EP1222597A1 - Procedes et dispositifs permettant de stocker, de distribuer et d'acceder a une propriete intellectuelle sous forme numerique - Google Patents

Procedes et dispositifs permettant de stocker, de distribuer et d'acceder a une propriete intellectuelle sous forme numerique

Info

Publication number
EP1222597A1
EP1222597A1 EP01912933A EP01912933A EP1222597A1 EP 1222597 A1 EP1222597 A1 EP 1222597A1 EP 01912933 A EP01912933 A EP 01912933A EP 01912933 A EP01912933 A EP 01912933A EP 1222597 A1 EP1222597 A1 EP 1222597A1
Authority
EP
European Patent Office
Prior art keywords
accordance
user
text
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01912933A
Other languages
German (de)
English (en)
Other versions
EP1222597A4 (fr
Inventor
Michael M. Saigh
Pierre Philip Barrette
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digeo Inc
Original Assignee
Digeo Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digeo Inc filed Critical Digeo Inc
Publication of EP1222597A1 publication Critical patent/EP1222597A1/fr
Publication of EP1222597A4 publication Critical patent/EP1222597A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72442User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for playing music files

Definitions

  • the present invention relates to methods and apparatus for the secure consolidated electronic storage and distribution of Intellectual Property in digital form and more particularly to methods and apparatus for electronically storing and transmitting information in consolidated, digital form to and from centralized storage facilities and users.
  • IP Internet Protocol
  • networks for dissemination of IP lack a uniform distribution system.
  • digital security i.e., prevention of piracy or illegal copying of IP
  • media such as books, video, software, and multi-media.
  • network distribution systems competing with each other to provide IP with little or no compatibility between the systems as seen from the standpoint of users, publishers (i.e., content providers), or the IP itself.
  • Each entity has its own web-site, data center, and encryption algorithm. Uniformity is lacking because many different publishers, studios, and intellectual property owners have their own information retrieval service.
  • Present methods and systems available for electronically distributing IP are not believed to provide a sufficient level of security against unauthorized use and copying to be acceptable vehicles for the commercial distribution of IP.
  • Fig. 1 illustrates one embodiment of the present information distribution system architecture
  • Fig. 3 is a block diagram illustration of a point of purchase delivery system
  • Fig. 5 A is an alternative IP Bank embodiment
  • Fig. 5B is yet another alternative IP Bank embodiment
  • Fig. 6 is a block diagram illustration of the IP Bank circuitry
  • Fig. 12 is a flow chart illustrating the encryption process implemented in accordance with the present invention.
  • Fig. 15 is a more detailed block diagram of the user device shown in Fig. 14.
  • Fig. 16 is a block diagram of the user device shown in Fig. 15 to which an external authentication device is attached.
  • an 5 IP bank is a device located proximate to a user's computer or a computer board located within the user's computer and which is electronically connected to the user's computer via a suitable network connection, and which is also connectable to a central information storage facility using a suitable network.
  • each IP bank contains a high capacity, local memory
  • IP includes all different types of 20 intellectual property that is capable of being electronically stored in digital form.
  • IP includes traditional printed text works, movies, films, video presentations, television programming, music, audio works or presentations, radio programming, graphic material, art works, plays, operas, novels, writings, photographs, pictures, images, advertising copy, computer games, video games, computer software, any 25. portion of combination of the above, and/or other types of intellectual property.
  • a "IP” that is a musical recording includes “text” that is audio, or more specifically, music. Extending the analogy further, it is easily understood that one “reads” the “text” of the musical recording “IP” by playing the music via a system that converts the digitally encoded audio into sound.
  • Some types of “IP's” may include more than one type of "text,” for example, digital representations of printed text, music, and pictures. All uses herein of the terms “IP” and “text” are intended to be generalized in a similar manner, unless it is explicitly stated that such use is intended to refer only to printed text or natural language text, or the context is such that the term “text” is obviously limited thereto.
  • a cartridge includes a unique identification number and a predetermined amount of memory for storing the selected information.
  • a copy of the algorithms and formula necessary to decrypt each of the acquired encrypted data files is stored in read-only form on the user's storage medium. Storage space for this read-only copy is designed so that any attempt to access the data stored thereon other than using an unaltered CSS program renders the data stored thereon unreadable.
  • a unique electronically-generated electronic number is assigned to the storage medium at the time of initial registration with the system, and that assigned number is used in developing the applicable encryption and decryption formulae and algorithms.
  • the unique electronically- generated number is a number that is randomly generated by the system and checked for uniqueness.
  • a similar mechanism is used, in one embodiment, for ordering natural language texts (e.g., an "ebook"), software games, video and movies.
  • Asynchronous transfer refers to the downloading of IP from one or more than one database using the wireless mobile device.
  • the actual transfer of data takes place and is stored in a customer's SEC (security encryption compression) device.
  • SEC security encryption compression
  • a user could utilize the IP at his or her discretion as opposed to real-time usage with a data stream transfer.
  • multiple databases and portals with transparent links can be used and accessed with the mobile wireless device. It is immaterial to the practice of this embodiment of the present invention whether access is through mobile wireless or cable, fiber optics, telephone access to an Internet portal or database.
  • the same end-to-end security as described in this invention for IP is consistent with the invention.
  • the same dynamic encryption and mechanical and/or technical means exists throughout the data transfer distribution cycle.
  • the user i.e., customer
  • SEC unit contains data and rules linked to data governed by the "smart" storage device.
  • the smart storage device determines the time of autoerasure, watermarking, level of security from the highest strata to a more open system and other rules directly linked to that data or piece of the IP data. The rules can apply as minutely as a note, word or bit, etc.
  • Synchronous data transfer refers to a continuous stream of IP data to the mobile cellular device.
  • the same rules for the IP exist in real time and the wireless connection must be maintained throughout its transfer.
  • a combination of synchronous and asynchronous transfer could exist within the database and multipurpose consumer device.
  • a single purpose device for example, one providing mobile wireless access to an internet music data portal without other functional abilities is also within the scope of the present invention.
  • the wireless device can also be linked to other devices synchronously or asynchronously. For example, data transferred on the mobile wireless device after downloading a music IP could be transferred to a car or home stereo system, when music (audio) is played.
  • Various transfer mechanisms can be used for the transfer of music or other IP.
  • rules formulated by content providers are matched with technological capabilities.
  • the rules applied toward a certain content will constantly adjust in accordance to market demands, functionality and use of content as well as with technological advancement.
  • the rules relative to a DOI, text, audio, visual, or content form will be tied to the content in a secured manner.
  • Digital content rules will be assigned with digital security to each and all content in any form (text, music, video, software, multimedia.) Such rules will be established by content owners and providers and will not be alterable or capable of manipulation by digital content users.
  • Embodiments of the present invention develop systems integration and an active digital distribution database that apply security access rules if needed, and then redistribute the information to business users, household users, and/or organizational users.
  • Customization, business users, household consumers, etc. can, if content providers allow via rules applied to the content, customize their content. This customization of content can extend to any form of digital intellectual property and polarity.
  • customers or content providers and integrators can add music to text material, animation, software, pictures, video, or multimedia.
  • Advertising and promotions can be used to supplement supplier's income from IP and/or reduce the cost to customers. Content owners will decide, as will customers, to what extent advertisement will be embedded or linked to content, and thus, how much income will be supplemented and/or cost reduced.
  • Each central data center 100 acts in conjunction with any others present in the network to store and control delivery of IP. Additional data centers 100 each comprising one or more computers acting in conjunction with each other are provided.
  • a central information bank 100 is a central "library,” or storage location, for information.
  • Peripheral information banks 102A-F, coupled to central information bank 100, are libraries, or storage locations, for community oriented info ⁇ nation. For example, the information stored in central information bank 100 accessed most often from the San Francisco bay area peripheral information bank 102A may not be accessed often from the peripheral information bank for Rome, Italy 102E.
  • central information bank 100 is coupled to each peripheral information bank 102A-F to enable sharing of information.
  • each peripheral information bank 102A-F is coupled to one or more point-of-sale sites.
  • a central transactional database 104 coupled to the central information bank 100 and the peripheral information banks 102A-F, serves a central record keeping function for central information bank 100 and peripheral information banks
  • Central information bank 100 and central transactional database 104 preferably, are commercially available main frame computers, such as an IBM main frame computer.
  • the particular main frame model selected depends on the amount of information to be centrally stored in the network, the extent of record keeping functions to be performed, and the speed at which transfer and processing of information is to occur.
  • the present invention is not limited to any one particular computer to serve as the central information bank and/or the central transactional database.
  • FIG. 2 illustrates the flow of information in accordance with the embodiment of the system architecture illustrated in Figure 1.
  • peripheral memory storage unit 106A is consolidated into central information bank 100
  • peripheral transactional database 106B is consolidated into central transactional database 104. It should be understood, of course, that communication links between the peripheral information bank 102F and central information bank 100 and central transactional database 104 are provided.
  • a publisher will receive inventory reports from the central information bank 100 and sales data from central transactional database 104. Based on this and other information the publisher can determine whether to place additional information on the network. For ease of reference such information is sometimes referred to herein as "information titles" as shown in block 204. If the information is not present in an electronic format, then the information is digitized 206, disposed in an electronic format 208 and then undergoes electronic authoring 210. The digitized information is then transmitted to a data converter 212 for converting the digitized information into a uniform format.
  • the data undergoes an initial encryption and compression to both reduce the amount of storage space required to store the data and to make the data ready for being transmitted with less risk of unauthorized use while being transmitted through a communications network.
  • the compression is accomplished through the use of one of the commercially available compression protocols.
  • the initial encryption is performed using one of the standard available encryption protocols as discussed below in Section D.
  • the cartridge also contains programming (CCS) that regulates access and use of encrypted data files, decrypted an encrypted file when selected for opening, controls the operation of the user's computer when a decrypted version of an encrypted file is being accessed, and removes all trace of any decrypted version of an encrypted file from the . user's hard drive or RAM when being closed.
  • CCS programming
  • RAM may include or consist of DRAM, SDRAM, and/or VRAM).
  • the user determines, within the defined limits, or authorized purposes, the portion of the text (natural language text or other IP) to be produced as a hard copy by using the high lighting features of the reader programming to make a selection.
  • the content provider can allow the user to select the applicable use and access instructions from a variety of authorized choices with the selection being made at the time of acquisition. The cost of acquisition to be paid by a user will vary based upon the user choices regarding desired use.
  • rules can be updated or adjusted by a content provider.
  • Cashier stations 308A-D are in serial, linear networking connections which allows the addition and removal of a number of cashier stations at any time.
  • Customer service terminal 306 has local processing capability that provides customer services such as personal identification initiation, personal identification number changes, processing of complimentary IP, IP refunds, customer information entries and updates.
  • the customer services terminal 306 can also provide the retail outlet with internal administration and the management functions, such as the IP inventory cards management, the IP list management, IP requests, IP reports, financial reports, and e-mail and Bulletin Board management.
  • server 304 includes one or more central processing units (CPUs) 316, a primary power supply 318, an uninterrupted power supply 320 to assure continuous operation during power failure, and a high density storage 322 that holds all the programs and the databases required for server 304 operation.
  • CPUs central processing units
  • primary power supply 318 a primary power supply 318
  • uninterrupted power supply 320 to assure continuous operation during power failure
  • high density storage 322 that holds all the programs and the databases required for server 304 operation.
  • Customer service station interface 328 provides for communication between server 304 and customer service terminals 306A-D to handle customer service transactions. Customer service terminals 306A-D are illustrated as being coupled through a data switch 332 to a printer 334. Cashier station interface 330 provides that cashier stations 308A-D can communicate with server 304.
  • IP Bank 302 is a special board configuration located within the user's computer or a separate device electronically linked to the user's computer by a cable, a phone line, a wireless connection (infrared, microwave or otherwise) or any other suitable means.
  • IP Bank 302 is configured in such a manner that any attempt to read the data contained thereon other than as authorized renders the data totally unreadable.
  • IP Bank 302 in this embodiment, is connected to the central information storage facility 100 or another JP Bank 302 using a secure network.
  • IP Bank 302 also functions as a controller of the user's computer when being used to access encrypted files or the secure network.
  • CPU 350 also is coupled to an automatic teller machine (ATM) module 352 to allow transactions with ATM cards.
  • ATM automatic teller machine
  • CPU 350 is coupled to a media driver 354 which enables users to insert personalized media for acknowledgment or other functions as hereinafter discussed.
  • JJP Bank 302 also includes a primary local storage device 356 provided for the storage of all information masters selected for loading into JP Bank 302 and related index information.
  • a secondary storage device 358 is provided to hold other programs, instructions and transaction related information.
  • a buffer memory 360 is utilized to speed up downloading in order to accommodate high volume users during the peak seasons.
  • a printer 362 is provided to print coupons on demand, receipts and various reports for the users.
  • a power supply 364 provides power to printer 362.
  • An uninterrupted power supply 366 coupled to primary power supply 364 assures continuous operation even during power down time.
  • a user may select portions of selected information to combine and download.
  • the user may select at least one IP and select at least one portion of each selected IP. If more than one portion is selected, where each portion includes up to the entire selected IP, the portions are combined and downloaded to user's cartridge 374.
  • a student may be required to download specific chapters from ten different IP. After selecting the ten IP and ten specific chapters of the selected P, the selected info ⁇ nation is combined, encrypted using the determined level of protection, and downloaded to the students cartridge 374.
  • a user may select individual tracks from music information to combine and download the selected tracks to a single cartridge 374 for playback at a later time.
  • IP Bank 302 also uses the user's request to generate a shopping list with appropriate price information, which the user may accept as generated or change.
  • the menu requests payment info ⁇ nation.
  • payment is via pre- generated credit voucher or via credit or debit cards.
  • IP Bank 302 causes copies of the requested titles to be generated, encrypted, and downloaded on to the user's storage medium.
  • IP Bank 302 examines the appropriate log files to determine whether there has been any misuse or unauthorized activities. If such a determination is made, the account is flagged for further investigation.
  • the automatic erasure program could be created as an operating system module or as a separate executable program designed to be "terminate and stay resident" (TSR).
  • TSR stay resident
  • a module integral with the operating system is preferred since such a structure ensures that if the operating system is viable, the automatic erasure module is viable.
  • Typical examples for the point of rental site are libraries (commercial, education or public access) and IP rental shops.
  • the information downloaded by the user may be free of charge to the users such as in the case of a library, or may incur certain rental fees at a predetermined rate, such as in the case of -a rental shop or library charging on a per page use basis.
  • Any given point of rental site may operate as a traditional library in allowing free use to library members for a limited period of time or may operate as a rental shop where fees are collected from users in accordance with the period of use allowed.
  • a JP Bank subsystem couples to an IP Bank and host fileserver as described in more detail below.
  • the central element of the subsystem is an IP Bank which is a modified version of the point-of-purchase IP Bank 302.
  • the subsystem is specifically configured for the collective use by members or the staff of a commercial or business entity or a corporation. It delivers and it recalls information titles among authorized users within the business or corporate entity, and provides the capability of limiting the number of copies of a given work that may be distributed to other authorized users. If all of the licensed copies of any information titles have been checked out by the staff of an organization, then no other users may access the same information title within that particular subsystem until one or more of the licensed copies of the particular information is uploaded or recalled to the subsystem or additional copies are purchased.
  • the promotional and the commercial information flow is very similar to the information flow within the point-of-sale delivery system.
  • the information • sources are local businesses, national or regional advertisers, and appropriate sponsors through advertising agents and other entities.
  • decoding an encrypted phrase is simply a reversal of the process applying each of the tables in reverse.
  • the unique dynamic encryption and decryption algorithms and formulae are generated using a unique combination of the personal signature (identification number) of the user, the serial (registration) of the storage medium and the registration number associated with the master data file being copied and encrypted using commercially available encryption programming or services.
  • the electronic copies of the encryption and decryption formulae so generated are then stored at the central information storage facility for later use.
  • a unique set of encryption and decryption algorithms or formulae are so created for each separate copy of IP file requested.
  • a copy of the unique decryption algorithm and formula is stored on nonvolatile memory on the cartridge (user storage medium) for later use.
  • the nonvolatile memory on the cartridge (user storage medium) is so encased and configured that any attempt to read data stored thereon in an unauthorized manner will cause the memory to become totally unreadable and unusable.
  • the unique encryption algorithm and formula so created are used to dynamically encrypt the selected IP file as the file is being copied and downloaded to the user cartridge (user storage medium) for storage and later use.
  • a unique electronic header file is created for association with the encrypted copy of the requested IP file.
  • the header file contains the user registration information, the rules and restrictions on use of the encrypted requested IP file and the electronic address for finding the appropriate decryption algorithm and formula and the location of the applicable CCS for decryption and use of the data within the encrypted IP file.
  • access to the information ⁇ is monitored, or recorded, to determine attempted unauthorized access to the information. If an unauthorized access is recorded, or stored, onto a user's medium, for example cartridge 374, the next time that user attempts to download additional information to cartridge 374, an unauthorized access message may be transmitted to notify the appropriate party, for example the cashier. As a result of the unauthorized access message, the cashier may revoke user's cartridge 374, notify the proper authorities, or record an entry into the user's account for future action. More specifically and in one embodiment, the unauthorized access is determined by first reading, or recording, the specific identification data from the information requester, or receiver. If the data provided by the information receiver is determined to not match, i.e., is unequal, predefined values, the unauthorized access message is recorded and information exchange is prevented. The data determination may be completed using known comparison hardware and/or software functions.
  • the unauthorized access message may be generated if a user having an incorrect purpose, or authorization code, attempts to access unauthorized information. For example, in a corporate environment, if a user attempted to access information for which the user did not have the proper authorization code, an unauthorized access message is generated and may be sent to, for example a system administrator or a security official. Different level of unauthorized access messages may also be generated. For example, a high level message may be generated if a user attempts to decrypt the information stored in various locations within the system, for example IP Bank 302 using an unauthorized device. A lower level message may be generated if a remote user has attempted to access data that is one level above that user's authorized level.
  • Device 660 is configured to transfer the stored information to the selected playback device, i.e., Video Cassette Recorder (VCR) 600, stereo system 610, cassette recorder/player 620, CD or DVD-X player/recorder 630, television 640, or computer 650.
  • VCR Video Cassette Recorder
  • the remote user downloads, or receives, the entire contents of a top ten music album.
  • the contents of the album are stored in device 660.
  • the information may be permanently stored or may be stored for a fixed period of time or number of uses.
  • the remote user may transfer the information to stereo system 610 for listening.
  • the information may be transferred to, or through, device 660 to one of the other components, i.e., cassette recorder 620,
  • VCR 610, CD or DVD-X recorder '630, or computer 650 may be playback using only those components, i.e., cassette recorder 620, VCR 610, CD recorder 630, or computer 650, coupled to device 660.
  • the remote user may download a feature movie by saving the movie on a tape using VCR 610. The remote user may then playback the movie as authorized as long as the tape is playback in VCR 610 that is coupled to device 660.
  • the remote user may download a software program so that the information is stored in device 660 or in a storage medium in computer 650.
  • the program may be configured to execute only from computer 650 when computer 650 is coupled to device 660.
  • IP Bank 302 may include information representing a reference dictionary and a top ten music album. Info ⁇ nation from the reference dictionary and the album may have the same or different levels of encryption.
  • students from a determined class may access the reference dictionary information without charge as the result of the school purchasing an unlimited use copy of the information, however, those same students would be required to purchase any information downloaded from the album.
  • the type of access may differ for different portions of the information.
  • a first track of the album information may be coded so that anyone may download the information without charge, however, the remaining tracks of the album information may be coded to require payment to download.
  • the present invention relates to a storage and retrieval system that is vendor, product, and IP independent.
  • This embodiment provides an object-based system that packages any type of data on a network. The type of data in the package is immaterial to this embodiment. However, accurate, timely, and secure delivery is ensured by the facilities provided by this embodiment of the present invention.
  • Each separate EP is stored in digital form, and a consistent interface is used for its delivery.
  • Various levels of standardized encryption are available. EP so encrypted is distributed and read in a uniform manner.
  • One of the facilities provided is one or more central data centers or central data storage facilities 100.
  • Each central data center 100 acts in conjunction with any others present in the network to store and control delivery of IP from EP content providers 707.
  • additional data centers 702 are provided, each comprising one or more computers acting in conjunction with each other.
  • Computers 704 need not be in the same location.
  • Each data center 702 either services one or more local clients 706 or acts as part of central data center 100.
  • Kiosks 708 are examples of interfaces or access ports by which consumers have access to central data center 100 and by which they acquire desired
  • a security encryption compression (SEC) module 710 is provided in each consumer product or user device 712 to control access to, and use of IP's. To obtain an IP, a consumer must have a registered SEC module 710 and an authentication password that is recognized by kiosk 708. In addition, the consumer must have a data storage medium 714 to hold a requested EP after downloading. SEC module 710 will securely store the EP for use in an appropriate manner.
  • SEC module 710 in one embodiment, provides its own user interface (for example, a screen and/or speakers, etc.). In another embodiment, SEC module 710 provides one or more external adapters 716 A, 716B, to provide a signal for display by one or more other user devices 712A, 712B, 712C, 712D. External devices 712A, 712B, 712C, 712D, communicate with SEC module 710 through, for example, infrared ports, RCA plugs, headphone jacks.
  • SEC module 710 provides security through an "onion” approach, i.e., one that is made up of multiple protection layers that surround the IP.
  • a first such layer is a hardware layer.
  • SEC 710 comprises, in one embodiment, a chipset having a unique serial number, nonvolatile random access memory (NV-RAM) 718, read-only memory (ROM) 720, and a programmable logic controller/processor 722 with electrically erasable programmable read only memory (EEPROM) 724.
  • the unique serial number provides part of a public/private encryption key along with a user's access code stored in NV-RAM 718 and the EP being accessed.
  • this control is monitored as well as modified each time SEC module 710 communicates with the network.
  • a third layer of security is in the EP itself. It is encrypted and compressed while downloading to storage medium 714 in an SEC module 710.
  • SEC 710 in one embodiment, is an integrated storage device, with at least one of a hard disk, a RAM disk, an NV-RAM card (e.g., a compact flash memory card) or other storage medium as medium 714.
  • One or more interfaces 716 A, 716B, 716C, 716D are provided between the integrated storage device 714 and one or more output devices 712 A, 712B, 712C, 712D.
  • SEC 710 is designed to permit storage device manufacturers to incorporate the chipset into their storage devices, so that the storage devices can accept EP from the network.
  • Encryption ensures protection for IP by allowing downloaded IP to be read only on a particular SEC 710, and only by a user knowing a particular password.
  • This limitation is provided, for example, utilizing a decryption formula provided by a key generation company 732 such as Verisign, Inc.
  • the key generation company creates a formula that enables a decryption key to reverse the encryption 728 provided the network.
  • This formula is sent during registration of an SEC module 710 and burned into NVRAM 718 or other limited access memory in one embodiment.
  • the formula is preprogrammed into SEC module 710.
  • the formula is stored in an encrypted form and decrypted by SEC 710 hardware only while it is being used.
  • the same formula is used by the network to encrypt EP at the central data center and by SEC 710 to decrypt the encrypted EP, using different keys determined by key generation company 732.
  • modern algorithms and appropriate key lengths are used to protect the IP when an IP file is initially created, during its distribution, and throughout its existence.
  • system programming regularly and automatically updates and changes encryption and decryption code algorithms, keys, and formulae both to recapture IP for which such protection has been broken or compromised and to inhibit the cracking or compromising of EP protection.
  • the frequency and/or number of times that algorithms, keys, and/or formulae are changed depends, in one embodiment, on one or more factors such as the length of time a user has rights to an IP, a level of security that is assigned to the IP, and a preassigned schedule that is based upon the level of security assigned to the IP.
  • Key generation facility 732 independent of the network operator to generate keys is not necessary, but may be preferred by owners of EP who believe that extra security and accountability is provided by such companies. It is not necessary to employ the services of a key generation company, however. Thus, in one embodiment of the present invention, key generation facilities are provided within the network itself.
  • the one or more centralized repositories 100 are locally based, regionally _based or centrally based. Each central repository tracks IP data and credits sales 740, 742 to retailer sites. Key locking is provided so that individual retailers have access to their own sales tracking information at the central depository, irrespective of whether sales transfers occu ⁇ ed via Internet, microwave, infrared, satellite, cable, telephone, or other medium.
  • One embodiment of the present invention is linked to various web sites 736 in a manner transparent to consumers.
  • an earmarked transactional fee is tracked, accounted for, and distributed to that particular entity through a universal tracking system 740, 742.
  • the central information storage facility is a grouping of separate servers or storage facilities at one or more physical locations that are physically operated by one or more persons and that are linked together via a network arrangement and by appropriate software such that they appear to the user to be a single functioning storage facility.
  • IP's and/or links to IP's are obtained from content providers 707.
  • a format conversion 1001 is performed. Format conversion 1001 includes "system encryption," so that the IP is unreadable on other systems.
  • personalized encryption 1002 is applied, followed by dynamic encryption 1003 as the IP is transmitted over a network 804.
  • Encryptions 1002 and 1003 are configured so that they can be performed at essentially the same time, even though a temporary storage 802 is shown between them.
  • format conversion 1001 is triggered by a user request.
  • one or more embodiments of the present invention provide one or more EP consolidation features such as overall "mothership" IP encryption, open web selection and browser access, user screening ED and control, transfer verification, transaction purchase, attachment of secure rales, functionality and user allowances, auditing, and feedback and updating. While the present invention has been described with respect to specific embodiments, many modifications, variations, substitutions, and equivalents will be apparent to those skilled in the art. Accordingly, the invention is to be considered as limited only by the spirit and scope of the appended claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

Dans un mode de réalisation, la présente invention concerne un appareil permettant de faciliter l'obtention d'un texte d'une propriété intellectuelle. Cet appareil comprend un dispositif (116A) de stockage dans lequel est stocké le texte d'une pluralité de propriétés intellectuelles. Ce texte comprend des représentations stockées de travaux de texte imprimé, de représentations cinématographiques, de films, de présentations vidéo, de programmations de télévision, de musique, de travaux audio, de présentations audio, de programmes radio, de graphiques, de travaux artistiques, de pièces de théâtre, d'opéras, de nouvelles, d'écrits, de photographies, d'images (comprenant des images électroniques de tous types, notamment des images virtuelles), des originaux de publicité, ou des logiciels, ou encore des parties et des combinaisons de ces éléments. Cet appareil comprend aussi un processeur (118A) connecté à ce dispositif de stockage (116A). Ce dispositif de stockage (116A) stocke par ailleurs un programme destiné à commander le processeur de façon à: recevoir une demande de sélection de propriété intellectuelle, recevoir l'identification d'un utilisateur associé à cette demande de sélection de propriété intellectuelle, et produire en sortie le texte crypté de la propriété intellectuelle sélectionnées si l'identification de l'utilisateur et si la sélection de propriété intellectuelle est valable, ce texte utilisant un niveau déterminé de cryptage de propriété intellectuelle.
EP01912933A 2000-02-23 2001-02-22 Procedes et dispositifs permettant de stocker, de distribuer et d'acceder a une propriete intellectuelle sous forme numerique Withdrawn EP1222597A4 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US51153700A 2000-02-23 2000-02-23
US511537 2000-02-23
PCT/US2001/005706 WO2001063528A1 (fr) 2000-02-23 2001-02-22 Procedes et dispositifs permettant de stocker, de distribuer et d'acceder a une propriete intellectuelle sous forme numerique

Publications (2)

Publication Number Publication Date
EP1222597A1 true EP1222597A1 (fr) 2002-07-17
EP1222597A4 EP1222597A4 (fr) 2009-03-25

Family

ID=24035314

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01912933A Withdrawn EP1222597A4 (fr) 2000-02-23 2001-02-22 Procedes et dispositifs permettant de stocker, de distribuer et d'acceder a une propriete intellectuelle sous forme numerique

Country Status (7)

Country Link
EP (1) EP1222597A4 (fr)
JP (1) JP2003524264A (fr)
CN (1) CN1366647A (fr)
AU (1) AU4166601A (fr)
CA (1) CA2370083A1 (fr)
MX (1) MXPA01010765A (fr)
WO (1) WO2001063528A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660704A (zh) * 2015-03-06 2015-05-27 四川智羽软件有限公司 一种网站用户数据处理方法
CN104660705A (zh) * 2015-03-06 2015-05-27 四川智羽软件有限公司 一种网站数据库后台处理方法
CN109325007A (zh) * 2018-10-16 2019-02-12 上海星佑网络科技有限公司 记录锁定方法和装置及计算机可读存储介质
RU2797759C1 (ru) * 2022-11-21 2023-06-08 Общество с ограниченной ответственностью "ПЕРВАЯ СВОБОДНАЯ ПЛАТФОРМА ЛЕГАЛЬНОЙ МУЗЫКИ" Способ обработки аудиоконтента и система для его осуществления

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08263438A (ja) 1994-11-23 1996-10-11 Xerox Corp ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法
WO2001006691A2 (fr) 1999-07-16 2001-01-25 Marathon Entertainment, Inc. Communications securisees entre parties non securisees
US6871140B1 (en) 2000-02-25 2005-03-22 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
US7076452B2 (en) 2000-10-23 2006-07-11 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
US7640204B2 (en) 2000-10-23 2009-12-29 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
US7487114B2 (en) 2000-10-23 2009-02-03 Costar Group, Inc. System and method for associating aerial images, map features, and information
US7174301B2 (en) 2000-10-23 2007-02-06 Costar Group, Inc. System and method for accessing geographic-based data
EP1386262A4 (fr) * 2001-03-29 2007-12-19 Schwegman Lundberg Woessner & Systeme de gestion des depots de marques et de brevets fonde sur l'internet
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US6876984B2 (en) 2001-05-31 2005-04-05 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US6895503B2 (en) 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
US20040230663A1 (en) * 2003-05-02 2004-11-18 Icu Software, Inc. Sharing photos electronically
US7482526B2 (en) * 2004-01-06 2009-01-27 Yamaha Corporation Technique for supplying unique ID to electronic musical apparatus
JP4453393B2 (ja) * 2004-02-26 2010-04-21 ヤマハ株式会社 音楽コンテンツを再生し得る電子音楽装置及びそのプログラム
US20050240535A1 (en) * 2004-04-23 2005-10-27 John Grooms Web-based data content distribution system
US20070294172A1 (en) * 2006-05-23 2007-12-20 Microplex Cinemas, Llc Coalescence of compartmental entertainment units for intellectual property screening
CN101917683A (zh) * 2010-08-27 2010-12-15 深圳市五巨科技有限公司 一种通过移动终端实现艺术签名的方法和装置
CN103440463A (zh) * 2013-09-17 2013-12-11 上海颐东网络信息有限公司 一种基于标签的电子文件保护方法
CN104657494B (zh) * 2015-03-06 2018-02-16 四川智羽软件有限公司 一种网站数据库访问方法
CN105610793B (zh) * 2015-12-18 2018-10-26 江苏大学 一种外包数据加密存储与密文查询系统及其应用方法
WO2018027389A1 (fr) * 2016-08-06 2018-02-15 柳柏宏 Procédé d'affichage d'informations de propriété associées à une technologie de transfert vidéo, et système de transfert
CN107920124A (zh) * 2017-11-27 2018-04-17 广东南都全媒体网络科技有限公司 一种数字报内容发布系统、方法及存储装置
CN112257104A (zh) * 2020-10-10 2021-01-22 北京字跳网络技术有限公司 权限控制方法、装置和电子设备
US11650812B2 (en) 2020-12-11 2023-05-16 International Business Machines Corporation Asset identification for collaborative projects in software development
CN112733188B (zh) * 2021-01-13 2023-09-22 航天晨光股份有限公司 一种敏感文件管理方法
CN114866309B (zh) * 2022-04-28 2024-03-08 四川万网鑫成信息科技有限公司 数据传输方法、系统、设备及介质
CN117521119B (zh) * 2024-01-08 2024-05-14 福建鸿翔建设工程有限公司 基于vr技术的安全体验方法及系统

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999049615A1 (fr) * 1998-03-27 1999-09-30 Microtome, Inc. Systeme de distribution d'informations

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4855725A (en) * 1987-11-24 1989-08-08 Fernandez Emilio A Microprocessor based simulated book
US4899292A (en) * 1988-03-02 1990-02-06 Image Storage/Retrieval Systems, Inc. System for storing and retrieving text and associated graphics
US5388196A (en) * 1990-09-07 1995-02-07 Xerox Corporation Hierarchical shared books with database
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
CN1312549C (zh) * 1995-02-13 2007-04-25 英特特拉斯特技术公司 用于安全交易管理和电子权利保护的系统和方法

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999049615A1 (fr) * 1998-03-27 1999-09-30 Microtome, Inc. Systeme de distribution d'informations

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO0163528A1 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660704A (zh) * 2015-03-06 2015-05-27 四川智羽软件有限公司 一种网站用户数据处理方法
CN104660705A (zh) * 2015-03-06 2015-05-27 四川智羽软件有限公司 一种网站数据库后台处理方法
CN104660704B (zh) * 2015-03-06 2018-10-30 四川智羽软件有限公司 一种网站用户数据处理方法
CN104660705B (zh) * 2015-03-06 2018-10-30 四川智羽软件有限公司 一种网站数据库后台处理方法
CN109325007A (zh) * 2018-10-16 2019-02-12 上海星佑网络科技有限公司 记录锁定方法和装置及计算机可读存储介质
RU2797759C1 (ru) * 2022-11-21 2023-06-08 Общество с ограниченной ответственностью "ПЕРВАЯ СВОБОДНАЯ ПЛАТФОРМА ЛЕГАЛЬНОЙ МУЗЫКИ" Способ обработки аудиоконтента и система для его осуществления

Also Published As

Publication number Publication date
WO2001063528A1 (fr) 2001-08-30
JP2003524264A (ja) 2003-08-12
CN1366647A (zh) 2002-08-28
AU4166601A (en) 2001-09-03
EP1222597A4 (fr) 2009-03-25
CA2370083A1 (fr) 2001-08-30
MXPA01010765A (es) 2003-08-20

Similar Documents

Publication Publication Date Title
WO2001063528A1 (fr) Procedes et dispositifs permettant de stocker, de distribuer et d'acceder a une propriete intellectuelle sous forme numerique
US5734823A (en) Systems and apparatus for electronic communication and storage of information
US6633877B1 (en) Method and apparatus for delivery of selected electronic works and for controlling reproduction of the same
US8626838B2 (en) Digital media asset identification system and method
US6912528B2 (en) Rechargeable media distribution and play system
US7062468B2 (en) Licensed digital material distribution system and method
KR100394924B1 (ko) 저작권 관리 장치, 전자 저작물 판매 장치, 전자 서적표시 장치, 키 정보 관리 장치 및 이들을 통신 회선으로접속한 전자 저작물 유통 관리 시스템
US7191153B1 (en) Content distribution method and apparatus
US20040133600A1 (en) Rechargeable media distribution and play system
WO1999049615A1 (fr) Systeme de distribution d'informations
EP1249771B1 (fr) Vente, médiation, achat de grandes quantités de données, système serveur, terminal et support d'enregistrement pour le logiciel associé
KR20210000156A (ko) 전자책 판매 및 관리 시스템
JP4502822B2 (ja) 電子書籍表示装置
KR20000063953A (ko) 전자출판물 시스템 및, 전자출판물 판매 및 관리방법
WO2004079608A2 (fr) Appareil et procede de distribution de fichiers de donnees
AU2002316727A1 (en) Rechargeable media distribution and play system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20011122

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: DIGEO INC

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

A4 Supplementary search report drawn up and despatched

Effective date: 20090220

18W Application withdrawn

Effective date: 20090306