US20010042043A1 - Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances - Google Patents

Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances Download PDF

Info

Publication number
US20010042043A1
US20010042043A1 US08848077 US84807797A US2001042043A1 US 20010042043 A1 US20010042043 A1 US 20010042043A1 US 08848077 US08848077 US 08848077 US 84807797 A US84807797 A US 84807797A US 2001042043 A1 US2001042043 A1 US 2001042043A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
rights
example
information
disk
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US08848077
Inventor
Victor H. Shear
W. Olin Sibert
David M. VanWie
Robert P. Weber
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intertrust Technologies Corp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement, balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/023Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] characterized in that the neutral party is a clearing house
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0273Fees for advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/188Electronic negotiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/02Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus
    • G07F9/026Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus for alarm, monitoring and auditing in vending machines or means for indication, e.g. when empty
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communication involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • H04N21/23476Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data, processing content descriptors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/236Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a Uniform Resource Locator [URL] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
    • H04N21/2362Generation or processing of Service Information [SI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2543Billing, e.g. for subscription services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2543Billing, e.g. for subscription services
    • H04N21/2547Third Party Billing, e.g. billing of advertiser
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/414Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
    • H04N21/4143Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance embedded in a Personal Computer [PC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Characteristics of or Internal components of the client
    • H04N21/42646Characteristics of or Internal components of the client for reading from or writing on a non-volatile solid state storage medium, e.g. DVD, CD-ROM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/432Content retrieval operation from a local storage medium, e.g. hard-disk
    • H04N21/4325Content retrieval operation from a local storage medium, e.g. hard-disk by playing back content from the storage medium
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/434Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams, extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
    • H04N21/4345Extraction or processing of SI, e.g. extracting service information from an MPEG stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/435Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44204Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB, power management in an STB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • H04N21/4753End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for user identification, e.g. by entering a PIN or password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/60Selective content distribution, e.g. interactive television, VOD [Video On Demand] using Network structure or processes specifically adapted for video distribution between server and client or between remote clients; Control signaling specific to video distribution between clients, server and network components, e.g. to video encoder or decoder; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6581Reference data, e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8166Monomedia components thereof involving executable data, e.g. software
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • H04N21/83555Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed using a structured language for describing usage rules of the content, e.g. REL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0797Indexing scheme relating to G06F21/10, protecting distributed programs or content using dedicated hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • G06Q2220/16Copy protection or prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Abstract

A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations. A secure “software container” can be used to protectively encapsulate (e.g., by cryptographic techniques) various digital property content (e.g., audio, video, game, etc.) and control object (i.e., set of rules) information. A standardized container format is provided for general use on/with various mediums and platforms. In addition, a special purpose container may be provided for DVD medium and appliances (e.g., recorders, players, etc.) that contains DVD program content (digital property) and DVD medium specific rules. The techniques, systems and methods disclosed herein are capable of achieving compatibility with other protection standards, such as for example, CGMA and Matsushita data protection standards adopted for DVDs. Cooperative rights management may also be provided, where plural networked rights management arrangements collectively control a rights management event on one or more of such arrangements.

Description

  • [0001]
    PCT Application ______ No. filed ______, 1997 entitled “Steganographic Techniques For Securely Delivering Electronic Digital Rights Management Control Information Over Insecure Communications Channels,” which corresponds to U.S. patent application Ser. No. 08/689,606 of Van Wie and Weber filed on Aug. 12, 1996 (hereinafter “Van Wie and Weber”); and
  • [0002]
    PCT Application No. ______ filed ______ , 1997 based on U.S. patent application Ser. No. 08/689,754 entitled “Systems and Methods Using Cryptography To Protect Secure Computing Environments,” of Sibert and Van Wie filed on Aug. 12, 1996 (hereinafter “Sibert and Van Wie”).
  • FIELD OF THE INVENTION
  • [0003]
    This invention relates to information protection techniques using cryptography, and more particularly to techniques using cryptography for managing rights to information stored on portable media—one example being optical media such as Digital Video Disks (also known as “Digital Versatile Disks” and/or “DVDs”). This invention also relates to information protection and rights management techniques having selectable applicability depending upon, for example, the resources of the device being used by the consumer (e.g., personal computer or standalone player), other attributes of the device (such as whether the device can be and/or typically is connected to an information network (“connected” versus “unconnected”)), and available rights. This invention further relates, in part, to cooperative rights management—where plural networked rights management arrangements collectively control a rights management event on one or more of such arrangements. Further, important aspects of this invention can be employed in rights management for electronic information made available through broadcast and/or network downloads and/or use of non-portable storage media, either independent of, or in combination with portable media.
  • BACKGROUND OF THE INVENTION
  • [0004]
    The entertainment industry has been transformed by the pervasiveness of home consumer electronic devices that can play video and/or audio from pre-recorded media. This transformation began in the early 1900s with the invention of the phonograph-which for the first time allowed a consumer to listen to his or her favorite band, orchestra or singer in his or her home whenever he or she wishes. The availability of inexpensive video cassette recorders/players beginning in the early 1980s brought about a profound revolution in the movie and broadcast industries, creating an entirely new home consumer market for films, documentaries, music videos, exercise videos, etc.
  • [0005]
    The entertainment industry has long searched for optimal media for distributing content to home consumers. The original phonograph cylinders distributed by Thomas Edison and other phonograph pioneers had the advantage that they were difficult to copy, but suffered from various disadvantages such as high manufacturing costs, low resistance to breakage, very limited playback time, relatively low playback quality, and susceptibility to damage from wear, scratching or melting. Later-developed wax and vinyl disks could hold more music material but suffered from many of the same disadvantages. Magnetic tapes, on the other hand, could be manufactured very inexpensively and could hold a large amount of program material (e.g., 2, 4 or even 6 hours of video and/or audio). Such magnetic tapes could reproduce program material at relatively high quality, and were not as susceptible to damage or wearing out. However, despite the many clear advantages that magnetic tape provides over other media, the entertainment industry has never regarded it as an ideal or optimum medium because of its great susceptibility to copying.
  • [0006]
    Magnetic tape has the very flexible characteristic that it can be relatively easily recorded on. Indeed, the process for recording a magnetic tape is nearly as straightforward as that required for playing back pre-recorded content. Because of the relative ease by which magnetic tape can be recorded, home consumer magnetic tape equipment manufacturers have historically provided dual mode equipment that can both record and play back magnetic tapes. Thus, home audio and video tape players have traditionally had a “record” button that allows a consumer to record his or her own program material on a blank (un-recorded) magnetic tape. While this recording ability has given consumers additional flexibility (e.g., the ability to record a child's first words for posterity, and the ability to capture afternoon soap operas for evening viewing), it has unfortunately also been the foundation of an illegal multi-billion dollar content pirating industry that produces millions of illegal, counterfeit copies every year. This illegal pirating operation-which is international in scope-leeches huge amounts of revenue every year from the world's major entertainment content producers. The entertainment industry must pass along these losses to honest consumers-resulting in higher box office prices, and higher video and audio tape sales and rental prices.
  • [0007]
    In the mid 1980s, the audio entertainment industry developed the optical compact disk as an answer to some of these problems. The optical compact disk-a thin, silvery plastic platter a few inches in diameter-can hold an hour or more of music or other audio programming in digital form. Such disks were later also used for computer data. The disk can be manufactured very inexpensively, and provides extremely high quality playback that is resistant to noise because of the digital techniques used to record and recover the information. Because the optical disk can be made from plastic, it is light weight, virtually unbreakable, and highly resistant to damage from normal consumer handling (unlike the prior vinyl records that were easily scratched or worn down even by properly functioning phonographs). And, because recording on an optical disk is, so far, significantly more difficult than playing back an optical disk, home consumer equipment providing both recording and playback capabilities is unlikely, in the near future, to be as cost-effective as play-only equipment-greatly reducing the potential for illicit copying. Because of these overwhelming advantages, the music industry has rapidly embraced the new digital compact disk technology-virtually replacing older audio vinyl disk media within the space of a few short years.
  • [0008]
    Indeed, the threat of widespread and easy unauthorized copying in the absence of rights management technologies apparently has been an important contributing factor to the demise of digital audio tape (DAT) as a media for music distribution and, more importantly, home audio recording. Rightsholders in recorded music vigorously opposed the widespread commercialization of inexpensive DAT technology that lacked rights management capabilities since the quality of the digital recording was completely faithful to the digital source on, for example, music CDs. Of course, the lack of rights management was not the only factor at work, since compared with optical media, tape format made random access difficult, for example, playing songs out of sequence.
  • [0009]
    The video entertainment industry is on the verge of a revolution similar to that wrought by music CDs based on movies in digital format distributed on high capacity read-only optical media. For example, digital optical disk technology has advanced to the point where it is now possible to digitally record, among other things, a full length motion picture (plus sound) on one side of a 5″ plastic optical disk. This same optical disk can accommodate multiple high-quality digital audio channels (e.g., to record multi-channel “sensurround” sound for home theaters and/or to record film dialog in multiple different languages on the same disk). This same technology makes it possible to access each individual frame or image of a movie for still image reproduction or—even more exciting—to provide an unprecedented “random access” playback capability that has never before existed in home consumer equipment. This “random access” playback could be used, for example, to delete violence, foul language or nudity at time of playback so that parents could select a “PG” playback version of an “R” rated film at the press of a button. The “random access” capability also has exciting possibilities in terms of allowing viewers to interact with the pre-recorded content (e.g., allowing a health enthusiast to select only those portions of an exercise video helpful to a particular day's workout). See, for example, “Applications Requirements for Innovative Video Programming,” DVD Conference Proceedings (Interactive Multimedia Association, Oct. 19-20, 1995, Sheraton Universal Hotel, Universal City, California).
  • [0010]
    Non-limiting examples of the DVD family of optical media include:
  • [0011]
    DVD (Digital Video Disk, Digital Versatile Disk), a non-limiting example of which includes consumer appliances that play movies recorded on DVD disks;
  • [0012]
    DVD-ROM (DVD-Read Only Memory), a nonlimiting example of which includes a DVD read-only drive and disk connected to a computer or other appliance;
  • [0013]
    DVD-RAM (DVD Random Access Memory), a non-limiting example of which includes a read/write drive and optical media in, for example, consumer appliances for home recording and in a computer or other appliance for the broadest range of specific applications; and
  • [0014]
    Any other high capacity optical media presently known or unknown.
  • [0015]
    “DVDs” are, of course, not limited to use with movies. Like CDs, they may also be used for other kinds of information, for example:
  • [0016]
    sound recordings
  • [0017]
    software
  • [0018]
    databases
  • [0019]
    games
  • [0020]
    karaoke
  • [0021]
    multimedia
  • [0022]
    distance learning
  • [0023]
    documentation
  • [0024]
    policies and manuals
  • [0025]
    any kind of digital data or other information
  • [0026]
    any combination of kinds of digital data or other information
  • [0027]
    any other uses presently known or unknown.
  • [0028]
    The broad range of DVD uses presents a technical challenge: how can the information content distributed on such disks, which might be any kind or combination of video, sound, or other data or information broadly speaking, be adequately protected while preserving or even maximizing consumer flexibility? One widely proposed requirement for the new technology(mainly within the context of video), is, to the extent copying is permitted at all, to either: (a) allow a consumer to make a first generation copy of the program content for their own use, but prevent the consumer from making “copies of copies”, or multi-generational copies of a given property (thus keeping.honest people honest); or (b) to allow unlimited copying for those properties that rightsholders do not wish to protect against copying, or which consumers have made themselves.
  • [0029]
    However, providing only such simplistic and limited copy protection in a non-extensible manner may turn out to be extremely shortsighted—since more sophisticated protection and/or rights management objectives (e.g., more robust and selective application of copy protection and other protection techniques, enablement of pay-per-view models, the ability of the consumer to make use of enhanced functionality such as extracting material or interactivity upon paying extra charges, and receiving credit for redistribution, to name a few) could be very useful now or in the future. Moreover, in optimally approaching protection and rights management objectives, it is extremely useful to take differing business opportunities and threats into account that may relate to information delivered via DVD media, for example, depending upon available resources of the device and/or whether the device is connected or unconnected.
  • [0030]
    More sophisticated rights management capabilities will also allow studios and others who have rights in movies and/or sound recordings to better manage these important assets, in one example, to allow authorized parties to repurpose pieces of digital film, video and/or audio, whether specific and/or arbitrary pieces, to create derivative works, multimedia games, in one non-limiting example. Solutions proposed to date for protecting DVD content have generally focused solely on limited copy protection objectives and have failed to adequately address or even recognize more sophisticated rights management objectives and requirements. More specifically, one copy protection scheme for the initial generation of DVD appliances and media is based on an encryption method developed initially by Matsushita and the simple CGMA control codes that indicate permitted copying: a one-generation copy, no copies, or unlimited copying.
  • SUMMARY OF THE INVENTIONS
  • [0031]
    Comprehensive solutions for protecting and managing information in systems that incorporate high capacity optical media such as DVD require, among other things, methods and systems that address two broad sets of problems: (a) digital to analog conversion (and vice versa); and (b) the use of such optical media in both connected and unconnected environments. The inventions disclosed herein address these and other problems. For example, in the context of analog to digital conversion (and vice versa), it is contemplated that, in accordance with the present inventions, at least some of the information used to protect properties and/or describe rights management and/or control information in digital form could also be carried along with the analog signal. Devices that convert from one format and/or medium to another can, for example, incorporate some or all of the control and identifying information in the new context(s), or at least not actively delete such information during the conversion process. In addition, the present inventions provide control, rights management and/or identification solutions for the digital realm generally, and also critically important technologies that can be implemented in consumer appliances, computers, and other devices. One objective of the inventions is to provide powerful rights management techniques that are useful in both the consumer electronics and computer technology markets, and that also enable future evolution of technical capabilities and business models. Another non-limiting objective is to provide a comprehensive control, rights management and/or identification solution that remains compatible, where possible, with existing industry standards for limited function copy protection and for encryption.
  • [0032]
    The present inventions provide rights management and protection techniques that fully satisfy the limited copy protection objectives currently being voiced by the entertainment industry for movies while also flexibly and extensibly accommodating a wide range of more sophisticated rights management options and capabilities.
  • [0033]
    Some important aspects of the present inventions (that are more fully discussed elsewhere in this application) include:
  • [0034]
    Selection of control information associated with information recorded on DVD media (for example, rules and usage consequence control information, that comprise non-limiting example elements of a Virtual Distribution Environment (VDE)) that is based at least in part on class of appliance, for example, type of appliance, available resources and/or rights;
  • [0035]
    Enabling such selected control information to be, at least in part, a subset of control information used on other appliances and/or classes of appliance, or completely different control information;
  • [0036]
    Protecting information output from a DVD device, such as applying rights management techniques disclosed in Ginter et al. and the present application to the signals transmitted using an IEEE 1394 port (or other serial interface) on a DVD player;
  • [0037]
    Creation of protected digital content based on an analog source;
  • [0038]
    Reflecting differing usage rights and/or content availability in different countries and/or regions of the world;
  • [0039]
    Securely managing information on DVD media such that certain portions may be used on one or more classes of appliance (e.g., a standalone DVD player), while other portions may be used on the same or different classes of appliance (e.g., a standalone DVD player or a PC);
  • [0040]
    Securely storing and/or transmitting information associated with payment, auditing, controlling and/or otherwise managing content recorded on DVD media, including techniques related to those disclosed in Ginter et al. and in Shear et al.;
  • [0041]
    Updating and/or replacing encryption keys used in the course of appliance operation to modify the scope of information that may be used by appliances and/or classes of appliances;
  • [0042]
    Protecting information throughout the creation, distribution, and usage process, for example, by initially protecting information collected by a digital camera, and continuing protection and rights management through the editing process, production, distribution, usage, and usage reporting.
  • [0043]
    Allowing “virtual rights machines,” consisting of multiple devices and/or other systems that participate and work together in a permanently or in a temporarily connected network to share some or all of the rights management for a single and/or multiple nodes including, for example, allowing resources available in plural such devices and/or other systems, and/or rights associated with plural parties and/or groups using and/or controlling such devices and/or other systems, to be employed in concert (according to rights related rules and controls) so as to govern one or more electronic events on any one or more of such devices and/or other systems, such event governance including, for example: viewing, editing, subsetting, anthologizing, printing, copying, titling, extracting, saving, and/or redistributing rights protected digital content.
  • [0044]
    Allowing for the exchange of rights among peer-to-peer relating devices and/or other systems, wherein such devices and/or other systems participate in a temporary or permanently connected network, and wherein such rights are bartered, sold for currency, and/or otherwise exchanged for value and/or consideration where such value and/or consideration is exchanged between such peer-to-peer participating commercial and/or consumer devices and/or other systems.
  • [0045]
    General Purpose DVD/Cost-effective Large Capacity Digital Media Rights Protection and Management
  • [0046]
    The inventions described herein can be used with any large capacity storage arrangement where cost-effective distribution media is used for commercial and/or consumer digital information delivery and DVD, as used herein, should be read to include any such system.
  • [0047]
    Copy protection and rights management are important in practical DVD systems and will continue to be important in other large capacity storage, playback, and recording systems, presently known or unknown, in the future. Protection is needed for some or all of the information delivered (or written) on most DVD media. Such protection against copying is only one aspect of rights management. Other aspects involve allowing rightsholders and others to manage their commercial interests (and to have them enforced, potentially at a distance in time and/or space) regardless of distribution media and/or channels, and the particular nature of the receiving appliance and/or device. Such rights management solutions that incorporate DVD will become even more significant as future generations of recordable DVD media and appliances come to market. Rightsholders will want to maintain and assert their rights as, for example, video, sound recordings, and other digital properties are transmitted from one device to another and as options for recording become available in the market.
  • [0048]
    The apparent convergence between consumer appliances and computers, increasing network and modem speeds, the declining cost of computer power and bandwidth, and the increasing capacity of optical media will combine to create a world of hybrid business models in which digital content of all kinds may be distributed on optical media played on at least occasionally connected appliances and/or computers, in which the one-time purchase models common in music CDs and initial DVD movie offerings are augmented by other models, for example, lease, pay per view, and rent to own, to name just few. Consumers may be offered a choice among these and other models from the same or different distributors and/or other providers. Payment for use may happen over a network and/or other communications channel to some payment settlement service. Consumer usage and audit information may flow back to creators, distributors, and/or other participants. The elementary copy protection technologies for DVD now being introduced cannot support these and other sophisticated models.
  • [0049]
    As writable DVD appliances and media become available, additional hybrid models are possible, including, for example, the distribution of digital movies over satellite and cable systems. Having recorded a movie, a consumer may elect a lease, rental, pay-per-view, or other model if available. As digital television comes to market, the ability of writable DVDs to make faithful copies of on-air programming creates additional model possibilities and/or rights management requirements. Here too, simplistic copy protection mechanisms currently being deployed for the initial read-only DVD technologies will not suffice.
  • [0050]
    Encryption is a Means, Not an End
  • [0051]
    Encryption is useful in protecting intellectual properties in digital format, whether on optical media such as DVD, on magnetic media such as disk drives, in the active memory of a digital device and/or while being transmitted across computer, cable, satellite, and other kinds of networks or transmission means. Historically, encryption was used to send secret messages. With respect to DVD, a key purpose of encryption is to require the use of a copy control and rights management system in order to ensure that only those authorized to do so by rightsholders can indeed use the content.
  • [0052]
    But encryption is more of a means, rather than an end. A central issue is how to devise methods for ensuring, to the maximal extent possible, that only authorized devices and parties can decrypt the protected content and/or otherwise use information only to the extent permitted by the rightsholder(s) and/or other relevant parties in the protected content.
  • [0053]
    The Present Inventions
  • [0054]
    The present inventions provide powerful right management capabilities. In accordance with one aspect provided by the present invention, encrypted digital properties can be put on a DVD in a tamper-resistant software “container” such as, for example, a “DigiBox” secure container, together with rules about “no copy” and/or “copy” and/or “numbers of permitted copies” that may apply and be enforced by consumer appliances. These same rules, and/or more flexible and/or different rules, can be enforced by computer devices or other systems that may provide more and/or different capabilities (e.g., editing, excerpting, one or more payment methods, increased storage capability for more detailed audit information, etc.). In addition, the “software container” such as for example, a “DigiBox” secure container, can store certain content in the “clear” (that is, in unencrypted form). For example, movie or music titles, copyright statements, audio samples, trailers, and/or advertising can be stored in the clear and/or could be displayed by any appropriate application or device. Such information could be protected for authenticity (integrity) when available for viewing, copying, and/or other activities. At the same time, valuable digital properties of all kinds-film, video, image, text, software, and multimedia—may be stored at least partially encrypted to be used only by authorized devices and/or applications and only under permitted, for example rightsholder-approved, circumstances.
  • [0055]
    Another aspect provided in accordance with the present invention (in combination with certain capabilities disclosed in Ginter et al.) is that multiple sets of rules could be stored in the same “container” on a DVD disk. The software then applies rules depending on whether the movie, for example, was to be played by a consumer appliance or computer, whether the particular apparatus has a backchannel (e.g., an on-line connection), the national and/or other legal or geographic region in which the player is located and/or the movie is being displayed, and/or whether the apparatus has components capable of identifying and applying such rules. For example, some usage rules may apply when information is played by a consumer device, while other rules may apply when played by a computer. The choice of rules may be left up to the rightsholder(s) and/or other participants—or some rules may be predetermined (e.g., based on the particular environment or application). For example, film rightsholders may wish to limit copying and ensure that excerpts are not made regardless of the context in which the property is played. This limitation might be applied only in certain legal or geographic areas. Alternatively, rightsholders of sound recordings may wish to enable excerpts of predetermined duration (e.g., no more than 20 seconds) and that these excerpts are not used to construct a new commercial work. In some cases, governments may require that only “PG” versions of movies and/or the equivalent rating for TV programs may be played on equipment deployed in their jurisdiction, and/or that the applicable taxes, fees and the like are automatically calculated and/or collected if payments related to content recorded on DVD is requested and/or performed (e.g., pay-per-use of a movie, game, database, software product, etc.; and/or orders from a catalog stored at least in part on DVD media, etc.).
  • [0056]
    In a microprocessor controlled (or augmented) digital consumer appliance, such rules contemplated by the present inventions can be enforced, for example, without requiring more than a relatively few additions to a central, controlling microprocessor (or other CPU, a IEEE 1394 port controller, or other content handling control circuitry), and/or making available some ROM or flash memory to hold the necessary software. In addition, each ROM (or flash or other memory, which such memory may be securely connected to, or incorporated into, such control circuitry in a single, manufactured component) can, in one example, contain one or more digital documents or “certificate(s)” that uniquely identifies a particular appliance, individual identity, jurisdiction, appliance class(es), and/or other chosen parameters. An appliance can, for example, be programmed to send a copy of a digital property to another digital device only in encrypted form and only inside a new, tamper-resistant “software container.” The container may also, for example, carry with it a code indicating that it is a copy rather than an original that is being sent. The device may also put a unique identifier of a receiving device and/or class of devices in the same secure container. Consequently, for example, in one particular arrangement, the copy may be playable only on the intended receiving device, class(es) of devices, and/or devices in a particular region in one non-limiting example and rights related to use of such copy may differ according to these and/or other variables.
  • [0057]
    The receiving device, upon detecting that the digital property is indeed a copy, can, for example, be programmed not to make any additional copies that can be played on a consumer device and/or other class(es) of devices. If a device detects that a digital property is about to be played on a device and/or other class(es) of devices other than the one it was intended for, it can be programmed to refuse to play that copy (if desired).
  • [0058]
    The same restrictions applied in a consumer appliance can, for example, be enforced on a computer equipped to provide rights management protection in accordance with the present inventions. In this example, rules may specify not to play a certain film and/or other content on any device other than a consumer appliance and/or classes of appliances, for example. Alternatively, these same powerful capabilities could be used to specify different usage rules and payment schemes that would apply when played on a computer (and/or in other appliances and/or classes of appliances), as the rightsholder(s) may desire, for example, different pricing based upon different geographic or legal locales where content is played.
  • [0059]
    In addition, if “backchannels” are present-for example, settop boxes with bi-directional communications or computers attached to networks—the present inventions contemplate electronic, independent delivery of new rules if desired or required for a given property. These new rules may, for example, specify discounts, time-limited sales, advertising subsidies, and/or other information if desired. As noted earlier, determination of these independently delivered rules is entirely up to the rightsholder(s) and/or others in a given model.
  • [0060]
    The following are two specific examples of a few aspects of the present invention discussed above:
  • [0061]
    1. An Analog to Digital Copying Example
  • [0062]
    a) Bob has a VHS tape he bought (or rented) and wants to make a copy for his own use. The analog film has copy control codes embedded so that they do not interfere with the quality of the signal. Bob has a writable DVD appliance that is equipped to provide rights management protection in accordance with the present invention. Bob's DVD recorder detects the control codes embedded in the analog signal (for example, such recorder may detect watermarks and/or fingerprints carrying rights related control and/or usage information), creates a new secure container to hold the content rules and describe the encoded film, and creates new control rules (and/or delivers to a secure VDE system for storage and reporting certain usage history related information such as user name, time, etc.) based on the analog control codes and/or other information it detected and that are then placed in the DigiBox and/or into a secure VDE installation data store such as a secure data base. Bob can play that copy back on his DVD appliance whenever he chooses.
  • [0063]
    b) Bob gives the DVD disk he recorded to Jennifer who wishes to play it on computer that has a DVD drive. Her computer is equipped to provide rights management protection in accordance with the present invention. Her computer opens the “DigiBox,” detects that this copy is being used on a device different from the one that recorded it (an unauthorized device) and refuses to play the copy.
  • [0064]
    c) Bob gives the DVD disk to Jennifer as before, but now Jennifer contacts electronically a source of new rules and usage consequences, which might be the studio, a distributor, and/or a rights and permissions clearinghouse, (or she may have sufficient rights already on her player to play the copy). The source sends a DigiBox container to Jennifer with rules and consequences that permit playing the movie on her computer while at the same time charging her for use, even though the movie was recorded on DVD by Bob rather than by the studio or other value chain participant.
  • [0065]
    2. A Digital to Analog Copying Example
  • [0066]
    a) Jennifer comes home from work, inserts a rented or owned DVD into a player connected to, or an integral part of her TV, and plays the disk. In a completely transparent way, the film is decrypted, the format is converted from digital to analog, and displayed on her analog TV.
  • [0067]
    b) Jennifer wishes to make a copy for her own use. She plays the film on an DVD device incorporating rights management protection in accordance with the present invention, that opens the DigiBox secure container, accesses the control information, and decrypts the film. She records the analog version on her VCR which records a high-quality copy.
  • [0068]
    c) Jennifer gives the VCR copy to Doug who wishes to make a copy of the analog tape for his own use, but the analog control information forces the recording VCR to make a lower-quality copy, or may prevent copying. In another non-limiting example, more comprehensive rights management information may be encoded in the analog output using the methods and/or systems described in more detail in the above referenced Van Wie and Weber patent application.
  • [0069]
    In accordance with one aspect provided by this invention, the same portable storage medium, such as a DVD, can be used with a range of different, scaled protection environments providing different protection capabilities. Each of the different environments may be enabled to use the information carried by the portable storage medium based on rights management techniques and/or capabilities supported by the particular environment. For example, a simple, inexpensive home consumer disk player may support copy protection and ignore more sophisticated and complex content rights the player is not equipped to enable. A more technically capable and/or secure platform (e.g., a personal computer incorporating a secure processing component possibly supported by a network connection, or a “smarter” appliance or device) may, for example, use the same portable storage medium and provide enhanced usage rights related to use of the content carried by the medium based on more complicated rights management techniques (e.g., requiring payment of additional compensation, providing secure extraction of selected content portions for excerpting or anthologizing, etc.). For example, a control set associated with the portable storage medium may accommodate a wide variety of different usage capabilities-with the more advanced or sophisticated uses requiring correspondingly more advanced protection and rights management enablement found on some platforms and not others. Lower-capability environments can, as another example, ignore (or not enable or attempt to use) rights in the control set that they don't understand, while higher-capability environments (having awareness of the overall capabilities they provide), may, for example, enable the rights and corresponding protection techniques ignored by the lower-capability environments.
  • [0070]
    In accordance with another aspect provided by the invention, a media- and platform-independent security component can be scaled in terms of functionality and performance such that the elementary rights management requirements of consumer electronics devices are subsets of a richer collection of functionality that may be employed by more advanced platforms. The security component can be either a physical, hardware component, or a “software emulation” of the component. In accordance with this feature, an instance of medium (or more correctly, one version of the content irrespective of media) can be delivered to customers independently of their appliance or platform type with the assurance that the content will be protected. Platforms less advanced in terms of security and/or technical capabilities may provide only limited rights to use the content, whereas more advanced platforms may provide more expansive rights based on correspondingly appropriate security conditions and safeguards.
  • [0071]
    In accordance with a further aspect provided by the present invention, mass-produced, inexpensive home consumer DVD players (such as those constructed, for example, with minimum complexity and parts count) can be made to be compatible with the same DVDs or other portable storage media used by more powerful and/or secure platforms (such as, for example, personal computers) without degrading advanced rights management functions the storage media may provide in combination with the more powerful and/or secure platforms. The rights management and protection arrangement provided and supported in accordance with this aspect of the invention thus supports inexpensive basic copy protection and can further serve as a commercial convergence technology supporting a bridging that allows usage in accordance with rights of the same content by a limited resource consumer device while adequately protecting the content and further supporting more sophisticated security levels and capabilities by (a) devices having greater resources for secure rights management, and/or (b) devices having connectivity with other devices or systems that can supply further secure rights management resources. This aspect of the invention allows multiple devices and/or other systems that participate and work together in a permanently or temporarily connected network to share the rights management for at least one or more electronic events (e.g., managed through the use of protected processing environments such as described in Ginter et al.) occuring at a single, or across multiple nodes and further allows the rights associated with parties and/or groups using and/or controlling such multiple devices and/or other systems to be employed according to underlying rights related rules and controls, this allowing, for example, rights available through a corporate executive's device to be combined with or substitute for, in some manner, the rights of one or more subordinate corporate employees when their computing or other devices of these parties are coupled in a temporary networking relationship and operating in the appropriate context. In general, this aspect of the invention allows distributed rights management for DVD or otherwise packaged and delivered content that is protected by a distributed, peer-to-peer rights management. Such distributed rights management can operate whether the DVD appliance or other electronic information usage device is participating in a permanently or temporarily connected network and whether or not the relationships among the devices and/or other systems participating in the distributed rights management arrangement are relating temporarily or have a more permanent operating relationship. In this way, the same device may have different rights available depending on the context in which that device is operating (e.g., in a corporate environment such as in collaboration with other individuals and/or with groups, in a home environment internally and/or in collaboration with external one or more specified individuals and/or other parties, in a retail environment, in a classroom setting as a student where a student's notebook might cooperate in rights management with a classroom server and/or instructor PC, in a library environment where multiple parties are collaboratively employing differing rights to use research materials, on a factory floor where a hand held device works in collaboration with control equipment to securely and appropriately perform proprietary functions, and so on).
  • [0072]
    For example, coupling a limited resource device arrangement, such as a DVD appliance, with an inexpensive network computer (NC), or a personal computer (PC), may allow an augmenting (or replacing) of rights management capabilities and/or specific rights of parties and/or devices by permitting rights management to be a result of a combination of some or all of the rights and/or rights management capabilities of the DVD appliance and those of an Network or Personal Computer (NC or PC). Such rights may be further augmented, or otherwise modified or replaced by the availability of rights management capabilities provided by a trusted (secure) remote network rights authority.
  • [0073]
    These aspects of the present invention can allow the same device, in this example a DVD appliance, to support different arrays, e.g., degrees, of rights management capabilities, in disconnected and connected arrangements and may further allow available rights to result from the availability of rights and/or rights management capabilities resulting from the combination of rights management devices and/or other systems. This may include one or more combinations of some or all of the rights available through the use of a “less” secure and/or resource poor device or system which are augmented, replaced, or otherwise modified through connection with a device or system that is “more” or “differently” secure and/or resource rich and/or possesses differing or different rights, wherein such connection employs rights and/or management capabilities of either and/or both devices as defined by rights related rules and controls that describe a shared rights management arrangement.
  • [0074]
    In the latter case, connectivity to a logically and/or physically remote rights management capability can expand (by, for example, increasing the available secure rights management resources) and/or change the character of the rights available to the user of the DVD appliance or a DVD appliance when such device is coupled with an NC, personal computer, local server, and/or remote rights authority. In this rights augmentation scenario, additional content portions may be available, pricing may change, redistribution rights may change (e.g., be expanded), content extraction rights may be increased, etc.
  • [0075]
    Such “networking rights management” can allow for a combination of rights management resources of plural devices and/or other systems in diverse logical and/or physical relationships, resulting in either greater or differing rights through the enhanced resources provided by connectivity with one or more “remote” rights authorities. Further, while providing for increased and/or differing rights management capability and/or rights, such a connectivity based rights management arrangement can support multi-locational content availability, by providing for seamless integration of remotely available content, for example, content stored in remote, Internet world wide web-based, database supported content repositories, with locally available content on one or more DVD discs.
  • [0076]
    In this instance, a user may experience not only increased or differing rights but may use both local DVD content and supplementing content (i.e., content that is more current from a time standpoint, more costly, more diverse, or complementary in some other fashion, etc.). In such an instance, a DVD appliance and/or a user of a DVD appliance (or other device or system connected to such appliance) may have the same rights, differing, and/or different rights applied to locally and remotely available content, and portions of local and remotely available content may themselves be subject to differing or different rights when used by a user and/or appliance. This arrangement can support an overall, profound increase in user content opportunities that are seamlessly integrated and efficiently available to users in a single content searching and/or usage activity by exploiting the rights management and content resources of plural, connected arrangements.
  • [0077]
    Such a rights augmenting remote authority may be directly coupled to a DVD appliance and/or other device by modem, or directly or indirectly coupled through the use of an I/O interface, such as a serial 1394 compatible controller (e.g., by communicating between a 1394 enabled DVD appliance and a local personal computer that functions as a smart synchronous or asynchronous information communications interface to such one or more remote authorities, including a local PC or NC or server that serves as a local rights management authority augmenting and/or supplying the rights management in a DVD appliance).
  • [0078]
    In accordance with yet another aspect provided by this invention, rights provided to, purchased, or otherwise acquired by a participant and/or participant DVD appliance or other system can be exchanged among such peer-to-peer relating devices and/or other systems through the use of one or more permenantly or temporarily networked arrangments. In such a case, rights may be bartered, sold, for currency, otherwise exchanged for value, and/or loaned so long as such devices and/or other systems participate in a rights management system, for example, such as the Virtual Distribution Environment described in Ginter, et al., and employ rights transfer and other rights management capabilities described therein. For example, this aspect of the present invention allows parties to exchange games or movies in which they have purchased rights. Continuing the example, an individual might buy some of a neighbor's usage rights to watch a movie, or transfer to another party credit received from a game publisher for the successful superdistribution of the game to several acquaintances, where such credit is transferred (exchanged) to a friend to buy some of the friend's rights to play a different game a certain number of times, etc.In accordance with yet another aspect provided by this invention, content carried by a portable storage medium such as a DVD is associated with one or more encryption keys and a secure content identifier. The content itself (or information required to use the content) is at least partially cryptographically encrypted-with associated decryption keys being required to decrypt the content before the content can be used. The decryption keys may themselves be encrypted in the form of an encrypted key block. Different key management and access techniques may be used, depending on the platform.
  • [0079]
    In accordance with still yet another aspect provided by this invention, electronic appliances that “create” digital content (or even analog content)—e.g., a digital camera/video recorder or audio recorder—can be readily equipped with appropriate hardware and/or software so as to produce content that is provided within a secure container at the outset. For example, content recorded by a digital camera could be immediately packaged in a secure container by the camera as it is recording. The camera could then output content already packaged in a secure container(s). This could preclude the need to encapsulate the content at a later point in time or at a later production stage, thus, saving at least one production-process step in the overall implementation of electronic rights management in accordance with the present invention. Moreover, it is contemplated that the very process of “reading” content for use in the rights management environment might occur at many steps along a conventional production and distribution process (such as during editing and/or the so called “pressing” of a master DVD or audio disk, for example). Accordingly, another significant advantage of the present invention is that rights management of content essentially can be extended throughout and across each appropriate content creation, editing, distribution, and usage stages to provide a seamless content protection architecture that protects rights throughout an entire content life cycle.
  • [0080]
    In one example embodiment, the storage medium itself carries key block decryption key(s) in a hidden portion of the storage medium not normally accessible through typical access and/or copying techniques. This hidden key may be used by a drive to decrypt the encrypted key block—such decrypted key block then being used to selectively decrypt content and related information carried by the medium. The drive may be designed in a secure and tamper-resistant manner so that the hidden keys are never exposed outside of the drive to provide an additional security layer.
  • [0081]
    In accordance with another example embodiment, a video disk drive may store and maintain keys used to decrypt an encrypted key block. The key block decryption keys may be stored in a drive key store, and may be updatable if the video disk drive may at least occasionally use a communications path provided, for example, by a set top box, network port or other communications route.
  • [0082]
    In accordance with a further example embodiment, a virtual distribution environment secure node including a protected processing environment such as a hardware-based secure processing unit may control the use of content carried by a portable storage medium such as a digital video disk in accordance with control rules and methods specified by one or more secure containers delivered to the secure node on the medium itself and/or over an independent communications path such as a network.
  • [0083]
    Certain conventional copy protection for DVD currently envisions CGMA copy protection control codes combined with certain encryption techniques first proposed apparently by Matsushita Corporation. Notwithstanding the limited benefits of this approach to digital property protection, the present invention is capable of providing a supplementary, compatible, and far more comprehensive rights management system while also providing additional and/or different options and solutions. The following are some additional examples of advantageous features provided in accordance with the inventions:
  • [0084]
    Strong security to fully answer content supplier needs.
  • [0085]
    Value chain management automation and efficiencies including distributed rights protection, “piece of the tick” payment disaggregation to value chain participants, cost-effective micro-transaction management, and superdistribution, including offline micropayment and microtransaction support for at least occasionally connected devices.
  • [0086]
    Simplified, more efficient channel management including support for the use of the same content deliverable on limited resource, greater resource, standalone, and/or connected devices.
  • [0087]
    Can be used with any medium and application type and/or all forms of content and content models—not just compressed video and sound as in some prior techniques and supports the use of copies of the same or materially the same content containers across a wide variety of media delivery systems (e.g., broadcast, Internet repository, optical disc, etc) for operation on a wide variety of different electronic appliances (e.g., digital cameras, digital editing equipment, sound recorders, sound editing equipment, movie theater projectors, DVD appliances, broadcast tape players, personal computers, smart televisions, etc).
  • [0088]
    Asset management and revenue and/or other consideration maximizing through important new content revenue and/or other consideration opportunities and the enhancement of value chain operating efficiencies.
  • [0089]
    Is capable of providing 100% compatibility with the other protection techniques such as, for example, CGMA protection codes and/or Matsushita data scrambling approaches to DVD copy protection.
  • [0090]
    Can be employed with a variety of existing data scrambling or protection systems to provide very high degrees of compatibility and/or level of functionality.
  • [0091]
    Allows DVD technology to become a reusable, programmable, resource for an unlimited variety of entertainment, information commerce, and cyberspace business models.
  • [0092]
    Enables DVD drive and/or semiconductor component manufacturers and/or distributors and/or other value adding participants to become providers of, and rights holders in, the physical infrastructure of the emerging, connected world of the Internet and Intranets where they may charge for the use of a portion (e.g., a portion they provided) of the distributed, physical infrastructure as that portion participates in commercial networks. Such manufacturers and/or distributors and/or other value adding participants can enjoy the revenue benefits resulting from participation in a “piece of the tick” by receiving a small portion of the revenue received as a result of a participating transaction.
  • [0093]
    Provides automated internationalization, regionalization, and rights management in that:
  • [0094]
    DVD content can be supplied with arrays of different rule sets for automatic use depending on rights and identity of the user; and
  • [0095]
    Societal rights, including taxes, can be handled transparently.
  • [0096]
    In addition, the DVD rights management method and apparatus of the present invention provides added benefits to media recorders/publishers in that it:
  • [0097]
    Works with a current “keep honest people honest” philosophy.
  • [0098]
    Can provide 100% compatibility with other protection schemes such as for example, Matsushita data scrambling and/or CGMA encoded discs.
  • [0099]
    Can work with and/or supplement other protection schemes to provide desired degree and/or functionality, or can be used in addition to or instead of other approaches to provide additional and/or different functionality and features.
  • [0100]
    Provides powerful, extensible rights management that reaches beyond limited copy protection models to rights management for the digitally convergent world.
  • [0101]
    Empowers recording/publishing studios to create sophisticated asset management tools.
  • [0102]
    Creates important business opportunities through controlled use of studio properties in additional multimedia contexts.
  • [0103]
    Uniquely ties internationalization, regionalization, superdistribution, repurposing, to content creation processes and/or usage control.
  • [0104]
    Other aspects of the present invention provide benefits to other types of rightsholders, such as for example:
  • [0105]
    Persistent, transparent protection of digital content—globally, through value chain and process layers.
  • [0106]
    Significant reduction in revenue loss from copying and pass-along.
  • [0107]
    Converts “pass-along,” copying, and many forms of copyright infringement from a strategic business threat to a fundamental business opportunity.
  • [0108]
    A single standard for all digital content regardless of media and/or usage locality and other rights variables.
  • [0109]
    Major economies of scale and/or scope across industries, distribution channels, media, and content type.
  • [0110]
    Can support local usage governance and auditing within DVD players allowing for highly efficient micro-transaction support, including multiparty microtransactions and transparent multiparty microtransactions.
  • [0111]
    Empowers rightsholders to employ the broadest range of pricing, business models, and market strategies—as they see fit.
  • [0112]
    Further aspects of the present invention which may prove beneficial to DVD and other digital medium appliance manufacturers are:
  • [0113]
    Capable of providing bit for bit compatibility with existing discs.
  • [0114]
    Content type independent.
  • [0115]
    Media independent and programmable/reusable.
  • [0116]
    Highly portable transition to next generation of appliances having higher density devices and/or a writable DVD and/or other optical media format(s).
  • [0117]
    Participation in revenue flow generated using the appliance.
  • [0118]
    Single extensible standard for all digital content appliances.
  • [0119]
    Ready for the future “convergent” world in which many appliances are connected in the home using, as one example, IEEE 1394 interfaces or other means (e.g., some appliances will be very much like computers and some computers will be very much like appliances).
  • [0120]
    Aspects of the present inventions provide many benefits to computer and OS manufacturers such as for example:
  • [0121]
    Implementation in computers as an extension to the operating system, via for example, at least one transparent plug-in, and does not require modifications to computer hardware and/or operating systems.
  • [0122]
    Easy, seamless integration into operating systems and into applications.
  • [0123]
    Extremely strong security, especially when augmented with “secure silicon” (i.e., hardware/firmware protection apparatus fabricated on chip).
  • [0124]
    Transforms user devices into true electronic commerce appliances.
  • [0125]
    Provides a platform for trusted, secure rights management and event processing.
  • [0126]
    Programmable for customization to specialized requirements.
  • [0127]
    Additional features and advantages provided in accordance with the inventions include, for example:
  • [0128]
    Information on the medium (for example, both properties and metadata) may be encrypted or not.
  • [0129]
    Different information (for example, properties, metadata) may be encrypted using different keys. This provides greater protection against compromise, as well as supporting selective usage rights in the context of a sophisticated rights management system.
  • [0130]
    There may be encrypted keys stored on the medium, although this is not required. These keys may be used to decrypt the protected properties and metadata. Encrypted keys are likely to be used because that allows more keying material for the information itself, while still keeping access under control of a single key.
  • [0131]
    Multiple sets of encrypted keys may be stored on the medium, either to have different sets of keys associated with different information, or to allow multiple control regimes to use the same information, where each control regime may use one or more different keys to decrypt the set of encrypted keys that it uses.
  • [0132]
    To support the ability of the player to access rights managed containers and/or content, a decryption key for the encrypted keys may be hidden on the medium in one or more locations that are not normally accessible. The “not normally accessible” location(s) may be physically enabled for drives installed in players, and disabled for drives installed in computers. The enablement may be different firmware, a jumper on the drive, etc.
  • [0133]
    The ability of the player to access rights managed containers and/or content may also be supported by one or more stored keys inside the player that decrypts certain encrypted keys on the medium.
  • [0134]
    Keys in a player may allow some players to play different properties than others. Keys could be added to, and/or deleted from the player by a network connection (e.g., to a PC, a cable system, and/or a modem connection to a source of new and/or additional keys and/or key revocation information) or automatically loaded by “playing” a key distribution DVD.
  • [0135]
    Controlling computer use may be supported by some or all of the same techniques that control player use of content and/or rights managemnt information.
  • [0136]
    Controlling computer use of content and/or rights management information may be supported by having a computer receive, through means of a trusted rights management system, one or more appropriate keys.
  • [0137]
    A computer may receive additional keys that permit decryption of certain encrypted keys on the medium.
  • [0138]
    A computer may receive additional keys that permit decryption of one or more portions of encrypted data directly. This may permit selective use of information on the medium without disclosing keys (e.g., a player key that decrypts any encrypted keys).
  • [0139]
    In accordance with further aspects provided by the present invention, a secure “software container” is provided that allows:
  • [0140]
    Cryptographically protected encapsulation of content, rights rules, and usage controls.
  • [0141]
    Persistent protection for transport, storage, and value chain management.
  • [0142]
    Sophisticated rules interface architecture.
  • [0143]
    Elements can be delivered independently, such as new controls, for example, regarding discount pricing (e.g. sale pricing, specific customer or group discounts, pricing based on usage patterns, etc.) and/or other business model changes, can be delivered after the property has been distributed (this is especially beneficial for large properties or physical distribution media (e.g., DVD, CD-ROM) since redistribution costs may be avoided and consumers may continue to use their libraries of discs). In addition, encrypted data can be located “outside” the container. This can allow, for example, use of data stored independently from the controls and supports “streaming” content as well as “legacy” systems (e.g., CGMS).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0144]
    These and other features and advantages provided in accordance with these inventions may be better and more completely understood by referring to the following detailed description of presently preferred examples in conjunction with the drawings, of which:
  • [0145]
    [0145]FIG. 1A shows example home consumer electronics equipment for using portable storage media such as digital video disks;
  • [0146]
    [0146]FIG. 1B shows example secure node equipment for using the same portable storage media but providing more advanced rights management capabilities;
  • [0147]
    [0147]FIG. 1C shows an example process for manufacturing protected optical disks;
  • [0148]
    [0148]FIG. 2A shows an example architecture of the FIG. 1A consumer electronics equipment;
  • [0149]
    [0149]FIG. 2B shows an example architecture for the FIG. 1B secure node equipment;
  • [0150]
    [0150]FIG. 3 shows example data structures used by the FIG. 1A equipment;
  • [0151]
    [0151]FIG. 3A and 3B show example control set definitions;
  • [0152]
    [0152]FIGS. 4A and 4B show example usage techniques provided by the FIG. 1A appliance;
  • [0153]
    [0153]FIG. 5 shows example data structures used by the FIG. 1B secure node for accessing information on the storage medium;
  • [0154]
    [0154]FIG. 6 shows an example usage technique performed by the FIG. 1B secure node;
  • [0155]
    [0155]FIG. 7 is a block diagram illustrating an example of a special secure software container contained on a DVD;
  • [0156]
    [0156]FIG. 8 is a block diagram illustrating an example of a secure container along with the video property content stored on a DVD medium;
  • [0157]
    [0157]FIG. 9 is a block diagram illustrating another example of a standard container stored on a DVD medium including an additional container having a more complex rule arrangement for use, for example, with a secure node;
  • [0158]
    [0158]FIG. 10 shows an example use of a DVD having a container (i.e., stored on the medium) with a DVD player provided with a secure rights management node, and also shows use of the same DVD with a DVD player that does not have a secure rights management node;
  • [0159]
    [0159]FIG. 11 is a block diagram illustrating use of a DVD that does not have a container on a DVD player that is provided with rights management secure node in accordance with the present invention as compared with use of the same DVD with a DVD player that does not have a secure node;
  • [0160]
    FIGS. 12-14 show example network configurations; and
  • [0161]
    FIGS. 15A-15C show an example virtual rights process.
  • DETAILED DESCRIPTION OF PRESENTLY PREFERRED EXAMPLE EMBODIMENTS Overall Example Digital Video Disk Usage System
  • [0162]
    [0162]FIG. 1A shows example inexpensive mass-produced home consumer electronics equipment 50 for using information stored on a storage medium 100 such as a portable digitally-encoded optical disk (e.g., a digital video disk or “DVD”). Consumer equipment 50 includes a dedicated disk player 52, that in some embodiments, may also have the capability to write optical media (writeable DVD disks, or “DVD-RAM”) for example) as well, connected to a home color television set 54. A remote control unit 56 may be used to control the disk player 52 and/or television set 54.
  • [0163]
    In one example, disk 100 may store a feature length motion picture or other video content. Someone wishing to watch the content stored on disk 100 may purchase or rent the disk, insert the disk into player 52 and use remote control 56 (and/or controls 58 that may be provided on player 52) to control the player to play back the content via home television set 54.
  • [0164]
    In some embodiments, remote control 56 (and/or controls 58 that may be provided on device 52) may be used to control the recording of a movie, for example. Player 52 reads the digitized video and audio information carried by disk 100, converts it into signals compatible with home color television set 54, and provides those signals to the home color television set.
  • [0165]
    In some embodiments, television set 54 (and/or a set top box) provide the video signals to be recorded by device 52 on writable optical media, DVD-RAM in one non-limiting example. Television set 54 produces images on screen 54 a and produces sounds through loudspeakers 54 b based on the signals player 52 provides to the television set.
  • [0166]
    The same disk 100 may be used by a more advanced platform 60 shown in FIG. 1B. Platform 60 may include, for example, a personal computer 62 connected to a display monitor 64, a keyboard 66, a mouse pointing device 68, and a loudspeaker 70. In this example, platform 60 may be able to play back the content stored on disk 100 in the same way as dedicated disk player 52, but may also be capable of more sophisticated and/or advanced uses of the content as enabled by the presence of secure node 72 within the platform. (In some embodiments, platform 60 may also be able to record content on writable optical media, DVD-RAM, in one non-limiting example.) For example, it may be possible, using platform 60 and its secure node 72, to interactively present the motion picture or other content such that the user may input choices via keyboard 66 and/or mouse pointing device 68 that, in real time, change the presentation provided via display 64 and loudspeaker 60.
  • [0167]
    As one example, the platform 60 user selects from options displayed on display 64 that cause the content presentation sequence to change (e.g., to provide one of a number of different endings, to allow the user to interactively control the flow of the images presented, etc.). Computer 62 may also be capable of using and manipulating digital data including for example computer programs and/or other information stored on disk 100 that player 52 cannot handle.
  • [0168]
    Secure node 72 provides a secure rights management facility that may, for example, permit more invasive or extensive use of the content stored on disk. For example, dedicated player 52 may prevent any copying of content stored by disk 100, or it may allow the content to be copied only once and never again. Platform 60 including secure node 72, on the other hand, may allow multiple copies of some or all of the same content-but only if certain conditions are met (e.g., the user of equipment 60 falls within a certain class of people, compensation at an agreed on rate is securely provided for each copy made, only certain excerpts of the content are copied, a secure audit trail is maintained and reported for each copy so made, etc.). (In some embodiments, dedicated player 52 may send protected content only to devices authenticated as able to enforce securely rights management rules and usage consequences. In some embodiments, devices may authenticate using digital certificates, one non-limiting example being certificates conforming to the X.509 standard.) Hence, platform 60 including secure node 72 can, in this example, use the content provided by disk 100 in a variety of flexible, secure ways that are not possible using dedicated player 52—or any other appliance that does not include a secure node.
  • Example Secure Disk Creation and Distribution Process
  • [0169]
    [0169]FIG. 1C shows an example secure process for creating a master multimedia DVD disk 100 for use with players 50, 60. In this example, a digital camera 350 converts light images (i.e., pictures) into digital information 351 representing one or a sequence of images. Digital camera 350 in this example includes a secure node 72A that protects the digital information 351 before it leaves camera 350. Such protection can be accomplished, for example, by packaging the digital information within one or more containers and/or associating controls with the digital information.
  • [0170]
    In this example, digital camera 350 provides the protected digital image information 351 to a storage device such as, for example, a digital tape recorder 352. Tape recorder 352 stores the digital image information 351 (along with any associated controls) onto a storage medium such as magnetic tape cartridge 354 for example. Tape recorder 352 may also include a secure node 72B. Secure node 72B in this example can understand and enforce the controls that the digital camera secure node 72A applies to and/or associated with the digital information 351, and/or it may apply its own controls to the stored information.
  • [0171]
    The same or different tape recorder 352 may play back protected digital information 351 to a digital mixing board 356. Digital mixing board 356 may mix, edit, enhance or otherwise process the digital information 351 to generate processed digital information 358 representing one or a sequence of images. Digital mixing board 356 may receive additional inputs from other devices such as for example other tape recorders, other digital cameras, character generators, graphics generators, animators, or any other image-based devices. Any or all of such devices may also include secure nodes 72 to protect the information they generate. In some embodiments, some of the digital information can be derived from equipment including a secure node, and other digital information can be derived from equipment that has no secure node. In still other embodiments, some of the digital information provided to digital mixer 356 is protected and some is not protected.
  • [0172]
    Digital mixing board 356 may also include a secure node 72C in this example. The digital mixing board secure node 72C may enforce controls applied by digital camera secure node 72A and/or tape recorder secure node 72B, and/or it may add its own protections to the digital information 358 it generates.
  • [0173]
    In this example, an audio microphone 361 receives sound and converts the sound into analog audio signals. The audio signals in this example are inputted to a digital audio tape recorder 362. In the example shown, tape recorder 362 and audio mixer 364 are digital devices. However, in other embodiments, one, the other or both of these devices may operate in the analog domain. In the example shown, digital audio tape recorder 362 converts the analog audio signals into digital information representing the sounds, and stores the digital information (and any associated controls) onto a tape 362.
  • [0174]
    In this example, audio tape recorder 362 includes a secure node 72E that may associate controls with the information stored on tape 363. Such controls may be stored with the information on the tape 363. In another embodiment, microphone 361 may include its own internal secure node 72 that associates control information with the audio information (e.g., by steganographically encoding the audio information with control information). The tape recorder 362 may enforce such controls applied by microphone 361.
  • [0175]
    Alternatively, microphone 361 may operate in the digital domain and provide digital representations of audio, perhaps including control information supplied by secure node 72 optionally incorporated in microphone 361, directly to connected devices such as audio tape recorder 362. Digital representations may optionally be substituted for analog representations of any signals between the devices in the example FIG. 1 C.
  • [0176]
    The same or different tape recorder 362 may play back the information recorded on tape 363, and provide the information 366 to an audio mixer 364. Audio mixer 364 may edit, mix, or otherwise process the information 366 to produce information 368 representing one or a sequence of sounds. Audio mixer 364 may also receive inputs from other devices such as for example other tape recorders, other microphones, sound generators, musical synthesizers, or any other audio-based devices. Any or all of such devices may also include secure nodes 72 to protect the information they generate. In some embodiments, some of the digital information is derived from equipment including a secure node, and other digital information is derived from equipment that has no secure node. In still other embodiments, some of the digital information provided to audio mixer 364 is protected and some is not protected.
  • [0177]
    Audio mixer 364 in this example includes a secure node 72F that enforces the controls, if any, applied by audio tape recorder secure node 72E; and/or applies its own controls.
  • [0178]
    Digital image mixer 356 may provide digital information 358 to “DVD-RAM” equipment 360 that is capable of writing to master disks 100 and/or to disks from which master dicks may be created Similarly, audio mixer 364 may provide digital information 368 to equipment 360. Equipment 360 records the image information 358 and audio information 368 onto master disk 100. In this example, equipment 360 may include a secure node 72D that enforces controls applied by digital camera secure node 72A, tape recorder secure node 72B, digital mixer secure node 72C audio tape recorder secure node 72E and/or audio mixer secure node 72F; and/or it may add its own protections to the digital information 358 it writes onto master disks 100. A disk manufacturer can then mass-produce disks 100(1)-100(N) based on the master disk 100 using conventional disk mass-production equipment for distribution through any channels (e.g., video and music stores, websites, movie theaters, etc.). Consumer appliances 50 shown in FIGS. 1A and 1B may play back the disks 100—enforcing the controls applied to the information stored on the disks 100. Secure nodes 72 thus maintain end-to-end, persistent secure control over the images generated by digital camera 350 and the sounds generated by microphone 361 during the entire process of making, distributing and using disks 100.
  • [0179]
    In the FIG. 1C example shown, the various devices may communicate with one another over so-called “IEEE 1394” high-speed digital serial busses. In this context, “IEEE 1394” refers to hardware and software standards set forth in the following standards specification incorporated by reference herein: 1394-1995 IEEE Standard for a High Performance Serial Bus, No. 1-55937-583-3 (Institute of Electrical and Electronics Engineers 1995). This specification describes a high-speed memory mapped digital serial bus that is self-configuring, hot pluggable, low cost and scalable. The bus supports isochronous and asynchronous transport at 100, 200 or 400 Mbps, and flexibly supports a number of different topologies. The specification describes a physical level including two power conductors and two twisted pairs for signalling. The specification further describes physical, link and transaction layer protocols including serial bus management. Alternatively, any other suitable electronic communication means may be substituted for the “IEEE 1394” medium shown in FIG. 1C, including other wired media (e.g., Ethernet, universal serial bus), and/or wireless media based on radio-frequency (RF) transmission, infra-red signals, and/or any other means and/or types of electronic communication.
  • Example Dedicated Player Architecture
  • [0180]
    [0180]FIG. 2A shows an example architecture for dedicated player 52. In this example, player 52 includes a video disk drive 80, a controller 82 (e.g., including a microprocessor 84, a memory device such as a read only memory 86, and a user interface 88), and a video/audio processing block 90. Video disk drive 80 optically and physically cooperates with disk 100, and reads digital information from the disk. Controller 82 controls disk drive 80 based on program instructions executed by microprocessor 84 and stored in memory 86 (and further based on user inputs provided by user interface 88 which may be coupled to controls 58 and/or remote control unit 56). Video/audio processing block 90 converts digital video and audio information read by disk drive 80 into signals compatible with home color television set 54 using standard techniques such as video and audio decompression and the like. Video/audio processing block 90 may also insert a visual marking indicating the ownership and/or protection of the video program. Block 90 may also introduce a digital marking indicating to a standard recording device that the content should not be recorded.
  • Example Secure Node Architecture
  • [0181]
    [0181]FIG. 2B shows an example architecture for platform 60 shown in FIG. 1B—which in this example is built around a personal computer 62 but could comprise any number of different types of appliances. In this example, personal computer 62 may be connected to an electronic network 150 such as the Internet via a communications block 152. Computer equipment 62 may include a video disk drive 80′ (which may be similar or identical to the disk drive 80 included within example player 52). Computer equipment 62 may further include a microprocessor 154, a memory 156 (including for example random access memory and read only memory), a magnetic disk drive 158, and a video/audio processing block 160. Additionally, computer equipment 62 may include a tamper-resistant secure processing unit 164 or other protected processing environment. Secure node 72 shown in FIG. 1B may thus be provided by a secure processing unit 164, software executing on microprocessor 154, or a combination of the two. Different embodiments may provide secure node 72 using software-only, hardware-only, or hybrid arrangements.
  • [0182]
    Secure node 72 in this example may provide and support a a general purpose Rights Operating System employing reusable kernel and rights language components. Such a commerce-enabling Rights Operating System provides capabilities and integration for advanced commerce operating systems of the future. In the evolving electronic domain, general purpose, reusable electronic commerce capabilities that all participants can rely on will become as important as any other capability of operating systems. Moreover, a rights operating system that provides, among other things, rights and auditing operating system functions can securely handle a broad range of tasks that relate to a virtual distribution environment. A secure processing unit can, for example, provide or support many of the security functions of the rights and auditing operating system functions. The other operating system functions can, for example, handle general appliance functions. The overall operating system may, for example, be designed from the beginning to include the rights and auditing operating system functions plus the other operating system functions, or the rights and auditing operating system functions may, in another example, be an add-on to a preexisting operating system providing the other operating system functions. Any or all of these features may be used in combination with the invention disclosed herein.
  • Example Disk Data Structures and Associated Protections
  • [0183]
    [0183]FIG. 3 shows some example data structures stored on disk 100. In this example, disk 100 may store one or more properties or other content 200 in protected or unprotected form. Generally, in this example, a property 200 is protected if it is at least in part encrypted and/or associated information needed to use the property is at least in part encrypted and/or otherwise unusable without certain conditions having being met. For example, property 200(1) may be completely or partially encrypted using conventional secure cryptographic techniques. Another property 200(2) may be completely unprotected so that it can be used freely without any restriction. Thus, in accordance with this example, disk 100 could store both a movie as a protected property 200(1) and an unprotected interview with the actors and producers or a “trailer” as unprotected property 200(2). As shown in this example, disk 100 may store any number of different properties 200 in protected or unprotected form as limited only by the storage capacity of the disk.
  • [0184]
    In one example, the protection mechanisms provided by disk 100 may use any or all of the protection (and/or other) structures and/or techniques described in the above-referenced Shear patents. The Shear patents describe, by way of non-exhaustive example, means for solving the problem of how to protect digital content from unauthorized use. For example, the Shear patent specifications describe, among other things, means for electronically “overseeing”—through distributed control nodes present in client computers—the use of digital content. This includes means and methods for fulfilling the consequences of any such use.
  • [0185]
    Non-limiting examples of certain elements described in the Shear patent specifications include:
  • [0186]
    (a) decryption of encrypted information,
  • [0187]
    (b) metering,
  • [0188]
    (c) usage control in response to a combination of derived metering information and rules set by content providers,
  • [0189]
    (d) securely reporting content usage information,
  • [0190]
    (e) use of database technology for protected information storage and delivery,
  • [0191]
    (f) local secure maintenance of budgets, including, for example, credit budgets,
  • [0192]
    (g) local, secure storage of encryption key and content usage information,
  • [0193]
    (h) local secure execution of control processes, and
  • [0194]
    (i) in many non-limiting instances, the use of optical media.
  • [0195]
    Any or all of these features may be used in combination in or with the inventions disclosed herein.
  • [0196]
    Certain of the issued Shear patents′ specifications also involve database content being local and remote to users. Database information that is stored locally at the end-user's system and complemented by remote, “on-line” database information, can, for example, be used to augment the local information, which in one example, may be stored on optical media (for example, DVD and/or CD-ROM). Special purpose semiconductor hardware can, for example, be used to provide a secure execution environment to ensure a safe and reliable setting for digital commerce activities.
  • [0197]
    The Shear patents also describe, among other things, database usage control enabled through the use of security, metering, and usage administration capabilities. The specifications describe, inter alia, a metering and control system in which a database, at least partially encrypted, is delivered to a user (e.g., on optical media). Non-limiting examples of such optical media may, for example, include DVD and CD-ROM. Subsequent usage can, for example, be metered and controlled in any of a variety of ways, and resulting usage information can be transmitted to a responsible party (as one example).
  • [0198]
    The Shear patent specifications also describe the generation of a bill in response to the transmitted information. Other embodiments of the Shear patents provide, for example, unique information security inventions which involve, for example, digital content usage being limited based on patterns of usage such as the quantity of particular kinds of usage. These capabilities include monitoring the “contiguousness,” and/or “logical relatedness” of used information to ensure that the electronic “conduct” of an individual does not exceed his or her licensed rights. Still other aspects of the Shear patents describe, among other things, capabilities for enabling organizations to securely and locally manage electronic information usage rights. When a database or a portion of a database is delivered to a client site, some embodiments of the Shear patents provide, for example, optical storage means (non-exhaustive examples of which include DVD and CD-ROM) as the mechanism of delivery. Such storage means can store, for example, a collection of video, audio, images, software programs, games, etc., in one example, on optical media, such as DVD and/or CD-ROM, in addition to other content such as a collection of textual documents, bibliographic records, parts catalogs, and copyrighted or uncopyrighted materials of all kinds. Any or all of these features may be used in the embodiments herein.
  • [0199]
    One specific non-limiting embodiment could, for example, involve a provider who prepares a collection of games. The provider prepares a database “index” that stores information pertaining to the games, such as for example, the name, a description, a creator identifier, the billing rates, and the maximum number of times or total elapsed time each game may be used prior to a registration or re-registration requirement. Some or all of this information could be stored in encrypted form, in one example, on optical media, non-limiting examples of which include DVD and CD-ROM. The provider may then encrypt some or all portions of the games such that a game could not be used unless one or more encrypted portions were decrypted. Typically, decryption would not occur unless provider specified conditions were satisfied, in one example, unless credit was available to compensate for use and audit information reflecting game usage was being stored. The provider could determine, for example: which user activities he or she would allow, whether to meter such activities for audit and/or control purposes, and what, if any, limits would be set for allowed activities. This might include, for example, the number of times that a game is played, and the duration of each play. Billing rates might be discounted, for example, based on total time of game usage, total number of games currently registered for use, or whether the customer was also registered for other services available from the same provider, etc.
  • [0200]
    In the non-limiting example discussed above, a provider might, for example, assemble all of the prepared games along with other, related information, and publish the collection on optical media, non-limiting examples of which include CD-ROM and/or DVD. The provider might then distribute this DVD disk to prospective customers. The customers could then select the games they wish to play, and contact the provider. The provider, based on its business model, could then send enabling information to each authorized customer, such as for example, including, or enabling for use, decryption keys for the encrypted portion of the selected games (alternatively, authorization to use the games may have arrived with the DVD and/or CD-ROM disk, or might be automatically determined, based on provider set criteria, by the user's secure client system, for example, based on a user's participation in a certified user class). Using the user's client decryption and metering mechanism the customer could then make use of the games. The mechanism might then record usage information, such as for example, the number of times the game was used, and, for example, the duration of each play. It could periodically transmit this information the game provider, thus substantially reducing the administration overhead requirements of the provider's central servers. The game provider could receive compensation for use of the games based upon the received audit information. This information could be used to either bill their customers or, alternatively, receive compensation from a provider of credit.
  • [0201]
    Although games provide one convenient, non-limiting example, many of these same ideas can be easily applied to all kinds of content, all kinds of properties, including, by way of nonlimiting examples:
  • [0202]
    video,
  • [0203]
    digitized movies,
  • [0204]
    audio,
  • [0205]
    images,
  • [0206]
    multimedia,
  • [0207]
    software,
  • [0208]
    games,
  • [0209]
    any other kind of property
  • [0210]
    any combination of properties.
  • [0211]
    Other non-limiting embodiments of the Shear patent specifications support, for example, securely controlling different kinds of user activities, such as displaying, printing, saving electronically, communicating, etc. Certain aspects further apply different control criteria to these different usage activities. For example, information that is being browsed may be distinguished from information that is read into a host computer for the purpose of copying, modifying, or telecommunicating, with different cost rates being applied to the different activities (so that, for example, the cost of browsing can be much less than the cost of copying or printing).
  • [0212]
    The Shear patent specifications also, for example, describe management of information inside of organizations by both publishers and the customer. For example, an optional security system can be used to allow an organization to prevent usage of all or a portion of an information base unless the user enters his security code. Multiple levels of security codes can be supported to allow restriction of an individual's use according to his security authorization level. One embodiment can, for example, use hardware in combination with software to improve tamper resistance, and another embodiment could employ an entirely software based system. Although a dedicated hardware/software system may under certain circumstances provide assurance against tampering, techniques which may be implemented in software executing on a non-dedicated system may provide sufficient tamper resistance for some applications. Any or all of these features may be used in combination with the technology disclosed in this patent specification.
  • FIG. 3 Disks may also Store Metadata, Controls and Other Information
  • [0213]
    In this example, disk 100 may also store “metadata” in protected and/or unprotected form. Player 52 uses metadata 202 to assist in using one or more of the properties 200 stored by disk 100. For example, disk 100 may store one metadata block 202(1) in unprotected form and another metadata block 202(2) in protected form. Any number of metadata blocks 202 in protected and/or unprotected form may be stored by disk 100 as limited only by the disk's storage capacity. In this example, metadata 202 comprises information used to access properties 200. Such metadata 202 may comprise, for example, frame sequence or other “navigational” information that controls the playback sequence of one or more of the properties 200 stored on disk 100. As one example, an unprotected metadata block 202 may access only selected portions of a protected property 200 to generate an abbreviated “trailer” presentation, while protected metadata block 202 may contain the frame playback sequence for the entire video presentation of the property 200. As another example, different metadata blocks 202 may be provided for different “cuts” of the same motion picture property 200 (e.g., an R-rated version, a PG-rated version, a director's cut version, etc.).
  • [0214]
    In this example, disk 100 may store additional information for security purposes. For example, disk 100 may store control rules in the form of a control set 204—which may be packaged in the form of one or more secure containers 206. Commerce model participants can securely contribute electronic rules and controls that represent their respective “electronic” interests. These rules and controls extend a “Virtual Presence™” through which the commerce participants may govern remote value chain activities according to their respective, mutually agreed to rights. This Virtual Presence may take the form of participant specified electronic conditions (e.g., rules and controls) that must be satisfied before an electronic event may occur. These rules and controls can be used to enforce the party's rights during “downstream” electronic commerce activities. Control information delivered by, and/or otherwise available for use with, VDE content containers may, for example, constitute one or more “proposed” electronic agreements which manage the use and/or consequences of the use of such content and which can enact the terms and conditions of agreements involving multiple parties and their various rights and obligations.
  • [0215]
    The rules and controls from multiple parties can be used, in one example, to form aggregate control sets (“Cooperative Virtual Presence™”) that ensure that electronic commerce activities will be consistent with the agreements amongst value chain participants. These control sets may, for example, define the conditions which govern interaction with protected digital content (disseminated digital content, appliance control information, etc.). These conditions can, for example, be used to control not only digital information use itself, but also the consequences of such use. Consequently, the individual interests of commerce participants are protected and cooperative, efficient, and flexible electronic commerce business models can be formed. These models can be used in combination with the present invention.
  • Disks May Store Encrypted Information
  • [0216]
    Disk 100 may also store an encrypted key block 208. In this example, disk 100 may further store one or more hidden keys 210. In this example, encrypted key block 208 provides one or more cryptographic keys for use in decrypting one or more properties 200 and/or one or more metadata blocks 202. Key block 208 may provide different cryptographic keys for decrypting different properties 200 and/or metadata blocks 202, or different portions of the same property and/or metadata block. Thus, key block 208 may comprise a large number of cryptographic keys, all of which are or may be required if all of the content stored by disk 100 is to be used. Although key block 208 is shown in FIG. 3 as being separate from container 206, it may be included within or as part of the container if desired.
  • [0217]
    Cryptographic key block 208 is itself encrypted using one or more additional cryptographic keys. In order for player 52 to use any of the protected information stored on disk 100, it must first decrypt corresponding keys within the encrypted key block 208—and then use the decrypted keys from the key block to decrypt the corresponding content.
  • [0218]
    In this example, the keys required to decrypt encrypted key block 208 may come from several different (possibly alternative) sources. In the example shown in FIG. 3, disk 100 stores one or more decryption keys for decrypting key block 208 on the medium itself in the form of a hidden key(s) 210. Hidden key(s) 210 may be stored, for example, in a location on disk 100 not normally accessible. This “not normally accessible” location could, for example, be physically enabled for drives 80 installed in players 52 and disabled for drives 80′ installed in personal computers 62. Enablement could be provided by different firmware, a jumper on drive 80, etc. Hidden key(s) 210 could be arranged on disk 100 so that any attempt to physically copy the disk would result in a failure to copy the hidden key(s). In one example a hidden key(s) could be hidden in the bit stream coding sequences for one or more blocks as described by J. Hogan (Josh Hogan, “DVD Copy Protection,” presentation to DVD copy protect technical meeting #4, May 30, 1996, Burbank, Calif.)
  • [0219]
    Alternatively, and/or in addition, keys required to decrypt encrypted key block 208 could be provided by disk drive 80. In this example, disk drive 80 might include a small decryption component such as, for example, an integrated circuit decryption engine including a small secure internal key store memory 212 having keys stored therein. Disk drive 80 could use this key store 212 in order to decrypt encrypted key block 208 without exposing either keys 212 or decrypted key block 208—and then use the decrypted key from key block 208 to decrypt protected content 200, 202.
  • Disks May Store and/or Use Secure Containers
  • [0220]
    In yet another example, the key(s) required to decrypt protected content 200, 202 is provided within secure container 206. FIG. 3A shows a possible example of a secure container 206 including information content 304 (properties 200 and metadata 202 may be external to the container—or alternatively, most or all of the data structures stored by video disk 100 may be included as part of a logical and/or actual protected container). The control set 204 shown in FIG. 3 may comprise one or more permissions record 306, one or more budgets 308 and/or one or more methods 310 as shown in FIG. 3A. FIG. 3B shows an example control set 204 providing one or more encryption keys 208, one or more content identifiers 220, and one or more controls 222. In this example, different controls 222 may apply to different equipment and/or classes of equipment such as player 52 and/or computer equipment 62 depending upon the capabilities of the particular platform and/or class of platform. Additionally, controls 220 may apply to different ones of properties 200 and/or different ones of metadata blocks 202. For example, a control 222(1) may allow property 200(1) to be copied only once for archival purposes by either player 52 or computer equipment 62. A control 222(2) (which may be completely ignored by player 52 because it has insufficient technical and/or security capabilities but which may be useable by computer equipment 62 with its secure node 72) may allow the user to request and permit a public performance of the same property 200(1) (e.g., for showing in a bar or other public place) and cause the user's credit or other account to be automatically debited by a certain amount of compensation for each showing. A third control 222(3) may, for example, allow secure node 72 (but not player 52) to permit certain classes of users (e.g., certified television advertisers and journalists) to extract or excerpt certain parts of protected property 200(1) for promotional uses. A further control 222(4) may, as another example, allow both video player 52 and secure node 72 to view certain still frames within property 200(l)-but might allow only secure node 72 to make copies of the still frames based on a certain compensation level.
  • Example Disks and/or System May Make Use of Trusted Infrastructure
  • [0221]
    Controls 222 may contain pointers to sources of additional control sets for one or more properties, controls, metadata, and/or other content on the optical disk. In one example, these additional controls may be obtained from a trusted third party, such as a rights and permissions clearinghouse and/or from any other value chain participant authorized by at least one rightsholder to provide at least one additional control set. This kind of rights and permissions clearinghouse is one of several distributed electronic administrative and support services that may be referred to as the “Distributed Commerce Utility,” which, among other things, is an integrated, modular array of administrative and support services for electronic commerce and electronic rights and transaction management. These administrative and support services can be used to supply a secure foundation for conducting financial management, rights management, certificate authority, rules clearing, usage clearing, secure directory services, and other transaction related capabilities functioning over a vast electronic network such as the Internet and/or over organization internal Intranets, or even in-home networks of electronic appliances. Nonlimiting examples of these electronic appliances include at least occasionally connected optical media appliances, examples of which include read-only and/or writable DVD players and DVD drives in computers and convergent devices, including, for example, digital televisions and settop boxes incorporating DVD drives.
  • [0222]
    These administrative and support services can, for example, be adapted to the specific needs of electronic commerce value chains in any number of vertical markets, including a wide variety of entertainment applications. Electronic commerce participants can, for example, use these administrative and support services to support their interests, and/or they can shape and reuse these services in response to competitive business realities. Non-exhaustive examples of electronic commerce participants include individual creators, film and music studios, distributors, program aggregators, broadcasters, and cable and satellite operators.
  • [0223]
    The Distributed Commerce Utility can, for example, make optimally efficient use of commerce administration resources, and can, in at least some embodiments, scale in a practical fashion to optimally accommodate the demands of electronic commerce growth.
  • [0224]
    The Distributed Commerce Utility may, for example, comprise a number of Commerce Utility Systems. These Commerce Utility Systems can provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many or all of its participants. Different support functions can, for example, be collected together in hierarchical and/or in networked relationships to suit various business models and/or other objectives. Modular support functions can, for example, be combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes. These Commerce Utility Systems can, for example, be distributed across a large number of electronic appliances with varying degrees of distribution.
  • [0225]
    The “Distributed Commerce Utility” provides numerous additional capabilities and benefits that can be used in conjunction with the particular embodiments shown in the drawings of this application, non-exhaustive examples of which include:
  • [0226]
    Enables practical and efficient electronic commerce and rights management.
  • [0227]
    Provides services that securely administer and support electronic interactions and consequences.
  • [0228]
    Provides infrastructure for electronic commerce and other forms of human electronic interaction and relationships.
  • [0229]
    Optimally applies the efficiencies of modern distributed computing and networking.
  • [0230]
    Provides electronic automation and distributed processing.
  • [0231]
    Supports electronic commerce and communications infrastructure that is modular, programmable, distributed and optimally computerized.
  • [0232]
    Provides a comprehensive array of capabilities that can be combined to support services that perform various administrative and support roles.
  • [0233]
    Maximizes benefits from electronic automation and distributed processing to produce optimal allocation and use of resources across a system or network.
  • [0234]
    Is efficient, flexible, cost effective, configurable, reusable, modifiable, and generalizable.
  • [0235]
    Can economically reflect users' business and privacy requirements.
  • [0236]
    Can optimally distribute processes—allowing commerce models to be flexible, scaled to demand and to match user requirements.
  • [0237]
    Can efficiently handle a full range of activities and service volumes.
  • [0238]
    Can be fashioned and operated for each business model, as a mixture of distributed and centralized processes.
  • [0239]
    Provides a blend of local, centralized and networked capabilities that can be uniquely shaped and reshaped to meet changing conditions.
  • [0240]
    Supports general purpose resources and is reusable for many different models; in place infrastructure can be reused by different value chains having different requirements.
  • [0241]
    Can support any number of commerce and communications models.
  • [0242]
    Efficiently applies local, centralized and networked resources to match each value chain's requirements.
  • [0243]
    Sharing of common resources spreads out costs and maximizes efficiency.
  • [0244]
    Supports mixed, distributed, peer-to-peer and centralized networked capabilities.
  • [0245]
    Can operate locally, remotely and/or centrally.
  • [0246]
    Can operate synchronously, asynchronously, or support both modes of operation.
  • [0247]
    Adapts easily and flexibly to the rapidly changing sea of commercial opportunities, relationships and constraints of “Cyberspace.”
  • [0248]
    Any or all of these features may be used in combination with the inventions disclosed herein.
  • [0249]
    The Distributed Commerce Utility provides, among other advantages, comprehensive, integrated administrative and support services for secure electronic commerce and other forms of electronic interaction. These electronic interactions supported by the Distributed Commerce Utility may, in at least some embodiments, entail the broadest range of appliances and distribution media, non-limiting examples of which include networks and other communications channels, consumer appliances, computers, convergent devices such as WebTV, and optical media such as CD-ROM and DVD in all their current and future forms.
  • Example Access Techniques
  • [0250]
    [0250]FIGS. 3, 4A and 4B show example access techniques provided by player 52. In this example, upon disk 100 being loaded into player disk drive 80 (FIG. 4A, block 400), the player controller 82 may direct drive 80 to fetch hidden keys 210 from disk 100 and use them to decrypt some or all of the encrypted key block 208 (FIG. 4A, block 402). In this example, drive 80 may store the keys so decrypted without exposing them to player controller 82 (e.g., by storing them within key store 212 within a secure decryption component such as an integrated circuit based decryption engine) (FIG. 4A, block 404). The player 52 may control drive 80 to read the control set 204 (which may or may not be encrypted) from disk 100 (FIG. 4A, block 406). The player microprocessor 82 may parse control set 204, ignore or discard those controls 222 that are beyond its capability, and maintain permissions and/or rights management information corresponding to the subset of controls that it can enforce (e.g., the “copy once” control 222(1)).
  • [0251]
    Player 52 may then wait for the user to provide a request via control inputs 58 and/or remote control unit 56. If the control input is a copy request (“yes” exit to FIG. 4A, decision block 408), then player microprocessor 84 may query control 222(1) to determine whether copying is allowed, and if so, under what conditions (FIG. 4A, decision block 410). Player 52 may refuse to copy the disk 100 if the corresponding control 222(1) forbids copying (“no” exit to FIG. 4A, decision block 410), and may allow copying (e.g., by controlling drive 80 to sequentially access all of the information on disk 100 and provide it to an output port not shown) if corresponding control 222(1) permits copying (“yes” exit to FIG. 4A, decision block 410; block 412). In this example, player 52 may, upon making a copy, store an identifier associated with disk 100 within an internal, non-volatile memory (e.g., controller memory 86) or elsewhere if control 222(1) so requires. This stored disk identifier can be used by player 52 to enforce a “copy once” restriction (i.e., if the user tries to use the same player to copy the same disk more than once or otherwise as forbidden by control 222(1), the player can deny the request).
  • [0252]
    If the user requests one of properties 200 to be played or read (“yes” exit to FIG. 4A, decision block 414), player controller 82 may control drive 80 to read the corresponding information from the selected property 200 (e.g., in a sequence as specified by metadata 202) and decrypt the read information as needed using the keys initially obtained from key block 208 and now stored within drive key storage 212 (FIG. 4A, block 416).
  • [0253]
    [0253]FIG. 4B is a variation on the FIG. 4A process to accommodate a situation in which player 52 itself provides decryption keys for decrypting encrypted key block 208. In this example, controller 82 may supply one or more decryption keys to drive 80 using a secure protocol such a Diffie-Hellman key agreement, or through use of a shared key known to both the drive and some other system or component to which the player 52 is or once was coupled (FIG. 4B, block 403). The drive 80 may use these supplied keys to decrypt encrypted key block 208 as shown in FIG. 4A, block 404, or it may use the supplied keys to directly decrypt content such as protected property 200 and/or protected metadata 202(2).
  • [0254]
    As a further example, the player 52 can be programmed to place a copy it makes of a digital property such as a film in encrypted form inside a tamper-resistant software container. The software container may carry with it a code indicating that the digital property is a copy rather than an original. The sending player 52 may also put its own unique identifier (or the unique identifier of an intended receiving device such as another player 52, a video cassette player or equipment 50) in the same secure container to enforce a requirement that the copy can be played only on the intended receiving device. Player 52 (or other receiving device) can be programmed to make no copies (or no additional copies) upon detecting that the digital property is a copy rather than an original. If desired, a player 52 can be programmed to refuse to play a digital property that is not packaged with the player's unique ID.
  • Example Use of Analog Encoding Techniques
  • [0255]
    In another example, more comprehensive rights management information may be encoded by player 52 in the analog output using methods for watermarking and/or fingerprinting. Today, a substantial portion of the “real world” is analog rather than digital. Despite the pervasiveness of analog signals, existing methods for managing rights and protecting copyright in the analog realm are primitive or non-existent. For example:
  • [0256]
    Quality degradation inherent in multigenerational analog copying has not prevented a multi-billion dollar pirating industry from flourishing.
  • [0257]
    Some methods for video tape copy and pay per view protection attempt to prevent any copying at all of commercially released content, or allow only one generation of copying. These methods can generally be easily circumvented.
  • [0258]
    Not all existing devices respond appropriately to copy protection signals.
  • [0259]
    Existing schemes are limited for example to “copy/no copy” controls.
  • [0260]
    Copy protection for sound recordings has not been commercially implemented.
  • [0261]
    A related problem relates to the conversion of information between the analog and digital domains. Even if information is effectively protected and controlled initially using strong digital rights management techniques, an analog copy of the same information may no longer be securely protected.
  • [0262]
    For example, it is generally possible for someone to make an analog recording of program material initially delivered in digital form. Some analog recordings based on digital originals are of quite good quality. For example, a Digital Versatile Disk (“DVD”) player may convert a movie from digital to analog format and provide the analog signal to a high quality analog home VCR. The home VCR records the analog signal. A consumer now has a high quality analog copy of the original digital property. A person could re-record the analog signal on a DVD-RAM. This recording will in many circumstances have substantial quality—and would no longer be subject to “pay per view” or other digital rights management controls associated with the digital form of the same content.
  • [0263]
    Since analog formats will be with us for a long time to come, rightsholders such as film studios, video rental and distribution companies, music studios and distributors, and other value chain participants would very much like to have significantly better rights management capabilities for analog film, video, sound recordings and other content. Solving this problem generally requires a way to securely associate rights management information with the content being protected.
  • [0264]
    In combination with other rights management capabilities, watermarking and/or fingerprinting, may provide “end to end” secure rights management protection that allows content providers and rights holders to be sure their content will be adequately protected—irrespective of the types of devices, signaling formats and nature of signal processing within the content distribution chain. This “end to end” protection also allows authorized analog appliances to be easily, seamlessly and cost-effectively integrated into a modem digital rights management architecture.
  • [0265]
    Watermarking and/or fingerprinting may carry, for example, control information that can be a basis for a Virtual Distribution Environment (“VDE”) in which electronic rights management control information may be delivered over insecure (e.g., analog) communications channels. This Virtual Distribution Environment is highly flexible and convenient, accommodating existing and new business models while also providing an unprecedented degree of flexibility in facilitating ad hoc creation of new arrangements and relationships between electronic commerce and value chain participants—regardless of whether content is distributed in digital and/or analog formats.
  • [0266]
    Watermarking together with distributed, peer-to-peer rights management technologies providers numerous advantages, including, but not limited to:
  • [0267]
    An indelible and invisible, secure technique for providing rights management information.
  • [0268]
    An indelible method of associating electronic commerce and/or rights management controls with analog content such as film, video, and sound recordings.
  • [0269]
    Persistent association of the commerce and/or rights management controls with content from one end of a distribution system to the other—regardless of the number and types of transformations between signaling formats (for example, analog to digital, and digital to analog).
  • [0270]
    The ability to specify “no copy/one copy/many copies” rights management rules, and also more complex rights and transaction pricing models (such as, for example, “pay per view” and others).
  • [0271]
    The ability to fully and seamlessly integrate with comprehensive, general electronic rights management solutions.
  • [0272]
    Secure control information delivery in conjunction with authorized analog and other non-digital and/or non-secure information signal delivery mechanisms.
  • [0273]
    The ability to provide more complex and/or more flexible commerce and/or rights management rules as content moves from the analog to the digital realm and back.
  • [0274]
    The flexible ability to communicate commerce and/or rights management rules implementing new, updated, or additional business models to authorized analog and/or digital devices.
  • [0275]
    Any or all of these features may be used in combination in and/or with the inventions disclosed in the present specification.
  • [0276]
    Briefly, watermarking and/or fingerprinting methods may, using “steganographical” techniques, substantially indelibly and substantially invisibly encode rights management and/or electronic commerce rules and controls within an information signal such as, for example, an analog signal or a digitized (for example, sampled) version of an analog signal, non-limiting examples of which may include video and/or audio data, that is then decoded and utilized by the local appliance. The analog information and stenographically encoded rights management information may be transmitted via many means, non-limiting examples of which may include broadcast, cable TV, and/or physical media, VCR tapes, to mention one non-limiting example. Any or all of these techniques may be used in combination in accordance with the inventions disclosed herein.
  • [0277]
    Watermarking and/or fingerprinting methods enable at least some rights management information to survive transformation of the video and/or other information from analog to digital and from digital to analog format. Thus in one example, two or more analog and/or digital appliances may participate in an end-to-end fabric of trusted, secure rights management processes and/or events.
  • Example, More Capable Embodiments
  • [0278]
    As discussed above, the example control set shown in FIG. 3B provides a comprehensive, flexible and extensible set of controls for use by both player 52 and computer equipment 62 (or other platform) depending upon the particular technical, security and other capabilities of the platform. In this example, player 52 has only limited technical and security capabilities in order to keep cost and complexity down in a mass-produced consumer item, and therefore may essentially ignore or fail to enable some or all of the controls 222 provided within control set 204. In another example, the cost of memory and/or processors may continue to decline and manufacturers may choose to expand the technical and security capabilities of player 52. A more capable player 52 will provide more powerful, robust, and flexible rights management capabilities.
  • [0279]
    [0279]FIG. 5 shows an example arrangement permitting platform 60 including secure node 72 to have enhanced and/or different capabilities to use information and/or rights management information on disk 100, and FIG. 6 shows an example access technique provided by the secure node. Referring to FIG. 5, secure node 72 may be coupled to a network 150 whereas player 52 may not be—giving the secure node great additional flexibility in terms of communicating security related information such as audit trails, compensation related information such as payment requests or orders, etc. This connection of secure node 72 to network 150 (which may be replaced in any given application by some other communications technique such as insertion of a replaceable memory cartridge) allows secure node 72 to receive and securely maintain rights management control information such as an additional container 206′ containing an additional control set 204′. Secure node 72 may use control set 204′ in addition or in lieu of a control set 204 stored on disk 100. Secure node 72 may also maintain a secure cryptographic key store 212 that may provide cryptographic keys to be used in lieu of or in addition to any keys 208, 210 that may be stored on disk 100. Because of its increased security and/or technical capabilities, secure node 72 may be able to use controls 222 within control set 204 that player 52 ignores or cannot use—and may be provided with further and/or enhanced rights and/or rights management capabilities based on control set 204′ (which the user may, for example, order specially and which may apply to particular properties 200 stored on disk 100 and/or particular sets of disks).
  • Example Secure Node Access Techniques
  • [0280]
    The FIG. 6 example access technique (which may be performed by platform 60 employing secure node 72, for example) involves, in this particular example, the secure node 72 fetching property identification information 220 from disk 100 (FIG. 6, block 502), and then locating applicable control sets and/or rules 204 (which may be stored on disk 100, within secure node 72, within one or more repositories the secure node 72 accesses via network 150, and/or a combination of any or all of these techniques) (FIG. 6, block 504). Secure node 72 then loads the necessary decryption keys and uses them to decrypt information as required (FIG. 6, block 506). In one example, secure node 72 obtains the necessary keys from secure containers 206 and/or 206′ and maintains them within a protected processing environment such as SPU 164 or a software-emulated protected processing environment without exposing them externally of that environment. In another example, the secure node 72 may load the necessary keys (or a subset of them) into disk drive 82′ using a secure key exchange protocol for use by the disk drive in decrypting information much in the same manner as would occur within player 52 in order to maintain complete compatibility in drive hardware.
  • [0281]
    Secure node 72 may monitor user inputs and perform requested actions based on the particular control set 204, 204′. For example, upon receiving a user request, secure node 72 may query the control set 204, 204′ to determine whether it (they) permits the action the user has requested (FIG. 6, block 508) and, if permitted, whether conditions for performing the requested operation have been satisfied (FIG. 6, block 510). In this example, secure node 72 may effect the operations necessary to satisfy any such required conditions such as by, for example, debiting a user's locally-stored electronic cash wallet, securely requesting an account debit via network 150, obtaining and/or checking user certificates to ensure that the user is within an appropriate class or is who he or she says he is, etc.—using network 150 as required (FIG. 6, block 510). Upon all necessary conditions being satisfied, secure node 72 may perform the requested operation (and/or enable microprocessor 154 to perform the operation) (e.g., to release content) and may then generate secure audit records which can be maintained by the secure node and/or reported at the time or later via network 150 (FIG. 6, block 512).
  • [0282]
    If the requested operation is to release content (e.g., make a copy of the content), platform 60 (or player 52 in the example above) may perform the requested operation based at least in part on the particular controls that enforce rights over the content. For example, the controls may prevent platform 60 from releasing content except to certain types of output devices that cannot be used to copy the content, or they may release the content in a way that discourages copying (e.g., by “fingerprinting” the copy with an embedded designation of who created the copy, by intentionally degrading the released content so that any copies made from it will be inferior, etc.). As one specific example, a video cassette recorder (not shown) connected to platform 60 may be the output device used to make the copy. Because present generations of analog devices such as video cassette recorders are incapable of making multigenerational copies without significant loss in quality, the content provider may provide controls that permit content to be copied by such analog devices but not by digital devices (which can make an unlimited number of copies without quality loss). For example, platform 60 may, under control of digital controls maintained by secure node 72, release content to the video cassette recorder only after the video cassette recorder supplies the platform a digital ID that designates the output device as a video cassette recorder—and may refuse to provide any output at all unless such a digital ID identifying the output device as a lower quality analog device is provided. Additionally or in the alternative, platform 60 may intentionally degrade the content it supplies to the video cassette recorder to ensure that no acceptable second-generation copies will be made. In another example, more comprehensive rights management information may be encoded by platform 60 in the analog output using watermarking and/or fingerprinting.
  • Additional Examples of Secure Container Usage
  • [0283]
    [0283]FIG. 7 shows a basic example of a DVD medium 700 containing a kind of secure container 701 for use in DVDs in accordance with the present invention. As shown in this example, container 701 (“DigiBox for DVDs”) could be a specialized version of a “standard” container tailored especially for use with DVD and/or other media, or it could, alternatively (in an arrangement shown later in FIG. 8), be a fully “standard” container. As shown in this example, the specialized container 701 incorporates features that permit it to be used in conjunction with content information, metadata, and cryptographic and/or protection information that is stored on the DVD medium 700 in the same manner as would have been used had container 701 not been present. Thus, specialized container 701 provides compatibility with existing data formats and organizations used on DVDs and/or other media. In addition, a specialized container 701 can be tailored to support only those features necessary for use in support of DVD and/or other media, so that it can be processed and/or manipulated using less powerful or less expensive computing resources than would be required for complete support of a “standard” container object.
  • [0284]
    In this example, specialized “DVD only” container 701 includes a content object (a property) 703 which includes an “external reference” 705 to video title content 707, which may be stored on the DVD and/or other medium in the same manner as would have been used for a medium not including container 701. The video title content 707 may include MPEG-2 and/or AC-3 content 708, as well as scrambling (protection) information 710 and header, structure and/or meta data 711. External reference 705 contains information that “designates” (points to, identifies, and/or describes) specific external processes to be applied/executed in order to usecontent and other information not stored in container 701. In this example, external reference 705 designates video title content 707 and its components 708, 710, and 711. Alternatively, container 701 could store some or all of the video title content in the container itself, using a format and organization that is specific to container 701, rather than the standard format for the DVD and/or other medium 700.
  • [0285]
    In this example, container 701 also includes a control object (control set) 705 that specifies the rules that apply to use of video title content 707. As indicates by solid arrow 702, control object 705 “applies to” content object (property) 703. As shown in this example, rule 704 can specify that protection processes, for example CGMA or the Matsushita data scrambling process, be applied, and can designate, by external reference 709 contained in rule 704, data scrambling information 710 to be used in carrying out the protection scheme. The shorthand “do CGMA” description in rule 704 indicates that the rule requires that the standard CGMA protection scheme used for content on DVD media is to be used in conjunction with video title content 707, but a different example could specify arbitrary other rules in control object 705 in addition to or instead of the “do CGMA” rule, including other standard DVD protection mechanisms such as the Matsushita data scrambling scheme and/or other rights management mechanisms. External reference 709 permits rule 704 to be based on protection information 710 that is stored and manipulated in the same format and manner as for a DVD medium that does not incorporate container 701 and/or protection information that is meaningful only in the context of processing container 701.
  • [0286]
    [0286]FIG. 8 shows a example of a DVD medium 800 containing a “standard” secure container 801. In this example, the “standard” container provides all of the functionality (if desired) of the FIG. 7 container, but may offer additional and/or more extensive rights management and/or content use capabilities than available on the “DVD only” container (e.g., the capacity to operate with various different platforms that use secure nodes).
  • [0287]
    [0287]FIG. 9 shows a more complex example of DVD medium 800 having a standard container 901 that provides all of the functionality (if desired) of the FIG. 7 container, and that can function in concert with other standard containers 902 located either on the same DVD medium or imported from another remote secure node or network. In this example, standard container 902 may include a supplementary control object 904 which applies to content object 903 of standard container 901. Also in this example, container 902 may provide an additional rule(s) such as, for example, a rule permitting/extending rights to allow up to a certain number (e.g., five) copies of the content available on DVD 900. This arrangement, for example, provides added flexibility in controlling rights management of DVD content between multiple platforms via access through “backchannels” such as via a set-top box or other hardware having bi-directional communications capabilities with other networks or computers.
  • Additional Use of a DVD Disk with a Secure Container
  • [0288]
    [0288]FIG. 10 illustrates the use of a “new” DVD disk-i.e., one that includes a special DVD secure container in the medium. This container may, in one example, be used or two possible use scenarios: a first situation in which the disk is used on an “old” player (DVD appliance, i.e., a DVD appliance that is not equipped with a secure node to provide rights management in accordance with the present invention; and a second situation in which the disk is used on a “new” player—i.e., a DVD appliance which is equipped with a secure node to provide rights management in accordance with the present invention. In this example, a secure node within the “new” player is configured with the necessary capabilities to process other copy protection information such as, for example, CGMA control codes and data scrambling formats developed and proposed principally by Matsushita.
  • [0289]
    For example, in the situation shown in FIG. 10, the “new” player (which incorporates a secure node in accordance with the present invention) can recognize the presence of a secure container on the disk. The player may then load the special DVD secure container from the disk into the resident secure node. The secure node opens the container, and implements and/or enforces appropriate rules and usage consequences associated with the content by applying rules from the control object. These rules are extremely flexible. In one example, the rules may, for example, call for use of other protection mechanisms (such as, for example, CGMA protection codes and Matsushita data scrambling) which can be found in the content (or property) portion of the container.
  • [0290]
    In another example shown in FIG. 10, the special DVD container on the disk still allows the “old” player to use to a predetermined limited amount content material which may be used in accordance with conventional practices.
  • Example Use of a DVD Disk with No Secure Container
  • [0291]
    Referring now to FIG. 11, a further scenario is discussed. FIG. 11 illustrates use of an “old” DVD disk with two possible use examples: a first example in which the disk is used on an “old” player—i.e., a DVD appliance that is not equipped with a secure node for providing rights management in accordance with the present invention—and a second example in which the disk is used on a “new” player (i.e., equipped with a secure node).
  • [0292]
    In the first case, the “old” player will play the DVD content in a conventional manner. In the second scenario, the “new” player will recognize that the disk does not have a container stored in the medium. It therefore constructs a “virtual” container in resident memory of the appliance. To do this, it constructs a container content object, and also constructs a control object containing the appropriate rules. In one particular example, the only applicable rule it need apply is to “do CGMA”—but in other examples, additional and/or different rules could be employed. The virtual container is then provided to the secure node within the “new” player for implementing management of use rights in accordance with the present invention. Although not shown in FIGS. 10 and 11, use of “external references” may also be provided in both virtual and non-virtual containers used in the DVD context.
  • Example Illustrative Arrangements for Sharing, Brokering and Combining Rights when Operating in at Least Occasionally Connected Scenarios
  • [0293]
    As described above, the rights management resources of several different devices and/or other systems can be flexibly combined in diverse logical and/or physical relationships, resulting for example in greater and/or differing rights. Such rights management resource combinations can be effected through connection to one or more remote rights authorities. FIGS. 12-14 show some non-limiting examples of how rights authorities can be used in various contexts.
  • [0294]
    For example, FIG. 12 shows a rights authority broker 1000 connected to a local area network (LAN) 1002. LAN 1002 may connect to wide area network if desired. LAN 1002 provides connectivity between rights authority broker 1000 and any number of appliances such as for example a player 50, a personal computer 60, a CD “tower” type server 1004. In the example shown, LAN 1002 includes a modem pool (and/or network protocol server, not shown)1006 that allows a laptop computer 1008 to connect to the rights authority broker 1000 via dial-up lines 1010. Alternatively, laptop 1008 could communicate with rights authority broker 1000 using other network and/or communication means, such as the Internet and/or other Wide Area Networks (WANs). A disk player 50A may be coupled to laptop 1008 at the laptop location. In accordance with the teachings above, any or all of devices shown in FIG. 12 may include one or more secure nodes 72.
  • [0295]
    Rights authority broker 1000 may act as an arbiter and/or negotiator of rights. For example, laptop 1008 and associated player 50A may have only limited usage rights when operating in a stand-alone configuration. However, when laptop 1008 connects to rights authority broker 1000 via modem pool 1006 and LAN 1002 and/or by other communication means, the laptop may acquire different and/or expanded rights to use disks 100 (e.g., availability of different content portions, different pricing, different extraction and/or redistribution rights, etc.) Similarly, player 50, equipment 60 and equipment 1004 may be provided with an enhanced and/or different set of disk usage rights through communication with rights authority broker 1000 over LAN 1002. Communication to and from rights authority broker 1000 is preferably secured through use of containers of the type disclosed in the above-referenced Ginter et al. patent specification.
  • [0296]
    [0296]FIG. 13 shows another example use of a rights authority broker 1000 within a home environment. In this example, the laptop computer 1008 may be connected to a home-based rights authority broker 1000 via a high speed serial IEEE 1394 bus and/or by other electronic communication means. In addition, rights authority broker 1000 can connect with any or all of:
  • [0297]
    a high definition television 1100,
  • [0298]
    one or more loudspeakers 1 102 or other audio transducers,
  • [0299]
    one or more personal computers 60,
  • [0300]
    one or more set-top boxes 1030,
  • [0301]
    one or more disk players 50,
  • [0302]
    one or more other rights authority brokers 1000A-1000N and
  • [0303]
    any other home or consumer equipment or appliances.
  • [0304]
    Any or all of the equipment listed above may include a secure node 72.
  • [0305]
    [0305]FIG. 14 shows another example use of a rights authority broker 1000. In this example, rights authority broker 1000 is connected to a network 1020 such as a LAN, a WAN, the Internet, etc. Network 1020 may provide connectivity between rights authority broker 1000 and any or all of the following equipment:
  • [0306]
    one or more connected or occasionally connected disk players 50A, 50B;
  • [0307]
    one more networked computers 1022;
  • [0308]
    one or more disk reader towers/servers 1004;
  • [0309]
    one or more laptop computers 1008;
  • [0310]
    one or more Commerce Utility Systems such as a rights and permissions clearinghouse 1024 (see Shear et al., “Trusted Infrastructure . . . ” specification referenced above);
  • [0311]
    one or more satellite or other communications uplinks 1026;
  • [0312]
    one or more cable television head-ends 1028;
  • [0313]
    one or more set-top boxes 1030 (which may be connected to satellite downlinks 1032 and/or disk players 50C);
  • [0314]
    one or more personal computer equipment 60;
  • [0315]
    one or more portable disk players 1034 (which may be connected through other equipment, directly, and/or occasionally unconnected;
  • [0316]
    one or more other rights authority brokers 1000A-1000N; and
  • [0317]
    any other desired equipment.
  • [0318]
    Any or all of the above-mentioned equipment may include one or more secure nodes 72. Rights authority broker 1000 can distribute and/or combine rights for use by any or all of the other components shown in FIG. 14. For example, rights authority broker 100 can supply further secure rights management resources to equipment connected to the broker via network 1020. Multiple equipment shown in FIG. 14 can participate and work together in a permanently or temporarily connected network 1020 to share the rights management for a single node. Rights associated with parties and/or groups using and/or controlling such multiple devices and/or other systems can be employed according to underlying rights related rules and controls. As one example, rights available through a corporate executive's laptop computer 1008 might be combined with or substituted for, in some manner, the rights of one or more subordinate corporate employees when their computing or other devices 60 are coupled to network 1020 in a temporary networking relationship. In general, this aspect of the invention allows distributed rights management for DVD or otherwise packaged and delivered content that is protected by a distributed, peer-to-peer rights management. Such a distributed rights management can operate whether the DVD appliance or other content usage device is participating in a permanently or temporarily connected network 1020, and whether or not the relationships among the devices and/or other systems participating in the distributed rights management arrangement are relating temporarily or have a more permanent operating relationship.
  • [0319]
    For example, laptop computer 1008 may have different rights available depending on the context in which that device is operating. For example, in a general corporate environment such as shown in FIG. 12, the laptop 1008 may have one set of rights. However, the same laptop 1008 may be given a different set of rights when connected to a more general network 1020 in collaboration with specified individuals and/or groups in a corporation. The same laptop 1008 may be given a still different set of rights when connected in a general home environment such as shown by example in FIG. 13. The same laptop 1008 could be given still different rights when connected in still other environments such as, by way of non-limiting example:
  • [0320]
    a home environment in collaboration with specified individuals and/or groups,
  • [0321]
    a retail environment,
  • [0322]
    a classroom setting as a student,
  • [0323]
    a classroom setting in collaboration with an instructor, in a library environment,
  • [0324]
    on a factory floor,
  • [0325]
    on a factory floor in collaboration with equipment enabled to perform proprietary functions, and so on.
  • [0326]
    As one more particular example, coupling a limited resource device arrangement such as a DVD appliance 50 shown in FIG. 14 with an inexpensive network computer (NC) 1022 may allow an augmenting (or replacing) of rights management capabilities and/or specific rights of parties and/or devices by permitting rights management to be a result of a combination of some or all of the rights and/or rights management capabilities of the DVD appliance and those of an Network or Personal Computer (NC or PC). Such rights may be further augmented, or otherwise modified or replaced by the availability of rights management capabilities provided by a trusted (secure) remote network rights authority 1000.
  • [0327]
    The same device, in this example a DVD appliance 50, can thus support different arrays, e.g., degrees, of rights management capabilities, in disconnected and connected arrangements and may further allow available rights to result from the availability of rights and/or rights management capabilities resulting from the combination of rights management devices and/or other systems. This may include one or more combinations of some or all of the rights available through the use of a “less” secure and/or resource poor device or system which are augmented, replaced, or otherwise modified through connection with a device or system that is “more” or “differently” secure and/or resource rich and/or possesses differing or different rights, wherein such connection employs rights and/or management capabilities of either and/or both devices as defined by rights related rules and controls that describe a shared rights management arrangement.
  • [0328]
    In the latter case, connectivity to a logically and/or physically remote rights management capability can expand (by, for example, increasing the available secure rights management resources) and/or change the character of the rights available to the user of the DVD appliance 50 or a DVD appliance when such device is coupled with an NC 1022, personal computer 60, and/or remote rights authority 1000. In this rights augmentation scenario, additional content portions may be available, pricing may change, redistribution rights may change (e.g., be expanded), content extraction rights may be increased, etc.
  • [0329]
    Such “networking rights management” can allow for a combination of rights management resources of plural devices and/or other systems in diverse logical and/or physical relationships, resulting in either greater or differing rights through the enhanced resources provided by connectivity with one or more “remote” rights authorities. Further, while providing for increased and/or differing rights management capability and/or rights, such a connectivity based rights management arrangement can support multi-locational content availability, by providing for seamless integration of remotely available content, for example, content stored in remote, Internet world wide web-based, database supported content repositories, with locally available content on one or more DVD discs 100.
  • [0330]
    In this instance, a user may experience not only increased or differing rights but may be able to use to both local DVD content and supplementing content (i.e., content that is more current from a time standpoint, more costly, more diverse, or complementary in some other fashion, etc.). In such an instance, a DVD appliance 50 and/or a user of a DVD appliance (or other device or system connected to such appliance) may have the same rights, differing, and/or different rights applied to locally and remotely available content, and portions of local and remotely available content may themselves be subject to differing or different rights when used by a user and/or appliance. This arrangement can support an overall, profound increase in user content opportunities that are seamlessly integrated and efficiently available to users in a single content searching and/or usage activity.
  • [0331]
    Such a rights augmenting remote authority 1000 may be directly coupled to a DVD appliance 50 and/or other device by modem (see item 1006 in FIG. 12) and/or directly or indirectly coupled through the use of an I/O interface, such as a serial 1394 compatible controller (e.g., by communicating between a 1394 enabled DVD appliance and a local personal computer that functions as a smart synchronous or asynchronous information communications interface to such one or more remote authorities, including a local PC 60 or NC 1022 that serves as a local rights management authority augmenting and/or supplying the rights management in a DVD appliance) and/or by other digital communication means such as wired and/or wireless network connections.
  • [0332]
    Rights provided to, purchased, or otherwise acquired by a participant and/or participant DVD appliance 50 or other system can be exchanged among such peer-to-peer relating devices and/or other systems so long as they participate in a permanently or temporarily connected network. 1020. In such a case, rights may be bartered, sold, for currency, otherwise exchanged for value, and/or loaned so long as such devices and/or other systems participate in a rights management system, for example, such as the Virtual Distribution Environment described in Ginter, et al., and employ rights transfer and other rights management capabilities described therein. For example, this aspect of the present invention allows parties to exchange games or movies in which they have purchased rights. Continuing the example, an individual might buy some of a neighbor's usage rights to watch a movie, or transfer to another party credit received from a game publisher for the successful superdistribution of the game to several acquaintances, where such credit is transferred (exchanged) to a friend to buy some of the friend's rights to play a different game a certain number of times, etc.
  • [0333]
    Example Virtual Rights Process
  • [0334]
    FIGS. 15A-15C shows an example of a process in which rights management components of two or more appliances or other devices establish a virtual rights machine environment associated with an event, operation and/or other action. The process may be initiated in a number of ways. In one example, an appliance user (and/or computer software acting on behalf of a user, group of users, and/or automated system for performing actions) performs an action with a first appliance (e.g., requesting the appliance to display the contents of a secure container, extract a portion of a content element, run a protected computer program, authorize a work flow process step, initiate an operation on a machine tool, play a song, etc.) that results in the activation of a rights management component associated with such first appliance (FIG. 15A, block 1500). In other examples, the process may get started in response to an automatically generated event (e.g., based on a time of day or the like), a random or pseudo-random event, and/or a combination of such events with a user-initiated event.
  • [0335]
    Once the process begins, a rights management component such as a secure node 72 (for example, an SPE and/or HPE as disclosed in Ginter et al.) determines which rights associated with such first appliance, if any, the user has available with respect to such an action (FIG. 15A, block 1502). The rights management component also determines the coordinating and/or cooperating rights associated with such an action available to the user located in whole or in part on other appliances (FIG. 15A, block 1502).
  • [0336]
    In one example, these steps may be performed by securely delivering a request to a rights authority server 1000 that identifies the first appliance, the nature of the proposed action, and other information required or desired by such a rights authority server. Such other information may include, for example:
  • [0337]
    the date and time of the request,
  • [0338]
    the identity of the user,
  • [0339]
    the nature of the network connection,
  • [0340]
    the acceptable latency of a response, etc.), and/or
  • [0341]
    any other information.
  • [0342]
    In response to such a request, the rights authority server 1000 may return a list (or other appropriate structure) to the first appliance. This list may, for example, contain the identities of other appliances that do, or may, have rights and/or rights related information relevant to such a proposed action.
  • [0343]
    In another embodiment, the first appliance may communicate (e.g., poll) a network with requests to other appliances that do, or may, have rights and/or rights related information relevant to such proposed action. Polling may be desirable in cases where the number of appliances is relatively small and/or changes infrequently. Polling may also be useful, for example, in cases where functions of a rights authority server 1000 are distributed across several appliances.
  • [0344]
    The rights management component associated with the first appliance may then, in this example, check the security level(s) (and/or types) of devices and/or users of other appliances that do, or may, have rights and/or rights related information relevant to such an action (FIG. 15A, block 1506). This step may, for example, be performed in accordance with the security level(s) and/or device type management techniques disclosed in Sibert and Van Wie, and the user rights, secure name services and secure communications techniques disclosed in Ginter et al. Device and/or user security level determination may be based, for example, in whole or in part on device and/or user class.
  • [0345]
    The rights management component may then make a decision as to whether each of the other appliance devices and/or users have a sufficient security level to cooperate in forming the set of rights and/or rights related information associated with such an action (FIG. 15A, block 1508). As each appliance is evaluated, some devices and/or users may have sufficient security levels, and others may not. In this example, if a sufficient security level is not available (“No” exit to decision block 1508), the rights management component may create an audit record (for example, an audit record of the form disclosed in Ginter et al.) (FIG. 1 5A, block 15 10), and may end the process (FIG. 15A, block 1512). Such audit record may be for either immediate transmission to a responsible authority and/or for local storage and later transmission, for example. The audit recording step may include, as one example, incrementing a counter that records security level failures (such as the counters associated with summary services in Ginter et al.) If the devices and/or users provide the requisite security level (“Yes” exit to block 1508), the rights management component in this example may make a further determination based on the device and/or user class(es) and/or other configuration and/or characteristics (FIG. 15B, block 1514). Such determination may be based on any number of factors such as for example:
  • [0346]
    the device is accessible only through a network interface that has insufficient throughput;
  • [0347]
    devices in such a class typically have insufficient resources to perform the action, or relevant portion of the action, at all or with acceptable performance, quality, or other characteristics;
  • [0348]
    the user class is inappropriate due to various conditions (e.g., age, security clearance, citizenship, jurisdiction, or any other class-based or other user characteristic); and/or other factors.
  • [0349]
    In one example, decision block 1514 may be performed in part by presenting a choice to the user that the user declines.
  • [0350]
    If processes within the rights management component determines that such device and/or user class(es) are inappropriate(“No” exit to block 1514), the rights management component may write an audit record if required or desired (FIG. 15B, block 1516) and the process may end (FIG. 15B, block 1518).
  • [0351]
    If, on the other hand, the rights management component determines that the device and/or user classes are appropriate to proceed (“Yes” exit to block 1514), the rights management component may determine the rights and resources available for performing the action on the first appliance and the other appliances acting together (FIG. 1SB, block 1520). This step may be performed, for example, using any or all of the method processing techniques disclosed in Ginter et al. For example, method functions may include event processing capabilities that formulate a request to each relevant appliance that describes, in whole or in part, information related to the action, or portion of the action, potentially suitable for processing, in whole or in part, by such appliance. In this example, such requests, and associated responses, may be managed using the reciprocal method techniques disclosed in Ginter et al. If such interaction requires additional information, or results in ambiguity, the rights management component may, for example, communicate with the user and allow them to make a choice, such as making a choice among various available, functionally different options, and/or the rights management component may engage in a negotiation (for example, using the negotiation techniques disclosed in Ginter et al.) concerning resources, rights and/or rights related information.
  • [0352]
    The rights management component next determines whether there are sufficient rights and/or resources available to perform the requested action (FIG. 15B, decision block 1522). If there are insufficient rights and/or resources available to perform the action (“No” exit to block 1522), the rights management component may write an audit record (FIG. 15B, block 1524), and end the process (FIG. 15B, block 1526).
  • [0353]
    In this example, if sufficient rights and/or resources are available (“Yes” exit to block 1522), the rights management component may make a decision regarding whether additional events should be processed in order to complete the overall action (FIG. 15B, block 1528). For example, it may not be desirable to perform only part of the overall action if the necessary rights and/or resources are not available to complete the action. If more events are necessary and/or desired (“Yes” exit to block 1528), the rights management component may repeat blocks 1520, 1522 (and potentially perform blocks 1524, 1526) for each such event.
  • [0354]
    If sufficient rights and/or resources are available for each of the events (“No” exit to block 1528), the rights management component may, if desired or required, present a user with a choice concerning the available alternatives for rights and/or resources for performing the action (FIG. 15B, block 1530). Alternatively and/or in addition, the rights management component may rely on user preference information (and/or defaults) to “automatically” make such a determination on behalf of the user (for example, based on the overall cost, performance, quality, etc.). In another embodiment, the user's class, or classes, may be used to filter or otherwise aid in selecting among available options. In still another embodiment, artificial intelligence (including, for example, expert systems techniques) may be used to aid in the selection among alternatives. In another embodiment, a mixture of any or all of the foregoing (and/or other) techniques may be used in the selection process.
  • [0355]
    If there are no acceptable alternatives for rights and/or resources, or because of other negative aspects of the selection process (e.g., a user presses a “Cancel” button in a graphical user interface, a user interaction process exceeds the available time to make such a selection, etc.), (“No” exit to block 1530) the rights management component may write an audit record (FIG. 1 SB, block 1532), and end the process (FIG. 15B, block 1534).
  • [0356]
    On the other hand, if a selection process identifies one or more acceptable sets of rights and/or resources for performing the action and the decision to proceed is affirmative (“Yes” exit to block 1530), the rights management component may perform the proposed action using the first appliance alone or in combination with any additional appliances (e.g., a rights authority 1000, or any other connected appliance) based on the selected rights and/or resources (FIG. 15C, block 1536). Such cooperative implementation of the proposed actions may include for example:
  • [0357]
    performing some or all of the action with the first appliance;
  • [0358]
    performing some or all of the action with one or more appliances other than the first appliance (e.g., a rights authority 1000 and/or some other appliance);
  • [0359]
    performing part of the action with the first appliance and part of the action with one or more other appliances; or
  • [0360]
    any combination of these.
  • [0361]
    For example, this step may be performed using the event processing techniques disclosed in Ginter et al.
  • [0362]
    As one illustrative example, the first appliance may have all of the resources necessary to perform a particular task (e.g., read certain information from an optical disk), but may lack the rights necessary to do so. In such an instance, the first appliance may obtain the additional rights it requires to perform the task through the steps described above. In another illustrative example, the first appliance may have all of the rights required to perform a particular task, but it may not have the resources to do so. For example, the first appliance may not have sufficient hardware and/or software resources available to it for accessing, processing or otherwise using information in certain ways. In this example, step 1536 may be performed in whole or in part by some other appliance or appliances based in whole or in part on rights supplied by the first appliance. In still another example, the first appliance may lack both rights and resources necessary to perform a certain action, and may rely on one or more additional appliances to supply such resources and rights.
  • [0363]
    In this example, the rights management component may, upon completion of the action, write one or more audit records (FIG. 15C, block 1538), and the process may end (FIG. 15C, block 1540).
  • [0364]
    An arrangement has been described which adequately satisfies current entertainment industry requirements for a low cost, mass-produceable digital video disk or other high capacity disc copy protection scheme but which also provides enhanced, extensible rights management capabilities for more advanced and/or secure platforms and for cooperative rights management between devices of lessor, greater, and/or differing rights resources. While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the invention.

Claims (119)

    We claim:
  1. 1. An electronic appliance including:
    a disk use arrangement for at least one of (a) reading information from, and (b) writing information to, a digital versatile disk optical storage medium; and
    a secure node coupled to the disk use arrangement, the secure node providing at least one rights management process.
  2. 2. An electronic appliance including:
    a disk use arrangement for at least one of (a) reading information from, and (b) writing information to, a digital versatile disk optical storage medium; and
    at least one processing arrangement coupled to the disk use arrangement, the processing arrangement selecting at least some control information associated with information recorded on the storage medium based at least in part on the class of the appliance and/or the user of the appliance.
  3. 3. A system as in
    claim 2
    wherein the processing arrangement selects a subset of control information used on another appliance and/or class of appliance.
  4. 4. A system as in
    claim 2
    wherein the processing arrangement selects different control information from the information selected by another appliance and/or class of appliance.
  5. 5. A system as in
    claim 2
    wherein at least some of the control information comprises an analog signal.
  6. 6. A system as in
    claim 2
    wherein at least some of the control information comprises digitally encoded information.
  7. 7. In an appliance capable of using digital versatile disks, a method including the following steps:
    at least one of (a) reading information from, and (b) writing information to, a digital versatile disk optical storage medium; and
    selecting at least some control information associated with information recorded on the storage medium based at least in part on the class of the appliance and/or the user of the appliance.
  8. 8. A method as in
    claim 7
    wherein the selecting step includes the step of selecting a subset of control information used on another appliance and/or class of appliance.
  9. 9. A method as in
    claim 7
    wherein the selecting step includes the step of selecting, from control information stored on the storage medium, a different set of control information than the control information selected by another appliance and/or class of appliance.
  10. 10. An electronic appliance including:
    a disk use arrangement for reading information from a digital versatile disk optical storage medium; and
    at least one processing arrangement coupled to the disk use arrangement, the processing arrangement protecting information read from the storage medium.
  11. 11. An appliance as in
    claim 10
    wherein the processing arrangement includes a rights management arrangement that applies at least one rights management technique to the read information.
  12. 12. An appliance as in
    claim 10
    wherein the appliance further includes at least one port compliant at least in part with the IEEE 1394-1995 high speed serial bus standard, and the processing arrangement couples the protected information to the port.
  13. 13. In an electronic appliance, a method including the following steps:
    reading information from a digital versatile disk optical storage medium; and
    protecting the information read from the optical storage medium.
  14. 14. A method as in
    claim 13
    wherein the protecting step includes the step of applying at least one rights management technique to the read information.
  15. 15. A method as in
    claim 13
    further including the step of sending the protected information to an IEEE 1394 port.
  16. 16. An electronic appliance including:
    a disk use arrangement for using information stored, or to be stored, on a digital versatile disk optical storage medium; and
    at least one protecting arrangement coupled to the disk use arrangement and also coupled to receive at least one analog signal, the protecting arrangement creating protected digital information based at least in part on the analog signal.
  17. 17. In an electronic appliance, a method including the following steps:
    receiving at least one analog signal; and
    creating protected digital content based at least in part on the analog signal for storage on a digital versatile disk.
  18. 18. In an electronic appliance, a method including the following steps:
    reading at least one analog signal from a digital versatile disk;
    creating protected digital content based at least in part on the analog signal; and
    outputting the protected digital content.
  19. 19. An electronic appliance including:
    a disk use arrangement for using information stored, or to be stored, on a digital versatile disk optical storage medium; and
    at least one rights management arrangement coupled to the disk use arrangement, the rights management arrangement treating the storage medium and/or information obtained from the storage medium differently depending on the geographical and/or jurisdictional context of the appliance.
  20. 20. In an electronic appliance, a method including the steps of:
    reading information from at least one digital versatile disk; and
    performing at least one rights management operation based at least in part on the geographical and/or jurisdictional context of the appliance.
  21. 21. An electronic appliance including:
    a disk use arrangement for using at least one secure container stored on a digital versatile disk optical storage medium; and
    at least one rights management arrangement coupled to the disk use arrangement, the rights management arrangement processing the secure container.
  22. 22. In an electronic appliance, a method including the following steps:
    reading at least one secure container from at least one digital versatile disk; and
    performing at least one rights management operation on the secure container.
  23. 23. An electronic appliance including:
    at least one rights management arrangement for generating and/or modifying at least one secure container for storage onto a digital versatile disk optical storage medium.
  24. 24. In an electronic appliance, a method including the step of performing at least one rights management operation on at least one secure container for storage onto a digital versatile disk optical storage medium.
  25. 25. A digital versatile disk use system and/or method characterized in that the system and/or method uses at least one secure container.
  26. 26. A digital versatile disk use system and/or method characterized in that the system and/or method uses at least one secure container of the type disclosed in PCT Publication No. WO 96/27155.
  27. 27. An electronic appliance including:
    a disk use arrangement for writing information onto and/or reading information from a digital versatile disk optical storage medium; and
    a secure arrangement that securely manages information on the storage medium such that at least a first portion of the information may be used on at least a first class of appliance while at least a second portion of the information may be used on at least a second class of appliance
  28. 28. In an electronic appliance, a method including the following steps:
    reading information from and/or writing information to at least one digital versatile disk optical storage medium;
    using at least a first portion of the information on at least a first class of appliance; and
    using at least a second portion of the information on at least a second class of appliance.
  29. 29. A system including first and second classes of electronic appliances each including a secure processing arrangement, the first appliance class secure arrangement securely managing and/or using at least a first portion of the information, the second appliance class secure arrangement securely managing and/or using at least a second portion of the information.
  30. 30. A system as in
    claim 29
    wherein the first and second information portions are different, and the second appliance class secure arrangement does not use the first information portion.
  31. 31. A system as in
    claim 29
    wherein the first appliance class does not use the second information portion.
  32. 32. In a system including first and second classes of electronic appliances each including a secure arrangement, a method comprising:
    (a) securely managing and/or using at least a first portion of the information with the first appliance class secure arrangement, and
    (b) securely managing and/or using at least a second portion of the information with the second appliance class secure arrangement.
  33. 33. A method as in
    claim 32
    wherein the first and second information portions are different, and step (b) does not use the first information portion.
  34. 34. A method as in
    claim 32
    wherein step (a) does not use the second information portion.
  35. 35. An electronic appliance including:
    a disk use arrangement for writing information onto and/or reading information from a digital versatile disk optical storage medium; and
    a secure arrangement that securely stores and/or transmits information associated with at least one of payment, auditing, controlling and/or otherwise managing content recorded on the storage medium.
  36. 36. In an electronic appliance, a method including the following steps:
    reading information from and/or writing information to at least one digital versatile disk optical storage medium; and
    securely storing and/or transmitting information associated with at least one of payment, auditing, controlling and/or otherwise managing content recorded on the storage medium.
  37. 37. An electronic appliance including:
    a disk use arrangement for writing information onto and/or reading information from a digital versatile disk optical storage medium;
    a cryptographic engine coupled to the disk use arrangement, the engine using at least one cryptographic key; and
    a secure arrangement that securely updates and/or replaces at least one cryptographic key used by the cryptographic engine to at least in part modify the scope of information usable by the appliance.
  38. 38. A method of operating an electronic appliance including:
    writing information onto and/or reading information from a digital versatile disk optical storage medium;
    using at least one cryptographic key in conjunction with said information; and
    securely updating and/or replacing at least one cryptographic key used by the cryptographic engine to at least in part modify the scope of information useable by the appliance.
  39. 39. A digital versatile disk appliance characterized in that at least one cryptographic key used by the appliance is securely updated and/or replaced to at least in part modify the scope of information that can be used by the appliance.
  40. 40. An appliance as in
    claim 39
    further characterized in that the key updating and/or replacing is based on class of appliance.
  41. 41. An electronic appliance having a class associated therewith, characterized in that at least one cryptographic key set used by the appliance class is selected to help ensure security of information released from at least one digital versatile disk.
  42. 42. A digital camera for generating at least one image to be written onto a digital versatile disk optical storage medium, characterized in that the camera includes at least one information protecting arrangement that at least in part protects the image so that the information is persistently protected through subsequent processes such as editing, production, writing onto a digital versatile disk, and/or reading from a digital versatile disk.
  43. 43. A digital camera for generating image information that can be written onto a digital versatile disk optical storage medium, a method comprising:
    capturing at least one image with a digital camera; and
    protecting information provided by the digital camera so that the information is selectively persistently protected through subsequent processes such as distribution, editing and/or production, writing onto the digital versatile disk optical storage medium, and/or reading from the digital versatile disk optical storage medium.
  44. 44. In an electronic appliance including a disk use arrangement, a method comprising:
    reading information from at least one digital versatile disk optical storage medium; and
    persistently protecting at least some of the read information through at least one subsequent editing and/or production process.
  45. 45. In an electronic appliance, a method including the following steps:
    reading information from and/or writing information to at least one digital versatile disk optical storage medium; and
    securely managing information on the storage medium, including the step of using at least a first portion of the information on at least a first class of appliance, and using at least a second portion of the information on at least a second class of appliance.
  46. 46. A method of providing copy protection and/or use rights management of at least one digital property content and/or secure container to be stored and/or distributed on a digital versatile disk medium, comprising the step(s) of:
    providing a set of use control(s) within a cryptographically encapsulated data structure having a predetermined format, the data structure format defining at least one secure software container for providing use rights information for digital property content to be stored on the digital versatile disk medium.
  47. 47. A method as in
    claim 46
    further including the step of using at least one digital property content stored on an optical disk in accordance with the use controls, including the step of using a prescribed secure cryptographic key or set of cryptographic keys for using rights information.
  48. 48. A method as in
    claim 46
    further including the step of decrypting control rules and/or other selected encrypted information content encapsulated in the software container using at least one set of cryptographic keys.
  49. 49. A method as in
    claim 46
    further including the step of applying decrypted control rules to regulate use in accordance with control information contained within said control rules, so as to facilitate management of a diverse set of use and distribution rights which may be specific to different users and/or optical disk appliances.
  50. 50. A method of providing rights management of digital property stored on digital versatile disk according to
    claim 46
    wherein said secure container data structure comprises:
    one or more content objects comprising digital property content; and
    one or more control objects comprising a set of control rules defining copy protection, use and distribution rights to digital property content stored on the optical disk.
  51. 51. A method of providing rights management of digital property stored on a digital versatile disk according to
    claim 46
    , wherein a content object further comprises one or more reference pointers to digital property content stored elsewhere on the digital versatile disk.
  52. 52. A method of providing rights management of digital property stored on a digital versatile disk according to
    claim 46
    , wherein a control object further comprises one or more reference pointers to control information stored elsewhere on the digital versatile disk.
  53. 53. A method of providing rights management of digital property stored on digital versatile disk according to
    claim 46
    , wherein digital information stored on said optical disk includes one or more metadata blocks comprising further information used in conjunction wi th th e control rules to use digital property content stored elsewhere on the optical disk.
  54. 54. A method of providing rights management of digital property stored on digital versatile disk according to
    claim 46
    , wherein a metablock may be either of a protected type or of an unprotected type.
  55. 55. An arrangement for implementing a rights management system for controlling copy protection, use and/or distribution rights to multi-media digital property content stored or otherwise contained on a digital versatile disk, comprising:
    an encrypted data structure defining a secure information container stored on an optical disk medium, the encrypted data structure including and/or referencing at least one content object and at least one control object associated with the content object, said content object comprising digital property content and said control object comprising rules defining use rights to the digital property content.
  56. 56. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein a content object further comprises one or more reference pointers to digital property content stored elsewhere on the digital versatile disk.
  57. 57. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein a control object further comprises one or more reference pointers to control information stored elsewhere on the digital versatile disk.
  58. 58. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein an control object further comprises information for controlling various operations of an optical disk appliance or computer.
  59. 59. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein a control object further comprises information for controlling various operations of an optical disk appliance or computer.
  60. 60. An arrangement for implementing a rights management system for digital-versatile disks according to
    claim 55
    , wherein a control object further comprises a rule specifying decoding and/or enforcement of CGMA encoded copy protection rules associated with the digital content property.
  61. 61. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein a control object further comprises a rule specifying at least one content scrambling system compatible encoding/decoding of digital property content.
  62. 62. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein said optical disk contains a block of stored information comprising encrypted keys used for decryption of said encrypted data structure.
  63. 63. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein said optical disk contains a block of stored information comprising hidden keys used for decryption of said encrypted keys.
  64. 64. An arrangement for implementing a rights management system for digital versatile disks according to
    claim 55
    , wherein a content object further comprises one or more reference pointers to digital property content stored on a separate storage medium.
  65. 65. A rights management system for providing copy protection, use and/or distribution rights management for multimedia digital property content stored or otherwise contained on a digital versatile disk for access by an optical disk player device that uses digital property content stored on said optical disk medium, wherein said appliance includes a microprocessor controller for decrypting and using control rules and other selected encrypted information content encapsulated in the secure container by using a prescribed cryptographic key and applying said decrypted control rules to regulate use in accordance with control information contained within said control rules, so as to facilitate management of a diverse set of use and/or distribution rights which may be specific to different users and/or optical disk appliances, the system including:
    an optical disk medium having stored thereon an encrypted data structure defining a secure information container, the encrypted data structure comprising and/or referencing at least one content object and at least one control object, said content object comprising digital property content, said control object comprising rules defining use rights associated with the digital property.
  66. 66. A method for providing copy protection, use and distribution rights management of multi-media digital property stored on and/or distributed via digital versatile disk, said optical disk medium having stored thereon an encrypted data structure defining a secure container for housing rights and/or copy protection information pertaining to digital property content stored on the optical disk, wherein an optical disk player appliance for using digital property content stored on an optical disk must utilize a prescribed secure cryptographic key or set of keys to use the secure container, said data structure comprising one or more content objects comprising digital property content and one or more control objects comprising a set of rules defining use rights to digital property, comprising the steps of:
    (a) decrypting control rules and other selected encrypted information content encapsulated in the secure container using one or more cryptographic keys; and
    (b) applying decrypted control rules to regulate use and/or distribution of digital property content stored on the optical disk in accordance with control information contained within the control rules, so as to provide customized use and/or distribution rights that are specific to different optical disk user platforms and/or optical disk appliances.
  67. 67. A rights management system for providing copy protection, use and/or distribution rights management of digital property stored or otherwise contained on a digital versatile disk, comprising:
    a secure container means provided on an optical disk medium for cryptographically encapsulating digital property content stored on the optical disk, said container means comprising a content object means for containing digital property content and a control object means for containing control rules for regulating use and/or distribution of said digital property content stored on the optical disk.
  68. 68. The rights management system of
    claim 67
    wherein an optical disk player appliance for using information stored on an optical disk comprises a secure node means for using said secure container means provided on an optical disk and implementing said control rules to control operation of said player appliance to regulate use of said digital property content.
  69. 69. In a system including plural electronic appliances at least temporarily connected to one another, a rights authority broker that determines what appliances are connected and specifies at least one rights management context depending on said determination.
  70. 70. An electronic appliance at least temporarily connected to a rights authority broker, the electronic appliance receiving at least one rights context from the rights authority broker when the device is connected to the rights authority broker.
  71. 71. A first electronic appliance at least temporarily connected to a second electronic appliance, the first electronic appliance selecting between at least first and second rights management contexts depending at least in part on whether the first appliance is connected to the second electronic appliance.
  72. 72. In a system including first and second electronic appliances that may be selectively coupled to communicate with one another, an arrangement for defining at least one different rights management control based at least in part on whether the first and second electronic appliances are connected.
  73. 73. A method of defining at least one rights management context comprising:
    (a) determining whether a first electronic appliance is present; and
    (b) defining at least one rights management control set based at least in part on the determining step (a).
  74. 74. A method of defining at least one rights management context including:
    (a) coupling an optical disk storing information to an electronic appliance that can be selectively connected to a rights management broker;
    (b) determining whether the electronic appliance is currently coupled to a rights management broker; and
    (c) conditioning at least one aspect of use of at least some of the information stored on the optical disk based on whether the electronic appliance is coupled to the rights management broker.
  75. 75. A method as in
    claim 74
    wherein step (c) includes the step of obtaining at least one rights management context from the rights management broker.
  76. 76. A method as in
    claim 74
    wherein step (c) includes the step of obtaining at least one combined control set from the rights management broker.
  77. 77. A method of defining at least one rights management context including:
    (a) coupling an optical disk storing information to an electronic appliance;
    (b) using at least some of the information stored on the optical disk based on a first rights management context;
    (c) coupling the electronic appliance to a rights management broker; and
    (d) concurrently with step (c), using at least some of the information stored on the optical disk based on a second rights management context different from the first rights management context
  78. 78. An electronic appliance include a secure node and an optical disk reader, the electronic appliance applying different rights management contexts to protected information stored on an optical disk coupled to the optical disk reader depending at least in part on whether the electronic appliance is coupled to at least one additional secure node.
  79. 79. An electronic appliance including:
    an optical disk reading and/or writing arrangement;
    a secure node coupled to the optical disk reading and/or writing arrangement, the secure node performing at least one rights management related function with respect to at least some information read by the optical disk reading and/or writing arrangement; and
    at least one serial bus port coupled to the secure node, the serial bus port for providing any or all of the functions, structures, protocols and/or methods of IEEE 1394-1995.
  80. 80. A digital versatile disk appliance including:
    means for watermarking content; and
    serial bus means for communicating the watermarked content,
    wherein the serial bus means complies with IEEE 1394-1995.
  81. 81. An optical disk reading and/or writing device including:
    at least one secure node capable of watermarking content and/or processing watermarked content; and
    an IEEE 1394-1995 serial bus port.
  82. 82. An optical disk using device comprising:
    a secure processing unit; and
    an IEEE 1394-1995 serial bus port.
  83. 83. A device as in
    claim 82
    wherein the secure processing unit includes a channel manager.
  84. 84. A device as in
    claim 82
    wherein the secure processing unit executes a rights operating system in whole or in part.
  85. 85. A device as in
    claim 82
    wherein the secure processing unit includes a tamper-resistant barrier.
  86. 86. A device as in
    claim 82
    wherein the secure processing unit includes an encryption/decryption engine.
  87. 87. A rights cooperation method comprising:
    (a) connecting an appliance to at least one further appliance;
    (b) determining whether the first and/or further appliance and/or user(s) of said first and/or further appliance have appropriate rights and/or resources for performing an action; and
    (c) selectively performing the action based at least in part on the determination.
  88. 88. A rights cooperation method comprising:
    (a) connecting an appliance to at least one further appliance;
    (b) determining whether the first and/or further appliance and/or user(s) of said first and/or further appliance have appropriate security for performing an action; and
    (c) cooperating between the first and further appliance to selectively perform the action.
  89. 89. A cooperative rights management arrangement comprising:
    a communications arrangement that allows at least first and second appliances to communicate; and
    an arrangement that processes at least one event based at least in part on assessing and/or pooling rights and/or resources between the first and second appliances.
  90. 90. An optical disk using system and/or method including at least some of the elements shown in FIG. 1A.
  91. 91. An optical disk using system and/or method including at least some of the elements shown in FIG. 1B.
  92. 92. An optical disk using system and/or method including at least some of the elements shown in FIG. 1C.
  93. 93. An optical disk using system and/or method including at least some of the elements shown in FIG. 2A.
  94. 94. An optical disk using system and/or method including at least some of the elements shown in FIG. 2B.
  95. 95. An optical disk using system and/or method including at least some of the elements shown in FIG. 3.
  96. 96. An optical disk using system and/or method using at least some of the elements shown in FIG. 3A.
  97. 97. An optical disk using system and/or method using at least some of the control set elements shown in FIG. 3B.
  98. 98. An optical disk using system and/or method using at least some of the elements shown in FIG. 4A.
  99. 99. An optical disk using system and/or method using at least some of the elements shown in FIG. 4B.
  100. 100. An optical disk using system and/or method using at least some of the elements shown in FIG. 5.
  101. 101. An optical disk using system and/or method using at least some of the elements shown in FIG. 6.
  102. 102. An optical disk using system and/or method using at least some of the elements shown in FIG. 7.
  103. 103. An optical disk using system and/or method using at least some of the elements shown in FIG. 8.
  104. 104. An optical disk using system and/or method using at least some of the elements shown in FIG. 9.
  105. 105. An optical disk using system and/or method using at least some of the elements shown in FIG. 10.
  106. 106. An optical disk using system and/or method using at least some of the elements shown in FIG. 11.
  107. 107. An optical disk using system and/or method including at least some of the elements shown in FIG. 12.
  108. 108. An optical disk using system and/or method including at least some of the elements shown in FIG. 13.
  109. 109. An optical disk using system and/or method including at least some of the elements shown in FIG. 14.
  110. 110. A system and/or method including some or all of the elements shown in FIGS. 15A-15C.
  111. 111. A system and/or method as in any one of the preceding claims, further including, in combination, any element described in any one of the following prior patent specifications:
    PCT Publication No. WO 96/27155;
    European Patent No. EP 329681;
    PCT Application No. PCT/US96/14262;
    U.S. patent application Ser. No. 08/689,606; and/or
    U.S. patent application Ser. No. 08/689,754.
  112. 112. A system or process as in any of the preceding claims wherein the phrase “high capacity optical disk” is substituted for “digital versatile disk.”
  113. 113. A method of clearing or otherwise processing information resulting at least in part from one or more digital versatile disk appliances and/or methods as defined in any of the preceding claims.
  114. 114. A system and/or method for defining rules for use in one or more digital versatile disk appliances and/or methods as defined in any of the preceding claims.
  115. 115. A system and/or method for defining rules and associated content for use in one or more digital versatile disk appliances and/or methods as defined in any of the preceding claims.
  116. 116. A system and/or method for producing an optical disk for use with one or more digital versatile disk appliances and/or methods as defined in any of the preceding claims.
  117. 117. A system and/or method for clearing audit information from one or more appliances and/or methods as defined in any of the preceding claims.
  118. 118. In an network including at least one electronic appliance that reads information from and/or writes information to at least one digital versatile disk optical storage medium, and securely communicates information associated with at least one of payment, auditing, usage, access, controlling and/or otherwise managing content recorded on the storage medium, a method of processing said communicated information including the step of generating at least one payment request and/or order based at least in part on the information.
  119. 119. A method of defining at least one control set for storage on a high capacity optical disk that can storage images, audio, text and/or other information, the high capacity optical disk for use by any of plural different electronic appliance types, the method including the step of specifying at least one control that provides different conditions and/or consequences depending upon at least one of the following:
    electronic appliance class;
    electronic appliance security;
    electronic appliance user class;
    electronic appliance connectivity;
    electronic appliance resources;
    electronic appliance access to resources; and
    rights management cooperation between plural electronic appliances.
US08848077 1995-02-13 1997-05-15 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances Abandoned US20010042043A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US38810795 true 1995-02-13 1995-02-13
US08848077 US20010042043A1 (en) 1995-02-13 1997-05-15 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
US08848077 US20010042043A1 (en) 1995-02-13 1997-05-15 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11429385 US20060212370A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11418698 US20060200392A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11431344 US20070185813A1 (en) 1995-02-13 2006-05-09 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435424 US20070192252A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435694 US20060206397A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic right management in closed and connected appliances
US11435425 US20060277122A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11926652 US20080107264A1 (en) 1995-02-13 2007-10-29 Cryptographic Methods, Apparatus and Systems for Storage Media Electronic Rights Management in Closed and Connected Appliances
US12645264 US20100174652A1 (en) 1995-02-13 2009-12-22 Cryptographic methods, apparatus and systems for storage media electronic right management in closed and connected appliances
US14304700 US20150006403A1 (en) 1995-02-13 2014-06-13 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances

Related Parent Applications (5)

Application Number Title Priority Date Filing Date
US38810795 Continuation-In-Part 1995-02-13 1995-02-13
US69971296 Continuation-In-Part 1996-08-12 1996-08-12
US08689754 Continuation-In-Part US6157721A (en) 1996-08-12 1996-08-12 Systems and methods using cryptography to protect secure computing environments
US08689606 Continuation-In-Part US5943422A (en) 1996-08-12 1996-08-12 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
PCT/US1996/014262 Continuation-In-Part WO1998010381A1 (en) 1996-09-04 1996-09-04 Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management

Related Child Applications (6)

Application Number Title Priority Date Filing Date
US11429385 Continuation US20060212370A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11418698 Continuation US20060200392A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11431344 Continuation US20070185813A1 (en) 1995-02-13 2006-05-09 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435424 Continuation US20070192252A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435425 Continuation US20060277122A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11926652 Continuation US20080107264A1 (en) 1995-02-13 2007-10-29 Cryptographic Methods, Apparatus and Systems for Storage Media Electronic Rights Management in Closed and Connected Appliances

Publications (1)

Publication Number Publication Date
US20010042043A1 true true US20010042043A1 (en) 2001-11-15

Family

ID=23532729

Family Applications (33)

Application Number Title Priority Date Filing Date
US08760440 Expired - Lifetime US5910987A (en) 1995-02-13 1996-12-04 Systems and methods for secure transaction management and electronic rights protection
US08778256 Expired - Lifetime US5949876A (en) 1995-02-13 1997-01-08 Systems and methods for secure transaction management and electronic rights protection
US08780393 Expired - Lifetime US5915019A (en) 1995-02-13 1997-01-08 Systems and methods for secure transaction management and electronic rights protection
US08780545 Expired - Lifetime US5917912A (en) 1995-02-13 1997-01-08 System and methods for secure transaction management and electronic rights protection
US08848077 Abandoned US20010042043A1 (en) 1995-02-13 1997-05-15 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US08964333 Expired - Lifetime US5982891A (en) 1995-02-13 1997-11-04 Systems and methods for secure transaction management and electronic rights protection
US09208017 Expired - Lifetime US6253193B1 (en) 1995-02-13 1998-12-09 Systems and methods for the secure transaction management and electronic rights protection
US09221479 Expired - Lifetime US6185683B1 (en) 1995-02-13 1998-12-28 Trusted and secure techniques, systems and methods for item delivery and execution
US09327405 Expired - Lifetime US6363488B1 (en) 1995-02-13 1999-06-07 Systems and methods for secure transaction management and electronic rights protection
US09328671 Expired - Lifetime US6389402B1 (en) 1995-02-13 1999-06-09 Systems and methods for secure transaction management and electronic rights protection
US09335465 Expired - Lifetime US6237786B1 (en) 1995-02-13 1999-06-17 Systems and methods for secure transaction management and electronic rights protection
US09389967 Expired - Lifetime US6427140B1 (en) 1995-02-13 1999-09-03 Systems and methods for secure transaction management and electronic rights protection
US09764370 Expired - Lifetime US7076652B2 (en) 1995-02-13 2001-01-19 Systems and methods for secure transaction management and electronic rights protection
US10106742 Expired - Fee Related US6640304B2 (en) 1995-02-13 2002-03-25 Systems and methods for secure transaction management and electronic rights protection
US10157061 Expired - Fee Related US7051212B2 (en) 1995-02-13 2002-05-30 Systems and methods for secure transaction management and electronic rights protection
US10696659 Expired - Lifetime US7100199B2 (en) 1995-02-13 2003-10-28 Systems and methods for secure transaction management and electronic rights protection
US11359979 Abandoned US20060174326A1 (en) 1995-02-13 2006-02-21 Systems and methods for secure transaction management and electronic rights protection
US11418698 Abandoned US20060200392A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11429385 Abandoned US20060212370A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11431344 Abandoned US20070185813A1 (en) 1995-02-13 2006-05-09 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435424 Abandoned US20070192252A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435425 Abandoned US20060277122A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11438953 Active 2018-07-22 US7917749B2 (en) 1995-02-13 2006-05-22 Systems and methods for secure transaction management and electronic rights protection
US11440141 Expired - Lifetime US8543842B2 (en) 1995-02-13 2006-05-23 System and methods for secure transaction management and electronics rights protection
US11980245 Abandoned US20090132805A1 (en) 1995-02-13 2007-10-29 Systems and methods for secure transaction management and electronic rights protection
US11980282 Expired - Lifetime US8006087B2 (en) 1995-02-13 2007-10-29 Systems and methods for secure transaction management and electronic rights protection
US11980075 Abandoned US20080120240A1 (en) 1995-02-13 2007-10-29 Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US11926652 Abandoned US20080107264A1 (en) 1995-02-13 2007-10-29 Cryptographic Methods, Apparatus and Systems for Storage Media Electronic Rights Management in Closed and Connected Appliances
US11981332 Abandoned US20090043652A1 (en) 1995-02-13 2007-10-30 Systems and methods for secure transaction management and electronic rights protection
US12780702 Expired - Fee Related US8572411B2 (en) 1995-02-13 2010-05-14 Systems and methods for secure transaction management and electronic rights protection
US12893901 Expired - Fee Related US8112625B2 (en) 1995-02-13 2010-09-29 Systems and methods for secure transaction management and electronic rights protection
US12895423 Abandoned US20110022520A1 (en) 1995-02-13 2010-09-30 Systems and Methods for Secure Transaction Management and Electronic Rights Protection
US14304700 Abandoned US20150006403A1 (en) 1995-02-13 2014-06-13 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US08760440 Expired - Lifetime US5910987A (en) 1995-02-13 1996-12-04 Systems and methods for secure transaction management and electronic rights protection
US08778256 Expired - Lifetime US5949876A (en) 1995-02-13 1997-01-08 Systems and methods for secure transaction management and electronic rights protection
US08780393 Expired - Lifetime US5915019A (en) 1995-02-13 1997-01-08 Systems and methods for secure transaction management and electronic rights protection
US08780545 Expired - Lifetime US5917912A (en) 1995-02-13 1997-01-08 System and methods for secure transaction management and electronic rights protection

Family Applications After (28)

Application Number Title Priority Date Filing Date
US08964333 Expired - Lifetime US5982891A (en) 1995-02-13 1997-11-04 Systems and methods for secure transaction management and electronic rights protection
US09208017 Expired - Lifetime US6253193B1 (en) 1995-02-13 1998-12-09 Systems and methods for the secure transaction management and electronic rights protection
US09221479 Expired - Lifetime US6185683B1 (en) 1995-02-13 1998-12-28 Trusted and secure techniques, systems and methods for item delivery and execution
US09327405 Expired - Lifetime US6363488B1 (en) 1995-02-13 1999-06-07 Systems and methods for secure transaction management and electronic rights protection
US09328671 Expired - Lifetime US6389402B1 (en) 1995-02-13 1999-06-09 Systems and methods for secure transaction management and electronic rights protection
US09335465 Expired - Lifetime US6237786B1 (en) 1995-02-13 1999-06-17 Systems and methods for secure transaction management and electronic rights protection
US09389967 Expired - Lifetime US6427140B1 (en) 1995-02-13 1999-09-03 Systems and methods for secure transaction management and electronic rights protection
US09764370 Expired - Lifetime US7076652B2 (en) 1995-02-13 2001-01-19 Systems and methods for secure transaction management and electronic rights protection
US10106742 Expired - Fee Related US6640304B2 (en) 1995-02-13 2002-03-25 Systems and methods for secure transaction management and electronic rights protection
US10157061 Expired - Fee Related US7051212B2 (en) 1995-02-13 2002-05-30 Systems and methods for secure transaction management and electronic rights protection
US10696659 Expired - Lifetime US7100199B2 (en) 1995-02-13 2003-10-28 Systems and methods for secure transaction management and electronic rights protection
US11359979 Abandoned US20060174326A1 (en) 1995-02-13 2006-02-21 Systems and methods for secure transaction management and electronic rights protection
US11418698 Abandoned US20060200392A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11429385 Abandoned US20060212370A1 (en) 1995-02-13 2006-05-04 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11431344 Abandoned US20070185813A1 (en) 1995-02-13 2006-05-09 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435424 Abandoned US20070192252A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11435425 Abandoned US20060277122A1 (en) 1995-02-13 2006-05-16 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US11438953 Active 2018-07-22 US7917749B2 (en) 1995-02-13 2006-05-22 Systems and methods for secure transaction management and electronic rights protection
US11440141 Expired - Lifetime US8543842B2 (en) 1995-02-13 2006-05-23 System and methods for secure transaction management and electronics rights protection
US11980245 Abandoned US20090132805A1 (en) 1995-02-13 2007-10-29 Systems and methods for secure transaction management and electronic rights protection
US11980282 Expired - Lifetime US8006087B2 (en) 1995-02-13 2007-10-29 Systems and methods for secure transaction management and electronic rights protection
US11980075 Abandoned US20080120240A1 (en) 1995-02-13 2007-10-29 Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US11926652 Abandoned US20080107264A1 (en) 1995-02-13 2007-10-29 Cryptographic Methods, Apparatus and Systems for Storage Media Electronic Rights Management in Closed and Connected Appliances
US11981332 Abandoned US20090043652A1 (en) 1995-02-13 2007-10-30 Systems and methods for secure transaction management and electronic rights protection
US12780702 Expired - Fee Related US8572411B2 (en) 1995-02-13 2010-05-14 Systems and methods for secure transaction management and electronic rights protection
US12893901 Expired - Fee Related US8112625B2 (en) 1995-02-13 2010-09-29 Systems and methods for secure transaction management and electronic rights protection
US12895423 Abandoned US20110022520A1 (en) 1995-02-13 2010-09-30 Systems and Methods for Secure Transaction Management and Electronic Rights Protection
US14304700 Abandoned US20150006403A1 (en) 1995-02-13 2014-06-13 Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances

Country Status (7)

Country Link
US (33) US5910987A (en)
EP (11) EP1515216B1 (en)
JP (33) JPH10512074A (en)
CN (13) CN1912885B (en)
CA (2) CA2212574C (en)
DE (3) DE69637733D1 (en)
WO (1) WO1996027155A3 (en)

Cited By (248)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010008016A1 (en) * 1998-09-18 2001-07-12 Seigo Kotani Information management method and information management apparatus
US20010014157A1 (en) * 2000-02-14 2001-08-16 Kabushiki Kaisha Toshiba Method and system for distributing programs using tamper resistant processor
US20010023416A1 (en) * 2000-03-15 2001-09-20 Masahiro Hosokawa Internet broadcast billing system
US20010041061A1 (en) * 2000-04-13 2001-11-15 Toshiyuki Nakagawa Information processing apparatus and method
US20010054152A1 (en) * 2000-02-08 2001-12-20 Ricoh Company, Ltd. Device management system, management client, controller server, method for managing usage context of device, and recording medium which records the method
US20020001385A1 (en) * 2000-06-30 2002-01-03 Hirotsugu Kawada Recording method and apparatus, optical disk, and computer-readable storage medium
US20020023219A1 (en) * 2000-08-16 2002-02-21 Koninklijke Philips Electronics N.V. Method and device for controlling distribution and use of digital works
US20020025042A1 (en) * 2000-08-23 2002-02-28 Kabushiki Kaisha Toshiba Scheme for transferring copyright protected contents data using radio link layer authentication/encryption
US20020035544A1 (en) * 2000-09-06 2002-03-21 Satoru Wakao Method and apparatus for forming content, method and apparatus for reproducing content and computer readable storage medium
US20020034532A1 (en) * 1996-12-20 2002-03-21 Brodbeck Kevin J. Injectable depot gel composition and method of preparing the composition
US20020052885A1 (en) * 2000-05-02 2002-05-02 Levy Kenneth L. Using embedded data with file sharing
US20020057799A1 (en) * 2000-10-10 2002-05-16 Fumio Kohno Data delivery system, server apparatus, reproducing apparatus, data delivery method, data playback method, storage medium, control, signal, and transmission data signal
US20020085722A1 (en) * 2000-09-07 2002-07-04 Tomoyuki Asano Information recording device. information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith
US20020087859A1 (en) * 2000-05-19 2002-07-04 Weeks Stephen P. Trust management systems and methods
US20020090114A1 (en) * 1995-07-27 2002-07-11 Rhoads Geoffrey B. Watermark enabled video objects
US20020088463A1 (en) * 2000-06-23 2002-07-11 Lawrence Keane De-agglomerator for breath-actuated dry powder inhaler
US20020114465A1 (en) * 2000-01-05 2002-08-22 Shen-Orr D. Chaim Digital content delivery system and method
US20020133741A1 (en) * 2001-03-19 2002-09-19 Kazuki Maeda Data reception system capable of replacing recording medium
US20020144067A1 (en) * 2001-03-31 2002-10-03 Jeong Jae Yoon Apparatus and method for moving contents
US20020143782A1 (en) * 2001-03-30 2002-10-03 Intertainer, Inc. Content management system
US20020141584A1 (en) * 2001-01-26 2002-10-03 Ravi Razdan Clearinghouse for enabling real-time remote digital rights management, copyright protection and distribution auditing
US20020152173A1 (en) * 2001-04-05 2002-10-17 Rudd James M. System and methods for managing the distribution of electronic content
US20020162103A1 (en) * 2001-04-26 2002-10-31 Yves Boudreault Mixed-media data encoding
US20020168070A1 (en) * 2001-05-09 2002-11-14 Bernsen Johannes Arnoldus Cornelis Method and apparatus for decrypting encrypted data stored on a record carrier
US6488508B2 (en) * 1993-05-10 2002-12-03 Adc Technology Inc. Interactive communication system for communicating video game and karaoke software
US20020184515A1 (en) * 2001-05-29 2002-12-05 Masahiro Oho Rights management unit
US20020184490A1 (en) * 2001-06-05 2002-12-05 Storage Technology Corporation Anti-piracy network storage device
US20030009668A1 (en) * 2001-06-14 2003-01-09 Chan Shannon J. Key exchange mechanism for streaming protected media content
US20030023755A1 (en) * 2000-12-18 2003-01-30 Kargo, Inc. System and method for delivering content to mobile devices
US20030028888A1 (en) * 2001-02-12 2003-02-06 Hunter Charles Eric Systems and methods for providing consumers with entertainment content and associated periodically updated advertising
US20030046274A1 (en) * 2001-08-30 2003-03-06 Erickson John S. Software media container
US20030050894A1 (en) * 1999-03-05 2003-03-13 Toru Kambayashi Information recording device and information reproducing device
US20030074319A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Method, system, and program for securely providing keys to encode and decode data in a storage cartridge
US20030084003A1 (en) * 2001-04-20 2003-05-01 Intertrust Technologies Corporation Systems and methods for conducting transactions and communications using a trusted third party
US20030085997A1 (en) * 2000-04-10 2003-05-08 Satoshi Takagi Asset management system and asset management method
US20030103528A1 (en) * 2001-11-30 2003-06-05 Matsushita Electric Industrial Co., Ltd. Information converting apparatus
US20030110126A1 (en) * 2001-12-10 2003-06-12 Dunkeld Bryan C. System & method for unique digital asset identification and transaction management
US20030133692A1 (en) * 1999-08-27 2003-07-17 Charles Eric Hunter Video distribution system
US20030159037A1 (en) * 2001-01-16 2003-08-21 Ryuta Taki Apparatus and method for recording/reproducing information
US20030172034A1 (en) * 1996-01-11 2003-09-11 Veridian Information Solutions, Inc. System for controlling access and distribution of digital property
US20030172285A1 (en) * 1995-08-11 2003-09-11 Sony Corporation Method and apparatus for ciphering playback mode information for recording on record medium
WO2003079165A2 (en) * 2002-03-18 2003-09-25 Hewlett-Packard Development Company, L.P. Ensuring policy enforcement before allowing usage of private key
US20030187799A1 (en) * 2002-02-27 2003-10-02 William Sellars Multiple party content distribution system and method with rights management features
US20030188183A1 (en) * 2001-08-27 2003-10-02 Lee Lane W. Unlocking method and system for data on media
US20030190044A1 (en) * 2002-04-05 2003-10-09 Akio Higashi Content using system
WO2003088673A1 (en) * 2002-04-18 2003-10-23 Koninklijke Philips Electronics N.V. Testing content in a conditional access system
US6647129B2 (en) 1993-11-18 2003-11-11 Digimarc Corporation Method and system for encoding image and audio content
US6665303B1 (en) * 1998-01-05 2003-12-16 Kabushiki Kaisha Toshiba Scheme for realizing communications through external network from contents processing device connected to local network in home environment
WO2004019318A2 (en) * 2002-08-26 2004-03-04 Samsung Electronics Co., Ltd. Apparatus for reproducing av data in interactive mode, method of handling user input, and information storage medium therefor
US20040049648A1 (en) * 2001-04-13 2004-03-11 Mitsuhiro Sato Content recording/playback appratus, and recording medium storing program for content recording/playback
US20040059933A1 (en) * 2002-07-16 2004-03-25 Levy Kenneth L. Digital watermarking and fingerprinting applications for copy protection
US20040073601A1 (en) * 1998-03-25 2004-04-15 Digital-Vending Services International, Llc Computer architecture for managing courseware in a shared use operating environment
US20040073813A1 (en) * 2002-04-25 2004-04-15 Intertrust Technologies Corporation Establishing a secure channel with a human user
US20040098277A1 (en) * 2002-11-18 2004-05-20 Microsoft Corporation Licenses that include fields identifying properties
US20040107356A1 (en) * 1999-03-16 2004-06-03 Intertrust Technologies Corp. Methods and apparatus for persistent control and protection of content
US20040117619A1 (en) * 2002-12-17 2004-06-17 Singer Mitch Fredrick Content access in a media network environment
US20040117643A1 (en) * 2002-12-17 2004-06-17 Sony Corporation System and method for home network content protection and copy management
US20040161728A1 (en) * 2003-02-14 2004-08-19 Benevento Francis A. Distance learning system
US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
WO2004075092A1 (en) * 2003-02-21 2004-09-02 Matsushita Electric Industrial Co., Ltd. Software-management system, recording medium, and information-processing device
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US20040213113A1 (en) * 2003-04-24 2004-10-28 Kim Byung Jin Method for managing copy protection information of recording medium
US20040213408A1 (en) * 2003-04-24 2004-10-28 Kim Byung Jin Method for managing copy protection information of recording medium
US20040213111A1 (en) * 2003-04-24 2004-10-28 Kim Byung Jin Method for managing copy protection information of recording medium
US20040213112A1 (en) * 2003-04-24 2004-10-28 Kim Byung Jin Method for managing copy protection information of recording medium
US20040223747A1 (en) * 2002-04-19 2004-11-11 Tapani Otala Method and apparatus for creating an enhanced photo digital video disc
US20040227779A1 (en) * 2003-05-02 2004-11-18 Michael Weber Method for providing a user interface for controlling an appliance in a network of distributed stations, as well as a network appliance for carrying out the method
US20040249721A1 (en) * 2003-01-22 2004-12-09 Funai Electric Co., Ltd. Internet shopping system and combined television/internet system
US20040255160A1 (en) * 2003-01-23 2004-12-16 Verdasys, Inc. Digital asset usage accountability via event journaling
US20040258275A1 (en) * 1999-05-19 2004-12-23 Rhoads Geoffrey B. Methods and systems for interacting with posters
US20050005142A1 (en) * 2001-11-16 2005-01-06 Fontijn Wilhelmus Fransiscus Johannes Digital rights management
US20050010536A1 (en) * 2002-02-27 2005-01-13 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US20050008163A1 (en) * 2003-06-02 2005-01-13 Liquid Machines, Inc. Computer method and apparatus for securely managing data objects in a distributed context
US6868497B1 (en) 1999-03-10 2005-03-15 Digimarc Corporation Method and apparatus for automatic ID management
US20050060584A1 (en) * 1995-02-13 2005-03-17 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US20050058978A1 (en) * 2003-09-12 2005-03-17 Benevento Francis A. Individualized learning system
US20050060537A1 (en) * 2003-01-23 2005-03-17 Verdasys, Inc. Managed distribution of digital assets
US20050080733A1 (en) * 2003-10-14 2005-04-14 Mer-Tec, Inc. Secure internet payment process
US20050108555A1 (en) * 1999-12-22 2005-05-19 Intertrust Technologies Corporation Systems and methods for protecting data secrecy and integrity
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper
US20050182715A1 (en) * 2004-02-17 2005-08-18 Hideaki Kawahara Method and system for charging for repeated use of a digital content item
US20050183072A1 (en) * 1999-07-29 2005-08-18 Intertrust Technologies Corporation Software self-defense systems and methods
US20050191033A1 (en) * 2004-02-26 2005-09-01 Daisuke Ishido Information processing system, information processing method, and computer program
US20050198510A1 (en) * 2004-02-13 2005-09-08 Arnaud Robert Binding content to an entity
US20050210261A1 (en) * 2002-05-22 2005-09-22 Kamperman Franciscus Lucas A J Digital rights management method and system
US20050216419A1 (en) * 2004-03-29 2005-09-29 Samsung Electronics Co., Ltd. Method and apparatus for acquiring and removing information regarding digital rights objects
WO2005093543A1 (en) * 2004-03-23 2005-10-06 Koninklijke Philips Electronics N.V. Computer network access control system
US20050232595A1 (en) * 1999-01-11 2005-10-20 Sony Corporation Information signal recording device having accounting function, and accounting terminal device
US20050235154A1 (en) * 1999-06-08 2005-10-20 Intertrust Technologies Corp. Systems and methods for authenticating and protecting the integrity of data streams and other data
US20050254390A1 (en) * 1999-11-05 2005-11-17 Sony Corporation Data decoding apparatus and method, charge information processing apparatus and method, data reproducing apparatus and method, electronic money, electronic use right, and terminal apparatus
US6971882B1 (en) * 1998-01-07 2005-12-06 Electric Planet, Inc. Method and apparatus for providing interactive karaoke entertainment
US20050278369A1 (en) * 2002-05-02 2005-12-15 Megumi Tokita Information processing system, information processing apparatus, method and program
US6983371B1 (en) * 1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content
WO2004109466A3 (en) * 2003-06-02 2006-02-09 Infocus Corp Security of data over a network
US20060036732A1 (en) * 1999-07-30 2006-02-16 Intertrust Technologies Corporation Methods and systems for transaction record delivery using thresholds and multi-stage protocol
US20060053078A1 (en) * 2002-10-18 2006-03-09 Junichi Yamamoto Content price control system, method and recording medium
US20060069926A1 (en) * 1995-02-13 2006-03-30 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20060078160A1 (en) * 1999-10-21 2006-04-13 Takeshi Fujita Information providing system and identification information adding device
EP1648169A1 (en) * 1999-05-21 2006-04-19 ATI International SRL Method and apparatus for processing video signals having associated access restriction data
US7035427B2 (en) 1993-11-18 2006-04-25 Digimarc Corporation Method and system for managing, accessing and paying for the use of copyrighted electronic media
US7047241B1 (en) 1995-10-13 2006-05-16 Digimarc Corporation System and methods for managing digital creative works
US7050586B1 (en) 2000-06-19 2006-05-23 Intertrust Technologies Corporation Systems and methods for retrofitting electronic appliances to accept different content formats
US20060123249A1 (en) * 1999-07-16 2006-06-08 Intertrust Technologies Corporation Trusted storage systems and methods
US20060161595A1 (en) * 2005-01-19 2006-07-20 Noriko Sugimoto Information recording apparatus
US7082539B1 (en) * 1999-03-19 2006-07-25 Hitachi, Ltd. Information processing apparatus
US7085839B1 (en) 2000-04-07 2006-08-01 Intertrust Technologies Corporation Network content management
US20060173794A1 (en) * 2002-02-27 2006-08-03 Imagineer Software, Inc. Secure electronic commerce using mutating identifiers
US7096504B1 (en) * 1999-09-01 2006-08-22 Matsushita Electric Industrial Co., Ltd. Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method
WO2006089109A2 (en) * 2005-02-14 2006-08-24 Extensis Corporation Format and systems for secure utilization of electronic fonts
US20060190618A1 (en) * 2005-02-24 2006-08-24 Nobuyoshi Tomita Information processing system, reproducing terminal device and reproducing method, information processing device and method, and program
US20060195402A1 (en) * 2002-02-27 2006-08-31 Imagineer Software, Inc. Secure data transmission using undiscoverable or black data
US7107448B1 (en) 2000-06-04 2006-09-12 Intertrust Technologies Corporation Systems and methods for governing content rendering, protection, and management applications
US7110539B1 (en) * 1999-03-22 2006-09-19 Kent Ridge Digital Labs Method and apparatus for encrypting and decrypting data
US20060218651A1 (en) * 1995-02-13 2006-09-28 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US20060245741A1 (en) * 2000-03-09 2006-11-02 Cynthia Lakhansingh Digital enterainment recorder
US20060294373A1 (en) * 2003-01-23 2006-12-28 Verdasys, Inc. Adaptive transparent encryption
WO2006041590A3 (en) * 2004-10-11 2007-01-25 Brant L Candelore Digital rights management of a digital device
US20070061268A1 (en) * 2005-09-12 2007-03-15 Microsoft Corporation Prepaid or pay-as-you-go software, content and services delivered in a secure manner
US20070067649A1 (en) * 2000-10-04 2007-03-22 Sony Corporation Data outputting method, data outputting apparatus, data reproducing method, data reproducing apparatus, data recording method, data recording apparatus, and record medium
US20070073916A1 (en) * 2005-09-23 2007-03-29 Rothman Michael A Method for computing platform data protection
GB2430771A (en) * 2005-09-30 2007-04-04 Motorola Inc Content access rights management
US20070083473A1 (en) * 2005-10-11 2007-04-12 Farrugia Augustin J Use of media storage structure with multiple pieces of content in a content-distribution system
US20070083769A1 (en) * 2000-10-24 2007-04-12 Ryuichi Iwamura Method and system for a secure digital decoder with secure key distribution
US7213266B1 (en) 2000-06-09 2007-05-01 Intertrust Technologies Corp. Systems and methods for managing and protecting electronic content and applications
US20070100757A1 (en) * 1999-05-19 2007-05-03 Rhoads Geoffrey B Content Protection Arrangements
US20070121625A1 (en) * 2005-11-30 2007-05-31 Samsung Electronics Co., Ltd. Method and device for creating/reproducing multimedia file, and information recording medium storing multimedia file
US20070147207A1 (en) * 2000-10-31 2007-06-28 Sony Corporation Apparatus for, and method of, recording/playing audio data having additional information embedded therein
US20070162982A1 (en) * 1999-03-15 2007-07-12 Staring Antonius A M Method and system for providing copy-protection on a storage medium and storage medium for use in such a system
US7251327B1 (en) * 1998-10-14 2007-07-31 Sony Corporation Data transmission apparatus, data transmission method, and data recording medium
US20070177188A1 (en) * 2006-01-27 2007-08-02 Sbc Knowledge Ventures, L.P. Methods and systems to process an image
US7266681B1 (en) 2000-04-07 2007-09-04 Intertrust Technologies Corp. Network communications security agent
US20070220194A1 (en) * 2004-06-21 2007-09-20 Koninklijke Philips Electronics, N.V. System for covertly storing control information
US20070230698A1 (en) * 2006-04-04 2007-10-04 Intertrust Technologies Corporation Systems and methods for retrofitting electronic appliances to accept different content formats
US20070260548A1 (en) * 2006-05-03 2007-11-08 Apple Computer, Inc. Device-independent management of cryptographic information
US20080028474A1 (en) * 1999-07-29 2008-01-31 Intertrust Technologies Corp. Systems and Methods for Watermarking Software and Other Media
US7328345B2 (en) * 2002-01-29 2008-02-05 Widevine Technologies, Inc. Method and system for end to end securing of content for video on demand
US20080046372A1 (en) * 2006-05-11 2008-02-21 Howard Lutnick Methods and apparatus for electronic file use and management
US20080088713A1 (en) * 2005-03-30 2008-04-17 Searete LLC, a liability corporation of the State of Delaware Image transformation estimator of an imaging device
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US7383446B1 (en) * 1999-08-30 2008-06-03 Fujitsu Limited Recording device
US20080140835A1 (en) * 2003-06-05 2008-06-12 Intertrust Technologies Corp. Interoperable systems and methods for peer-to-peer service orchestration
US7433836B1 (en) * 2000-09-01 2008-10-07 Lucent Technologies Inc. Enterprise information and communication system having a transaction management engine for managing bills vouchers purchases and email notifications
US20080320600A1 (en) * 2007-06-21 2008-12-25 Matthew Pandiscia Secure document management system and apparatus
US20080317436A1 (en) * 1999-02-26 2008-12-25 Manabu Sasamoto Digital signal recorder with selective encryption and key generation
US7512986B2 (en) 2001-03-28 2009-03-31 Nds Limited Digital rights management system and method
US7516491B1 (en) * 2002-10-17 2009-04-07 Roger Schlafly License tracking system
US20090097645A1 (en) * 2006-11-30 2009-04-16 Harris Scott C Playing control files for personal video recorders
WO2008060739A3 (en) * 2006-09-06 2009-04-16 Christopher Amidon Rights propagation and license management in conjunction with distribution of digital content
US20090123902A1 (en) * 2007-08-10 2009-05-14 Higgs Nancy N Method And System For The Preparation Of The General Education Development Test
US7581103B2 (en) 2001-06-13 2009-08-25 Intertrust Technologies Corporation Software self-checking systems and methods
US20090217028A1 (en) * 2008-02-27 2009-08-27 Rpost International Limited Method of adding a postscript message to an email
US20090232312A1 (en) * 2004-11-24 2009-09-17 Matsushita Electric Industrial Co., Ltd. Encrypted content reproduction device, encrypted content reproduction method, program, and recording medium for storing the program
US7613917B1 (en) * 2000-09-18 2009-11-03 Navteq North America, Llc Method and system for mass distribution of geographic data for navigation systems
US20090324198A1 (en) * 1999-05-21 2009-12-31 Ati Technologies Srl Method and apparatus for copy protection detection in a video signal
US7647618B1 (en) 1999-08-27 2010-01-12 Charles Eric Hunter Video distribution system
US20100011359A1 (en) * 2000-04-18 2010-01-14 Brian Mark Shuster Method and apparatus for managing ownership of virtual property
USRE41137E1 (en) 2000-02-10 2010-02-16 Charles Eric Hunter Music distribution systems
US7689532B1 (en) 2000-07-20 2010-03-30 Digimarc Corporation Using embedded data with file sharing
US7702511B2 (en) 1995-05-08 2010-04-20 Digimarc Corporation Watermarking to convey auxiliary information, and media embodying same
US7702101B2 (en) 2002-07-09 2010-04-20 Kaleidescape, Inc. Secure presentation of media streams in response to encrypted digital content
US7702589B2 (en) 1999-11-09 2010-04-20 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US7711115B2 (en) 2002-11-05 2010-05-04 Sony Corporation Descrambler
US7730300B2 (en) 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
US7730216B1 (en) 2006-12-14 2010-06-01 Qurio Holdings, Inc. System and method of sharing content among multiple social network nodes using an aggregation node
US20100153407A1 (en) * 2008-12-16 2010-06-17 Krislov Clinton A Method and system for automated document registration
US7747853B2 (en) 2001-06-06 2010-06-29 Sony Corporation IP delivery of secure digital content
US7764701B1 (en) 2006-02-22 2010-07-27 Qurio Holdings, Inc. Methods, systems, and products for classifying peer systems
US7779004B1 (en) 2006-02-22 2010-08-17 Qurio Holdings, Inc. Methods, systems, and products for characterizing target systems
US7782866B1 (en) 2006-09-29 2010-08-24 Qurio Holdings, Inc. Virtual peer in a peer-to-peer network
US7782365B2 (en) 2005-06-02 2010-08-24 Searete Llc Enhanced video/still image correlation
US20100228999A1 (en) * 1999-07-16 2010-09-09 Intertrust Technologies Corporation Trusted Storage Systems and Methods
US7801971B1 (en) 2006-09-26 2010-09-21 Qurio Holdings, Inc. Systems and methods for discovering, creating, using, and managing social network circuits
US20100281323A1 (en) * 2009-04-06 2010-11-04 Samsung Electronics Co., Ltd. Control and data channels for advanced relay operation
USRE41942E1 (en) 1999-03-17 2010-11-16 Lg Electronics Inc. Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon
US7870592B2 (en) 2000-12-14 2011-01-11 Intertainer, Inc. Method for interactive video content programming
US7872675B2 (en) 2005-06-02 2011-01-18 The Invention Science Fund I, Llc Saved-image management
US7876357B2 (en) 2005-01-31 2011-01-25 The Invention Science Fund I, Llc Estimating shared image device operational capabilities or resources
US7917749B2 (en) 1995-02-13 2011-03-29 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US20110075537A1 (en) * 2009-09-25 2011-03-31 General Electric Company Holographic disc with improved features and method for the same
US7920169B2 (en) 2005-01-31 2011-04-05 Invention Science Fund I, Llc Proximity of shared image devices
US7925898B2 (en) 1996-08-12 2011-04-12 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US7925592B1 (en) 2006-09-27 2011-04-12 Qurio Holdings, Inc. System and method of using a proxy server to manage lazy content distribution in a social network
US20110113098A1 (en) * 2006-12-11 2011-05-12 Qurio Holdings, Inc. System and method for social network trust assessment
US7960005B2 (en) 2001-09-14 2011-06-14 Ochoa Optics Llc Broadcast distribution of content for storage on hardware protected optical storage media
US7962750B1 (en) * 1998-08-13 2011-06-14 International Business Machines Corporation System for tracking end-user electronic content usage
US8000584B1 (en) 2002-04-26 2011-08-16 Tivo Inc. Approach for storing digital content onto digital versatile discs (DVDs)
US8009893B2 (en) 1995-05-08 2011-08-30 Digimarc Corporation Security document carrying machine readable pattern
US8019688B2 (en) 1999-08-27 2011-09-13 Ochoa Optics Llc Music distribution system and associated antipiracy protections
US8036419B2 (en) 1998-04-16 2011-10-11 Digimarc Corporation Digital watermarks
US8055899B2 (en) 2000-12-18 2011-11-08 Digimarc Corporation Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
US8072501B2 (en) 2005-10-31 2011-12-06 The Invention Science Fund I, Llc Preservation and/or degradation of a video/audio data stream
US8090619B1 (en) 1999-08-27 2012-01-03 Ochoa Optics Llc Method and system for music distribution
US8107674B2 (en) 2000-02-04 2012-01-31 Digimarc Corporation Synchronizing rendering of multimedia content
US8112311B2 (en) 2001-02-12 2012-02-07 Ochoa Optics Llc Systems and methods for distribution of entertainment and advertising content
US8116516B2 (en) 1995-05-08 2012-02-14 Digimarc Corporation Controlling use of audio or image content
US8233042B2 (en) 2005-10-31 2012-07-31 The Invention Science Fund I, Llc Preservation and/or degradation of a video/audio data stream
US8253821B2 (en) 2005-10-31 2012-08-28 The Invention Science Fund I, Llc Degradation/preservation management of captured data
US8280051B2 (en) 2003-01-31 2012-10-02 Kaleidescape, Inc. Secure presentation of media streams in response to encrypted content
US8290202B2 (en) 1998-11-03 2012-10-16 Digimarc Corporation Methods utilizing steganography
US8307212B2 (en) 1996-08-12 2012-11-06 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US8347098B2 (en) 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US8350946B2 (en) 2005-01-31 2013-01-08 The Invention Science Fund I, Llc Viewfinder for shared image device
US8364981B2 (en) 2001-05-22 2013-01-29 Koninklijke Philips Electronics N.V. Record carrier for storing a digital work
US20130129325A1 (en) * 2008-10-31 2013-05-23 Disney Enterprises, Inc. System and Method for Providing Media Content
USRE44245E1 (en) * 1997-06-16 2013-05-28 Ati Technologies Ulc Method and apparatus for detecting protection of audio and video signals
US8468099B2 (en) 2001-03-30 2013-06-18 Intertainer, Inc. Digital entertainment service platform
US8533851B2 (en) 1996-08-30 2013-09-10 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US8554827B2 (en) 2006-09-29 2013-10-08 Qurio Holdings, Inc. Virtual peer for a content sharing system
US8589372B2 (en) 2008-12-16 2013-11-19 Clinton A. Krislov Method and system for automated document registration with cloud computing
US8606383B2 (en) 2005-01-31 2013-12-10 The Invention Science Fund I, Llc Audio sharing
US8645988B2 (en) 2002-12-13 2014-02-04 Sony Corporation Content personalization for digital content
US8656423B2 (en) 1999-08-27 2014-02-18 Ochoa Optics Llc Video distribution system
US8660961B2 (en) 2004-11-18 2014-02-25 Contentguard Holdings, Inc. Method, system, and device for license-centric content consumption
US8667525B2 (en) 2002-12-13 2014-03-04 Sony Corporation Targeted advertisement selection from a digital stream
US8681225B2 (en) 2005-06-02 2014-03-25 Royce A. Levien Storage access technique for captured data
US8688583B2 (en) 2005-10-18 2014-04-01 Intertrust Technologies Corporation Digital rights management engine systems and methods
US8751793B2 (en) 1995-02-13 2014-06-10 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US8804033B2 (en) 2005-10-31 2014-08-12 The Invention Science Fund I, Llc Preservation/degradation of video/audio aspects of a data stream
US8868464B2 (en) 2008-02-07 2014-10-21 Google Inc. Preventing unauthorized modification or skipping of viewing of advertisements within content
US8902320B2 (en) 2005-01-31 2014-12-02 The Invention Science Fund I, Llc Shared image device synchronization or designation
US8914903B1 (en) 2009-06-03 2014-12-16 Amdocs Software System Limited System, method, and computer program for validating receipt of digital content by a client device
US8914351B2 (en) 2008-12-16 2014-12-16 Clinton A. Krislov Method and system for secure automated document registration from social media networks
US8964054B2 (en) 2006-08-18 2015-02-24 The Invention Science Fund I, Llc Capturing selected image objects
US8988537B2 (en) 2005-01-31 2015-03-24 The Invention Science Fund I, Llc Shared image devices
US9001215B2 (en) 2005-06-02 2015-04-07 The Invention Science Fund I, Llc Estimating shared image device operational capabilities or resources
US9041826B2 (en) 2005-06-02 2015-05-26 The Invention Science Fund I, Llc Capturing selected image objects
US9076208B2 (en) 2006-02-28 2015-07-07 The Invention Science Fund I, Llc Imagery processing
US9082456B2 (en) 2005-01-31 2015-07-14 The Invention Science Fund I Llc Shared image device designation
US9093121B2 (en) 2006-02-28 2015-07-28 The Invention Science Fund I, Llc Data management of an audio data stream
US9124729B2 (en) 2005-01-31 2015-09-01 The Invention Science Fund I, Llc Shared image device synchronization or designation
US9160757B1 (en) * 2014-03-12 2015-10-13 Symantec Corporation Systems and methods for detecting suspicious attempts to access data based on organizational relationships
US9167195B2 (en) 2005-10-31 2015-10-20 Invention Science Fund I, Llc Preservation/degradation of video/audio aspects of a data stream
US9191611B2 (en) 2005-06-02 2015-11-17 Invention Science Fund I, Llc Conditional alteration of a saved image
US9235572B2 (en) 2008-10-31 2016-01-12 Disney Enterprises, Inc. System and method for updating digital media content
US9252898B2 (en) 2000-01-28 2016-02-02 Zarbaña Digital Fund Llc Music distribution systems
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US9325781B2 (en) 2005-01-31 2016-04-26 Invention Science Fund I, Llc Audio sharing
US9451200B2 (en) 2005-06-02 2016-09-20 Invention Science Fund I, Llc Storage access technique for captured data
US9489717B2 (en) 2005-01-31 2016-11-08 Invention Science Fund I, Llc Shared image device
US9589110B2 (en) 2011-04-11 2017-03-07 Intertrust Technologies Corporation Information security systems and methods
US9621749B2 (en) 2005-06-02 2017-04-11 Invention Science Fund I, Llc Capturing selected image objects
US9626667B2 (en) 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
US9659285B2 (en) 1999-08-27 2017-05-23 Zarbaña Digital Fund Llc Music distribution systems
US9819490B2 (en) 2005-05-04 2017-11-14 Invention Science Fund I, Llc Regional proximity for shared image device(s)
US9887843B1 (en) * 2013-07-02 2018-02-06 Impinj, Inc. RFID tags with dynamic key replacement
US9910341B2 (en) 2005-01-31 2018-03-06 The Invention Science Fund I, Llc Shared image device designation
US9942511B2 (en) 2005-10-31 2018-04-10 Invention Science Fund I, Llc Preservation/degradation of video/audio aspects of a data stream
US10003762B2 (en) 2015-04-28 2018-06-19 Invention Science Fund I, Llc Shared image devices

Families Citing this family (3546)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7904187B2 (en) 1999-02-01 2011-03-08 Hoffberg Steven M Internet appliance system and method
US6418424B1 (en) 1991-12-23 2002-07-09 Steven M. Hoffberg Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
US8352400B2 (en) 1991-12-23 2013-01-08 Hoffberg Steven M Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US5903454A (en) 1991-12-23 1999-05-11 Hoffberg; Linda Irene Human-factored interface corporating adaptive pattern recognition based controller apparatus
US7251624B1 (en) 1992-09-08 2007-07-31 Fair Isaac Corporation Score based decisioning
US6633861B2 (en) * 1993-03-19 2003-10-14 Ricoh Company Limited Automatic invocation of computational resources without user intervention across a network
US7006661B2 (en) 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US7224819B2 (en) * 1995-05-08 2007-05-29 Digimarc Corporation Integrating digital watermarks in multimedia content
US6983051B1 (en) * 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US6505160B1 (en) 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
US6804376B2 (en) 1998-01-20 2004-10-12 Digimarc Corporation Equipment employing watermark-based authentication function
US9630443B2 (en) * 1995-07-27 2017-04-25 Digimarc Corporation Printer driver separately applying watermark and information
US7054462B2 (en) 1995-05-08 2006-05-30 Digimarc Corporation Inferring object status based on detected watermark data
US6614914B1 (en) * 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US8505108B2 (en) * 1993-11-18 2013-08-06 Digimarc Corporation Authentication using a digital watermark
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US6744906B2 (en) 1995-05-08 2004-06-01 Digimarc Corporation Methods and systems using multiple watermarks
US7620200B2 (en) * 1995-05-08 2009-11-17 Digimarc Corporation Authentication of identification documents
US6721440B2 (en) 1995-05-08 2004-04-13 Digimarc Corporation Low visibility watermarks using an out-of-phase color
US20020136429A1 (en) * 1994-03-17 2002-09-26 John Stach Data hiding through arrangement of objects
US7171016B1 (en) * 1993-11-18 2007-01-30 Digimarc Corporation Method for monitoring internet dissemination of image, video and/or audio files
US7676059B2 (en) * 1994-10-21 2010-03-09 Digimarc Corporation Video steganography or encoding
US7515733B2 (en) * 1993-11-18 2009-04-07 Digimarc Corporation Methods and arrangements employing digital content items
US7724919B2 (en) * 1994-10-21 2010-05-25 Digimarc Corporation Methods and systems for steganographic processing
US6738495B2 (en) * 1995-05-08 2004-05-18 Digimarc Corporation Watermarking enhanced to withstand anticipated corruptions
US7986806B2 (en) * 1994-11-16 2011-07-26 Digimarc Corporation Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US6778682B2 (en) 1994-10-21 2004-08-17 Digimarc Corporation Redundantly embedding auxiliary data in source signals
US7313251B2 (en) * 1993-11-18 2007-12-25 Digimarc Corporation Method and system for managing and controlling electronic media
US6882738B2 (en) * 1994-03-17 2005-04-19 Digimarc Corporation Methods and tangible objects employing textured machine readable data
US8094949B1 (en) 1994-10-21 2012-01-10 Digimarc Corporation Music methods and systems
US7095871B2 (en) * 1995-07-27 2006-08-22 Digimarc Corporation Digital asset management and linking media signals with related data using watermarks
US6718046B2 (en) 1995-05-08 2004-04-06 Digimarc Corporation Low visibility watermark using time decay fluorescence
US7024016B2 (en) 1996-05-16 2006-04-04 Digimarc Corporation Digital watermarking apparatus and methods
US6763123B2 (en) 1995-05-08 2004-07-13 Digimarc Corporation Detection of out-of-phase low visibility watermarks
US6292828B1 (en) * 1994-02-23 2001-09-18 David L. Williams Trans-modal animated information processing with selective engagement
US7321667B2 (en) * 2002-01-18 2008-01-22 Digimarc Corporation Data hiding through arrangement of objects
US6978036B2 (en) * 1998-07-31 2005-12-20 Digimarc Corporation Tamper-resistant authentication techniques for identification documents
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US7036019B1 (en) * 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
JPH07271865A (en) * 1994-04-01 1995-10-20 Mitsubishi Corp Method for managing copyright of data base
US6473860B1 (en) * 1994-04-07 2002-10-29 Hark C. Chan Information distribution and processing system
US7181758B1 (en) 1994-07-25 2007-02-20 Data Innovation, L.L.C. Information distribution and processing system
US7991347B1 (en) 1994-04-07 2011-08-02 Data Innovation Llc System and method for accessing set of digital data at a remote site
US5694546A (en) 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
EP1845527A3 (en) 1994-07-08 2012-04-25 Sony Corporation Receiving controlled-access broadcast signals
US7302415B1 (en) * 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
US8595502B2 (en) * 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
EP0715241B1 (en) 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
US6424715B1 (en) 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
DE69535013D1 (en) 1994-10-27 2006-07-06 Intarsia Software Llc Copyright data management system
US7801817B2 (en) * 1995-10-27 2010-09-21 Makoto Saito Digital content management system and apparatus
US20060271915A1 (en) * 2005-05-24 2006-11-30 Contentguard Holdings, Inc. Usage rights grammar and digital works having usage rights created with the grammar
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system for digital work, and method for controlling access to digital work
US20050289068A1 (en) * 1994-11-23 2005-12-29 Contentguard Holdings, Inc. Method and apparatus for tracking states of digital works
US20050149450A1 (en) * 1994-11-23 2005-07-07 Contentguard Holdings, Inc. System, method, and device for controlling distribution and use of digital works based on a usage rights grammar
US6963859B2 (en) 1994-11-23 2005-11-08 Contentguard Holdings, Inc. Content rendering repository
KR0152788B1 (en) 1994-11-26 1998-10-15 이헌조 Copy protecting method and apparatus of digital image system
US6515968B1 (en) 1995-03-17 2003-02-04 Worldcom, Inc. Integrated interface for real time web based viewing of telecommunications network call traffic
KR0136458B1 (en) 1994-12-08 1998-05-15 구자홍 Copy protection apparatus of digital magnetic recording and reproducing system
US7743248B2 (en) * 1995-01-17 2010-06-22 Eoriginal, Inc. System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components
US7162635B2 (en) * 1995-01-17 2007-01-09 Eoriginal, Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5845281A (en) 1995-02-01 1998-12-01 Mediadna, Inc. Method and system for managing a data object so as to comply with predetermined conditions for usage
US7133845B1 (en) * 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US7143290B1 (en) * 1995-02-13 2006-11-28 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US20060206397A1 (en) * 1995-02-13 2006-09-14 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic right management in closed and connected appliances
US7095854B1 (en) * 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7124302B2 (en) * 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7647243B2 (en) * 1995-11-07 2010-01-12 Ebay Inc. Electronic marketplace system and method for creation of a two-tiered pricing scheme
US7937312B1 (en) * 1995-04-26 2011-05-03 Ebay Inc. Facilitating electronic commerce transactions through binding offers
US7702540B1 (en) * 1995-04-26 2010-04-20 Ebay Inc. Computer-implement method and system for conducting auctions on the internet
US7537170B2 (en) * 2001-08-31 2009-05-26 Digimarc Corporation Machine-readable security features for printed objects
US6804377B2 (en) 2000-04-19 2004-10-12 Digimarc Corporation Detecting information hidden out-of-phase in color channels
US7738673B2 (en) * 2000-04-19 2010-06-15 Digimarc Corporation Low visible digital watermarks
US6912295B2 (en) * 2000-04-19 2005-06-28 Digimarc Corporation Enhancing embedding of out-of-phase signals
US8094869B2 (en) * 2001-07-02 2012-01-10 Digimarc Corporation Fragile and emerging digital watermarks
US8027509B2 (en) 2000-04-19 2011-09-27 Digimarc Corporation Digital watermarking in data representing color channels
US7213757B2 (en) 2001-08-31 2007-05-08 Digimarc Corporation Emerging security features for identification documents
US8332478B2 (en) * 1998-10-01 2012-12-11 Digimarc Corporation Context sensitive connected content
US6891959B2 (en) * 2000-04-19 2005-05-10 Digimarc Corporation Hiding information out-of-phase in color channels
US8249936B1 (en) * 1995-05-10 2012-08-21 Taxnet Systems, Llc Point of tax reporting and automatic collection system with tax register
GB2300991B (en) * 1995-05-15 1997-11-05 Andrew Macgregor Ritchie Serving signals to browsing clients
US6549942B1 (en) 1995-05-25 2003-04-15 Audiohighway.Com Enhanced delivery of audio data for portable playback
US9900305B2 (en) 1998-01-12 2018-02-20 Soverain Ip, Llc Internet server access control and monitoring systems
US7272639B1 (en) * 1995-06-07 2007-09-18 Soverain Software Llc Internet server access control and monitoring systems
US5742845A (en) 1995-06-22 1998-04-21 Datascape, Inc. System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network
US7895076B2 (en) 1995-06-30 2011-02-22 Sony Computer Entertainment Inc. Advertisement insertion, profiling, impression, and feedback
US20020178051A1 (en) 1995-07-25 2002-11-28 Thomas G. Scavone Interactive marketing network and process using electronic certificates
US7406214B2 (en) * 1999-05-19 2008-07-29 Digimarc Corporation Methods and devices employing optical sensors and/or steganography
US6829368B2 (en) 2000-01-26 2004-12-07 Digimarc Corporation Establishing and interacting with on-line media collections using identifiers in media signals
US6522770B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US20050160271A9 (en) * 1998-11-19 2005-07-21 Brundage Trent J. Identification document and related methods
US5774670A (en) 1995-10-06 1998-06-30 Netscape Communications Corporation Persistent client state in a hypertext transfer protocol based client-server system
US8271339B2 (en) 1995-11-13 2012-09-18 Lakshmi Arunachalam Method and apparatus for enabling real-time bi-directional transactions on a network
US7930340B2 (en) * 1995-11-13 2011-04-19 Lakshmi Arunachalam Network transaction portal to control multi-service provider transactions
US8037158B2 (en) 1995-11-13 2011-10-11 Lakshmi Arunachalam Multimedia transactional services
US6615251B1 (en) * 1995-12-11 2003-09-02 John R. Klug Method for providing node targeted content in an addressable network
US5790785A (en) * 1995-12-11 1998-08-04 Customer Communications Group, Inc. World Wide Web registration information processing system
US6591245B1 (en) * 1996-02-02 2003-07-08 John R. Klug Media content notification via communications network
US5778367A (en) 1995-12-14 1998-07-07 Network Engineering Software, Inc. Automated on-line information service and directory, particularly for the world wide web
US9519915B1 (en) 1996-12-23 2016-12-13 Catalina Marketing Corporation System and method for providing shopping aids and incentives to customer through a computer network
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US6301379B1 (en) * 1996-01-17 2001-10-09 Carreker-Antinori, Inc. Electronic check presentment systems and methods employing volatile memory datastore access techniques
USRE44151E1 (en) * 1996-01-31 2013-04-16 Marvell Israel (M.I.S.L) Ltd. Switching ethernet controller
US7577782B2 (en) * 1996-02-02 2009-08-18 Sony Corporation Application programming interface for data transfer and bus management over a bus structure
US20060265336A1 (en) * 1996-02-26 2006-11-23 Graphon Corporation Automated system for management of licensed digital assets
US6044205A (en) * 1996-02-29 2000-03-28 Intermind Corporation Communications system for transferring information between memories according to processes transferred with the information
US6233637B1 (en) * 1996-03-07 2001-05-15 Sony Corporation Isochronous data pipe for managing and manipulating a high-speed stream of isochronous data flowing between an application and a bus structure
US6519268B1 (en) 1996-03-07 2003-02-11 Sony Corporation Asynchronous data pipe for automatically managing asynchronous data transfers between an application and a bus structure
US5991876A (en) * 1996-04-01 1999-11-23 Copyright Clearance Center, Inc. Electronic rights management and authorization system
US5822436A (en) 1996-04-25 1998-10-13 Digimarc Corporation Photographic products and methods employing embedded information
CN1139067C (en) 1996-05-15 2004-02-18 英特托拉斯技术公司 Method for obtaining controlled content or information of DVD and method for operating DVD apparatus
US8103877B2 (en) 2000-12-21 2012-01-24 Digimarc Corporation Content identification and electronic tickets, coupons and credits
US20050271246A1 (en) * 2002-07-10 2005-12-08 Sharma Ravi K Watermark payload encryption methods and systems
US6804726B1 (en) 1996-05-22 2004-10-12 Geovector Corporation Method and apparatus for controlling electrical devices in response to sensed conditions
US7774230B2 (en) 1996-06-10 2010-08-10 Phoenix Licensing, Llc System, method, and computer program product for selecting and presenting financial products and services
US6999938B1 (en) 1996-06-10 2006-02-14 Libman Richard M Automated reply generation direct marketing system
CN1146178C (en) 1996-06-20 2004-04-14 普罗特格里特 诺狄克股份公司 Method and appts. for data processing
US6473407B1 (en) 1997-09-05 2002-10-29 Worldcom, Inc. Integrated proxy interface for web based alarm management tools
JP3093678B2 (en) * 1996-06-28 2000-10-03 株式会社東芝 Encryption method, decryption method, a recording and reproducing apparatus, decoding apparatus, a method of manufacturing the decoding unit apparatus and a recording medium
US20120166807A1 (en) 1996-08-12 2012-06-28 Intertrust Technologies Corp. Systems and Methods Using Cryptography to Protect Secure Computing Environments
US8131007B2 (en) * 1996-08-30 2012-03-06 Regents Of The University Of Minnesota Watermarking using multiple watermarks and keys, including keys dependent on the host signal
US9134398B2 (en) 1996-09-09 2015-09-15 Tracbeam Llc Wireless location using network centric location estimators
US7903029B2 (en) 1996-09-09 2011-03-08 Tracbeam Llc Wireless location routing applications and architecture therefor
US6249252B1 (en) 1996-09-09 2001-06-19 Tracbeam Llc Wireless location using multiple location estimators
US7764231B1 (en) 1996-09-09 2010-07-27 Tracbeam Llc Wireless location using multiple mobile station location techniques
US7714778B2 (en) 1997-08-20 2010-05-11 Tracbeam Llc Wireless location gateway and applications therefor
US9538493B2 (en) 2010-08-23 2017-01-03 Finetrak, Llc Locating a mobile station and applications therefor
US6236365B1 (en) 1996-09-09 2001-05-22 Tracbeam, Llc Location of a mobile station using a plurality of commercial wireless infrastructures
US5926624A (en) * 1996-09-12 1999-07-20 Audible, Inc. Digital information library and delivery system with logic for generating files targeted to the playback device
US7917643B2 (en) 1996-09-12 2011-03-29 Audible, Inc. Digital information library and delivery system
US20060280437A1 (en) * 1999-01-27 2006-12-14 Gotuit Media Corp Methods and apparatus for vending and delivering the content of disk recordings
US20040255330A1 (en) * 2000-03-28 2004-12-16 Gotuit Audio, Inc. CD and DVD players
US7055166B1 (en) * 1996-10-03 2006-05-30 Gotuit Media Corp. Apparatus and methods for broadcast monitoring
US20030093790A1 (en) * 2000-03-28 2003-05-15 Logan James D. Audio and video program recording, editing and playback systems using metadata
US20040255334A1 (en) * 2000-03-28 2004-12-16 Gotuit Audio, Inc. Methods and apparatus for seamlessly changing volumes during playback using a compact disk changer
US6275857B1 (en) * 1996-10-30 2001-08-14 Microsoft Corporation System and method for freeing shared resources in a computer system
US6912652B2 (en) 1996-11-08 2005-06-28 Monolith Co., Ltd. Method and apparatus for imprinting ID information into a digital content and for reading out the same
US20060020806A1 (en) * 1996-11-08 2006-01-26 Monolith Co., Ltd. Method and apparatus for imprinting ID information into a digital content and for reading out the same
US7627499B2 (en) * 1996-11-12 2009-12-01 Syncada Llc Automated transaction processing system and approach
US20070055582A1 (en) 1996-11-12 2007-03-08 Hahn-Carlson Dean W Transaction processing with core and distributor processor implementations
US20080172314A1 (en) 1996-11-12 2008-07-17 Hahn-Carlson Dean W Financial institution-based transaction processing system and approach
US8396811B1 (en) * 1999-02-26 2013-03-12 Syncada Llc Validation approach for auditing a vendor-based transaction
US8392285B2 (en) 1996-11-12 2013-03-05 Syncada Llc Multi-supplier transaction and payment programmed processing approach with at least one supplier
US6704118B1 (en) * 1996-11-21 2004-03-09 Ricoh Company, Ltd. Method and system for automatically and transparently archiving documents and document meta data
JP4497099B2 (en) * 1996-11-27 2010-07-07 ソニー株式会社 Information transmission apparatus
US6850916B1 (en) * 1998-04-27 2005-02-01 Esignx Corporation Portable electronic charge and authorization devices and methods therefor
US8225089B2 (en) * 1996-12-04 2012-07-17 Otomaku Properties Ltd., L.L.C. Electronic transaction systems utilizing a PEAD and a private key
EP0848337A1 (en) * 1996-12-12 1998-06-17 SONY DEUTSCHLAND GmbH Server with automatic document assembly
RU2214697C2 (en) * 1996-12-24 2003-10-20 Экс Эр Ти Лимитед Method and device to generate image of change introduced by object into penetrating radiation
WO1998029974A1 (en) * 1996-12-25 1998-07-09 Sony Corporation Game machine system, broadcasting system, data distribution system and its method, and program executing device and its method
US7874914B2 (en) * 1996-12-30 2011-01-25 Igt System and method for communicating game session information
US9489800B2 (en) * 1996-12-30 2016-11-08 Igt Applications for gaming devices in a networked environment
US7607981B2 (en) * 1996-12-30 2009-10-27 Walker Digital, Llc System and method for remote automated play of a gaming device
US7806763B2 (en) * 1996-12-30 2010-10-05 Igt System and method for remote automated play of a gaming device
US6964611B2 (en) * 1996-12-30 2005-11-15 Walker Digital, Llc System and method for automated play of lottery games
US6460020B1 (en) 1996-12-30 2002-10-01 De Technologies, Inc. Universal shopping center for international operation
US20050021477A1 (en) * 1997-01-29 2005-01-27 Ganapathy Krishnan Method and system for securely incorporating electronic information into an online purchasing application
US6514461B1 (en) * 1997-02-14 2003-02-04 Escreen, Inc. System for automatically testing a fluid specimen
JPH10232878A (en) 1997-02-19 1998-09-02 Hitachi Ltd Document management method and device
US6014746A (en) * 1997-02-21 2000-01-11 Lockheed Martin Energy Research Corporation Workstation lock and alarm system
US20080016103A1 (en) * 1997-02-25 2008-01-17 Intertrust Technologies Corp. Techniques for Defining, Using and Manipulating Rights Management Data Structures
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US7062500B1 (en) * 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US6233684B1 (en) 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
JP2000122977A (en) * 1997-02-28 2000-04-28 Xerox Corp System for controlling distribution and use of digital work and supply method for water mark
US6401080B1 (en) * 1997-03-21 2002-06-04 International Business Machines Corporation Intelligent agent with negotiation capability and method of negotiation therewith
JPH10269284A (en) * 1997-03-25 1998-10-09 Hitachi Ltd Method and system for providing commodity information in electronic business transaction system
US20080016000A1 (en) * 1997-03-27 2008-01-17 British Telecommunications Public Limited Company Copy protection of data
JP3884821B2 (en) 1997-03-27 2007-02-21 株式会社日立製作所 Integrated method and apparatus of the distributed information
US7079649B1 (en) * 1997-03-27 2006-07-18 British Telecommunications Public Limited Company Copy protection of data
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
EP1650757A1 (en) * 1997-05-13 2006-04-26 Kabushiki Kaisha Toshiba Information ciphering method and apparatus, information reproducing method and apparatus
US6195646B1 (en) * 1997-05-13 2001-02-27 Data Junction Corp System and method for facilitating the valuation and purchase of information
US6202150B1 (en) * 1997-05-28 2001-03-13 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems
US6668325B1 (en) 1997-06-09 2003-12-23 Intertrust Technologies Obfuscation techniques for enhancing software security
US7290288B2 (en) * 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
US7966222B2 (en) * 1997-06-12 2011-06-21 Catalina Marketing Corporation System and method for distributing information through cooperative communication network sites
US6308188B1 (en) * 1997-06-19 2001-10-23 International Business Machines Corporation System and method for building a web site with automated workflow
US6684369B1 (en) 1997-06-19 2004-01-27 International Business Machines, Corporation Web site creator using templates
US6353929B1 (en) * 1997-06-23 2002-03-05 One River Worldtrek, Inc. Cooperative system for measuring electronic media
US20060089195A1 (en) * 1997-06-23 2006-04-27 Walker Jay S Systems, methods and apparatus for offering an extension of a flat rate play session based on an ending credit balance
US20110014963A1 (en) * 2005-11-09 2011-01-20 Igt Methods and apparatus for facilitating blackjack flat rate play sessions
US7140964B2 (en) * 1997-06-23 2006-11-28 Walker Digital, Llc Gaming device for a flat rate play session and a method of operating same
US6236727B1 (en) * 1997-06-24 2001-05-22 International Business Machines Corporation Apparatus, method and computer program product for protecting copyright data within a computer system
US6272631B1 (en) * 1997-06-30 2001-08-07 Microsoft Corporation Protected storage of core data secrets
US8073921B2 (en) * 1997-07-01 2011-12-06 Advanced Technology Company, LLC Methods for remote monitoring and control of appliances over a computer network
US5973734A (en) 1997-07-09 1999-10-26 Flashpoint Technology, Inc. Method and apparatus for correcting aspect ratio in a camera graphical user interface
US6052629A (en) * 1997-07-18 2000-04-18 Gilbarco Inc. Internet capable browser dispenser architecture
US7403922B1 (en) 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US7546346B2 (en) * 1997-07-28 2009-06-09 Juniper Networks, Inc. Workflow systems and methods for project management and information management
US5978836A (en) 1997-07-28 1999-11-02 Solectron Corporation Workflow systems and methods
US7096192B1 (en) * 1997-07-28 2006-08-22 Cybersource Corporation Method and system for detecting fraud in a credit card transaction over a computer network
US9875492B2 (en) 2001-05-22 2018-01-23 Dennis J. Dupray Real estate transaction system
US8082096B2 (en) 2001-05-22 2011-12-20 Tracbeam Llc Wireless location routing applications and architecture therefor
US8135413B2 (en) 1998-11-24 2012-03-13 Tracbeam Llc Platform and applications for wireless location and other complex services
US6009525A (en) * 1997-08-29 1999-12-28 Preview Systems, Inc. Multi-tier electronic software distribution
US6030288A (en) * 1997-09-02 2000-02-29 Quixotic Solutions Inc. Apparatus and process for verifying honest gaming transactions over a communications network
US6681017B1 (en) * 1997-09-03 2004-01-20 Lucent Technologies Inc. Simplified secure shared key establishment and data delivery protocols for electronic commerce
US6795532B1 (en) * 1997-09-08 2004-09-21 Mci, Inc. Single telephone number access to multiple communication services
US6311278B1 (en) 1998-09-09 2001-10-30 Sanctum Ltd. Method and system for extracting application protocol characteristics
US6199181B1 (en) 1997-09-09 2001-03-06 Perfecto Technologies Ltd. Method and system for maintaining restricted operating environments for application programs or operating systems
DE19739808C2 (en) * 1997-09-10 1999-12-30 Siemens Ag Method and apparatus for controlling data transfer between two existing modules in a motor vehicle
US6714979B1 (en) * 1997-09-26 2004-03-30 Worldcom, Inc. Data warehousing infrastructure for web based reporting tool
US6381644B2 (en) 1997-09-26 2002-04-30 Mci Worldcom, Inc. Integrated proxy interface for web based telecommunications network management
US6763376B1 (en) 1997-09-26 2004-07-13 Mci Communications Corporation Integrated customer interface system for communications network management
US6490620B1 (en) 1997-09-26 2002-12-03 Worldcom, Inc. Integrated proxy interface for web based broadband telecommunications management
US6745229B1 (en) 1997-09-26 2004-06-01 Worldcom, Inc. Web based integrated customer interface for invoice reporting
US6044373A (en) * 1997-09-29 2000-03-28 International Business Machines Corporation Object-oriented access control method and system for military and commercial file systems
US6421653B1 (en) * 1997-10-14 2002-07-16 Blackbird Holdings, Inc. Systems, methods and computer program products for electronic trading of financial instruments
US20060190383A1 (en) * 2003-03-24 2006-08-24 Blackbird Holdings, Inc. Systems for risk portfolio management
US6128602A (en) * 1997-10-27 2000-10-03 Bank Of America Corporation Open-architecture system for real-time consolidation of information from multiple financial systems
US6094721A (en) * 1997-10-31 2000-07-25 International Business Machines Corporation Method and apparatus for password based authentication in a distributed system
US6038563A (en) * 1997-10-31 2000-03-14 Sun Microsystems, Inc. System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects
US7092914B1 (en) * 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6219669B1 (en) 1997-11-13 2001-04-17 Hyperspace Communications, Inc. File transfer system using dynamically assigned ports
US6041412A (en) * 1997-11-14 2000-03-21 Tl Technology Rerearch (M) Sdn. Bhd. Apparatus and method for providing access to secured data or area
US6173271B1 (en) * 1997-11-26 2001-01-09 California Institute Of Technology Television advertising automated billing system
US6061669A (en) * 1997-11-26 2000-05-09 International Business Machines Corporation Notification system for access to and printing of proprietary network services
US6330610B1 (en) * 1997-12-04 2001-12-11 Eric E. Docter Multi-stage data filtering system employing multiple filtering criteria
JPH11175329A (en) 1997-12-08 1999-07-02 Hitachi Ltd Application linking method and device therefor
US6918901B1 (en) 1997-12-10 2005-07-19 Felix Theeuwes Device and method for enhancing transdermal agent flux
GB9726202D0 (en) * 1997-12-11 1998-02-11 Ibm Handling processor-intensive operations in a data processing system
US6247127B1 (en) * 1997-12-19 2001-06-12 Entrust Technologies Ltd. Method and apparatus for providing off-line secure communications
US7167711B1 (en) * 1997-12-23 2007-01-23 Openwave Systems Inc. System and method for controlling financial transactions over a wireless network
JP3937548B2 (en) * 1997-12-29 2007-06-27 カシオ計算機株式会社 Data access apparatus and a program recording medium
US6636615B1 (en) 1998-01-20 2003-10-21 Digimarc Corporation Methods and systems using multiple watermarks
US7268700B1 (en) 1998-01-27 2007-09-11 Hoffberg Steven M Mobile communication device
US6385596B1 (en) 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US7047300B1 (en) 1998-02-10 2006-05-16 Sprint Communications Company L.P. Survivable and scalable data system and method for computer networks
EP0936805A1 (en) * 1998-02-12 1999-08-18 Hewlett-Packard Company Document transfer systems
JPH11259452A (en) * 1998-02-17 1999-09-24 Internatl Business Mach Corp <Ibm> Fast integration method and system
US6240400B1 (en) * 1998-02-17 2001-05-29 International Business Machines Corporation Method and system for accommodating electronic commerce in the semiconductor manufacturing industry
US6088800A (en) 1998-02-27 2000-07-11 Mosaid Technologies, Incorporated Encryption processor with shared memory interconnect
JPH11259407A (en) * 1998-03-11 1999-09-24 Fuji Xerox Co Ltd Electronic information use promoting system
DE19810730A1 (en) * 1998-03-12 1999-09-16 Philips Patentverwaltung Microcontroller circuit, esp. for identification systems such as cash cards, locking systems etc.
US6373974B2 (en) * 1998-03-16 2002-04-16 Sharp Laboratories Of America, Inc. Method for extracting multiresolution watermark images to determine rightful ownership
US6144741A (en) * 1998-03-19 2000-11-07 Mid America Gift Certificate Company System for dispensing gift certificates
WO1999049394A1 (en) * 1998-03-23 1999-09-30 Microsoft Corporation Application program interfaces in an operating system
US20040098584A1 (en) * 1998-03-25 2004-05-20 Sherman Edward G. Method and system for embedded, automated, component-level control of computer systems and other complex systems
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US7051004B2 (en) * 1998-04-03 2006-05-23 Macrovision Corporation System and methods providing secure delivery of licenses and content
US6202056B1 (en) * 1998-04-03 2001-03-13 Audiosoft, Inc. Method for computer network operation providing basis for usage fees
US7961917B2 (en) * 1999-02-10 2011-06-14 Pen-One, Inc. Method for identity verification
US7609862B2 (en) * 2000-01-24 2009-10-27 Pen-One Inc. Method for identity verification
US6539101B1 (en) * 1998-04-07 2003-03-25 Gerald R. Black Method for identity verification
US7047419B2 (en) * 1999-09-17 2006-05-16 Pen-One Inc. Data security system
US7380137B2 (en) * 1999-07-20 2008-05-27 International Business Machines Corporation Content guard system for copy protection of recordable media
US6118873A (en) * 1998-04-24 2000-09-12 International Business Machines Corporation System for encrypting broadcast programs in the presence of compromised receiver devices
US6223284B1 (en) * 1998-04-30 2001-04-24 Compaq Computer Corporation Method and apparatus for remote ROM flashing and security management for a computer system
US6341351B1 (en) * 1998-05-07 2002-01-22 Banctec, Inc. Method for communicating and controlling transactions between unsecured parties
US6773547B2 (en) * 1998-05-08 2004-08-10 American Air Liquide, Inc. Process for the bleaching of low consistency pulp using high partial pressure ozone
US6957341B2 (en) * 1998-05-14 2005-10-18 Purdue Research Foundation Method and system for secure computational outsourcing and disguise
US6941463B1 (en) 1998-05-14 2005-09-06 Purdue Research Foundation Secure computational outsourcing techniques
US8543372B1 (en) * 1998-05-18 2013-09-24 Dennis S. Fernandez System design rights management
US6275942B1 (en) * 1998-05-20 2001-08-14 Network Associates, Inc. System, method and computer program product for automatic response to computer system misuse using active response modules
US6253237B1 (en) 1998-05-20 2001-06-26 Audible, Inc. Personalized time-shifted programming
US7046258B1 (en) * 1998-05-28 2006-05-16 Canon Kabushiki Kaisha Display and control of permitted data processing based on control information extracted from the data
US6721740B1 (en) * 1998-05-29 2004-04-13 Sun Microsystems, Inc. Method and apparatus of performing active update notification
US20040117631A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for digital rights management including user/publisher connectivity interface
US20040117644A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content
US20040117663A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution
US20040117628A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
US20040117664A1 (en) * 1998-06-04 2004-06-17 Z4 Technologies, Inc. Apparatus for establishing a connectivity platform for digital rights management
US20040107368A1 (en) * 1998-06-04 2004-06-03 Z4 Technologies, Inc. Method for digital rights management including self activating/self authentication software
US20040225894A1 (en) * 1998-06-04 2004-11-11 Z4 Technologies, Inc. Hardware based method for digital rights management including self activating/self authentication software
JPH11353384A (en) * 1998-06-10 1999-12-24 Nec Corp Method and device for evaluating environmental load
US20020002039A1 (en) 1998-06-12 2002-01-03 Safi Qureshey Network-enabled audio device
US6536041B1 (en) * 1998-06-16 2003-03-18 United Video Properties, Inc. Program guide system with real-time data sources
US7249054B2 (en) * 1998-06-18 2007-07-24 Keil Dean S System and method for debit account transactions
DE19827637A1 (en) * 1998-06-20 1999-12-23 Alcatel Sa Assurance procedures for operating data of a network element and control device for a network element
US6418420B1 (en) * 1998-06-30 2002-07-09 Sun Microsystems, Inc. Distributed budgeting and accounting system with secure token device access
US6594662B1 (en) * 1998-07-01 2003-07-15 Netshadow, Inc. Method and system for gathering information resident on global computer networks
US6907407B1 (en) 1998-07-02 2005-06-14 Sharp Kabushiki Kaisha Copyright management apparatus
US6607136B1 (en) 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
JP2002536031A (en) 1998-09-16 2002-10-29 コムセンス・テクノロジーズ・リミテッド Toys to interact
KR20010023966A (en) * 1998-07-14 2001-03-26 요트.게.아. 롤페즈 Method and apparatus for use of a watermark and a receiver dependent reference for the purpose of copy protection
US6499035B1 (en) 1998-07-15 2002-12-24 Microsoft Corporation Licensing java objects
US6363356B1 (en) * 1998-07-16 2002-03-26 Preview Software Referrer-based system for try/buy electronic software distribution
US6393411B1 (en) * 1998-07-21 2002-05-21 Amdahl Corporation Device and method for authorized funds transfer
US6425522B1 (en) * 1998-07-23 2002-07-30 Hitachi, Ltd. IC card information processing system, and apparatus and cards for the same
US6832355B1 (en) * 1998-07-28 2004-12-14 Microsoft Corporation Web page display system
US7974495B2 (en) * 2002-06-10 2011-07-05 Digimarc Corporation Identification and protection of video
US20010011253A1 (en) * 1998-08-04 2001-08-02 Christopher D. Coley Automated system for management of licensed software
US7552090B1 (en) * 1998-08-12 2009-06-23 Keynetics Inc. Method for billing for services delivered over a computer network
US6959288B1 (en) * 1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system
EP1105813A4 (en) * 1998-08-25 2001-10-10 Mobshop Inc On-line marketing system and method
JP3142820B2 (en) * 1998-08-27 2001-03-07 株式会社エヌ・ティ・ティ・ドコモ Push type information transmission method and the relay device
CA2345745A1 (en) 1998-10-02 2000-04-13 Moshe Cohen Card for interaction with a computer
JP3142821B2 (en) * 1998-08-27 2001-03-07 株式会社エヌ・ティ・ティ・ドコモ Method of billing information communication network
CA2279890A1 (en) * 1998-08-28 2000-02-28 Two Way Tv Limited Method and apparatus for sampling remote data sources
US6562076B2 (en) 1998-08-31 2003-05-13 Xerox Corporation Extending application behavior through active properties attached to a document in a document management system
US6266682B1 (en) 1998-08-31 2001-07-24 Xerox Corporation Tagging related files in a document management system
ES2274557T3 (en) * 1998-08-31 2007-05-16 Irdeto Access B.V. System for providing encrypted data, to decrypt encrypted data system and method for providing a communications interface system said decryptor.
US6269380B1 (en) * 1998-08-31 2001-07-31 Xerox Corporation Property based mechanism for flexibility supporting front-end and back-end components having different communication protocols
US6311270B1 (en) * 1998-09-14 2001-10-30 International Business Machines Corporation Method and apparatus for securing communication utilizing a security processor
US6393421B1 (en) * 1998-09-18 2002-05-21 Neriel Paglin Communication method and system utilizing a specific communication code uniquely assigned to the data record
EP1116132A2 (en) * 1998-09-22 2001-07-18 Science Applications International Corporation User-defined dynamic collaborative environments
US6266429B1 (en) * 1998-09-23 2001-07-24 Philips Electronics North America Corporation Method for confirming the integrity of an image transmitted with a loss
KR100484209B1 (en) * 1998-09-24 2005-09-30 삼성전자주식회사 Digital content encryption / decryption apparatus and method
US7055034B1 (en) * 1998-09-25 2006-05-30 Digimarc Corporation Method and apparatus for robust embedded data
US6411991B1 (en) 1998-09-25 2002-06-25 Sprint Communications Company L.P. Geographic data replication system and method for a network
US8010627B1 (en) * 1998-09-25 2011-08-30 Sprint Communications Company L.P. Virtual content publishing system
US6453317B1 (en) * 1998-09-29 2002-09-17 Worldcom, Inc. Customer information storage and delivery system
US8019609B2 (en) 1999-10-04 2011-09-13 Dialware Inc. Sonic/ultrasonic authentication method
US6671803B1 (en) * 1998-10-06 2003-12-30 Koninklijke Philips Electronics N.V. Method and system for consumer electronic device certificate management
EP1125182B1 (en) 1998-10-07 2003-01-02 Adobe Systems Incorporated Distributing access to a data item
JP4763866B2 (en) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー How to protect the digital data by double re-encryption and apparatus
CA2314359A1 (en) * 1998-10-15 2000-04-20 Sony Corporation Information providing system
US6298334B1 (en) * 1998-10-15 2001-10-02 Netdecide Corporation Object-based numeric-analysis engine
US7058607B1 (en) * 1998-10-21 2006-06-06 Fuji Xerox Co., Ltd. Contents distribution method and system
JP3994599B2 (en) * 1998-10-21 2007-10-24 富士ゼロックス株式会社 Recording apparatus and method, rates arithmetic unit and charges calculation method and billing system,
US6981222B2 (en) 1998-10-22 2005-12-27 Made2Manage Systems, Inc. End-to-end transaction processing and statusing system and method
US6519700B1 (en) * 1998-10-23 2003-02-11 Contentguard Holdings, Inc. Self-protecting documents
CA2341979A1 (en) * 2000-03-24 2001-09-24 Contentguard Holdings, Inc. System and method for protection of digital works
US6163794A (en) * 1998-10-23 2000-12-19 General Magic Network system extensible by users
US6609199B1 (en) 1998-10-26 2003-08-19 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US7139915B2 (en) * 1998-10-26 2006-11-21 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US6330670B1 (en) 1998-10-26 2001-12-11 Microsoft Corporation Digital rights management operating system
US7194092B1 (en) 1998-10-26 2007-03-20 Microsoft Corporation Key-based secure storage
US6820063B1 (en) 1998-10-26 2004-11-16 Microsoft Corporation Controlling access to content based on certificates and access predicates
US6327652B1 (en) 1998-10-26 2001-12-04 Microsoft Corporation Loading and identifying a digital rights management operating system
US20050060549A1 (en) * 1998-10-26 2005-03-17 Microsoft Corporation Controlling access to content based on certificates and access predicates
CN1287640A (en) 1998-10-28 2001-03-14 维迪科隆有限公司 Apparatus and method for automated aggregation and delivery of electronic personal information or data
US7673323B1 (en) * 1998-10-28 2010-03-02 Bea Systems, Inc. System and method for maintaining security in a distributed computer network
US6871220B1 (en) 1998-10-28 2005-03-22 Yodlee, Inc. System and method for distributed storage and retrieval of personal information
US7039941B1 (en) * 1998-10-30 2006-05-02 General Instrument Corporation Low distortion passthrough circuit arrangement for cable television set top converter terminals
US7031963B1 (en) * 1998-11-09 2006-04-18 Unisys Corporation Green ice printout sorting and delivery program
US7010512B1 (en) * 1998-11-09 2006-03-07 C/Base, Inc. Transfer instrument
US8121891B2 (en) * 1998-11-12 2012-02-21 Accenture Global Services Gmbh Personalized product report
JP4764536B2 (en) * 1998-11-17 2011-09-07 株式会社リコー Image measurement equipment
US6601087B1 (en) * 1998-11-18 2003-07-29 Webex Communications, Inc. Instant document sharing
US6751670B1 (en) 1998-11-24 2004-06-15 Drm Technologies, L.L.C. Tracking electronic component
US6272469B1 (en) * 1998-11-25 2001-08-07 Ge Medical Systems Global Technology Company, Llc Imaging system protocol handling method and apparatus
US6914691B1 (en) 1998-11-27 2005-07-05 Canon Kabushiki Kaisha Image processing apparatus, data processing method, and storage medium
US7617124B1 (en) 1998-12-04 2009-11-10 Digital River, Inc. Apparatus and method for secure downloading of files
US20030195974A1 (en) 1998-12-04 2003-10-16 Ronning Joel A. Apparatus and method for scheduling of search for updates or downloads of a file
US7058597B1 (en) 1998-12-04 2006-06-06 Digital River, Inc. Apparatus and method for adaptive fraud screening for electronic commerce transactions
US6412073B1 (en) * 1998-12-08 2002-06-25 Yodiee.Com, Inc Method and apparatus for providing and maintaining a user-interactive portal system accessible via internet or other switched-packet-network
US8069407B1 (en) 1998-12-08 2011-11-29 Yodlee.Com, Inc. Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes
US6266774B1 (en) * 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US7085997B1 (en) 1998-12-08 2006-08-01 Yodlee.Com Network-based bookmark management and web-summary system
US6477565B1 (en) * 1999-06-01 2002-11-05 Yodlee.Com, Inc. Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances
US7672879B1 (en) 1998-12-08 2010-03-02 Yodlee.Com, Inc. Interactive activity interface for managing personal data and performing transactions over a data packet network
US7752535B2 (en) 1999-06-01 2010-07-06 Yodlec.com, Inc. Categorization of summarized information
JP4195746B2 (en) * 1998-12-11 2008-12-10 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Data billing system, the content generator, data charging location and method
GB9827831D0 (en) * 1998-12-17 1999-02-10 Tribeka Ltd Method and apparatus for the distribution of digitised information on demand
US6578143B1 (en) * 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
CA2256936C (en) * 1998-12-23 2002-04-02 Hamid Bacha System for electronic repository of data enforcing access control on data search and retrieval
US7209889B1 (en) * 1998-12-24 2007-04-24 Henry Whitfield Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US7209892B1 (en) * 1998-12-24 2007-04-24 Universal Music Group, Inc. Electronic music/media distribution system
US7624046B2 (en) * 1998-12-24 2009-11-24 Universal Music Group, Inc. Electronic music/media distribution system
US8175977B2 (en) 1998-12-28 2012-05-08 Audible License management for digital content
US6424979B1 (en) * 1998-12-30 2002-07-23 American Management Systems, Inc. System for presenting and managing enterprise architectures
US6317141B1 (en) 1998-12-31 2001-11-13 Flashpoint Technology, Inc. Method and apparatus for editing heterogeneous media objects in a digital imaging device
JP4405090B2 (en) * 1999-01-05 2010-01-27 富士通株式会社 Payback system, payback method and a recording medium
US6978262B2 (en) * 1999-01-05 2005-12-20 Tsai Daniel E Distributed database schema
US6212512B1 (en) * 1999-01-06 2001-04-03 Hewlett-Packard Company Integration of a database into file management software for protecting, tracking and retrieving data
US7127515B2 (en) 1999-01-15 2006-10-24 Drm Technologies, Llc Delivering electronic content
US6839841B1 (en) * 1999-01-29 2005-01-04 General Instrument Corporation Self-generation of certificates using secure microprocessor in a device for transferring digital information
CA2359685A1 (en) * 1999-01-29 2000-08-03 General Instrument Corporation Authentication enforcement using decryption and authentication in a single transaction in a secure microprocessor
US6400996B1 (en) 1999-02-01 2002-06-04 Steven M. Hoffberg Adaptive pattern recognition based control system and method
EP1151611A1 (en) * 1999-02-11 2001-11-07 Loudeye Technologies, Inc. System for automated comprehensive remote servicing for media information
US6209102B1 (en) * 1999-02-12 2001-03-27 Arcot Systems, Inc. Method and apparatus for secure entry of access codes in a computer environment
WO2000048108A1 (en) 1999-02-12 2000-08-17 Mack Hicks System and method for providing certification-related and other services
DE19906450C1 (en) 1999-02-16 2000-08-17 Fraunhofer Ges Forschung Generating encoded useful data flow involves producing encoded version of useful data key using asymmetrical encoding and entering in useful data stream header block
US6643813B1 (en) * 1999-02-17 2003-11-04 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for reliable and efficient data communications
US6314404B1 (en) * 1999-02-18 2001-11-06 Robert O. Good Method and apparatus for managing real estate brokerage referrals
WO2000051280A3 (en) * 1999-02-25 2000-12-14 Enco Tone Ltd Method and apparatus for the secure indentification of the owner of a portable device
JP2002538536A (en) * 1999-02-26 2002-11-12 オーセンティデイト ホールディング コーポレイション Including reliable file Mark King, digital file management and imaging system and method
CA2363796A1 (en) 1999-02-26 2000-08-31 Richard T. Box A system, method and article of manufacture for an electronic commerce interface to the government
KR20020007318A (en) * 1999-03-02 2002-01-26 추후제출 Electronic commerce transactions within a marketing system that may contain a membership buying opportunity
US7353194B1 (en) * 1999-03-02 2008-04-01 Alticor Investments, Inc. System and method for managing recurring orders in a computer network
EP1085420A4 (en) * 1999-03-03 2006-12-27 Sony Corp Data processing device, data processing method, terminal, transmission method for data processing device
US7174457B1 (en) * 1999-03-10 2007-02-06 Microsoft Corporation System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
WO2000055962A3 (en) 1999-03-15 2001-06-21 Sony Electronics Inc Electronic media system, method and device
US6968513B1 (en) * 1999-03-18 2005-11-22 Shopntown.Com, Inc. On-line localized business referral system and revenue generation system
US7549056B2 (en) 1999-03-19 2009-06-16 Broadcom Corporation System and method for processing and protecting content
US6985887B1 (en) * 1999-03-19 2006-01-10 Suncrest Llc Apparatus and method for authenticated multi-user personal information database
US7353199B1 (en) * 1999-03-22 2008-04-01 Perfect Web Technologies, Inc. Method of moderating external access to an electronic document authoring development and distribution system
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US6601046B1 (en) * 1999-03-25 2003-07-29 Koninklijke Philips Electronics N.V. Usage dependent ticket to protect copy-protected material
GB9906924D0 (en) * 1999-03-26 1999-05-19 Int Computers Ltd Printed document authentication method
US7051005B1 (en) * 1999-03-27 2006-05-23 Microsoft Corporation Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
US7073063B2 (en) 1999-03-27 2006-07-04 Microsoft Corporation Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like
US6973444B1 (en) * 1999-03-27 2005-12-06 Microsoft Corporation Method for interdependently validating a digital content package and a corresponding digital license
US7319759B1 (en) 1999-03-27 2008-01-15 Microsoft Corporation Producing a new black box for a digital rights management (DRM) system
WO2001052018A1 (en) * 2000-01-14 2001-07-19 Microsoft Corporation Specifying security for an element by assigning a scaled value representative of the relative security thereof
US7383205B1 (en) 1999-03-27 2008-06-03 Microsoft Corporation Structure of a digital content package
US6829708B1 (en) * 1999-03-27 2004-12-07 Microsoft Corporation Specifying security for an element by assigning a scaled value representative of the relative security thereof
US7103574B1 (en) 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US7136838B1 (en) * 1999-03-27 2006-11-14 Microsoft Corporation Digital license and method for obtaining/providing a digital license
US7024393B1 (en) 1999-03-27 2006-04-04 Microsoft Corporation Structural of digital rights management (DRM) system
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US20020120925A1 (en) * 2000-03-28 2002-08-29 Logan James D. Audio and video program recording, editing and playback systems using metadata
EP1087291A4 (en) * 1999-03-30 2008-10-08 Sony Corp Information processing system
US6591255B1 (en) * 1999-04-05 2003-07-08 Netuitive, Inc. Automatic data extraction, error correction and forecasting system
US6775779B1 (en) * 1999-04-06 2004-08-10 Microsoft Corporation Hierarchical trusted code for content protection in computers
JP3471654B2 (en) * 1999-04-06 2003-12-02 富士通株式会社 License server, the copyright holder system, user system, system, recording medium and content usage control method
US6651171B1 (en) * 1999-04-06 2003-11-18 Microsoft Corporation Secure execution of program code
US6553037B1 (en) * 1999-04-08 2003-04-22 Palm, Inc. System and method for synchronizing data among a plurality of users via an intermittently accessed network
US6457062B1 (en) 1999-04-08 2002-09-24 Palm, Inc. System and method for synchronizing multiple calendars over wide area network
US6466236B1 (en) 1999-04-08 2002-10-15 Palm, Inc. System and method for displaying and manipulating multiple calendars on a personal digital assistant
KR100774853B1 (en) 1999-04-09 2007-11-08 소니 가부시끼 가이샤 Information processing device and method, and record medium
JP4238410B2 (en) * 1999-04-09 2009-03-18 ソニー株式会社 Information processing system
JP2000293459A (en) * 1999-04-09 2000-10-20 Sony Corp Processor and method for information processing and provision medium
JP4238411B2 (en) * 1999-04-12 2009-03-18 ソニー株式会社 Information processing system
JP2000293590A (en) * 1999-04-12 2000-10-20 Sony Corp Information processor, information processing method and providing medium
WO2000062189A8 (en) 1999-04-12 2002-07-25 Reciprocal Inc System and method for data rights management
EP1171811A1 (en) * 1999-04-13 2002-01-16 Ilumin Corporation System and method for document-driven processing of digitally-signed electronic documents
JP3747133B2 (en) 1999-04-14 2006-02-22 キヤノン株式会社 Mobile terminal and its control method and the storage medium
JP3327877B2 (en) 1999-04-14 2002-09-24 キヤノン株式会社 Information providing method, an information providing system, a storage medium which stores a terminal device and an information providing program
JP3368237B2 (en) * 1999-04-14 2003-01-20 キヤノン株式会社 Code processing method, terminal device and a storage medium
JP3376311B2 (en) 1999-04-14 2003-02-10 キヤノン株式会社 Information providing method and information providing system
JP2000298677A (en) * 1999-04-14 2000-10-24 Canon Inc Information retrieval method, information retrieval device and storage medium
US20040260653A1 (en) * 1999-04-19 2004-12-23 First Data Corporation Anonymous transactions
US20040083184A1 (en) * 1999-04-19 2004-04-29 First Data Corporation Anonymous card transactions
JP3823599B2 (en) * 1999-04-22 2006-09-20 富士ゼロックス株式会社 Distribution information management apparatus and method
US6529603B1 (en) * 1999-04-23 2003-03-04 Convera Corporation Method and apparatus to reduce the risk of observation of a secret value used by an instruction sequence
US6947560B1 (en) * 1999-04-26 2005-09-20 Telefonaktiebolaget L M Ericsson (Publ) Method and device for effective key length control
US6918059B1 (en) 1999-04-28 2005-07-12 Universal Music Group Method and system for handling errors in a distributed computer system
WO2001001625A9 (en) * 1999-05-03 2002-06-13 Ntru Cryptosystems Inc Secure user identification based on ring homomorphisms
US6959085B1 (en) 1999-05-03 2005-10-25 Ntru Cryptosystems, Inc. Secure user identification based on ring homomorphisms
US6697948B1 (en) 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
US7308413B1 (en) * 1999-05-05 2007-12-11 Tota Michael J Process for creating media content based upon submissions received on an electronic multi-media exchange
US9477665B2 (en) 1999-05-05 2016-10-25 Virtual Creative Artists, LLC Revenue-generating electronic multi-media exchange and process of operating same
DE60023705T2 (en) * 1999-05-07 2006-07-20 Telefonaktiebolaget Lm Ericsson (Publ) Key information secure distribution and protection of
US6766307B1 (en) * 1999-05-11 2004-07-20 Clicknsettle.Com, Inc. System and method for providing complete non-judicial dispute resolution management and operation
US7562392B1 (en) * 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
GB2350529B (en) * 1999-05-22 2004-03-10 Ibm Electronic contracts
CN1159654C (en) * 1999-05-26 2004-07-28 富士通株式会社 Network element management system and method
US7272855B1 (en) 1999-06-08 2007-09-18 The Trustees Of Columbia University In The City Of New York Unified monitoring and detection of intrusion attacks in an electronic system
US7140039B1 (en) 1999-06-08 2006-11-21 The Trustees Of Columbia University In The City Of New York Identification of an attacker in an electronic system
US7013296B1 (en) * 1999-06-08 2006-03-14 The Trustees Of Columbia University In The City Of New York Using electronic security value units to control access to a resource
US6889260B1 (en) * 1999-06-10 2005-05-03 Ec Enabler, Ltd Method and system for transferring information
US6671805B1 (en) 1999-06-17 2003-12-30 Ilumin Corporation System and method for document-driven processing of digitally-signed electronic documents
GB9914418D0 (en) * 1999-06-22 1999-08-18 Stringer Andrew M Computer network payment system
US20060036505A1 (en) * 1999-06-28 2006-02-16 Netpack, Inc. Method and system for distributing digital works
US7139731B1 (en) * 1999-06-30 2006-11-21 Alvin Robert S Multi-level fraud check with dynamic feedback for internet business transaction processor
WO2001001227A1 (en) * 1999-06-30 2001-01-04 Accenture Llp A system, method and article of manufacture for tracking software sale transactions of an internet-based retailer for reporting to a software publisher
CN1304977C (en) 1999-07-06 2007-03-14 索尼株式会社 Data providing system, device, and method
KR100721078B1 (en) * 1999-07-06 2007-05-22 소니 가부시끼 가이샤 Data processing device, data providing system, and data providing method
US6594633B1 (en) * 1999-07-07 2003-07-15 Vincent S. Broerman Real estate computer network
JP2001022843A (en) * 1999-07-07 2001-01-26 Sony Corp Device and method for processing information and providing medium
JP4599657B2 (en) * 1999-07-07 2010-12-15 ソニー株式会社 Data providing system, content providing device, and the content processing apparatus
US7296001B1 (en) * 1999-07-12 2007-11-13 Ariba, Inc. Electronic multilateral negotiation system
EP1203280B1 (en) 1999-07-14 2017-08-30 Symantec Corporation System and method for protecting a computer network against denial of service attacks
US7117532B1 (en) * 1999-07-14 2006-10-03 Symantec Corporation System and method for generating fictitious content for a computer
US6981155B1 (en) * 1999-07-14 2005-12-27 Symantec Corporation System and method for computer security
US7177829B1 (en) * 1999-07-16 2007-02-13 H & R Block Tax Services, Inc. Tax refund system
WO2001007982A3 (en) * 1999-07-22 2001-10-11 Silicon Valley Bank Method and system for providing information responsive to a user
US7093286B1 (en) * 1999-07-23 2006-08-15 Openwave Systems Inc. Method and system for exchanging sensitive information in a wireless communication system
US8381087B1 (en) 1999-07-26 2013-02-19 G&H Nevada-Tek Automated electronic document filing system, method, and article of manufacture
US6317755B1 (en) * 1999-07-26 2001-11-13 Motorola, Inc. Method and apparatus for data backup and restoration in a portable data device
WO2001010090A1 (en) 1999-07-28 2001-02-08 Tomkow Terrance A System and method for verifying delivery and integrity of electronic messages
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
JP3312335B2 (en) * 1999-07-30 2002-08-05 株式会社コムスクエア User authentication method, user authentication system and a recording medium
US7113918B1 (en) * 1999-08-01 2006-09-26 Electric Planet, Inc. Method for video enabled electronic commerce
EP1203281B1 (en) 1999-08-02 2012-10-10 DOT Assets No. 2 LLC System for protecting information over the internet
US7171567B1 (en) 1999-08-02 2007-01-30 Harris Interactive, Inc. System for protecting information over the internet
JP3522635B2 (en) * 1999-08-03 2004-04-26 ヴィジョンアーツ株式会社 Computer readable recording medium recording an image file, creation device the recording medium, medium recording an image file creation program, an image file transmission apparatus, an image file processing apparatus, a medium recording an image file processing program
US7159116B2 (en) * 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7475246B1 (en) 1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server
US6628412B1 (en) * 1999-08-05 2003-09-30 Hewlett-Packard Development Company, L.P. Methods of document management and automated document tracking, and a document management system
JP4009108B2 (en) 1999-08-10 2007-11-14 コロムビアミュージックエンタテインメント株式会社 Memory card
US9064281B2 (en) 2002-10-31 2015-06-23 Mastercard Mobile Transactions Solutions, Inc. Multi-panel user interface
EP1206741A1 (en) * 1999-08-11 2002-05-22 Spinware, Inc. System and method for controlling access to data stored in a portable storage medium
US7536016B2 (en) * 2004-12-17 2009-05-19 Microsoft Corporation Encrypted content data structure package and generation thereof
EP1076279A1 (en) * 1999-08-13 2001-02-14 Hewlett-Packard Company Computer platforms and their methods of operation
US6886098B1 (en) * 1999-08-13 2005-04-26 Microsoft Corporation Systems and methods for compression of key sets having multiple keys
WO2001015162A3 (en) * 1999-08-13 2001-09-27 Microsoft Corp Methods and systems of protecting digital content
US7124170B1 (en) 1999-08-20 2006-10-17 Intertrust Technologies Corp. Secure processing unit systems and methods
US8214386B2 (en) * 1999-08-20 2012-07-03 Newgems Llc System and method for structured news release generation and distribution
EP1237112A4 (en) 1999-08-23 2006-05-17 Li Dongsheng A method for the accomplishment secure transaction for electronicbankbook (purse)
US7082439B1 (en) * 1999-08-26 2006-07-25 Hsc Venture Fund 1999 System and method for electronic message notification
EP1212734B1 (en) * 1999-08-26 2006-07-19 MONEYCAT Ltd. Electronic currency, electronic wallet therefor and electronic payment systems employing them
WO2001016776A1 (en) * 1999-08-27 2001-03-08 Sony Corporation Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method
WO2001016775A1 (en) * 1999-08-27 2001-03-08 Comnex Co., Ltd. Method for providing literary work data, system for executing the method, and computer-readable recorded medium
WO2001016933A1 (en) * 1999-08-30 2001-03-08 Fujitsu Limited Device for data reproduction
US7203962B1 (en) * 1999-08-30 2007-04-10 Symantec Corporation System and method for using timestamps to detect attacks
US7020774B1 (en) * 1999-08-30 2006-03-28 Georges Marc Cornuejols Communications method and device
US6301666B1 (en) 1999-08-31 2001-10-09 Everdream, Inc. Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system
US6281894B1 (en) * 1999-08-31 2001-08-28 Everdream, Inc. Method and apparatus for configuring a hard disk and for providing support for a computer system
US7406603B1 (en) 1999-08-31 2008-07-29 Intertrust Technologies Corp. Data protection systems and methods
US7343321B1 (en) * 1999-09-01 2008-03-11 Keith Ryan Hill Method of administering licensing of use of copyright works
US7225445B1 (en) * 1999-09-02 2007-05-29 Fuji Xerox Co., Ltd. Execution control apparatus with key pad that enables selection of jobs to be run
US7287166B1 (en) 1999-09-03 2007-10-23 Purdue Research Foundation Guards for application in software tamperproofing
US6507817B1 (en) * 1999-09-03 2003-01-14 Cisco Technology, Inc. Voice IP approval system using voice-enabled web based application server
US6490564B1 (en) * 1999-09-03 2002-12-03 Cisco Technology, Inc. Arrangement for defining and processing voice enabled web applications usin