TWI317083B - Content protection system and method for enabling secure sharing of copy-protected content - Google Patents

Content protection system and method for enabling secure sharing of copy-protected content Download PDF

Info

Publication number
TWI317083B
TWI317083B TW95137610A TW95137610A TWI317083B TW I317083 B TWI317083 B TW I317083B TW 95137610 A TW95137610 A TW 95137610A TW 95137610 A TW95137610 A TW 95137610A TW I317083 B TWI317083 B TW I317083B
Authority
TW
Taiwan
Prior art keywords
content
user
authorization
restrictions
pen
Prior art date
Application number
TW95137610A
Other languages
Chinese (zh)
Other versions
TW200817971A (en
Inventor
Morris Steven
Original Assignee
Arcadyan Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arcadyan Technology Corp filed Critical Arcadyan Technology Corp
Priority to TW95137610A priority Critical patent/TWI317083B/en
Publication of TW200817971A publication Critical patent/TW200817971A/en
Application granted granted Critical
Publication of TWI317083B publication Critical patent/TWI317083B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

-1317083-1317083

三達編號:TW2859PA 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種數位版權管理系統及方法,且特 別是有關於一種用以使防拷貝内容得以安全分享的内容 保護系統及方法。 【先前技術】 數位版權管理(Digital rights management,DRM)系 鲁統在現今購買數位内容時已不再是陌生的事物,例如蘋果 電腦之iTunes Music Store之線上購物商店使用DRM技術 以防止未經授權的複製歌曲之行為,且對例如錄音剪輯 (audio clip)、視訊、電影與文件之很多種下載媒體而言, 其逐漸變得普通。某些操作系統(譬如微軟視窗XP操作系 統)包含用以與可攜式播放機一起使用且在内容流至其他 裝置時對DRM的支援。 在DRM系統之下’已購買使用内容(例如歌曲)之權利 φ 之使用者只能傾聽歌曲它們自己的DRM加密複本。内容 擁有者提供使用者對此内容之授權。當已購買一歌曲之權 利之使用者想為自己傾聽此歌曲之DRM加密複本時,此 使用者之播放裝置取得與此使用者相關聯的授權資訊以 解密此加密複本,俾能播放此歌曲。因為第三者沒有權利 或授權資訊以解密此歌曲之加密複本,所以此第三者無法 播放此加密複本》 如此’具有授權使用内容之使用者無法與例如朋友之 第三者分享此加密内容。對内容擁有者而言’這項限制是 -1317083达达编号号: TW2859PA IX. Description of the Invention: [Technical Field] The present invention relates to a digital copyright management system and method, and more particularly to a content protection system for securely copying copy-protected content and method. [Prior Art] Digital rights management (DRM) is no longer unfamiliar to the purchase of digital content today. For example, Apple's iTunes Music Store online shopping store uses DRM technology to prevent unauthorized access. The behavior of copying songs has become commonplace for a wide variety of download media, such as audio clips, video, movies and files. Some operating systems, such as the Microsoft Windows XP operating system, include support for DRM for use with portable players and for streaming content to other devices. Under the DRM system, users who have purchased the right to use content (such as songs) φ can only listen to their own DRM encrypted copies of the song. The content owner provides the user with authorization for this content. When the user who has purchased the rights of a song wants to listen to the DRM encrypted copy of the song for himself, the user's playback device obtains the authorization information associated with the user to decrypt the encrypted copy and can play the song. Since the third party does not have the right or authorization information to decrypt the encrypted copy of the song, the third party cannot play the encrypted copy. Thus, the user who has authorized access to the content cannot share the encrypted content with a third party such as a friend. For content owners, the limit is -1317083

三達編號:TW2859PA 麴 合乎其權益的,係能阻止非法散佈受版權保護之複本的行 為並減少因非法使用受版權保護之複本造成之收益的損 失。 然而,人們喜好與他人分享或跟別人推薦自己喜歡使 用的内容。在上述限制下,為了分享内容,使用者可能甘 冒安全性風險而只好將自己獲得的授權資訊給予別人使 用。此外,習知之DRM阻止了某些更傳統的、從朋友或 ' 其他同好之間對音樂的推薦而建立起來的宣傳活動。内容 * 擁有者可能將其授權使用者所作之宣傳活動視為對他們 的事業而言具正面意義的一項活動。然而,習知之DRM 系統缺乏有效且安全的解決方案以符合使用者與内容擁 有者兩者之上述的需求。 【發明内容】 因此,本發明之一個目的係提供一種内容保護系統及 I 方法,使防拷貝數位内容得以安全分享。一筆内容與一第 一授權檔係與一第一使用者相關聯。第一授權檔安全地包 含用以解密此内容之一第一解密金鑰以及關於第一使用 者使用此筆内容之複數個限制條件。第一使用者係依據第 一授權檔中之這些限制條件而被授權使用此筆内容。 依據本發明之一個實施態樣,係提供一種用以使已加 密以防拷貝之一筆内容得以安全分享之内容保護系統。此 系統包含一第一處理單元與一授權管理單元。第一處理單 元係用以使第一使用者能夠傳送用以與至少一第二使用 7 J317083The three-digit number: TW2859PA 麴 is in its interest to prevent the illegal distribution of copyrighted copies and to reduce the loss of proceeds from the illegal use of copyrighted copies. However, people like to share with others or recommend content that they like to use. Under the above restrictions, in order to share content, users may risk security risks and have to use the authorization information they have obtained for others. In addition, the conventional DRM prevents some of the more traditional promotional activities that are established from friends or 'others' recommendations for music. Content * Owners may consider promotional activities by their authorized users as an activity that is positive for their career. However, conventional DRM systems lack an efficient and secure solution to meet the above needs of both users and content owners. SUMMARY OF THE INVENTION Accordingly, it is an object of the present invention to provide a content protection system and method for securely copying copy-protected digital content. A piece of content and a first authorization file are associated with a first user. The first authorization file securely includes a first decryption key for decrypting one of the contents and a plurality of restrictions regarding the use of the content by the first user. The first user is authorized to use the content based on these restrictions in the first authorization file. In accordance with an embodiment of the present invention, a content protection system for encrypting a copy of a piece of content for secure sharing is provided. The system includes a first processing unit and an authorization management unit. The first processing unit is configured to enable the first user to transmit for use with at least a second use 7 J317083

三達編號:TW2859PA tm 者分享此筆内容之一請求,其中此請求包含第二使用者之 識別資訊與此筆内容之識別資訊。為因應此請求,授權管 理單元係用來產生供第二使用者用之與第一授權檔、此筆 内容與第二使用者相關聯的一第二授權檔,其中第二授權 檔安全地包含用以解密此筆内容之一第二解密金鑰以及 關於第二使用者使用此筆内容之複數個限制條件。第二使 用者係依據第二授權檔中之這些限制條件而被授權使用 此筆内容之一分享之複本。 ^ 依據本發明之另一個實施態樣,提供一種用以使已加 密以防拷貝之一筆内容得以安全分享之内容保護方法。此 方法包含下述步驟:(a)傳送用以與至少一第二使用者分享 此筆内容之一請求,其中請求包含第二使用者之識別資訊 與該筆内容之識別資訊;(b)為因應此請求,產生供第二使 用者用之與第一授權檔、此筆内容與第二使用者相關聯的 一第二授權檔,其中第二授權檔安全地包含用以解密此筆 $ 内容之一第二解密金鑰以及關於第二使用者使用此筆内 容之複數個限制條件。第二使用者係依據第二授權檔中之 這些限制條件而被授權使用此筆内容之一分享之複本。 依據本發明之另一實施態樣,提供一種供在一内容保 護系統内使用之授權管理裝置,用以使已加密以防拷貝之 一筆内容得以安全分享。授權管理裝置包含一儲存裝置與 一管理單元。儲存裝置係用來儲存包含對應於第一授權檔 之資訊之授權資訊。管理單元係為因應用以與至少一第二 使用者分享此筆内容之一請求,其中請求包含第二使用者 8 •1317083Sanda number: TW2859PA tm share one of the requests for this content, where the request contains the identification information of the second user and the identification information of the content. In response to the request, the authorization management unit is configured to generate a second authorization file for the second user to associate with the first authorization file, the content and the second user, wherein the second authorization file is securely included A second decryption key for decrypting one of the pen contents and a plurality of restrictions on the second user using the pen content. The second user is authorized to use a copy of one of the contents in accordance with these restrictions in the second authorization file. In accordance with another embodiment of the present invention, a content protection method for encrypting a copy of a piece of content for secure sharing is provided. The method comprises the steps of: (a) transmitting a request for sharing the content with the at least one second user, wherein the request includes the identification information of the second user and the identification information of the content; (b) In response to the request, a second authorization file is generated for the second user to associate with the first authorization file and the content of the pen with the second user, wherein the second authorization file securely includes the content of the pen content for decryption One of the second decryption keys and a plurality of restrictions on the use of the content by the second user. The second user is authorized to use the copy of one of the contents of the content in accordance with the restrictions in the second authorization file. In accordance with another embodiment of the present invention, an authorization management device for use in a content protection system is provided for securely sharing a piece of content that has been encrypted to prevent copying. The authorization management device includes a storage device and a management unit. The storage device is used to store authorization information containing information corresponding to the first authorization file. The management unit is a request for sharing the content with the at least one second user by the application, wherein the request includes the second user 8 • 1317083

三達編號:TW2859PA Μ 之識別資訊與該筆内容之識別資訊。依據第4 求’管理單元係用來產生供第二使用者用之:槽與請 槽、此筆内容與第二使用者相關聯的一第二卢掘-授權 授權檔安全地包含用以解密此筆内容之—第—槽。第二 以及關於第二使用者使用此筆内容之複數個^、金餘 二使用者係依據第二授_中之這些限制條件而^授^ 使用此筆内容之一分享之複本。 φ 為讓本發明之上述目的、特徵、和優點能更明顯易 懂,下文特舉一較佳實施例,並配合所附圖式,作詳細說 明如下。 【實施方式】 依據本發明之一實施例,在用以使防拷貝内容得以與 他人安全分享之一内容保護系統中,有權利使用一筆内容 之一第一使用者可與一第二使用者(例如一朋友)分享此筆 内容’其係藉由向此内容擁有者提出一分享之請求,使第 二使用者得以建立一新授權以使用此筆内容之一分享之 複本。當此内容擁有者建立此新授權之後,第二使用者可 要求關於第二使用者之授權資訊,其中此授權資訊說明關 於第二使用者使用此筆内容之限制條件。依據此新授權中 之授權資訊,第二使用者被授權使用此筆内容之分享之複 本,而使用之方式係依據此内容型式而定,例如:播放一 首歌曲或一段視訊,或讀取一文字檔案或一圖片。 依此方式,經過加密之内容檔案可自由地複製’例如 9 -1317083Sanda number: TW2859PA Μ Identification information and identification information of the content. According to the fourth request, the management unit is configured to generate a second user-authorized authorization file for the second user: the slot and the request slot, and the content of the pen and the second user are securely included for decryption. The contents of this paragraph - the first slot. The second and the plurality of users who use the content of the second user and the second user are authorized to use the copy of one of the contents according to the restrictions in the second grant. The above-mentioned objects, features, and advantages of the present invention will become more apparent from the claims. [Embodiment] According to an embodiment of the present invention, in a content protection system for making copy-protected content securely shared with others, there is a right to use one of the contents of the first user and a second user ( For example, a friend) shares the content by making a request for sharing to the content owner, enabling the second user to create a new authorization to share the copy using one of the contents. After the content owner establishes the new authorization, the second user may request authorization information about the second user, wherein the authorization information indicates a restriction on the second user's use of the content. Based on the authorization information in this new license, the second user is authorized to use the copy of the shared content of the content, depending on the content type, such as playing a song or a video, or reading a text File or a picture. In this way, the encrypted content file can be freely copied 'eg 9 -1317083

三達編號:TW2859PA m 由分享者直接提供給接受者,或是經由一點對點應用程式 以達成,但仍然需要一授權來播放此内容。 在上述實施例中,内容擁有者可能操控一網路服務 (例如一内容商店或一資訊網站),而此網路服務包含一授 權管理單元。此授權管理單元係用以建立一授權或一新授 權,且譬如在一授權伺服器下操作。例如,網路服務係為 具有一位址之一種服務,其可在一無線或有線網路,或兩 者之混合網路下達成,例如:在此網際網路中之一資訊網 • 站或者在一數位無線電話網路下之一種服務。以實作的觀 點而言,於本發明之實施例中所說明之”内容擁有者”之動 作亦可被視為以一種互動方式或自動方式而藉由例如一 網路服務、一授權管理單元或一軟體模組而實現之動作。 此外,第一使用者係可使用一處理單元以傳送分享防拷貝 内容之一請求,其中處理單元例如為一電腦系統、一手提 裝置或一行動電話。因此,如上所述,包含一處理單元與 一授權管理單元之内容保護系統提供一新授權給第三者 # 來使用此筆内容。 更明確而言,依據本發明之一實施例,一内容保護系 統係顯示於第1圖,用以使已加密以防拷貝之一筆内容200 得以安全分享。此系統包含一授權伺服器100,供一第一 使用者用之一第一處理單元500,以及供一第二使用者用 之一第二處理單元700。該筆内容200與一第一授權檔210 係與第一使用者相關聯,此第一使用者可使用例如一個人 電腦、一手提裝置或一可攜式播放裝置之第一處理單元 -1317083The Sanda number: TW2859PA m is provided directly to the recipient by the sharer, or via a point-to-point application, but still requires an authorization to play the content. In the above embodiment, the content owner may manipulate a web service (e.g., a content store or an information website), and the web service includes an authorization management unit. This authorization management unit is used to establish an authorization or a new authorization, and operates, for example, under an authorization server. For example, a network service is a service with a single address, which can be achieved under a wireless or wired network, or a hybrid network of the two, for example, one of the Internet sites or stations in the Internet or A service under a digital wireless telephone network. From a practical point of view, the actions of the "content owner" described in the embodiments of the present invention can also be considered as an interactive or automatic manner by, for example, a network service, an authorization management unit. Or a software module to achieve the action. In addition, the first user can use a processing unit to transmit a request to share copy-protected content, such as a computer system, a portable device, or a mobile phone. Thus, as described above, the content protection system including a processing unit and an authorization management unit provides a new authorization to the third party to use the content. More specifically, in accordance with an embodiment of the present invention, a content protection system is shown in FIG. 1 for encryption to prevent copying of a single piece of content 200 for secure sharing. The system includes an authorization server 100 for a first user to use a first processing unit 500 and a second user for a second processing unit 700. The pen content 200 and a first authorization file 210 are associated with a first user, and the first user can use a first processing unit such as a personal computer, a portable device or a portable playback device -1317083

三達編號:TW2859PA • 500,來與此授權伺服器1〇0溝通。第一授權槽2ι〇安全 地(securely)包含用以解密此内容2〇〇之一第一解密金錄 211與關於第一使用者使用此筆内容之複數個限制條件 213 ’第-使用者係依據第-授權檔21〇中之該些限制條 件213而被授權使用此筆内容2〇〇。 該筆内容係為例如文字、聲音、圖片或視訊,或其 之任何組合之資訊,其被加密並可包含關於何處獲得那: 内容之一授權(例如,一特定資訊網站位址)之某虺資訊。 • 此授權伺服器100認證一使用者之身份並儲存關於1用者 對此内容可執行何種動作之資訊,可執行的動作譬如播 放、複製與任何其他可運用之限制條件—例如:只能播放 30次,播放7天的期間或不能將内容數位化輸出以當作播 放動作。授權伺服器100譬如包含用以儲存授權資訊之一 儲存裝置110,以及用以執行授權管理操作(例如為一使用 者建立一授權)之一管理單元13〇(如以一處理器執行一相 _ 關程式以達成)。一授權檔安全地包含(亦即其為一具安全 保護之檔案)有關這些動作與限制條件之資訊,並包含用以 解密一筆内容之一解密金鑰。 第一使用者藉由使用第一處理單元500傳送用以與至 少一第二使用者分享此筆内容之一請求8〇〇,其中此請求 包含第二使用者之識別資訊與該筆内容2〇〇之識別資訊。 為因應此請求800,此授權伺服器ι〇〇產生供第二使用者 用之與第一授權檔210、此筆内容2〇〇以及第二使用者相 關聯的一第二授權播220,其中第二授權檔220安全地包 11 '1317083Sanda number: TW2859PA • 500, to communicate with this authorized server 1〇0. The first authorization slot 2 ι securely includes one of the first decryption record 211 for decrypting the content 2 and a plurality of restrictions 213 'the user-user system for the first user to use the content of the pen This content 2 is authorized to be used in accordance with the restriction conditions 213 in the first authorization file 21〇. The content is information such as text, sound, pictures or video, or any combination thereof, which is encrypted and can contain information about where to obtain that: one of the content authorizations (eg, a particular information website address)虺 Information. • The Authorization Server 100 authenticates the identity of a user and stores information about what actions a user can perform on the content, such as play, copy, and any other applicable restrictions—for example, only Play 30 times, play for 7 days or you can not digitally output the content as a playback action. The authorization server 100 includes, for example, a storage device 110 for storing authorization information, and a management unit 13 for performing an authorization management operation (for example, establishing an authorization for a user) (eg, executing a phase with a processor) Close the program to achieve). An authorization file securely contains (i.e., it is a secure file) information about these actions and restrictions, and includes a decryption key for decrypting one of the contents. The first user transmits a request for sharing the content of the pen with at least one second user by using the first processing unit 500, wherein the request includes the identification information of the second user and the content of the pen. Identification information. In response to the request 800, the authorization server ι generates a second authorization broadcast 220 for the second user to associate with the first authorization file 210, the content 2, and the second user. The second authorization file 220 securely packs 11 '1317083

三達編號:TW2859PA 含用以解密此筆内容200之一第二解密金鑰221盥關於第 二使用者使用此筆内容之複數個限制條件223。第二使用 者係依據第二授權檔220中之這些限制條件223而被授權 使用此華内谷200之一分享之複本2〇1。 第一使用者譬如使用第二處理單元以取得第二授 權檔220,以便使用(例如播放)此筆内容之分享之複本 201 〇 • f 2圖顯示依據本發明之另—個實施例之用以使防拷 貝内容得以安全分享之一内容保護方法之一流程圖。本實 施例使防拷貝之加密内容得以分享並為接受者有限制地 存取使用之機制能實現於在基於第丨圖之内容保護系統 中。 首先,為清楚說明起見,第一使用者被指名為一分享 者,而第二使用者被指名為一接受者。在相同的資訊服務 (譬如一線上音樂商店)上,分享者與接受者兩者都具有他 ⑩ 們的使用者帳戶。 在步驟2100中’此分享者例如經由一處理單元發出一 明求以將内容分享給此授權擁有者,此步驟可藉由多種方 式達成.如透過此内容擁有者之網頁或線上商店或透過此 分享者之内容資料庫之應用程式以達成。此種請求包含下 述資訊:(1)此内容所欲分享給某使用者之識別資訊(ID); (b)所欲分享之内容之識別資訊(ID);⑷此分享者強加於那 個内容上之任何限制條件。 在步驟2200中,此内容擁有者為此接受者建立一個或 12 *1317083 三達編號:TW2859PA 多個新授權,而每個新授權係與—筆分享之内容相關聯。 這些授權包含譬如原始加於此内容上之所有限制條件,但 亦包含由此分享者加於此分享之複本上之任何限制條 件。例如,此分享者可具有無限次數播放一曲子之 但可選擇限制此分享之複本播放一限定次數,例如^次。Sanda number: TW2859PA contains a plurality of restrictions 223 for decrypting the second decryption key 221 of the pen content 200 regarding the second user's use of the pen content. The second user is authorized to use the duplicate 2〇1 shared by one of the inner valleys 200 in accordance with these restrictions 223 in the second authorization file 220. The first user, for example, uses the second processing unit to obtain the second authorization file 220 to use (eg, play) the shared copy of the content of the content 201 f• f 2 to display another embodiment in accordance with the present invention. A flow chart of one of the content protection methods for making copy-protected content securely shared. This embodiment enables the copy-protected encrypted content to be shared and the restricted access for the recipient to be implemented in a content-based content protection system. First, for clarity, the first user is referred to as a sharer and the second user is referred to as a recipient. In the same information service (such as an online music store), both the sharer and the recipient have their user accounts. In step 2100, the sharer sends a request to share the content to the authorized owner, for example, via a processing unit. This step can be accomplished in a variety of ways, such as through the content owner's webpage or online store or through The app of the sharer's content database is reached. Such a request contains the following information: (1) the identification information (ID) that the content is intended to share with a user; (b) the identification information (ID) of the content to be shared; (4) the content that the sharer imposes on the content Any restrictions on the above. In step 2200, the content owner creates a new or 12*1317083 three-number for the recipient: TW2859PA multiple new authorizations, and each new authorization is associated with the pen-shared content. These licenses include, for example, all of the restrictions imposed on this content, but also any restrictions imposed by the sharer on this shared copy. For example, the sharer can play a song in an unlimited number of times but can choose to limit the copy of the share for a limited number of times, such as ^ times.

在步驟麗巾’此内容擁有者檢查料_條件之一 組合’且如果必要的話則調整它們以符合他們的商業規 則’如在步驟24GG中所表示的。這些修改將避免此内容 太廣泛地被分享。典型的限制條件譬如可包含下述之至,丨、 -種·⑷禁止複製此内容之分享之複本;(b)有關此分享之 複本之授權只有播放此分享之複本一限定次數或持續一 段有限期間内有效’其可能低於由此分享者特別指定、的. 及(c)可能只播放此内容之一低品質複本。舉例而言,如果 此内容係為以128kb/s之位元率之MP3格式之歌曲,則此 歌曲之分享複本可能被播放或係以較低的位元率之位元 率(例如 64kb/s;^ 70 繼續至步驟2400,此内容擁有者可選擇將分享之複本 限制成被播放直到一較少次數(例如5次),從而推翻由此 分享者所強加之較鬆的限制條件(例如最大到10次)。 此外,此内容擁有者將一資訊攔加至此授權以指出此 授權係為一分享之複本之授權。此種資訊攔包含此分享者 之仍並供在計次付費(pay_per_VieW)内容上記帳之用。 當此接受者想要譬如藉由第1圖所表示之第二處理單 元700播放此分享之内容時,其可採取下述步驟。首先, 13 .1317083In step ray 'this content owner checks the material _ condition one combination' and adjusts them if necessary to comply with their business rules' as indicated in step 24GG. These changes will prevent this content from being shared too widely. Typical limitations may include, for example, the following, 丨, - (4) copying of copies of this content is prohibited; (b) the authorization for the copy of this share is only limited to a limited number of copies of this share or for a limited period of time. Valid during the period 'it may be lower than the special designation by this sharer. And (c) may only play a low quality copy of this content. For example, if the content is a song in MP3 format at a bit rate of 128 kb/s, the shared copy of the song may be played or tied at a lower bit rate (eg 64 kb/s). ;^ 70 Continuing to step 2400, the content owner may choose to limit the shared copy to be played until a lesser number of times (eg, 5 times), thereby overturning the looser restrictions imposed by the sharer (eg, maximum Up to 10 times. In addition, the content owner adds an information to this authorization to indicate that the authorization is a copy of the shared copy. This information block contains the sharer's still and is charged for the payment (pay_per_VieW) When the recipient wants to play the shared content, for example, by the second processing unit 700 shown in Fig. 1, the following steps can be taken. First, 13.1317083

三達編號:TW2859PA 播放此内谷之第二處理單元7〇〇取得有關此内容之第二授 權檔220,並檢查屬於分享者與接受者兩者之授權。 如果對於此分享者之授權或此接受者之授權之限制 時間已屆滿’則通知此接受者此内容不再被播放並要求講 買他們自己的授權。 如果此分旱者或此接受者被允許播放此内容一固定 次數,而且已達到該限制條件,則通知此接受者此内容不 再被播放並要求購買他們自己的授權。否則,對於分享者 與接受者兩者減少一次或降低一些播放剩餘之次數。 如果此内容係為計次付費内容,則從此分享者之帳戶 移除此被分享之内容每次被使用之成本。對於可用之存款 不足之預付帳戶而言,通知此接受者此内容此時無法被播 放並要求購買他們自己的授權β 依據上述揭露實施例,當維持此内容擁有者之所有權 利且在不損失收益的情況下,一使用者係被允許將内容之 0 ’預覽'複本提供給另一個使用者。内容之加密檔案可自由 地被複製,舉例而言,從此分享者直接提供給此接受者, 或經由一點對點應用程式,但仍然需要一授權來播放此内 容。 藉由使用由内容擁有者與分享者所強加之授權限制條 件之一結合組合,對此内容擁有者而言不存在有利益之損 失,舉例而言,此内容擁有者可追蹤誰已經分享一筆内 容’同時分享者可限制他們的帳戶資訊對於内容播放 (playback)與計費之使用。又,例如促銷與計次付費之一商 •1317083 三達編號:TW2859PA 業杈式可建立在此安全分享上。此外’此新授權係受制於 此原始授權,所以此授權之任何需計量的特徵亦將被應用 至此内谷之为旱之複本(如同新内容)。這亦可使此内容擁 有者追縱此内容之分布情況。因此,如於上述實施例中所 示的’此内谷保護系統滿足這些使用者分享内容之需求, 以及滿足内容擁有者對於拷貝防護與允許推介宣傳之需 求。Sanda number: TW2859PA The second processing unit 7 that plays this valley has obtained the second authorization file 220 for this content and checks the authorizations belonging to both the sharer and the recipient. If the time limit for the authorization of this sharer or the authorization of this recipient has expired, then the recipient is notified that the content is no longer being played and requires their own authorization to be purchased. If the user or the recipient is allowed to play the content a fixed number of times and the restriction has been reached, the recipient is notified that the content is no longer played and requires their own authorization to be purchased. Otherwise, reduce the number of times the player and the recipient are reduced or decrease the number of remaining plays. If this content is a pay-per-view content, the cost of this shared content is used each time from the sharer's account. For prepaid accounts that are available for insufficient deposits, notify the recipient that this content cannot be played at this time and asks to purchase their own authorizations. According to the above disclosed embodiments, while maintaining all rights of the content owner and without losing revenue In the case where a user is allowed to provide a copy of the 0 'preview' of the content to another user. Encrypted files of content can be freely copied, for example, from the sharer directly to the recipient, or via a peer-to-peer application, but still require an authorization to play the content. There is no loss of interest to the content owner by using a combination of one of the authorization restrictions imposed by the content owner and the sharer. For example, the content owner can track who has shared a piece of content. 'At the same time, sharers can limit the use of their account information for content playback and billing. Also, for example, one of the promotion and the payment of the fee • 1317083 Sanda number: TW2859PA industry can be built on this security sharing. In addition, this new license is subject to this original authorization, so any features that need to be measured for this license will also be applied to this copy of the valley (as new). This also allows the content owner to track the distribution of this content. Therefore, as shown in the above embodiment, the inner valley protection system satisfies the needs of these users to share content, and satisfies the content owner's need for copy protection and permission promotion.

雖然已經由舉例且從實施例的觀點說明本發明,但吾 人應理解到本發明並未受限於此。反之,本發明意欲覆^ 各種不關修改與類㈣配置與料 =範嘴因此應該符合此最寬廣的說明,俾能包 種修改與類似的配置與程序。 \ 然其限以-較佳實施例揭露如上, 常知識者,在不脫離:發明 15 • 1317083While the invention has been described by way of example and embodiments, it is understood that the invention is not limited thereto. On the contrary, the present invention is intended to cover various modifications and classes (4) configurations and materials. Therefore, the broadest description should be met, and modifications and similar configurations and procedures can be incorporated. \ 然 然 然 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

三達編號:TW2859PA ' 【圖式簡單說明】 第1圖顯示依據本發明之一實施例之用以使防拷貝内 容得以安全分享之一内容保護系統之示意圖。 第2圖顯示依據本發明之一實施例之用以使防拷貝内 容得以安全分享之一内容保護方法之流程圖。 【主要元件符號說明】 100:授權伺服器 ® 110:儲存裝置 130 :管理單元 200 :内容 201 :分享之複本 210 :第一授權檔 211 :第一解密金鑰 213 :限制條件 220 :第二授權檔 221 :第二解密金鑰 223 :限制條件 500 :第一處理單元 700 ··第二處理單元 8 0 0 :請求Sanda Number: TW2859PA' [Simple Description of the Drawings] Figure 1 shows a schematic diagram of a content protection system for securely sharing copy-protected content in accordance with an embodiment of the present invention. Figure 2 is a flow chart showing a method of content protection for securely copying copy-protected content in accordance with an embodiment of the present invention. [Main Component Symbol Description] 100: Authorization Server® 110: Storage Device 130: Management Unit 200: Content 201: Shared Replica 210: First Authorization File 211: First Decryption Key 213: Restriction Condition 220: Second Authorization File 221: second decryption key 223: restriction condition 500: first processing unit 700 · second processing unit 8 0 0 : request

Claims (1)

-1317083 三達編號:TW2859PA 十、申請專利範圍: 1·-種内容保護系統’用以使已加密以防拷貝之一筆 内合得以t全分享’其中該筆内容和—第__授權權係與〆 第-使用者相關聯,㈣第—授權檔安全地包含用以解密 該内,之「第-解密金鑰以及關於該第—使用者使用該 筆内容之複數籠制條件’該第—使时係依據該第一授-1317083 Sanda number: TW2859PA X. Patent application scope: 1. A kind of content protection system 'used to make it encrypted to prevent one copy of the pen from being shared.' The content and the __ authorization system In association with the first user, (4) the first authorization file securely includes a "first-decryption key and a plurality of cage conditions for the user-using the content" to decrypt the inside. Time based on the first 權檔中之該些限制條件而被授權使肋容,該系統包 含: 一弟一處理+元’用以使該第-使用者能夠傳送用以 與至少-第二使用者分享該筆内容之一請求,其中該請求 包含該第二使用者之識別f訊與該筆内容之識別資訊; 一授權倾器,其因應該請求,用以產生供該第二使 二者用,一第一授權檔’該第二授權檔係與該第-授權 二内谷以及該第二使用者相關聯,其中該第二授權 檔女全地包含用以解㈣筆心之—第 關於該第二使用者倭用兮箠& + 胛在金鑰以及 其之複數個限制條件;以及 、中該第—使用者係依據該第二授權 制條件而被授權使用該筆内容之-分享之複本。二限 2.如申4專利㈣第丨項所 中來自該第-處理單元之該請求更包含该其 加於該筆内容之複數個限制條件。 吏用者強 如申請專利範圍第2項所述之内容保 令該授權舰器建立該第二授權檔,其中關於 者使用該㈣容之該魏制條件,絲決 17 -1317083 三達編號:TW2859PA _ 用者使用該筆内容之該些限制條件。 4. 如申請專利範圍第3項所述之内容保護系統,其 中關於該第二使用者使用該筆内容之該些限制條件,係取 決於關於該第一使用者使用該筆内容之該些限制條件以 及該第一使用者強加於該筆内容之該些限制條件。 5. 如申請專利範圍第4項所述之内容保護系統,其 中關於該第二使用者使用該筆内容之該些限制條件,係為 關於該第一使用者使用該筆内容之該些限制條件以及該 • 第一使用者強加於該筆内容之該些限制條件之一組合。 6. 如申請專利範圍第5項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含禁止複製該筆内容之該分享之 複本之一限制條件。 7. 如申請專利範圍第5項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含該第二授權檔只有在播放該筆 内容一限定次數内有效之一限制條件。 8. 如申請專利範圍第5項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含該第二授權檔只有在一有限期 間内有效之一限制條件。 9. 如申請專利範圍第5項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含只可能播放該筆内容之一低品 -1317083 三達編號:TW2859PA " 質複本之一限制條件。 10. 如申請專利範圍第1項所述之内容保護系統,其 中該授權伺服器建立該第二授權檔,其中關於該第二使用 者使用該筆内容之該些限制條件,係取決於關於該第一使 用者使用該筆内容之該些限制條件。 11. 如申請專利範圍第1項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含禁止複製該筆内容之該分享之 • 複本之一限制條件。 12. 如申請專利範圍第1項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含該第二授權檔只有在播放該筆 内容一限定次數内有效之一限制條件。 13. 如申請專利範圍第1項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含該第二授權檔只有在一有限期 間内有效之一限制條件。 14. 如申請專利範圍第1項所述之内容保護系統,其 中該授權伺服器更進一步使關於該第二使用者使用該筆 内容之該些限制條件包含只可能播放該筆内容之一低品 質複本之一限制條件。 15. 如申請專利範圍第14項所述之内容保護系統, 其中在該第二授權檔中之該第一使用者之該識別資訊,係 供在計次付費内容上記帳用。 19 -1317083 三達編號:TW2859PA * 16.如申請專利範圍第1項所述之内容保護系統’其 中該第一授權檔包含該第〜使用者之識別資訊,並包含指 示資訊以指明該第二授權槽係用以授權該[使用者使 用一分享之複本用。 Π. —種内容保護方法,用以使已加密以防拷貝之一 筆内谷知以安全分享,其中該筆内容與一第一授權檔係與 一第一使用者相關聯,且讀第一授權檔安全地包含用以解 岔該内谷之-第-解密金輪以及關於該第一使用者使用 該筆内容之複數個限制條件,該第一使用者係依據該第一 授權檔中之該些限制條件而被授權使用該 筆内容,該方法 包含以下步驟: ⑻傳送用以與至少—第二使用者分享該筆内容之 一請求’其中該請求包含”二使用者之識別#訊與該筆 内容之識別資訊; <⑻為因應該請求,產生供該第二使用者用之一第二 •授權;ft豸第—授權檔係與該第—授權播、該筆内容以及 =二使用者相關聯,其中該第二授權禮安全地包含用以 ,該筆内容之-第二解密金鑰以及關於該第二使用者 使用該筆内容之複數個限制條件;以及 其中該第二使用者係依據該第二授權檔中之該些限 制條件而被授權使用該筆内容之一分享之複本。 18·如申請專利範圍第17項所述之内容保護方法’ 其中來自該第-處理單元之該請求更包含該第一使用者 強加於該筆内容上之複數個限制條件。 20 .1317083 三達編號:TW2859PA 19. 如申請專利範圍第18項所述之内容保護方法, 其中在步驟(a)中,關於該第二使用者使用該筆内容之該些 限制條件,係取決於關於該第一使用者使用該筆内容之該 些限制條件。 20. 如申請專利範圍第19項所述之内容保護方法, 其中在步驟(b)中,關於該第二使用者使用該筆内容之該些 限制條件,係取決於關於該第一使用者使用該筆内容之該 些限制條件以及該第一使用者強加於該筆内容上之該些 ®限制條件。 21. 如申請專利範圍第20項所述之内容保護方法, 其中在步驟(b)中,關於該第二使用者使用該筆内容之該些 限制條件,係為關於該第一使用者使用該筆内容之該些限 制條件以及該第一使用者強加於該筆内容上之該些限制 條件之一組合。 22. 如申請專利範圍第21項所述之内容保護方法, 0 其中在步驟(b)中,該授權伺服器更進一步使關於該第二使 用者使用該筆内容之該些限制條件包含禁止複製該筆内 容之該分享之複本之一限制條件。 23. 如申請專利範圍第21項所述之内容保護方法, 其中該授權伺服器更進一步使關於該第二使用者使用該 筆内容之該些限制條件包含該第二授權檔只有在播放該 筆内容一限定次數内有效之一限制條件。 24. 如申請專利範圍第21項所述之内容保護方法, 其中該授權伺服器更進一步使關於該第二使用者使用該 21 *1317083 三達編號:TW2859PA 筆内容之該些限制條件包含該第二授權檔只有在一有限 期間内有效之一限制條件。 25. 如申請專利範圍第21項所述之内容保護方法, 其中該授權伺服器更進一步使關於該第二使用者使用該 筆内容之該些限制條件包含只可能播放該筆内容之一低 品質複本之一限制條件。 26. 如申請專利範圍第17項所述之内容保護方法, 其中該授權伺服器更進一步使關於該第二使用者使用該 * 筆内容之該些限制條件包含禁止複製該筆内容之該分享 之複本之一限制條件。 27. 如申請專利範圍第17項所述之内容保護方法, 其中該授權伺服器更進一步使關於該第二使用者使用該 筆内容之該些限制條件包含該第二授權檔只有在播放該 筆内容一限定次數内有效之一限制條件。 28. 如申請專利範圍第17項所述之内容保護方法, _ 其中該授權伺服器更進一步使關於該第二使用者使用該 筆内容之該些限制條件包含該第二授權檔只有在一有限 期間内有效之一限制條件。 29. 如申請專利範圍第17項所述之内容保護方法, 其中該授權伺服器更進一步使關於該第二使用者使用該 筆内容之該些限制條件包含只可能播放該筆内容之一低 品質複本之一限制條件。 30. 如申請專利範圍第17項所述之内容保護方法, 其中該第二授權檔包含該第一使用者之識別資訊,並包含 22 •1317083 三達編號:TW2859PA « 指示資訊以指明該第二授權檔係用以授權該第一使用者 使用一分享之複本用。 31.如申請專利範圍第3〇項所述之内容保護方法, 其中在該第一授權檔中之該第—使用者之該識別資訊,係 供在計次付費内容上記帳用。 - 32.如申請專利範圍第17項所述之内容保護方法, 其中在步驟(a)中,關於該第二使用者使用該筆内容之該些 鲁限制條件’係取決於關於該第_使用者使用該筆内容之該 些限制條件。 j3. —種供内容保護系統用之授權管理裝置,該内容 =5蒦系统用以使已加密以防拷貝之一筆内容得以安全分 |其中該筆内容與一第一授權檔係與一第一使用者相關 且該第一授權檔安全地包含用以解密該内容之一第一 限=金鑰以及關於該第一使用者使用該筆内容之複數個 條件,該第一使用者係依據該第—授權檔中之該些限 ”件而被授權使用該筆内容,該授權管理裝置: 對;&〜儲存裝置,用以儲存授權資訊,該授權資訊係包含 、履於該第一授權檔之資訊; 筆内Γ官理單兀’其因應用以與至少一第二使用者分享該 訊歲容f一請求’其中該請求包含該第二使用者之識別資 槽^讀筆内容之識別資訊,該管理單元係依據該第一授權 擋、轅請求,而用以產生供該第二使用者用之一第二授權 —讀第一授權檔係與該第一授權檔、該筆内容以及該第 使用者相關聯,其中該第二授權檔安全地包含用以解密 23 1317083 三達編號:TW2859PA 該筆内容之一第二解密金鑰以及關於該第二使用者使用 該筆内容之複數個限制條件;以及 其中該第二使用者係依據該第二授權檔中之該些限 制條件而被授權使用該筆内容之一分享之複本。The restrictions in the rights are authorized to make the ribs contain, the system comprising: a brother-one processing + element 'to enable the first-user to transmit to share the content with at least the second user a request, wherein the request includes the identification information of the second user and the identification information of the content of the pen; an authorization device, which is requested to generate, for the second use, a first authorization The second authorized file is associated with the first-authorized two valleys and the second user, wherein the second authorized file includes all of the fourth authorized user--about the second user兮箠 amp & + 胛 in the key and a plurality of restrictions thereof; and, the first user is authorized to use the copy of the content-shared according to the second authorization condition. Second limit 2. The request from the first processing unit in the fourth item of claim 4 (4) further includes the plurality of restrictions imposed on the content. The user is as strong as the content described in item 2 of the patent application to order the authorized ship to establish the second authorization file, wherein the relevant person uses the condition of the (4) capacity, and the number is 17 -1317083. TW2859PA _ User uses these restrictions for this content. 4. The content protection system of claim 3, wherein the restrictions on the use of the content by the second user are dependent on the restrictions on the use of the content by the first user Conditions and the constraints imposed by the first user on the content of the pen. 5. The content protection system of claim 4, wherein the restrictions on the use of the content by the second user are those restrictions regarding the use of the content by the first user And a combination of the restrictions imposed by the first user on the content. 6. The content protection system of claim 5, wherein the authorization server further causes the restriction conditions regarding the use of the content by the second user to include copying the sharing of the content of the pen. One of the restrictions. 7. The content protection system of claim 5, wherein the authorization server further causes the restriction condition regarding the second user to use the content to include the second authorization file only when the pen is played The content is one of the valid conditions within a limited number of times. 8. The content protection system of claim 5, wherein the authorization server further causes the second authorization file to include the second authorization file only for a limited period of time One of the restrictions is valid. 9. The content protection system of claim 5, wherein the authorization server further causes the restrictions on the second user to use the content to include only one of the low content of the content -1317083 Sanda number: TW2859PA " One of the limitations of the quality copy. 10. The content protection system of claim 1, wherein the authorization server establishes the second authorization file, wherein the restrictions on the use of the content by the second user are dependent on The first user uses the restrictions of the content of the pen. 11. The content protection system of claim 1, wherein the authorization server further causes the restrictions regarding the use of the content by the second user to include copying the sharing of the content of the pen. One of the limitations of the copy. 12. The content protection system of claim 1, wherein the authorization server further causes the second authorization to include the second authorization file for the second user to play the pen The content is one of the valid conditions within a limited number of times. 13. The content protection system of claim 1, wherein the authorization server further causes the second authorization file to include the second authorization file only for a limited period of time One of the restrictions is valid. 14. The content protection system of claim 1, wherein the authorization server further causes the restrictions regarding the use of the content by the second user to include only one of the low quality of the content being played. One of the limitations of the copy. 15. The content protection system of claim 14, wherein the identification information of the first user in the second authorization file is for billing on the pay-per-view content. 19 -1317083 Sanda number: TW2859PA * 16. The content protection system of claim 1, wherein the first authorization file includes the identification information of the user, and includes indication information to indicate the second The authorization slot is used to authorize the [user to use a shared copy.内容. A content protection method for encrypting to prevent copying of a pen to be safely shared, wherein the content is associated with a first user and a first user, and the first authorization is read The file securely includes a plurality of restrictions for decrypting the inner valley and the first decryption gold wheel, and the first user is based on the plurality of restrictions in the first authorization file Restricting the condition and being authorized to use the content, the method comprises the following steps: (8) transmitting an identifier for requesting the user to share the content with at least the second user, wherein the request includes the identification of the two users and the pen The identification information of the content; <(8) is a second authorization for the second user to be requested, ft豸 the first authorization file and the first authorization broadcast, the content and the second user Correspondingly, wherein the second authorization ceremony securely includes a second decryption key for the content of the pen and a plurality of restrictions on the use of the content by the second user; and wherein the second user system according to The restriction in the second authorization file is authorized to use the copy shared by one of the contents. 18. The content protection method described in claim 17 of the patent application, wherein the request from the first processing unit Further includes a plurality of restrictions imposed by the first user on the content of the pen. 20.1317083 Canda No.: TW2859PA 19. The content protection method as described in claim 18, wherein in step (a) The restrictions on the use of the content by the second user are determined by the restrictions on the use of the content by the first user. 20. Content protection as described in claim 19 a method, wherein in step (b), the restrictions on the use of the content by the second user are determined by the restrictions on the use of the content by the first user and the first user The content protection method imposed on the content of the article. 21. The content protection method according to claim 20, wherein in the step (b), the second user is used in the pen The restrictions are a combination of the restrictions on the use of the content by the first user and the restrictions imposed by the first user on the content of the pen. The content protection method of item 21, wherein in step (b), the authorization server further causes the restriction conditions regarding the use of the content by the second user to include copying the sharing of the content of the pen The content protection method of claim 21, wherein the authorization server further includes the second condition that the second user uses the content of the content includes the second The authorization file is only valid for one of the limited number of times the content is played. 24. The content protection method of claim 21, wherein the authorization server further causes the second user to use the 21*1317083 three-number: TW2859PA pen content including the restriction The second authorization file is only valid for one limited period of time. 25. The content protection method of claim 21, wherein the authorization server further causes the restriction condition regarding the use of the content by the second user to include only one of the pen content that is low quality One of the limitations of the copy. 26. The content protection method of claim 17, wherein the authorization server further causes the restriction on the use of the *pen content by the second user to include copying the sharing of the content of the pen. One of the limitations of the copy. 27. The content protection method of claim 17, wherein the authorization server further causes the second authorization file to be used by the second user to include the second authorization file only when the pen is played The content is one of the valid conditions within a limited number of times. 28. The content protection method of claim 17, wherein the authorization server further causes the restriction on the second user to use the content to include the second authorization file only in a limited One of the restrictions that are valid during the period. 29. The content protection method of claim 17, wherein the authorization server further causes the restrictions on the use of the content by the second user to include only one of the low content of the content being played. One of the limitations of the copy. 30. The content protection method according to claim 17, wherein the second authorization file includes identification information of the first user, and includes 22 • 13170083 three-number: TW2859PA « indication information to indicate the second The authorization file is used to authorize the first user to use a shared copy. 31. The content protection method of claim 3, wherein the identification information of the first user in the first authorization file is for billing on the pay-per-view content. - 32. The content protection method of claim 17, wherein in step (a), the certain restrictions on the use of the content by the second user are determined by the use of the Use these restrictions on the content of the pen. J3. An authorization management device for the content protection system, the content=5蒦 system is used to enable encryption to prevent copying of a piece of content safely | wherein the content of the pen and a first authorization file are first User-related and the first authorization file securely includes a first condition=key for decrypting the content and a plurality of conditions for the first user to use the content, the first user is based on the first - the authorization in the authorization file is authorized to use the content, the authorization management device: the; &~ storage device for storing authorization information, the authorization information is included, and the first authorization file is included The information in the pen is used to identify the content of the second user's identification slot, and the identification of the content is included in the second user. Information, the management unit is configured to generate a second authorization for the second user according to the first authorization file, the first authorization file, the first authorization file, the first authorization file, the pen content, and Associated with the first user, The second authorization file securely includes a second decryption key for decrypting 23 1317083 three digits: TW2859PA, and a plurality of restrictions on the second user using the content; and wherein the The second user is authorized to use the copy shared by one of the pieces of content according to the restrictions in the second authorization file. 24twenty four
TW95137610A 2006-10-12 2006-10-12 Content protection system and method for enabling secure sharing of copy-protected content TWI317083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95137610A TWI317083B (en) 2006-10-12 2006-10-12 Content protection system and method for enabling secure sharing of copy-protected content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95137610A TWI317083B (en) 2006-10-12 2006-10-12 Content protection system and method for enabling secure sharing of copy-protected content

Publications (2)

Publication Number Publication Date
TW200817971A TW200817971A (en) 2008-04-16
TWI317083B true TWI317083B (en) 2009-11-11

Family

ID=44769469

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95137610A TWI317083B (en) 2006-10-12 2006-10-12 Content protection system and method for enabling secure sharing of copy-protected content

Country Status (1)

Country Link
TW (1) TWI317083B (en)

Also Published As

Publication number Publication date
TW200817971A (en) 2008-04-16

Similar Documents

Publication Publication Date Title
US20080040283A1 (en) Content protection system and method for enabling secure sharing of copy-protected content
TWI220620B (en) Method of protecting and managing digital contents and system for using thereof
US8533860B1 (en) Personalized digital media access system—PDMAS part II
US7734551B1 (en) Redistribution of rights-managed content and technique for encouraging same
US7933837B2 (en) Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program
US7908219B2 (en) Inbox management
KR100493900B1 (en) Method for Sharing Rights Object Between Users
CN1292376C (en) Method and system for digital rights management in content distribution applications
US7366915B2 (en) Digital license with referral information
US20020107806A1 (en) Content usage management system and content usage management method
US20110099382A1 (en) Personalized digital media access system (pdmas)
US20080109911A1 (en) Send/Lend Business Rights
US20080167994A1 (en) Digital Inheritance
KR20140109905A (en) Content provider with multi-device secure application integration
KR20050045883A (en) Content sharing system, content processing apparatus, information processing apparatus, program, recording medium, and content sharing method
CN104077501B (en) Interoperable keychest
JP2004046856A (en) Method for obtaining digital license corresponding to digital content
JP2004046790A (en) System for digital contents protection and management
JP2002342518A (en) System and method for contents use management
JP2004038974A (en) System and method for issuing usage license for digital content and service
JP2003058657A (en) Server and method for license management
JP2011523113A (en) Digital content library service
JP2000298689A (en) Method and device for managing digital writing, recording device and reproduction device
JP4664058B2 (en) Content distribution system and method
Capobianco Rethinking ReDigi: How a Characteristics-Based Test Advances the Digital First Sale Doctrine Debate