US20080313086A1 - Secure licensing system - Google Patents

Secure licensing system Download PDF

Info

Publication number
US20080313086A1
US20080313086A1 US11/774,364 US77436407A US2008313086A1 US 20080313086 A1 US20080313086 A1 US 20080313086A1 US 77436407 A US77436407 A US 77436407A US 2008313086 A1 US2008313086 A1 US 2008313086A1
Authority
US
United States
Prior art keywords
biometric
licensed product
party
biometric information
recipient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/774,364
Inventor
Mikhail Milgramm
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/774,364 priority Critical patent/US20080313086A1/en
Publication of US20080313086A1 publication Critical patent/US20080313086A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • H04N5/77Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
    • H04N5/772Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera the recording apparatus and the television camera being placed in the same enclosure
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection

Definitions

  • the present invention relates generally to a system and method for protection of creative works using biometric security based on biometric identification and verification.
  • Piracy copying of software is an extensive problem to software vendors which annually costs them large amounts of money.
  • the software industry loses about US$11 to US$12 billion in revenue to software piracy annually.
  • This unit may take the form of a blind plug (also termed “dongle”), for example, which is connected directly to one of the input-output terminals of the computer, and containing fixed tables, identity number, or the like, stored in an internal memory from which information is read upon the request of a programmed additional routine included for this purpose in the application program in question.
  • the unit may also take the form of a card reader station, or the like, in which a card is inserted, the matter stored on the card in principle being similar to that of the blind plug above.
  • the checking procedure involves that the additional routine of the program makes a direct comparison of the program identity, for example, and a corresponding item of information present in the stored table.
  • the additional routine of the program makes a direct comparison of the program identity, for example, and a corresponding item of information present in the stored table.
  • Biometrics is a field of technology aimed at utilizing one or more unique personal characteristics of an individual, ranging, for example, from their fingerprints to their hand vein pattern, odor, iris image, or their DNA, to authenticate their identity.
  • Biometric technologies are typically of two types—passive and active. Passive biometrics either do not require the individual who's identity is being verified to do anything other than to enable a certain biometric characteristic to be acquired by the system (e.g., by placing a finger on a fingerprint scanner, by looking into a retinal scanner, or by looking in the direction of a facial scanner).
  • biometrics require the individual who's identity is being verified to perform one or more predetermined actions in order to enable the system to acquire the representation of one or more appropriate biometric characteristics (e.g., by providing a signature, by speaking, by squeezing a certain object, etc.).
  • Certain types of biometric systems may incorporate a combination of active and passive biometric approaches. The various types of biometric systems are discussed in greater detail in the U.S. patent application Ser. No. 11/332,017 entitled “MULTIPLATFORM INDEPENDENT BIOMETRIC IDENTIFICATION SYSTEM”, which is incorporated herein by reference in its entirety.
  • the inventive data processing system and method enable protection of creative works using biometric information of their authors and other authorized individuals.
  • the method includes capturing and digitizing a creative image using an image capturing device of a digital camera, acquiring and verifying biometric information of authorized users using a biometric identification device of the digital camera, storing the biometric information on a biometric database of the digital camera, storing the captured creative digital image on a digital image storage device of the digital camera; and selectively restricting access to the captured creative digital image stored on the digital image storage device to authorized users whose biometric information is stored in the biometric database.
  • the system is a digital camera, which includes an image capturing device capturing and digitizing a creative image, a biometric identification device acquiring and verifying biometric information of authorized users, a local biometric database storing the acquired biometric information on the digital camera, and a digital image storage device storing the captured creative digital image.
  • An access to the captured creative digital image stored on the digital image storage device is selectively restricted to authorized users whose biometric information is stored in the local biometric database.
  • one party is a licensor of a licensed product incorporating the creative digital work.
  • a license activation method is accomplished by purchasing the licensed product by a first party from a second party; conveying the licensed product by the second party to the first party; verifying an identity of a recipient of the licensed product using a biometric security management system; and activating a license associated with the licensed product when the biometric security management system verifies the identity of the recipient of the licensed product.
  • FIG. 1 shows a logic flow diagram of an exemplary embodiment of a process of implementing and utilizing the systems of FIGS. 2-3 ;
  • FIG. 2 shows a block diagram of a first exemplary embodiment of the inventive system, that enables securing access to works of authorship through biometric identity verification;
  • FIG. 3 shows a block diagram of a second exemplary embodiment of the inventive system, that enables securing access to works of authorship through biometric identity verification;
  • FIG. 4 shows a block diagram of an exemplary embodiment of the inventive license activation system
  • FIG. 5 shows a logic flow diagram of an exemplary embodiment of a process of implementing and utilizing the inventive license activation system shown in FIG. 4 .
  • the system and method of the present invention remedy the disadvantages of previously known solutions directed at protection of creative works.
  • any computer used in conjunction with the present invention will include the typical components necessary for its operation, e.g., one or more CPUs, memory, long term data storage, and, in cases of computers typically utilized by users, one or more input devices, a display, and so on.
  • the typical components necessary for its operation e.g., one or more CPUs, memory, long term data storage, and, in cases of computers typically utilized by users, one or more input devices, a display, and so on.
  • Table 1 also provides the definitions of some abbreviated terms used herein.
  • the term “creative work” refers to any work of authorship, regardless of the means of its creation, including but not limited to the types and definitions set forth in 17 U.S.C. ⁇ 101 and 102.
  • 3 User A user is defined as: 1. Any party that desires to securely and/or verifiably store or transfer to another party (or parties) a creative work, whether by transmission thereto, or by granting (to the other party or parties) secured access to content that includes the creative work, and/or 2.
  • users may range from private individuals, to members of groups of any type and with any amount of hierarchical levels and subgroups and that may be readily overlap with other groups (e.g., Groups of friends, family members, employees of a corporation, government employees and/or officials of varying ranks in one or more agencies, students of a particular university, etc.) 4 BIVS Biometric Identity Verification System 5 BIVD Biometric Identity Verification Device 6 BIVA Biometric Identity Verification Application 7 Information/data/ As defined herein, information, data, or content, may content be of any type and in any number of formats that can be, in whole or in part, transmitted, interacted with (e.g., Viewed, modified, reviewed, etc.), Generated, acquired, analyzed, deleted, reviewed, and/or otherwise processed by an infotr system.
  • information may include, but is not limited to, one or more of the following: text, images, audio, video, transactional information, instrument or sensor readings (e.g., Medical, scientific, military), links to other data, executable programs and supporting files, etc.
  • data may be static, interactive, or a combination of both. While it may be used interchangeably with “information” or “data”, the term “content” preferably represents certain desirable information that is of interest to one or more parties, access to which is controlled by one or more parties.
  • Communication link As defined herein, a communication link is preferably any form of a communication connection between the various components of the inventive system that enables data transmission of the appropriate types of information therebetween.
  • Each communication link may include, but is not limited to, one or more of the following, in any combination: direct telecommunication line(s), wireless link(s) (e.g., Satellite uplink, radio, cellular, Wi-Fi, etc.), and communication network(s) (such as a LAN (local area network), a WAN (wide area network), or the Internet).
  • direct telecommunication line(s) e.g., wireless link(s) (e.g., Satellite uplink, radio, cellular, Wi-Fi, etc.), and communication network(s) (such as a LAN (local area network), a WAN (wide area network), or the Internet).
  • wireless link(s) e.g., Satellite uplink, radio, cellular, Wi-Fi, etc.
  • communication network(s) such as a LAN (local area network), a WAN (wide area network), or the Internet).
  • the system of the present invention includes at least two levels: Level 1—the level where the creative digital work is created and initially stored (e.g., a digital camera, a personal computer, a mobile device, a scanner, a digital audio recorder, etc.), and Level 2—the network level, where the creative digital work is stored for subsequent protection and/or utilization.
  • Level 1 the level where the creative digital work is created and initially stored
  • Level 2 the network level, where the creative digital work is stored for subsequent protection and/or utilization.
  • an intermediary Level 1a for example, a host computer, may be provided for an intermediate storage and transfer of creative digital works.
  • the system is generally illustrated in FIG. 2 showing Level 1 elements including the processor 1 , the memory 4 , the Level 1 biometric database 2 , the biometric identification and verification device (BIVD) 3 for acquiring biometric information from a user and a corresponding biometric identity verification application (BIVA) 8 for controlling the operation of the BIVD 3 and for enabling the acquired biometric characteristics to be used for identity verification.
  • BIVD 3 in combination with the BIVA 8 generate a user biometric identity verification element (BIVE), representative of the biometric information acquired by the BIVD, and process it for storage in the biometric database 2 (as well as biometric databases of other system levels) and use in future user identity verification (e.g., by creating a recognition template, or otherwise).
  • BIVE user biometric identity verification element
  • Level 1 includes a creative device 5 , i.e., the device that is used by the author to assist in creation of the creative work.
  • creative device 5 may be an image capturing device of a digital camera, software assisting in creation of a digital work, a sound recording and digitizing device, etc.
  • Level 2 preferably includes at least a biometric database 6 for storing BIVEs of users registered with Level 2 network and a creative works database 7 for storing and protecting creative works uploaded to Level 2. Only users whose BIVEs are registered with the biometric database 6 and who are authorized by the author will have an access to the creative work in the creative works database 7 .
  • the author or an owner of the creative work stored in the creative works database may create various rules with respect to accessing, viewing, using, selling, purchasing, distributing and other rights with respect to its creative work.
  • Level 1a preferably includes a processor 1 ′, a Level 1a biometric database 2 ′, memory 4 ′, BIVD 3 ′ and BIVA 8 ′.
  • Functions of Level 1a elements are similar to the functions of the equivalent elements of Level 1, described above.
  • FIG. 1 is a logical flow chart illustrating the method for protecting creative works, in accordance with the preferred embodiment of the present invention.
  • an author is asked whether he/she wants to create and store his/her biometric information (step 102 ), i.e., BIVE. More than one person may be designate as the author. Therefore, multiple biometric enrolments are possible with the present system.
  • BIVE is created using a biometric scanning device (“BIVD”) and, in accordance with step 103 , is stored in the Level 1 Biometric Database. If there are additional users of the system, their BIVEs may also be created and stored at the time the initial set up is performed (steps 104 - 105 ).
  • step 106 author creates a creative work (step 106 ) and has a choice of protecting this work using his/her biometric information (step 107 ). If no protection is desired, the work is ordinarily stored on an appropriate storage means, for example, memory 4 or 4 ′ (step 108 ). If, however, the author desires to protect the creative work, the system will first check whether the author's BIVE was previously stored (step 109 ). If no such information was previously stored, the author will be asked to use the attached BIVD to create BIVE and to store this information in the Level 1 Biometric Database (step 110 ). The author's BIVE is then verified (step 111 ), and the work is protected and stored (step 112 ).
  • the creative work may be encrypted using any known encryption method prior to being stored.
  • the author will need to submit his/her BIVE using the BIVD and verify this BIVE by comparing it to the BIVE previously stored in Level 1 Biometric Database.
  • the author may designate other individuals allowed to access the protected work. All such individuals will need their BIVEs to be stored in Level 1 Biometric Database.
  • the additional step of encryption is not necessary to protect the creative work. The work may simply be protected by biometrically securing access to such work in the manner described above.
  • the protected work may then be uploaded to an intermediate Level 1a or the network Level 2 of the inventive system and distributed or licensed as described below (step 114 ).
  • FIG. 3 explains the use of the inventive system and method in connection with creation and utilization of digital images created by a digital camera (i.e., Level 1), it should be noted that the present system is not restricted to such use, as will be apparent to a person skilled in the art.
  • system 100 includes a digital camera 10 , a host computer 50 and a network 70 .
  • Digital camera 10 produces digital images that are stored on a removable digital image storage medium (e.g., a memory card) 30 or other digital storage device.
  • Digital camera 10 has a zoom lens 12 that is controlled by a zoom switch (not shown) having telephoto (T) and wide angle (W) positions, and having zoom and focus motor drives (not shown), and an adjustable aperture and shutter (not shown) for focusing light from a scene onto an image sensor 14 .
  • the image sensor 14 can be, for example, a single-chip, colored, charge-coupled device (CCD), using the well-known Bayer color filter pattern.
  • CCD charge-coupled device
  • the analog output signal from the image sensor 14 is converted to digital data by an analog-to-digital (A/D) converter (not shown).
  • A/D analog-to-digital
  • the digital data is processed by a processor 18 that is controlled by firmware stored in a reprogrammable memory, such as a Flash EPROM (not shown).
  • Digital camera 10 is further supplied with a biometric identification system (BIS), which utilizes one or more unique personal characteristics of camera users registered therewith, to verify their identity.
  • BIS preferably includes a biometric identity verification device (BIVD) 28 for acquiring biometric information from a user, and a corresponding biometric identity verification application (BIVA) (not shown) for controlling the operation of the BIVD, and for enabling the acquired biometric characteristics to be used for identity verification.
  • BIVA software may be provided with the digital camera on a compact disc, CD-ROM, a floppy disk, or other digital media and installed on the host computer 50 or directly on the digital camera 10 (possibly, as part of the firmware) at the time of the initialization of the digital camera, i.e., prior to taking pictures.
  • BIVA software is executed external to the digital camera 10 , and is executed on the host computer 50 .
  • the BIVA software can alternatively be executed by an Internet appliance, set-top box, or other external device, or can be executed internal to the digital camera 10 , provided that the digital camera has an appropriate user interface for displaying and responding to questions.
  • BIVEs of the author and other authorized users may be stored in a local biometric database 34 .
  • the processed digital image file is provided to a digital storage interface 20 which stores the digital image file on the removable digital image storage medium 30 , or on another type of digital memory device, such as a floppy disk or magnetic hard drive, or smart media.
  • the removable digital image storage medium 30 which is well-known to those skilled in the art, can include, for example, a memory card adapted to the PCMCIA card interface standard, as described in the PC Card Standard, Release 2.0, published by the Personal Computer Memory Card International Association, Sunnyvale, Calif., September 1991.
  • the removable digital image storage medium 30 can also be adapted to the Compact Flash interface standard, such as described in the Compact Flash Specification Version 1.4, published by the CompactFlash Association, Palo Alto, Calif., July 1999, or to other memory devices such as the well-known SSFDC (Solid State Floppy Disc Card) or Memory Stick formats.
  • the Compact Flash interface standard such as described in the Compact Flash Specification Version 1.4, published by the CompactFlash Association, Palo Alto, Calif., July 1999, or to other memory devices such as the well-known SSFDC (Solid State Floppy Disc Card) or Memory Stick formats.
  • Processor 18 performs color interpolation followed by color and tone correction, in order to produce rendered sRGB image data.
  • the processor 18 can include internal buffer memory to store a portion of the image, or to store one or more entire images. Alternatively, the processor 18 can use a separate external memory, such as DRAM memory 19 .
  • the rendered sRGB image data is then JPEG compressed and stored as a JPEG image file on the removable digital image storage medium 30 .
  • the processor 18 also provides a lower resolution or “thumbnail” size image data to an LCD display 22 , which displays the captured image for the user to review.
  • Several camera user buttons provided as part of the user controls 24 are used to control the digital camera 10 .
  • User controls 24 together with text and icons displayed on the LCD display 22 , form the camera graphical user interface (GUI). This GUI is controlled by the user interface portion of the firmware stored in the Flash EPROM.
  • GUI camera graphical user interface
  • the digital camera 10 determines various metadata items, such as the date/time the picture was taken from the real-time clock (not shown) provided by the processor 18 . Additionally, a place of the creation may also be preserved by entering the place identifying information using the GUI. After a series of images has been taken by the digital camera 10 and stored on the removable digital image storage medium 30 , the removable medium 30 can be inserted into an appropriate reader 48 communicatively attached to or incorporated within the host computer 50 . Alternatively, an interface cable 36 can be used to connect between a host interface 26 in the digital camera 10 and a camera interface 46 which may be external or internal to the host computer 50 . The interface cable 36 may conform to, for example, the well-known universal serial bus (USB) interface specification.
  • USB universal serial bus
  • the captured images from the digital camera 10 can be downloaded to the host computer 50 and stored on a hard drive 56 under the control of a central processing unit (CPU) 60 .
  • host computer 50 includes RAM memory 38 , and the CPU 60 is coupled to a display monitor 52 , which is used to view the images, and various input/output devices 54 (e.g., a keyboard).
  • previously created creative works can be stored on an external storage medium 32 .
  • the external storage medium 32 include a CD ROM, a DVD, an external hard drive, a floppy disk, an MP3 player and a flash drive.
  • CPU 60 communicates with an External Media Storage Interface 42 in order to read the information from the external storage medium 32 .
  • External media storage interface 42 can be a CD ROM drive, a floppy disk drive or any other appropriate interface.
  • Host computer BIS preferably includes a host BIVD 64 for acquiring biometric information from a user, a corresponding BIVA (not shown) and an intermediate biometric database 66 for storing BIVEs of registered users.
  • IFA 58 can be a local printer, a copier, a facsimile apparatus or a scanner. IFA 58 may be utilized to produce hard copy prints of the images that were captured by the digital camera 10 , to print hard copies of other creative works created on the host computer 50 , to upload a digital copy of a creative work existing in a hard copy (e.g., by scanning a hard copy of a manuscript) or to upload a digital copy of a creative work transmitted from another location. Similarly to the digital camera 10 , IFA 58 can create a date stamp associated with the creation, upload or transmission of a particular creative work.
  • the creative work is uploaded to the network 70 having a creative works database 72 for storage and protection of uploaded creative works and a network biometric database 74 .
  • network may further include a master biometric security system 80 working with the master biometric database 74 to register and store biometric information of authorized users.
  • Biometric security system 80 may be implemented as part of the network 70 (as shown in FIG. 3 ) or as a free-standing application service provider (ASP) connected to the network 70 . Further, biometric security system 80 may be implemented as an independent biometric security server described in U.S. Pat. No. 6,993,659, fully incorporated herein by reference.
  • Network 70 further includes an interface 76 for interfacing with various local or intermediary devices via secure communication links 82 .
  • Communications with the host computer 50 are preferably accomplished via the PC/Network interface 68 .
  • communications with the digital camera 10 are preferably accomplished via the network interface 78 . Further elements and functions of network 70 are described below in connection with distribution of creative works.
  • an author creates his/her creative work 200 using digital equipment, e.g., a personal computer, a digital camera, a mobile device, etc.
  • digital equipment e.g., a personal computer, a digital camera, a mobile device, etc.
  • This digital equipment may be preliminary set up to have a biometrically secured access to the digital equipment and information stored thereon.
  • the author secures the work by attaching his/her biometric information, a date stamp and possibly a place of creation information to the work.
  • the work may be further locally protected by encryption. Only authorized users whose biometric information is registered with a biometric identification system of the digital equipment will be allowed to access the creative work 200 .
  • copyright protection attaches to work 200 at the time of creation.
  • the author registers his/her biometric information using the master biometric security system and uploads work 200 to the Level 2 network.
  • the author uploads work 200 he/she provides the biometric information using the biometric scanning device.
  • the system identifies the author using the previously stored biometric information and creates a date stamp and optionally a place of creation stamp for work 200 .
  • the name of the author, the date stamp and the place stamp are then attached to the work such that the date, the place and the author of the work may be later verified, if necessary. Further, work 200 may then be distributed with the attached information, as described in more detail below.
  • licensed product 220 may include terms and conditions of licensing the product 220 .
  • User 201 in FIG. 4 refers to the author or licensor (i.e., an owner, vendor or distributor of a licensed product corresponding to the creative work) of the creative work, and its system 202 may be constructed in a way described above with reference to FIGS.
  • the system may be the Level 1, Level 1a or Level 2 system containing the product to be licensed.
  • the licensor's system 202 preferably includes the following capabilities: 1. capability for transmitting information to at least one other system; 2. capability for receiving information from at least one other system; 3. capability for storing data and applications for issuing instructions, and, in response to issued instructions, performing tasks involving data stored therein or provided thereto, sufficient to enable functionality necessary for operation of the disclosed system and method; 4. capability for displaying information relevant to its operation and the performed tasks; 5. capability for communicating with the BIVS system 205 via a communication link 210 ; and 6. capability for receiving instructions from an operator.
  • System 202 also preferably includes a BIVD 214 for scanning or otherwise retrieving BIVEs.
  • FIG. 4 further features a licensee 203 .
  • the licensee 203 has access to its own system 204 , which may communicate with the BIVS system 205 via a communication link 212 .
  • system 202 of the user 201 and system 204 of the user 203 are able to communicate with each other via a communication link 240 .
  • the various communication links shown in FIG. 4 may be similar to at least some of the other links, or may all be of the same configuration (e.g., the Internet).
  • system 204 also preferably includes a BIVD 216 for scanning or otherwise retrieving BIVEs.
  • BIVS system 205 preferably includes LAS 206 (see definitions in Table 1) as an integrated component.
  • LAS 206 is a license activation management system performing enrollment procedure and verification for user 203 during installation of the product 220 .
  • each product 220 prefer includes LAC 208 (see definitions in Table 1).
  • LAC 208 is a software installation package that implements biometric identity management algorithm to connect user 203 to LAS 206 , capture and send a user's biometric (e.g., fingerprint) element during installation procedure and to ensure that only previously registered clients would be able to complete installation of the product they had purchased.
  • biometric e.g., fingerprint
  • FIG. 5 an exemplary embodiment of a process for accomplishing license activation utilizing the inventive system (for example, the system of FIG. 4 ) is shown.
  • the various steps of this process may be executed by different components of the inventive system of FIG. 4 .
  • the process of licensing the product 202 may begin at an optional step 302 , where a user 203 may purchase a licensed product from a licensor 201 .
  • LAC 208 of the purchased licensed product is then sent to the purchasing user at a step 304 .
  • step 304 may be accomplished by electronically transmitting LAC 208 from licensor 201 to user 203 via the connection link 240 .
  • LAC 208 of the purchased licensed product may be recorded on some electronic media (e.g., hard disk, CD, DVD, etc.) and then physically conveyed to the purchasing user.
  • the purchasing user runs LAC 208 on its system 204 connecting the purchasing user's system to the LAS 206 of the BIVS system 205 , where the user performs a registration process (step 308 ).
  • Purchaser's BIVE is then stored at the biometric database 212 of the BIVS system 205 .
  • the purchasing user 203 may register its biometric information with the BIVS system 205 at the time of purchase of the licensed product using the communication link 210 between the licensor 201 and the BIVS system.
  • IBSM System After the registration is complete, IBSM System notifies the licensor that the product may be transmitted.
  • the licensor encrypts the purchased product (this step is optional because it is possible to control access to the purchased product without encrypting it), which is then transmitted to the purchasing user at a step 312 indicating the purchasing user as the intended recipient.
  • the user Upon receipt of the licensed product, the user transmits, biometric information acquired through its BIVD 216 in form of a BIVE to the BIVS system, which verifies the supplied BIVE against the BIVE of the authorized user previously stored during registration.
  • the product Upon successful verification, the product is decrypted (if it was previously encrypted) and product installation process is activated, at a step 314 .
  • an installation log may be created and stored at the BIVS system to provide the licensor with an easy license record keeping option.
  • transmission of LAC of the purchased product, encryption of the purchased product and the transmission of the actual purchased product are described as three separate steps (i.e., steps 304 , 310 and 312 ), they can be accomplished simultaneously.
  • the licensor will transmit the LAC and the encrypted product as one package.
  • the user will not be able to access and/or install the licensed product until the registration (step 308 ) and verification are completed. Accordingly, the creative work incorporated in the licensed product 202 is protected by the disclosed and claimed system and method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

A secure licensing system and method where a licensed product is purchased by a first party from a second party and then conveyed by the second party to a recipient with an indication that the first party is an intended licensee of the licensed product. Identity of the recipient of the licensed product is verified using a biometric verification device and a biometric database, and the license associated with the licensed product is activated when the biometric verification device and the biometric database verify that the recipient of the licensed product is the intended licensee of this product.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This is a continuation of U.S. patent application Ser. No. 11/761,797, filed on Jun. 12, 2007 and fully incorporated herein by reference, and claims all rights of priority thereto. This is also a continuation of U.S. patent application Ser. No. 11/764,932, filed on Jun. 19, 2007 and fully incorporated herein by reference, and claims all rights of priority thereto.
  • FIELD OF THE INVENTION
  • The present invention relates generally to a system and method for protection of creative works using biometric security based on biometric identification and verification.
  • BACKGROUND OF THE INVENTION
  • In view of the tremendous opportunities and advantages of cybernetics and phenomenal growth of internet, mobile technologies, digital instrumentation, there have arisen serious concerns in the arena of protecting intellectual property rights of creative digital works, for example, software, digital images, digitized music, e-books, etc. The growth of digital information transmission worries copyright holders who fear that the new technology threatens their rights because of greater piracy, increased theft of digital works at the information transfer stage and widespread sharing of digital works.
  • Piracy copying of software, particularly software adapted to run on personal computers, is an extensive problem to software vendors which annually costs them large amounts of money. On average, the software industry loses about US$11 to US$12 billion in revenue to software piracy annually. The conventional methods employed to protect software against unauthorized utilization by demanding a password for the installation or operation of a specific computer program or program package, for example, have not provided sufficient security.
  • Several attempts have already been made to establish arrangements in which simply typing a required password is not sufficient to gain access to a program. For example, systems have been proposed which require that a special hardware unit is connected to the computer to make it possible to utilize a given program. This unit may take the form of a blind plug (also termed “dongle”), for example, which is connected directly to one of the input-output terminals of the computer, and containing fixed tables, identity number, or the like, stored in an internal memory from which information is read upon the request of a programmed additional routine included for this purpose in the application program in question. The unit may also take the form of a card reader station, or the like, in which a card is inserted, the matter stored on the card in principle being similar to that of the blind plug above. Usually the checking procedure involves that the additional routine of the program makes a direct comparison of the program identity, for example, and a corresponding item of information present in the stored table. Thus, an arrangement making it possible to use a certain computer program or a computer program package only if the permission of the copyright holder really exists would be of great importance.
  • One attempt to address the above challenges was a proposed utilization of biometric access control systems by the sending and receiving party to authenticate the identity of the sending and receiving party. The use of biometric technologies has previously gained some acceptance in the field of content access control, and so, application of such technologies to the goal of securing copyrighted content is a reasonable approach.
  • Biometrics is a field of technology aimed at utilizing one or more unique personal characteristics of an individual, ranging, for example, from their fingerprints to their hand vein pattern, odor, iris image, or their DNA, to authenticate their identity. Biometric technologies are typically of two types—passive and active. Passive biometrics either do not require the individual who's identity is being verified to do anything other than to enable a certain biometric characteristic to be acquired by the system (e.g., by placing a finger on a fingerprint scanner, by looking into a retinal scanner, or by looking in the direction of a facial scanner). Active biometrics require the individual who's identity is being verified to perform one or more predetermined actions in order to enable the system to acquire the representation of one or more appropriate biometric characteristics (e.g., by providing a signature, by speaking, by squeezing a certain object, etc.). Certain types of biometric systems may incorporate a combination of active and passive biometric approaches. The various types of biometric systems are discussed in greater detail in the U.S. patent application Ser. No. 11/332,017 entitled “MULTIPLATFORM INDEPENDENT BIOMETRIC IDENTIFICATION SYSTEM”, which is incorporated herein by reference in its entirety.
  • It would thus be desirable to provide a system and method for restricting access to creative digital works to one or more specific identified individuals. It would further be desirable to provide a system and method for preserving the identity of the author of a particular creative work and the date and location of its creation. It would additionally be desirable, to provide a system and method for registering, tracking and biometrically verifying identities of users/licensees of various creative works.
  • SUMMARY OF THE INVENTION
  • The inventive data processing system and method enable protection of creative works using biometric information of their authors and other authorized individuals.
  • In one embodiment of the inventive method for protection of creative works, the method includes capturing and digitizing a creative image using an image capturing device of a digital camera, acquiring and verifying biometric information of authorized users using a biometric identification device of the digital camera, storing the biometric information on a biometric database of the digital camera, storing the captured creative digital image on a digital image storage device of the digital camera; and selectively restricting access to the captured creative digital image stored on the digital image storage device to authorized users whose biometric information is stored in the biometric database.
  • In one embodiment of the inventive system for protection of creative works, the system is a digital camera, which includes an image capturing device capturing and digitizing a creative image, a biometric identification device acquiring and verifying biometric information of authorized users, a local biometric database storing the acquired biometric information on the digital camera, and a digital image storage device storing the captured creative digital image. An access to the captured creative digital image stored on the digital image storage device is selectively restricted to authorized users whose biometric information is stored in the local biometric database.
  • In a further embodiment of the inventive system and method, which may be utilized on its own or in conjunction with other described embodiments, one party is a licensor of a licensed product incorporating the creative digital work. In accordance with this embodiment, a license activation method is accomplished by purchasing the licensed product by a first party from a second party; conveying the licensed product by the second party to the first party; verifying an identity of a recipient of the licensed product using a biometric security management system; and activating a license associated with the licensed product when the biometric security management system verifies the identity of the recipient of the licensed product.
  • Other objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which reference should be made to the appended claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the drawings, wherein like reference characters denote corresponding or similar elements throughout the various figures:
  • FIG. 1 shows a logic flow diagram of an exemplary embodiment of a process of implementing and utilizing the systems of FIGS. 2-3;
  • FIG. 2 shows a block diagram of a first exemplary embodiment of the inventive system, that enables securing access to works of authorship through biometric identity verification;
  • FIG. 3 shows a block diagram of a second exemplary embodiment of the inventive system, that enables securing access to works of authorship through biometric identity verification;
  • FIG. 4 shows a block diagram of an exemplary embodiment of the inventive license activation system; and
  • FIG. 5 shows a logic flow diagram of an exemplary embodiment of a process of implementing and utilizing the inventive license activation system shown in FIG. 4.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • The system and method of the present invention remedy the disadvantages of previously known solutions directed at protection of creative works.
  • Because the terminology that may be currently utilized to describe the various embodiments of the novel system (and its functionality), evolves and changes rapidly, for the purposes of clarity, and without departing from the spirit of the invention, the various elements, components, infrastructures, and process steps of the inventive system and method, are described in Table 1, and further below, in terms of their required or desired functionality, and/or in terms of objectives they are intended to accomplish, in accordance with the present invention, rather than as specific structural and/or process implementations, which may change in nomenclature with advances in information systems technology. Table 1 is provided for convenience only and is not meant to be an exhaustive list of possible interpretations of utilized terms.
  • For example, as computers of various types are well known in the art, it is presumed that any computer used in conjunction with the present invention, will include the typical components necessary for its operation, e.g., one or more CPUs, memory, long term data storage, and, in cases of computers typically utilized by users, one or more input devices, a display, and so on. In addition, because a number of abbreviated terms are used for the sake of convenience in FIGS. 1 to 5, and further below, Table 1 also provides the definitions of some abbreviated terms used herein.
  • TABLE 1
    Definitions/Terminology
    # Term Definition
    1 Creative Work For purposes of the present application, the term “creative work”
    refers to any work of authorship,
    regardless of the means of its creation, including but
    not limited to the types and definitions set forth in 17
    U.S.C. §101 and 102.
    2 Author An individual, a group of individuals or a company
    responsible for creation of the creative work or a legal
    owner of a creative work created by somebody else.
    3 User A user is defined as:
    1. Any party that desires to securely and/or
       verifiably store or transfer to another party (or
       parties) a creative work, whether by
       transmission thereto, or by granting (to the
       other party or parties) secured access to content
       that includes the creative work, and/or
    2. Any party that desires to have an access to a
       creative work from another party (or parties).
       Thus, in accordance with the present invention, users
       may range from private individuals, to members of
       groups of any type and with any amount of hierarchical
       levels and subgroups and that may be readily overlap
       with other groups (e.g., Groups of friends, family
       members, employees of a corporation, government
       employees and/or officials of varying ranks in one or
       more agencies, students of a particular university, etc.)
    4 BIVS Biometric Identity Verification System
    5 BIVD Biometric Identity Verification Device
    6 BIVA Biometric Identity Verification Application
    7 Information/data/ As defined herein, information, data, or content, may
    content be of any type and in any number of formats that can
    be, in whole or in part, transmitted, interacted with
    (e.g., Viewed, modified, reviewed, etc.), Generated,
    acquired, analyzed, deleted, reviewed, and/or otherwise
    processed by an infotr system. For example,
    information may include, but is not limited to, one or
    more of the following: text, images, audio, video,
    transactional information, instrument or sensor
    readings (e.g., Medical, scientific, military), links to
    other data, executable programs and supporting files,
    etc. Additionally, data may be static, interactive, or a
    combination of both.
    While it may be used interchangeably with
    “information” or “data”, the term “content” preferably
    represents certain desirable information that is of
    interest to one or more parties, access to which is
    controlled by one or more parties.
    8 Communication link As defined herein, a communication link is preferably
    any form of a communication connection between the
    various components of the inventive system that
    enables data transmission of the appropriate types of
    information therebetween.
    Each communication link may include, but is not
    limited to, one or more of the following, in any
    combination: direct telecommunication line(s), wireless
    link(s) (e.g., Satellite uplink, radio, cellular, Wi-Fi,
    etc.), and communication network(s) (such as a LAN
    (local area network), a WAN (wide area network), or
    the Internet).
    9 BIVE Biometric Identity Verification Element.
    10 LAS License Activation Server (see FIGS. 4-5 and
    accompanying description)
    11 LAC License Activation Component (see FIGS. 4-5 and
    accompanying description)
  • It should be noted, that the specific numbers of users, and corresponding systems shown in the various FIGS. 1 to 5, are provided by way of example only. Because the inventive system is completely scalable, it may be used in configurations ranging from as few as two users, to as many as practically possible, as a matter of design choice or convenience, without departing from the spirit of the invention.
  • As described further below, the system of the present invention includes at least two levels: Level 1—the level where the creative digital work is created and initially stored (e.g., a digital camera, a personal computer, a mobile device, a scanner, a digital audio recorder, etc.), and Level 2—the network level, where the creative digital work is stored for subsequent protection and/or utilization. As described further below, an intermediary Level 1a, for example, a host computer, may be provided for an intermediate storage and transfer of creative digital works.
  • The system is generally illustrated in FIG. 2 showing Level 1 elements including the processor 1, the memory 4, the Level 1 biometric database 2, the biometric identification and verification device (BIVD) 3 for acquiring biometric information from a user and a corresponding biometric identity verification application (BIVA) 8 for controlling the operation of the BIVD 3 and for enabling the acquired biometric characteristics to be used for identity verification. BIVD 3 in combination with the BIVA 8 generate a user biometric identity verification element (BIVE), representative of the biometric information acquired by the BIVD, and process it for storage in the biometric database 2 (as well as biometric databases of other system levels) and use in future user identity verification (e.g., by creating a recognition template, or otherwise). It should be noted that more than one BIVD with its corresponding BIVA (e.g., fingerprint scanner(s), iris scanner(s), face identifier(s), etc.) may be utilized at Levels 1 or 1a of the present system. Additionally, Level 1 includes a creative device 5, i.e., the device that is used by the author to assist in creation of the creative work. Depending on an actual implementation of the claimed invention, creative device 5 may be an image capturing device of a digital camera, software assisting in creation of a digital work, a sound recording and digitizing device, etc.
  • Level 2 preferably includes at least a biometric database 6 for storing BIVEs of users registered with Level 2 network and a creative works database 7 for storing and protecting creative works uploaded to Level 2. Only users whose BIVEs are registered with the biometric database 6 and who are authorized by the author will have an access to the creative work in the creative works database 7. The author or an owner of the creative work stored in the creative works database may create various rules with respect to accessing, viewing, using, selling, purchasing, distributing and other rights with respect to its creative work.
  • Level 1a preferably includes a processor 1′, a Level 1a biometric database 2′, memory 4′, BIVD 3′ and BIVA 8′. Functions of Level 1a elements are similar to the functions of the equivalent elements of Level 1, described above.
  • FIG. 1 is a logical flow chart illustrating the method for protecting creative works, in accordance with the preferred embodiment of the present invention. As shown in FIG. 1, at the initial setup step 101, an author is asked whether he/she wants to create and store his/her biometric information (step 102), i.e., BIVE. More than one person may be designate as the author. Therefore, multiple biometric enrolments are possible with the present system. As explained above, BIVE is created using a biometric scanning device (“BIVD”) and, in accordance with step 103, is stored in the Level 1 Biometric Database. If there are additional users of the system, their BIVEs may also be created and stored at the time the initial set up is performed (steps 104-105). Next, author creates a creative work (step 106) and has a choice of protecting this work using his/her biometric information (step 107). If no protection is desired, the work is ordinarily stored on an appropriate storage means, for example, memory 4 or 4′ (step 108). If, however, the author desires to protect the creative work, the system will first check whether the author's BIVE was previously stored (step 109). If no such information was previously stored, the author will be asked to use the attached BIVD to create BIVE and to store this information in the Level 1 Biometric Database (step 110). The author's BIVE is then verified (step 111), and the work is protected and stored (step 112). It should be noted that in accordance with the preferred embodiment of the present invention, the creative work may be encrypted using any known encryption method prior to being stored. To access, the protected work, the author will need to submit his/her BIVE using the BIVD and verify this BIVE by comparing it to the BIVE previously stored in Level 1 Biometric Database. Additionally, the author may designate other individuals allowed to access the protected work. All such individuals will need their BIVEs to be stored in Level 1 Biometric Database. As will be obvious to a person skilled in the art, the additional step of encryption is not necessary to protect the creative work. The work may simply be protected by biometrically securing access to such work in the manner described above.
  • The protected work may then be uploaded to an intermediate Level 1a or the network Level 2 of the inventive system and distributed or licensed as described below (step 114).
  • The creative work protection system 100 useful in practicing the method of the present invention, which enables users to easily secure, authenticate, and store their creative works, is described with reference to FIG. 3. Although FIG. 3 explains the use of the inventive system and method in connection with creation and utilization of digital images created by a digital camera (i.e., Level 1), it should be noted that the present system is not restricted to such use, as will be apparent to a person skilled in the art.
  • In accordance with one preferred embodiment, system 100 includes a digital camera 10, a host computer 50 and a network 70. Digital camera 10 produces digital images that are stored on a removable digital image storage medium (e.g., a memory card) 30 or other digital storage device. Digital camera 10 has a zoom lens 12 that is controlled by a zoom switch (not shown) having telephoto (T) and wide angle (W) positions, and having zoom and focus motor drives (not shown), and an adjustable aperture and shutter (not shown) for focusing light from a scene onto an image sensor 14. The image sensor 14 can be, for example, a single-chip, colored, charge-coupled device (CCD), using the well-known Bayer color filter pattern. When the user depresses a shutter button (not shown), the analog output signal from the image sensor 14 is converted to digital data by an analog-to-digital (A/D) converter (not shown). The digital data is processed by a processor 18 that is controlled by firmware stored in a reprogrammable memory, such as a Flash EPROM (not shown).
  • Digital camera 10 is further supplied with a biometric identification system (BIS), which utilizes one or more unique personal characteristics of camera users registered therewith, to verify their identity. BIS preferably includes a biometric identity verification device (BIVD) 28 for acquiring biometric information from a user, and a corresponding biometric identity verification application (BIVA) (not shown) for controlling the operation of the BIVD, and for enabling the acquired biometric characteristics to be used for identity verification. BIVA software may be provided with the digital camera on a compact disc, CD-ROM, a floppy disk, or other digital media and installed on the host computer 50 or directly on the digital camera 10 (possibly, as part of the firmware) at the time of the initialization of the digital camera, i.e., prior to taking pictures. Thus, in accordance with one preferred embodiment of the present invention, BIVA software is executed external to the digital camera 10, and is executed on the host computer 50. However, the BIVA software can alternatively be executed by an Internet appliance, set-top box, or other external device, or can be executed internal to the digital camera 10, provided that the digital camera has an appropriate user interface for displaying and responding to questions. BIVEs of the author and other authorized users may be stored in a local biometric database 34.
  • The processed digital image file is provided to a digital storage interface 20 which stores the digital image file on the removable digital image storage medium 30, or on another type of digital memory device, such as a floppy disk or magnetic hard drive, or smart media. The removable digital image storage medium 30, which is well-known to those skilled in the art, can include, for example, a memory card adapted to the PCMCIA card interface standard, as described in the PC Card Standard, Release 2.0, published by the Personal Computer Memory Card International Association, Sunnyvale, Calif., September 1991. The removable digital image storage medium 30 can also be adapted to the Compact Flash interface standard, such as described in the Compact Flash Specification Version 1.4, published by the CompactFlash Association, Palo Alto, Calif., July 1999, or to other memory devices such as the well-known SSFDC (Solid State Floppy Disc Card) or Memory Stick formats.
  • Processor 18 performs color interpolation followed by color and tone correction, in order to produce rendered sRGB image data. The processor 18 can include internal buffer memory to store a portion of the image, or to store one or more entire images. Alternatively, the processor 18 can use a separate external memory, such as DRAM memory 19. The rendered sRGB image data is then JPEG compressed and stored as a JPEG image file on the removable digital image storage medium 30. The processor 18 also provides a lower resolution or “thumbnail” size image data to an LCD display 22, which displays the captured image for the user to review. Several camera user buttons provided as part of the user controls 24 are used to control the digital camera 10. User controls 24, together with text and icons displayed on the LCD display 22, form the camera graphical user interface (GUI). This GUI is controlled by the user interface portion of the firmware stored in the Flash EPROM.
  • The digital camera 10 determines various metadata items, such as the date/time the picture was taken from the real-time clock (not shown) provided by the processor 18. Additionally, a place of the creation may also be preserved by entering the place identifying information using the GUI. After a series of images has been taken by the digital camera 10 and stored on the removable digital image storage medium 30, the removable medium 30 can be inserted into an appropriate reader 48 communicatively attached to or incorporated within the host computer 50. Alternatively, an interface cable 36 can be used to connect between a host interface 26 in the digital camera 10 and a camera interface 46 which may be external or internal to the host computer 50. The interface cable 36 may conform to, for example, the well-known universal serial bus (USB) interface specification.
  • The captured images from the digital camera 10 can be downloaded to the host computer 50 and stored on a hard drive 56 under the control of a central processing unit (CPU) 60. As conventionally known, host computer 50 includes RAM memory 38, and the CPU 60 is coupled to a display monitor 52, which is used to view the images, and various input/output devices 54 (e.g., a keyboard).
  • In an alternative embodiment, previously created creative works can be stored on an external storage medium 32. Examples of the external storage medium 32 include a CD ROM, a DVD, an external hard drive, a floppy disk, an MP3 player and a flash drive. However, as it is apparent to a person skilled in the art, the present invention is not limited to these exemplary devices. CPU 60 communicates with an External Media Storage Interface 42 in order to read the information from the external storage medium 32. External media storage interface 42 can be a CD ROM drive, a floppy disk drive or any other appropriate interface.
  • To protect creative works and other information stored on the host computer 50, a host BIS is provided on the host computer. Host computer BIS preferably includes a host BIVD 64 for acquiring biometric information from a user, a corresponding BIVA (not shown) and an intermediate biometric database 66 for storing BIVEs of registered users.
  • CPU 60 further communicates with an image forming apparatus (IFA) 58 through an IFA interface 62. IFA 58 can be a local printer, a copier, a facsimile apparatus or a scanner. IFA 58 may be utilized to produce hard copy prints of the images that were captured by the digital camera 10, to print hard copies of other creative works created on the host computer 50, to upload a digital copy of a creative work existing in a hard copy (e.g., by scanning a hard copy of a manuscript) or to upload a digital copy of a creative work transmitted from another location. Similarly to the digital camera 10, IFA 58 can create a date stamp associated with the creation, upload or transmission of a particular creative work.
  • In accordance with the preferred embodiment, the creative work is uploaded to the network 70 having a creative works database 72 for storage and protection of uploaded creative works and a network biometric database 74. As shown in FIG. 3, network may further include a master biometric security system 80 working with the master biometric database 74 to register and store biometric information of authorized users. Biometric security system 80 may be implemented as part of the network 70 (as shown in FIG. 3) or as a free-standing application service provider (ASP) connected to the network 70. Further, biometric security system 80 may be implemented as an independent biometric security server described in U.S. Pat. No. 6,993,659, fully incorporated herein by reference. Network 70 further includes an interface 76 for interfacing with various local or intermediary devices via secure communication links 82. Communications with the host computer 50 are preferably accomplished via the PC/Network interface 68. Similarly, communications with the digital camera 10 are preferably accomplished via the network interface 78. Further elements and functions of network 70 are described below in connection with distribution of creative works.
  • As described above in connection with FIGS. 1-3, an author creates his/her creative work 200 using digital equipment, e.g., a personal computer, a digital camera, a mobile device, etc. This digital equipment may be preliminary set up to have a biometrically secured access to the digital equipment and information stored thereon. As further described above, the author secures the work by attaching his/her biometric information, a date stamp and possibly a place of creation information to the work. The work may be further locally protected by encryption. Only authorized users whose biometric information is registered with a biometric identification system of the digital equipment will be allowed to access the creative work 200.
  • According to the copyright law, copyright protection attaches to work 200 at the time of creation. To ensure that the creative work itself, its date and place of creation are preserved, the author registers his/her biometric information using the master biometric security system and uploads work 200 to the Level 2 network. As the author uploads work 200, he/she provides the biometric information using the biometric scanning device. The system identifies the author using the previously stored biometric information and creates a date stamp and optionally a place of creation stamp for work 200. The name of the author, the date stamp and the place stamp are then attached to the work such that the date, the place and the author of the work may be later verified, if necessary. Further, work 200 may then be distributed with the attached information, as described in more detail below.
  • Referring now to FIG. 4, another aspect of the inventive system is shown that enables registered users to obtain a licensed product 220, for example, a product incorporating the copyrighted work 200 discussed above, and activate the license by verifying one or more biometric criteria of the intended user/licensee using the biometric identity verification system (BIVS) 205. In addition to the creative work 200, licensed product 220 may include terms and conditions of licensing the product 220. User 201 in FIG. 4 refers to the author or licensor (i.e., an owner, vendor or distributor of a licensed product corresponding to the creative work) of the creative work, and its system 202 may be constructed in a way described above with reference to FIGS. 2 and 3, i.e., the system may be the Level 1, Level 1a or Level 2 system containing the product to be licensed. Further, the licensor's system 202 preferably includes the following capabilities: 1. capability for transmitting information to at least one other system; 2. capability for receiving information from at least one other system; 3. capability for storing data and applications for issuing instructions, and, in response to issued instructions, performing tasks involving data stored therein or provided thereto, sufficient to enable functionality necessary for operation of the disclosed system and method; 4. capability for displaying information relevant to its operation and the performed tasks; 5. capability for communicating with the BIVS system 205 via a communication link 210; and 6. capability for receiving instructions from an operator. System 202 also preferably includes a BIVD 214 for scanning or otherwise retrieving BIVEs.
  • The embodiment of FIG. 4 further features a licensee 203. The licensee 203 has access to its own system 204, which may communicate with the BIVS system 205 via a communication link 212. Additionally, system 202 of the user 201 and system 204 of the user 203 are able to communicate with each other via a communication link 240. The various communication links shown in FIG. 4 may be similar to at least some of the other links, or may all be of the same configuration (e.g., the Internet). Similarly to system 202, system 204 also preferably includes a BIVD 216 for scanning or otherwise retrieving BIVEs.
  • BIVS system 205 preferably includes LAS 206 (see definitions in Table 1) as an integrated component. LAS 206 is a license activation management system performing enrollment procedure and verification for user 203 during installation of the product 220. Further, each product 220 prefer includes LAC 208 (see definitions in Table 1). LAC 208 is a software installation package that implements biometric identity management algorithm to connect user 203 to LAS 206, capture and send a user's biometric (e.g., fingerprint) element during installation procedure and to ensure that only previously registered clients would be able to complete installation of the product they had purchased.
  • Referring, to FIG. 5, an exemplary embodiment of a process for accomplishing license activation utilizing the inventive system (for example, the system of FIG. 4) is shown. As a matter of design choice, the various steps of this process may be executed by different components of the inventive system of FIG. 4.
  • The process of licensing the product 202 may begin at an optional step 302, where a user 203 may purchase a licensed product from a licensor 201. LAC 208 of the purchased licensed product is then sent to the purchasing user at a step 304. Using the embodiment shown in FIG. 4 as an example, step 304 may be accomplished by electronically transmitting LAC 208 from licensor 201 to user 203 via the connection link 240. Alternatively, LAC 208 of the purchased licensed product may be recorded on some electronic media (e.g., hard disk, CD, DVD, etc.) and then physically conveyed to the purchasing user. Next, at a step 306, the purchasing user runs LAC 208 on its system 204 connecting the purchasing user's system to the LAS 206 of the BIVS system 205, where the user performs a registration process (step 308). Purchaser's BIVE is then stored at the biometric database 212 of the BIVS system 205. Alternatively, the purchasing user 203 may register its biometric information with the BIVS system 205 at the time of purchase of the licensed product using the communication link 210 between the licensor 201 and the BIVS system.
  • After the registration is complete, IBSM System notifies the licensor that the product may be transmitted. At an optional step 310, the licensor encrypts the purchased product (this step is optional because it is possible to control access to the purchased product without encrypting it), which is then transmitted to the purchasing user at a step 312 indicating the purchasing user as the intended recipient. Upon receipt of the licensed product, the user transmits, biometric information acquired through its BIVD 216 in form of a BIVE to the BIVS system, which verifies the supplied BIVE against the BIVE of the authorized user previously stored during registration. Upon successful verification, the product is decrypted (if it was previously encrypted) and product installation process is activated, at a step 314. At an optional step 316, an installation log may be created and stored at the BIVS system to provide the licensor with an easy license record keeping option.
  • Although, transmission of LAC of the purchased product, encryption of the purchased product and the transmission of the actual purchased product are described as three separate steps (i.e., steps 304, 310 and 312), they can be accomplished simultaneously. In such alternative embodiment, the licensor will transmit the LAC and the encrypted product as one package. However, the user will not be able to access and/or install the licensed product until the registration (step 308) and verification are completed. Accordingly, the creative work incorporated in the licensed product 202 is protected by the disclosed and claimed system and method.
  • Thus, while there have been shown and described and pointed out fundamental novel features of the invention as applied to preferred embodiments thereof, it will be understood that various omissions and substitutions and changes in the form and details of the devices and methods illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto.

Claims (20)

1. A license activation method comprising the steps of:
a) purchasing a licensed product by a first party from a second party;
b) conveying said licensed product by said second party to a recipient indicating that said first party is an intended licensee of said licensed product;
c) verifying an identity of the recipient of said licensed product using a biometric verification device and a biometric database; and
d) activating a license associated with said licensed product when said biometric verification device and said biometric database verify that the recipient of said licensed product is the intended licensee of said licensed product.
2. The license activation method according to claim 1, wherein said step of purchasing the licensed product further comprises acquiring a biometric information of the first party and storing the acquired biometric information of the first party in the biometric database.
3. The license activation method according to claim 2, wherein said step of verifying the identity of the recipient of the licensed product further comprises acquiring a biometric information of the recipient using the biometric verification device and comparing the acquired biometric information of the recipient to the acquired biometric information of the first party stored in the biometric database.
4. The license activation method according to claim 1, wherein said step of conveying the licensed product to the recipient further comprises encrypting the licensed product.
5. The license activation method according to claim 4, wherein said step of activating the license associated with the licensed product further comprises decrypting the licensed product.
6. The license activation method according to claim 1 further comprising creating a log recording said activation of the license associated with the licensed product.
7. The license activation method according to claim 1, wherein said conveying of the licensed product further comprises sending the licensed product by electronic mail.
8. The license activation method according to claim 1, wherein said conveying of the licensed product further comprises downloading the licensed product from a network.
9. The license activation method according to claim 1, wherein said first party includes a plurality people.
10. A secure licensing system comprising:
a first party system storing a licensed product, the licensed product including a license activation component;
a second party system including a second biometric identification and verification device; and
a biometric identification and verification system located outside the first party system and the second party system and further comprising a biometric database and a license activation system, the biometric database storing biometric information of an intended licensee of the licensed product,
wherein the first party system is configured to selectively convey the licensed product to the second party system, wherein when the licensed product is received at the second party system the license activation component connects the second party system to the license activation system of the biometric identification and verification system, wherein the second biometric identification and verification device of the second party system acquires a biometric information of a recipient of the licensed product, and wherein the license activation system activates a license associated with the licensed product when the biometric identification and verification system verifies that the biometric information of the recipient matches the biometric information of the intended licensee.
11. The secure licensing system according to claim 10 further comprising a secure communication link between the first party system and the second party system.
12. The secure licensing system according to claim 10, wherein the first party system further comprises an encryption means encrypting the licensed product prior to conveying the licensed product to the second party system.
13. The secure licensing system according to claim 12, wherein the license activation system of the biometric identification and verification system further comprises a decryption means decrypting the licensed product when the biometric identification and verification system verifies that the biometric information of the recipient matches the biometric information of the intended licensee.
14. The secure licensing system according to claim 10 further comprising a secure communication link between the first party system and the biometric identification and verification system.
15. The secure licensing system according to claim 10 further comprising a secure communication link between the second party system and the biometric identification and verification system.
16. The secure licensing system according to claim 10, wherein the first party system further comprises a first biometric identification and verification device, the first biometric identification and verification device acquiring the biometric information of the intended licensee and conveying the biometric information of the intended licensee to the biometric database.
17. The secure licensing system according to claim 10, wherein said second party includes a plurality people.
18. A system protecting a licensed product comprising:
a licensed product owned by a first party and having an intended licensee, the licensed product including a biometric database storing a biometric information of the intended licensee; and
a second party system including a first biometric identification and verification device;
wherein the licensed product is configured to be selectively conveyed to the second party system, wherein when the licensed product is received at the second party system the second party system is connected to the biometric database, wherein the biometric identification and verification device of the second party system acquires a biometric information of a recipient of the licensed product, and wherein the second party system allows the recipient to use the licensed product when the biometric identification and verification device verifies that the biometric information of the recipient matches the biometric information of the intended licensee.
19. The secure licensing system according to claim 18 further comprising a second biometric identification and verification device, the second biometric identification and verification device acquiring the biometric information of the intended licensee and storing the biometric information of the intended licensee in the biometric database.
20. The secure licensing system according to claim 19, wherein said second party includes a plurality people.
US11/774,364 2007-06-12 2007-07-06 Secure licensing system Abandoned US20080313086A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/774,364 US20080313086A1 (en) 2007-06-12 2007-07-06 Secure licensing system

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/761,797 US8046590B2 (en) 2007-06-12 2007-06-12 System and method for protection of creative works
US11/764,932 US20080309794A1 (en) 2007-06-12 2007-06-19 Digital camera for protection of creative works
US11/774,364 US20080313086A1 (en) 2007-06-12 2007-07-06 Secure licensing system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/764,932 Continuation US20080309794A1 (en) 2007-06-12 2007-06-19 Digital camera for protection of creative works

Publications (1)

Publication Number Publication Date
US20080313086A1 true US20080313086A1 (en) 2008-12-18

Family

ID=40131922

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/761,797 Active 2030-02-21 US8046590B2 (en) 2007-06-12 2007-06-12 System and method for protection of creative works
US11/764,932 Abandoned US20080309794A1 (en) 2007-06-12 2007-06-19 Digital camera for protection of creative works
US11/774,364 Abandoned US20080313086A1 (en) 2007-06-12 2007-07-06 Secure licensing system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/761,797 Active 2030-02-21 US8046590B2 (en) 2007-06-12 2007-06-12 System and method for protection of creative works
US11/764,932 Abandoned US20080309794A1 (en) 2007-06-12 2007-06-19 Digital camera for protection of creative works

Country Status (1)

Country Link
US (3) US8046590B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120123916A1 (en) * 2010-11-11 2012-05-17 Sony Corporation Coordinating license activation of licensable audio video (av) device components between contract manufacturer and brand manufacturer
US20130173466A1 (en) * 2011-12-28 2013-07-04 Nokia Corporation Method and apparatus for utilizing recognition data in conducting transactions
US10885155B2 (en) 2016-06-15 2021-01-05 Shimadzu Corporation Software license management system and management method
US11423122B2 (en) * 2016-06-15 2022-08-23 Shimadzu Corporation Software license management system and management method

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101377760B (en) * 2007-08-30 2010-06-02 佛山普立华科技有限公司 System and method for protecting image file
CN101415075A (en) * 2007-10-16 2009-04-22 佛山普立华科技有限公司 Digital camera with fingerprint identification function and use method thereof
KR100973327B1 (en) * 2008-07-30 2010-07-30 한국전자통신연구원 Apparatus for protecting image
JP5424788B2 (en) * 2009-09-16 2014-02-26 株式会社日立ソリューションズ Biometric information creation method, authentication method and apparatus used in biometric authentication device
JP5316387B2 (en) * 2009-12-04 2013-10-16 ソニー株式会社 Information processing apparatus, display method, and program
US9313200B2 (en) * 2013-05-13 2016-04-12 Hoyos Labs Ip, Ltd. System and method for determining liveness
KR101442539B1 (en) * 2013-12-31 2014-09-26 권용구 Storage system having security storage device and managing method thereof
KR20200100481A (en) * 2019-02-18 2020-08-26 삼성전자주식회사 Electronic device for authenticating biometric information and operating method thereof
US12003506B2 (en) * 2020-10-07 2024-06-04 Arris Enterprises Llc Biometrics based access controls for network features

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030097655A1 (en) * 2001-11-21 2003-05-22 Novak Robert E. System and method for providing conditional access to digital content
US20070208952A1 (en) * 2005-11-29 2007-09-06 Nation Ron L System And Method For Data Source Authentication And Protection System Using Biometrics For Openly Exchanged Computer Files

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424249B1 (en) * 1995-05-08 2002-07-23 Image Data, Llc Positive identity verification system and method including biometric user authentication
US6433818B1 (en) * 1998-11-06 2002-08-13 Fotonation, Inc. Digital camera with biometric security
US6505193B1 (en) * 1999-12-01 2003-01-07 Iridian Technologies, Inc. System and method of fast biometric database searching using digital certificates
JP2001297269A (en) * 2000-04-13 2001-10-26 Nec Corp Identifying method, method and system for article delivery, and machine-readable recording medium with recorded program
US7043048B1 (en) * 2000-06-01 2006-05-09 Digimarc Corporation Capturing and encoding unique user attributes in media signals
US7047418B1 (en) * 2000-11-29 2006-05-16 Applied Minds, Inc. Imaging method and device using biometric information for operator authentication
US6930707B2 (en) * 2000-12-22 2005-08-16 International Business Machines Corporation Digital camera apparatus with biometric capability
JP3586431B2 (en) * 2001-02-28 2004-11-10 松下電器産業株式会社 Personal authentication method and device
US6771901B2 (en) * 2001-10-31 2004-08-03 Hewlett-Packard Development Company, L.P. Camera with user identification
US20040073453A1 (en) * 2002-01-10 2004-04-15 Nenov Valeriy I. Method and system for dispensing communication devices to provide access to patient-related information
JP4174244B2 (en) * 2002-06-20 2008-10-29 キヤノン株式会社 Image capturing apparatus and control method thereof
US7334130B2 (en) * 2002-07-19 2008-02-19 Bowers Charles R Method and apparatus for managing confidential information
US7979698B2 (en) * 2003-02-19 2011-07-12 Hewlett-Packard Development Company, L.P. Apparatus and method for proving authenticity with personal characteristics
US20060104483A1 (en) * 2004-11-12 2006-05-18 Eastman Kodak Company Wireless digital image capture device with biometric readers

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030097655A1 (en) * 2001-11-21 2003-05-22 Novak Robert E. System and method for providing conditional access to digital content
US20070208952A1 (en) * 2005-11-29 2007-09-06 Nation Ron L System And Method For Data Source Authentication And Protection System Using Biometrics For Openly Exchanged Computer Files

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9691071B2 (en) 2010-11-11 2017-06-27 Sony Corporation Activating licensable component using aggregating device in home network
US8589305B2 (en) 2010-11-11 2013-11-19 Sony Corporation Tracking activation of licensable component in audio video device by unique product identification
US8401935B2 (en) * 2010-11-11 2013-03-19 Sony Corporation Coordinating license activation of licensable audio video (AV) device components between contract manufacturer and brand manufacturer
US10528954B2 (en) 2010-11-11 2020-01-07 Sony Corporation Tracking activation of licensable component in audio video device by unique product identification
US8544111B2 (en) 2010-11-11 2013-09-24 Sony Corporation Activating licensable component provided by third party to audio video device
US8543513B2 (en) 2010-11-11 2013-09-24 Sony Corporation Tracking details of activation of licensable component of consumer electronic device
US8396748B2 (en) 2010-11-11 2013-03-12 Sony Corporation Activating licensable component of consumer electronic device at point of sale
US9449324B2 (en) 2010-11-11 2016-09-20 Sony Corporation Reducing TV licensing costs
US10049366B2 (en) 2010-11-11 2018-08-14 Sony Corporation Tracking details of activation of licensable component of consumer electronic device
US20120123916A1 (en) * 2010-11-11 2012-05-17 Sony Corporation Coordinating license activation of licensable audio video (av) device components between contract manufacturer and brand manufacturer
US8762276B2 (en) * 2011-12-28 2014-06-24 Nokia Corporation Method and apparatus for utilizing recognition data in conducting transactions
US20130173466A1 (en) * 2011-12-28 2013-07-04 Nokia Corporation Method and apparatus for utilizing recognition data in conducting transactions
US10885155B2 (en) 2016-06-15 2021-01-05 Shimadzu Corporation Software license management system and management method
US11423122B2 (en) * 2016-06-15 2022-08-23 Shimadzu Corporation Software license management system and management method

Also Published As

Publication number Publication date
US8046590B2 (en) 2011-10-25
US20080313718A1 (en) 2008-12-18
US20080309794A1 (en) 2008-12-18

Similar Documents

Publication Publication Date Title
US8046590B2 (en) System and method for protection of creative works
EP1381993B2 (en) Method and apparatus for establishing usage rights for digital content to be created in the future
EP2260424B1 (en) Digital rights management of streaming captured content based on criteria regulating a sequence of elements
US8850594B2 (en) Digital rights management of captured content based on capture associated locations
US6122737A (en) Method for using fingerprints to distribute information over a network
US20040073803A1 (en) Digital rights management apparatus , methods and multimedia products using biometric data
US20140222695A1 (en) Integrated authentication system using electronic contract
AU2002303732A1 (en) Method and System for Creating a Digital Work
US20050144134A1 (en) Data handling method
JP2002519911A (en) Secure storage device for digital camera data transfer
US12019770B2 (en) Secure content augmentation systems and methods
TW201011659A (en) System, device and method for securing a device component
US20030225863A1 (en) Data distribution system
JP2011170544A (en) Software distribution method, installation method, information processing apparatus, and software distribution system
EP1465380A1 (en) Device which executes authentication processing by using offline information, and device authentication method
US12047511B2 (en) Information processing system and information processing method
Corcoran et al. Techniques for securing multimedia content in consumer electronic appliances using biometric signatures
US12069060B2 (en) Remote registration of a data storage device with biometric authentication
EP1602999B1 (en) Data reproduction method
JP4080700B2 (en) Data operation method and apparatus
JP2005174262A (en) Client authentication method for transmitting data and receiving service and its system and apparatus
JP2003162451A (en) Data copy management method, data copy management system, and data processing device

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION