WO2002052388A2 - Method and apparatus for controlling access to multimedia files - Google Patents

Method and apparatus for controlling access to multimedia files Download PDF

Info

Publication number
WO2002052388A2
WO2002052388A2 PCT/GB2001/005772 GB0105772W WO02052388A2 WO 2002052388 A2 WO2002052388 A2 WO 2002052388A2 GB 0105772 W GB0105772 W GB 0105772W WO 02052388 A2 WO02052388 A2 WO 02052388A2
Authority
WO
WIPO (PCT)
Prior art keywords
content
executable object
various
user
single executable
Prior art date
Application number
PCT/GB2001/005772
Other languages
French (fr)
Other versions
WO2002052388A3 (en
Inventor
Jane Lesley Aldridge
Philip Michael Gaffney
Original Assignee
Internet Extra Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Internet Extra Ltd. filed Critical Internet Extra Ltd.
Publication of WO2002052388A2 publication Critical patent/WO2002052388A2/en
Publication of WO2002052388A3 publication Critical patent/WO2002052388A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • the present invention relates to a method and apparatus for enabling and disabling access to various multimedia content.
  • multimedia files that are stored in electronic format may wish to protect the content from unauthorised use or from usage outside the conditions agreed as part of the subscription. Examples might be restricting access to specific locations, specific time periods or a specific number of accesses. It is common for such multimedia files to be supplied in a format that can be accessed by using a player that has the capability to display content that is coded in a specific format. It is generally possible to copy the original file and transfer it to an alternative location that also has access to a similar player and therefore have equal access to the same content.
  • the present invention describes apparatus and a method for facilitating the supply of such multimedia content in a form that allows the originator to maintain control over access to the content. This is particularly beneficial where the multimedia content is provided on a subscription basis or is being provided for a restricted period of time.
  • Examples of the use of such a system are as follows: a. provision of a video such as a movie where the subscription is made on a rental basis for a fixed period or on a pay-per-view basis; b. provision of music where playback is restricted to a single playback machine; c. provision of documentation such as an examination paper where access is not permitted before a fixed time; d. provision of a price list document where prices are only current for a specified period of time; and e. provision of training material where training is provided for a fixed location for a fixed period of time only.
  • Figure 1 is a schematic diagram of apparatus assembled according to the current invention.
  • the executable object is a single entity designed to execute within the users end-terminal.
  • the executable object may exist as a single file or may be distributed between several files. It may operate in conjunction or be integrated with other apparatus. Examples might be as software loaded onto a computer or as a component within an appliance, such as a television set or audio playback system.
  • the executable object will be created by processing together the multimedia content, the appropriate multimedia player, the access control and the key parameters.
  • the key parameters will be compiled by the content originator from information supplied by the user, either manually or by an automated process. These key parameters will be embedded as part of the executable object.
  • the executable object will also contain encryption keys that are agreed with the content originator .
  • the executable object is supplied to the user as a single entity rather than separate multimedia content and player.
  • the practical restrictions on distribution of the executable object may necessitate that it is supplied in a number of smaller parts although it will be necessary for these parts to be re-assembled for it to function as a whole.
  • the executable object When the executable object is activated by the user it will first check that the key parameters stored within the object can be validated by comparing them with the appropriate parameters at the users end-station. These parameters may be related to any aspect of the users situation that may be appropriate to the authorisation for access to the multimedia content. These parameters may include for example, the user's password, the end- station serial number, the operating system registration number, the data or time, codes provided by the content originator and the like.
  • the executable object will directly decrypt and play the content on an incremental basis through the end-terminal.
  • the decryption process will take place within the executable object and does not result in the direct availability of decrypted content to the user other than as is necessarily displayed by the embedded player.
  • the executable object will not proceed with decryption of the content and playback.
  • the executable object may request that the user re-validates the registration with the originator of the multimedia content. This transaction with the content originator may be performed manually by the user entering new access codes. Alternatively the executable object may communicate directly with the content provider to re-validate the subscription utilising the encryption keys previously agreed.
  • the executable object may contain the facility to detect unsuccessful attempts to gain access to the content and take steps to erase or otherwise disable it.
  • the method provides a method for creating an executable object that is a single entity containing the multimedia content with an embedded player.
  • the method also embeds an access control feature that contains key parameters determined from the user when the provision of the multimedia content is requested.
  • the executable object is then provided to the user in a form compatible with the users end-station.
  • the originators system When the selection and any necessary subscription process is completed an appropriate player or viewer is automatically provided by the originators system.
  • the originators system then requests certain pertinent information related to the chosen key parameters either from the user or directly from the user's end-station equipment.
  • This information may include for example, data that uniquely identifies the user, the user' s end-station or other features related to the user' s situation such as the end-station operating system software registration code or network adapter identity or the like, or combinations of these.
  • the content originator' s system then processes the multimedia content, the appropriate player, the access control and the key parameters into a single entity known as the executable object.
  • This processing may take the form of a compilation process that would be familiar to one skilled in the art of creating computer software.
  • This processing may include commonly available techniques for encryption and embedding of data with program functionality such as, for example, public/private key encryption, object-oriented programming and the like.
  • the resulting executable object may than be provided to the user and will only perform the desired function provided that the parameters specified by the included keys are matched at the time of execution on the user' s end-station.
  • • content can be provided to users without regard for the availability of a compatible player at the user's end-station; • content can only be copied along with the encapsulated access control and key parameters; • copied content can only be accessed provided the key parameters continue to be correctly validated;
  • the executable object 1 is a single executable entity that encapsulates all multimedia content, player, access control and key parameters.
  • the executable object is individually built for each user and will only function to play the content whilst the key parameters can be validated.
  • the embedded player will be individually selected to match the format of the content being included. This may be various types of content including for example, video, audio, presentations, documents, games, books, web pages, magazines, animations and the like.
  • the embedded player 2 is incorporated as an integral part of the executable object. It is therefore possible for the content encoding to be specifically matched to the player. In this way it can be arranged that the content is effectively playable only with the individual instance of player provided and only then in conjunction with the access control and key parameters which are also incorporated in the same way.
  • the player may be of various types to suit the content being displayed. For example, a display program for viewing video, a playback device for listening to audio, a viewer for viewing documents, a console for playing games and the like.
  • the access control and key parameters 3 are embedded within the specific multimedia content player.
  • the access control module is responsible for checking that the embedded key parameters can be appropriately matched before the embedded player is allowed to be run.
  • the key parameters are specified by the originators system at the time that the executable object is built.
  • the access control may allow the user the option to renew the subscription. This may be accomplished by the user renewing the subscription directly with the originators system and the access control then communicating with the system to verify the new key parameters, utilising encryption over the communication channel as appropriate.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

Apparatus consisting of a single executable object, or multiple objects acting together, that contain multimedia or similar content and an associated player that acts to control access to the said content. The single executable object may be provided as a series of smaller blocks, the order of which may have been shuffled, and reconstructed using a key supplied by the content provider. The single executable object may also contain various key series in order to further control access to the content where elements of these keys may also be derived from identifying features provided by the user or the user's hardware or software. Keys thus derived from locally identified features may be incorporated within the single executable object as it is reconstructed thus ensuring that the content may only be viewed or be copied as intended by the content provider.

Description

METHOD AND APPARATUS FOR CONTROLLING ACCESS
TO MULTIMEDIA FILES
DESIGN AND IMPLEMENTATION
The present invention relates to a method and apparatus for enabling and disabling access to various multimedia content.
Where it is desired to send multimedia files that are stored in electronic format to another user it is possible that the originator may wish to protect the content from unauthorised use or from usage outside the conditions agreed as part of the subscription. Examples might be restricting access to specific locations, specific time periods or a specific number of accesses. It is common for such multimedia files to be supplied in a format that can be accessed by using a player that has the capability to display content that is coded in a specific format. It is generally possible to copy the original file and transfer it to an alternative location that also has access to a similar player and therefore have equal access to the same content.
It is commonplace for the originators of such content to encrypt these files so the content cannot be accessed by the player until it has been decrypted using a key. The provision of the key may be restricted by the originator to control access to the content. Once a valid key has been provided the decoded content may then be accessed by the player. It may also be copied many times and be distributed further once it is removed from its encrypted state. Thus further distribution of the content can no longer be controlled and may result in a significant loss of revenue for the content originator.
The present invention describes apparatus and a method for facilitating the supply of such multimedia content in a form that allows the originator to maintain control over access to the content. This is particularly beneficial where the multimedia content is provided on a subscription basis or is being provided for a restricted period of time.
Examples of the use of such a system are as follows: a. provision of a video such as a movie where the subscription is made on a rental basis for a fixed period or on a pay-per-view basis; b. provision of music where playback is restricted to a single playback machine; c. provision of documentation such as an examination paper where access is not permitted before a fixed time; d. provision of a price list document where prices are only current for a specified period of time; and e. provision of training material where training is provided for a fixed location for a fixed period of time only.
In accordance with the present invention, we provide apparatus for encrypting and playing multimedia files, as follows: a. selecting the multimedia content; b. selecting the appropriate multimedia player; c. collecting appropriate key data from the user; d. selecting the appropriate key parameters; e. processing the content, player, key control and key parameters together; f. incorporating the resulting data into a single executable object; g. providing the single executable object to the user; h. checking that current key data matches the stored key parameters; i. decrypting the multimedia content on an incremental basis; j . playing the multimedia content on an incremental basis; k. communicating with the multimedia content originator by encrypted means; and 1. updating the key parameters maintained within the executable object. Also, in accordance with the present invention, we provide a method for : a. selecting the multimedia content; b. selecting the multimedia player; c. determining certain key parameters from the user; d. processing the content, player, access control and key parameters together into a single executable object; e. providing this single executable object to the user; f. executing the single object; g. checking the key parameters previously agreed with the user; h. playing the multimedia content directly from the executable object; i. further checking the key parameters previously agreed with the user; j . disabling the operation of the executable object where such parameters do not match; k. communicating with the originator of the multimedia content; 1. exchanging encrypted information with the originator of the multimedia content; and m. updating the key parameters stored within the executable object. Examples of the present invention will now be described with reference to the accompanying drawing, in which: -
Figure 1 is a schematic diagram of apparatus assembled according to the current invention.
The executable object
The executable object is a single entity designed to execute within the users end-terminal. The executable object may exist as a single file or may be distributed between several files. It may operate in conjunction or be integrated with other apparatus. Examples might be as software loaded onto a computer or as a component within an appliance, such as a television set or audio playback system.
The executable object will be created by processing together the multimedia content, the appropriate multimedia player, the access control and the key parameters.
The key parameters will be compiled by the content originator from information supplied by the user, either manually or by an automated process. These key parameters will be embedded as part of the executable object. The executable object will also contain encryption keys that are agreed with the content originator .
The executable object is supplied to the user as a single entity rather than separate multimedia content and player. The practical restrictions on distribution of the executable object may necessitate that it is supplied in a number of smaller parts although it will be necessary for these parts to be re-assembled for it to function as a whole. When the executable object is activated by the user it will first check that the key parameters stored within the object can be validated by comparing them with the appropriate parameters at the users end-station. These parameters may be related to any aspect of the users situation that may be appropriate to the authorisation for access to the multimedia content. These parameters may include for example, the user's password, the end- station serial number, the operating system registration number, the data or time, codes provided by the content originator and the like.
Subject to the key parameters being validated the executable object will directly decrypt and play the content on an incremental basis through the end-terminal. The decryption process will take place within the executable object and does not result in the direct availability of decrypted content to the user other than as is necessarily displayed by the embedded player. Where the key parameters are not met the executable object will not proceed with decryption of the content and playback. The executable object may request that the user re-validates the registration with the originator of the multimedia content. This transaction with the content originator may be performed manually by the user entering new access codes. Alternatively the executable object may communicate directly with the content provider to re-validate the subscription utilising the encryption keys previously agreed. The executable object may contain the facility to detect unsuccessful attempts to gain access to the content and take steps to erase or otherwise disable it.
The method The invention provides a method for creating an executable object that is a single entity containing the multimedia content with an embedded player. The method also embeds an access control feature that contains key parameters determined from the user when the provision of the multimedia content is requested.
The executable object is then provided to the user in a form compatible with the users end-station.
When the user requires access to multimedia content, it is possible for the user to select the appropriate content from facilities supplied by the content originator.
When the selection and any necessary subscription process is completed an appropriate player or viewer is automatically provided by the originators system. The originators system then requests certain pertinent information related to the chosen key parameters either from the user or directly from the user's end-station equipment. This information may include for example, data that uniquely identifies the user, the user' s end-station or other features related to the user' s situation such as the end-station operating system software registration code or network adapter identity or the like, or combinations of these.
The content originator' s system then processes the multimedia content, the appropriate player, the access control and the key parameters into a single entity known as the executable object. This processing may take the form of a compilation process that would be familiar to one skilled in the art of creating computer software. This processing may include commonly available techniques for encryption and embedding of data with program functionality such as, for example, public/private key encryption, object-oriented programming and the like.
The resulting executable object may than be provided to the user and will only perform the desired function provided that the parameters specified by the included keys are matched at the time of execution on the user' s end-station.
The user will gain the following benefits from the system:
• multimedia content can be obtained without prior availability of a compatible player or viewer;
• subscription and licensing is automatically managed; and
• subscription and licensing renewal is automatically managed. The content originator will gain the following benefits from the system:
• content can be provided to users without regard for the availability of a compatible player at the user's end-station; • content can only be copied along with the encapsulated access control and key parameters; • copied content can only be accessed provided the key parameters continue to be correctly validated;
• content access will automatically be disabled where key parameters have expired;
• access can be restricted to approved machines;
• access can be restricted to approved systems;
• access can be restricted to approved users;
• access can be restricted to a fixed time period; and
• access can be restricted to a maximum number of usages;
Appendix A
Each of the major components will now be described in brief.
Executable object 1
The executable object 1 is a single executable entity that encapsulates all multimedia content, player, access control and key parameters. The executable object is individually built for each user and will only function to play the content whilst the key parameters can be validated. The embedded player will be individually selected to match the format of the content being included. This may be various types of content including for example, video, audio, presentations, documents, games, books, web pages, magazines, animations and the like.
Embedded player 2 The embedded player 2 is incorporated as an integral part of the executable object. It is therefore possible for the content encoding to be specifically matched to the player. In this way it can be arranged that the content is effectively playable only with the individual instance of player provided and only then in conjunction with the access control and key parameters which are also incorporated in the same way. The player may be of various types to suit the content being displayed. For example, a display program for viewing video, a playback device for listening to audio, a viewer for viewing documents, a console for playing games and the like.
Access control and key parameters 3
The access control and key parameters 3 are embedded within the specific multimedia content player. The access control module is responsible for checking that the embedded key parameters can be appropriately matched before the embedded player is allowed to be run. The key parameters are specified by the originators system at the time that the executable object is built. The access control may allow the user the option to renew the subscription. This may be accomplished by the user renewing the subscription directly with the originators system and the access control then communicating with the system to verify the new key parameters, utilising encryption over the communication channel as appropriate.

Claims

l.A method of enabling and disabling access to various multimedia content whereby the player used to view the content and the content itself are wrapped together as a single executable object, or multiple objects linked to function together only as a single entity.
2.A method according to Claim 1 wherein a means of enabling and disabling access to the content by use of various keys is also included within the single executable object.
3.A Method according to any of the preceding claims whereby the single executable object is reconstructed from a series of smaller blocks which may be provided to the user on an incremental basis.
4.A method according to Claim 3 whereby the order of the smaller blocks are shuffled before delivery according to various key series known to the content provider and the successful reconstruction of the executable object is dependant on provision of the matching keys.
5.A method according to any of the preceding claims whereby the various keys used to control access to the content are dependant on the identifying characteristics of the user such as a password, or the user's hardware or software such as the likes of various serial numbers.
6.A method according to claim 5 whereby parts of the key series are determined from characteristics ascertained locally during the reconstruction of the single executable object from the smaller blocks.
7. method according to any of the preceding claims whereby the various data that comprises the player, content or smaller blocks may be further encrypted or coded by various standard means.
8.Apparatus for controlling access to various multimedia content comprising a single executable object, or multiple objects linked to function together only as a single entity, itself containing both the playback device and the multimedia content whereby the content may not be copied independently of the playback device.
9.Apparatus according to Claim 8 wherein the single executable object is adapted to include a means of enabling and disabling access to the content by use of various keys.
10.Apparatus whereby the single executable object according to Claim 8 or Claim 9 is reconstructed from a series of smaller blocks which may be provided to the user on an incremental basis.
11.Apparatus according to Claim 10 and so adapted that the single executable object is reconstructed from smaller blocks which are shuffled before delivery according to various key series known to the content provider and the successful reconstruction of the executable object is dependant on provision of the matching keys.
12.Apparatus according to Claim 8 or Claim 9 whereby the single executable object is adapted so that the various keys used to control access to the content are dependant on the identifying characteristics of the user such as a password, or the user's hardware or software such as the likes of various serial numbers.
13.Apparatus according to Claim 10 or Claim 11 and so adapted as to determine parts of the key series from characteristics ascertained locally during the process of reconstruction of the single executable object from the smaller blocks.
14.Apparatus according to Claim 8, Claim 9 or Claim 12 and so adapted wherein the various data that comprises the player or content may be further encrypted or coded by various standard means.
15.Apparatus according to Claims 10 to 14 and so adapted wherein the various data that comprises the smaller blocks used to reconstruct the single executable object may be further encrypted or coded by various standard means .
16.A single executable object used to control access to various content substantially as herein described above and illustrated in the accompanying drawing.
PCT/GB2001/005772 2000-12-27 2001-12-24 Method and apparatus for controlling access to multimedia files WO2002052388A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0031663.8A GB0031663D0 (en) 2000-12-27 2000-12-27 Method and apparatus for controlling access to multimedia files design and implementation
GB0031663.8 2000-12-27

Publications (2)

Publication Number Publication Date
WO2002052388A2 true WO2002052388A2 (en) 2002-07-04
WO2002052388A3 WO2002052388A3 (en) 2003-11-06

Family

ID=9905907

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2001/005772 WO2002052388A2 (en) 2000-12-27 2001-12-24 Method and apparatus for controlling access to multimedia files

Country Status (2)

Country Link
GB (1) GB0031663D0 (en)
WO (1) WO2002052388A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004070538A2 (en) * 2003-02-03 2004-08-19 Tennessee Pacific Group, L.L.C. Distribution and rights management of digital content
EP1602999A1 (en) * 2004-06-04 2005-12-07 Swisscom AG Data reproduction method
EP1626327A1 (en) * 2003-02-03 2006-02-15 Tennessee Pacific Group. L.L.C. Distribution and rights management of digital content
US7283587B2 (en) 2003-12-18 2007-10-16 Intel Corporation Distortion measurement
WO2008142633A1 (en) * 2007-05-22 2008-11-27 Koninklijke Philips Electronics N.V. Data security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997044736A1 (en) * 1996-05-23 1997-11-27 Apple Computer, Inc. Method and apparatus for two-level copy protection
EP0840194A2 (en) * 1996-10-29 1998-05-06 Matsushita Electric Industrial Co., Ltd. System and method for controlling the use of a package of distributed application software
EP0999488A2 (en) * 1998-10-23 2000-05-10 Xerox Corporation Self-protecting documents

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997044736A1 (en) * 1996-05-23 1997-11-27 Apple Computer, Inc. Method and apparatus for two-level copy protection
EP0840194A2 (en) * 1996-10-29 1998-05-06 Matsushita Electric Industrial Co., Ltd. System and method for controlling the use of a package of distributed application software
EP0999488A2 (en) * 1998-10-23 2000-05-10 Xerox Corporation Self-protecting documents

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RAMANUJAPURAM A ET AL: "DIGITAL CONTENT & INTELLECTUAL PROPERTY RIGHTS A SPECIFICATION LANGUAGE AND TOOLS FOR RIGHTS MANAGEMENT" DR. DOBB'S JOURNAL, M&T PUBL., REDWOOD CITY, CA,, US, vol. 23, no. 12, December 1998 (1998-12), pages 20-22,24,26-27, XP000997135 ISSN: 1044-789X *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004070538A2 (en) * 2003-02-03 2004-08-19 Tennessee Pacific Group, L.L.C. Distribution and rights management of digital content
WO2004070538A3 (en) * 2003-02-03 2005-02-10 Tennessee Pacific Group L L C Distribution and rights management of digital content
EP1626327A1 (en) * 2003-02-03 2006-02-15 Tennessee Pacific Group. L.L.C. Distribution and rights management of digital content
EA009793B1 (en) * 2003-02-03 2008-04-28 ТЕННЕССИ ПАСИФИК ГРУП, Эл. Эл. Си. Distribution and rights management of digital content
US7283587B2 (en) 2003-12-18 2007-10-16 Intel Corporation Distortion measurement
EP1602999A1 (en) * 2004-06-04 2005-12-07 Swisscom AG Data reproduction method
WO2008142633A1 (en) * 2007-05-22 2008-11-27 Koninklijke Philips Electronics N.V. Data security
US9025765B2 (en) 2007-05-22 2015-05-05 Irdeto B.V. Data security

Also Published As

Publication number Publication date
WO2002052388A3 (en) 2003-11-06
GB0031663D0 (en) 2001-02-07

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
DK1402680T3 (en) System and method for a commercial distribution system and multimedieleje-
KR100467929B1 (en) System for protecting and managing digital contents
US7174568B2 (en) Method and system for securely distributing computer software products
US7836311B2 (en) Information processing apparatus, information processing method, and computer program used therewith
US7117365B1 (en) Method and device for generating a data stream and method and device for playing back a data stream
US7613303B2 (en) Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster
US8627415B2 (en) System and method for secure commercial multimedia rental and distribution over secure connections
US20060059573A1 (en) Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster
US20070044159A1 (en) Information processing apparatus
US20020169972A1 (en) Information storage medium, information processing system, content distribution server, methods and programs therefor, and storage medium for such programs
US20090013179A1 (en) Controlling With Rights Objects Delivery Of Broadcast Encryption Content For A Network Cluster From A Content Server Outside The Cluster
KR20020083851A (en) Method of protecting and managing digital contents and system for using thereof
JP2004227283A (en) Contents distribution system, information processor or information processing method and computer program
JP2004350150A (en) Content distribution service providing apparatus and content distribution service terminal device
JP5185271B2 (en) Digital content distribution control
KR20060135833A (en) Method of and system for generating an authorized domain
JP2009530917A (en) A federated digital rights management mechanism including a trusted system
KR20060109266A (en) Broadcasting content protection/management system
WO2002052388A2 (en) Method and apparatus for controlling access to multimedia files
KR20020013241A (en) Data encription system and method thereof and portable data-carring device for use in the system
US20040034796A1 (en) Copy- protection system and method
KR20020081762A (en) Security service method for digital content and system therefor
WO2002035331A2 (en) Copy-protection system and method
WO2002031618A2 (en) Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP