CN101443747A - Method and system for processing content - Google Patents

Method and system for processing content Download PDF

Info

Publication number
CN101443747A
CN101443747A CNA2007800175926A CN200780017592A CN101443747A CN 101443747 A CN101443747 A CN 101443747A CN A2007800175926 A CNA2007800175926 A CN A2007800175926A CN 200780017592 A CN200780017592 A CN 200780017592A CN 101443747 A CN101443747 A CN 101443747A
Authority
CN
China
Prior art keywords
content
drm
information
territory
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007800175926A
Other languages
Chinese (zh)
Inventor
朴玖容
赵成铉
朴一坤
郑万秀
郑民圭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LG Electronics Inc
Original Assignee
LG Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics Inc filed Critical LG Electronics Inc
Publication of CN101443747A publication Critical patent/CN101443747A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Abstract

A method and system for processing content are provided. The method of processing content includes: receiving source data from a first system; interoperable-processing the source data and generating a target data; and transmitting the target data to a second system. The first system or the second system includes at least one of access control system, copy protection system and use control system. Accordingly, it is possible to easily process non-compliant content in the DRM interoperable system.

Description

The method and system that is used for contents processing
Technical field
The present invention relates to be used for the method and system of contents processing, and be specifically related to the method and the basic system of such contents processing, can provide about the service of the DRM territory of non-conforming content (non-compliantcontent), and the method by being used for contents processing and basic system guarantee to be incorporated into the method and the basic system of integrality of the content of DRM inter-operation system.
Background technology
Recently, along with information by digitizing apace, it is very important that the copyright of digital content becomes.Generally speaking, different with analog content, owing to can under the situation of loss of information not, unrestrictedly duplicate digital content, so digital content may be easy to by bootlegging and use.Therefore, for digital content services is provided, just must support can protect digital content safely not by the content protecting technology of bootlegging and use.
Digital copyright management (DRM) is digital content protecting technology, can only allow legal authorized user to use digital content.DRM provides the full guard that is used for distribute digital content framework.For example, by using encryption technology, digital content is transformed to enciphered data with bag (package) form.Under the situation that does not have the legal identity verification process, can not use this digital content.
DRM becomes the basis of the safety that is associated with various content service models and legal content service.In practice, current content and service provider adopt current content and service provider exclusive DRM the content that provides by current content and service provider is provided.For example, under situation about being used for, provide the sound source of encrypting by predetermined encrypted template, to prevent illegal duplicating by the online sound source service that sound source is provided.Have only by using the application that provides by the service provider could reproduce this sound source.Correspondingly, the user buys sound source from the service provider, and by using the equipment of the application that is provided by the service provider has been installed wherein, and for example personal computer (PC), mobile phone, MP3 player etc. reproduce this sound source.
But because DRM possesses skills and political sealing attribute, so generally speaking, different DRM is incompatible each other.Therefore, although the common relatively content service of DRM content service has advantage on security and legitimacy, the inferior position that the DRM content service has is that the use of content is restricted and inconvenience.The problems referred to above impair the dirigibility of digital content distribution structure.Finally, this problem has hindered the activation in digital content services market.
Recently, proposed to provide the DRM inter-operation system of interoperability framework, compatible between the wherein different DRM.
The DRM inter-operation system adopts the notion in territory to be used as the elementary cell of the credible framework of DRM usually.The territory can refer to equipment or one group of software systems of one group of authentication.By prior defined procedure in the territory by the equipment of authentication or software systems (after this, being referred to as equipment) and same DRM or different DRM content shared in allowing the zone, be possible.
Can by based on the entity that makes up the territory therein physically mutually mutual environment come the function of entity is defined, and, make up the DRM inter-operation system by entity is suitably connected mutually.
But, in the past, have the non-conforming content of not supported for the DRM inter-operation system.Because the DRM inter-operation system is not supported the non-conforming content, so can not share this non-conforming content in the DRM inter-operation system.Just, non-conforming content can be for the non-conforming content that the DRM inter-operation system is supported.
Can be clean (clean) content and non-clean content with the non-conforming classifying content.
Clean content can refer to the unencryption or the original contents of scrambling not.Because clean content is not employed DRM, so in most of the cases, does not wherein have copyright information.Therefore, can unrestrictedly use this content, but can not protect this content.
Although the encrypted or scrambling of non-clean content, the clean content of right and wrong may be indicated the DRM content of not supported for the service of DRM territory.Although may there be the copyright information that uses non-clean content, this copyright information does not satisfy the copyright information that uses in the territory, and correspondingly, the service of DRM territory can not be offered non-clean content.For example, the sound source that will be stored in the CD (CD) carries out scrambling, to prevent bootlegging.The copy that can pass through to be managed distributes copyright.But it is still unripe that copyright is applied to DRM territory service method.
Perhaps non-clean content may occupy the overwhelming majority of current content of distributing in the cleaning.But before this, the content that the DRM inter-operation system is supported is subject to compatible content.Correspondingly, a lot of contents are not by the service support of DRM territory.This problem becomes puts off one of popular and business-like key factor of DRM territory service.Therefore, need development support non-conforming content required method and basic system.
Summary of the invention
Technical matters
The invention provides and be used for method and system that content is handled, it can offer the service of DRM inter-operation system the content of clean or non-cleaning.
The present invention also provides and has been used for method and basic system that content is handled, and it can guarantee to be incorporated into from the outside integrality of the non-conforming content the DRM inter-operation system.
The present invention also provide be used for to content handle, to share the method for the content in the light medium be stored in the territory.
Technical scheme
According to an aspect of the present invention, provide content is carried out the method that interoperability is handled, this method comprises: from first system's reception sources data; Source data is carried out interoperability handle and generate target data; And target data is sent to second system.Of the present invention above-mentioned aspect, first system or second system comprise access control system, copy-protection system or use in the control system at least one.
According to another aspect of the present invention, provide the method for coming contents processing by DRM inter-operation system that use to form the territory, this method comprises: when when content source receives content, obtain the content information of content from content source; The content that receives is transformed to the target DRM content that is suitable for target DRM; Target DRM content after the conversion is sent to the destination client of installation targets DRM content; And, generating shared permission by using the content information obtained, this shared permission is the extraction License Info that is used to use the target DRM content after the conversion.
Of the present invention above-mentioned aspect in, can indicate the unsupported content of DRM inter-operation system from the content that content source receives.This content can be the clean content of original contents, or the non-clean content of encryption or scrambling.
In addition, when content is clean content, the content that receives is transformed to target DRM content comprises: with the content transcoding (transcode) that receives is to have the content of destination client device available formats; And the content that having behind the transcoding is suitable for the form of purpose DRM is packed.
Alternately, when content right and wrong cleaning content, the content that receives is transformed to target DRM content can be comprised: by using encryption key the content that receives is transformed to clean content, this encryption key is provided by in content source or the outside appointing system at least one; With the clean content transcoding after the conversion is the content with destination client device available formats; And the clean content that having behind the transcoding is suitable for the form of target DRM is packed.
In addition, content information can comprise the copyright restrictions information that can limit the copyright of using content, and the shared permission that generates can comprise the copyright restrictions information with predetermined information form.Copyright restrictions information can comprise about in the information of the permission usable range of content and the managed Copy Info at least one.
In addition, content information can comprise at least one in following group, and this group comprises: the Administrator Info, and it comprises keeper's address, and the keeper is used for the DRM inter-operation system is carried out the generality management; User profile, it comprises about having or use the user's of content information; Content title information, it comprises the information about content title; Content format information, it comprises the information about the file layout of content; And content indexing, it comprises the unique identifier information that is used for content is carried out index.
In addition, when content information content index, the generation of shared permission can comprise: determine whether content indexing is identical with the content indexing of the predetermined DRM content of having used in the territory; And in request user input and the content source at least one provides new content indexing.
In addition, content information can comprise the Administrator Info, comprises keeper's reference address, and the keeper is used for the DRM inter-operation system is carried out the generality management.In this case, the generation of shared permission can comprise by using the Administrator Info in the content information to visit the keeper, to receive at least one in copyright control information, user profile, content title information, content format information and the content indexing.
In addition, content source can comprise: light media drive, and the main frame that can reproduce content, this light media drive comprises the light medium of memory contents.At this moment, except content, encryption key, copyright restrictions information, the content that the light medium can also memory contents cancelled tabulation (revocation list), equipment is cancelled tabulation etc.
In this case, the method that content is handled also can comprise: carry out mutual authentication between light media drive and main frame; And after mutual authentication, reproduce content by main frame.When carrying out mutual authentication and reproducing content, use at least one information that is stored in the light medium.
In addition, the method that content is handled also can comprise: the equipment in content source is registered to as the territory member among the keeper in territory, perhaps the destination client device is registered among the keeper in territory as the territory member.
In addition, the method that content is handled also can comprise: the shared permission that will generate offers the destination client device.In this case, the method that content is handled also can comprise: by application target ground client device, the shared permission that provides is offered the entity that is used to issue the permission that is used for target DRM, the entity issued that is used to issue the permission that is used for target DRM with request is permitted, and is reproduced target DRM content by the permission to use destination client device of being issued by the entity that is used to issue the permission that is used for target DRM.
According to a further aspect in the invention, provide the system that content is handled, this system comprises: will be registered to the client device in the territory, target DRM is installed in this client device; Content handler, its reception treats to be sent to from content source the content of client device, and from user input and content source at least one obtained the content information of content; Contents transformer (transformer), it is from the content handler received content, be transformed to the target DRM content that is suitable for target DRM with the content that receives, and target DRM content is sent to client device; And the copyright management device, it is from content handler received content information, and uses the content information that receives to generate shared permission, can extract the License Info that be used to use the target DRM content that has transmitted from this shared permission.
Of the present invention above-mentioned aspect in, client device can receive the shared permission that has generated from the copyright management device, the shared permission that will receive offers the permit server that is used for target DRM, and by using the permission of issuing by the permit server that is used for target DRM to use the target DRM content that transmits from contents transformer.
In addition, content handler can be installed in in client device, content source and another equipment that is registered in the territory at least one.Contents transformer can be from content source and designated external system at least one receive and be used for decruption key that content is decrypted, content is transformed to target DRM content.
According to a further aspect in the invention, provide the method that content is handled, this method comprises: receive the content for the treatment of to be sent to from external content source the DRM inter-operation system; The request security system is checked the integrality of the content that is received; And, determine whether content is sent to the DRM inter-operation system based on to transmit the check result of the integrality of content from security system.
In aspect more than of the present invention, determine whether that transmitting content can comprise:, when in content, finding mistake, determine content to be sent to the DRM inter-operation system as result from security system integrality that transmit, the scope of examination.
In addition, the method that content is handled also can comprise: as the result from security system integrality that transmit, the scope of examination, when finding mistake in content, the request security system is recovered this content.
According to a further aspect in the invention, provide the method that content is handled, this method comprises: in the territory, first equipment comprises the storage encryption content and is used to reproduce the light medium of the predetermined information of encrypted content with first device registration; With second device registration in the territory; In encrypted content and the predetermined information at least one is sent to second equipment that has registered to the territory from first equipment; And, can be by using predetermined information that the encrypted content that transmits from second equipment is transformed to by the content of second equipment reproduction.
Beneficial effect
According to embodiments of the invention, can be incorporated in the territory by the non-conforming content that will not support the service of DRM interoperability equipment or content sharing, the service of DRM territory is offered the non-conforming content.Correspondingly, can protect the content of clean type or non-cleaning by using DRM, and can between client device, share the non-conforming content safely with same DRM or different DRM.
In addition, can improve reliability by the integrality that inspection is introduced in the non-conforming content in the DRM inter-operation system, thereby solve the problem that inappropriate content is damaged the DRM inter-operation system.
Description of drawings
By being described in detail with reference to the attached drawings one exemplary embodiment of the present invention, above-mentioned and other feature and advantage of the present invention will become more obvious, in the accompanying drawings:
Fig. 1 is the block diagram that the primary entity that makes up the DRM inter-operation system is shown;
Fig. 2 illustrates the example of the basic operation of DRM inter-operation system;
Fig. 3 illustrates when the non-conforming content is introduced client device, the example of the operation of DRM inter-operation system;
Fig. 4 illustrates when being included in the non-conforming content handler among the client device A, the structure of DRM inter-operation system;
Fig. 5 illustrates when being included in the non-conforming content handler in the content source, the structure of DRM inter-operation system;
Fig. 6 to 9 illustrates the example of structure of the system of the integrality that is used to guarantee the non-conforming content;
Figure 10 illustrates the example of process, and this process is used for guaranteeing being introduced in the integrality of the non-conforming content of DRM inter-operation system;
Figure 11 illustrates according to another embodiment of the present invention, the example of the method that content is handled;
Figure 12 is illustrated in the example of carrying out the process of authentication between light medium and the main frame;
Figure 13 illustrates the example with the process of light media reproducing device registration in the territory; And
Figure 14 is illustrated in the example of the process of the equipment room content shared that registers in the territory.
<Reference numeral 〉
30: content source
The 70:DRM-A permit server
100 ': the DRM inter-operation system
110: domain manager
120: the copyright management device
130: contents transformer
150: the non-conforming content handler
CA: client and device A
Embodiment
Below, describe the preferred embodiments of the present invention with reference to the accompanying drawings in detail.In addition, in order clearly to describe one exemplary embodiment with reference to the accompanying drawings, used specific technical term.But the present invention is not subject to selected particular technology term, and each particular technology term comprises all and plays similar effect to realize the technology synonym of similar solid.
Fig. 1 is the block diagram that the primary entity that makes up the DRM inter-operation system is shown.In Fig. 1, for example understand in the territory, make up the main entity in territory and the relation of other inter-entity.
As shown in Figure 1, DRM inter-operation system 100 is configured to territory 10 elementary cell of DRM trusted system.Herein, the territory is the coverage of being served by the DRM inter-operation system.The set of the equipment that comprises authentication, software systems, communication node etc. can be indicated in territory 10.
Can make up territory 10 by using physical concept.Optionally, can make up territory 10 by only using logical concept.Optionally, can make up territory 10 by using physical concept and logical concept.For example, territory 10 can be configured to the set of the equipment of the authentication in specific localized areas.Optionally, territory 10 can be configured to and the irrelevant set of the equipment of authentication in logic of regional area.Optionally, territory 10 can be configured to the equipment that comprises one group of authentication in regional area, and one group of set of the equipment of authentication in logic in the regional area outside.
In the present embodiment, will the situation that DRM inter-operation system 100 makes up the territory be described, wherein by using physical concept to make up described territory.Correspondingly, after this, the set of the equipment of the authentication in specific localized areas can be indicated in territory 10.Yet the present invention is not limited to this.Except passing through the constructed territory of use physical concept, can also use above-mentioned various territory (for example, with the set of the equipment of set, the equipment that is included in the authentication in the regional area and the authentication beyond regional area of the irrelevant logical device of regional area etc.) to the present invention.
When DRM inter-operation system 100 made up territory 10, the user signed in to DRM inter-operation system 100, makes up the territory by using the equipment in the regional area, and uses the expectation content.For example, the house of user by the user is set to regional area and makes up the territory.In such as personal computer (PC), portable multimedia player (PMP), MP3 player, CD Player, mobile phone, PDA(Personal Digital Assistant) etc.; the user can share the sound source protected by various DRM, video, recreation etc. legally, and reproduces sound source, video, recreation etc.
With reference to Fig. 1, can use the entity such as client 140, contents transformer 130, domain manager 110, copyright management device 120, reference point controller 150 to make up DRM inter-operation system 100.
At this moment, entity 110 to 150 has the module of can be used as uniquely and is installed in function on the inner or outside premise equipment in territory 10.The major function of each entity and the preferred installation site of each entity below will be described.
1. client 140: client 140 is to use the entity of content at last.That is to say that client 140 can be indicated the terminal point that uses content.Client 140 can be installed on the equipment in the territory 10, and described equipment for example is mobile phone, PC, PDA, TV, CD, PMP, mobile MP3 player etc.At this moment, the equipment that client 140 is installed is called client device thereon.The DRM of appointment can be installed in the client device.Client 140 is supported the various functions relevant with other entities 110 to 130 so that client device can with dissimilar DRM compatibilities.
2. contents transformer 130: contents transformer 130 act as the content that will receive from the outside and is transformed to the content with intended target DRM.For example, when input had the content of DRM A, the content that contents transformer 130 will have DRM A was transformed to the content with DRM B, and DRMB is target DRM.In addition, contents transformer 130 can be transformed to the content with target DRM with the clean content that is not employed DRM.Alternatively, contents transformer 130 can have the content of target DRM with the content conversion of encryption or scrambling.Contents transformer 130 can be installed on the premise equipment, for example, on the client device.In some cases, contents transformer 130 can be installed on the external system.
3. domain manager 110: domain manager 110 is to act as the entity that territory 10 is managed.For example, domain manager 110 can be used to create territory 10, eliminates territory 10, registration and management client 140 and client device, client 140 is carried out authentication, registration and management reference point controller and the reference point controller is carried out authentication.
Domain manager 110 may reside in inside or outside any position in territory 10.For example, in the example depicted in fig. 1, domain manager 110 is present in the outside in territory 10.Preferably, domain manager 110 can be installed on the system of service provider's one side.Domain manager can be undertaken by the equipment in WAN communication network (for example the Internet) and the territory alternately.In contrast, domain manager 110 may reside in 10 inside, territory.In this case, domain manager 110 can be installed on the premise equipment in the territory 10.
4. the copyright management device 120: copyright management device 120 act as and uses user's copyright information of content to manage to being used to, and issue is used to use the shared permission of this content.Herein, shared permission can have the permission of dissimilar DRM from its extraction to be compatible License Info.In addition, copyright management device 120 is typical online service managers, and it provides login feature, so that the user can visit DRM inter-operation system 100, and uses user's copyright information of content to store to being used to.The user who visits DRM inter-operation system 100 by the login feature that uses copyright management device 120 can make up territory 10 by calling out domain manager 110, and the client device that is registered in the territory 10 by use uses content.As mentioned above, client device can indicate in territory 10, the equipment of client 140 has been installed thereon.
As shown in Figure 1, copyright management device 120 can be installed in the outside in territory, for example, it be installed in the system in service provider's one side.But copyright management device 120 is not must be present in service provider's one side.In some cases, copyright management device 120 can be installed on the premise equipment in the territory 10.
5. the reference point controller 150: reference point controller 150 is entities of determining the regional area scope and being used to make up the environment in territory 10.Can wait to determine the scope of regional area based on physical distance, jumping figure, reaction time.Reference point controller 150 comprises: the function of the checkout facility degree of approach regularly or at the fixed time.Reference point controller 150 can check whether premise equipment is present in the regional area.In addition, reference point controller 150 can offer territory certificate (domain credential) empirical tests and is present in client 140 in the regional area.At this moment, certificate indication in territory is used for representing that client 140 is present in the information of regional area.
In addition, reference point controller 150 can act as representative, and its representative is included in the client 140 in the territory 10 in regional area.For example, when exchange message between client 140 and domain manager 110, reference point controller 150 can act as intermediary.Alternatively, reference point controller 150 can be used for the information about the client 140 that belongs to territory 10 is stored and managed, and this information is offered domain manager 110.
Reference point controller 150 can be defined as the premise equipment in the territory 10 in the regional area.Just, reference point controller 150 can be the equipment of selecting in the client device from the territory.For this reason, when initial structure territory 10, carry out the process of selecting reference point controller 150.
Can carry out the process of selecting reference point controller 150 by exchange message between client device.For example, when initial structure territory 10, client device is exchanging capability information between client device.Can be chosen as reference point controller 150 by the client device that ability is the highest.At this moment, ability can be indicated the numerical information about equipment performance, for example, and battery allowance, the system specification, network service speed etc.
Alternatively, can carry out the process of selecting reference point controller 150 by domain manager 110.For example, when initial structure territory 10, client device will report to domain manager 110 about the ability information of client device.Domain manager 110 can compare each other by the ability information section about client device that will report, and the client device of highest-capacity is chosen as reference point controller 150.
On the other hand, in the process of selecting reference point controller 150, can select candidate device, when mistake occurring in the reference point controller 150, this candidate device will replace reference point controller 150.Reference point controller 150 reports that by regular and domain manager 110 or intended client end information carrying signal 150 operations of reference point controller are normal.When information signal was not sent to domain manager 110 or intended client end from reference point controller 150, current reference point controller 150 had just been lost the position of reference point controller 150, and candidate device can replace this reference point controller.In this case, register new reference point controller by domain manager.
To be defined as reference point controller 150 be favourable although will have the non-moving territory equipment of a lot of computational resources, the mobile domains equipment such as mobile phone can be defined as reference point controller 150.
Except above-mentioned entity 110 to 150, the DRM inter-operation system also can comprise: virtual client, Client Agent, content relation manager etc.The not description of the entity directly related with the present invention will be omitted.
When using DRM inter-operation system 100, although the type of the DRM that installs in the client device in territory 10 is different mutually, the user can share and use content in the client device that belongs to territory 10.
Fig. 2 illustrates the example of the basic operation of DRM inter-operation system 100.Fig. 2 illustrates when the DRM-A content stores is in client device A CA, and when the user wishes the DRM-A content to be sent to client device B CB and use content in client device B CB, the operation that will in DRM inter-operation system 100, carry out.
With reference to Fig. 2, in order to be verified to become the member in territory 10, client device A CA and client device B CB must carry out authentication (operation S1 and S2) by request domain manager 110 couples of client device A CA and client device B CB.
After client device A CA and client device B CB were carried out authentication, client device A CA made the request that the DRM-A content is sent to client device B CB.Can communicate that request to contents transformer 130 and copyright management device 120 (operation S3 and S4).Contents transformer 130 is transformed to the content that is suitable for DRM B (operation S5) with the DRM-A content, and the content that will be fit to DRM B is sent to client device B CB (operation S6)
On the other hand, the copyright information of 120 storages of copyright management device and leading subscriber.Copyright information comprises the user's copyright information that is used to use the DRM-A content.The shared permission that copyright management device 120 will comprise the user's copyright information that is used to use the DRM-A content is sent to client device B CB (operation S7).The shared permission indication of issue and the License Info of DRM A and DRM B compatibility.
Correspondingly, after client device B CB offered DRM-B permit server 20 with shared permission, for using DRM R permission, client device B CB received the required DRM B permission (operation S8 and S9) of use content that transmits from DRM-B permit server 20.At this moment, by shared permission is directly offered DRM-B permit server 20, copyright management device 120 can allow DRM-B permit server 20 that DRM B permission is offered client device B CB.Alternatively, after copyright management device 120 offered DRM-B permit server 20 with shared permission, copyright management device 120 can receive the DRM-B permission that is suitable for DRM B, and the DRM-B permission that receives is offered client device B CB.
Fig. 3 illustrates when the non-conforming content is introduced into client device, the example of the operation of DRM inter-operation system.In Fig. 3, show according to the structure of the DRM inter-operation system of one exemplary embodiment of the present invention and the process that the non-conforming content is handled.
As shown in Figure 3, also comprise non-conforming content handler 150 according to the DRM inter-operation system 100 ' of one exemplary embodiment of the present invention, so that the non-conforming content is handled.Non-conforming content handler 150 act as the non-conforming content that will receive from content source 30 and is transformed to the content with the form that can be supported by DRM inter-operation system 100 '.Therefore, can outside non-conforming content be incorporated in the DRM inter-operation system 100 ' by non-conforming content handler 150.
At first, non-conforming content handler 150 obtains the predetermined non-conforming content (operation S10) that will be sent to client device A CA from content source 30.At this moment, content source 30 can be indicated the equipment of the content in the local environment, for example PC, CD Player, MP3 player, Blu-ray Disc (BD) player, holographic optical disk (HD) player, set-top box, mobile phone, TV (TV) etc.Alternatively, content source 30 can be indicated by wide-area communication network (for example the Internet) and be come mutual external unit or system, for example content server.At this moment, except physical equipment, the notion that equipment indication comprises logical device (for example software systems) (for example, when in predetermined physical equipment, having a plurality of software systems, and when software systems have different DRM or playback system each other, see each software systems as discrete equipment).
By the non-conforming content that non-conforming content handler 150 obtained can be sound source, video, recreation, image etc.The non-conforming content can indicate unencryption or scrambling the content with clean type or with the incompatible content of another DRM with non-clean type.For example, when content source 30 was CD Player, the non-conforming content was the sound source that is inserted into the CD in the CD Player.In this case, the sound source indication has the content of non-clean type.Non-conforming content handler 150 can provide the non-conforming content by request content source 30, perhaps by in response to from the transmission requests of content source 30 and received content obtains the non-conforming content.
Except the non-conforming content, non-conforming content handler 150 obtains about the information of non-conforming content (operation S11).At this moment, non-conforming content handler 150 can provide information or obtain information about the non-conforming content by receive input from the user by request content source 30.When obtaining the information about the non-conforming content from user's input, non-conforming content handler 150 is provided for importing the window of content information to the user.
Information about the non-conforming content comprises: Administrator Info, user profile, content title information, content format information, content indexing and copyright restrictions information etc.
When making that DRM is can be with another DRM compatible, the Administrator Info can indicate the keeper's who carries out general management address (for example URL(uniform resource locator) (URL) address).For example, the Administrator Info can comprise DRM inter-operation system 100 ' in copyright management device 120 or the address of domain manager 110.As mentioned above, copyright management device or domain manager can be included in service provider's one side.In this case, be included in by use after Administrator Info in the content information that has transmitted visits copyright management device or domain manager as the system in service provider's one side, non-conforming content handler 150 can obtain: user profile, content title information, content format information, copyright restrictions information, content indexing information etc.
User profile can be indicated the information about the user, and this user has the non-conforming content and can use this content.Content title information can be indicated the title of non-conforming content, for example such as the sound source title of " Beyonce-Crazy Love ", video title " love Actually " etc.Content format information can be indicated the information about the file layout of non-conforming content.
Content indexing can be indicated the unique identifier that is used for the non-conforming content is carried out index.Can provide content indexing by content source 30, perhaps can come by user's input content indexing is provided with so that content indexing be different from territory 10 ' in the content indexing of the DRM-A content shared.Below describe when content indexing with territory 10 ' in the content indexing of shared DRM-A content when identical, in the process of issuing shared permission, mistake occurs, and the user is requested to import new content indexing.
Copyright restrictions information can be indicated the information about the use restriction of non-conforming content.For example, the copyright restrictions information definition non-conforming content therein be available allowed band, for example " 100 times reproduce ", " reproducing 30 days ", " unlimited reproduction ", " ten times duplicate " etc.When the shared permission of issue, copyright restrictions information is included in the shared permission.
Non-conforming content handler 150 can receive copyright restrictions information from the user, perhaps extracts copyright restrictions information automatically from content source one side.Herein, when the user imported copyright restrictions information, the user can import copyright restrictions information by the window that being used to of being provided by non-conforming content handler 150 imported content information.
In the situation of non-conforming content, particularly, clean content does not have copyright information usually.When not having copyright information, the user must import predetermined copyright restrictions information by the window that being used to of being provided by non-conforming content handler 150 imported content information.For example, when the user wished to protect and freely use by the user based on the content of the predetermined clean type that restriction produced or obtained, the user can be input to the copyright restrictions information of expecting in the non-conforming content handler 150.On the other hand, when perhaps clean content in the non-cleaning can be provided as the restricted information of content recommendation or warning, the user will be by being input to non-conforming content handler 150 corresponding to the copyright restrictions information of recommending or warn, or, prevent the illegal use of content from content source 30 extraction copyright restrictions information.
In addition, in the situation of non-clean content, copyright restrictions information can exist based on managed copy function.Managed copy function indication allows the user of content by buying copyright to use this content via communication network accessed content source (for example content service server).At this moment, the user can come how to duplicate or use to the greatest extent content according to number of times or the desired number of times of user that the copyright ownerL copyrighted material's owner allowed.That is to say that copyright restrictions information is present in the managed copy function.In this case, a side of content source 30 can offer non-conforming content handler 150 with the copyright restrictions information that generates because of purchase.Alternatively, the user can be directly inputted to copyright restrictions information in the non-conforming content handler 150.Non-clean content can comprise the copyright restrictions information that is not included in the existing DRM system.Copyright restrictions information can be transfused to and be reflected.
When having obtained compatible content and during about the information of compatible content, non-conforming content handler 150 request content transducers 130 come the compatible content of conversion (operation S12).Then, contents transformer 130 is transformed to the content with DRM A with compatible content, and DRM A is target DRM (operation S13).
Herein, when the clean content of compatible content right and wrong, contents transformer 130 is transformed to clean content by compatible content is decrypted with compatible content.Because non-clean content is encryption or scrambling, so need decruption key to come non-clean content is decrypted.The non-conforming content handler can provide decruption key (or can extract the module information (component information) of decruption key from it) to obtain decruption key by request content source 30, and decruption key is offered contents transformer 130.Alternatively, contents transformer 130 directly provides decruption key in request content source 30.
Subsequently, the clean content transcoding that contents transformer 130 will be deciphered is the content with the form that can be reproduced by client device A CA, and the content that having behind the transcoding is suitable for the form of DRM A is packed, and DRM A is target DRM.Therefore, compatible content is transformed to the DRM-A content.When compatible content was clean content, contents transformer 130 can be carried out transcoding process and ciphering process under the situation of not carrying out decrypting process.
When by said process compatible content being transformed to the DRM-A content, contents transformer 130 is sent to client device A CA (operation S14) with the DRM-A content after the conversion.Correspondingly, client device A CA can store the DRM-A content of being obtained by conversion non-conforming content.Herein, client device A CA is to be common territory member's equipment by domain manager 110 authentications.
On the other hand, non-conforming content handler 150 is sent to the copyright management device with the content information of compatible content, and makes the request (operation S15) of the shared permission of issue.At this moment, content information comprises: content indexing, copyright restrictions information etc.
Copyright management device 120 generates the shared permission of the copyright restrictions information that comprises compatible content with predetermined (promise) information format, and the shared permission that will generate is published to client device ACA (operation S17).At this moment, also can support this DRM the interoperability License Info that the shared permission of issue indication can extract from DRM, DRM inter-operation system 100 ' remove support DRM A.When the shared permission of issue, if the content indexing that is included in the content information is identical with the content indexing of the other guide that has been used, copyright management device 120 is identical with the content indexing of other guide by the content indexing that is included in the content information to 150 reports of non-conforming content handler, makes the request that the fresh content index is provided.In this case, non-conforming content handler 150 request users import the fresh content index, or the request content source provides the fresh content index.
The client device A CA that receives shared permission offers DRM-A permit server 70 with shared permission, and the required DRM-A permission (operation S18) of DRM-A content that receives from contents transformer 130 is used in 70 issues of request DRM-A permit server.Subsequently, DRM-A permit server 70 uses the DRM-A permission of DMR-A content to be published to client device A CA (operation S19) by using the shared permission that is provided to be used to.
Correspondingly, client device A CA can permit by the DRM-A of issue to use compatible content is carried out the DRM-A content (operation S20) that conversion is obtained.In addition, the DRM A and another client device (not shown) that are stored among the client device A CA can be shared.The operation of the DRM compatibility between the client device that is used for the territory has been described with reference to Fig. 2 herein.
On the other hand, when the shared permission of issue, as mentioned above, copyright management device 120 can be distributed to shared permission client device A CA.Optionally, after shared permission is distributed to non-conforming content handler 150 or content source 30, can the DRM-A permission be sent to client device A CA by allowing to receive the entity requests DRM-A permit server 70 issue DRM-A permissions of shared permission.Optionally, copyright management device 120 can directly offer the DRM-A permit server with shared permission, and the DRM-A permit server 70 that receives shared permission can will be used to use the DRM-A permission of DRM-A content to be distributed to client device A CA.
Up to now, the method that incompatible compatible content in another DRM is offered the client device A CA in the territory 10 ' has been described, territory 10 ' be DRM interoperability service area.In Fig. 3, although non-conforming content handler 150 is depicted as independent community in the territory, the present invention is not limited to this.The non-conforming content handler can be positioned at inner or outside any position, territory.In addition, the non-conforming content handler can be installed separately on premise equipment, perhaps it can be integrated in the predetermined entity of DRM inter-operation system as function.
Fig. 4 illustrates when non-conforming content handler 150 ' being included among the client device A CA ', DRM inter-operation system 100 " structure.In this case, non-conforming content handler 150 ' can be installed as the entity that separates with client, described client is mounted in the entity on the client device A CA '.Alternatively, by non-conforming processor 150 ' is included in the client as submodule, it can be embodied as the function of client.
With reference to Fig. 4, in the time of in non-conforming content handler 150 ' being included in client device A CA ', client device A CA ' can be used for: obtain non-conforming content and content information thereof, make the conversion requests for content and make the request of issuing shared permission.At this moment, the user can be input to the content information of compatible content territory 10 " in client device A CA ' in.
On the other hand, when the non-conforming content has non-clean type, for example, when the non-conforming content is the sound source of CD, client device A CA ' extracts decruption key or the module information that the non-conforming content is decrypted, can extract decruption key from content source 30 from this module information, or provide decruption key or module information to come receiving and deciphering key or module information by request content source 30.
Fig. 5 illustrates when with non-conforming content handler 150 " when being included in the content source 30 ', DRM inter-operation system 100 " ' structure.
With reference to Fig. 5, when non-conforming content handler 150 " when being included in the content source 30 '; content source 30 ' request is at DRM inter-operation system 100 " ' in 130 pairs of contents of contents transformer carry out conversion, and request is at DRM inter-operation system 100 " ' in copyright management device 120 issue shared permission by direct extraction content information.At this moment, the user can import the content information of compatible content by accessed content source 30 '.
In addition, when the non-conforming content had non-clean type, content source 30 ' can be deciphered the decruption key of non-conforming content or offer contents transformer 130 from its module information that can extract decruption key being used to.
On the other hand, when being incorporated into the non-conforming content in the DRM inter-operation system, must guarantee the integrality of non-conforming content.At this moment, the integrality of non-conforming content can indicate the non-conforming content not have wrong state, and non-conforming content just is not impaired because of pollution.Correspondingly, when integrality was guaranteed, the non-conforming content was exactly the content of being guaranteed and being trusted.
Below will describe process and the basic system thereof integrality, that handle the non-conforming content that to guarantee the non-conforming content in detail.
Fig. 6 to 9 illustrates the example of the system architecture of the integrality that is used to guarantee the non-conforming content.
At first, with reference to Fig. 6, in order to ensure the integrality that is sent to the non-conforming content of DRM inter-operation system 500 from content source 200, system must content integrity manager 300, and it is used to manage the inspection that the integrality of the non-conforming content that is sent to DRM inter-operation system 500 from content source 200 is carried out.
Content integrity manager 300 act as the request security system and checks the integrality that is sent to the non-conforming content of DRM inter-operation system 500 from content source 200, the result who whether is based on checked for integrity with definite non-conforming content is transmitted, and will determine that the result reports to DRM inter-operation system 500 or content source 200.Herein, DRM inter-operation system 500 can indicate the system that comprises the function that above-mentioned non-conforming content is handled (Fig. 3 100 ', Fig. 4 100 " and Fig. 5 100 " ').In addition, except the non-conforming content, content integrity manager 300 can be carried out above-mentioned functions to the compatible content that is incorporated into from the outside the DRM inter-operation system 500.
Content integrity manager 300 can be mutual with security system 400.Security system 400 act as carries out inspection to the integrality of the non-conforming content of being asked by content integrity manager 300.Security system 400 can be the virus checking system.In addition, except the function of the integrality of checking the non-conforming content, when as the integrality of checking the non-conforming content found that mistake the time, security system 300 can have removes wrong function.
As shown in Figure 6, security system 400 can be carried out with content integrity manager 300 and the DRM inter-operation system 500 beyond the DRM inter-operation system 500 alternately.Alternatively, security system 400 can be included in the DRM inter-operation system 500.Fig. 7 illustrates and security system 400 ' can be included in the DRM inter-operation system 500 '.
In addition, as shown in Figure 6, content integrity manager 300 externally can be configured to the system that separates with DRM inter-operation system 500.Alternatively, content integrity manager 300 can be included in the DRM inter-operation system 500.Fig. 8 illustrates content integrity manager 300 " be included in DRM inter-operation system 500 with entity form " in.
On the other hand, content integrity manager 300 and security system 400 can be included in the DRM inter-operation system 500.Fig. 9 illustrates content integrity manager 300 and security system 400 ' is included in DRM inter-operation system 500 " in situation.Determine from the system of Fig. 6 to 8, to select which system based on execution environment.
Figure 10 illustrates the example of process, and this process is used for guaranteeing being incorporated into the integrality of the non-conforming content of DRM inter-operation system.System adopts system architecture shown in Figure 6, with this process of easy to understand.
As shown in figure 10, will be scheduled to the non-conforming content and be sent to content integrity manager 300 (operation S40) from content source 200.Herein, the non-conforming content is incorporated in the DRM inter-operation system 500.
Content integrity manager 300 request security systems 400 are checked the integrality (operation S41) of the non-conforming content of transmission.Then, in response to above-mentioned request, the integrality of 400 pairs of non-conforming contents of security system is checked (operation S42).When checked for integrity, the situation of appearance comprises: do not have wrong situation and find wrong situation in the non-conforming content in the non-conforming content.After integrity checking was finished, security system 400 reported to integrity manager 300 (operation S43) with the check result of integrality.
Content integrity manager 300 determines whether to send the non-conforming content to DRM inter-operation system 500 (operation S44) based on the check result of integrality, and will determine that the result reports to DRM inter-operation system and content source (operation S45 and S46).
For example, result as checked for integrity, when in the non-conforming content, not having mistake, content integrity manager 300 determines that the integrality of non-conforming content is guaranteed, and is normally sent to DRM inter-operation system 500 to DRM inter-operation system 500 and content source 200 report non-conforming contents.Subsequently, send the non-conforming content to DRM inter-operation system 500.At this moment, can represent that integrality is the non-conforming content that is inserted into transmission by the information that security system 400 is checked with being used for.
On the other hand, result as checked for integrity, when in the non-conforming content, finding mistake, content integrity manager 300 determines that the integrality of non-conforming content is not guaranteed, and the non-conforming content can not be sent to DRM inter-operation system 500 to DRM inter-operation system 500 and content source 200 reports.At this moment, content integrity manager 300 can come integrality is checked in request content source 200, and content is on inspection transmitted in request content source 200 once more.In addition, content integrity manager 300 report that can not transmit the non-conforming content only sends DRM inter-operation system 500 to.The DRM inter-operation system 500 that receives report can not transmit the non-conforming content to content source 200 reports, and request transmit the non-conforming content once more by transmitting the message that representative can not be distributed to shared permission content source 200.
On the other hand, as the result of checked for integrity, when finding mistake in the non-conforming content, content integrity manager 300 can ask 300 pairs of these non-conforming contents of security system to be recovered.After in response to this request the non-conforming content being recovered, security system 400 can report to restoration result content integrity manager 300.The content integrity manager 300 that receives report can determine whether to transmit the non-conforming content based on whether normally having carried out the recovery of being asked, and will determine that the result reports to DRM inter-operation system 500 or content source 200.That is to say, when having carried out recovery, guaranteed to report normal transmission content by the integrality of determining the non-conforming content when normal.When abnormal execution recovered, then report can not transmit the non-conforming content.
Up to now, described and be used for being input to the technology that territory service is provided in the client device by the non-conforming content that will be included in content source.By the non-conforming content being input in the intended client end equipment in the territory, the user can share and use non-conforming content at the equipment room with same DRM or different DRM, and described non-conforming content stores is in computing machine, mobile phone, CD, BD, HD etc.
After this, will describe another example, in this example, the user buys CD, BD and HD, the non-conforming content that is stored in the light medium is input in the territory, and uses the non-conforming content.In the following embodiment that will describe, given prominence to from buying content and provide the process of service to reproducing content.
Figure 11 illustrates according to another embodiment of the present invention, the example of the method that content is handled.
With reference to Figure 11, at first, the user buys light medium (operation S100) in offline stores 710.For example, the user buys the CD or the BD of expectation in record store.
At this moment, the content stores of user's purchase is in the light medium.Content can be the non-conforming content with non-clean type.Except content, the light medium is also stored: the service regeulations information of the decryption key information that is used for content is decrypted, the copyright that is used for control content, be used to prevent to use the content of illegal contents to cancel tabulation and equipment is cancelled tabulation etc.Herein, decryption key information indication is used for decruption key that the non-conforming content is decrypted or can extracts the module information of decruption key from it.In addition, service regeulations information can be indicated the copyright restrictions information in the content information that is included in content.
The user can present the content that is stored in the light medium of having bought by light media reproducing equipment 730 (for example CD Player or BD player).Can make up light media reproducing equipment 730 with light media drive 732 and main frame 731, this light media drive 732 is used for comprising physically the light medium to drive the light medium, and this main frame 731 comprises application and the operating system (OS) that is used for reproducing the content that is stored in the light medium.When rendering content, can between light media drive 732 and main frame 731, carry out authentication process (operation S110).
Figure 12 is illustrated in the example of carrying out the process of authentication between light medium and the main frame.
As shown in figure 12, main frame 731 is sent to light media drive 732 (operation S112) with the device certificate of main frame 731.The device certificate of main frame 731 can be indicated the unique device certificate that is included in the main frame 731 when making main frame 731.
Light media drive 732 checks whether the device certificate that receives is included in the equipment that is stored in the light medium 800 and cancels within the tabulation.When the device certificate of main frame 731 is not included in equipment and cancels in the tabulation, can transmit acknowledge message, be presented (operation S114) to allow content.Subsequently, main frame 731 can reproduce the content that is stored in the light medium.When reproducing content, can consider to be stored in the service regeulations in the light medium.
Alternatively, when the device certificate that transmits from main frame 731 was included in equipment and cancels the tabulation, light media drive 732 can come the refuse information of rendering content to send main frame 731 to by main frame 731 with not allowing.In this case, do not allow main frame that content is presented.
On the other hand, send client device 740 in the territory in order to be stored in content in the light medium 800, the user can register the equipment that comprises light media drive 732 in the territory, and described equipment is light media reproducing equipment 730.At this moment, domain manager 721 can be included in service provider's the shop, online foreground 720.In the description of reference Fig. 1, described: domain manager 721 can be included in the system of service provider's one side.
Figure 13 illustrates the example with the process of light media reproducing device registration in the territory.
As shown in figure 13, be used for that unique identification is stored in the content ID of content of light medium 800 and the ID that coils that is used for unique identification light medium is stored in light medium 800.When request domain manager 721 registered to light media reproducing equipment 730 in the territory, light media reproducing equipment 730 can and be coiled ID with content ID and offer domain manager.In addition, when making when being used for that light media reproducing equipment 730 registered to the request in territory, light media reproducing equipment 730 offers domain manager 721 with the unique device id and the user profile of light media reproducing equipment.At this moment, light media reproducing equipment 730 can receive user profile from the user.
As mentioned above, light media reproducing equipment 730 with content ID, coil ID, device identifier, user profile etc. and offer domain manager 721, and request domain manager 721 registers to light media reproducing equipment 730 in the territory, and domain manager 721 is the entities (operation S122) that are used for management domain.Subsequently, after registering to light media reproducing equipment 730 in the territory in response to request, domain manager 721 sends acknowledge message to light media reproducing equipment 730 (operation S124).Domain manager 721 in service provider's one side can come the usable range of limiting content (for example, content moving and duplicating) by the information that is provided is provided.
Then, by request domain manager 721 client device 740 is registered to carry out authentication in the territory after, will receive the client device 740 that is stored in the content in the light medium 800 and register in the territory (operation S130).For example, the user can register to client device 740 in the territory, and client device 740 will also use the content that is received by light media reproducing equipment 730 received contents from be registered in the territory.At this moment, when the client device 740 of wanting received content has been registered in the territory, can omit this process (operation S130).
When the light media reproducing equipment 730 that will transmit content was registered in the territory with the client device 740 of wanting received content, content can be shared (operation S140) between the equipment of registration.
Figure 14 is illustrated in the example of the process of the equipment room content shared that registers in the territory.
As shown in figure 14, with encrypted content, coil ID, content ID etc. and directly be sent to client device 740 (operation S142) from the light media reproducing driver 732 of light media reproducing equipment 730.Alternatively, can be with content, coil ID, content ID are sent to light media reproducing equipment 730 from light media reproducing driver 732 storer 733 (operation S144).Can be once more will be stored in content in the storer 733 of light media reproducing equipment 730, coil ID, content ID etc. and be sent to client device 740.Can will send the information stores of client device 740 in the storer 741 of client device 740.
Subsequently, the form that client device 740 usefulness client devices 740 can reproduce comes the content that is stored in the storer 741 is carried out conversion, and reproduces content after the conversion based on the copyright that allows in the permission.Describe detailed process and architecture in the above-described embodiments in detail about this processing.For example, can provide by the shop, online foreground 720 of online service provider or can be used to the information of using content required, such as decruption key value, service regeulations etc. by user input.Optionally, can come use information by the information that reception is stored in the light medium.
In the above embodiment of the present invention, although described content is sent to the example of another client device the territory from the light media reproducing equipment that wherein is inserted with the light medium, but be based on execution environment, the content that is inserted in the light medium in the light media reproducing equipment can be sent to and be included in the software systems in the light media reproducing equipment and be used.In this case, can carry out to the conversion of permission with to the conversion (in same physical equipment) of content according to above process.Just, the equipment of mentioning in the present invention is not limited to physical equipment.Equipment can comprise logical device (for example, software systems).
Although specifically showed the present invention and it be described with reference to one exemplary embodiment, but be to be understood that, under prerequisite without departing from the spirit and scope of the present invention, as claims limited, those skilled in the art can make various changes in form and details.

Claims (28)

1. one kind is carried out the method that interoperability is handled to content, comprising:
From first system's reception sources data;
Described source data is carried out interoperability handle, and generate target data; And
Described target data is sent to second system;
Wherein said first system or described second system comprise at least one in access control system, copy-protection system and the use control system.
2. the method for claim 1, wherein said source data comprise at least one in permission and the content, and described target data comprises and permits and content.
3. method as claimed in claim 2, when described source data comprised described permission, this method also comprised: produce clean content by according to described first system described permission being unpacked.
4. method as claimed in claim 2, when described source data comprised content, this method also comprised:
Described content is carried out safety inspection; And
According to the described second system described content of packing.
5. method by using the DRM inter-operation system to come contents processing, described method comprises:
When content source receives described content, obtain the content information of described content from described content source;
The described content that receives is transformed to the target DRM content that is suitable for described target DRM;
Target DRM content after the described conversion is sent to the destination client, described target DRM content is installed in the client of described destination; And
By using the described content information that obtains to generate shared permission, described shared permission is extractible License Info, is used to use the target DRM content after the described conversion,
Wherein said DRM inter-operation system is not supported the described content that receives from described content source.
6. method as claimed in claim 5, wherein said content source comprises: light media drive, and the main frame that can reproduce described content, this light media drive comprises the light medium of storing described content.
7. method as claimed in claim 6, wherein said smooth medium are also stored and comprised following at least one information: the decruption key of described content, copyright restrictions information and equipment are cancelled tabulation.
8. method as claimed in claim 7 also comprises:
Between described smooth media drive and described main frame, carry out mutual authentication; And
After described mutual authentication, reproduce described content by described main frame,
Wherein, when reproducing, use at least one information that is stored in the described smooth medium when the described mutual authentication of execution with to described content.
9. method as claimed in claim 6 comprises that also the equipment that will comprise described content source registers among the keeper in territory as the territory member.
10. method as claimed in claim 9 also comprises described destination client device is registered among the keeper in territory as the territory member.
11. method as claimed in claim 5 comprises that also the shared permission with described generation offers described destination client device.
12. method as claimed in claim 11 also comprises:
By using described destination client device, the described shared permission that provides is offered the entity that is used to issue the permission that is used for described target DRM, the described entity that is used to issue the permission that is used for described target DRM with request is issued described permission; And
Use described destination client device by the permission of issuing, reproduce described target DRM content by the entity that is used to issue the described permission that is used for described target DRM.
13. method as claimed in claim 5, wherein the described content that receives from described content source is as the clean content of original contents or the non-clean content of encryption or scrambling.
14. method as claimed in claim 13 wherein when described content is described clean content, is transformed to described target DRM content with the described content that receives and comprises:
With the described content transcoding that receives is the content with form that described destination client device can use; And
The content that having behind the described transcoding is suitable for described target DRM form is packed.
15. method as claimed in claim 13 wherein when described content is described non-clean content, is transformed to described target DRM content with the described content that receives and comprises:
By the decruption key that at least one provided in described content source and the outside appointing system the described content that receives is transformed to clean content by using;
With the clean content transcoding after the described conversion is the content with form that described destination client device can use; And
The clean content that having behind the described transcoding is suitable for described target DRM form is packed.
16. method as claimed in claim 5,
Wherein said content information comprises the copyright restrictions information that can limit the copyright of using described content, and
The shared permission of wherein said generation comprises the described copyright restrictions information with predetermined information form.
17. method as claimed in claim 16, wherein said copyright restrictions information comprise about in the information of the permission usable range of described content and the managed Copy Info at least one.
18. method as claimed in claim 5, wherein said content information comprises at least one in following group:
The Administrator Info comprises keeper's address, and described keeper act as described DRM inter-operation system is carried out the generality management;
User profile comprises the information about the user;
Content title information comprises the information about the title of described content;
Content format information comprises the information about the file layout of described content; And
Content indexing comprises the unique identifier information that is used for the described content of index.
19. method as claimed in claim 18 wherein when described content information comprises described content indexing, generates described shared permission and comprises:
Determine whether the described content indexing that comprises is identical with the content indexing of the DRM content of having used in described territory; And
Ask in described user input and the described content source at least one that new content indexing is provided.
20. method as claimed in claim 18,
Wherein said content information comprises described Administrator Info, and described Administrator Info comprises keeper's reference address, and described keeper usually manages described DRM inter-operation system, and
The generation of wherein said shared permission comprises: visit described keeper by using the described Administrator Info in the described content information, to receive at least one in copyright control information, user profile, content title information, content format information and the content indexing.
21. the system of a contents processing comprises:
Register to the client device in the territory, target DRM is installed in the described client device;
Content handler, this content handler receives the content that will be sent to described client device from content source, and from user's input and described content source at least one obtained the content information of described content;
Contents transformer, this contents transformer receives described content, the described content that receives is transformed to the target DRM content that is suitable for described target DRM from described content handler, and described target DRM content is sent to described client device; And
The copyright management device, this copyright management device receives described content information from described content handler, and, can from described shared permission, extract the License Info that is used to use the described target DRM content that has transmitted by using the described content information that receives to generate shared permission.
22. system as claimed in claim 21, wherein said client device receives the described shared permission that has generated, the described shared permission that receives is offered the permit server that is used for described target DRM from described copyright management device, and by using the permission of issuing by the permit server that is used for described target DRM to use the described target DRM content that transmits from described contents transformer.
23. system as claimed in claim 21, wherein said content handler is installed in in the described client device that is registered in the described territory, described content source and another equipment at least one.
24. receiving, system as claimed in claim 21, at least one from described content source and designated external system of wherein said contents transformer be used for decruption key that described content is decrypted, described content is transformed to described target DRM content.
25. the method for a contents processing, described method comprises:
Reception will be sent to the content of DRM inter-operation system from external content source;
The request security system is checked the integrality of the described content that receives; And
Check result based on the integrality of the described content that transmits from described security system determines whether to send described content to described DRM inter-operation system.
26. method as claimed in claim 25 wherein saidly determines whether to transmit described content and comprises:
As the result who transmits from described security system, check the integrality of described content, when in described content, finding mistake, determine described content to be sent to described DRM inter-operation system.
27. method as claimed in claim 21 also comprises: the result as transmitting from described security system, check the integrality of described content, when finding mistake in described content, ask described security system that described content is recovered.
28. the method for a contents processing, described method comprises:
In the territory, described first equipment comprises the light medium that is used for the storage encryption content and is used to reproduce the predetermined information of described encrypted content with first device registration;
With second device registration in described territory;
In described encrypted content and the described predetermined information at least one is sent to described second equipment that is registered in the described territory from described first equipment; And
By using described predetermined information, the described encrypted content that sends described second equipment to is transformed to can be by the content of described second equipment reproduction.
CNA2007800175926A 2006-09-06 2007-09-06 Method and system for processing content Pending CN101443747A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US82470006P 2006-09-06 2006-09-06
US60/824,700 2006-09-06
US60/825,647 2006-09-14
KR1020060133204 2006-12-22

Publications (1)

Publication Number Publication Date
CN101443747A true CN101443747A (en) 2009-05-27

Family

ID=39396429

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007800175926A Pending CN101443747A (en) 2006-09-06 2007-09-06 Method and system for processing content

Country Status (2)

Country Link
KR (3) KR20080022477A (en)
CN (1) CN101443747A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573473B (en) * 2014-12-05 2018-02-02 小米科技有限责任公司 A kind of method and authenticating device for unlocking administration authority

Also Published As

Publication number Publication date
KR20080022475A (en) 2008-03-11
KR20080022477A (en) 2008-03-11
KR20080022491A (en) 2008-03-11

Similar Documents

Publication Publication Date Title
KR100643278B1 (en) Method and Apparatus for managing digital rights of portable storage device
JP5113299B2 (en) DRM providing apparatus, system and method thereof
JP5209862B2 (en) DRM license providing method and system
CN1329909C (en) Secure single drive copy method and apparatus
US6789177B2 (en) Protection of data during transfer
KR100942992B1 (en) Method and apparatus for rights-preserving interoperability in drm
RU2413980C2 (en) Content processing method and system
CN101350819B (en) Information processing apparatus, content providing system, information processing method
CN101951360B (en) Interoperable keychest
WO2006001161A1 (en) Storage medium processing method, storage medium processing apparatus, and program
JP4414321B2 (en) Digital copyright management method and apparatus using portable storage device
CN100364002C (en) Apparatus and method for reading or writing user data
CN101292292A (en) Method for etching and secure distribution of digital data, access device and writer
KR20050096036A (en) Portable storage and management method of files in the portable storage
JP5296195B2 (en) Content data reproduction system and recording apparatus
CN101443747A (en) Method and system for processing content
JP2005149234A (en) Method and system for reproduction and recording of content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090527