CN1934852A - Method and system for selectively providing access to content - Google Patents

Method and system for selectively providing access to content Download PDF

Info

Publication number
CN1934852A
CN1934852A CNA2005800085189A CN200580008518A CN1934852A CN 1934852 A CN1934852 A CN 1934852A CN A2005800085189 A CNA2005800085189 A CN A2005800085189A CN 200580008518 A CN200580008518 A CN 200580008518A CN 1934852 A CN1934852 A CN 1934852A
Authority
CN
China
Prior art keywords
program
key
data
content
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005800085189A
Other languages
Chinese (zh)
Inventor
迈克·亚瑟·德伦伯格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Licensing SAS
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Publication of CN1934852A publication Critical patent/CN1934852A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

A method of operating a digital program playback device, including: receiving, via a first communications network, a data stream including an encrypted data portion representative of a program; identifying, from the received data stream, an identifier associated with the program; transmitting the program identifier and a device identifier associated with the digital program playback device to an authorization device via a second communications network; receiving, via the second communications network, a decryption key in response to the transmission; and, decrypting the data stream using the decryption key and generating an output signal for playback of the program.

Description

Selectivity provides the system and method for access to content
Technical field
The present invention relates to the method and system of a kind of restriction to the visit of the content such as computer program, audio program and audio.
Background technology
Content such as computer program, audio program and audio is very general by the wide dispersion as transmission and/or pre-recorded media (resembling CD and DVD).Yet, prevent the unauthorized access of the higher value content of distributing is confirmed it is in-problem, especially, aloft under the situation of broadcasting and pre-recorded media.Present method is used multiple visit resist technology, for example comprises use, smart card, is contained in can use the key that public keys is decrypted and must key in key with the release computer program in the content.
Typically, Digital Right Management does not combine with copy protection system so that comprehensive solution to be provided.For example, when the copy protection schemes existence was used for closed system (for example, satellite provider), these systems can be effectively in conjunction with Digital Right Management.In addition, digital right management system can not exist effectively and be used for computer program, does not develop effective solution for mobile device yet.In addition, do not exist for the device that certain content provides specific key effectively yet.At last, many systems do not have and guarantee reliably two-way or duplex communication network are conducted interviews, with the device of management Copy Protection process and relevant digital rights.Very expectation overcomes the improved mechanism and the technology of the problems referred to above.
Summary of the invention
The present invention proposes a kind of method of operand word program playback device, described method comprises: receive by first communication network and comprise the enciphered data partial data stream of representing program; The identifier that identification is associated with program from the data flow that is received; By the second communication network, described program identifier and described program actuating equipment associated device identifier are transferred to authorisation device; Respond this transmission, come the receiving and deciphering key by the second communication network; And use decruption key that data stream is deciphered, and generate the output signal of program playback.
Description of drawings
Consider following detailed description in conjunction with the drawings, will help understanding the present invention the preferred embodiment of the present invention, wherein, the part that similar numeral is similar, and:
Fig. 1 shows the structural representation according to the system of the solution of the present invention;
Fig. 2 shows according to the solution of the present invention, is suitable for the structural representation of the system that uses with the computer software content well;
Fig. 3 shows according to the solution of the present invention, is suitable for the structural representation of the system that uses with audio/video content well;
Fig. 4 shows the structural representation of the exemplary replay process that the system with Fig. 3 that is suitable for uses;
Fig. 5 A and 5B show according to the solution of the present invention, can be used for the structural representation of the structure of client devices;
Fig. 6 shows according to the solution of the present invention, solves the pictorial representation of the mechanism of the time delay in the Network Transmission;
Fig. 7 shows the method according to the solution of the present invention.
Embodiment
To understand,, accompanying drawing of the present invention and description be simplified although, removed many other elements in typical Copy Protection and digital right management system and the method for purpose clearly, with explanation with to the relevant element of clear understanding of the present invention.Those skilled in the art will realize that in implementation process of the present invention, expect and/or need other element and/or step.Yet, because well known such element and step, and these elements and step and be unfavorable for understanding the present invention, so going through such element and step is not provided here.
According to the solution of the present invention, can provide: use multiple transmission method, use the centralization mechanism of the communication network such as the two-way paging network, the device of the encrypted content that is distributed to reset as the access decryption key.Described system can combine digital rights management (DRM) and Copy Protection (CP) mechanism; and provide accessing wirelessly to support fixed position and mobile device (for example, desktop PC, laptop computer and set-top box and display device fixing and that move).In addition, employed network can provide " always online " function.
According to the solution of the present invention, typically, system can implement the hardware of content and key server, security module to incorporate in the client devices; And utilize the method for in communication network, handling intrinsic time delay, be used to provide low-cost decruption key device (provision), to help Copy Protection and/or digital rights management scheme.According to the solution of the present invention, in fact because for " bootlegger ", copy comprise content encrypted but that himself lack the medium of necessary decruption key be do not have sharp, so such system and method can be encouraged content copy (copying).
Referring now to Fig. 1, Fig. 1 shows the system 100 according to the solution of the present invention.Usually, system 100 comprises that content server 110, key server 120, content distribute measure 130 (as wireless and/or line transmission system, such as land and satellite television network, computer and be commonly referred to global interconnected and the cable TV and the computer network of the computer network of internet; And the medium allocated channel, such as the retail distribution claim), client devices 140 and communication network 150.
Usually go up establishment, digitlization (if necessary) and memory contents (for example, computer software, audio frequency and/or video frequency program) at content server (110).In exemplary configuration, will be relevant with content so that content is discerned uniquely about the metadata of content.Key server 120 comprises following non-limiting example: the database that comprises the content encryption/decryption decryption key, unique content designator, about what equipment 140 is the information of authorisation device, any equipment is being play or is being write down or having the right and playing or recorded content, and the certain content how many times has been play or write down to each equipment 140.Suppose that content server 110 allows, can use that equipment 140 is carried out, broadcast and/or recorded content.Client computer reproducing device 140 obtained corresponding decruption key safely from key server 120 after, the visit to encrypted content took place.For example, can transmit this permission by network 150.
In the exemplary embodiment, can distribute measure 130, for example,, provide content by broadcasting or medium distribution network by content.For recorded content, permission is searched equipment 140 and can be got in touch key server 120 safely by network 150, can copy body matter (subject content) to determine whether this equipment.For example, can itself discern this body matter by companion's metadata, broadcast channel/temporal information or content.Key server 120 can come contact content server 110 by communication link 115, and with Digital Right Management (DRM) information of determining to be associated with body matter, for example, whether this body matter is play and/or write down to authorization requests equipment 140.If can allow, then key server 120 can pass through network 150, with unique content designator and record secret key safety be back to requesting service 140.Then, requesting service can use the information of being returned by key server 120, and for example, deciphering and/or encryption key write down this body matter.The content that can use such encryption key to encrypt to be write down is to be used for storage.Storage key can be different from and is used in memory contents on the content server 110 and/or the key that the protection content is avoided visiting before obtaining the mandate of key server 120.Alternatively, can store this content with the encrypted form of received content, and safely the store decrypted key so that use afterwards.
Instrument is as non-limiting example, and network 150 can adopt the form of cordless communication network, such as two-way pager network.Can be to encrypting by the communicating by letter of network 150 of pager network for example (for example, between equipment 140 (Fig. 1) and the key server 120 (Fig. 1)).Although be not crucial, for the consideration of cost, two-way pager network can especially be advantageously used at least a portion in the network 150.Expect that such network will provide the cost of low relatively every affairs, provide simultaneously to the wide access on the wide geographic area.Yet such network can be introduced the intrinsic time delay in the communicating by letter between equipment 140 and the key server 120.For example, can experience 1,5 or even 10 minutes and so on time delay.Yet two-way pager network has solved the connectivity problem of the client devices of fixed position, and making does not need telephone modem and other broadband connection.In addition, can use identical system that the connection of mobile client machine equipment is provided.For example, by using network 150 safe keys or key, can ensure that prevention carries out undelegated visit to the communication on the network 150 to coming coded communication.
Referring now to Fig. 2, Fig. 2 shows the system 200 according to the solution of the present invention, and system 200 is suitable for using with the computer software content well.In Fig. 1 and Fig. 2, the similar similar element of reference number sign.System 200 comprises that also program creates system 210, and typically, system 210 comprises a plurality of elements of the hardware/software that is used to create computer-executable code.Then, content can be offered the content server 110 that to encrypt and to store this content.Corresponding keys for encryption/decryption and content designator can be offered key server 120.Can use symmetric key or public/private key right.Program identifier can be expressly, does not promptly encrypt.Can use content to distribute measure 130,, distribute encrypted content as by CD, DVD or broadband network.By network 150, when from key server 120, obtaining corresponding decruption key, can begin computer program at personal computer 140 places.
Still as non-limiting example, key server 120 can create corresponding inlet in one or more databases, database wherein reflected program encryption/decruption key, unique program identifier, what equipment to be information, what equipment of the equipment of authorizing is being carried out content and equipment executed or is being authorized to carry out the certain content how many times about.The present invention has envisioned multiple possible execution mode.In the embodiment that simplifies, query key server again can be installed, carry out or be reset to equipment for each.Alternatively, can in safe processor, provide permanent or time-based digital rights management information.Under these circumstances, key can or be reset effectively for one or more installations, execution, until key expire, permission overtime or that pre-determined number occurs plays.
Because encipheror does not comprise the startup key, so can provide encipheror freely to copy.Can use the content of any kind to distribute measure (for example, with loadings such as DVD, the Internet file) to distribute encrypted content.Only after identical deciphering, the computer that encipheror just takes place is carried out, and deciphering needs PC device 140 by network 150, obtains decruption key from key server 120.
Referring now to Fig. 3, Fig. 3 shows the system 300 according to the present invention program, and system 300 is suitable for using with audio/video content well.In Fig. 1 and Fig. 3, similar reference number still identifies similar element.System 300 comprises that also program creates system 310, and typically, system 310 comprises camera, microphone and is generally used for writing down the hardware/software that the audio/video that resembles recording, film and TV and so on is represented.Can create and digitized audio/video content by using system 310.Can again this content be offered the content server 110 that to encrypt and to store this content.Unique content designator can be associated as metadata with encrypted content, and expressly provide.Corresponding keys for encryption/decryption and content designator can be offered key server 120, and by key server 120 storages.Can use content to distribute measure 130,, distribute encrypted content as by CD, DVD or broadband network.By network 150, when from key server 120, obtaining corresponding decruption key, can reset as reproducing device 140 places that are similar to digital receiver or DVD player.
Still as non-limiting example, key server 120 can create corresponding inlet in one or more databases, database wherein reflected program encryption/decruption key, unique program identifier, about what equipment be the equipment of authorizing information, authorize what equipment to come play-/ record content and equipment to visit or be authorized to the access certain content how many times.Because ciphered program does not comprise the startup key, so can provide ciphered program freely to copy.Can use the content of any kind to distribute measure (for example, broadcast transmitted is with DVD, the Internet file loading etc.) to distribute encrypted content.Only after identical deciphering, the computer copy or the playback of ciphered program take place, deciphering needs PC device 140 by network 150, obtains decruption key from key server 120.
Referring now to Fig. 4, Fig. 4 shows the structural representation of the exemplary replay process 400 that the system 300 with Fig. 3 that is suitable for uses.Reproducing device 140 determines and the content associated content identifier that will play, wherein, for example, by from the medium that comprises clearly textual identifier and encrypted content such as DVD or CD, reading the content that will play.Then, reproducing device 140 can be got in touch key server 120 by network 150, and for example, network 150 can adopt the form of two-way pager network.Key server 120 checking player device 140 and unique program identifiers.Reset if allow, for example, if content still has the broadcast authority, then key server 120 uses network 150 in the mode of safety, corresponding decruption key (as non-limiting example, can be the right corresponding part of symmetric key or key) is sent to reproducing device 140.Reproducing device 140 can use the key of acquisition to decipher the content of playback, and as by with the display device of reproducing device communicative couplings (as by RCA cable or HDMI interface), on display device, generate the output signal 145 that the programme content that is used to decipher is reset.
Referring now to Fig. 5 A, Fig. 5 A shows according to the solution of the present invention, can be used for the schematic diagram of the structure 500A of the client devices such as the equipment 140 of Fig. 1-4.For example, structure 500A can be used to implement all security strategies relevant with the content record of client devices 140, even can be incorporated in the audio/video decoder of equipment.
As non-limiting example, structure 500A can comprise input 510, and input 510 is suitable for distributing reception encrypted content the measure 130 (Fig. 1) from content.For example, input 510 can be adopted the form of audio/video data decoder or buffer, is used for connecting or the media drive receiving data stream from antenna or network.Receive data and can be stored in the memory device 540 such as hard drive, and use read/write interface 530 therefrom to read.Can offer encryptor/decryptor 520 with receiving data.Content key register 550 can be stored key and the content corresponding identifier that is used by encryptor/decryptor 520.Structure 500A can also comprise modulator-demodulator 560, is used for communicating by network 150; And device identifier and network 150 secure key storage 570.The network security key that memory 570 can be stored the device identifier of particular device 140 and be used for network 150.Structure 500A can responsiveness ground handling safety processor 580.Can be from providing A/V or content-data as any suitable source of medium 130 (such as satellite tuner/demodulator, home network or cable TV/demodulator).Receive network 150 communications (for example, radio pager transmission) by modulator-demodulator 560 (as the pager network modulator-demodulator).
Usually, according to the solution of the present invention, do not expect expressly the A/V content stores on equipment 540.Therefore, be desirably in storage usually and encrypt before the A/V content.Can provide corresponding encryption key and unique content ID by key server 120, and use modulator-demodulator 560, send by network 150.Before encryption key was put into memory device 540, encryptor/decryptor 520 can use this encryption key to come encrypted content.
Referring now to Fig. 5 B, Fig. 5 B shows according to the solution of the present invention, can be used for the schematic diagram of the structure 500B of the client devices such as the equipment 140 of Fig. 1-4.In Fig. 5 A and Fig. 5 B, the similar similar element of reference number sign.According to the solution of the present invention, for example, structure 500B can be used to implement all security strategies of being associated with the content playback of client devices 140, even can be incorporated in the audio/video decoder of equipment.In addition, structure 500B comprises A/V decoder 515 and encryptor/decryptor 525, and alternatively, encryptor/decryptor 525 can be identical encryptor/decryptor element 520.Once more, safe processor 580 control checking and key handling.Can use public/private key pair encryption techniques.After having verified equipment 140 and certain content, as to the equipment that is sent to key server 120 and the response of content designator, safe processor 580 (by network 150 and modulator-demodulator 560) receives the content key of encrypting from key server 120.Then, content decryption key can be write (usually, except safe processor 580, register 550 is inaccessibles) in the register 550, and be used to use encryptor/decryptor 525 to decipher related content, to be used to use the content decoding of decoder 515.For example, can from memory 540, recover content and be decrypted.
Referring now to Fig. 6, Fig. 6 shows according to the solution of the present invention, solves the pictorial representation of the mechanism of the time delay in the Network Transmission.As previously mentioned, network 150 can be introduced time delay communicating by letter between equipment 140 and the key server 120.If too many time delay is arranged in the system, then the user can not find the availability of system.In order to hide propagation delay time, before key server 120 and/or content server 110 identification contents are arranged, (for example can allow visit, carry out, play and/or record) such as first few minutes (for example, 5-10 minute) the first of program data stream of audio and so on, and the result is back to equipment 140.Such execution can be corresponding with the limited function of computer program.The time-out feature that such broadcast or record can be used for realizing being associated with digital video recordings machine (DVR) (thereby do not having authority to come under the situation of recorded content, setting is about suspending the restriction of content how long).Can perhaps use the common encryption key that can be stored in a plurality of equipment 140 to encrypt at this record of store program content expressly interim.
As another non-limiting example, before from key server 120, obtaining key, can not encrypt (promptly by making this part, ground expressly) or the key that uses client devices to visit encrypt, allow to carry out, the first 610 of broadcast and/or logging program/programme content 600.Alternatively, according to the time or the program function of computer program content, part 610 can be corresponding with limited function.Under the situation of audio frequency and/or video content, what part 610 can be with all program is a part of corresponding, as first few minutes.After some points 620, use the key that from key server 120, obtains to protect the part 630 of content (for example, encrypting).
Such mechanism can present many advantages.Can encourage third party's content to distribute.In addition, before recorded content, identify content.This has prevented from content is carried out undelegated execution, broadcast and/or record.Digital Right Management (DRM) is incorporated into the center of key server.Key server can be followed the tracks of the allowed authority of each personal server device or device cluster.If particular device or group facility have exceeded admissible execution, broadcast and/or record authority, then key can not sent to the client devices of request.In addition, if the client is provided bill information, then can manage DRM on (rather than on the basis at equipment) on each client's the basis.At last, can carry out classification to content-encrypt by any yardstick grade.For example, each recorded piece of content can have unique encryption key.In order to reduce time delay, can optionally a large amount of keys be stored in the safeguard construction.
Referring now to Fig. 7, Fig. 7 shows the schematic block diagram of representative according to the present invention program's method or handling process 700.Method 700 can be used with the system of Fig. 3 and the processor of Fig. 4 well.For example, similarly method can be used for recorded content, perhaps carries out content.
Method 700 comprises the data flow that receives 710 indication programs by first communication network.In square frame 720, the identifier that identification is associated with program from the data flow that receives.Then, with program identifier with access means associated device identifier, by the second communication Network Transmission to authorisation device (square frame 730).In square frame 740, response transmission 730 is by second communication network receiving and deciphering key.In square frame 750, use the decruption key that receives to come decrypted data stream then, and the output signal of output indication decrypted data stream.
Receiving data stream can comprise the data division of representing program first, and the enciphered data part of representing the program second portion.Usually, first data division can be visited by receiving equipment, and to handle and to be used to export the signal (square frame 760) of indication program first, this reception with the decruption key of program second portion is independent mutually.In the exemplary embodiment, the data division of program first is represented in deciphering.In optional exemplary embodiment, the public keys that can use receiver to visit comes the enciphered data part.Therefore, in square frame 760, as prior to receiving and deciphering key in square frame 740, first data division can be used to export the signal of indication program first.Can use two-way pager network to finish the step of transmission 730 and reception 740.
Be appreciated that the form of the present invention that illustrates only is an exemplary embodiment.Can functions of components be provided with in make different changes; The device of equivalence can substitute those devices that has illustrated and describe; And can under the situation that does not depart from the spirit and scope of the present invention defined in the claim, be independent of further feature and use special characteristic.

Claims (27)

1, a kind of method of operand word program playback device comprises:
By first communication network receive represent program, comprise enciphered data partial data stream;
The identifier that identification is associated with described program from the data flow that is received;
By the second communication network, described program identifier and described digital program playback device associated device identifier are transferred to authorisation device;
Respond described transmission, come the receiving and deciphering key by the second communication network; And
Use described decruption key that described data flow is decrypted, and generate the output signal that is used for described program playback.
2, the method for claim 1 also comprises: receive and represent program to begin the clear data stream of part, and also comprise: before receiving described decruption key, response clear data stream generates the step of output signal.
3, the method for claim 1 also comprises: receive and represent program to begin the public key encrypts data stream of part, and also comprise: before receiving described decruption key, respond public key encrypts data stream, generate the step of output signal.
4, the method for claim 1, wherein described digital playback device comprises mobile subscriber terminal, and described second communication medium comprises two-way pager network.
5, a kind of method that is used to be transmitted in the program of resetting on the digital playback device may further comprise the steps:
Encrypt the data flow of representing program;
The decruption key that will be used for decrypted data stream is stored in key server;
The playback right limit information that will be associated with digital playback device is stored in the database;
Transmit institute's data stream encrypted by first communication network;
By the second communication network, receive the request that described digital playback device is visited described program, described request comprises identifier related with described program and the identifier that is associated with digital playback device;
Response database determines whether described digital playback device has the access rights to described program; And
Respond described determining step, described decruption key is transferred to described digital playback device.
6, method as claimed in claim 5 also comprises by described first communication network, the clear data stream of the beginning part of the described program of transmission representative.
7, method as claimed in claim 5 also comprises by described first communication network, the public key encrypts data stream of the beginning part of the described program of transmission representative.
8, method as claimed in claim 5, wherein, described digital playback device comprises mobile subscriber terminal, and described second communication medium comprises two-way pager network.
9, a kind of method of operand word program recording apparatus comprises:
Come receiving data stream by first communication network, described data flow comprises first data division of the first that represents described program and the enciphered data part of representing the second portion of described program;
The identifier that identification is associated with described program from the data flow that is received;
By the second communication network, described program identifier and described digital program playback device associated device identifier are transferred to authorisation device;
Respond described transmission, come the receiving and deciphering key by described second communication network; And
Use described decruption key that described data flow is decrypted, and generate the output signal that is used to write down described program.
10, method as claimed in claim 9, wherein, the first of described program is the beginning part of described program, and also comprises: before receiving described decruption key, respond the step that described first data division generates output signal.
11, method as claimed in claim 9, wherein, described first data division is unencrypted or uses public-key encryption.
12, method as claimed in claim 9, wherein, described second communication medium comprises two-way pager network.
13, a kind of method of operational computations machine program execution apparatus comprises:
Data are conducted interviews, and described data comprise first data division of the first that represents described program and the enciphered data part of representing the second portion of described program;
The identifier that identification is associated with described program from the data of being visited;
By the second communication network, described program identifier and described program execution apparatus associated device identifier are transferred to authorisation device;
Respond described transmission, come the receiving and deciphering key by described second communication network; And
Use described decruption key to decipher the described enciphered data part of described program, and generate the output that is used to carry out described program.
14, method as claimed in claim 13, wherein, the described output that is used to carry out described program comprises: be used to activate the output with the part of the corresponding described computer program of described second portion.
15, method as claimed in claim 13, wherein, the described first of described program is the function limitation version of described computer program, and also is included in before the described decruption key of reception, response first generates the step of output signal.
16, method as claimed in claim 12, wherein, described first data division is unencrypted or uses public-key encryption.
17, method as claimed in claim 12, wherein, described second communication medium comprises two-way pager network.
18, a kind of computer program is stored on the computer-readable medium and with computing equipment and uses, and described computer program comprises:
First data division is represented the first of described computer program;
The enciphered data part is represented the second portion of described computer program;
Code is used for the program identifier that is associated with described computer program product from the identification of described first data division, and with described computing equipment associated device identifier;
Code is used for described program identifier and device identifier are transferred to authorisation device;
Code is used to respond described transmission, comes the receiving and deciphering key; And
Code is used to use described decruption key to decipher the described enciphered data part of described computer program, and generates the output that is used to carry out described computer program.
19, product as claimed in claim 18, wherein, the described output that is used to carry out described computer program comprises: activate the output with the function of the corresponding described computer program of described second portion.
20, product as claimed in claim 19, wherein, the described first of described computer program represents the function limitation version of described computer program, and also is included in before the described decruption key of reception, responds the step that first data division generates output signal.
21, product as claimed in claim 18, wherein, described first data division is unencrypted or uses public-key encryption.
22, product as claimed in claim 18, wherein, described second communication medium comprises two-way pager network.
23, a kind of method of client devices that optionally provide to the visit of content, described method comprises:
First data division of the first of the described content of visit representative and the enciphered data part of representing the second portion of described content;
The identifier that identification is associated with described content from the data of being visited;
Transfer to authorisation device with described program identifier with described client devices associated device identifier;
Respond described transmission and come the receiving and deciphering key;
Before receiving described decruption key, respond described first data division and generate output signal, so that visit the first of described content; And
Use described decruption key to decipher the encryption section of described data, and respond described decryption portion and generate output signal, for use in the second portion of the described content of visit.
24, method as claimed in claim 23, wherein, described content comprises at least one in representing of computer program, audio representation and audio/video.
25, method as claimed in claim 23, wherein, described provide visit comprise following at least one: computer program product, audio plays are represented, audio plays/representation of video shot, record audio is represented and record audio/representation of video shot.
26, method as claimed in claim 23, wherein, described transmission and reception are by two-way pager network.
27, method as claimed in claim 23, wherein, described first data division is unencrypted or uses public-key encryption.
CNA2005800085189A 2004-03-18 2005-03-17 Method and system for selectively providing access to content Pending CN1934852A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US55422004P 2004-03-18 2004-03-18
US60/554,302 2004-03-18
US60/554,241 2004-03-18
US60/554,220 2004-03-18

Publications (1)

Publication Number Publication Date
CN1934852A true CN1934852A (en) 2007-03-21

Family

ID=37879425

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005800085189A Pending CN1934852A (en) 2004-03-18 2005-03-17 Method and system for selectively providing access to content

Country Status (1)

Country Link
CN (1) CN1934852A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873243A (en) * 2012-12-12 2014-06-18 腾讯科技(北京)有限公司 Method for realizing data security transmission, system, server and terminal
CN104836854A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Business information display method and device
CN111279678A (en) * 2017-11-06 2020-06-12 索尼公司 Display device, camera device, method, and program

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873243A (en) * 2012-12-12 2014-06-18 腾讯科技(北京)有限公司 Method for realizing data security transmission, system, server and terminal
US9811643B2 (en) 2012-12-12 2017-11-07 Tencent Technology (Shenzhen) Company Limited Method, system, server and terminal for implementing secure transmission of data
CN103873243B (en) * 2012-12-12 2018-06-15 腾讯科技(北京)有限公司 Realize method, system, server and the terminal of data security transmission
CN104836854A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Business information display method and device
CN111279678A (en) * 2017-11-06 2020-06-12 索尼公司 Display device, camera device, method, and program

Similar Documents

Publication Publication Date Title
US8234217B2 (en) Method and system for selectively providing access to content
US7260557B2 (en) Method and apparatus for license distribution
CN102118655B (en) System and method for controlled copying and moving of contents
US7400729B2 (en) Secure delivery of encrypted digital content
EP2925007B1 (en) Information processing device and information processing method
US8005758B2 (en) Encryption/decryption method and apparatus for controlling content use based on license information
GB2401965A (en) System for delivering encrypted content
WO2007106844A2 (en) Federated digital rights management scheme including trusted systems
WO2008008621A2 (en) Method and apparatus for securely moving and returning digital content
US9058837B2 (en) Method and apparatus for managing contents
US7987361B2 (en) Method of copying and decrypting encrypted digital data and apparatus therefor
US20100217976A1 (en) Method and apparatus for importing content
US20060045478A1 (en) Method and apparatus for transmitting and receiving protected contents at home
CN1161923C (en) Updating a revocation list to foil an adversary
CN1934852A (en) Method and system for selectively providing access to content
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
US20090175445A1 (en) Electronic Device, Home Network System and Method for Protecting Unauthorized Distribution of Digital Contents
TWI225352B (en) Apparatus and method for preventing digital media piracy
CA2653301A1 (en) Method for protecting content and method for processing information
KR100745280B1 (en) Safe apparatus and method for broadcasting contents
KR100745281B1 (en) Safe apparatus and method for broadcasting contents
JP2008515071A (en) Computer-controlled rights management method for a system with at least two different data processing units
EP1662743A1 (en) Wireless secure device for copy protection and device for rendering copy protected content.
EP2425372B1 (en) Method and apparatus for importing content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070321