EP1046095A1 - Als software-objekt dargestellte inhaltsangabe zum schutz des urheberrechts - Google Patents

Als software-objekt dargestellte inhaltsangabe zum schutz des urheberrechts

Info

Publication number
EP1046095A1
EP1046095A1 EP99957978A EP99957978A EP1046095A1 EP 1046095 A1 EP1046095 A1 EP 1046095A1 EP 99957978 A EP99957978 A EP 99957978A EP 99957978 A EP99957978 A EP 99957978A EP 1046095 A1 EP1046095 A1 EP 1046095A1
Authority
EP
European Patent Office
Prior art keywords
content information
content
procedure
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99957978A
Other languages
English (en)
French (fr)
Inventor
Yevgeniy E. Shteyn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of EP1046095A1 publication Critical patent/EP1046095A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2812Exchanging configuration information on appliance services in a home automation network describing content present in a home automation network, e.g. audio video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/2847Home automation networks characterised by the type of home appliance used
    • H04L2012/2849Audio/video appliances

Definitions

  • the invention relates to a method of providing controlled access to content data, in particular as provided to an end-user of consumer electronics equipment or a multimedia computer.
  • the invention also relates to a method of protecting unauthorized copying of digital data content.
  • content and content data refer to data that contains information for the end-user, e.g., alphanumerical text, graphics, video, audio, multimedia, etc.
  • digital content is usually sent or streamed to the end-user from a remote server using cable or Internet, or is provided on a DND, etc.
  • the content is processed by the receiving device (e.g., a computer, a set-top box ) and rendered to the end user.
  • Content can be copyright-protected using "watermarking”: adding digital modifications that are undetectable by the user, but are recognized by the rendering or verifying software or hardware.
  • Another way to protect the content is encryption.
  • the content data is encoded using special encryption algorithms before sending the data to its destination.
  • the stream is decrypted before rendering or storage.
  • Watermarking for example, is highly sensitive to content modifications. If the digital content is modified by software/hardware, which is not aware of the "watermark", the watermark is not guaranteed to persist in the original form. For example, picture resizing, storing the picture in a different file format, applying compression techniques, etc., affect also the watermark and make it less useful. Encryption methods also provide a number of challenges. As computer/processing hardware and software become more powerful and sophisticated, well-known algorithms get "cracked” and are rendered obsolete. Another challenge is standardization. That is, in order to address the mass market with multiple vendors, a content protection method needs to be standard.
  • the invention provides a method of providing or receiving content information, preferably via a network, as one or more software objects.
  • a procedure is encapsulated in the object for access of the information on a runtime environment. That is, the procedure for accessing the information by the end-user is packaged together with the content information for delivery to the end-user.
  • a software object comprises content data plus a method or procedure to process the data.
  • a method is a programmed procedure that is defined as part of a class and that is included in any object of that class.
  • An object can have more than one method.
  • a method in an object can only have access to the data known to that object, which ensures data integrity among the set of objects in an application.
  • Open distributed software architectures such as HAVi, Java/JINI, Home API based on COM or DCOM technology, CORBA and others allow transfer of software objects over a network (Internet, home network, local area network, wide area network, etc.).
  • HAVi the use of COM technology and OLE Automation objects
  • 09/165,683 (Attorney Docket PHA 23.483), filed 10/2/98 for Yevgeniy Shteyn for "CALLS IDENTIFY SCENARIO FOR CONTROL OF SOFTWARE OBJECTS VIA PROPERTY ROUTES";
  • U.S. Serial No. 09/165,682 (Attorney Docket PHA 23,484), filed 10/2/98 for Yevgeniy Shteyn for "CONTROL PROPERTY IS MAPPED ONTO MODALLY COMPATIBLE GUI ELEMENT " ; and U.S. Serial No.
  • a HAVi DCM can be uploaded to an FAV and executed in a Java run-time environment.
  • the DCM can be programmed to implement API's for the rendering, storing, recording or other processing of graphics, audio, video, text, image, etc.
  • the software object works directly with the rendering machine, without intermediate decryption or modification. All operations are controlled by the object itself and hidden from hostile applications.
  • an object-controlled storage API is invoked (for example: Serialization, see further below). Since the object controls the storage (recording) process, the host system has to recreate the object in order to access stored content and therefore its content is protected.
  • the object can affect the quality of recording, the number of times the content can be recorded or rendered and other interactions with the host system.
  • the software object also can be made time-sensitive. For example, a movie object can be leased, i.e., its rendering API can only be used for a certain amount of time - movie playing time, a day, etc...
  • a controlling object does not have to contain all the content. When the content is very large, the object could just keep the reference(s) to content location and does the retrieval as needed. Where necessary or desirable, a chain of objects could control operations. For example, different movie scenes are controlled by different objects.
  • An object can be set up to provide free (trial) access to certain parts of the content and require payments for other. Conditional interaction with system resources, based on user preferences, can be accomplished. Advertisements and promotions can be inserted as separate objects, depending on the level of user access (e.g., via subscription).
  • An object can wrap up binary code, provided the execution environment of the target client is known or can be detected after object interaction with the device. For example, a better rendering algorithm or a binary upgrade can be delivered to a TriMedia machine running Java VM.
  • the proposed method of data content delivery to an end-user through objects is also highly suitable for other usages than copyright protection.
  • email, teleconferencing (via telephone) or videoconferencing can be based on the exchange of software objects for security reasons.
  • electronic monetary transactions are made secure through the communication of software objects.
  • Electronic mail can be implemented as software objects.
  • Transport of an object over a network is accomplished through, e.g., object serialization.
  • Object serialization in Java supports the encoding of objects, and the objects reachable from them, into a stream of bytes, and it supports the complementary reconstruction of the object graph from the stream.
  • Serialization is used for lightweight persistence and for communication via sockets or Remote Method Invocation (RMI).
  • RMI Remote Method Invocation
  • the default encoding of objects protects private and transient data, and supports the evolution of the classes.
  • a separate digital data stream that can be pirated and replicated by hostile parties does not exist in the traditional sense. All what is being sent is the string of bits and it is not possible to the average person to find a clue about its meaning, since procedures and content information are not recognizable from the stream.
  • a class may implement its own external encoding to increase security and is then solely responsible for the external format (source: http:// www.iavasoft.com/ products /jdk/1.1/ docs/guide/ serialization/ index.html). Accordingly, a decryption procedure can be encapsulated in the object, together with encrypted content data. The decryption procedure is then invoked at the receiving end, possibly complemented with an also encapsulated verification procedure verifying the receiver's ID, decryption key, or serial number of the rendering device, etc.
  • a video conferencing system can provide conventional video streaming and object-encapsulated secure audio and/or graphical data.
  • FIGS.1 -5 are block diagrams of examples of a system wherein the method of the invention is implemented.
  • Fig.l is a block diagram of a HAVi system 100 for implementing the method of the invention.
  • System 100 comprises a storage medium 102 and an FAV (Full AV node) 104 that comprises a digital TV in this example.
  • FAV 104 has a Java Virtual Machine 106.
  • Storage medium 102 comprises, for example, a buffer that stores a software object 108 received electronically from outside system 100, e.g., via the Internet after de-serialization, or a DVD or another physical data-carrier that contains the software object, here a HAVi DCM 108 with content data 110 and play-out procedures, represented by rendering API 112.
  • Software object 108 is uploaded to the rendering process on FAV 104 where rendering API 104 directly interacts with Java VM 106.
  • Conditional access to the content can be based on security or on user/system capabilities.
  • the object allows invocation for play-out or storage through API's dedicated to verification.
  • the run time would have to provide an authorization or an identifier that can be verified by the object.
  • parental control can be implemented by a group of objects representing different parts of a movie content.
  • an electronic book can encapsulate graphical objects with access restriction requirements.
  • Fig.2 is a block diagram of a Jini system 200 which uses a JavaSpaces architecture.
  • JavaSpaces is an architecture for creating a distributed operating system and creating repositories for Java-based objects, as well as Java VM's and Java's Remote Method Invocation (RMI) functionality.
  • JavaSpaces implementations provide a mechanism for storing a group of related objects and retrieving them based on value-matching look-up for specified fields. This allows a JavaSpaces server to be used for storing and retrieving objects on a remote system.
  • the JavaSpaces API uses a specific package to provide basic atomic transactions that group multiple operations across multiple JavaSpaces implementations into a bundle that acts as a single atomic operation.
  • the JavaSpaces architecture supports a transaction mechanism allows multi-operation and/or multi-space updates to complete atomically.
  • the term "atomicity" means that all operations grouped under a transaction occur or none of them does.
  • Jini is a technology, also from Sun Microsystems, for networking of devices.
  • Jini is a Java-based software technology that assists in networking PC's and peripherals.
  • a Jini-enabled device When plugged into a network, a Jini-enabled device will broadcast its presence. Network clients that are ready to use that device can request the necessary software from the device itself, bypassing a server or a network administrator. This architecture builds on top of an existing network.
  • System 200 comprises JavaSpaces servers 202 and 204, and a client 206 connected through a network 208.
  • JavaSpaces server 202 or 204 provides a distributed persistence and object exchange mechanism for objects written in the Java programming language. Objects are written in entries that provide a typed grouping of relevant fields. Clients can perform simple operations on a JavaSpaces server to write new new entries, to look-up existing entries, and remove entries from the space. Using these tools a user can write systems that use flow of data to implement distributed algorithms and let the JavaSpaces system implement persistence for the user.
  • server 202 transfers an object (through Serialization) to client 206. The transfer is a lease as specified by Java's
  • a leased resource or service grant is time-based. When the time for the lease has expired the service ends or the resource is freed.
  • server 202 leases a first object to server 204 for temporary storage and a second object to client 206 for temporary storage or rendering.
  • This configuration is relevant to, for example, a video- (or audio-) on-demand service provider, a multi-player video game provider, etc.
  • a similar client-server architecture can be built using COM/DCOM technology of Microsoft, with a COM client on a Windows operating system.
  • Fig.3 is a diagram of a system 300 with a COM/DCOM server 302 and a COM client 304.
  • Server 302 provides object access and object storage.
  • Client 304 can access server 302 using COM or DCOM mechanisms. For a remote location, DCOM is be used. The access mechanism is transparent to client 304.
  • a COM object is transferred into the process on client 304 and an appropriate API is invoked at client 304 in order to produce desirable content.
  • the object has full access to system resources and API's such as DirectShow components from Microsoft.
  • Fig.4 is a diagram of another configuration of a system 400 in the invention.
  • System 400 comprises a server 402 for providing objects and serving as an object repository.
  • System 400 further comprises clients 404 and 406.
  • System 400 is used for, e.g., multi-client interaction for exchange of content such as in videoconferencing.
  • Content objects are placed in server/repository 402 by client 404 and can be retrieved from repository 402 by client 406.
  • Fig.5 is a diagram of a system 500 that has a similar configuration as system 400.
  • System 500 comprises an object server 502 that serves clients 504, 506, 508 and 510.
  • Server 502 functions as an object repository to enable multi-client object interaction.
  • Content objects are placed in server 502 by any of clients 504-510 and can be retrieved by any of the other clients 504-510.
  • System 500 comprises a relay or replication server 512 to serve clients 514 and 516.
  • a content object can be packaged or can expose interfaces based on preferences or access privileges of clients 504-510 and 514-516.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Automation & Control Theory (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Information Transfer Between Computers (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)
EP99957978A 1998-11-10 1999-11-01 Als software-objekt dargestellte inhaltsangabe zum schutz des urheberrechts Withdrawn EP1046095A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US18953498A 1998-11-10 1998-11-10
US189534 1998-11-10
PCT/EP1999/008333 WO2000028398A1 (en) 1998-11-10 1999-11-01 Content supplied as software objects for copyright protection

Publications (1)

Publication Number Publication Date
EP1046095A1 true EP1046095A1 (de) 2000-10-25

Family

ID=22697749

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99957978A Withdrawn EP1046095A1 (de) 1998-11-10 1999-11-01 Als software-objekt dargestellte inhaltsangabe zum schutz des urheberrechts

Country Status (5)

Country Link
EP (1) EP1046095A1 (de)
JP (1) JP2002529844A (de)
KR (1) KR20010034000A (de)
CN (1) CN1124534C (de)
WO (1) WO2000028398A1 (de)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE518913C2 (sv) * 2000-04-07 2002-12-03 Telia Ab Utlåning av lokal resurs i ett tele- och datakommunikationssystem
JP3788201B2 (ja) * 2000-06-07 2006-06-21 日本電信電話株式会社 情報カプセル管理方法及び情報カプセル管理プログラムを格納した記憶媒体
DE10028349A1 (de) * 2000-06-08 2001-12-20 Siemens Ag Verfahren und Anordnung zur gesicherten Nutzung eines Dienstes
JP2002007325A (ja) * 2000-06-23 2002-01-11 Shinkichi Morimoto デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム
US7958213B1 (en) 2000-09-21 2011-06-07 Siemens Enterprise Communications, Inc. Processing electronic messages
NO316737B1 (no) * 2001-11-08 2004-04-19 Beep Science As Arrangement og fremgangsmate for innholdskontroll av dataobjekter, spesielt dataobjekter i MMS-meldinger
JP4532068B2 (ja) * 2001-12-07 2010-08-25 パナソニック株式会社 コンテンツ配信システムおよび方法
AU2003202815A1 (en) 2002-01-12 2003-07-24 Coretrust, Inc. Method and system for the information protection of digital content
JP3950010B2 (ja) 2002-05-17 2007-07-25 株式会社エヌ・ティ・ティ・ドコモ データ処理装置、プログラムおよび記録媒体
JP4629304B2 (ja) 2002-10-30 2011-02-09 株式会社エヌ・ティ・ティ・ドコモ 通信装置、プログラムおよび記録媒体
KR100724439B1 (ko) * 2005-03-22 2007-06-04 엘지전자 주식회사 콘텐츠 사용권리 보호방법
EP1889164B1 (de) * 2005-06-03 2014-08-13 Warner Bros. Entertainment Inc. System zur sicherstellung, dass alle audiovisuellen optischen datenträgertypen ordnungsgemäss auf wasserzeichen untersucht werden
CN100437612C (zh) * 2005-10-31 2008-11-26 华为技术有限公司 一种保护内容的方法及装置
ES2555852T3 (es) * 2007-12-20 2016-01-11 Koninklijke Philips N.V. Dispositivo y procedimiento para la gestión de derechos digitales

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0028398A1 *

Also Published As

Publication number Publication date
WO2000028398A1 (en) 2000-05-18
CN1292897A (zh) 2001-04-25
CN1124534C (zh) 2003-10-15
JP2002529844A (ja) 2002-09-10
KR20010034000A (ko) 2001-04-25

Similar Documents

Publication Publication Date Title
JP4884978B2 (ja) 安全なマルチメディア転送システム
KR100941385B1 (ko) 조건적 액세스 시스템
CA2539203C (en) Method and system for controlling video media
CA2538831C (en) Preventing unauthorized distribution of media content
EP1625479B1 (de) Verfahren und vorrichtung zum kontrollierten austauschen von medien in einem netzwerk
JP4975962B2 (ja) 回線容量が制約されたネットワーク上の多メディア資産の送出及び動的プレゼンテーション用システム
US8813246B2 (en) Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system
US20020077986A1 (en) Controlling and managing digital assets
WO2000028398A1 (en) Content supplied as software objects for copyright protection
JP2003132173A (ja) 電子メディア・コンテナ
EP1523133B1 (de) System und verfahren zur authentifizierung zwischen geräten, kommunikationsvorrichtung und computer programm
US20080060081A1 (en) State Info in Drm Identifier for Ad Drm
KR100740196B1 (ko) 가정용 네트워크에서 비동기성 데이터를 송신하기 위한 방법
WO2008018310A1 (fr) Dispositif d'exécution d'application, procédé, et programme
EP1410629A1 (de) System und verfahren zum empfangen und speichern eines transportstroms
WO2001022682A2 (en) Method and system for providing real-time streaming services
Park et al. Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments
KR101160263B1 (ko) Dlna 홈 네트워크 및 dlna 홈 네트워크에서의디지털 저작권 처리 방법
Viana et al. iDTV Home Gateway convergence: an open software model integrating the Ginga middleware and the OSGi framework
TWI252663B (en) Method and system for protecting media data
STANDARD Media Device Control—Part 1: Framework (MDCF)

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

17P Request for examination filed

Effective date: 20001120

RBV Designated contracting states (corrected)

Designated state(s): DE FR GB

17Q First examination report despatched

Effective date: 20040611

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20050202