WO2002103968A1 - An arrangement and a method for content policy control in a mobile multimedia messaging system - Google Patents

An arrangement and a method for content policy control in a mobile multimedia messaging system Download PDF

Info

Publication number
WO2002103968A1
WO2002103968A1 PCT/NO2002/000210 NO0200210W WO02103968A1 WO 2002103968 A1 WO2002103968 A1 WO 2002103968A1 NO 0200210 W NO0200210 W NO 0200210W WO 02103968 A1 WO02103968 A1 WO 02103968A1
Authority
WO
WIPO (PCT)
Prior art keywords
policy
data object
content
arrangement according
fingerprints
Prior art date
Application number
PCT/NO2002/000210
Other languages
French (fr)
Inventor
Børge NILSEN
Øyvind BREIVIK
Original Assignee
Beep Science As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beep Science As filed Critical Beep Science As
Publication of WO2002103968A1 publication Critical patent/WO2002103968A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Definitions

  • the present invention relates to an arrangement and a method for enforcement and control of copyright and/or policy of data objects being transferred in a communication network.
  • this invention relates to enforcement and control of copyrights and policies of data objects in messaging environments where value added content can be published, e.g. in Multimedia Messaging Service (MMS) environments .
  • MMS Multimedia Messaging Service
  • VAS SMS Short-Messaging-Services
  • Some examples of VAS SMS are jokes (text format) , stock quotes (text format) , simple ringing tones (binary format) , black-and-white logos (binary format) .
  • MMS Mul- timedia Messaging Service
  • envis- aged value added MMS and content are "mobile greeting card portal” (such as sending pictures/animations, with or without sound from a portal to a mobile terminal) , "famous cartoon messages” (such as animations, with or without colours/audio) , “visual/audio quiz messages” (such as pic- ture/audio messaging games) , “talking head message” (such as rendering a personal text with a predefined animation) .
  • VAS MMS will be offered to the end users by operators and by independent 3rd party service and content providers (e.g. media houses, portals, broadcasting corporations) that utilise the wireless MMS infrastructure of the operators.
  • Multimedia content has an inherently greater value to the content owners than plain text content (e.g. SMS).
  • plain text content e.g. SMS
  • the mobile operator has to provide a solution to support these requirements allowing content owners to publish their content for value added MMS.
  • Digital watermark [2] that is a process where a pattern is added to the content. This pattern shall ideally be invisible for the end-user, whereas the copyright control can filter and recognise this pattern.
  • the clearinghouse [3] model is a model where the content is packaged in a container. When reading the content with a client that can interpret the specially packaged container, the container will authorize access to the content with a remote clearinghouse .
  • the solution requires updates to the content production process 2.
  • the solution requires special client software
  • Control process is coupled to access of content rather than delivery of it
  • the solution normally builds on digital certificates and Public Key Infrastructure. This may slow down/complicate rollout of system (requires established policies) .
  • Solution can be bypassed/ turned off as it is controlled by the end-user
  • the present invention provides a method and an arrangement for enforcement and control of copyright and/or policy of a data object being transferred in a communication network by generating an electronic fingerprint unique to the electronic element.
  • the fingerprint is compared with pre-generated electronic fingerprints stored in a database wherein each of said pre-generated fingerprints is linked to a certain policy and/or copyright concerning the fingerprint associated data object. If the electronic fingerprint matches one of the pre-generated electronic fingerprints, the policy and/or copyright restrictions linked thereto is/are enforced.
  • the present invention is particularly useful in an MMS environment, and meets the requirements for content rights control in the MMS service network.
  • a preferred embodiment is a network centric model that is based on a firewall/gatekeeper model, where all messages are relayed through a control node where a filtering process is applied. This filtering process fingerprints all transferred content and applies content policy control to the content of these messages.
  • the solution works with all existing content and does not require updates to the client software (terminals) .
  • the process for content policy control consists of two phases.
  • a fingerprint is generated and stored in a lookup table with a reference to the policy meta-data for this content.
  • the same fingerprint is generated and used to look up the policy reference, thus enabling the policy to be enforced.
  • the preferred embodiment proposes a Digital Rights Unit (DRU) consisting of 3 main components: - A Policy Management Client (PMC) , that is used for defining content policies
  • DRU Digital Rights Unit
  • PMC Policy Management Client
  • CCE Content Control Engine
  • PEE Policy Enforcement Engine
  • Figure 1 illustrates MMS architecture and the components involved in message transfer between mobile handsets (peer- peer) and from a network server to a mobile handset (publishing) .
  • Figure 2 illustrates the components involved in the MMS publishing process and how these components interact according to an example embodiment of the present invention.
  • Figure 3 illustrates the components involved in the MMS message transfer process for peer-peer communication be- tween two mobile handsets according to an example embodiment of the present invention.
  • the present invention will in the following be described in an MMS environment referring to the above-mentioned fig- ures. However, this does not represent any limitations to the invention. The present invention may be utilized in other similar applications, environments and contexts with other variations and substitutions without departing from the scope of the invention as defined by the attached inde- pendent claims .
  • the MMS message delivery process for value added content is depicted in figure 1. As illustrated, the message transfer may either be initiated from the network (i.e. published) or it may be initiated from a peer terminal (user-agent) . For value added content that is subject to policy control, the first delivery will always be initiated from the network (i.e. published) . The published content may then be distributed (forwarded) in a peer-peer fashion. The invention builds on this nature for the distribution of value added content .
  • the present invention meets the requirements for content rights control in the MMS service network.
  • a preferred embodiment of the present invention is a network centric model that is based on a firewall/ gatekeeper model, where all messages are relayed through a control node where a filtering process is applied. This filtering process fingerprints all transferred content and applies content policy control to the contents of these messages.
  • the solution works with all existing content and does not require up- dates to the client software (terminals) .
  • Examples of content and content elements that may comprise value added content/service data are audio files, pictures, animations, video, and text, and any combination of these.
  • the process for content policy control consists of two phases.
  • a fingerprint is generated and stored in a lookup table with a reference to the policy meta-data for this content.
  • the same fingerprint is generated and used to look up the policy reference, thus enabling the policy to be enforced.
  • the preferred embodiment proposes a Digital Rights Unit (DRU) consisting of 3 main components: a Policy Management Client (PMC) , a Content Control Engine (CCE) , and a Policy Enforcement Engine (PEE) .
  • DRU Digital Rights Unit
  • PMC Policy Management Client
  • CCE Content Control Engine
  • PEE Policy Enforcement Engine
  • the PMC defines and activates the content policies of the controlled content. It consists of a client interface where polices may be created, updated and deleted, and a control function that initiates content control when content is being published.
  • the CCE filters the messages being transferred. It may be deployed as a standalone relay or it may be integrated with other message relay functions. When a message is received, the CCE will analyse the components of the message and apply policy control to the respective message components.
  • MMS messages are multipart-MIME [6] encoded with message blocks for each message element .
  • the message elements are separated with MIME headers that define the content (e.g. the type and size) .
  • the CCE will typically analyse these header fields and use them to invoke content specific control functions .
  • the CCE For each message component, the CCE will analyse the content-type and apply a content specific control function (i.e. switching-control function based on content-type) . The invoked control function will then generate a fingerprint for the given content and check it against a local fingerprint database. If a hit is found, the CCE will return a URL [7] that identifies the policy to be applied for that content .
  • a content specific control function i.e. switching-control function based on content-type
  • the PEE enforces the policies that the CCE identifies. When being invoked with a new policy statement, it effectuates the policy and tells the client (the CCE or the PMC) if the content is allowed. In effectuating the policy, the PEE controls access rights to the content and generates the 5 content charge information.
  • the typical scenario consists of three steps, being the policy definition process, the publishing process 0 and the transfer control process.
  • the content owner makes a value added content available, i.e. it is stored in a server/database connected to the communication network.
  • the associated content policy e.g. metadata
  • the publishing process applies to content being delivered from a network server to a client terminal and its user- o agent.
  • the traffic flow is depicted in figure 1 and labelled with (A) publishing.
  • the Policy Management Client carries out control of content being published (i.e. content being sent from a network server to an end-user) .
  • the PMC will check if the 5 published content has a defined policy and make sure that the policy is enforced and activated.
  • the PMC may use different techniques to identify the policy of a content element.
  • the content elements and policies are all identified by URLs (Uniform Resource Locator) [7] .
  • a separate database may be used to map content URL to policy URL. Such a database will be written/updated when new content or policies are published.
  • Wrapper files containing both the reference to the content and the policy may be used. The PMC will separate the content and the policy from the wrapper file.
  • a shadow policy directory may be used to map the policy to the content.
  • all content URLs have a shadow policy URL where there is a fixed relation between the two URLs (e.g. /image/cool .gif -> /image/cool_gif .policy) .
  • the PMC When the PMC identifies a content element with a policy, it will request the Policy Enforcement Engine (PEE) to process the policy. In doing so, the PMC provides a reference to the policy and the identity of the message receiver. The PEE will then process this policy and return an ok status code if the content is allowed in this context. Content that is not allowed in the given context will be removed or replaced with a screening message (e.g. "Content requested not allowed") by the PMC before the message is delivered.
  • PEE Policy Enforcement Engine
  • PEE Policy Enforcement Engine
  • a Check if the receiver is allowed to receive the content element from the sender. The check is performed by retrieving user information (e.g. address, age, prepaid account level) either from an independent da- tabase containing such information or from the database of the mobile operator and checking the user information with the content policy (e.g. age group allowed, price policy, number series allowed) .
  • user information e.g. address, age, prepaid account level
  • content policy e.g. age group allowed, price policy, number series allowed
  • the PMC When access to content is granted, the PMC activates the policy control by generating a fingerprint for this content and adding that fingerprint and its associated policy ID to the fingerprint database.
  • the content transfer control process applies to content being transferred between two terminals and their user- agents.
  • the traffic flow is depicted in figure 1 and la- belled with (B) peer-peer.
  • the Content Control Engine carries out control of transferred content . It may either be deployed as a standalone relay or it may be integrated with the MMS-C relay functions [1] .
  • the task of the CCE is to filter transferred messages, identify the message elements and for each message element generate a fingerprint and check if this fingerprint has a defined policy.
  • Examples of content and content elements that may comprise value added content/service data in a message and that is to be filtered are audio files, pictures, animations, video, and text, and any combination of these.
  • the CCE When the CCE identifies a content element with a policy, it will request the Policy Enforcement Engine (PEE) to process the policy. In doing so, the CCE provides a reference to the policy and the identity of the message sender and receiver respectively. The identities of the message sender and receiver are retrieved by the CCE from the message elements. The PEE will then process this policy and return an ok status code if the content is allowed in this context . Content that is not allowed in the given context will be removed or replaced with a screening message by the CCE before the message is delivered.
  • PEE Policy Enforcement Engine
  • PEE Policy Enforcement Engine
  • the check (a, b) is performed by retrieving user information (e.g. address, age, prepaid account level) either from an independent database containing such information or from the database of the mobile operator and checking the user information with the content policy (e.g. age group al- lowed, price policy, forwarding allowed/not allowed, number series allowed) .
  • user information e.g. address, age, prepaid account level
  • content policy e.g. age group al- lowed, price policy, forwarding allowed/not allowed, number series allowed
  • the PMC and CCE need to identify the message elements. This is done based on the MIME message encoding used for MMS messages. This message encoding separates each message element as a separate block in the message with separate message headers, such as content-type.
  • content-types are GIF [8], JPEG [9], MP3 [10] , MPEG4 [11] , AMR [12].
  • the PMC and CCE rely on the MIME message encoding and will switch control routines based on the content-type presented. This allows content-specific specialization of routines used for generation of fingerprints and database lookup. This also allows the control routines to be distributed, e.g. using one server for handling of image poli- cies and another server for audio policies.
  • Fingerprints Routines for generating fingerprints may be specialized per content-type. This allows new advanced fingerprint routines to be added on the fly as soon as new algorithms become available. Adding a new fingerprint routine consists of adding a new code entity (e.g. Java class) and configuring the binding between content-type and class name.
  • a new code entity e.g. Java class
  • Examples of algorithms are: MD4 [13] and MD5 [14] .
  • the fingerprint database is a table that matches finger- prints with policy ID.
  • the table is close to routing/ relaying of messages and needs to provide fast lookup.
  • the fingerprint database needs to have a limited size and defined policy for how to handle table overflow (cache aging policies) and leakage (cache leakage causing missing entries) .
  • a policy that accepts a fraction of overflow and leakage and builds that into the publishing model (all commerce solutions have a fraction of failed transactions, i.e. leakage, and this invention uses that fact to make a more efficient solution) is used.
  • a preferred embodiment of the invention allows the security to be balanced against performance and cost at setup and configuration time.
  • the fingerprint database is a database of XML [15] formatted meta-data elements. Each meta-data element defines the policy for a given content element. The policy defines rules for accessing the content and content charges .
  • the policy database can easily be integrated with existing content databases and extend the functionality of these. This also supports integration with the provisioning systems of the operators and portals.
  • One advantage of the present invention is that it provides a secure solution for the mobile operator to handle enforcement and control of copyrights and policies for published content .
  • the invention provides a solution that extends the mobile operator's business model, supporting not only charging of value added content for the content owners, but also enforcement and control of the content owners' copyrights and content policies with flexible business models (e.g. sender or receiver may be charged) .
  • the present invention also integrates with the mobile operator's domain and infrastructure and cannot be by-passed in the message transfer process (i.e. good security, and forwarding of messages can be handled properly with enforcement and control and with the desired business mod- els) .
  • the invention may be deployed by the mobile operator as a stand-alone component within the mobile infrastructure or it may be deployed as an integrated component with other components (e.g., MMS-C) for optimization purposes. It does not rely on software updates to mobile terminals and their user-agents, i.e. terminal vendor independence, paramount to commercial applicability.
  • a further advantage of the present invention is that it may be used for all content types . It does not require updates to the content production process.
  • the invention does not add content overhead (such as meta-data, watermark data) in the messages being transported within the network and thus does not require extra message transport capacity.
  • the invention provides a fingerprinting solution that is inherently fast/efficient (small sized fingerprints solution with fast algorithms are available, e.g. MD4) , computational unique for content, may be optimized with differ- ent algorithms for specific content types, and may easily be upgraded (easy plug-in scheme) with new algorithms for specific content types as new and better/faster algorithms become available .
  • MMS 3GPP TS 23.140 v4.2.0 (2001-03), 3rd Generation Partnership Project; Technical Specification Group Terminals; Multimedia Messaging Service (MMS) ; Functional de- scription; Stage 2 (Release 4)
  • DSig PICS Signed Labels (DSig) 1.0 Specification, REC- DSig-label-19980527, World Wide Web Consortium (W3C) , Recommendation 27- May-1998
  • MIME Multipurpose Internet Mail Extensions Part One: Format of Internet Message Bodies, Internet Engineering Task Force (IETF) , Request For Comment (RFC) 2045, No- vember 1996
  • URL/URI Uniform Resource Identifiers
  • IETF Internet Engineering Task Force
  • RRC Request For Comment
  • MPEG4 ISO/IEC 14496-1(1999): Information Technology - GenericCoding of Audio-Visual Objects
  • 3GPP TR 26.911 "Codec (s) for Circuite Switched Multimedia Telephony Service; Terminal Implementor' s Guide"
  • AMR 3GPP TS 26.090 "AMR Speech Codec Speech Transcoding Functions"
  • MD4 The MD4 Message-Digest Algorithm, Internet Engineering Task Force (IETF) , Request For Comment (RFC)
  • MD5 The MD5 Message-Digest Algorithm, Internet Engineering Task Force (IETF) , Request For Comment (RFC)

Abstract

A method and an arrangement for enforcement and control of copyright and/or policy of a data object being transferred in a communication network by generating an electronic fingerprint unique to the electronic element is disclosed. The fingerprint is compared with pre-generated electronic fingerprints stored in a database wherein each of said pre-generated fingerprints is linked to a certain policy and/or copyright concerning the fingerprint associated data object. If the electronic fingerprint matches one of the pre-generated electronic fingerprints, the policy and/or copyright restrictions linked thereto is/are enforced. The present invention is particularly useful in an MMS environment, and meets the requirements for content rights control in the MMS service network.

Description

An arrangement and a method for Content Policy Control in a Mobile Multimedia Messaging System
Field of the invention
The present invention relates to an arrangement and a method for enforcement and control of copyright and/or policy of data objects being transferred in a communication network. In particular, this invention relates to enforcement and control of copyrights and policies of data objects in messaging environments where value added content can be published, e.g. in Multimedia Messaging Service (MMS) environments .
Background of the invention
Message services like SMS in GSM went through a fast growth just a few years after the worldwide launching of digital mobile communication network, and they are still growing in popularity. The recent exponential growth of e.g. value added Short-Messaging-Services (SMS) was triggered by the introduction of distribution and billing opportunities, provided by the mobile operators, to 3rd party value added service (VAS) and content providers. Some examples of VAS SMS are jokes (text format) , stock quotes (text format) , simple ringing tones (binary format) , black-and-white logos (binary format) .
However, the fact that the first generation message ser- vices are text based will probably threaten their existence in the near feature, taking into account that multimedia services turns out to be customary.
Because of this, the WAP forum and 3GPP have standardized a new message service for the mobile environment called Mul- timedia Messaging Service (MMS) [1] . To the end-user, MMS is very similar to the Short Message Service (SMS) : it provides automatic immediate delivery for user created content from phone to phone. However, the future of VAS MMS services has an even greater growth potential due to the advanced content capabilities of the MMS technology. Sophisticated multimedia content may be provided with VAS MMS services. Some examples of envis- aged value added MMS and content are "mobile greeting card portal" (such as sending pictures/animations, with or without sound from a portal to a mobile terminal) , "famous cartoon messages" (such as animations, with or without colours/audio) , "visual/audio quiz messages" (such as pic- ture/audio messaging games) , "talking head message" (such as rendering a personal text with a predefined animation) . VAS MMS will be offered to the end users by operators and by independent 3rd party service and content providers (e.g. media houses, portals, broadcasting corporations) that utilise the wireless MMS infrastructure of the operators.
Multimedia content has an inherently greater value to the content owners than plain text content (e.g. SMS). When publishing such content, it is important to the content providers or content owners that the content rights (copyrights and policies) are enforced and that their revenue streams are secured. If not, the content providers will naturally not be interested in producing content for use in MMS. The publishing process thus needs to support copyright control and ensure that defined content policies are being obeyed.
To increase MMS traffic, the mobile operator has to provide a solution to support these requirements allowing content owners to publish their content for value added MMS.
Current attempts on content control are oriented towards the Internet model. The models normally require updates both to the content production process and to the client software rendering the resulting content .
Two strategies are established for copyright control of Internet content. These are: Digital watermark [2] that is a process where a pattern is added to the content. This pattern shall ideally be invisible for the end-user, whereas the copyright control can filter and recognise this pattern.
The clearinghouse [3] model is a model where the content is packaged in a container. When reading the content with a client that can interpret the specially packaged container, the container will authorize access to the content with a remote clearinghouse .
One strategy is established for policy control of Internet content . This is :
Platform for Internet Content Selection (PICS) [4] and Digital Signature (DSiG) [5] is a standard solution for defining and controlling meta-data for web content. This so- lution defines a language and a set of processing rules for controlling access to content. This allows e.g. parents to control what content their kids can access .
The problems with the prior art are specified in the following for each of the alternatives described above.
For the Digital Watermarking model, the problems are :
1. The solution cannot be used for all types of content
2. The solution requires updates to the content production process
3. The copyright control will be broken if the watermark is removed
For the cl earinghouse model, the problems are:
1. The solution requires updates to the content production process 2. The solution requires special client software
3. Control process is coupled to access of content rather than delivery of it
a. This gives reduced security
b. Control and payment is always coupled with receiver (limiting business model)
4. The establishment of new business roles (the clearinghouse) is normally required
5. Integration with existing systems in the mobile opera- tor domain is difficult
6. The solution normally builds on digital certificates and Public Key Infrastructure. This may slow down/complicate rollout of system (requires established policies) .
For the PICS/ DSiG solution, the problems are:
1. Requirement of special client software (PICS enabled browsers)
2. Rating of content needs to be carried out (long process)
3. Solution can be bypassed/ turned off as it is controlled by the end-user
4. No complete solution for rights control for value added content (in a mobile environment) is provided
Summary of the invention
It is an object of the present invention to provide an arrangement and a method that eliminates the drawbacks de- scribed above. The features defined in the claims enclosed characterize this method.
More specifically, the present invention provides a method and an arrangement for enforcement and control of copyright and/or policy of a data object being transferred in a communication network by generating an electronic fingerprint unique to the electronic element. The fingerprint is compared with pre-generated electronic fingerprints stored in a database wherein each of said pre-generated fingerprints is linked to a certain policy and/or copyright concerning the fingerprint associated data object. If the electronic fingerprint matches one of the pre-generated electronic fingerprints, the policy and/or copyright restrictions linked thereto is/are enforced.
The present invention is particularly useful in an MMS environment, and meets the requirements for content rights control in the MMS service network. A preferred embodiment is a network centric model that is based on a firewall/gatekeeper model, where all messages are relayed through a control node where a filtering process is applied. This filtering process fingerprints all transferred content and applies content policy control to the content of these messages. The solution works with all existing content and does not require updates to the client software (terminals) .
The process for content policy control consists of two phases. When content is being published, a fingerprint is generated and stored in a lookup table with a reference to the policy meta-data for this content. When later content is transferred between clients, the same fingerprint is generated and used to look up the policy reference, thus enabling the policy to be enforced.
The preferred embodiment proposes a Digital Rights Unit (DRU) consisting of 3 main components: - A Policy Management Client (PMC) , that is used for defining content policies
- A Content Control Engine (CCE) , that maps policies to transferred content, and
- A Policy Enforcement Engine (PEE) , that enforces the content policies
Brief description of the drawings
In order to make the invention more readily understandable, the discussion that follows will refer to the accompanying drawings .
Figure 1 illustrates MMS architecture and the components involved in message transfer between mobile handsets (peer- peer) and from a network server to a mobile handset (publishing) .
Figure 2 illustrates the components involved in the MMS publishing process and how these components interact according to an example embodiment of the present invention.
Figure 3 illustrates the components involved in the MMS message transfer process for peer-peer communication be- tween two mobile handsets according to an example embodiment of the present invention.
Detailed description of preferred embodiments
The present invention will in the following be described in an MMS environment referring to the above-mentioned fig- ures. However, this does not represent any limitations to the invention. The present invention may be utilized in other similar applications, environments and contexts with other variations and substitutions without departing from the scope of the invention as defined by the attached inde- pendent claims . The MMS message delivery process for value added content is depicted in figure 1. As illustrated, the message transfer may either be initiated from the network (i.e. published) or it may be initiated from a peer terminal (user-agent) . For value added content that is subject to policy control, the first delivery will always be initiated from the network (i.e. published) . The published content may then be distributed (forwarded) in a peer-peer fashion. The invention builds on this nature for the distribution of value added content .
The present invention meets the requirements for content rights control in the MMS service network. A preferred embodiment of the present invention is a network centric model that is based on a firewall/ gatekeeper model, where all messages are relayed through a control node where a filtering process is applied. This filtering process fingerprints all transferred content and applies content policy control to the contents of these messages. The solution works with all existing content and does not require up- dates to the client software (terminals) .
Examples of content and content elements that may comprise value added content/service data are audio files, pictures, animations, video, and text, and any combination of these.
The process for content policy control consists of two phases. When content is being published, a fingerprint is generated and stored in a lookup table with a reference to the policy meta-data for this content. When later content is transferred between clients, the same fingerprint is generated and used to look up the policy reference, thus enabling the policy to be enforced.
The preferred embodiment proposes a Digital Rights Unit (DRU) consisting of 3 main components: a Policy Management Client (PMC) , a Content Control Engine (CCE) , and a Policy Enforcement Engine (PEE) . The Policy Management Client
The PMC defines and activates the content policies of the controlled content. It consists of a client interface where polices may be created, updated and deleted, and a control function that initiates content control when content is being published.
The Content Control Engine
The CCE filters the messages being transferred. It may be deployed as a standalone relay or it may be integrated with other message relay functions. When a message is received, the CCE will analyse the components of the message and apply policy control to the respective message components.
MMS messages are multipart-MIME [6] encoded with message blocks for each message element . The message elements are separated with MIME headers that define the content (e.g. the type and size) . The CCE will typically analyse these header fields and use them to invoke content specific control functions .
For each message component, the CCE will analyse the content-type and apply a content specific control function (i.e. switching-control function based on content-type) . The invoked control function will then generate a fingerprint for the given content and check it against a local fingerprint database. If a hit is found, the CCE will return a URL [7] that identifies the policy to be applied for that content .
For a message consisting of multiple content-elements, several control functions will be invoked, possible resulting in several policies being identified and enforced.
The Policy Enforcement Engine
The PEE enforces the policies that the CCE identifies. When being invoked with a new policy statement, it effectuates the policy and tells the client (the CCE or the PMC) if the content is allowed. In effectuating the policy, the PEE controls access rights to the content and generates the 5 content charge information.
In order to describe the process of content distribution and rights control, a typical usage scenario will now be described. The typical scenario consists of three steps, being the policy definition process, the publishing process 0 and the transfer control process.
The Policy Definition Process
In the policy definition process, the content owner makes a value added content available, i.e. it is stored in a server/database connected to the communication network. At s the same time, the associated content policy (e.g. metadata) in the same or a different server/database.
The Publishing Process
The publishing process applies to content being delivered from a network server to a client terminal and its user- o agent. The traffic flow is depicted in figure 1 and labelled with (A) publishing.
The Policy Management Client (PMC) carries out control of content being published (i.e. content being sent from a network server to an end-user) . The PMC will check if the 5 published content has a defined policy and make sure that the policy is enforced and activated.
The PMC may use different techniques to identify the policy of a content element. The content elements and policies are all identified by URLs (Uniform Resource Locator) [7] .
o a. A separate database may be used to map content URL to policy URL. Such a database will be written/updated when new content or policies are published. b. Wrapper files containing both the reference to the content and the policy may be used. The PMC will separate the content and the policy from the wrapper file.
c. A shadow policy directory (URL) may be used to map the policy to the content. In this case, all content URLs have a shadow policy URL where there is a fixed relation between the two URLs (e.g. /image/cool .gif -> /image/cool_gif .policy) .
When the PMC identifies a content element with a policy, it will request the Policy Enforcement Engine (PEE) to process the policy. In doing so, the PMC provides a reference to the policy and the identity of the message receiver. The PEE will then process this policy and return an ok status code if the content is allowed in this context. Content that is not allowed in the given context will be removed or replaced with a screening message (e.g. "Content requested not allowed") by the PMC before the message is delivered.
When the Policy Enforcement Engine (PEE) is invoked to enforce a policy, it will do the following steps (or any com- binations thereof) to enforce the policy:
a. Check if the receiver is allowed to receive the content element from the sender. The check is performed by retrieving user information (e.g. address, age, prepaid account level) either from an independent da- tabase containing such information or from the database of the mobile operator and checking the user information with the content policy (e.g. age group allowed, price policy, number series allowed) .
b. Generate charging information to charge the sender for use of the content element.
When access to content is granted, the PMC activates the policy control by generating a fingerprint for this content and adding that fingerprint and its associated policy ID to the fingerprint database. The Transfer Control Process
The content transfer control process applies to content being transferred between two terminals and their user- agents. The traffic flow is depicted in figure 1 and la- belled with (B) peer-peer.
The Content Control Engine (CCE) carries out control of transferred content . It may either be deployed as a standalone relay or it may be integrated with the MMS-C relay functions [1] . The task of the CCE is to filter transferred messages, identify the message elements and for each message element generate a fingerprint and check if this fingerprint has a defined policy.
Examples of content and content elements that may comprise value added content/service data in a message and that is to be filtered, are audio files, pictures, animations, video, and text, and any combination of these.
When the CCE identifies a content element with a policy, it will request the Policy Enforcement Engine (PEE) to process the policy. In doing so, the CCE provides a reference to the policy and the identity of the message sender and receiver respectively. The identities of the message sender and receiver are retrieved by the CCE from the message elements. The PEE will then process this policy and return an ok status code if the content is allowed in this context . Content that is not allowed in the given context will be removed or replaced with a screening message by the CCE before the message is delivered.
When the Policy Enforcement Engine (PEE) is invoked to enforce a policy, it will undergo the following steps (or any combination thereof) to enforce the policy:
a. Check if the sender is allowed to send the content element to receiver b. Check if the receiver is allowed to receive the content element from the sender.
c. Generate charge information to charge the sender for use of the content element
The check (a, b) is performed by retrieving user information (e.g. address, age, prepaid account level) either from an independent database containing such information or from the database of the mobile operator and checking the user information with the content policy (e.g. age group al- lowed, price policy, forwarding allowed/not allowed, number series allowed) .
In the following, some supplemental information regarding parts of the process and architecture discussed above is disclosed.
Identifying Message Elements
During the process of analyzing message content, the PMC and CCE need to identify the message elements. This is done based on the MIME message encoding used for MMS messages. This message encoding separates each message element as a separate block in the message with separate message headers, such as content-type.
Some examples of content-types (with associated formats) are GIF [8], JPEG [9], MP3 [10] , MPEG4 [11] , AMR [12].
The PMC and CCE rely on the MIME message encoding and will switch control routines based on the content-type presented. This allows content-specific specialization of routines used for generation of fingerprints and database lookup. This also allows the control routines to be distributed, e.g. using one server for handling of image poli- cies and another server for audio policies.
Generation of Fingerprints Routines for generating fingerprints may be specialized per content-type. This allows new advanced fingerprint routines to be added on the fly as soon as new algorithms become available. Adding a new fingerprint routine consists of adding a new code entity (e.g. Java class) and configuring the binding between content-type and class name.
Examples of algorithms are: MD4 [13] and MD5 [14] .
The Fingerprint Database
The fingerprint database is a table that matches finger- prints with policy ID. The table is close to routing/ relaying of messages and needs to provide fast lookup.
The fingerprint database needs to have a limited size and defined policy for how to handle table overflow (cache aging policies) and leakage (cache leakage causing missing entries) . Preferably, a policy that accepts a fraction of overflow and leakage and builds that into the publishing model (all commerce solutions have a fraction of failed transactions, i.e. leakage, and this invention uses that fact to make a more efficient solution) is used.
To reduce the amount of overflow and leakage, several solutions may be used. The simplest alternative is to increase the size of the table. Other alternatives are to use content specific tables or have separate table areas per user. A preferred embodiment of the invention allows the security to be balanced against performance and cost at setup and configuration time.
The Policy Database
The fingerprint database is a database of XML [15] formatted meta-data elements. Each meta-data element defines the policy for a given content element. The policy defines rules for accessing the content and content charges . The policy database can easily be integrated with existing content databases and extend the functionality of these. This also supports integration with the provisioning systems of the operators and portals.
One advantage of the present invention is that it provides a secure solution for the mobile operator to handle enforcement and control of copyrights and policies for published content .
In addition, the invention provides a solution that extends the mobile operator's business model, supporting not only charging of value added content for the content owners, but also enforcement and control of the content owners' copyrights and content policies with flexible business models (e.g. sender or receiver may be charged) .
The present invention also integrates with the mobile operator's domain and infrastructure and cannot be by-passed in the message transfer process (i.e. good security, and forwarding of messages can be handled properly with enforcement and control and with the desired business mod- els) .
The invention may be deployed by the mobile operator as a stand-alone component within the mobile infrastructure or it may be deployed as an integrated component with other components (e.g., MMS-C) for optimization purposes. It does not rely on software updates to mobile terminals and their user-agents, i.e. terminal vendor independence, paramount to commercial applicability.
A further advantage of the present invention is that it may be used for all content types . It does not require updates to the content production process.
Further, the invention does not add content overhead (such as meta-data, watermark data) in the messages being transported within the network and thus does not require extra message transport capacity. The invention provides a fingerprinting solution that is inherently fast/efficient (small sized fingerprints solution with fast algorithms are available, e.g. MD4) , computational unique for content, may be optimized with differ- ent algorithms for specific content types, and may easily be upgraded (easy plug-in scheme) with new algorithms for specific content types as new and better/faster algorithms become available .
References
[1] MMS 3GPP TS 23.140 v4.2.0 (2001-03), 3rd Generation Partnership Project; Technical Specification Group Terminals; Multimedia Messaging Service (MMS) ; Functional de- scription; Stage 2 (Release 4)
[2] Digi tal Watermark "Digital Watermarks Copyright Protection for Online Artists", PC Magazine, February 18. 1997
[3] Clearinghouse "Digital Rights for all media types", In- ternetcontent.net, 2/20/2001
[4] PICS Rating Services and Rating Systems (and Their
Machine Readable Descriptions) , REC-PICS-services-961031, version 1.1, World Wide Web Consortium (W3C) , Recommendation 31-October-1996
[5] DSig PICS Signed Labels (DSig) 1.0 Specification, REC- DSig-label-19980527, World Wide Web Consortium (W3C) , Recommendation 27-May-1998
[6] MIME Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies, Internet Engineering Task Force (IETF) , Request For Comment (RFC) 2045, No- vember 1996
[7] URL/URI, Uniform Resource Identifiers (URI) : Generic Syntax, Internet Engineering Task Force (IETF) , Request For Comment (RFC) 2396, August 1998
[8] GIF, Graphics Interchange Format (Version 89a) , CompuServe Inc., Colombus, Ohio, 1990
[9] JPEG, ITU-T Rec. T.8l/lSθ/lEC 10918-1: 1992, „Information Technology - Digital Compression and Coding of Continuous-Tone Still Images - Requirements and Guidelines" . [10] MP3 MPEGl-Audio ISO/lEC 11172-3, MPEG2-Audio ISO/lEC 11172-3
[11] MPEG4 , ISO/IEC 14496-1(1999): Information Technology - GenericCoding of Audio-Visual Objects AND 3GPP TR 26.911: "Codec (s) for Circuite Switched Multimedia Telephony Service; Terminal Implementor' s Guide"
[12] AMR 3GPP TS 26.090: "AMR Speech Codec Speech Transcoding Functions"
[13] MD4 The MD4 Message-Digest Algorithm, Internet Engineering Task Force (IETF) , Request For Comment (RFC)
1320, April 1992
[14] MD5 The MD5 Message-Digest Algorithm, Internet Engineering Task Force (IETF) , Request For Comment (RFC)
1321, April 1992
[15] XML Extensible Markup Language (XML) 1.0 (Second
Edition) , World Wide Web Consortium (W3C) , Recommendation 6
October 2000

Claims

P a t e n t c l a i m s
1. An arrangement for enforcement and control of copyright and policy of a data object being transferred in a communication network, c h a r a c t e r i z e d i n
a first means adapted to generate an electronic fingerprint unique to said data object,
a fingerprint database comprising pre-generated electronic fingerprints of data objects, each of which are linked to a certain policy and/or copyright concerning current fingerprint associated data object,
a second means adapted to compare said fingerprint with said pre-generated fingerprints,
a third means adapted to enforce the policy and/or copyright restrictions linked to said one of the pre- generated electronic fingerprints on said data object if said electronic fingerprint matches one of the pre- generated electronic fingerprints .
2. Arrangement according to claim 1 , c h a r a c t e r i z e d i n
a fourth means adapted to define, activate, create, update and/or delete said policy and/or copyright through an interface therein.
3. Arrangement according to claim 1 or 2 , c h a r a c t e r i z e d i n that said data object is, or is an element of, a Multimedia Message Service (MMS) message, and that said database and/or said first, second, third and/or fourth means are integrated in, or connected to, an MMS architecture.
4. Arrangement according to claim 3 , c h a r a c t e r i z e d i n a fifth means adapted to identify and separate said element in said MMS message.
5. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that each of the pre- generated electronic fingerprints is generated by said first means and stored in said database as its associated data object is transmitted to a user requesting that data object .
6. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that said policy comprises rules for executing said data object and/or charging a user sending, receiving or requesting said data object.
7. Arrangement according to claim 6 , c h a r a c t e r i z e d i n that said rules include filtering away, replacing and/or changing said data object when a certain receiver or sender of said data object is identified.
8. Arrangement according to claim 6 or 7, c h a r a c t e r i z e d i n that said policy is stored in a separate policy database, and that information concerning said charging is written into a separate charging database .
9. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that the pre-generated electronic fingerprints are stored in a look up table and that each of which are linked to a certain policy and/or copyright concerning current fingerprint associated data object by a URL.
10. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that the said database is a database of XML formatted meta-data elements .
11. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that said communication network is a GSM, GPRS, or UMTS network.
12. Arrangement according to any of the preceding claims, 5 c h a r a c t e r i z e d i n that said data object comprises value added content issued by a content provider.
13. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that said data object is transferred through said communication network on a peer- o to-peer basis, i.e. from a first user terminal to a second user terminal .
14. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that said data object is an audio file, a picture, an animation, a video, a text s string or any combination of these.
15. Arrangement according to any of the preceding claims, c h a r a c t e r i z e d i n that said first means includes routines for generating fingerprints specialized per data object type.
o 16. Arrangement according to claim 15, c h a r a c t e r i z e d i n that said first means is adapted to incorporate any new routine for generating fingerprints in addition to the already included.
17. A method for enforcement and control of copyright 5 and/or policy of a data object being transferred in a communication network, c h a r a c t e r i z e d i n the following steps :
a) Generating an electronic fingerprint unique to said data object,
o b) Comparing the electronic fingerprint with pre- generated electronic fingerprints stored in a database wherein each of said pre-generated fingerprints are linked to a certain policy and/or copyright concerning current fingerprint associated data object,
If said electronic fingerprint matches one of the pre-generated electronic fingerprints in step b) , enforcing the policy and/or copyright restrictions linked to said one of the pre- generated electronic fingerprints on said data object.
PCT/NO2002/000210 2001-06-15 2002-06-14 An arrangement and a method for content policy control in a mobile multimedia messaging system WO2002103968A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20012994A NO314375B1 (en) 2001-06-15 2001-06-15 Arrangement and procedure for content control of data objects, special data objects in MMS messages
NO20012994 2001-06-15

Publications (1)

Publication Number Publication Date
WO2002103968A1 true WO2002103968A1 (en) 2002-12-27

Family

ID=19912570

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2002/000210 WO2002103968A1 (en) 2001-06-15 2002-06-14 An arrangement and a method for content policy control in a mobile multimedia messaging system

Country Status (2)

Country Link
NO (1) NO314375B1 (en)
WO (1) WO2002103968A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1467581A2 (en) 2003-04-11 2004-10-13 Hewlett-Packard Development Company, L.P. Authentication and non-interfering sms-messaging in gsm telephone communication
WO2004091158A1 (en) * 2003-04-10 2004-10-21 Koninklijke Philips Electronics N.V. Multimedia messaging method and system
EP1598728A2 (en) * 2004-05-05 2005-11-23 TeliaSonera AB Method and device for digital rights enforcement
US7190808B2 (en) 2004-03-12 2007-03-13 Interdigital Technology Corporation Method for watermarking recordings based on atmospheric conditions
US7272240B2 (en) 2004-12-03 2007-09-18 Interdigital Technology Corporation Method and apparatus for generating, sensing, and adjusting watermarks
GB2452588A (en) * 2007-06-18 2009-03-11 Discretix Technologies Ltd Screening electronic content in a mobile device using fingerprinting
US7707224B2 (en) 2006-11-03 2010-04-27 Google Inc. Blocking of unlicensed audio content in video files on a video hosting website
US7904723B2 (en) 2005-01-12 2011-03-08 Interdigital Technology Corporation Method and apparatus for enhancing security of wireless communications
US7987369B2 (en) 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US8117130B2 (en) 2003-02-25 2012-02-14 Stragent, Llc Batch loading and self-registration of digital media files
US8180792B2 (en) 2003-02-25 2012-05-15 Myspace Music Llc Method of processing song claims involving songs including, but not limited to musical works, compositions, etc
WO2013079936A1 (en) * 2011-11-30 2013-06-06 Avecto Limited Method and computer device to control software file downloads
US8640179B1 (en) 2000-09-14 2014-01-28 Network-1 Security Solutions, Inc. Method for using extracted features from an electronic work
US8868917B2 (en) 2005-12-23 2014-10-21 Digimarc Corporation Methods for identifying audio or video content
US9031919B2 (en) 2006-08-29 2015-05-12 Attributor Corporation Content monitoring and compliance enforcement
US9135674B1 (en) 2007-06-19 2015-09-15 Google Inc. Endpoint based video fingerprinting
US9342670B2 (en) 2006-08-29 2016-05-17 Attributor Corporation Content monitoring and host compliance evaluation
US9436810B2 (en) 2006-08-29 2016-09-06 Attributor Corporation Determination of copied content, including attribution
US9633014B2 (en) 2009-04-08 2017-04-25 Google Inc. Policy based video content syndication
US10643249B2 (en) 2007-05-03 2020-05-05 Google Llc Categorizing digital content providers

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141753A (en) * 1998-02-10 2000-10-31 Fraunhofer Gesellschaft Secure distribution of digital representations
US6144934A (en) * 1996-09-18 2000-11-07 Secure Computing Corporation Binary filter using pattern recognition
WO2000072119A2 (en) * 1999-05-05 2000-11-30 Rabin Michael O Methods and apparatus for protecting information
US6173401B1 (en) * 1997-04-17 2001-01-09 International Business Machine Corp. Importing information onto a chip card
WO2001015405A2 (en) * 1999-08-23 2001-03-01 Adwise Ltd. Internet profiling system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6144934A (en) * 1996-09-18 2000-11-07 Secure Computing Corporation Binary filter using pattern recognition
US6173401B1 (en) * 1997-04-17 2001-01-09 International Business Machine Corp. Importing information onto a chip card
US6141753A (en) * 1998-02-10 2000-10-31 Fraunhofer Gesellschaft Secure distribution of digital representations
WO2000072119A2 (en) * 1999-05-05 2000-11-30 Rabin Michael O Methods and apparatus for protecting information
WO2001015405A2 (en) * 1999-08-23 2001-03-01 Adwise Ltd. Internet profiling system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HEINTZE N.: "Scalable document fingerprinting", 1996 USENIX WORKSHOP ON ELECTRONIC COMMERCE, 1996, XP002954511 *
RIVEST R.: "The MD5 message-digest algorithm", MIT LABORATORY FOR COMPUTER SCIENCE AND RSA DATA SECURITY, INC., NETWORK WORKING GROUP, REQUEST FOR COMMENTS: 1321, April 1992 (1992-04-01), XP002954512 *

Cited By (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9544663B1 (en) 2000-09-14 2017-01-10 Network-1 Technologies, Inc. System for taking action with respect to a media work
US9558190B1 (en) 2000-09-14 2017-01-31 Network-1 Technologies, Inc. System and method for taking action with respect to an electronic media work
US10063936B1 (en) 2000-09-14 2018-08-28 Network-1 Technologies, Inc. Methods for using extracted feature vectors to perform an action associated with a work identifier
US10057408B1 (en) 2000-09-14 2018-08-21 Network-1 Technologies, Inc. Methods for using extracted feature vectors to perform an action associated with a work identifier
US10367885B1 (en) 2000-09-14 2019-07-30 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with selected identified image
US9883253B1 (en) 2000-09-14 2018-01-30 Network-1 Technologies, Inc. Methods for using extracted feature vectors to perform an action associated with a product
US10073862B1 (en) 2000-09-14 2018-09-11 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with selected identified image
US10621226B1 (en) 2000-09-14 2020-04-14 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with selected identified image
US9256885B1 (en) 2000-09-14 2016-02-09 Network-1 Technologies, Inc. Method for linking an electronic media work to perform an action
US9824098B1 (en) 2000-09-14 2017-11-21 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with identified action information
US10621227B1 (en) 2000-09-14 2020-04-14 Network-1 Technologies, Inc. Methods for using extracted features to perform an action
US9805066B1 (en) 2000-09-14 2017-10-31 Network-1 Technologies, Inc. Methods for using extracted features and annotations associated with an electronic media work to perform an action
US9807472B1 (en) 2000-09-14 2017-10-31 Network-1 Technologies, Inc. Methods for using extracted feature vectors to perform an action associated with a product
US9781251B1 (en) 2000-09-14 2017-10-03 Network-1 Technologies, Inc. Methods for using extracted features and annotations associated with an electronic media work to perform an action
US10108642B1 (en) 2000-09-14 2018-10-23 Network-1 Technologies, Inc. System for using extracted feature vectors to perform an action associated with a work identifier
US10205781B1 (en) 2000-09-14 2019-02-12 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with selected identified image
US10552475B1 (en) 2000-09-14 2020-02-04 Network-1 Technologies, Inc. Methods for using extracted features to perform an action
US10063940B1 (en) 2000-09-14 2018-08-28 Network-1 Technologies, Inc. System for using extracted feature vectors to perform an action associated with a work identifier
US10540391B1 (en) 2000-09-14 2020-01-21 Network-1 Technologies, Inc. Methods for using extracted features to perform an action
US8640179B1 (en) 2000-09-14 2014-01-28 Network-1 Security Solutions, Inc. Method for using extracted features from an electronic work
US8656441B1 (en) 2000-09-14 2014-02-18 Network-1 Technologies, Inc. System for using extracted features from an electronic work
US8782726B1 (en) 2000-09-14 2014-07-15 Network-1 Technologies, Inc. Method for taking action based on a request related to an electronic media work
US9536253B1 (en) 2000-09-14 2017-01-03 Network-1 Technologies, Inc. Methods for linking an electronic media work to perform an action
US8904465B1 (en) 2000-09-14 2014-12-02 Network-1 Technologies, Inc. System for taking action based on a request related to an electronic media work
US10521470B1 (en) 2000-09-14 2019-12-31 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with selected identified image
US10521471B1 (en) 2000-09-14 2019-12-31 Network-1 Technologies, Inc. Method for using extracted features to perform an action associated with selected identified image
US8904464B1 (en) 2000-09-14 2014-12-02 Network-1 Technologies, Inc. Method for tagging an electronic media work to perform an action
US9538216B1 (en) 2000-09-14 2017-01-03 Network-1 Technologies, Inc. System for taking action with respect to a media work
US9832266B1 (en) 2000-09-14 2017-11-28 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with identified action information
US9282359B1 (en) 2000-09-14 2016-03-08 Network-1 Technologies, Inc. Method for taking action with respect to an electronic media work
US9529870B1 (en) 2000-09-14 2016-12-27 Network-1 Technologies, Inc. Methods for linking an electronic media work to perform an action
US10303713B1 (en) 2000-09-14 2019-05-28 Network-1 Technologies, Inc. Methods for using extracted features to perform an action
US10303714B1 (en) 2000-09-14 2019-05-28 Network-1 Technologies, Inc. Methods for using extracted features to perform an action
US9348820B1 (en) 2000-09-14 2016-05-24 Network-1 Technologies, Inc. System and method for taking action with respect to an electronic media work and logging event information related thereto
US10305984B1 (en) 2000-09-14 2019-05-28 Network-1 Technologies, Inc. Methods for using extracted features to perform an action associated with selected identified image
US8180792B2 (en) 2003-02-25 2012-05-15 Myspace Music Llc Method of processing song claims involving songs including, but not limited to musical works, compositions, etc
US8117130B2 (en) 2003-02-25 2012-02-14 Stragent, Llc Batch loading and self-registration of digital media files
JP2006522979A (en) * 2003-04-10 2006-10-05 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Multimedia messaging method and system
WO2004091158A1 (en) * 2003-04-10 2004-10-21 Koninklijke Philips Electronics N.V. Multimedia messaging method and system
CN1538770B (en) * 2003-04-11 2010-04-21 惠普发展公司,有限责任合伙企业 Authentication and non-interfering SMS-messaging in GSM telephone communication
EP1467581A3 (en) * 2003-04-11 2006-01-18 Hewlett-Packard Development Company, L.P. Authentication and non-interfering sms-messaging in gsm telephone communication
US7548754B2 (en) 2003-04-11 2009-06-16 Hewlett-Packard Development Company, L.P. Authentication and non-interfering SMS-messaging in GSM telephone communication
EP1467581A2 (en) 2003-04-11 2004-10-13 Hewlett-Packard Development Company, L.P. Authentication and non-interfering sms-messaging in gsm telephone communication
US7190808B2 (en) 2004-03-12 2007-03-13 Interdigital Technology Corporation Method for watermarking recordings based on atmospheric conditions
EP1598728A2 (en) * 2004-05-05 2005-11-23 TeliaSonera AB Method and device for digital rights enforcement
EP1598728A3 (en) * 2004-05-05 2012-08-01 TeliaSonera AB Method and device for digital rights enforcement
US7272240B2 (en) 2004-12-03 2007-09-18 Interdigital Technology Corporation Method and apparatus for generating, sensing, and adjusting watermarks
US7904723B2 (en) 2005-01-12 2011-03-08 Interdigital Technology Corporation Method and apparatus for enhancing security of wireless communications
US7987369B2 (en) 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US8458481B2 (en) 2005-03-03 2013-06-04 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US9292513B2 (en) 2005-12-23 2016-03-22 Digimarc Corporation Methods for identifying audio or video content
US8868917B2 (en) 2005-12-23 2014-10-21 Digimarc Corporation Methods for identifying audio or video content
US10007723B2 (en) 2005-12-23 2018-06-26 Digimarc Corporation Methods for identifying audio or video content
US9436810B2 (en) 2006-08-29 2016-09-06 Attributor Corporation Determination of copied content, including attribution
US9342670B2 (en) 2006-08-29 2016-05-17 Attributor Corporation Content monitoring and host compliance evaluation
US9842200B1 (en) 2006-08-29 2017-12-12 Attributor Corporation Content monitoring and host compliance evaluation
US9031919B2 (en) 2006-08-29 2015-05-12 Attributor Corporation Content monitoring and compliance enforcement
US8301658B2 (en) 2006-11-03 2012-10-30 Google Inc. Site directed management of audio components of uploaded video files
US10740442B2 (en) 2006-11-03 2020-08-11 Google Llc Blocking of unlicensed audio content in video files on a video hosting website
US9424402B2 (en) 2006-11-03 2016-08-23 Google Inc. Blocking of unlicensed audio content in video files on a video hosting website
US9336367B2 (en) 2006-11-03 2016-05-10 Google Inc. Site directed management of audio components of uploaded video files
US7707224B2 (en) 2006-11-03 2010-04-27 Google Inc. Blocking of unlicensed audio content in video files on a video hosting website
US10643249B2 (en) 2007-05-03 2020-05-05 Google Llc Categorizing digital content providers
GB2452588A (en) * 2007-06-18 2009-03-11 Discretix Technologies Ltd Screening electronic content in a mobile device using fingerprinting
US9135674B1 (en) 2007-06-19 2015-09-15 Google Inc. Endpoint based video fingerprinting
US9633014B2 (en) 2009-04-08 2017-04-25 Google Inc. Policy based video content syndication
WO2013079936A1 (en) * 2011-11-30 2013-06-06 Avecto Limited Method and computer device to control software file downloads
US9069950B2 (en) 2011-11-30 2015-06-30 Avecto Limited Method and computer device to control software file downloads
US9589131B2 (en) 2011-11-30 2017-03-07 Avecto Limited Method and computer device to control software file downloads

Also Published As

Publication number Publication date
NO20012994L (en) 2002-12-16
NO314375B1 (en) 2003-03-10
NO20012994D0 (en) 2001-06-15

Similar Documents

Publication Publication Date Title
WO2002103968A1 (en) An arrangement and a method for content policy control in a mobile multimedia messaging system
US20190095456A1 (en) Content publishing over mobile networks
KR100930295B1 (en) Storage of content-location information
US8140060B2 (en) Method and architecture to deliver pre-customized business card multimedia contents through IMS-based PLMNs for improving the existing calling line identification service
EP2210386B1 (en) Intelligent caching of media files
US10952040B2 (en) Mobile machine
WO2003040898A1 (en) An arrangement and a method for content policy control with a trusted environment in a multimedia messaging system
CN1846426A (en) Digital content acquisition and distribution in digitial right management enabled communication device and its method
US20060176902A1 (en) Method of processing a multimedia message, a storage medium, and an associated processing system
JP2006522979A (en) Multimedia messaging method and system
CN101098338A (en) Method for implementing multimedia information content protection
Le Bodic Multimedia messaging service
CN104579915A (en) Multimedia message publishing method and device
KR100873210B1 (en) Method and system for offering of contents
WO2005060281A1 (en) Multimedia messaging service arrangement and method
WO2003047207A1 (en) Method and arrangement for definition and control of message distribution
WO2001011824A2 (en) Method and system for recording and forwarding voice messages
KR101261229B1 (en) Service System And Method For Providing Personalized Contents Using The Mobile Communication Terminal
JP4286744B2 (en) Information management server device
JP4276562B2 (en) Mobile communication system and server apparatus
Nassiri Value Added Application Service Interworking and Functionality in Multimedia Messaging Service Center
JP4098763B2 (en) Server device
Andreadis et al. Multimedia Messaging Service (MMS)
Yang et al. Mobile Content Delivery Technologies
JP2003150521A (en) Web content distributing method and system therefor

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ CZ DE DE DK DK DM DZ EC EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP