can be only determined in the source, perhaps determines all possible time, and can calculate or calculating mean value not.Can be according to the internal clocking independent measurement elapsed time of source apparatus.In alternate embodiment, perhaps in addition, can use receiving trap to give and reply the timestamp that message increases.In this case, poor between transmission by arbitrary message or two message and time of reception stab can be measured elapsed time.But source apparatus at first must guarantee to make its clock and request unit synchronous.
[0027], the maximum of elapsed time and transmission of messages can be allowed the table of time or other suitable benchmark compare, to determine whether the user is authorized to receive the content of being asked in step 112.Maximum time table can comprise that the content provider produces and upload to the updatable data storehouse of source apparatus.Therefore according to the embodiment of the invention, the transmission time is used as the agency of the relative distance between source apparatus and the request unit, and is based on the maximum time that transmission of messages relatively is set with the geographical conditions access rule of every content.If the time between the transmission of messages has surpassed this maximal value, the source is just in the visit of step 114 refusal to content.If the time between the transmission of measuring, source apparatus was specific request unit authorized transmissions and accessed content in step 116 just under maximal value.
[0028] within the scope of the invention, can use various distinct methods to utilize the geographic position to determine to realize Content Management.Fig. 2 shows a kind of alternative method, and it determines relative geographic distance based on a plurality of inquiries from source apparatus.The same with method 100, in step 102, when source apparatus receives from unidentified user or comes the message of request content of known users of comfortable unidentified position, method 200 beginnings.This method and method 100 are similar, because the source sends query messages in step 104, receive and reply this query messages at step 106 request unit.But, in case source apparatus has been verified answer message in step 108, and step 110 determined the transmission between elapsed time, method 200 just is different from method 100.The source be step 202 with this information stores in database, and the repeatedly information query of repeating step 104-110 and Recovery Process in step 204, with a plurality of data points of collection, rather than authorize definite from this individual data point about the time of message transfer between source apparatus and receiving trap.In step 202, at every turn will be about the database of data storage in source apparatus of transmission time with the distinguishing mark of the network topology that is used for message transfer.In case the source has obtained enough data points (being determined by user's input rule), just compare this information and time range figure in step 206 source, and determine that in step 208 request unit and source apparatus are in-plant probability based on different topology hypothesis.If this probability surpasses the minimum value that the user limits for given piece of content, just permit visit to the request data in step 116 source.If this probability is no more than the minimum value that the user limits for this content, just refuse visit to the request data in step 114 source.
[0029] calculating of the collection of propagation delay time data, distance and do not need to take place as unbroken consecutive steps from the decision of receiving trap transmission or refusal content.For example, there is no need the position of calculating receiving trap before each transmission content.On the contrary, come the characterization relatively may be more efficient or faster with periodic intervals away from situation or setting position.In case setting position is by characterization, its state just can keep, and does not further collect distance or position data.But it will be appreciated that in order to keep current positional information accurately, should recomputate position or distance with all period interval.
[0030] Fig. 3 is a process flow diagram, shows a kind of alternative method 300, and it determines based on the combination of the time delay in the transmission of messages between one or more device known location and the one or more device whether the user is authorized to accessed content.In method 300, step 102,104,106,108 with 110 to carry out with method 100 the same modes.But in this embodiment, request unit is carried out additional step 302, and it determined its geographic position before the answer message of step 106 transmission to the query messages in source.
[0031] in one embodiment, in step 302, receiving trap uses automatic number identification (ANI) technology to determine its geographic position.Then, other information that this information is asked in query messages append to answer message, and when the timestamp when message is sent out is replied in received timestamp and expression to reply unique identification, expression query messages that message can include but not limited to request unit.
[0032] in another embodiment, in step 304, receiving trap is based on the position of determining it from the input of audiovisual receiver (AV receiver).The example of AV receiver comprises the receiver of geoceiver, cable receiver, satellite receiver, DSL receiver, MMDS receiver and other types.Such each receiver receives broadcasting or transmission from source, described source is from a known point location transmission and have the broadcasting or the transmission areal coverage of qualification.The size of areal coverage or scope change according to the type of receiver.For example, geoceiver is licensed broadcasts from certain latitude and longitude at specific power level.Therefore the scope of broadcasting will be determined by propagation characteristic, regional landform and weather condition.For cable transmission, scope is to be determined by the signal level of physical cables and cable distributing equipment.For satellite broadcasting, then scope is bigger, but still exist can received signal the qualification geographic zone.If device can be from the receiver received signal of appointment, can within the scope of the signal of this receiver or areal coverage, determine its geographic position so.
[0033] in this embodiment, the AV receiver can be connected to request unit, perhaps can be connected in local networking next-door neighbour's (for example in the family) together the multiple arrangement any one.In step 302, request unit connects or collects this positional information from one of other home networking devices of known and its next-door neighbour from its AV receiver.Then, this information and other information of asking in query messages are affixed to answer message, and its unique identification, expression query messages that can include but not limited to request unit when received timestamp and expression is replied the timestamp when message is sent out.
[0034] in step 106, this to be replied message send to source apparatus, this message is verified 108 at source apparatus, and is stored in the database 202 about the information in geographic position, and elapsed time between the transmission of messages is determined according to step 110 in the source.In step 304, source apparatus utilizes the ANI technology or determines its geographic position from the input of AV receiver, and stores this data.In step 306, source apparatus can use the relative position of determining all devices about the combination of the message time delay between the data of the known location of device and the device.Even source apparatus and request unit may not verify that they are located adjacent one another, but they can both confirm where they also pass to this information each other.Source apparatus can directly be known its geographic position, and perhaps it can be in close proximity to another device of knowing its geographic position.Equally, request unit can directly be known its geographic position, and perhaps it can be in close proximity to another device of knowing its geographic position.
[0035] for example, if source apparatus determines that based on its radio receiver it is in Los Angeles, if request unit is asking to visit the content of the device visit that only allows to be in Los Angeles, source apparatus can be defined as request unit the condition of accessed content in Los Angeles so.Source apparatus for example can be determined the position of request unit by the following method: (i) confirm request unit next-door neighbour source apparatus (known its is in Los Angeles); Confirm that (ii) request unit determined that it lays oneself open to Los Angeles; (iii) confirm one the 3rd device of request unit next-door neighbour, the 3rd device for example by using another radio receiver or ANI, determines that it lays oneself open to Los Angeles.
It is evident that [0036] neighbor information can be used in combination with other information, to determine whether to authorize specific transmission.Just, in all embodiment of the present invention, it is unique element of determining cause really that the contiguous request unit of source apparatus there is no need.When making visit and determine, can give lower, identical or even the higher weight of other factors.Should it is evident that equally, the tolerance band of receiving trap or geographic area can near or away from the source.For example, the long-range receiving trap content that can receive mandate is used to be transferred to its geographic area or receives the content that geographic restrictions also is not set on it.
[0037] Fig. 4 is piece figure, shows the embodiment suitable and system 400 that the present invention uses together.System 400 can comprise source apparatus 410, and it is connected in the various possible receiving trap 414 in many receptions place at least one by network 412.Suitable receiving trap can comprise, for example set-top box, DTV receiver or have the computer system of DRM player.In one embodiment, network 412 is cable systems.In addition, perhaps in alternate embodiment, system 400 can comprise other networks, is used for to the receiving trap transmitting digital information, for example internet, digital satellite television link or other wired or wireless networks.
[0038] receiving trap 414 on network 412 from the specific digital content 416 of source apparatus request.In case source apparatus has received request, it just produces and embeds the query messages that its unique identifier is arranged.Query message requesting is from the customizing messages of receiving trap, include but not limited to receiving trap the received time of unique identifier, message, reply the time that message is sent out and the geographic position of receiving trap.
[0039] receiving trap 414 produces and embeds the answer message that its unique identifier is arranged and comprise the information of query message requesting, includes but not limited to that its receives the time of message, its geographic position (if known) and its time of sending a reply.Receiving trap will be replied message by network 412 then and be sent it back source apparatus 410.
[0040] receive when replying message when source apparatus 410, it confirms that the receiving trap 414 that this message comprises unique query messages and only appointment may revise it.Source apparatus 410 also uses its secure clock 418 and is used for the received absolute time of network topology record answer message of message transfer.In one embodiment, source apparatus only determines the transmission of query messages and replys elapsed time between the reception of message, and based on the network topology that is used for message transfer relatively this time and the longest permitted hours of this special content piece.
[0041] maximum time table can comprise the information 420 that a part of replenish user that source apparatus is created provides.It comprises maximum time of different content of content-based supplier's business rules.If should the time within the longest permission time, source apparatus 410 is agreed request then and by it is passed to receiving trap by network 412, perhaps by providing the content 416 that receiving trap 414 visits are asked is permitted in the visit of current broadcast stream.If should surpass the longest permission time time, source apparatus 410 is just refused the visit to content 416.
[0042] in alternate embodiment, receiving trap also has the secure clock 422 synchronous with the clock 418 of source apparatus, and receiving trap can use the safety method of encryption will receive the time of query messages and time of replying transmission is added to and replys on the message.In this case, source apparatus 410 can determine the transmission of query messages and receive between elapsed time and reply the transmission of message and receive between elapsed time, and elapsed time between the whole process.Source apparatus have then that 3 data points are come and maximum time table 420 relatively, this table 420 also comprises query messages in this embodiment and replys the maximum transmission time of message and the maximum time of whole process.This will provide bigger a little accuracy for agreeing decision.
[0043] in another other embodiment, source apparatus 410 has received answer message and has measured elapsed time from receiving trap 414 after, it stores this information in its storer 424, and repeat following process: send query messages, receive from receiving trap and reply and calculate elapsed time.Source apparatus 410 repeats the number of times that this process limits quantity, with the data on the time delay that is collected in transmission of messages.Processor 426 is then based on the average delay of this data computation transmission of messages, with it and the renewable table that is included in the network delay in the information 420 that replenish user provides compare, and definite receiving trap be near or local distance, middle distance or probability at a distance.The permission probability table of these probability and every content relatively, this table is also contained in the information 420 that the user supplier replenishes.If receiving trap near or local probability within the scope of institute's request content, source apparatus 410 is just agreed this request and permission receiving trap 414 accessed contents 416.If probability is not within the tolerance band of institute's request content, source apparatus 410 is just rejected device 414 accessed contents 416 so.
[0044] Fig. 5 is piece figure, and it shows example system 500, and it is configured to relative proximity and the geographic position of determining one or more source apparatus or receiving trap.This system generally comprises source apparatus 510, and it is connected to various receiving traps in many receptions place by network 512, comprises set-top box 514, DTV receiver 516 or has the computer system 518 of DRM player.In one embodiment, network 512 comprises cable system.In alternative case, perhaps in addition, system 500 can comprise other networks, is used to transmit the numerical information on the LAN (Local Area Network), for example internet, digital satellite television link and other wired or wireless networks.Receiving within the place, all devices via in-home network 520 by local networking.Also be connected to signal via the AV input sink at each at least one source or receiving trap that receives in the place, for example ground signal 522, perhaps are connected to cable signal or satellite-signal 534.
[0045] in the course of work of system 500, receiving trap 514 can be by network 512 from the specific digital content 524 of source apparatus 510 requests.Source apparatus 510 will produce and embed the query messages that its unique identifier is arranged, and by network 512 it be sent to receiving trap 514.Query message requesting is from the customizing messages of receiving trap, includes but not limited to unique identification, the received time of this message of receiving trap and replys time that message is sent out and the geographic position of receiving trap.If be requested, receiving trap 514 just uses its safe absolute clock received time of 526 record queries message.Then, receiving trap 514 uses the AV signal input 522 that connects to determine its geographic position.In situation about substituting, receiving trap can use the input from the signal 534 that is connected to another device (for example computing machine 518), and other devices are connected to receiving trap 514 by in-home network 520 at this another device.Receiving trap 514 uses its secure clock 526 records then, and it transmits a reply message the time of (if requested words), and will reply message and send it back source apparatus 510 by network 512.
[0046] receives that when source apparatus 510 when replying message, it writes down the time on its safe absolute clock 528, confirm that the receiving trap that this message comprises unique query messages and only appointment may revise it.In case this message is identified, source apparatus just extracts and storage is replied in the message about inquiry time of reception and the time that sends a reply and the information in geographic position.Below source apparatus 510 is determined one of at least: the transmission of query messages and reply the transmission of elapsed time, query messages between the reception of message and receive between elapsed time and reply the transmission of message and receive between elapsed time, and in its storer 530 this information of storage.Source apparatus 510 can repeat the number of times that following process is wished arbitrarily: send query messages, receive and reply and calculate and storage elapsed time information, with the data on the time delay that is collected in transmission of messages.Source apparatus also uses the known geographical locations of determining it from the signal input of the AV receiver 532 that connects.
[0047] then, processor 534 is based on the average delay of this data computation transmission of messages, with it be included in the complementarity user and provide the renewable table of the network delay in the information 536 to compare, and definite receiving trap is for closely or local distance, middle distance or remote probability.Then, processor 534 will compare about the probability of the relative distance of device and their known geographic location information that is stored in the storer 530.Based on the combination of this information, source apparatus can be determined the geographic position of all devices.It is evaluated that the contrast of this position data is included in the business rule of every content in the side information 536 that the user provides.If the position of receiving trap is within the tolerance band of institute's request content, source apparatus 510 is just agreed request and the permission visit to content 524 so.If the position of receiving trap is not within described tolerance band, source apparatus 510 is just refused the visit to the content 524 of being asked so.
[0048] thereby, the method and system that digital content access is controlled has been described based on the geographic position.Be apparent that to those skilled in the art, realized intrasystem some advantage.Should be appreciated that and in scope and spirit of the present invention, to carry out various modifications, change and alternate embodiment thereof.For example, having described wherein, request unit is the system of set-top box, but apparent, the foregoing invention principle is equally applicable to television equipment, music apparatus, calculation element, personal assistant, mobile phone, cell phone and other similar devices of other types.In addition, described system can be used to control the communication stream of any kind, definitely or relatively geographically and contiguous determines at this.The present invention is defined by the appended claims.
Claims (30)
1. method that prevents unauthorized use copyright numerical information said method comprising the steps of:
From the request of a receiving trap reception to copyright numerical information;
Verification msg is sent to described receiving trap from a source, and wherein said verification msg comprises a secure source identifier;
Receive one from described receiving trap and reply message, wherein said answer message comprises the safety verification of receiving described verification msg and the secure identifier of described receiving trap;
Determine in the following time elapsed time between at least one: (a) time of reception of the transmitting time of verification msg and described answer message, (b) transmitting time of described verification msg and described receiving trap receive the time of described verification msg, or (c) send the time of described answer message and the time that described source receives described answer message from described receiving trap; With
To small part based on described elapsed time, determine whether to transmit described copyright numerical information to described receiving trap.
2. method according to claim 1 further comprises if described elapsed time is no more than the maximum time of qualification, with regard to authorized transmissions copyright numerical data.
3. method according to claim 1, wherein said forwarding step comprise that further transmission comprises the described verification msg that first safety time stabs, and the described first safety time stamp has been recorded the time of described message to described receiving trap that sends.
4. method according to claim 3, wherein said receiving step comprise that further reception comprises the described answer message that second safety time stabs, and the described second safety time stamp has been recorded the time of described answer message to described source apparatus that sends.
5. method according to claim 4 further comprises the timestamp clock synchronization that makes described source apparatus and receiving trap.
6. method according to claim 1 further comprises described elapsed time and network delay table are compared, to determine the probability of described receiving trap within the qualification distance in described source; With
Wherein second determining step further comprises to small part whether surpassing the maximum probability of a qualification based on described receiving trap than the probability of described qualification distance, and makes second decision.
7. method according to claim 6, wherein said second determining step further comprise if the described receiving trap probability nearer than the distance of described qualification surpassed the probability that limits, and just authorize to send described copyrighted data.
8. method according to claim 1 further comprises by repeating to send verification msg, receiving the statistics on the time delay that the step of replying message and definite elapsed time is collected in transmission of messages.
9. method according to claim 8 comprises that further statistics and the network delay table with described message transmission time delay compares, with determine described receiving trap from described source greater than the probability that limits distance; With
Wherein said second determining step further comprises to small part whether surpassing the maximum probability that limits based on described receiving trap than the probability of the distance of described qualification, and makes second decision.
10. method according to claim 9, wherein said second determining step further comprise if the described receiving trap probability nearer than the distance of described qualification surpassed the probability that limits, and just authorize to send described copyrighted data.
11. method according to claim 1 further comprises the geographic area of determining that described receiving trap may be positioned at.
Described source and receiving trap be in described geographic area 12. method according to claim 11, wherein said second determining step further comprise, just uses the maximum time that limits, and this time is short as to be enough to prevent the transmission of described copyrighted data.
13. further comprising, method according to claim 11, the step of wherein said definite position use automatic number identification ANI technology described receiving trap in location in the geographic area that area code limits.
14. method according to claim 11, the step of wherein said definite position further comprise input zone that broadcast singal scope limit in the location described receiving trap of use from the audiovisual receiver.
15. method according to claim 11 further comprises the geographic area of determining that described source apparatus may be positioned at.
16. a system that prevents the content of unauthorized use copy protection, it comprises:
Processor, it can be operated with execution of program instructions; With
Storer, itself and described processor operationally link, and described storer is preserved described programmed instruction, and described programmed instruction comprises:
From the request of a receiving trap reception to copyright numerical information;
Verification msg is sent to described receiving trap from a source, and wherein said verification msg comprises a secure source identifier;
Receive one from described receiving trap and reply message, wherein said answer message comprises the safety verification of receiving described verification msg and the secure identifier of described receiving trap;
Determine in the following time elapsed time between at least one: (a) time of reception of the transmitting time of verification msg and described answer message, (b) transmitting time of described verification msg and described receiving trap receive the time of described verification msg, or (c) send the time of described answer message and the time that described source receives described answer message from described receiving trap; With
To small part based on described elapsed time, determine whether to transmit described copyright numerical information to described receiving trap.
17. system according to claim 16, wherein said programmed instruction further comprise if described elapsed time within the time that the user limits, with regard to authorized transmissions copyright numerical data.
18. system according to claim 16, wherein said programmed instruction comprises that further transmission comprises the described verification msg that first safety time stabs, and described first safety time stamp record sends the time of described message to described receiving trap.
19. system according to claim 18, wherein said programmed instruction comprises that further reception comprises the described answer message that second safety time stabs, and described second safety time stamp record sends the time of described answer message to described source apparatus.
20. system according to claim 19, wherein said programmed instruction further comprises the timestamp clock synchronization that makes described source apparatus and receiving trap.
21. system according to claim 16, wherein said programmed instruction further comprises described elapsed time and network delay table is compared, to determine that described receiving trap is at the probability within the qualification distance in described source; With
Wherein said second determining step further comprises to small part whether surpassing the maximum probability that limits based on described receiving trap than the probability of the distance of described qualification, and makes second decision.
22. system according to claim 21, wherein said programmed instruction further comprises if the described receiving trap probability nearer than the distance of described qualification surpassed the probability that limits, and just authorizes to send described copyrighted data.
23. system according to claim 16, wherein said programmed instruction further comprises by repeating to send verification msg, receiving the statistics on the time delay that the step of replying message and definite elapsed time is collected in transmission of messages.
24. system according to claim 23, wherein said programmed instruction further comprises statistics on the time delay of described transmission of messages and network delay table is compared, and is limiting the probability within the distance from described source to determine described receiving trap; With
Wherein said second determining step further comprises to small part whether surpassing the maximum probability that limits based on described receiving trap than the probability of the distance of described qualification, and makes second decision.
25. system according to claim 24, wherein said programmed instruction further comprises if the described receiving trap probability nearer than the distance of described qualification surpassed the probability that limits, and just authorizes to send described copyrighted data.
26. system according to claim 16, wherein said programmed instruction further comprises the geographic area of determining that described receiving trap may be positioned at.
27. system according to claim 26, wherein said programmed instruction further comprises if described source and receiving trap not in described geographic area, just use the maximum time that limits, and this time is short as to be enough to prevent the transmission of described copyrighted data.
28. system according to claim 26, wherein said programmed instruction further comprises the location described receiving trap of the automatic number recognition technology of use in the geographic area that area code limits.
29. system according to claim 26, wherein said programmed instruction further comprises input geographic area that broadcast singal scope limit in the location described receiving trap of use from the audiovisual receiver.
30. system according to claim 26, wherein said programmed instruction further comprises the geographic area of determining that described source apparatus may be positioned at.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US52565103P | 2003-11-26 | 2003-11-26 | |
US60/525,651 | 2003-11-26 | ||
US10/998,030 | 2004-11-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101142589A true CN101142589A (en) | 2008-03-12 |
Family
ID=39193605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200480040496XA Pending CN101142589A (en) | 2003-11-26 | 2004-11-26 | Digital rights management using network topology testing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101142589A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107545171A (en) * | 2016-06-28 | 2018-01-05 | 汤姆逊许可公司 | For the apparatus and method according to the mandate of the equipment degree of approach to the access of service |
-
2004
- 2004-11-26 CN CNA200480040496XA patent/CN101142589A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107545171A (en) * | 2016-06-28 | 2018-01-05 | 汤姆逊许可公司 | For the apparatus and method according to the mandate of the equipment degree of approach to the access of service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050234735A1 (en) | Digital rights management using proximity testing | |
KR100847399B1 (en) | Digital rights management using a triangulating geographic locating device | |
US9391676B2 (en) | Network audio distribution system and method | |
US8230087B2 (en) | Enforcing geographic constraints in content distribution | |
CN101785262B (en) | Ensuring physical locality of entities sharing data | |
US7296158B2 (en) | Methods, apparatus, and program products for inferring service usage | |
CN101444037A (en) | Adaptive digital rights management system for plural device domains | |
CN101199205B (en) | Local conditional access method for mobile equipment | |
JP2008535062A (en) | NETWORK OPERATION AND INFORMATION PROCESSING SYSTEM AND METHOD INCLUDING CONNECTION OF PUBLIC ACCESS NETWORK | |
WO2008112663A2 (en) | Method and apparatus for tagging network traffic using extensible fields in message headers | |
JP4273973B2 (en) | Information communication system, transmission apparatus and transmission method, and computer program | |
US20040103066A1 (en) | Methods, apparatus, and program products for inferring service usage | |
KR101011620B1 (en) | Multimedia service method through set-top box management | |
CN101836405B (en) | For being issued in voip network system by sip terminal, inquiring about and the method for subscription information, sip terminal, sip application server, SIP information centre and voip network system | |
CN112311881B (en) | Visible optical network sharing method based on block chain and visible optical network equipment | |
CN101142589A (en) | Digital rights management using network topology testing | |
CN100414876C (en) | Method for switching on broadband video frequency business | |
KR102385683B1 (en) | Method and apparatus for providing contents viewing terminal using access point | |
US20100178951A1 (en) | Apparatus and mobile terminal | |
CN101166265A (en) | An access method for broadband video service | |
JP2002056074A (en) | Equipment use contracting system using communication network | |
KR20050001971A (en) | System for accessing wired or wireless intergrated-internet service and method thereof | |
JP3457808B2 (en) | Information transfer system and information provided device | |
CN115866070B (en) | Data processing system and data processing method | |
KR100874933B1 (en) | How to create a relay file for the distribution of digital content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080312 |