WO2002001331A2 - Secured internet device - Google Patents

Secured internet device Download PDF

Info

Publication number
WO2002001331A2
WO2002001331A2 PCT/US2001/020684 US0120684W WO0201331A2 WO 2002001331 A2 WO2002001331 A2 WO 2002001331A2 US 0120684 W US0120684 W US 0120684W WO 0201331 A2 WO0201331 A2 WO 0201331A2
Authority
WO
WIPO (PCT)
Prior art keywords
access
internet device
customer
server
internet
Prior art date
Application number
PCT/US2001/020684
Other languages
French (fr)
Other versions
WO2002001331A3 (en
Inventor
James R. Clark
Original Assignee
Clark James R
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Clark James R filed Critical Clark James R
Priority to AU2001273066A priority Critical patent/AU2001273066A1/en
Publication of WO2002001331A2 publication Critical patent/WO2002001331A2/en
Publication of WO2002001331A3 publication Critical patent/WO2002001331A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Definitions

  • Embodiments of the present invention relate to digitally encoded copyrighted or otherwise proprietary data of any kind. More specifically, the present invention relates to a secured system for authentication and registration of any Internet device, said authentication and registration being required by the novel system before said Internet devices are afforded access to said data. Said authentication is accomplished by first requiring a user to access an application server.
  • the application server allows the user to download a novel software application which is used to determine a unique Internet device access number. Once a unique Internet device access number is determined, the user may access the novel system through an authentication server.
  • the authentication server authenticates and registers the unique Internet device access number prior to affording access to the system's security server/router. In this way, the novel system transforms any Internet device into a Secure Internet Device (SID).
  • SID Secure Internet Device
  • MP3 technology allows users to download audio and music content over the Internet for play on MP3 compatible playing devices, including those that are portable and those internal to a personal computer.
  • MP3 compatible playing devices including those that are portable and those internal to a personal computer.
  • a major drawback to the presently available MP3 devices and technologies is that they afford virtually no protection against copyright infringements by either Internet MP3 sourcing parties, nor by MP3 end users.
  • the present invention remedies this functional deficiency through a novel and innovative process for controlling access to media content.
  • This system can protect any type of digitally encoded data that can be transmitted via the Internet by providing a system which restricts access to only those internet devices which have been first authorized and registered utilizing a unique hardware identifier associated with each such device.
  • the present invention relates to a system which is capable of converting any Internet device into a SID. More specifically, the present invention utilizes a novel software application which is used to determine a unique identification number for any Internet device.
  • any personal computer (PC) capable of accessing the Internet may access an application server to download the software application which determines a unique Internet device access number.
  • the PC may then be authenticated through an authentication server.
  • the authentication server identifies and registers the unique access number of the PC. Only PCs which have been authenticated and registered are afforded access to vendor servers.
  • Access is afforded in a manner consistent with pre-existing contracts established through a customer service center. All access to vendor servers is tracked via the unique access number , such that said access may be billed according to said predetermined contract, hi this manner, any PC may become a SID.
  • the Internet device may access a security server/router.
  • an authenticated PC i.e. "PCSID”
  • PCSID may access the security server/router which then routs requests to various vender servers comprising a copyrighted data library across the internet.
  • This data could be any copyrighted digital data including digital Music or Video. This data would only be available to customers who have an Internet device which has been authenticated through the authentication server.
  • the security server/router may identify the unique customer and cross reference them to a customer data base for billing.
  • these customers access the application server, download the novel software application which identifies a unique access number for the PC, and then register their account via an authentication server or a free access (800) telephone number utilizing a service center located at said authentication server or a free access (800) telephone number.
  • the service center collects customer information including address, phone number, and payment information, and the unique access number of the PCSID is authenticated and registered.
  • the service center then transfers the information to the security server/router.
  • the security server/router will only afford access to PCs which have been so authenticated and registered. Then the customer could connect through the security server/router to the data service providers via various vendor servers.
  • This invention incorporates a unique serial number for each Internet device, creating a SID.
  • This could be a MAC code on a network card, a serial number in an EPROM, or a unique identification number on a CPU or other IC of any type.
  • the unique identification embedded in each Pentium III® chip could serve as a PC specific identifier used to authenticate and register the specific PC requesting access. As long as this identifier was authenticated and registered, the novel system will allow the user access.
  • This number is registered with the system web site through which access to the copyrighted content is given, along with the customer credit card or other means of billing fees (i.e. direct electronic transfer from checking accounts, etc.).
  • the then-operational Internet device can be used to access the provider servers, which give access to copyrighted content libraries, on a per title basis. For marketing promotions, pre-selected portions of titles could be made available for free review (by prior arrangements with copyrighted content providers). Once titles are selected for downloading, charges are made to the customer's account. Each account is billed to the pre-arranged credit card on a monthly basis.
  • a further object of the present invention is to provide a system which allows any Internet device to access data over the Internet while simultaneously protecting the copyright interests of the data providers.
  • Internet devices such as personal computers may access the copyrighted content libraries through the novel system. Said access is first authenticated through a unique hardware identifier on the PC, such as, for example, the unique ID built into each Pentium III® chip.
  • Any data provided to an Internet device, such as a PC, which may digitally reproduce said data shall be provided in a format which includes a unique identifier, such as an electronic watermark.
  • any digital reproduction of said data may be readily identified and attributed to the uniquely authenticated Internet device which originally accessed said data. Therefore, the novel system facilitates secure access to copyrighted data from any Internet device via any means of access (modem, ethernet, RF, cellular, etc.).
  • Figure 1 is a schematic diagram of the inter-networked system components according to one embodiment of the invention employing a modem-connected PC.
  • FIG. 2 is a flowchart of a sample PC Secured Internet Device Internet Distribution System according to one embodiment of the invention.
  • the novel system transforms any Internet device into a Secured Internet Device (SID) by using a novel software application to create a unique access number used to identify any such device.
  • SID Secured Internet Device
  • an Internet distribution system is created which provides a means of affording facile access to copyrighted or otherwise proprietary data over the Internet while simultaneously protecting the copyright interests of the data providers.
  • the system requires that a unique identifier be authenticated and registered before any Internet device is allowed to access said system's data service providers through various vendor servers.
  • the novel system incorporates the unique access number into an electronic watermark which is embedded within any data downloaded from said vendor servers so that any unauthorized redistribution of said data would be easily traced to the original source of said re-distribution.
  • Figure 1 is a schematic diagram of one embodiment of the present invention.
  • Figure 1 shows the inter-networked copy-protected Internet distribution system components employing a modem-connected PC 1.
  • Representative Vendor Servers 7, 8, and 9, are connected to a Security Router/Server 6.
  • the Application Server 2 allows the PC 1 to download a novel software application which determines a unique access number for the PC 1. Said unique access number is called a Secured Internet Device access number. Once the unique access number is determined, the PC 1 is enabled as a Secured Internet Device, or "PCSID".
  • PCSID Secured Internet Device
  • the PCSID 1 may then contact the Authentication Server 4 via virtual private network link 3.
  • a customer service center at the Authentication Server 4 obtains customer information including address, phone number, and payment information.
  • the Authentication Server 4 also authenticates and registers the PCSID 1 access number. It is also envisioned that, as an alternative to the Authentication Server 4, the PCSID 1 may also connect to the customer service center via a free access (800) telephone number. Said service center would collect customer information and authenticate PCSID 1 access numbers in the manner described above.
  • the Authentication Server 4 then transfers the information to the Security Server/Router 6.
  • the Security Server/Router 6 stores customer information provided by the
  • the PCSID 1 may subsequently access the Security Server/Router 6 via virtual private network link 5 without first accessing the Authentication Server 4.
  • the PCSID may access the vendor servers 7, 8, and 9 through the Security Server/Router 6.
  • the Security Server/Router 6 tracks customer use including downloading of music or other data. This provides the detailed reports necessary for billing customers and providing royalty payments due to authors, composers and other such owners of copyrighted or otherwise protected data.
  • the novel system provides security and control for data from Vendor Servers 7, 8, and 9 to customer's PCSID 1 or any other Internet device made secure by the novel system. Because the customer's PCSID 1 may allow digital storage and duplication of data so provided, it is also envisioned that an extra layer of protection is provided via electronic watermark technology. This is accomplished by embedding the unique Secured Internet Device access number within an electronic watermark contained in all data accessed through the novel system. Using the Secured Internet Device access number embedded in the watermark, tracking of any unauthorized re-distribution of the digital data would be straightforward as it would be easy to verify the source of the re-distribution.
  • FIG. 1 depicts a flowchart of the SID distribution system registration process utilizing a PC as a sample Internet device.
  • the customer accesses the Application Server 10.
  • the customer downloads the novel software application onto the customer's PC 11.
  • the novel software application determines an access number which is unique to the particular PC 12.
  • the PC now enabled as a PCSID, then accesses the Authentication Server 13. If the customer is accessing the novel system for the first time, the Authentication Server authenticates and registers the unique access number of the PCSID 15.
  • a customer service center located at the Authentication Server records customer billing information 16.
  • the authenticated PCSID is then allowed access Security Server/Router 17.
  • the Security Server/Router affords the customer access to Vendor Servers from which the customer may sample or purchase content 18. Any data downloaded by the customer is tracked via the unique access number determined by the novel software application. Once a customer's PC has been authenticated and registered 15, and all customer billing information has been obtained 16, subsequent access to the system is granted on the basis of the authenticated unique access number 14, thus eliminating the need for steps 15 and 16, above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to digitally encoded copyrighted or otherwise proprietary data of any kind. More specifically, the present invention relates to a secured system for authentication and registration of any Internet device, said authentication and registration being required by the novel system before said Internet devices are afforded access to said data. Said authentication is accomplished by first requiring a user to access an application server. The application server allows the user to download a novel software application which is used to determine a unique Internet device access number. Once a unique Internet device access number is determined, the user may access the novel system through an authentication server. The authentication server authenticates and registers the unique Internet device access number prior to affording access to the system's security server/router. The user may then access vendor servers containing copyrighted or otherwise proprietary data. In this way, the novel system transforms any Internet device into a secure Internet device (SID).

Description

PERSONAL COMPUTER SECURED INTERNET DEVICE
DESCRIPTION
BACKGROUND OF THE INVENTION
Field of the Invention.
Embodiments of the present invention relate to digitally encoded copyrighted or otherwise proprietary data of any kind. More specifically, the present invention relates to a secured system for authentication and registration of any Internet device, said authentication and registration being required by the novel system before said Internet devices are afforded access to said data. Said authentication is accomplished by first requiring a user to access an application server. The application server allows the user to download a novel software application which is used to determine a unique Internet device access number. Once a unique Internet device access number is determined, the user may access the novel system through an authentication server. The authentication server authenticates and registers the unique Internet device access number prior to affording access to the system's security server/router. In this way, the novel system transforms any Internet device into a Secure Internet Device (SID).
As an introduction to the problems solved by the present invention, consider the development of present-day MP3 type players. MP3 technology allows users to download audio and music content over the Internet for play on MP3 compatible playing devices, including those that are portable and those internal to a personal computer. From the point of view of the audio and music content recording industry, a major drawback to the presently available MP3 devices and technologies is that they afford virtually no protection against copyright infringements by either Internet MP3 sourcing parties, nor by MP3 end users. The present invention remedies this functional deficiency through a novel and innovative process for controlling access to media content. This system can protect any type of digitally encoded data that can be transmitted via the Internet by providing a system which restricts access to only those internet devices which have been first authorized and registered utilizing a unique hardware identifier associated with each such device. SUMMARY OF THE INVENTION
The present invention relates to a system which is capable of converting any Internet device into a SID. More specifically, the present invention utilizes a novel software application which is used to determine a unique identification number for any Internet device. For example, any personal computer (PC) capable of accessing the Internet may access an application server to download the software application which determines a unique Internet device access number. The PC may then be authenticated through an authentication server. The authentication server identifies and registers the unique access number of the PC. Only PCs which have been authenticated and registered are afforded access to vendor servers.
Access is afforded in a manner consistent with pre-existing contracts established through a customer service center. All access to vendor servers is tracked via the unique access number , such that said access may be billed according to said predetermined contract, hi this manner, any PC may become a SID. Once the Internet device is authenticated, it may access a security server/router. For example, an authenticated PC (i.e. "PCSID") may access the security server/router which then routs requests to various vender servers comprising a copyrighted data library across the internet. This data could be any copyrighted digital data including digital Music or Video. This data would only be available to customers who have an Internet device which has been authenticated through the authentication server. In this way, the security server/router may identify the unique customer and cross reference them to a customer data base for billing.
For example, with a PC, these customers access the application server, download the novel software application which identifies a unique access number for the PC, and then register their account via an authentication server or a free access (800) telephone number utilizing a service center located at said authentication server or a free access (800) telephone number. The service center collects customer information including address, phone number, and payment information, and the unique access number of the PCSID is authenticated and registered. The service center then transfers the information to the security server/router. The security server/router will only afford access to PCs which have been so authenticated and registered. Then the customer could connect through the security server/router to the data service providers via various vendor servers. With the novel system, secure access and secure downloading of audio and music content, and the like, would be achieved, such that each user can pick their own listening collections, and the provider can maintain copyright protection security. The control given by this restricted accessibility provides a cost-effective solution to the legal problems that have recently arisen from unauthorized distribution of copyright protected audio and music content over the Internet.
This invention incorporates a unique serial number for each Internet device, creating a SID. This could be a MAC code on a network card, a serial number in an EPROM, or a unique identification number on a CPU or other IC of any type. For example, the unique identification embedded in each Pentium III® chip could serve as a PC specific identifier used to authenticate and register the specific PC requesting access. As long as this identifier was authenticated and registered, the novel system will allow the user access. This number is registered with the system web site through which access to the copyrighted content is given, along with the customer credit card or other means of billing fees (i.e. direct electronic transfer from checking accounts, etc.). Once the user is registered, the then-operational Internet device can be used to access the provider servers, which give access to copyrighted content libraries, on a per title basis. For marketing promotions, pre-selected portions of titles could be made available for free review (by prior arrangements with copyrighted content providers). Once titles are selected for downloading, charges are made to the customer's account. Each account is billed to the pre-arranged credit card on a monthly basis.
It is an object of the present invention to overcome deficiencies in current technology which make it impossible to adequately protect copyrighted or otherwise proprietary data made available over the Internet. A further object of the present invention is to provide a system which allows any Internet device to access data over the Internet while simultaneously protecting the copyright interests of the data providers. For example, Internet devices such as personal computers may access the copyrighted content libraries through the novel system. Said access is first authenticated through a unique hardware identifier on the PC, such as, for example, the unique ID built into each Pentium III® chip. Any data provided to an Internet device, such as a PC, which may digitally reproduce said data, shall be provided in a format which includes a unique identifier, such as an electronic watermark. As a result, any digital reproduction of said data may be readily identified and attributed to the uniquely authenticated Internet device which originally accessed said data. Therefore, the novel system facilitates secure access to copyrighted data from any Internet device via any means of access (modem, ethernet, RF, cellular, etc.).
These and other embodiments, aspects, advantages and features of the present invention will be set forth in part in the description, and in part will come to those skilled in the art by reference to the following description of the invention and referenced drawings, or by practice of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a schematic diagram of the inter-networked system components according to one embodiment of the invention employing a modem-connected PC.
Figure 2 is a flowchart of a sample PC Secured Internet Device Internet Distribution System according to one embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION The novel system transforms any Internet device into a Secured Internet Device (SID) by using a novel software application to create a unique access number used to identify any such device. As such, an Internet distribution system is created which provides a means of affording facile access to copyrighted or otherwise proprietary data over the Internet while simultaneously protecting the copyright interests of the data providers. The system requires that a unique identifier be authenticated and registered before any Internet device is allowed to access said system's data service providers through various vendor servers. Furthermore, the novel system incorporates the unique access number into an electronic watermark which is embedded within any data downloaded from said vendor servers so that any unauthorized redistribution of said data would be easily traced to the original source of said re-distribution.
Referring to the figures, Figure 1 is a schematic diagram of one embodiment of the present invention. Figure 1 shows the inter-networked copy-protected Internet distribution system components employing a modem-connected PC 1. Representative Vendor Servers 7, 8, and 9, are connected to a Security Router/Server 6. In order to access the novel system, the PC 1 must first access an Application Server 2. The Application Server 2 allows the PC 1 to download a novel software application which determines a unique access number for the PC 1. Said unique access number is called a Secured Internet Device access number. Once the unique access number is determined, the PC 1 is enabled as a Secured Internet Device, or "PCSID".
The PCSID 1 may then contact the Authentication Server 4 via virtual private network link 3. A customer service center at the Authentication Server 4 obtains customer information including address, phone number, and payment information. The Authentication Server 4 also authenticates and registers the PCSID 1 access number. It is also envisioned that, as an alternative to the Authentication Server 4, the PCSID 1 may also connect to the customer service center via a free access (800) telephone number. Said service center would collect customer information and authenticate PCSID 1 access numbers in the manner described above.
The Authentication Server 4 then transfers the information to the Security Server/Router 6. The Security Server/Router 6 stores customer information provided by the
Authentication Server 4 so that the PCSID 1 may subsequently access the Security Server/Router 6 via virtual private network link 5 without first accessing the Authentication Server 4. Once authenticated, the PCSID may access the vendor servers 7, 8, and 9 through the Security Server/Router 6. The Security Server/Router 6 tracks customer use including downloading of music or other data. This provides the detailed reports necessary for billing customers and providing royalty payments due to authors, composers and other such owners of copyrighted or otherwise protected data.
The novel system provides security and control for data from Vendor Servers 7, 8, and 9 to customer's PCSID 1 or any other Internet device made secure by the novel system. Because the customer's PCSID 1 may allow digital storage and duplication of data so provided, it is also envisioned that an extra layer of protection is provided via electronic watermark technology. This is accomplished by embedding the unique Secured Internet Device access number within an electronic watermark contained in all data accessed through the novel system. Using the Secured Internet Device access number embedded in the watermark, tracking of any unauthorized re-distribution of the digital data would be straightforward as it would be easy to verify the source of the re-distribution. Once the PCSID 1 is validated as a registered device, then requests for media sampling and/or download can be serviced directly via the Security Server/Router 6 via virtual private network link 5 without first accessing the Authentication Server 4. If download requests are made on behalf of a PCSID 1 via the Security Server/Router 6, then encrypted download information is sent from Vendor Servers 7, 8, and 9 to customer's PCSID 1 through
Security Server/Router 6 and virtual private network link 5. Included in said encrypted download information is an electronic watermark in which is embedded the SID access number which may be used to uniquely identify the source of any subsequently re-distributed copies of said information. Figure 2 depicts a flowchart of the SID distribution system registration process utilizing a PC as a sample Internet device. First, the customer accesses the Application Server 10. The customer then downloads the novel software application onto the customer's PC 11. The novel software application then determines an access number which is unique to the particular PC 12. The PC, now enabled as a PCSID, then accesses the Authentication Server 13. If the customer is accessing the novel system for the first time, the Authentication Server authenticates and registers the unique access number of the PCSID 15. A customer service center located at the Authentication Server records customer billing information 16. The authenticated PCSID is then allowed access Security Server/Router 17. The Security Server/Router affords the customer access to Vendor Servers from which the customer may sample or purchase content 18. Any data downloaded by the customer is tracked via the unique access number determined by the novel software application. Once a customer's PC has been authenticated and registered 15, and all customer billing information has been obtained 16, subsequent access to the system is granted on the basis of the authenticated unique access number 14, thus eliminating the need for steps 15 and 16, above. It is also envisioned that Once a customer's PC has been authenticated and registered 15, and all customer billing information has been obtained 16, all customer data may be stored on the Security Server/Router thereby allowing subsequent customer access to the Security Server/Router without first requiring access to the Authentication Server. Once authenticated and registered, the PC can be used freely within the conditions established by the service provider for sampling and usage of titles, groups of titles, other content, or other promotional schemes. The benefits that will be attained through the use of the present invention are multiple. For the end customer, this system provides legal access control to copyrighted music, for a low cost and also it gives great flexibility in content selection. For the recording industry, this invention provides a direct low cost Internet distribution capability that protects copyrighted music and other proprietary data, and derives a steady income stream. It also provides the capability to introduce and promote new artists with small followings with minimal cost.
For the various service providing companies, multiple income streams can be realized through patent licensing fees, fees per title, and advertising fees on the world- wide- web site. The service provider will also gain an ability to promote its own and new artists in a cost-effective manner.
Although this invention has been described above with reference to particular means, materials and embodiments, it is to be understood that the invention is not limited to these disclosed particulars, but extends instead to all equivalents within the scope of the following claims.

Claims

CLAIMSI claim:
1. A secured system for access to data over the Internet, the secured system comprising: a customer's Internet device having a unique access number; an application server accessible by said customer's Internet device; a software application resident in said application server, said software application being downloadable by said customer's Internet device to determine said unique access number of said customer's Internet device; and an authentication server also accessible by said customer's Internet device, said authentication server being adapted to provide access of said customer's Internet device to Internet data when said unique access number of said customer's Internet device has been determined, authenticated and registered by said authentication server.
2. The secured system of Claim 1 wherein said authentication server provides access of said customer's Internet device to a security server/router which in rum provides access to a vendor server containing copyrighted or otherwise proprietary data.
3. A method for providing secure access to data over the Internet, the method comprising: requiring a user of an Internet device with a unique access number to access an application server; downloading a software application from said application server to said Intemet device; determining said unique access number of said Internet device with the downloaded software application; and providing access to the Internet data through an authentication server which authenticates and registers said Internet device unique access number.
4. The method of Claim 3 wherein access is provided through the authentication server to a security server/router which in turn provides access to a vendor server containing copyrighted or otherwise proprietary data.
5. The method of Claim 3 wherein the accessed Intemet data is marked to identify it to said unique access number.
PCT/US2001/020684 2000-06-27 2001-06-27 Secured internet device WO2002001331A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001273066A AU2001273066A1 (en) 2000-06-27 2001-06-27 Secured internet device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US21446400P 2000-06-27 2000-06-27
US60/214,464 2000-06-27

Publications (2)

Publication Number Publication Date
WO2002001331A2 true WO2002001331A2 (en) 2002-01-03
WO2002001331A3 WO2002001331A3 (en) 2003-05-01

Family

ID=22799172

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/020684 WO2002001331A2 (en) 2000-06-27 2001-06-27 Secured internet device

Country Status (2)

Country Link
AU (1) AU2001273066A1 (en)
WO (1) WO2002001331A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1345105A2 (en) * 2002-03-15 2003-09-17 Yamaha Corporation Distribution system of contents using terminal identification embedded in licenses
EP1512081A4 (en) * 2002-06-07 2007-01-17 Thomson Licensing Method and apparatus for controlling the distribution of digitally encoded data in a network
EP2270732A1 (en) * 2002-01-08 2011-01-05 TiVo, Inc. Electronic content distribution and exchange system
US9253174B1 (en) 2013-02-28 2016-02-02 Google Inc. Providing a second factor authorization
US9607328B2 (en) 1999-03-30 2017-03-28 Tivo Solutions Inc. Electronic content distribution and exchange system
US9858334B2 (en) 1999-03-30 2018-01-02 Tivo Solutions Inc. Distributed database management system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998044402A1 (en) * 1997-03-27 1998-10-08 British Telecommunications Public Limited Company Copy protection of data
WO1999045491A1 (en) * 1998-03-04 1999-09-10 Nuvomedia, Inc. Digital rights management system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998044402A1 (en) * 1997-03-27 1998-10-08 British Telecommunications Public Limited Company Copy protection of data
WO1999045491A1 (en) * 1998-03-04 1999-09-10 Nuvomedia, Inc. Digital rights management system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9607328B2 (en) 1999-03-30 2017-03-28 Tivo Solutions Inc. Electronic content distribution and exchange system
US9858334B2 (en) 1999-03-30 2018-01-02 Tivo Solutions Inc. Distributed database management system
EP2270732A1 (en) * 2002-01-08 2011-01-05 TiVo, Inc. Electronic content distribution and exchange system
EP1345105A2 (en) * 2002-03-15 2003-09-17 Yamaha Corporation Distribution system of contents using terminal identification embedded in licenses
EP1345105A3 (en) * 2002-03-15 2005-12-14 Yamaha Corporation Distribution system of contents using terminal identification embedded in licenses
EP1712978A3 (en) * 2002-03-15 2006-12-06 Yamaha Corporation Distribution system of contents using terminal identification embedded in licenses
US8086537B2 (en) 2002-03-15 2011-12-27 Yamaha Corporation Distribution system of contents embedding license machine ID
EP1512081A4 (en) * 2002-06-07 2007-01-17 Thomson Licensing Method and apparatus for controlling the distribution of digitally encoded data in a network
US9253174B1 (en) 2013-02-28 2016-02-02 Google Inc. Providing a second factor authorization

Also Published As

Publication number Publication date
AU2001273066A1 (en) 2002-01-08
WO2002001331A3 (en) 2003-05-01

Similar Documents

Publication Publication Date Title
CN1332323C (en) Content delivery system, information processing apparatus or information processing method, and computer program
RU2260918C2 (en) System and method for safe and comfortable control of digital electronic content
EP1625479B1 (en) Method and system for controlled media sharing in a network
KR100446266B1 (en) Contents distributing system, portable terminal player and contents providing method
JP4669230B2 (en) Digital media clearing platform
EP1665717B1 (en) Method for preventing unauthorized distribution of media content
US7426750B2 (en) Network-based content distribution system
US7200575B2 (en) Managing access to digital content
US6732106B2 (en) Digital data distribution system
US20050091679A1 (en) Content distribution method, content obtaining device and method, and program
US20050021995A1 (en) Application rights management in a mobile environment
US20070136205A1 (en) Digital rights management unit for a digital rights management system
JP3615485B2 (en) Electronic content transaction method and system
JP2002541528A (en) Protected online music distribution system
US20040128364A1 (en) Secured internet media player
WO2001061913A2 (en) Network-based content distribution system
US20140208446A1 (en) Reporting information about users who obtain copyrighted media using a network in an unauthorized manner
JP3485911B2 (en) Data usage restriction setting method, data usage restriction setting device, data usage restriction setting program, and recording medium recording the program
CN1543119A (en) Method for operating internet site offering encrypted contents
US20120042385A1 (en) Protecting copyrighted media with monitoring logic
KR100752511B1 (en) System for providing digital contents by using digital finger printing
WO2002001331A2 (en) Secured internet device
CA2410165A1 (en) Secured internet media player
KR20060015797A (en) Digital rights management system of mobile content for pda
Kwok et al. DIGITAL RIGHTS MANAGEMENT FOR MOBILE COMMERCE USING WEB SERVICES.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP