WO2002093922A1 - Procede et agencement dans un reseau de communications - Google Patents

Procede et agencement dans un reseau de communications Download PDF

Info

Publication number
WO2002093922A1
WO2002093922A1 PCT/SE2002/000952 SE0200952W WO02093922A1 WO 2002093922 A1 WO2002093922 A1 WO 2002093922A1 SE 0200952 W SE0200952 W SE 0200952W WO 02093922 A1 WO02093922 A1 WO 02093922A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
receiver
key
licence
media file
Prior art date
Application number
PCT/SE2002/000952
Other languages
English (en)
Inventor
Wille Faler
Peter Arvidsson
Original Assignee
Network Avalance Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from SE0101737A external-priority patent/SE0101737D0/xx
Application filed by Network Avalance Ab filed Critical Network Avalance Ab
Publication of WO2002093922A1 publication Critical patent/WO2002093922A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8106Monomedia components thereof involving special audio data, e.g. different tracks for different languages
    • H04N21/8113Monomedia components thereof involving special audio data, e.g. different tracks for different languages comprising music, e.g. song in MP3 format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • This invention relates to a method and an arrangement for distribution of a media file in an communications network.
  • the invention deals with the handling of licences for providing a secure distribution of said media files.
  • Piracy and illegal copying of products that can be digitally distributed is fiercely common today. This applies mostly to music and computer software, however as broadband access becomes more and more common we can expect to see the same kind of development in other areas such as movies and books. Developments have begun in these areas to overcome the problem.
  • WO00/27067 shows the use of licensed files that are encrypted to a particular unique user/computer is previously known. This solution strongly restricts the distribution of files that involve this kind of strong security. There is basically only one way to distribute and get a license to these files, which is through downloading them from a central server. Therefore even if a user, hereby referred to as sender, would send/copy, to another user hereby referred to as receiver, a file licensed to the sender, the receiver would have to download the file once again from the central server in order to obtain a licensed version of the file. This is cumbersome.
  • Another known solution used in e.g. Digital Video Disks (DVD) and in Microsoft® Windows ® Media Audio (WMA) format is that there only exists one encryption key to all files that is common to all users of a particular file/files. This solution sometimes allows the possibility of copying and free distribution.
  • a disadvantage is that the security level of this solution is low since the motivation, means and value of cracldng a key is a large since cracking the key means getting unlimited access to all files.
  • Another disadvantage is that the tracking of files is not done on an individual basis, and therefore the information that is provided is that user X has a copy of the specific file, with no knowledge whatsoever about who might have had a licensed copy of the file previously.
  • PKI Public Key Infrastructure
  • the objective problem of the present invention is to provide a media distribution system and a method for distributing media, which makes it advantageous for any user to send a copy of the media file to another user but makes it more difficult to piracy copy the full version of the media file.
  • a media file having the features of claim 1 having the features of claim 1
  • a licence issuing server having the features of claim 6 a user client having the features of claim 11
  • a media distribution system comprising the media file, the license issuing server and the user client, having the features of claim 19 and a method having the features of claim 20.
  • the method implemented in the media distribution system comprising the steps of: sending a media file from the sender directly to the receiver, the media file comprising a full version media file which only is possible to decrypt for playback by the sender who has obtained a licence for it from a licence issuing server, and only will be possible to decrypt by the receiver when the receiver has purchased a licence for it from the server since the licence comprises means for transforming the full version media file such that it is not possible to decrypt by the sender anymore, but only by the receiver; sending a request from the user client in the receiver to the licence issuing server for purchasing a licence for the full version file of the media, said request comprising identity of the media file and identity of the sender; the receiver obtaining the requested licence; the user client of the receiver transforming the full version media file such that it is not possible to decrypt by the sender anymore, but only by the receiver by means of said licence; - the server registering that the sender distributed the media file leading to licence purchase and that the receiver purchased said licence, makes it possible
  • An advantage with the present invention is that it is possible to reward a user that sends a copy of a media file to another user which other user purchases a licence for the media file.
  • Figure 1 shows an exemplary media distribution system according to the present invention.
  • Figure 2 depicts the media file according to the present invention.
  • Figure 3 shows the user client architecture of a viewer of a user terminal.
  • FIG 1 shows an exemplary media distribution system 100 according to the present invention.
  • a system comprises users that has a media file to which they own a licence and which users intend to send a copy of the media file over a communications network, such as an Internet Protocol (IP) network, to other users
  • IP Internet Protocol
  • the system depicted in Figure 1 comprises a first terminal S of a first user, which first terminal S is adapted to include a media file and a licence for using the media file.
  • the file or a copy of it is to be distributed 101 to a second terminal R of a second user.
  • the first terminal of the first user is referred to as the sender S and the second terminal of the second user is referred to as the receiver R.
  • the media file to be distributed is depicted in Figure 2.
  • the media file is some kind of digital file such as a music file, a digital movie, an electronic book, software, etc. that the first user wishes to distribute 101 to the second user.
  • the media file to be distributed 101 to the receiver R constitutes a container file 201.
  • the container file 201 is encrypted with an RC5TM algorithm encryption or some other private key algorithm.
  • the key is embedded in the client program code or some file associated with the client program.
  • the container file is also referred to as the container file level 1 201.
  • the container file 201 comprises an identity file 211 comprising an identity associated to the last user obtaining a licence of the present media file from the server (103).
  • the container file 201 further comprises a full version file of the media 205, which might be compressed, constituting a Level 2 container 207.
  • the full version of the media file 205 or alternatively the Level 2 container 207 if used, is encrypted with a file key 209, which is comprised in the container file 201.
  • the container file 201 comprises an identity file 211 containing an file identity associated to the last user purchasing a licence of the present media file at the server (103).
  • the file identity will be updated when a licence is obtained.
  • the identity is unique for one licence and might be used to track who the file was last encrypted for.
  • the container file 201 further comprises the above mentioned file key 209 which is used to encrypt the full version media file 205 or a Level 2 container 207 if it is used and is a key for a symmetric encryption algorithm.
  • the file key 209 is unique to one licence and one user.
  • the file key 209 is stored in the container file 201 in encrypted form, encrypted by the server 103 by means of the last licensed user's encryption-key, i.e. the encryption key associated to the sender S.
  • the receiver R cannot decrypt the encrypted file key 209 until he has purchased a licence, it is still only the sender S that can decrypt the file key.
  • the receiver R extracts the file identity 211 from the container file 201 and sends it to the server 103.
  • the server 103 retrieves the file key 209 in the database 105 by means of the obtained file identity and extracts the file key 209. The server 103 then sends it unencrypted back to the client of the receiver R who decrypts the full version media file 205 or a Level 2 container 207 if it is used. The encrypted file key 209 is then destroyed. Upon purchase the server 103 further creates a new file key 209, also referred to as the second file key 209, associated to the receiver R and to the specific media file. The new file key 209 is encrypted by the encryption key associated to the receiver R and is sent to the receiver R who stores the file key 209 encrypted within the container file 201.
  • This new file key 209 will be used for decrypt the full version media file 205, the subsequent time the receiver replays the full version media file and thereafter. If the receiver R sends the container file 201 to another user, this user cannot use the file key 209 to decrypt the full version media file for playback because the file key 209 is encrypted and the only one that can decrypt it is the receiver R. The other user has to purchase a licence to be capable of decrypting the file key 209. The user client
  • Figure 3 shows the user client architecture of a viewer 300 of a user terminal such as the sender S and the receiver R.
  • the client architecture comprises an interaction layer 301 towards a user 303.
  • It further comprises a viewer/player component 305 and an encryption/decryption component 307 acting on the application layer 309.
  • the interaction layer 301, the viewer/player component 305 and the encryption/ decryption component 307 are fully integrated in the same application.
  • the interaction layer 301 is the only entity that at least partly OK? has to be adapted for different platforms, except for the fact that the client-application has to be compiled for each different platform.
  • the interaction-layer is specific for PC (Windows, Unix, Mac, Linux) and there are other platform specific interaction-layers for Palm, Pocket PC, mp3- players and future stereos and other platforms.
  • the viewer/player component 305 is specific for the intended media-type, i.e. a movie- viewer, music-player, book-browser etc. This together with the specific interaction-layer handles all functions related directly related to the usage of the actual media format once decrypted at runtime. Typically associated mandatory program files for play list 311 and settings 313 acts on the viewer/player component 305.
  • the setting 313 is a standard setting file. It holds the settings for all the settings available for the current player/viewer application.
  • the present invention is based on PKI encryption like an RSA or some other public-key algorithm for these keys.
  • the keys are defined as follows:
  • Personal key is the key that a user has physically on his machine and uses to decrypt licensed files (or more precisely: file-keys) and other decrypted information.
  • Encryption key is the key a user does not have, it is used by the server to encrypt file-keys and other information on purchase.
  • Associated mandatory program files for encrypted personal key 315, for license 317 and for user information 319 acts on the encryption/decryption component 307.
  • the encrypted personal key program file 315 is the physical file that contains the personal-key. However the personal-key is encrypted using an RC5 algorithm or some other personal key encryption algorithm and a key generated on the fly using some semi- random elements or in any other way being made unreadable for the user.
  • the license program file 317 comprises the file-identities of all the files a user owns licenses for. Before the player/viewer starts the playback (or in any other way to display the content) of a file encrypted into one of our associated file-types it checks 219 the license-file 213 to determine the correct behaviour for the file:
  • a license exists, it decrypts container level-2 207 and sends the full version of the media stream for playback or usage in the viewer 215.
  • the user information program file 319 is an XML/SGML-file that keeps track of the basic user information like username, user-id, name, address, birthday and so on.
  • the encryption/decryption component 307 handles encryption and decryption matters such as:
  • Decryption of the encrypted personal key into the personal-key 217 The personal key is stored in the main memory M, as an encrypted file. Key-handling protocol on purchase of a license. - Decryption of licensed files referring to container level 2 207. Sending of media stream to the player/ viewer component. Decryption of container level 1 201.
  • the license issuing server 103 is depicted in Figure 1.
  • a user that wishes to view the preview version of the media or the full version of the media file requires making an installation and registration.
  • the server 103 handles this installation and registration.
  • a user that has downloaded a client program sends a request for a personal key to the server 103.
  • the server creates a key pair, i.e. a personal key and an encryption key.
  • the encryption key is associated to the user and saved in a database 105 of the server 103.
  • the personal key is sent to the requesting user.
  • When the user later purchases a licence it will be used by the server 103 to encrypt the file key 209 that will be sent to the user.
  • the personal key is sent to the requesting user in a Secure Socket Layer (SSL) encrypted or any similar encryption method for secure connection.
  • SSL Secure Socket Layer
  • server Upon installation, server also registers a user account that e.g. is used for tracking of license purchased of a specific media files, file keys, it is also used for payments and keeping track of/using commissions associated to the new user and stores the register data in the database 105.
  • a password might also be registered.
  • the receiver R When registered , it is possible for the receiver R to playback the preview media file 203 within the specific media file 201.
  • the server 103 further issues licenses of full versions of media files 205, keeps track of the license purchasers and provides information to the originator of the media file such as information of the licenses purchaser, e.g. the receiver R, and of the entity that distributed the media file to a receiver, i.e. in this case the sender S, such that the originator of the media file can get profit of the licence purchase and such that the entity that distributed the media file to the receiver that purchases a licence for the media file can be rewarded.
  • a user sends a request to the server 103 for purchasing a license for a specific media file. This request includes the file-identity 211, and possibly also username, password and digital signature.
  • the file identity 211 is used to extract from the server database 105, the associated file- key 209 which file identity 211 and associated file-key 209 both are unique to the specific media file license and the last-licensed user i.e. the sender S in this example and are further on referred to as the first file identity and the first file key.
  • a new, so-called second file-identity and second file-key are created which both are unique to the new licence purchaser, i.e. the receiver R, and the license for the specific full version media file 205.
  • the extracted last licensed user, i.e. the sender S, information is to be used for commission purposes.
  • the second file-key, first file-key and second file-id are encrypted using Rivest Shamir and Adleman (RSA) algorithm or any other public key encryption algorithm and the purchaser's encryption key and the server 103 sends 109 the resulting cipher to the license purchaser, i.e. the receiver R, which receiver R uses the information to transform the full version media file 205 such that it is not possible to decrypt by the sender S anymore, but only by the receiver R by means of said licence such that it is possible for the receiver R replay the full version media file 205.
  • RSA Rivest Shamir and Adleman
  • a container file 201 is received 101 by the receiver R from the sender S who, is a licensed owner of the media file comprised in the container file 201.
  • the media file is sent in any possible way, by e-mail, downloaded from a website etc.
  • the playback of the media file is performed on a player or viewer of the receiver R, here referred to as the viewer 215,
  • the playback of the received media is performed as follows:
  • the receiver has downloaded a player/installation program, created a client program and obtained a personal key from the licence issuing server.
  • the container file 201 is decrypted 223 with the container key and RC5TM or some other key encryption algorithm.
  • the container key is embedded in the client program code or a data-file associated with the client program.
  • the file identity is read 225 from the identity file 211 into the viewer 215 and is matched against a licence table, comprising a list of licensed identities, stored in the memory M in the viewer 215 in which table the licences obtained by the user of receiver R are stored.
  • the receiver R has no licence of the received media file.
  • the preview version 203 of the media is streamed to the viewer 215.
  • the receiver R decides to obtain a license from the license issuing server 103 to be capable of perform a playback of the full version of the media file 205. This might be a decision after replaying the preview version 203 of the media file.
  • the receiver R sends a request for obtaining a license.
  • the receiver R requires an internet connection, therefore it is preferable to check the client for an internet connection; if there is non the receiver R is prompted to connect. It is further preferably to prompt the receiver R to indicate its password, obtained at the registration process as an extra security measure, e.g. for preventing children from over drafting their parents account, although it is not necessary, since the personal key will be used for identity and signing, A digital signature and encryption is made with the receiver R's personal key.
  • the received information is decrypted.
  • the server 103 checks for the last licensed owner in the obtained first file-identity. All file-identities are unique to one and only one licensed owner and one license. In this instance the sender S is the last owner.
  • the server 103 checks if the digital signature is valid with the licence purchaser's encryption key, i.e. the digital signature is verified with the corresponding the key within the key pair.
  • the unencrypted first file-key, unique to this licence and last-licensed user, i.e. the sender S, is extracted from the database 105 of the server 103.
  • a new, second file-identity associated to the receiver R and the specific media file 201, and second file-key are created by the server 103 which second file-key is unique to the new licence purchaser, i.e. the receiver R and the media file.
  • the extracted last licensed user information is registered and might be used for commission purposes later on.
  • the encrypted second file-key, the decrypted first file-key and the second file-identity are encrypted using Rivest Shamir and Adleman (RSA) algorithm or any other public key encryption algorithm and the purchaser's encryption key and sends 109 the resulting cipher to the receiver R.
  • RSA Rivest Shamir and Adleman
  • the encrypted keys are received on the client-side as some sort of digital stream/byte stream or other manner of digital communication, it might also be as a programming language object that is digitally sent.
  • the client application of the receiver R then performs the following steps:
  • the last licensed user's i.e. the sender S's, commission is registered to his account and the purchaser's, i.e. the receiver R's purchase is registered to his or hers account on the database 105, the second file-key is also registered to the new license within the database 105.
  • the second file key is saved such that it is retrievable upon a search towards the license reference in the database. Playback of the full version media file
  • the playback of the media file is performed on the viewer 215 as mentioned above which viewer 215 comprises a personal key 217 when the receiver R has purchased a licence for the media.
  • the playback of the received media is performed as follows:
  • the identity of the licence file 213 is read 219 to a memory M of the viewer 211.
  • the container media file 201 is decrypted 223 with the container key and RC5 or some other key encryption algorithm.
  • the file identities is read 225 from the identity file 211 into the viewer 215 and is matched against the license identities in memory M which now includes the purchased licence If a licence of the concerned media exists, which is the case in the current example, the following steps are performed: i.
  • the file key is decrypted using the personal key 217 and an RSA algorithm or any other PKI based algorithm, ⁇ .
  • the full version media 205 is decrypted using the decrypted file key 209 and a RC5 algorithm or any other private key based algorithm.
  • the full version media 205 is extracted and streamed into the viewer 215.
  • the method is implemented by means of a computer program product comprising the software code means for performing the steps of the method.
  • the computer program product is run on processing means in the server, the sender and the receiver within the media distribution system.
  • the computer program is loaded directly or from a computer usable medium, such as a floppy disc, a CD, the Internet etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente invention concerne un procédé mis en oeuvre dans un système de distribution de contenu multimédia (100) comportant les étapes suivantes: l'envoi (101) d'un fichier de contenu multimédia (201) à partir d'un premier terminal d'utilisateur, dit expéditeur (S) directement vers un deuxième terminal d'utilisateur, dit destinataire (R). Le fichier de contenu multimédia (201) comprend un fichier de contenu multimédia en version complète (205) qui ne peut être décrypté pour lecture que par l'expéditeur (S) qui a obtenu une licence à partir d'un serveur d'octroi de licences (103), et qui ne pourra être décrypté par le destinataire que lorsque celui-ci aura acheté une licence à cette fin à partir d'un serveur d'octroi de licence (103) étant donné que la licence comporte des moyens permettant la transformation du contenu multimédia en version complète de sorte qu'il ne puisse plus être décrypté par l'expéditeur, mais uniquement par le destinataire. Le serveur (103) inscrit une entrée concernant la distribution par l'expéditeur (S) du fichier de contenu multimédia (201) résultant en l'achat d'une licence et l'achat par le destinataire (R) de ladite licence. L'invention permet à tout utilisateur de reproduire le fichier de contenu multimédia (201) mais rend difficile une copie piratée du fichier de contenu multimédia en version complète.
PCT/SE2002/000952 2001-05-17 2002-05-17 Procede et agencement dans un reseau de communications WO2002093922A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US29132801P 2001-05-17 2001-05-17
SE0101737-5 2001-05-17
US60/291,328 2001-05-17
SE0101737A SE0101737D0 (sv) 2001-05-17 2001-05-17 Method and arrangement in a communications network

Publications (1)

Publication Number Publication Date
WO2002093922A1 true WO2002093922A1 (fr) 2002-11-21

Family

ID=26655467

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2002/000952 WO2002093922A1 (fr) 2001-05-17 2002-05-17 Procede et agencement dans un reseau de communications

Country Status (1)

Country Link
WO (1) WO2002093922A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114221769A (zh) * 2021-11-12 2022-03-22 联奕科技股份有限公司 一种基于容器的软件授权许可控制方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000011871A1 (fr) * 1998-08-23 2000-03-02 Open Entertainment, Inc. Systeme de transaction permettant d'acheminer des fichiers depuis des sites fournisseurs de programmes jusqu'a des dispositifs de divertissement audiovisuel a domicile
WO2000027067A1 (fr) * 1998-11-02 2000-05-11 Intertrust Technologies Corporation Procede et appareil de distribution d'informations multimedia sur un reseau
WO2000048375A1 (fr) * 1999-02-11 2000-08-17 Loudeye Technologies, Inc. Systeme de distribution de media
WO2000064111A1 (fr) * 1999-04-16 2000-10-26 Unifree, L.L.C. Distribution de fichiers multimedia au moyen de protocoles de transmission adaptatifs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000011871A1 (fr) * 1998-08-23 2000-03-02 Open Entertainment, Inc. Systeme de transaction permettant d'acheminer des fichiers depuis des sites fournisseurs de programmes jusqu'a des dispositifs de divertissement audiovisuel a domicile
WO2000027067A1 (fr) * 1998-11-02 2000-05-11 Intertrust Technologies Corporation Procede et appareil de distribution d'informations multimedia sur un reseau
WO2000048375A1 (fr) * 1999-02-11 2000-08-17 Loudeye Technologies, Inc. Systeme de distribution de media
WO2000064111A1 (fr) * 1999-04-16 2000-10-26 Unifree, L.L.C. Distribution de fichiers multimedia au moyen de protocoles de transmission adaptatifs

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114221769A (zh) * 2021-11-12 2022-03-22 联奕科技股份有限公司 一种基于容器的软件授权许可控制方法及装置
CN114221769B (zh) * 2021-11-12 2023-06-02 联奕科技股份有限公司 一种基于容器的软件授权许可控制方法及装置

Similar Documents

Publication Publication Date Title
RU2348073C2 (ru) Регистрация/субрегистрация сервера управления цифровыми правами (уцп) в архитектуре уцп
JP4750352B2 (ja) デジタルコンテンツに対応するデジタルライセンスを取得する方法
JP4463998B2 (ja) 保護されたオンライン音楽配布システム
CA2457291C (fr) Octroi hors ligne d'une licence d'utilisation d'editeur dans un systeme de gestion numerique des droits (drm)
JP4418648B2 (ja) デジタルコンテンツとサービスの使用ライセンスを発行するためのシステムおよびその方法
KR100971854B1 (ko) 보안 서버 키 동작을 제공하기 위한 시스템 및 방법
KR100984440B1 (ko) 디지탈 라이센스 발행 방법 및 컴퓨터 판독 가능 기록 매체
EP2109981B1 (fr) Procédés, systèmes et appareil pour un partage de fichier fragmenté
US6385596B1 (en) Secure online music distribution system
KR100467929B1 (ko) 디지털 컨텐츠의 보호 및 관리를 위한 시스템
EP1376980B1 (fr) Architecture serveur de Plug-in sécurisé pour des systèmes de gestion de droits numériques
KR100932944B1 (ko) 컨텐트 아이템을 안전하게 저장하는 수신 디바이스와, 재생 디바이스
KR100605071B1 (ko) 디지털 전자 콘텐츠의 안전하고 편리한 관리 시스템 및 방법
KR100949657B1 (ko) 유연한 권리 템플릿을 이용하여 권리 관리 시스템에서디지털 컨텐츠에 대한 서명된 권리 라벨(srl)을 얻기
AU2004200471B2 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
US20050021783A1 (en) Information processing apparatus and method
US20030079133A1 (en) Method and system for digital rights management in content distribution application
NO332664B1 (no) Fremgangsmate for bruk av en rettighetsmal for a oppna et signert rettighetsmerke (SRL) for digitalt innhold i et digitalt rettighetsforvaltningssystem
JP2004520755A (ja) デジタルコンテンツの保護及び管理のための方法並びにこれを利用したシステム
KR20040077509A (ko) 디지털 저작권 관리(drm) 시스템에서의 디지털라이센스를 사용자와 연계시키고 이 사용자를 다수의컴퓨팅 장치와 연계시키는 방법
KR100873314B1 (ko) 안전한 콘텐트 배포를 위한 방법 및 장치
EP1474908A2 (fr) Procede et systeme de transmission et de diffusion securisees d'information et de production d'une instanciation physique de l'information transmise dans un support intermediaire de stockage de donnees
WO2002093922A1 (fr) Procede et agencement dans un reseau de communications
KR100367094B1 (ko) 컴퓨터 프로그램 온라인 유통 방법
WO2002010907A2 (fr) Procede permettant d'annuler des composants logiciels dans un systeme de protection de contenu a couplage lache

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ CZ DE DE DK DK DM DZ EC EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1)EPC

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP