US20140298488A1 - Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents - Google Patents

Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents Download PDF

Info

Publication number
US20140298488A1
US20140298488A1 US13/853,928 US201313853928A US2014298488A1 US 20140298488 A1 US20140298488 A1 US 20140298488A1 US 201313853928 A US201313853928 A US 201313853928A US 2014298488 A1 US2014298488 A1 US 2014298488A1
Authority
US
United States
Prior art keywords
document
metadata
rights
drm
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/853,928
Inventor
Daniel Barber
David ASAO
Rabindra Pathak
William Chang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Konica Minolta Laboratory USA Inc
Original Assignee
Konica Minolta Laboratory USA Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Konica Minolta Laboratory USA Inc filed Critical Konica Minolta Laboratory USA Inc
Priority to US13/853,928 priority Critical patent/US20140298488A1/en
Assigned to KONICA MINOLTA LABORATORY U.S.A., INC. reassignment KONICA MINOLTA LABORATORY U.S.A., INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Asao, David, BARBER, DANIEL, CHANG, WILLIAM, PATHAK, RABINDRA
Publication of US20140298488A1 publication Critical patent/US20140298488A1/en
Priority to US14/828,426 priority patent/US9600639B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • This invention relates to a method for digital rights management (DRM) of electronic digital documents, and in particular, it relates to a method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM protected contents.
  • DRM digital rights management
  • DRM are increasingly applied and used to control the access and prevent unauthorized use of documents generated, distributed and accessed electronically in digital file formats such as the Portable Document Format (PDF).
  • PDF Portable Document Format
  • a policy is added to the document which specifies the rights purchased by or granted to the user, such as the rights to view, copy and/or print the document.
  • the RMS will maintain a database of the document identification (ID) and the associated policy which contains the ID of the user and the rights purchased by or granted to the user.
  • ID document identification
  • the user may access and view the document on the user's computer through a reader program/application such as, for example, the Adobe® Reader application.
  • the RMS will typically install and run on its server a DRM program/application, for example Adobe®'s LifeCycle® application.
  • a DRM program/application for example Adobe®'s LifeCycle® application.
  • the Adobe® Reader When a user attempts to access and view a PDF document on the user's computer, the Adobe® Reader will communicate with the Adobe® LifeCycle® application on the RMS server and transmits the document ID and the user ID to the Adobe® LifeCycle®.
  • the Adobe® LifeCycle® will check through the RMS database and see what policy is associated with the document and under such policy what rights have been purchased by or granted to the user. If the user has the necessary rights, then the user access to the PDF document will be granted. Otherwise the user access will be denied or revoked.
  • Embodiments of the present invention provide a method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM protected contents.
  • one of the exemplary embodiments of the present invention provides a method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document.
  • DRM digital rights management
  • another one of the exemplary embodiments of the present invention provides a computer software program product that causes a data processing apparatus to perform the above described methods.
  • the computer program product includes a computer usable non-transitory medium (e.g. memory or storage device) having a computer readable program code embedded therein for controlling a data processing apparatus, the computer readable program code configured to cause the data processing apparatus to execute the above described processes.
  • FIG. 1 is a schematic block diagram illustrating an exemplary online environment according to one of the embodiments of the present invention.
  • FIG. 2 is a schematic block diagram illustrating an exemplary data processing apparatus such as a computer or server having a data processing unit according to one of the embodiments of the present invention.
  • FIG. 3 is a flow chart diagram illustrating an exemplary process according to one of the embodiments of the present invention.
  • an exemplary embodiment of the present invention provides method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM-protected documents and their respectively associated rights management policies.
  • FIG. 1 there is shown a schematic block diagram illustrating an exemplary arrangement 10 in which various embodiments of the present invention may be implemented.
  • the exemplary environment 10 includes a customer or user computer or terminal 20 which may be remotely connected to a rights management system (RMS) server 30 via a network 40 .
  • the network 40 may include a computer network such as the Internet or other communication links.
  • a learning management system (LMS) server 50 and a rights owners' center (ROC) server 60 are Also connected to the network 40 .
  • the RMS server 30 , the LMS server 50 and/or the ROC server 60 may be a content provider server as well as a DRM server.
  • a customer or user may use the user computer or terminal 20 , or similar suitable devices such as a laptop computer, a tablet computer, an e-reader, or a smart phone, etc., to access the network 40 and interact with the RMS server 30 and/or the LMS server 50 , etc.
  • suitable devices such as a laptop computer, a tablet computer, an e-reader, or a smart phone, etc.
  • An administrator or operator may operate the RMS server 30 to access the network 40 and interact with the customer or user through the user computer or terminal 20 , and also interact with the LMS server 50 and/or the ROC server 60 .
  • an administrator or operator may operate the LMS server 50 to access the network 40 and interact with the customer or user through the user computer or terminal 20 , and also interact with the RMS server 30 and/or the ROC server 60 .
  • an administrator or operator may operate the ROC server 60 to access the network 40 and interact with the customer or user through the user computer or terminal 20 , and also interact with the RMS server 30 and/or the LMS server 50 .
  • the RMS server 30 may be operated by, for example, a DRM center or service provider, an educational institution, a print shop, etc., and generally provides online DRM services to users who wish to access DRM-protected documents such as articles, books, booklets, publications and other materials in digital formats.
  • the RMS server 30 may provide an integrated online service platform such as an online authentication and authorization center that processes users' requests to access DRM-protected documents.
  • the RMS server 30 has a storage 32 which may be an internal or external storage device for storing a DRM-protected documents depository 34 and a DRM database 36 .
  • the digital files of electronic documents may be provided by the LMS server 50 , as indicated by the dotted arrow A in FIG. 1 .
  • the RMS server 30 may enable appropriate DRM protection to the document such that only the user who has purchased the document may have rights to access and view the document.
  • a policy containing the user ID and the user's rights is added to the document which also has a globally unique ID (GUID) to enable DRM-protection to the document.
  • GUID globally unique ID
  • the DRM-protected documents are stored in file depository 34 and their associated policies may be found in DRM database 36 .
  • a customer or user who has purchased or otherwise granted rights to a DRM-protected document may download a digital copy of the DRM-protected document from the DRM-protected document depository 34 to the customer or user's computer 20 , as indicated by the dotted arrow B in FIG. 1 .
  • the RMS server 30 subsequently receives a customer or user request (which contains the GUID of the document and the ID of the customer or user) for accessing a DRM-protected document, as indicated by the dotted arrow C 1 in FIG.
  • the RMS server 30 will search through the DRM database 36 by looking up the document GUID or the user ID, and check what policy is associated with the document and/or user, in order to determine whether the requesting customer or user has the appropriate rights to access the document. Based on the result of the determination, the RMS responds to the customer or user's request by either granting or denying the requested access to the document, as indicated by the dotted arrow C 2 in FIG. 1 .
  • the LMS server 50 may be operated by, for example, an educational institution, a library, a bookstore, or any digital content providers, etc., and generally provides online electronic documents, books, booklets, publications and other materials in digital files.
  • the LMS server 50 and the RMS 30 server may be the same server (operated by a same entity).
  • the LMS server 50 may provide an integrated online service platform such as an online course or web-store that allows customers or users to search, access, upload or download, and purchase electronic documents stored as digital files in its internal or the external storage 52 .
  • the ROC server 60 may be operated by a rights owners' center or service provider, and generally provides a database or information source of documents owners' rights (such as copyrights). Such information may be provided in the form of metadata associated with digital documents.
  • the metadata associated with a course book may include: title, author, publisher, International Standard Book Number (ISBN), copyrights royalty, price, etc.
  • the metadata contains the course book owner's wishes on how the course book may be used and/or distributed.
  • the ROC server 60 has an internal or external storage for storing a metadata database 62 .
  • the rights information contained in the metadata may be very useful for establishing and/or maintaining the policies respectively associated with the DRM-protected documents.
  • the ROC server 60 may provide the metadata to the RMS server 30 , or the RMS server 30 may retrieve such metadata from the ROC server 60 , as indicated by the dotted arrow D in FIG. 1 .
  • the RMS server 30 can use the metadata to generate and/or update the policies associated with the DRM-protected documents.
  • some embodiments of the present invention provide a method for automatically interpret of digital documents and their owners rights metadata to generate and/or update the policies respectively associated with DRM-protected documents.
  • the computers, terminals and servers 20 , 30 , 50 and 60 used by the customers or users, and/or the administrators or operators of the RMS, LMS and/ ROC services may be computers, server computers, or computer or server systems, such as webservers, where the computer software program(s) and/or application(s) implementing the various processes of the exemplary embodiments of the present invention may be installed and executed.
  • these computers and servers provide a user interface (UI) or graphic user interface (GUI) to allow users or operators to interact with the computer software programs and applications to perform various steps of the process.
  • UI user interface
  • GUI graphic user interface
  • server generally refers to any computer, server, server computer, server instance, computer or server system, data processor, controller, data processing unit or apparatus, or any suitable system, apparatus or device, and any computer software program or application that are installed or executed on such system, apparatus or device, that may be used to implement the methods or carry out the processes provided by the embodiments of the present invention.
  • a user or operator typically accesses the computers and server by using computer programs or applications on the users' own computer or on a server that the user can access through a user computer or terminal.
  • the term “user” generally refers to anyone who uses the method or related apparatus provided by the embodiments of the present invention.
  • the terms “user” and the server used by the user may be used interchangeably respectively to refer to such person or entity who uses a server and/or a server that is used by such person or entity to carry out the steps of the process according to the various embodiments of the present invention.
  • the RMS server 30 may be located in a print shop or a commercial establishment, and the LMS server 50 may be all located in an educational institution or an organization.
  • the ROC server 60 and the LMS server 50 may be integrated as one server, or the ROC metadata database 62 may be maintained by or associated with the LMS server 50 .
  • the exemplary embodiment of the present invention is embodied a computer program product that causes a data processing apparatus to perform the exemplary embodiments of the methods of the present invention.
  • the computer program product includes a computer usable non-transitory medium (e.g. memory or storage device) having a computer readable program code embedded therein for controlling a data processing apparatus, where the computer readable program code is configured to cause the data processing apparatus to execute the process of the present invention as shown in FIG. 2 .
  • the server 100 typically includes a user input device 110 including, for example, a keyboard and a mouse.
  • the input device 110 may be connected to the server 100 through a local input/output (I/O) port 120 to enable an operator and/or user to interact with the server 110 .
  • the local I/O 120 is also provided for local connections via direct links to other electronic devices such as a file storage, a monitor and/or a printer.
  • the server 100 typically also has a network I/O port 130 for connection to a computer network such as the Internet, so that the server 100 may remotely communicate with the other servers connected to the computer network.
  • the server 100 typically has a data processor/controller unit 140 such as a central processor unit (CPU) that controls the functions and operations of the server 100 .
  • the data processor/controller unit 140 is connected to various memory devices such as a random access memory (RAM) device 150 , a read only memory (ROM) device 160 , and a storage device 170 such as a hard disc drive or solid state memory.
  • RAM random access memory
  • ROM read only memory
  • storage device 170 such as a hard disc drive or solid state memory.
  • the storage device 170 may be an internal memory device or an external memory device such as a file storage device.
  • the computer software program codes and instructions for implementing the various embodiments of the present invention may be installed or saved on one or more of these memory devices such as the ROM 160 or storage device 170 .
  • certain computer program codes and/or instructions may be read out from the ROM 160 or storage device 170 and temporarily stored in the RAM 150 for execution by the data processor/controller unit 140 , which executes these computer programs codes and/or instructions to perform the functions and carry out the operations to implement the process steps of the various embodiments of the present invention.
  • the server 100 typically also includes a display device 180 such as a video monitor or display screen which may be connected to the local I/O 120 .
  • the input device 110 and the display device 180 together provide a user interface which allows a user to interact with the server 100 to perform the steps of the process according to the various embodiments of the present invention.
  • the input device 110 and the display device 180 may be integrated into one unit, such as a touch screen display unit, to provide a more easy and convenient UI for user interaction with the server 100 .
  • the server 100 may be any suitable computer or computer system.
  • the server 100 is a commercial server.
  • the server 100 may be a desktop computer, a laptop computer, a notebook computer, a netbook computer, a tablet computer, a hand-held portable computer or electronic device, a smart phone, or any suitable data processing apparatus that has suitable data processing capabilities.
  • FIG. 3 (and in conjunction with FIG. 1 ), there is shown a flow chart diagram illustrating an exemplary process in accordance with to one of the embodiments of the present invention for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM-protected documents and their associated rights management policies.
  • step S 10 the RMS server 30 obtains a digital document from the LMS server 50 (as indicated by the dotted arrow A in FIG. 1 ), as well as metadata associated with such document from the ROC server 60 (as indicated by the dotted arrow D in FIG. 1 ).
  • This step may include a sub-step S 12 where the digital document is transmitted from the LMS server 50 to the RMS server 30 , either by the LMS server 50 providing the document to the RMS server 30 or by the RMS server 30 retrieving from the LMS server 50 , and also a sub-step S 14 where metadata of the digital document is transmitted from the ROC server 60 to the RMS server 30 , either by the ROC server 60 providing the metadata of the document to the RMS server 30 or by the RMS server 30 retrieving from the ROC server 60 . It is understood that the digital document and its metadata may be obtained or retrieved from the same server, such as the LMS server 50 or the ROC server 60 , alone.
  • the digital document may be downloaded to the RMS server 30 from the file storage 52 of the LMS server, or uploaded by a user from the user computer 20 to the RMS server 30 , or otherwise retrieved from a third party server (not shown), e.g., by following a Universal Resource Locater (URL) provided by the user or the RMS service.
  • a digital course book pack or booklet is to be generated from the compilation of several digital files, these digital files may be gathered from various sources.
  • the RMS server needs to search in and retrieve the metadata associated with the digital document from the metadata database 62 of the ROC server 60 .
  • the digital document comes with certain metadata (e.g., title, author, publisher, ISBN, etc.) which have already been associated with the digital document, but oftentimes additional metadata (e.g., copyrights owners, royalty and pricing information) may still need to be obtained from the ROC server 60 .
  • each policy may include a document GUID which may be generated from relevant metadata (such as title, author, publisher, ISBN, etc.) of the document.
  • the metadata is used to provide information needed for the policy database which often requires specific data format, so part of the interpretation step S 20 is to convert the information obtained from the metadata into data items that can be saved and used for the policy database.
  • Another example of the metadata interpretation is that if the metadata indicates that a copyrights royalty is paid for printing (e.g., reproducing in hardcopies) a document, then it may be interpreted as the print right of the document is granted by its owner, so the policies associated with the document may include right to print the document.
  • the interpretation process may add further enhancement or limitation to the DRM application based on certain particular rights contained in the metadata.
  • the metadata may contain calendar or scheduler based right, such as a document of a course material may be viewed on every Tuesday (because, e.g., the course is offered on every Tuesday).
  • the DRM application or its policy formats may not readily have the ability to define or limit the right in that manner, as the DRM application may only allow an input of a start time and an end time once (between which the right may be effective). In such situations the interpretation process according to the embodiments of the present invention may offer a solution by adding/removing the view right to the course document repeatedly on a weekly basis.
  • the view right to the document may be added at midnight Monday night, and revoked at midnight Tuesday night, and then added back at midnight next Monday night, and revoked again at midnight next Tuesday night, and so on.
  • the RMS server 30 generates an adding/removing schedule of view right based on the calendar/scheduled based right, and stores the generated schedule as a file or an entry of a file in a storage area, which can be an area separately managed from the DRM database 36 .
  • the RMS server 30 may monitor the stored schedule to manipulate the DRM policy of the document stored in the database 30 in later, in accordance with the software module of the interpretation process or a separate software module installed in the RMS server 30 .
  • DRM policies for the document are generated at step S 30 .
  • Each policy may include, for example, certain digital rights to access and use a document, e.g., view, copy or print the document.
  • each policy is associated with a document and users, and the users and the document may also be cross-associated.
  • a document GUID may be associated with a policy ID and a user ID allowing the user to view the document, or a user ID may be associated with a document GUID and another policy ID allowing the user to view and print the document, or still another policy ID may be associated with a document GUID and a user ID allowing the user to view and copy the document.
  • step S 30 it may be necessary to obtain additional copyrights information or metadata from the ROC server 60 .
  • copyrights information e.g., permission, royalty, etc.
  • additional copyrights information or metadata may be provided by or retrieved from the ROC server 60 . This will ensure that the compiled booklet is also copyrights protected.
  • DRM-protection to the digital document is enabled, which means that the digital document stored in file depository 34 of the RMS server 30 are now associated with respective DRM policy IDs and user IDs, which are stored, for example, in the DRM database 36 of the RMS server 30 . In a sense this also means that a DRM-protected document has been generated from the originally unprotected digital document.
  • the DRM-protected document is ready for purchase by users at step S 40 . When a user purchases or otherwise obtains rights to the DRM-protected document, it may be downloaded to the user's computer and stored in a memory or storage device of the user computer 20 at step S 42 .
  • the user When the user subsequently needs to access the DRM-protected document, the user typically tries to open the DRM-protected document by using a reader application software program installed on and executed by the user's computer 20 .
  • a reader application software program installed on and executed by the user's computer 20 .
  • the reader application may be the Adobe® Reader program.
  • the reader application will initiate communication with a DRM application software program installed on and executed at the RMS server.
  • the DRM application may be the Adobe® LifeCycle® program.
  • step S 50 the user computer 20 sends an access request to RMS server 30 for approval (as indicated by the dotted arrow C 1 in FIG. 1 ).
  • the request transmitted from the user computer 20 to RMS server 30 will provide the document GUID and the user ID.
  • the RMS server 30 receives the request at step S 52 , it will search its DRM database 36 at step S 54 to check whether the user has the necessary rights to the DRM-protected document. The search may look up the document GUID in the database and find its associated policy ID and user ID, or may look up the user ID to find its associated document GUID and policy ID.
  • a determination of the user's rights to the DRM-protected document can be made at step S 56 . For example, if no user ID is found to be associated with the document GUID, then it can be determined that the user does not have any right to access and use the DRM-protected document. If the user ID is found to be associated with the document GUID, and a policy containing the rights to view and print the document is also found to be associated with the document GUID, then it can be determined that the user has rights to view and print the DRM-protected document.
  • step S 60 the RMS server 30 transmits the result of this determination to the user computer 20 (as indicated by the dotted arrow C 2 in FIG. 1 ).
  • step S 62 the user can access the DRM-protected document if the user's request is granted. For example, if the user is determined to have rights to view and print the DRM-protected document, then the reader program on the user computer 20 will open the DRM-protected document for the user to view, and will also allow the user to print the DRM-protected document when the user desires.
  • the reader program on the user computer 20 will not open the DRM-protected document, but rather may inform the user that the request is denied and may further inform the user what steps may be taken to purchase or otherwise obtain rights to the DRM-protected document.
  • additional information may be generated.
  • additional data items or information may be created as a result of the compilation process.
  • additional data items or information may include: course booklet cover information (e.g., title, compiler, year/semester in use, etc.), course booklet compiler information (e.g., login/registration username, password, contact information, etc.), LMS information (e.g., course name, serial/sequential number, institution/department), distribution information (e.g., print, e-distribution, delivery rights/channel based on institution, etc.), granted rights information (e.g., data of the users who have purchased rights to the booklet, such as login/registration username, password, contact information, etc.).
  • course booklet cover information e.g., title, compiler, year/semester in use, etc.
  • course booklet compiler information e.g., login/registration username, password, contact information, etc.
  • LMS information e.g., course name, serial/sequential number, institution/
  • Such data/information may be needed by the rights owners for their records and operation. So at step S 70 the RMS server 30 transmits the newly generated data/information to the ROC server 60 , and at step S 72 the ROC server may use the data/information to update its metadata database 62 .
  • the dotted boxes in FIG. 3 indicate typically what steps are performed by or at which system.
  • the dotted box on the middle indicates that steps S 10 , S 20 , S 30 , S 40 , S 52 , S 54 , S 56 , S 60 and S 70 are typically performed by the RMS server 30
  • the dotted box on the upper left indicates that step S 12 is typically performed by the LMS server 50
  • the dotted box on the lower left indicates that steps S 42 , S 50 and S 62 are typically performed by the user computer 20
  • the dotted box on the right indicates that Steps S 14 , S 32 and S 72 are typically performed by the ROC server 60 .
  • alternative arrangement may be utilized to perform these steps.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • This invention relates to a method for digital rights management (DRM) of electronic digital documents, and in particular, it relates to a method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM protected contents.
  • 2. Description of Related Art
  • DRM are increasingly applied and used to control the access and prevent unauthorized use of documents generated, distributed and accessed electronically in digital file formats such as the Portable Document Format (PDF). For example, when a user purchases a DRM-protected document from a rights management system (RMS), a policy is added to the document which specifies the rights purchased by or granted to the user, such as the rights to view, copy and/or print the document. The RMS will maintain a database of the document identification (ID) and the associated policy which contains the ID of the user and the rights purchased by or granted to the user. After the user downloads the documents as, e.g., a PDF file, the user may access and view the document on the user's computer through a reader program/application such as, for example, the Adobe® Reader application.
  • In order to manage user access to DRM-protected documents, the RMS will typically install and run on its server a DRM program/application, for example Adobe®'s LifeCycle® application. When a user attempts to access and view a PDF document on the user's computer, the Adobe® Reader will communicate with the Adobe® LifeCycle® application on the RMS server and transmits the document ID and the user ID to the Adobe® LifeCycle®. The Adobe® LifeCycle® will check through the RMS database and see what policy is associated with the document and under such policy what rights have been purchased by or granted to the user. If the user has the necessary rights, then the user access to the PDF document will be granted. Otherwise the user access will be denied or revoked.
  • The description herein of the structures, functions, interfaces and other relevant features, such as digital rights policies, application programming interface (API) for rights management and policies, etc., of existing DRM applications, such as the Adobe® LifeCycle®, may at times incorporates, references or otherwise uses certain information, documents and materials from readily available and accessible public information, e.g., “Rights Management” (URL http://help.adobe.com/en_US/livecycle/10.0/Overview/WS92d06802c76abadb2c8525912ddcb9a ad9-7ff8.html), “Programmatically applying policies” (URL http://help.adobe.com/en_US/livecycle/10.0/Overview/WSb96e41f8a4ca47a9-4882aeb5131190eddba-8000.html), “LiveCycle® ES Java™ API Reference” (URL http://livedocs.adobe.com/livecycle/es/sdkHelp/programmer/javadoc/index.html), etc.
  • In addition, there are existing service centers for rights owners of digital contents that maintain databases of metadata associated with digital documents, containing rights information related to the rights owners' wishes on how the respective digital documents are used and distributed, etc., which are closely related to and useful for establishing and maintaining the policies associated with such documents.
  • There is a need to provide a method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM protected contents.
  • SUMMARY
  • Embodiments of the present invention provide a method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM protected contents.
  • Additional features and advantages of the invention will be set forth in the descriptions that follow and in part will be apparent from the description, or may be learned by practice of the invention.
  • The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
  • To achieve these and/or other objects, as embodied and broadly described, one of the exemplary embodiments of the present invention provides a method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document.
  • In a further aspect, another one of the exemplary embodiments of the present invention provides a computer software program product that causes a data processing apparatus to perform the above described methods. The computer program product includes a computer usable non-transitory medium (e.g. memory or storage device) having a computer readable program code embedded therein for controlling a data processing apparatus, the computer readable program code configured to cause the data processing apparatus to execute the above described processes.
  • It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic block diagram illustrating an exemplary online environment according to one of the embodiments of the present invention.
  • FIG. 2 is a schematic block diagram illustrating an exemplary data processing apparatus such as a computer or server having a data processing unit according to one of the embodiments of the present invention.
  • FIG. 3 is a flow chart diagram illustrating an exemplary process according to one of the embodiments of the present invention.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • In one aspect as summarized above, an exemplary embodiment of the present invention provides method for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM-protected documents and their respectively associated rights management policies.
  • Referring to FIG. 1, there is shown a schematic block diagram illustrating an exemplary arrangement 10 in which various embodiments of the present invention may be implemented. The exemplary environment 10 includes a customer or user computer or terminal 20 which may be remotely connected to a rights management system (RMS) server 30 via a network 40. The network 40 may include a computer network such as the Internet or other communication links.
  • Also connected to the network 40 are a learning management system (LMS) server 50 and a rights owners' center (ROC) server 60. The RMS server 30, the LMS server 50 and/or the ROC server 60 may be a content provider server as well as a DRM server.
  • When computer network such as the Internet is utilized, a customer or user may use the user computer or terminal 20, or similar suitable devices such as a laptop computer, a tablet computer, an e-reader, or a smart phone, etc., to access the network 40 and interact with the RMS server 30 and/or the LMS server 50, etc.
  • An administrator or operator may operate the RMS server 30 to access the network 40 and interact with the customer or user through the user computer or terminal 20, and also interact with the LMS server 50 and/or the ROC server 60. Likewise, an administrator or operator may operate the LMS server 50 to access the network 40 and interact with the customer or user through the user computer or terminal 20, and also interact with the RMS server 30 and/or the ROC server 60. In addition, an administrator or operator may operate the ROC server 60 to access the network 40 and interact with the customer or user through the user computer or terminal 20, and also interact with the RMS server 30 and/or the LMS server 50.
  • The RMS server 30 may be operated by, for example, a DRM center or service provider, an educational institution, a print shop, etc., and generally provides online DRM services to users who wish to access DRM-protected documents such as articles, books, booklets, publications and other materials in digital formats. The RMS server 30 may provide an integrated online service platform such as an online authentication and authorization center that processes users' requests to access DRM-protected documents. The RMS server 30 has a storage 32 which may be an internal or external storage device for storing a DRM-protected documents depository 34 and a DRM database 36.
  • The digital files of electronic documents may be provided by the LMS server 50, as indicated by the dotted arrow A in FIG. 1. When an electronic document is purchased by a customer or user in a digital file, the RMS server 30 may enable appropriate DRM protection to the document such that only the user who has purchased the document may have rights to access and view the document. A policy containing the user ID and the user's rights is added to the document which also has a globally unique ID (GUID) to enable DRM-protection to the document. The DRM-protected documents are stored in file depository 34 and their associated policies may be found in DRM database 36. A customer or user who has purchased or otherwise granted rights to a DRM-protected document may download a digital copy of the DRM-protected document from the DRM-protected document depository 34 to the customer or user's computer 20, as indicated by the dotted arrow B in FIG. 1. When the RMS server 30 subsequently receives a customer or user request (which contains the GUID of the document and the ID of the customer or user) for accessing a DRM-protected document, as indicated by the dotted arrow C1 in FIG. 1, the RMS server 30 will search through the DRM database 36 by looking up the document GUID or the user ID, and check what policy is associated with the document and/or user, in order to determine whether the requesting customer or user has the appropriate rights to access the document. Based on the result of the determination, the RMS responds to the customer or user's request by either granting or denying the requested access to the document, as indicated by the dotted arrow C2 in FIG. 1.
  • The LMS server 50 may be operated by, for example, an educational institution, a library, a bookstore, or any digital content providers, etc., and generally provides online electronic documents, books, booklets, publications and other materials in digital files. The LMS server 50 and the RMS 30 server may be the same server (operated by a same entity). The LMS server 50 may provide an integrated online service platform such as an online course or web-store that allows customers or users to search, access, upload or download, and purchase electronic documents stored as digital files in its internal or the external storage 52.
  • The ROC server 60 may be operated by a rights owners' center or service provider, and generally provides a database or information source of documents owners' rights (such as copyrights). Such information may be provided in the form of metadata associated with digital documents. For example, the metadata associated with a course book may include: title, author, publisher, International Standard Book Number (ISBN), copyrights royalty, price, etc. In a sense, the metadata contains the course book owner's wishes on how the course book may be used and/or distributed. The ROC server 60 has an internal or external storage for storing a metadata database 62.
  • The rights information contained in the metadata may be very useful for establishing and/or maintaining the policies respectively associated with the DRM-protected documents. The ROC server 60 may provide the metadata to the RMS server 30, or the RMS server 30 may retrieve such metadata from the ROC server 60, as indicated by the dotted arrow D in FIG. 1. The RMS server 30 can use the metadata to generate and/or update the policies associated with the DRM-protected documents. As will be described in more detail below, some embodiments of the present invention provide a method for automatically interpret of digital documents and their owners rights metadata to generate and/or update the policies respectively associated with DRM-protected documents.
  • The computers, terminals and servers 20, 30, 50 and 60 used by the customers or users, and/or the administrators or operators of the RMS, LMS and/ ROC services, may be computers, server computers, or computer or server systems, such as webservers, where the computer software program(s) and/or application(s) implementing the various processes of the exemplary embodiments of the present invention may be installed and executed. Typically these computers and servers provide a user interface (UI) or graphic user interface (GUI) to allow users or operators to interact with the computer software programs and applications to perform various steps of the process. In this Application, unless otherwise specified, the term “server” generally refers to any computer, server, server computer, server instance, computer or server system, data processor, controller, data processing unit or apparatus, or any suitable system, apparatus or device, and any computer software program or application that are installed or executed on such system, apparatus or device, that may be used to implement the methods or carry out the processes provided by the embodiments of the present invention.
  • A user or operator typically accesses the computers and server by using computer programs or applications on the users' own computer or on a server that the user can access through a user computer or terminal. In this Application, unless otherwise specified, the term “user” generally refers to anyone who uses the method or related apparatus provided by the embodiments of the present invention. In addition, in this Application, unless otherwise specified, the terms “user” and the server used by the user may be used interchangeably respectively to refer to such person or entity who uses a server and/or a server that is used by such person or entity to carry out the steps of the process according to the various embodiments of the present invention.
  • The physical locations or the commercial relationship among the various parts of the environment shown in FIG. 1 are not important. For example, the RMS server 30 may be located in a print shop or a commercial establishment, and the LMS server 50 may be all located in an educational institution or an organization. Further, the ROC server 60 and the LMS server 50 may be integrated as one server, or the ROC metadata database 62 may be maintained by or associated with the LMS server 50.
  • In another aspect as mentioned earlier, the exemplary embodiment of the present invention is embodied a computer program product that causes a data processing apparatus to perform the exemplary embodiments of the methods of the present invention. The computer program product includes a computer usable non-transitory medium (e.g. memory or storage device) having a computer readable program code embedded therein for controlling a data processing apparatus, where the computer readable program code is configured to cause the data processing apparatus to execute the process of the present invention as shown in FIG. 2.
  • Referring to FIG. 2, there is shown a schematic block diagram illustrating an exemplary server 100, whereupon various embodiments of the present invention may be implemented. The server 100 typically includes a user input device 110 including, for example, a keyboard and a mouse. The input device 110 may be connected to the server 100 through a local input/output (I/O) port 120 to enable an operator and/or user to interact with the server 110. The local I/O 120 is also provided for local connections via direct links to other electronic devices such as a file storage, a monitor and/or a printer. The server 100 typically also has a network I/O port 130 for connection to a computer network such as the Internet, so that the server 100 may remotely communicate with the other servers connected to the computer network.
  • The server 100 typically has a data processor/controller unit 140 such as a central processor unit (CPU) that controls the functions and operations of the server 100. The data processor/controller unit 140 is connected to various memory devices such as a random access memory (RAM) device 150, a read only memory (ROM) device 160, and a storage device 170 such as a hard disc drive or solid state memory. The storage device 170 may be an internal memory device or an external memory device such as a file storage device.
  • The computer software program codes and instructions for implementing the various embodiments of the present invention may be installed or saved on one or more of these memory devices such as the ROM 160 or storage device 170. When executed, certain computer program codes and/or instructions may be read out from the ROM 160 or storage device 170 and temporarily stored in the RAM 150 for execution by the data processor/controller unit 140, which executes these computer programs codes and/or instructions to perform the functions and carry out the operations to implement the process steps of the various embodiments of the present invention.
  • The server 100 typically also includes a display device 180 such as a video monitor or display screen which may be connected to the local I/O 120. The input device 110 and the display device 180 together provide a user interface which allows a user to interact with the server 100 to perform the steps of the process according to the various embodiments of the present invention. The input device 110 and the display device 180 may be integrated into one unit, such as a touch screen display unit, to provide a more easy and convenient UI for user interaction with the server 100.
  • It is understood that the server 100 may be any suitable computer or computer system. Preferably for use, for example, as the RMS server 30, the LMS server 50 and the ROC server 60, the server 100 is a commercial server. However, for use by a customer or a member of the general public, the server 100 may be a desktop computer, a laptop computer, a notebook computer, a netbook computer, a tablet computer, a hand-held portable computer or electronic device, a smart phone, or any suitable data processing apparatus that has suitable data processing capabilities.
  • Referring to FIG. 3 (and in conjunction with FIG. 1), there is shown a flow chart diagram illustrating an exemplary process in accordance with to one of the embodiments of the present invention for automating the management and interpretation of digital documents and their owners rights metadata for generating DRM-protected documents and their associated rights management policies.
  • The process begins at step S10, wherein the RMS server 30 obtains a digital document from the LMS server 50 (as indicated by the dotted arrow A in FIG. 1), as well as metadata associated with such document from the ROC server 60 (as indicated by the dotted arrow D in FIG. 1). This step may include a sub-step S12 where the digital document is transmitted from the LMS server 50 to the RMS server 30, either by the LMS server 50 providing the document to the RMS server 30 or by the RMS server 30 retrieving from the LMS server 50, and also a sub-step S14 where metadata of the digital document is transmitted from the ROC server 60 to the RMS server 30, either by the ROC server 60 providing the metadata of the document to the RMS server 30 or by the RMS server 30 retrieving from the ROC server 60. It is understood that the digital document and its metadata may be obtained or retrieved from the same server, such as the LMS server 50 or the ROC server 60, alone.
  • The digital document may be downloaded to the RMS server 30 from the file storage 52 of the LMS server, or uploaded by a user from the user computer 20 to the RMS server 30, or otherwise retrieved from a third party server (not shown), e.g., by following a Universal Resource Locater (URL) provided by the user or the RMS service. For example, if a digital course book pack or booklet is to be generated from the compilation of several digital files, these digital files may be gathered from various sources.
  • The RMS server needs to search in and retrieve the metadata associated with the digital document from the metadata database 62 of the ROC server 60. Sometimes the digital document comes with certain metadata (e.g., title, author, publisher, ISBN, etc.) which have already been associated with the digital document, but oftentimes additional metadata (e.g., copyrights owners, royalty and pricing information) may still need to be obtained from the ROC server 60.
  • Once the RMS server 30 gathered the needed digital document and its associated metadata, at step S20 the metadata will be interpreted for generating DRM policies for the digital document at step S30. The interpretation of metadata is automated to yield a specific format of rights documents that the rights management system can then use to create specific rights for the document to be DRM-protected with the original intent of the author/creator/submitter of the document, some of them exemplified in the following descriptions. For example, each policy may include a document GUID which may be generated from relevant metadata (such as title, author, publisher, ISBN, etc.) of the document. As one of the examples of the metadata interpretation, the metadata is used to provide information needed for the policy database which often requires specific data format, so part of the interpretation step S20 is to convert the information obtained from the metadata into data items that can be saved and used for the policy database. Another example of the metadata interpretation is that if the metadata indicates that a copyrights royalty is paid for printing (e.g., reproducing in hardcopies) a document, then it may be interpreted as the print right of the document is granted by its owner, so the policies associated with the document may include right to print the document.
  • In addition, the interpretation process may add further enhancement or limitation to the DRM application based on certain particular rights contained in the metadata. For example, the metadata may contain calendar or scheduler based right, such as a document of a course material may be viewed on every Tuesday (because, e.g., the course is offered on every Tuesday). However, the DRM application or its policy formats may not readily have the ability to define or limit the right in that manner, as the DRM application may only allow an input of a start time and an end time once (between which the right may be effective). In such situations the interpretation process according to the embodiments of the present invention may offer a solution by adding/removing the view right to the course document repeatedly on a weekly basis. For example, the view right to the document may be added at midnight Monday night, and revoked at midnight Tuesday night, and then added back at midnight next Monday night, and revoked again at midnight next Tuesday night, and so on. In more detail, during the interpretation, the RMS server 30 generates an adding/removing schedule of view right based on the calendar/scheduled based right, and stores the generated schedule as a file or an entry of a file in a storage area, which can be an area separately managed from the DRM database 36. In one exemplary embodiment, the RMS server 30 may monitor the stored schedule to manipulate the DRM policy of the document stored in the database 30 in later, in accordance with the software module of the interpretation process or a separate software module installed in the RMS server 30.
  • Referring back to the interpretation process of FIG. 3, from the metadata interpreted at step S20, DRM policies for the document are generated at step S30. Each policy may include, for example, certain digital rights to access and use a document, e.g., view, copy or print the document. In the DRM database 36, each policy is associated with a document and users, and the users and the document may also be cross-associated. For example, in the DRM database, a document GUID may be associated with a policy ID and a user ID allowing the user to view the document, or a user ID may be associated with a document GUID and another policy ID allowing the user to view and print the document, or still another policy ID may be associated with a document GUID and a user ID allowing the user to view and copy the document.
  • In addition, at step S30 it may be necessary to obtain additional copyrights information or metadata from the ROC server 60. For example, once a course booklet is compiled from several individual articles, copyrights information (e.g., permission, royalty, etc.) may be needed for the compilation even though copyrights information for each of the individual articles has been obtained. If this is the case, then at step S32 additional copyrights information or metadata may be provided by or retrieved from the ROC server 60. This will ensure that the compiled booklet is also copyrights protected.
  • As a result of the above steps, DRM-protection to the digital document is enabled, which means that the digital document stored in file depository 34 of the RMS server 30 are now associated with respective DRM policy IDs and user IDs, which are stored, for example, in the DRM database 36 of the RMS server 30. In a sense this also means that a DRM-protected document has been generated from the originally unprotected digital document. The DRM-protected document is ready for purchase by users at step S40. When a user purchases or otherwise obtains rights to the DRM-protected document, it may be downloaded to the user's computer and stored in a memory or storage device of the user computer 20 at step S42.
  • When the user subsequently needs to access the DRM-protected document, the user typically tries to open the DRM-protected document by using a reader application software program installed on and executed by the user's computer 20. For example, if the DRM-protected document is in PDF, then the reader application may be the Adobe® Reader program. The reader application will initiate communication with a DRM application software program installed on and executed at the RMS server. For example, for documents in PDF, the DRM application may be the Adobe® LifeCycle® program. As mentioned earlier, the description and/or reference herein of the structures, functions, interfaces and other relevant features, such as DRM policies and API, of existing DRM applications such as Adobe® LifeCycle® are from readily available and accessible public information, documents and materials, e.g., “Rights Management” (URL http://help.adobe.com/en_US/livecycle/10.0/Overview/WS92d06802c76abadb2c8525912ddcb9a ad9-7ff8.html), “Programmatically applying policies” (URL http://help.adobe.com/en_US/livecycle/10.0/Overview/WSb96e41f8a4ca47a9-4882aeb5131190eddba-8000.html), “LiveCycle® ES Java™ API Reference” (URL http://livedocs.adobe.com/livecycle/es/sdkHelp/programmer/javadoc/index.html), etc.
  • Referring back to FIG. 3 (and in conjunction with FIG. 1), at step S50 the user computer 20 sends an access request to RMS server 30 for approval (as indicated by the dotted arrow C1 in FIG. 1). The request transmitted from the user computer 20 to RMS server 30 will provide the document GUID and the user ID. When the RMS server 30 receives the request at step S52, it will search its DRM database 36 at step S54 to check whether the user has the necessary rights to the DRM-protected document. The search may look up the document GUID in the database and find its associated policy ID and user ID, or may look up the user ID to find its associated document GUID and policy ID. From the result of the search a determination of the user's rights to the DRM-protected document can be made at step S56. For example, if no user ID is found to be associated with the document GUID, then it can be determined that the user does not have any right to access and use the DRM-protected document. If the user ID is found to be associated with the document GUID, and a policy containing the rights to view and print the document is also found to be associated with the document GUID, then it can be determined that the user has rights to view and print the DRM-protected document.
  • As step S60 the RMS server 30 transmits the result of this determination to the user computer 20 (as indicated by the dotted arrow C2 in FIG. 1). At step S62 the user can access the DRM-protected document if the user's request is granted. For example, if the user is determined to have rights to view and print the DRM-protected document, then the reader program on the user computer 20 will open the DRM-protected document for the user to view, and will also allow the user to print the DRM-protected document when the user desires. On the other hand, if the user's request is denied, then the reader program on the user computer 20 will not open the DRM-protected document, but rather may inform the user that the request is denied and may further inform the user what steps may be taken to purchase or otherwise obtain rights to the DRM-protected document.
  • As mentioned above, during the process of enabling DRM protection to the digital documents, additional information may be generated. For example, when a course booklet is compiled, additional data items or information may be created as a result of the compilation process. Examples of such additional data items or information may include: course booklet cover information (e.g., title, compiler, year/semester in use, etc.), course booklet compiler information (e.g., login/registration username, password, contact information, etc.), LMS information (e.g., course name, serial/sequential number, institution/department), distribution information (e.g., print, e-distribution, delivery rights/channel based on institution, etc.), granted rights information (e.g., data of the users who have purchased rights to the booklet, such as login/registration username, password, contact information, etc.). Such data/information may be needed by the rights owners for their records and operation. So at step S70 the RMS server 30 transmits the newly generated data/information to the ROC server 60, and at step S72 the ROC server may use the data/information to update its metadata database 62.
  • The dotted boxes in FIG. 3 indicate typically what steps are performed by or at which system. For example, the dotted box on the middle indicates that steps S10, S20, S30, S40, S52, S54, S56, S60 and S70 are typically performed by the RMS server 30, the dotted box on the upper left indicates that step S12 is typically performed by the LMS server 50, the dotted box on the lower left indicates that steps S42, S50 and S62 are typically performed by the user computer 20, and the dotted box on the right indicates that Steps S14, S32 and S72 are typically performed by the ROC server 60. However, it is understood that alternative arrangement may be utilized to perform these steps.
  • Additional features and advantages of the invention will be set forth in the descriptions that follow and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
  • It will be apparent to those skilled in the art that various modification and variations can be made in the method and related apparatus of the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention cover modifications and variations that come within the scope of the appended claims and their equivalents.

Claims (20)

What is claimed is:
1. A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of:
a server obtaining a digital document and its associated rights metadata;
the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights; and
the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document.
2. The method of claim 1, wherein the step of obtaining the digital document and its associated rights metadata further comprises a step of accessing a content provider's document depository to obtain the digital document.
3. The method of claim 1, wherein the step of obtaining the digital document and its associated rights metadata further comprises a step of accessing a rights owners center's metadata database to obtain rights metadata.
4. The method of claim 3, further comprising the step of obtaining additional rights information from rights owners center's metadata database for a newly compiled document.
5. The method of claim 3, further comprising the step of sending information of the newly compiled document to the rights owners center for updating its metadata database.
6. The method of claim 1, wherein the step of interpreting the metadata further comprises a step of converting information obtained from the metadata into data items satisfying the format of the DRM database.
7. The method of claim 1, wherein the step of interpreting the metadata further comprises a step of ascertaining rights granted to a document from copyrights information contained in the metadata associate with the document.
8. The method of claim 1, further comprising a steps of upon receiving a request from a user for accessing a DRM-protected document, searching the DRM database for the document's ID or the user's ID to find out what policy is associated with the document ID and/or user ID.
9. The method of claim 8, further comprising a step of based on the search result, determining whether to grant or deny the user request.
10. The method of claim 9, further comprising the step of sending a decision on whether to grant or deny the user request to the user.
11. A computer program product comprising a non-transitory computer usable medium having a computer readable code embodied therein for controlling a data processing apparatus, the computer readable program code configured to cause the data processing apparatus to execute a process for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), the process comprising the steps of:
obtaining a digital document and its associated rights metadata;
interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights; and
generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document.
12. The computer program product of claim 11, wherein the step of obtaining the digital document and its associated rights metadata further comprises a step of accessing a content provider's document depository to obtain the digital document.
13. The computer program product of claim 11, wherein the step of obtaining the digital document and its associated rights metadata further comprises a step of accessing a rights owners center's metadata database to obtain rights metadata.
14. The computer program product of claim 13, further comprising the step of obtaining additional rights information from the rights owners center's metadata database for a newly compiled document.
15. The computer program product of claim 13, further comprising the step of sending information of the newly compiled document to the rights owners center for updating its metadata database.
16. The computer program product of claim 11, wherein the step of interpreting the metadata further comprises a step of converting information obtained from the metadata into data items satisfying the format of the DRM database.
17. The computer program product of claim 11, wherein the step of interpreting the metadata further comprises a step of ascertaining rights granted to a document from copyrights information contained in the metadata associate with the document.
18. The computer program product of claim 11, further comprising a steps of upon receiving a request from a user for accessing a DRM-protected document, searching the DRM database for the document's ID or the user's ID to find out what policy is associated with the document ID and/or user ID.
19. The computer program product of claim 18, further comprising a step of based on the search result, determining whether to grant or deny the user request.
20. The computer program product of claim 19, further comprising the step of sending a decision on whether to grant or deny the user request to the user.
US13/853,928 2013-03-29 2013-03-29 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents Abandoned US20140298488A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/853,928 US20140298488A1 (en) 2013-03-29 2013-03-29 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents
US14/828,426 US9600639B2 (en) 2013-03-29 2015-08-17 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/853,928 US20140298488A1 (en) 2013-03-29 2013-03-29 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/828,426 Continuation US9600639B2 (en) 2013-03-29 2015-08-17 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents

Publications (1)

Publication Number Publication Date
US20140298488A1 true US20140298488A1 (en) 2014-10-02

Family

ID=51622234

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/853,928 Abandoned US20140298488A1 (en) 2013-03-29 2013-03-29 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents
US14/828,426 Active US9600639B2 (en) 2013-03-29 2015-08-17 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/828,426 Active US9600639B2 (en) 2013-03-29 2015-08-17 Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents

Country Status (1)

Country Link
US (2) US20140298488A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9355226B2 (en) * 2014-05-29 2016-05-31 Konica Minolta Laboratory U.S.A., Inc. Digital rights management system implemented on a scanner
US10902093B2 (en) * 2016-05-12 2021-01-26 Koninklijke Philips N.V. Digital rights management for anonymous digital content sharing

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3142320B1 (en) * 2015-09-14 2018-11-07 Sap Se Remote modification of a document database by a mobile telephone device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050257271A1 (en) * 2004-05-10 2005-11-17 Microsoft Corporation Enhancing digital rights management system security through policy enforcement
US20060218643A1 (en) * 2005-03-24 2006-09-28 Xerox Corporation Systems and methods for manipulating rights management data
US20090281996A1 (en) * 2007-11-23 2009-11-12 Xin Peng Liu Generating a service-oriented architecture policy based on a context model
US20100250534A1 (en) * 2007-10-16 2010-09-30 Lee Sih X Document Management Techniques to Account for User-Specific Patterns in Document Metadata
US20120216289A1 (en) * 2011-02-23 2012-08-23 Fujitsu Limited Content provision system
US20130347056A1 (en) * 2012-06-21 2013-12-26 General Instrument Corporation Content Rights Protection with Arbitrary Correlation of Second Content
US20140033265A1 (en) * 2008-07-07 2014-01-30 Bennett Leeds Digital rights management in a collaborative environment
US8909925B2 (en) * 2008-11-17 2014-12-09 Prakash Baskaran System to secure electronic content, enforce usage policies and provide configurable functionalities

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020091584A1 (en) * 2000-10-25 2002-07-11 Clark George Philip Electronic content distribution
JP4822663B2 (en) * 2003-12-12 2011-11-24 ソニー株式会社 Information processing apparatus and method, and program
DE102006044299B4 (en) * 2006-09-20 2014-11-13 Nokia Solutions And Networks Gmbh & Co. Kg Device and method for secure distribution of content in a telecommunication network
TWI394459B (en) * 2007-05-16 2013-04-21 Sony Corp Content download system and content download method, content receiving device, and content supply method and content receiving program, content receiving apparatus, and content receiving method and content receiving program
JP2008306601A (en) * 2007-06-08 2008-12-18 Sony Corp Content distribution system, distribution server, receiving terminal, and content distributing method
US9338166B2 (en) * 2008-11-04 2016-05-10 Adobe Systems Incorporated System and method for a single request and single response authentication protocol
JP5659226B2 (en) * 2010-04-23 2015-01-28 日立マクセル株式会社 Content receiver and content output method
US8806193B2 (en) * 2011-12-22 2014-08-12 Adobe Systems Incorporated Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming
US20130218829A1 (en) * 2013-03-15 2013-08-22 Deneen Lizette Martinez Document management system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050257271A1 (en) * 2004-05-10 2005-11-17 Microsoft Corporation Enhancing digital rights management system security through policy enforcement
US20060218643A1 (en) * 2005-03-24 2006-09-28 Xerox Corporation Systems and methods for manipulating rights management data
US20100250534A1 (en) * 2007-10-16 2010-09-30 Lee Sih X Document Management Techniques to Account for User-Specific Patterns in Document Metadata
US20090281996A1 (en) * 2007-11-23 2009-11-12 Xin Peng Liu Generating a service-oriented architecture policy based on a context model
US20140033265A1 (en) * 2008-07-07 2014-01-30 Bennett Leeds Digital rights management in a collaborative environment
US8909925B2 (en) * 2008-11-17 2014-12-09 Prakash Baskaran System to secure electronic content, enforce usage policies and provide configurable functionalities
US20120216289A1 (en) * 2011-02-23 2012-08-23 Fujitsu Limited Content provision system
US20130347056A1 (en) * 2012-06-21 2013-12-26 General Instrument Corporation Content Rights Protection with Arbitrary Correlation of Second Content

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9355226B2 (en) * 2014-05-29 2016-05-31 Konica Minolta Laboratory U.S.A., Inc. Digital rights management system implemented on a scanner
US10902093B2 (en) * 2016-05-12 2021-01-26 Koninklijke Philips N.V. Digital rights management for anonymous digital content sharing

Also Published As

Publication number Publication date
US9600639B2 (en) 2017-03-21
US20150356277A1 (en) 2015-12-10

Similar Documents

Publication Publication Date Title
EP3149650B1 (en) System for managing personal data
JP5778865B2 (en) Services for adding functionality to applications
CN100430951C (en) Systems and methods of access control enabling ownership of access control lists to users or groups
US9195840B2 (en) Application-specific file type generation and use
US10037416B2 (en) Method and apparatus for licensing web assets
CN104995598A (en) Use of freeform metadata for access control
US20170220814A1 (en) Digital rights management system implementing version control
US20140289515A1 (en) Digital rights management retrieval system
US10474444B2 (en) Method and system for securely updating a website
US9836585B2 (en) User centric method and adaptor for digital rights management system
US9600639B2 (en) Method for automating the management and interpretation of digital documents and their owners rights metadata for generating digital rights management protected contents
US9852304B2 (en) Document control based on copyright permission when printing compilation of works
US9430618B2 (en) Messaging administration based on digital rights management services
CN113761484A (en) Managing application-specific feature permissions
JP2008257340A (en) Information processing apparatus, information processing method, storage medium and program
US7607176B2 (en) Trainable rule-based computer file usage auditing system
Garcia et al. A web service privacy framework based on a policy approach enhanced with ontologies
JP5430618B2 (en) Dynamic icon overlay system and method for creating a dynamic overlay
CN111651416A (en) Sketch project file uploading preview method, system, device and medium
Wang et al. Towards Android Application Protection via Kernel Extension
Decker Modelling of location-aware access control rules
Malone et al. ENDORSE: a legal technical framework for privacy preserving data management
US20150006889A1 (en) Academic quiz-pack suite administration based on digital rights management service
KR102641560B1 (en) Platform for trading of electronic document and method of using this
Chiu et al. ActAnyware-Blockchain-Based Software Licensing Scheme

Legal Events

Date Code Title Description
AS Assignment

Owner name: KONICA MINOLTA LABORATORY U.S.A., INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARBER, DANIEL;ASAO, DAVID;PATHAK, RABINDRA;AND OTHERS;REEL/FRAME:030478/0791

Effective date: 20130523

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION