WO2000028398A1 - Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur - Google Patents

Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur Download PDF

Info

Publication number
WO2000028398A1
WO2000028398A1 PCT/EP1999/008333 EP9908333W WO0028398A1 WO 2000028398 A1 WO2000028398 A1 WO 2000028398A1 EP 9908333 W EP9908333 W EP 9908333W WO 0028398 A1 WO0028398 A1 WO 0028398A1
Authority
WO
WIPO (PCT)
Prior art keywords
content information
content
procedure
user
information
Prior art date
Application number
PCT/EP1999/008333
Other languages
English (en)
Inventor
Yevgeniy E. Shteyn
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to KR1020007007594A priority Critical patent/KR20010034000A/ko
Priority to JP2000581519A priority patent/JP2002529844A/ja
Priority to EP99957978A priority patent/EP1046095A1/fr
Publication of WO2000028398A1 publication Critical patent/WO2000028398A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2812Exchanging configuration information on appliance services in a home automation network describing content present in a home automation network, e.g. audio video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/2847Home automation networks characterised by the type of home appliance used
    • H04L2012/2849Audio/video appliances

Definitions

  • the invention relates to a method of providing controlled access to content data, in particular as provided to an end-user of consumer electronics equipment or a multimedia computer.
  • the invention also relates to a method of protecting unauthorized copying of digital data content.
  • content and content data refer to data that contains information for the end-user, e.g., alphanumerical text, graphics, video, audio, multimedia, etc.
  • digital content is usually sent or streamed to the end-user from a remote server using cable or Internet, or is provided on a DND, etc.
  • the content is processed by the receiving device (e.g., a computer, a set-top box ) and rendered to the end user.
  • Content can be copyright-protected using "watermarking”: adding digital modifications that are undetectable by the user, but are recognized by the rendering or verifying software or hardware.
  • Another way to protect the content is encryption.
  • the content data is encoded using special encryption algorithms before sending the data to its destination.
  • the stream is decrypted before rendering or storage.
  • Watermarking for example, is highly sensitive to content modifications. If the digital content is modified by software/hardware, which is not aware of the "watermark", the watermark is not guaranteed to persist in the original form. For example, picture resizing, storing the picture in a different file format, applying compression techniques, etc., affect also the watermark and make it less useful. Encryption methods also provide a number of challenges. As computer/processing hardware and software become more powerful and sophisticated, well-known algorithms get "cracked” and are rendered obsolete. Another challenge is standardization. That is, in order to address the mass market with multiple vendors, a content protection method needs to be standard.
  • the invention provides a method of providing or receiving content information, preferably via a network, as one or more software objects.
  • a procedure is encapsulated in the object for access of the information on a runtime environment. That is, the procedure for accessing the information by the end-user is packaged together with the content information for delivery to the end-user.
  • a software object comprises content data plus a method or procedure to process the data.
  • a method is a programmed procedure that is defined as part of a class and that is included in any object of that class.
  • An object can have more than one method.
  • a method in an object can only have access to the data known to that object, which ensures data integrity among the set of objects in an application.
  • Open distributed software architectures such as HAVi, Java/JINI, Home API based on COM or DCOM technology, CORBA and others allow transfer of software objects over a network (Internet, home network, local area network, wide area network, etc.).
  • HAVi the use of COM technology and OLE Automation objects
  • 09/165,683 (Attorney Docket PHA 23.483), filed 10/2/98 for Yevgeniy Shteyn for "CALLS IDENTIFY SCENARIO FOR CONTROL OF SOFTWARE OBJECTS VIA PROPERTY ROUTES";
  • U.S. Serial No. 09/165,682 (Attorney Docket PHA 23,484), filed 10/2/98 for Yevgeniy Shteyn for "CONTROL PROPERTY IS MAPPED ONTO MODALLY COMPATIBLE GUI ELEMENT " ; and U.S. Serial No.
  • a HAVi DCM can be uploaded to an FAV and executed in a Java run-time environment.
  • the DCM can be programmed to implement API's for the rendering, storing, recording or other processing of graphics, audio, video, text, image, etc.
  • the software object works directly with the rendering machine, without intermediate decryption or modification. All operations are controlled by the object itself and hidden from hostile applications.
  • an object-controlled storage API is invoked (for example: Serialization, see further below). Since the object controls the storage (recording) process, the host system has to recreate the object in order to access stored content and therefore its content is protected.
  • the object can affect the quality of recording, the number of times the content can be recorded or rendered and other interactions with the host system.
  • the software object also can be made time-sensitive. For example, a movie object can be leased, i.e., its rendering API can only be used for a certain amount of time - movie playing time, a day, etc...
  • a controlling object does not have to contain all the content. When the content is very large, the object could just keep the reference(s) to content location and does the retrieval as needed. Where necessary or desirable, a chain of objects could control operations. For example, different movie scenes are controlled by different objects.
  • An object can be set up to provide free (trial) access to certain parts of the content and require payments for other. Conditional interaction with system resources, based on user preferences, can be accomplished. Advertisements and promotions can be inserted as separate objects, depending on the level of user access (e.g., via subscription).
  • An object can wrap up binary code, provided the execution environment of the target client is known or can be detected after object interaction with the device. For example, a better rendering algorithm or a binary upgrade can be delivered to a TriMedia machine running Java VM.
  • the proposed method of data content delivery to an end-user through objects is also highly suitable for other usages than copyright protection.
  • email, teleconferencing (via telephone) or videoconferencing can be based on the exchange of software objects for security reasons.
  • electronic monetary transactions are made secure through the communication of software objects.
  • Electronic mail can be implemented as software objects.
  • Transport of an object over a network is accomplished through, e.g., object serialization.
  • Object serialization in Java supports the encoding of objects, and the objects reachable from them, into a stream of bytes, and it supports the complementary reconstruction of the object graph from the stream.
  • Serialization is used for lightweight persistence and for communication via sockets or Remote Method Invocation (RMI).
  • RMI Remote Method Invocation
  • the default encoding of objects protects private and transient data, and supports the evolution of the classes.
  • a separate digital data stream that can be pirated and replicated by hostile parties does not exist in the traditional sense. All what is being sent is the string of bits and it is not possible to the average person to find a clue about its meaning, since procedures and content information are not recognizable from the stream.
  • a class may implement its own external encoding to increase security and is then solely responsible for the external format (source: http:// www.iavasoft.com/ products /jdk/1.1/ docs/guide/ serialization/ index.html). Accordingly, a decryption procedure can be encapsulated in the object, together with encrypted content data. The decryption procedure is then invoked at the receiving end, possibly complemented with an also encapsulated verification procedure verifying the receiver's ID, decryption key, or serial number of the rendering device, etc.
  • a video conferencing system can provide conventional video streaming and object-encapsulated secure audio and/or graphical data.
  • FIGS.1 -5 are block diagrams of examples of a system wherein the method of the invention is implemented.
  • Fig.l is a block diagram of a HAVi system 100 for implementing the method of the invention.
  • System 100 comprises a storage medium 102 and an FAV (Full AV node) 104 that comprises a digital TV in this example.
  • FAV 104 has a Java Virtual Machine 106.
  • Storage medium 102 comprises, for example, a buffer that stores a software object 108 received electronically from outside system 100, e.g., via the Internet after de-serialization, or a DVD or another physical data-carrier that contains the software object, here a HAVi DCM 108 with content data 110 and play-out procedures, represented by rendering API 112.
  • Software object 108 is uploaded to the rendering process on FAV 104 where rendering API 104 directly interacts with Java VM 106.
  • Conditional access to the content can be based on security or on user/system capabilities.
  • the object allows invocation for play-out or storage through API's dedicated to verification.
  • the run time would have to provide an authorization or an identifier that can be verified by the object.
  • parental control can be implemented by a group of objects representing different parts of a movie content.
  • an electronic book can encapsulate graphical objects with access restriction requirements.
  • Fig.2 is a block diagram of a Jini system 200 which uses a JavaSpaces architecture.
  • JavaSpaces is an architecture for creating a distributed operating system and creating repositories for Java-based objects, as well as Java VM's and Java's Remote Method Invocation (RMI) functionality.
  • JavaSpaces implementations provide a mechanism for storing a group of related objects and retrieving them based on value-matching look-up for specified fields. This allows a JavaSpaces server to be used for storing and retrieving objects on a remote system.
  • the JavaSpaces API uses a specific package to provide basic atomic transactions that group multiple operations across multiple JavaSpaces implementations into a bundle that acts as a single atomic operation.
  • the JavaSpaces architecture supports a transaction mechanism allows multi-operation and/or multi-space updates to complete atomically.
  • the term "atomicity" means that all operations grouped under a transaction occur or none of them does.
  • Jini is a technology, also from Sun Microsystems, for networking of devices.
  • Jini is a Java-based software technology that assists in networking PC's and peripherals.
  • a Jini-enabled device When plugged into a network, a Jini-enabled device will broadcast its presence. Network clients that are ready to use that device can request the necessary software from the device itself, bypassing a server or a network administrator. This architecture builds on top of an existing network.
  • System 200 comprises JavaSpaces servers 202 and 204, and a client 206 connected through a network 208.
  • JavaSpaces server 202 or 204 provides a distributed persistence and object exchange mechanism for objects written in the Java programming language. Objects are written in entries that provide a typed grouping of relevant fields. Clients can perform simple operations on a JavaSpaces server to write new new entries, to look-up existing entries, and remove entries from the space. Using these tools a user can write systems that use flow of data to implement distributed algorithms and let the JavaSpaces system implement persistence for the user.
  • server 202 transfers an object (through Serialization) to client 206. The transfer is a lease as specified by Java's
  • a leased resource or service grant is time-based. When the time for the lease has expired the service ends or the resource is freed.
  • server 202 leases a first object to server 204 for temporary storage and a second object to client 206 for temporary storage or rendering.
  • This configuration is relevant to, for example, a video- (or audio-) on-demand service provider, a multi-player video game provider, etc.
  • a similar client-server architecture can be built using COM/DCOM technology of Microsoft, with a COM client on a Windows operating system.
  • Fig.3 is a diagram of a system 300 with a COM/DCOM server 302 and a COM client 304.
  • Server 302 provides object access and object storage.
  • Client 304 can access server 302 using COM or DCOM mechanisms. For a remote location, DCOM is be used. The access mechanism is transparent to client 304.
  • a COM object is transferred into the process on client 304 and an appropriate API is invoked at client 304 in order to produce desirable content.
  • the object has full access to system resources and API's such as DirectShow components from Microsoft.
  • Fig.4 is a diagram of another configuration of a system 400 in the invention.
  • System 400 comprises a server 402 for providing objects and serving as an object repository.
  • System 400 further comprises clients 404 and 406.
  • System 400 is used for, e.g., multi-client interaction for exchange of content such as in videoconferencing.
  • Content objects are placed in server/repository 402 by client 404 and can be retrieved from repository 402 by client 406.
  • Fig.5 is a diagram of a system 500 that has a similar configuration as system 400.
  • System 500 comprises an object server 502 that serves clients 504, 506, 508 and 510.
  • Server 502 functions as an object repository to enable multi-client object interaction.
  • Content objects are placed in server 502 by any of clients 504-510 and can be retrieved by any of the other clients 504-510.
  • System 500 comprises a relay or replication server 512 to serve clients 514 and 516.
  • a content object can be packaged or can expose interfaces based on preferences or access privileges of clients 504-510 and 514-516.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

Des informations de contenu telles qu'un film, un fichier audio ou un message textuel sont fournies à un utilisateur final dans un objet logiciel présentant une procédure encapsulée permettant l'accès de l'utilisateur final aux informations de contenu dans un environnement d'exécution. L'objet peut spécifier une tranche de temps pour des informations de contenu auxquelles accéder et une manière d'accès à celles-ci. Etant donné que la procédure est encapsulée dans l'objet avec les données de contenu, et étant donné que le transport de l'objet sur l'Internet s'effectue après sérialisation, un degré approprié de sécurité est fourni contre l'impression ou la copie non autorisée.
PCT/EP1999/008333 1998-11-10 1999-11-01 Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur WO2000028398A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
KR1020007007594A KR20010034000A (ko) 1998-11-10 1999-11-01 저작권 보호를 위해 소프트웨어 객체로서 제공된 콘텐트
JP2000581519A JP2002529844A (ja) 1998-11-10 1999-11-01 著作権保護のためソフトウエアオブジェクトとしてコンテンツを供給する方法
EP99957978A EP1046095A1 (fr) 1998-11-10 1999-11-01 Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US18953498A 1998-11-10 1998-11-10
US09/189,534 1998-11-10

Publications (1)

Publication Number Publication Date
WO2000028398A1 true WO2000028398A1 (fr) 2000-05-18

Family

ID=22697749

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1999/008333 WO2000028398A1 (fr) 1998-11-10 1999-11-01 Contenu fourni sous forme d'objets logiciels pour la protection du droit d'auteur

Country Status (5)

Country Link
EP (1) EP1046095A1 (fr)
JP (1) JP2002529844A (fr)
KR (1) KR20010034000A (fr)
CN (1) CN1124534C (fr)
WO (1) WO2000028398A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001078352A1 (fr) * 2000-04-07 2001-10-18 Telia Ab Pret de ressource locale dans un systeme de communication de donnees et de telecommunication
EP1164523A2 (fr) * 2000-06-08 2001-12-19 Siemens Aktiengesellschaft Méthode et arrangement pour l'utilisation sécurisée d'un service
JP2002007325A (ja) * 2000-06-23 2002-01-11 Shinkichi Morimoto デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム
WO2003040898A1 (fr) * 2001-11-08 2003-05-15 Beep Science As Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia
US7644444B2 (en) 2002-10-30 2010-01-05 Ntt Docomo, Inc. Communication device, program and recording media
US7818815B2 (en) 2002-05-17 2010-10-19 Ntt Docomo, Inc. Communication device
US7958213B1 (en) 2000-09-21 2011-06-07 Siemens Enterprise Communications, Inc. Processing electronic messages

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3788201B2 (ja) * 2000-06-07 2006-06-21 日本電信電話株式会社 情報カプセル管理方法及び情報カプセル管理プログラムを格納した記憶媒体
JP4532068B2 (ja) * 2001-12-07 2010-08-25 パナソニック株式会社 コンテンツ配信システムおよび方法
AU2003202815A1 (en) 2002-01-12 2003-07-24 Coretrust, Inc. Method and system for the information protection of digital content
KR100724439B1 (ko) * 2005-03-22 2007-06-04 엘지전자 주식회사 콘텐츠 사용권리 보호방법
JP2008546128A (ja) * 2005-06-03 2008-12-18 ワーナー ブラザーズ エンターテイメント インコーポレイテッド 全てのオーディオ・ビジュアル光学ディスク形式が透かしに対して適切に選別されるように保証するシステム
CN100437612C (zh) * 2005-10-31 2008-11-26 华为技术有限公司 一种保护内容的方法及装置
CN101903889B (zh) * 2007-12-20 2014-07-09 皇家飞利浦电子股份有限公司 数字版权管理的设备和方法

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JAVA SECURITY, XP002092325, Retrieved from the Internet <URL:http://SWISSNET.AI.MIT.EDU/~JBANK/JAVAPAPER/JAVAPAPER.HTML> [retrieved on 19990204] *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001078352A1 (fr) * 2000-04-07 2001-10-18 Telia Ab Pret de ressource locale dans un systeme de communication de donnees et de telecommunication
EP1164523A2 (fr) * 2000-06-08 2001-12-19 Siemens Aktiengesellschaft Méthode et arrangement pour l'utilisation sécurisée d'un service
EP1164523A3 (fr) * 2000-06-08 2006-10-11 Siemens Aktiengesellschaft Méthode et arrangement pour l'utilisation sécurisée d'un service
JP2002007325A (ja) * 2000-06-23 2002-01-11 Shinkichi Morimoto デジタルコンテンツの配信方法およびデジタルコンテンツの配信システム
US7958213B1 (en) 2000-09-21 2011-06-07 Siemens Enterprise Communications, Inc. Processing electronic messages
WO2003040898A1 (fr) * 2001-11-08 2003-05-15 Beep Science As Dispositif et procede pour le controle de la police de contenu au moyen d'un environnement de confiance dans un systeme de messagerie multimedia
US7818815B2 (en) 2002-05-17 2010-10-19 Ntt Docomo, Inc. Communication device
US8087078B2 (en) 2002-05-17 2011-12-27 Ntt Docomo, Inc. Communication device
US7644444B2 (en) 2002-10-30 2010-01-05 Ntt Docomo, Inc. Communication device, program and recording media

Also Published As

Publication number Publication date
CN1292897A (zh) 2001-04-25
JP2002529844A (ja) 2002-09-10
KR20010034000A (ko) 2001-04-25
EP1046095A1 (fr) 2000-10-25
CN1124534C (zh) 2003-10-15

Similar Documents

Publication Publication Date Title
JP4884978B2 (ja) 安全なマルチメディア転送システム
KR100941385B1 (ko) 조건적 액세스 시스템
CA2539203C (fr) Procede et systeme de commande d&#39;un contenu video
CA2538831C (fr) Procede destine a empecher une distribution non autorisee d&#39;un contenu multimedia
EP1625479B1 (fr) Procede et systeme de partage de media controle dans un reseau
JP4975962B2 (ja) 回線容量が制約されたネットワーク上の多メディア資産の送出及び動的プレゼンテーション用システム
US8813246B2 (en) Method for playing digital contents protected with a DRM (digital right management) scheme and corresponding system
US20020077986A1 (en) Controlling and managing digital assets
EP1046095A1 (fr) Contenu fourni sous forme d&#39;objets logiciels pour la protection du droit d&#39;auteur
JP2003132173A (ja) 電子メディア・コンテナ
JP4340013B2 (ja) 広帯域アクセスネットワークを介してコンテンツを安全に引き渡すための方法及び装置
EP1523133B1 (fr) Systeme d&#39;authentification interdispositif, et procede, dispositif de communications, et programme informatique
US20080060081A1 (en) State Info in Drm Identifier for Ad Drm
KR100740196B1 (ko) 가정용 네트워크에서 비동기성 데이터를 송신하기 위한 방법
WO2008018310A1 (fr) Dispositif d&#39;exécution d&#39;application, procédé, et programme
EP1410629A1 (fr) SYSTèME ET MéTHODE DE RECEPTION ET DE STOCKAGE D&#39;UN FLUX DE TRANSPORT
WO2001022682A2 (fr) Procede et systeme de services en continu en temps reel
Park et al. Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments
KR101160263B1 (ko) Dlna 홈 네트워크 및 dlna 홈 네트워크에서의디지털 저작권 처리 방법
Viana et al. iDTV Home Gateway convergence: an open software model integrating the Ginga middleware and the OSGi framework
TWI252663B (en) Method and system for protecting media data
STANDARD Media Device Control Framework (MDCF)
STANDARD Media Device Control—Part 1: Framework (MDCF)

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99803708.7

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWE Wipo information: entry into national phase

Ref document number: 1020007007594

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1999957978

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999957978

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020007007594

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1999957978

Country of ref document: EP

WWR Wipo information: refused in national office

Ref document number: 1020007007594

Country of ref document: KR