WO2003023676A1 - Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre - Google Patents
Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre Download PDFInfo
- Publication number
- WO2003023676A1 WO2003023676A1 PCT/US2001/027712 US0127712W WO03023676A1 WO 2003023676 A1 WO2003023676 A1 WO 2003023676A1 US 0127712 W US0127712 W US 0127712W WO 03023676 A1 WO03023676 A1 WO 03023676A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- rights
- digital rights
- network
- access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 74
- 238000004891 communication Methods 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 8
- 230000009471 action Effects 0.000 claims description 6
- 239000003795 chemical substances by application Substances 0.000 description 123
- 238000007726 management method Methods 0.000 description 49
- 230000008569 process Effects 0.000 description 19
- 230000004044 response Effects 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 11
- 238000013515 script Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- NTOPKICPEQUPPH-UHFFFAOYSA-N IPMP Natural products COC1=NC=CN=C1C(C)C NTOPKICPEQUPPH-UHFFFAOYSA-N 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 4
- 230000010354 integration Effects 0.000 description 4
- 230000002452 interceptive effect Effects 0.000 description 4
- 230000015654 memory Effects 0.000 description 4
- VBMOHECZZWVLFJ-GXTUVTBFSA-N (2s)-2-[[(2s)-6-amino-2-[[(2s)-6-amino-2-[[(2s,3r)-2-[[(2s,3r)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-2-[[(2s)-2,6-diaminohexanoyl]amino]-5-(diaminomethylideneamino)pentanoyl]amino]propanoyl]amino]hexanoyl]amino]propanoyl]amino]hexan Chemical compound NC(N)=NCCC[C@@H](C(O)=O)NC(=O)[C@H](CCCCN)NC(=O)[C@H](CCCCN)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H]([C@H](O)C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCN=C(N)N)NC(=O)[C@@H](N)CCCCN VBMOHECZZWVLFJ-GXTUVTBFSA-N 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 108010068904 lysyl-arginyl-alanyl-lysyl-alanyl-lysyl-threonyl-threonyl-lysyl-lysyl-arginine Proteins 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 241000282376 Panthera tigris Species 0.000 description 1
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N Silicium dioxide Chemical compound O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011982 device technology Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000005291 magnetic effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Definitions
- the present invention relates generally to the field of network communications and, more specifically, to methods and systems for the secure distribution and delivery of content via a communications network.
- IP Internet Protocol
- DRM digital rights management
- CA Conditional Access
- a secure device e.g., a smart card located at the subscriber receiving device. Access to content is controlled by encrypting the content with a key. The secure device will only release this key to the decrypting device if the subscriber fulfills the access conditions set by an operator.
- a problem with such security systems is that the secure devices in the field need to be replaced when new business rules are introduced or when the security system is liacked'. When a large number of secure devices in the field need to be updated, it will be appreciated that the cost implications are significant.
- the Internet is becoming a platform for content delivery to millions of users worldwide.
- Using the Internet for secure content delivery introduces several problems.
- standard Client/Server systems often cannot handle the load associated with large pay-per-view events, as a single central security server is typically not equipped to handle millions of events in a short time period.
- standard Client/Server systems typically require that all users share a single content encryption key, rendering such systems vulnerable to key hook piracy (extracting the key and distributing the key to unauthorized users).
- Distributed security systems to manage access to content e.g., LDAP
- a rapidly growing broadband Internet audience is making the Internet an exciting place to stream audio and video directly to millions of users worldwide.
- streaming media may be pushed to the edges of the Internet (e.g., to the ISP's), where it is cached and from where the media can be streamed at high quality to the end user.
- Content providers or owners are increasingly using the Internet as a platform to deliver high quality programming to a large and rapidly growing audience.
- content providers are often reluctant to put premium content on the Internet, as digital content can easily be stored, forwarded and copied without any degradation by any user with a computer and a (broadband) Internet connection.
- Copy protection standards such as those specified by 5C, at the end user device using a physical secure device for decryption are expensive and somewhat unsafe.
- An experienced hacker can typically break into the secure device and retrieve the decrypted content and redistribute the content anonymously or, in a worst-case scenario, retrieve a decryption key and redistribute the content anonymously.
- a content provider wants to secure and sell premium content for distribution over a large worldwide network, such as the Internet
- a large worldwide network such as the Internet
- secure storage and distribution of content encryption (or product) keys may be required to prevent exposure of the content (or product) encryption keys to a fraudulent operator or user.
- the exposure of such content encryption keys may result in a significant loss of revenue because of piracy.
- a secure and scaleable key distribution system which can manage a large number of subscribers simultaneously, may need to be in place.
- a scalable key distribution system may become critical to distribute content associated with large-scale live events. The implementation and operational costs associated with system software and hardware required to implement these functions may be high for a single content provider.
- a digital rights network including digital rights server to store content consumer rights, defining access rights of a content consumer with respect to content, and content owner rights defining access policies to the content as established by a content owner.
- a digital rights agent is to perform cryptographic operations with respect to access operations relating to the content consumer rights and the content owner rights.
- the access operations include a first access operation with respect to the content consumer rights and a second access operation with respect to the content owner rights.
- the access operations relating to the content consumer rights and the content owner rights may be performed by any one of a plurality of users of the digital rights network.
- the plurality of users of the digital rights network include the content owner, a commerce service provider, a content distributor and the content consumer.
- the commerce service provider may be a customer relationship management (CRM) operator.
- the digital rights network may include plurality of digital rights agents, and the access operations may be performed through at least one of the plurality of digital rights agents.
- the plurality of digital rights agents is distributed across a communications network.
- the first access operation may be performed by a content distributor with which the content consumer has a relationship.
- the first access operation may be performed by a commerce service provider with which the content consumer has a relationship.
- the second access operation may be performed by the content owner.
- the access operations may include, for example, any one of a rights query, a rights update, a rights registration, a rights de-registration and a rights exercise operation.
- the first and the second access operations are, in one embodiment, both performed through the digital rights agent.
- the cryptographic operations may include any one of identity authentication, license creation, data encryption, data description, signature generation and signature verification.
- the identity authentication may be performed utilizing any one of a digital signature, username/password and TLS/SSL-based authentication.
- a distributed set of the digital rights servers is to the content consumer rights and the content owner rights.
- the digital rights server may be to store and retrieve the content consumer rights and the content owner rights, and the digital rights agent may be to enforce the content consumer rights and the content owner rights.
- the content consumer rights are possibly acquired from a content distributor with which the content consumer has a relationship.
- the content consumer rights may also acquired from a plurality of network operators.
- a certificate may be associated with the content consumer, and the content consumer rights, acquired from the plurality of network operators, may be attributed to the content consumer utilizing the certificate.
- the first access operation is to register the content consumer and is performed by a network operator, the digital rights agent to verify that the network operator is authorized to perform the first access operation.
- the first access operation may also be to register the content consumer rights, and the digital rights agent may operate to encrypt and sign the content consumer rights prior to storage thereof by the digital rights server.
- the first access operation may be by the content consumer and to create a license o the content, wherein the digital rights agent may operate to create the license.
- the first access operation may be by the content consumer to validate access to the content, and the digital rights agent may operate to perform the validating action.
- digital rights server comprises a content server to store the content owner rights and a user server to store the content consumer rights.
- Figure 1 is a diagrammatic representation of a content distribution system 10, within which the present invention may be deployed
- Figure 2 is a block diagram illustrating further details regarding software components that may reside at various locations of the content distribution system to facilitate distribution and delivery processes.
- Figure 3 is a block diagram illustrating further architectural details regarding an exemplary embodiment of a content distribution system.
- Figure 4 is a diagrammatic representation of an exemplary deployment of the digital rights network, according to one embodiment of the present invention, and illustrates the interactions of a content provider, a content distributor, a commerce service provider and a content destination with the components of the digital rights network.
- Figure 5 is a flowchart illustrating a method, according to an exemplary embodiment of the present invention, of operating a digital rights network, where a plurality of digital rights agent act as gatekeepers for all access operations relating to the digital rights network by all users of the digital rights network.
- Figure 6 is a flowchart illustrating a method, according to an exemplary embodiment of the present invention, of performing content registration and protection operation.
- Figure 7 is a flowchart illustrating a method, according to an exemplary embodiment of the present invention, of facilitating a content ordering operation.
- Figure 8 illustrates the exemplary digital rights network utilizing XML, HTTP, HTTPS and LDAP for all of internal and external interfaces.
- Figure 9 illustrates an exemplary manner in which users of the digital rights network may access to the digital rights network utilizing content management systems, to perform content policy management, and user management systems, to perform user rights management
- Figure 10 illustrates the digital rights network, in one embodiment, providing a number of interfaces for accessing, protecting, monetizing and tracking content.
- Figure 11 illustrates the digital rights network of providing an interface for effective and secure user/account management.
- Figure 12 illustrates the digital rights network of providing a number of default applications for a CRM operator:
- Figure 13 is a block diagram illustrating a machine, in an exemplary form of a computer system, which may operate to execute a sequence of instructions, stored on a machine-readable medium, for causing the machine to perform any of the methodologies discussed in the present specification.
- DRN digital rights network
- FIG. 1 is a diagrammatic representation of a content distribution system 10, within which the present invention may be deployed.
- the system 10 may conceptually be viewed as comprising a distribution process 12 and a delivery process 14.
- multiple content providers 16 e.g., a content producer or owner
- distribute content via a network 18 e.g., the Internet (wireless or wired)
- content distributors or distribution points 20.
- the distribution of content from a content provider 16 to a content distributor 20 may be as a multicast via satellite, as this provides an economic way to distribute content to a large number of content distributors 20.
- Each of the content distributors 20 caches content received from multiple content providers 16, and thus assists with the temporary storage of content near the "edges" of a network so as to reduce network congestion that would otherwise occur were a content provider 16 to distribute content responsive to every content request received from a content consumer.
- Each content distributor 20 is equipped to respond to requests received via the network 18 from the multiple content destinations 22 (e.g., subscribers or other types of content consumers) within a specified service area or conforming to specific criteria.
- a content distributor 20 after performing the necessary authorization and verification procedures, may forward content that it has cached to a content destination 22 or, if such content has not been cached, may issue a request for the relevant content to a content provider 16. For example, if the content comprises a live "broadcast", the content may be directly forwarded via the content distributor 20 to the content destination 22.
- a request for content from a content destination 22 is re-routed to a content distributor 20 located nearby the requesting content destination 22.
- the requested content is then streamed (or otherwise transmitted) from the content distributor 20 to a media terminal (e.g., a personal computer (PC), set-top box (STB), a mobile telephone, a game console, etc.) at the content destination 22.
- a media terminal e.g., a personal computer (PC), set-top box (STB), a mobile telephone, a game console, etc.
- Figure 1 illustrates, at a high-level, the processing of content as it is communicated from a content provider 16, via a content distributor 20, to a content destination 22.
- clear content 24 is encrypted utilizing, for example, a symmetric product key (or content key) to generate encrypted content 26.
- the encrypted content 26 (or cipher text) is then communicated from the content provider 16, via the network 18, to the content distributor 20.
- a digital rights agent 28, which represents the interests of the content provider 16, may perform a number of operations in a secure environment with respect to the encrypted content 26.
- the digital rights agent 28 decrypts the encrypted content 26 to regenerate the clear content 24 within a secure environment, and watermarks the clear content for distribution to a specific content destination 22. Watermarked content 30 may then be distributed from the content distributor 20 via the network 18, to a digital rights client 48 at the content destination 22. In an alternative embodiment, the digital rights agent 28 at the content distributor 20 may re-encrypt the content with a public key of a copy-protected device at the content destination 22. In any event, the clear and watermarked content 30 is then available for viewing and consumption at the content destination 22.
- FIG. 2 is a block diagram showing further details regarding software components that may, in one exemplary embodiment, reside at the various locations of the system 10 to facilitate the distribution and delivery processes 12 and 14.
- the content provider 16 operates a content provider server 34 that is responsible for the actual distribution of content from the content provider 16.
- the content provider server 34 may comprise a streaming media server (e.g., the Real Networks streaming media server developed by Real Networks of Seattle, Washington State or a Microsoft media server developed by Microsoft of Redmond, Washington State).
- a digital rights server 36 e.g., the Entriq Server developed and distributed by Entriq of Carlsbad, California
- the content provider server 34 and the digital rights server 36 are shown to communicate registration keys and access criteria.
- a digital rights server 36 may reside at a digital rights service provider (ASP) 38.
- the digital rights server 36 may perform the above-described functions for multiple content providers 16.
- a collection of the digital rights servers 36 may operate as a nucleus of a digital rights network 39.
- the exemplary content distributor 20 is shown to host a local content server 40 and a digital rights agent 28.
- the digital rights agent 28 may be located remotely from the content distributor 20, and accessed by the content distributor 20 via the network 18.
- the local content server 40 may again be a streaming media server that streams cached (or freshly received) media.
- the digital rights agent 28 operates to provide intelligent content and revenue security to content providers 16 by processing access and revenue criteria, personalizing content for delivery to a content destination 22, and personalizing and managing key delivery to a content destination 22.
- the digital rights agent 28 operates securely to authenticate a content destination 22 (e.g., utilizing secure tokens and X.509 certificates), securely to retrieve and cache product key information and content rights (e.g., access criteria), and to forward processed transactions to a commerce service provider 42 (e.g., a CRM operator) that provides billing and clearance services.
- a digital rights agent 28 may evaluate a content request, received at the content distributor 20 from a content destination 22, based on access criteria specified by a content provider 16, local date and time information, and user credentials and authentication. If a content destination 22 is authorized and/or payment is cleared, requested content might optionally be decrypted, personally watermarked, personally re-encrypted and delivered to the content destination 22.
- a number of digital rights agents 28 and digital rights servers 36 may together constitute a digital rights network (DRN) 39 to which the content provider 16, the content distributor 20, the commerce service provider 42 and the content destination 22 each have access in the capacity of "users" of the digital rights network 39 for their respective purposes. Further details regarding such a digital rights network 39 are provided below.
- DRN digital rights network
- a content destination 22 is shown to include a secure device 46 (e.g., a copyprotected device such as a set-top box (STB)) and to host a digital rights client 48.
- the digital rights client 48 may reside on a personal computer or on the secure device 46. Where the digital rights client 48 resides on a personal computer it may, for example, launch responsive to the issuance of a request from a further client program (e.g., a browser) for access certain content.
- the digital rights client 48 operates to communicate a public key of the secure device 46 to a digital rights agent 28 and also performs user authentication to verify that a particular user is authorized to initiate a transaction.
- the digital rights agent 28 utilizes copy-protected device technology to stream content to a viewing device.
- the content distribution system 10 is implemented by a distributed collection of digital rights servers 36, digital rights agents 28, and digital rights clients 48 that operate in conjunction with media servers and viewing devices (e.g., players) to protected the rights of a content provider 16 in specific content, while facilitating the widespread distribution of content.
- a digital rights server 36 enables the content provider 16 to encrypt and associate access criteria (e.g., pay-per-view, pay-per-time, subscription) with content.
- the digital rights server 36 also manages subscriptions and provides monitoring and statistic tools to a content provider 16.
- a digital rights agent 28 is a cryptographic component that insures that content rights (e.g., access criteria), as defined by content providers 16, are enforced.
- Digital rights agents 28 are located within a distribution network (e.g., at an edge server) and validate subscriber content requests against, for example, content access criteria, local date and time, and subscriber credentials.
- a digital rights client 48 is located at a destination device (e.g., the PC, a STB, and mobile phone, game console or the like) and manages an interface between a secure device 46 and a subscriber.
- FIG. 3 is a block diagram showing further architectural details regarding an exemplary embodiment of a content distribution system 10. The functioning of the various components of the content distribution system 10, as shown in Figure 3, will now be the described in the context of registration, content ordering and transaction processing operations.
- the content distribution system 10 consists of a number of sub-systems that together provide a required functionality.
- these sub-systems seek to enable the Internet infrastructure to be utilized as a safe and secure medium for online selling and buying of content, data, programs, products and services context, including video and audio encoders, servers, players, clearing systems and existing Web sites.
- the content distribution system 10 seeks to provide at least the following functions: (1) Conditional access to management through various access criteria schemes.
- PKI Public Key Infrastructure
- XML extensible Markup Language
- Digital rights clients 48 are located at content destinations 22 to sign content transactions and manage the content decryption process.
- the digital rights clients 48 may each operate in conjunction with a secure device 46 (e.g., an e-Token or smart card).
- Digital rights servers 36 within a digital rights network 39, that are accessible by content providers 16 (e.g., via DRM service providers 38).
- a content provider 16 may access a website operated by a digital rights management (DRM) service provider 38 to secure content and to define access conditions (e.g., pay per view, subscription, etc) associated with the content.
- DRM digital rights management
- a digital rights server 36 includes a content server 120 and a user server 122.
- the content server 120 hosts (e.g., stores and facilitates retrieval of) registered content items, and content rights (or content owner rights) 124, for a number of content providers 16.
- the user server 122 hosts (e.g., stores and facilitates retrieval of) registered users (or content consumers), and associated user (or content consumer) rights 126, for a number of users.
- Digital rights agents 28 are located at various points within the digital rights network 39 to act as "brokers” enforcing the business rules and security settings that are associated with content by content providers 16.
- Digital rights agents 28 also include encryption capabilities to enable the performance of cryptographic operations with respect to access operations relating to one more digital rights servers 36 (e.g., access operations to user rights 126 stored by a user server 122 and access operations to content rights 124 stored by a content server 120). A further discussion of such access operations is provided below.
- the digital rights agents 28 also include watermarking capabilities to increase the level of security 'at the last mile'.
- User servers 122 may be access by commerce service providers 42 (e.g., pay-media or Customer Relationship Management (CRM) operators) or payment gateways to manage secure devices and associated purses in the field.
- commerce service providers 42 e.g., pay-media or Customer Relationship Management (CRM) operators
- payment gateways to manage secure devices and associated purses in the field.
- FIG 3 illustrates the interactions and communications between the above- mentioned components of the digital rights network 39.
- the components of the digital rights network 39 are also shown to interface with various third party components and systems.
- the user server 122 interfaces with a commerce service provider 42 in the form of external CRM system to forward transactions and user events.
- the content aggregator or an Internet Service Provider (ISP) typically hosts the CRM system.
- the value of the transaction is settled with the various parties (content owner/provider, network provider/ISP, clearing house, etc).
- the digital rights network 39 allows external systems to register and un-register users, and control debit, credit, subscriptions and other user rights.
- the digital rights client 48 may interface with a PKI device at the subscriber PC or other media device.
- Example PKI devices are software certificates, hardware smart cards or e-Tokens.
- the digital rights network 39 supports both the PKCS#11 as well as the Microsoft CSP interface to remain device independent.
- the digital rights client 48 also interfaces device with non-PC client platforms such as Set Top Boxes, PDA's and mobile telephones enabled with (smart card) PKI technology.
- the streaming media server 40 notifies the digital rights agent 28 when a user starts and stops the streaming process for security and tracking purposes utilizing plug- ins for various streaming media technologies (Microsoft, Real, MPEG-4) and platforms (Windows, UNIX).
- FIG 4 is a diagrammatic representation of an exemplary deployment of the digital rights network 39, according to one embodiment of the present invention, and illustrates the interactions of a content provider 16, a content distributor 20, a commerce service provider 42 and a content destination 22 with the above-described components of the digital rights network 39.
- the digital rights agents 28 are the main entry points (or gateways) into the digital rights network 39 via which access operations with respect to the content rights 124 and user rights 126 are performed.
- most cryptographic operations e.g., user authentication, license creation, data encryption, data decryption, signing and signature verification
- data encryption and signing are performed exclusively by the digital rights agents 28, so that the content and user servers 120 and 122 have very little, or no, cryptographic capabilities and are utilized solely to store and retrieve data.
- each such a "user” has one or more certificates that are utilized to authenticate the user to a digital rights agent 28.
- a certificate may be bound to certain user rights 126 that the user may have acquired through, for example, a content distributor 20 (e.g., a network operator).
- a user may furthermore have multiple certificates, each certificate being for a one of multiple devices at one or more content destinations 22, such as a PC at home, a PC at work and a PDA for travel.
- the digital rights network 39 manages the logical links between certificates and user rights, as indicated by the CRM operator.
- the digital rights network 39 operates to facilitate access operations (e.g., registration, storage, retrieval and verification) with respect to the content and user rights 124 and 126.
- Certain users of the network 39 require rights to access content (e.g., the content consumer), to register content and content keys (e.g., the content provider 16), to update content rights (e.g., the content provider), and to register and update user rights (e.g., the commerce service provider 42 or the content distributor 20).
- the digital rights network 39 seeks to facilitate the access operations with respect to such rights, and to enable the management of such rights.
- the digital rights network 39 may include a distributed set of digital rights servers 36 that are utilized to host the content and user rights 124 and 126. Such servers 36 may be located at strategic locations on the digital rights network 39. All queries, updates, registrations and exercises of rights (e.g., content or user rights 124 or 126) take place by issuing appropriate requests from a "user" to a digital rights agent 28. For example, where a content provider 16 performs an access operation with respect to the content rights 124 to register content and submit an appropriate content key into the network 39, the digital rights agent 28 verifies that the content provider 16 (as a network " user") has the rights to register content.
- a commerce service provider 42 e.g., a content aggregator or CRM operator
- the digital rights agent 28 verifies whether the commerce service provider 42 as the rights to bind the relevant content items to the relevant policy.
- a content distributor 20 e.g., a network operator
- the digital rights agent 28 operates to verify that the content distributor 20 has the rights to update the relevant user rights.
- the user rights 126 in one embodiment of the present invention, may record the rights of all "users" of the digital rights network 39 to perform access operations with respect to the network 39.
- the user rights 126 may include records of: (1) the rights of the content provider 16 to register content, register access policies relating to the content, to register keys for the content, and to perform management of the content; (2) the rights of commerce service providers 42 to establish and manage user (or account) rights for content consumers; (3) the rights of content distributor 20, with which a content consumer may have relationship, to change the user rights of a content consumer (e.g., where the content consumer subscribes to new content); and (4) the rights of a content consumer (e.g., a subscriber) to access certain content via a device as a content destination 22.
- all users of the digital rights network 39 are authenticated with standard X.509 certificates and the Secure Socket Layer (SSL) transport protocol (client and service authentication).
- SSL Secure Socket Layer
- users of the network 39 may also be allowed to authenticate themselves using a user name and password.
- data may be protected utilizing transport layer SSL.
- content keys and access policies 124 and user rights 126 are encrypted and signed before they are stored within the network 39 at one or more digital rights servers 36. Li this way, unauthorized access by an administrator of the network 39 (or by a hacker) is combated.
- a digital rights agent 28 also operates to create licenses for distribution to a content destination 22 so as to allow a content consumer to access specific content. Licenses for content may be created within the digital rights agent 28 utilizing a variety of license formats, based on the relevant user secure media player 46. Li some cases, content may be delivered in the clear, but access to the content limited through a simple access control (i.e., content is not delivered from a content distributor 20 until user rights of a content consumer to access the content have been cleared).
- an access policy describes conditions under which access to content (e.g., audio, video or data) is provided to a content consumer.
- Access policies (or content policies) including access criteria are defined by the content provider 16 and are associated with registered content, the content typically being encrypted with a key, as described above. Examples of policies include payments policies (e.g., pay-per-view, pay per time), geographical constraint policies, time constraint policies and subscription policies).
- a policy may specify rules and conditions (or criteria) governing access to content (e.g., subscription, payments, age or region criteria).
- Content management that may be performed by the content provider 16 includes encoding, encrypting, indexing, archiving and delivery of content. Encryption keys are registered with the digital rights network 39 and associated with the appropriate content item and access policies.
- the content provider 16 is also illustrated to distribute content to a content distributor 20, as described above with reference to Figure 1, for caching and/or delivery to a content consumer.
- Figure 4 illustrates a commerce service provider 42 (e.g., a CRM operator) as performing user (or account) management and transaction clearing access operations relating to the digital rights network 39 via a digital rights agent 28.
- the commerce service provider 42 comprises a CRM operator, performing customer care, billing and invoicing, clearing, settlement and data warehousing functions.
- the CRM operator may access the digital rights network 39 to post and retrieve user rights. Such functions may be performed with respect to accounts maintained within the digital rights network 39.
- Multiple users may share a single account (e.g., employees of the company or members of a family) and account may be an entity financially responsible for a number of users.
- the commerce service provider 42 is also shown to be in communication with a secure device 46 at a content destination 22 for the purposes of receiving payment (and other details) pertaining to a user (or account). Specifically, a content consumer, via a secure device 46, may authorized a payment for certain subscription rights to specific content, the details of this payment being communicated to the commerce service provider 42. The commerce service provider 42 may then update an account within the digital rights network 39 to reflect the payment.
- a content distributor 20 (e.g., a network operator) is illustrated to perform access control (e.g., to query user rights 126 of a content consumer) via a digital rights agent 28 for the purposes of, for example, issuing a key with which the content consumer can decrypt certain content delivered to the appropriate content destination 22, or for the purposes of, for example, issuing clear content to the content destination 22.
- the content distributor 20 may also perform update operations with respect to user rights 126 of a content consumer responsive to purchase or subscription actions communicated via a content consumer to the content distributor 20.
- a content consumer may subscribe to particular pay-per-view content, in which case the content distributor 20 updates the user rights 126 for the content consumer to indicate that the user has a right to access the relevant pay-per-view content.
- the content destination 22 (e.g., a secure device 46 operated by a content consumer) is shown to request and receive licenses from a digital rights agent 28.
- the digital rights agent 28 issues a license on behalf of a content rights owner (e.g., a content provider 16), and a commerce service provider 42 (e.g., a CRM operator) for a content consumer.
- the license is issued if an access policy associated with the requested content is satisfied, and the content consumer's account is in order.
- Such a license typically contains a content decryption key, and certain rules governing the use of the decryption key.
- the content destination 22 is also shown to receive content from the content distributor 20, this content typically being encrypted and requiring the above-mentioned content decryption key for access.
- FIG. 5 is a flowchart illustrating a method 100, according to an exemplary embodiment of the present invention, of operating a digital rights network 39, where a plurality of digital rights agents 28 act as gatekeepers for access operations relating to the digital rights network 39 by all users of the digital rights network 39.
- the method 100 commences at block 102 with the detection by a digital rights agent 28 of an access operation, originated by a user, relating to rights that are stored, maintained and managed within the digital rights network 39.
- the access operation may depend upon the nature of the user and may include, for example, a rights query, a rights updates, a rights registration, a rights de-registration or a rights exercise operation.
- the access operation may also be with respect to either the content rights 124 hosted by a content server 120, or the user rights 126 hosted by a user server 122. Exemplary manners in which such access operations may be directed towards a digital rights agent 28 are discussed for the detailed below.
- the digital rights agent 28 then performs a user authentication operation (or verification operation) in order to verify that the relevant user is indeed authorized to access the digital rights network to perform the relevant access operation.
- a user authentication operation or verification operation
- the digital rights agent 28 performs one or more cryptographic operations with respect to the authentication operation and the access operation to ensure the security of the content rights 124 and user rights 126 as stored within the digital rights network 39.
- Such cryptographic operations may include, for example, identification, license encryption, content and user data decryption, and signature verification.
- the flow of the method 100 then terminates at block 108.
- Live content requires a slightly different approach at the initial stage of content protection (real-time encryption is required).
- FIG. 6 is a flowchart illustrating a method 110, according to an exemplary embodiment of the present invention, of performing a content registration and protection operation.
- the method 110 commences when a content provider 16 has a content item that needs to be secured from unauthorized access.
- the content provider 16 accesses a web server operated by the digital rights management (DRM) service provider 38, from which the content provider 16 downloads a (or alternatively runs a web-based) content security management application that includes a policy manager and a registration manager.
- DRM digital rights management
- the content provider 16 utilizing the policy manager, sets up a number of standard profiles with business rules (e.g., pay-per-view, pay-per-time, regional control etc.) that may later be applied to individual content items.
- the content provider 16, utilizing the registration manager secures (e.g., encrypts) the relevant content item with particular access criteria that may be embodied in a standard profile created at block 114.
- the content is registered at the content server 120, operated by the digital rights management (DRM) service provider 38, together with the access criteria and a product key that was used for encryption of the content.
- DRM digital rights management
- the content item is renamed according to a scheme allowing an application to link the content item to a unique content identifier.
- the content provider 16 proceeds to distribute the content item to content distributors 20, as illustrated in Figure 4.
- the content distributor 20 establishes links, in the exemplary form of URLs embedded in web pages, for the content item.
- the URLs are user-selectable to trigger a license request process between a secure device 46 and digital rights agent 28.
- the URL may return HTML or JavaScript to query user credentials (e.g., a PIN code or password), user confirmation (payment) or to download secure content licenses to a media player.
- the flow for the method 110 then ends at block 123.
- a content ordering operation is commenced upon receipt of a request from a content destination 22 (e.g., a user) for specific content.
- the user may, for example, be running a browser on a personal computer and want to view a content item provided by a particular content provider 16.
- the browser detects a tag containing a URL.
- the browser passes the URL to the digital rights client 48, also executing on the personal computer, to commence a transaction.
- FIG. 7 is a flowchart illustrating a method 130, according to an exemplary embodiment of the present invention, of facilitating a content ordering operation.
- the method 130 is commenced when a content consumer running a browser on a client machine wishes to view a content item.
- the browser is navigated to a digital rights agent 28.
- the browser downloads identified JavaScript to authenticate the content consumer and to commence a license request process.
- the content consumer is authenticated by the digital rights agent 28 utilizing a digital signature, username/password or TLS/SSL-based client authentication. Following successful authentication, the digital rights agent 28 proceeds to retrieve appropriate user rights 126 for the content consumer from the user server 122.
- the browser (via the digital rights client 48) initiates a secure session with a digital rights agent 28 to request a license for the relevant content item.
- the digital rights agent 28 retrieves an appropriate access (or content) policy and content keys for the requested content item from the digital rights server 36.
- the digital rights agent 28 constructs a markup language (e.g., HTML) document containing the license terms, and communicates the markup language document to the browser.
- terms e.g., price
- the digital rights agent 128 communicates a license containing a protected encryption key to the secure device 46, and instructs a streaming media server 40 to start streaming the content item to the appropriate content destination 22 until an access time has expired.
- the flow of method 130 then terminates at block 150.
- the digital rights agent 28 communicates a markup language document in the form of a derived XML signing request to the digital rights client 48 (as opposed to communicating an HTML document to the browser).
- the digital rights client 48 parses the XML signing request, displays order information (e.g., a price) to the user (e.g., via the browser) and prompts for a Personal Identification Number (PIN) code and confirmation by way of a user interface.
- the digital rights client 48 may generate such a user interface for display via a browser 90.
- the digital rights client 48 may generate its own user interfaces. The user confirms the order, and the digital rights client 48 digitally signs the order confirmation using the secure device 46.
- the signed order is sent to the digital rights agent 28 that verifies the signed confirmation order and the user credentials.
- the digital rights agent 28 manages the content security process (e.g., watermarking, re- encryption) until an access time has expired, after which the content destination 22 will no longer be able to access the content.
- a transaction processing operation may occur concurrently with the content ordering operation. More specifically, the digital rights agent 28 will update the user rights and forward the updated user data to the user server 122, and send a transaction event to an account management system.
- the digital rights client 48 interfaces with the secure device 46 at the content destination 22.
- Example secure devices 46 are smart cards or e-Tokens.
- a secure device 46 may utilize the PKCS#11 interface to provided device independent.
- the content destination 22 may also employ client devices utilizing non-PC client platforms, such as Set Top Boxes (STBs) and mobile telephones enabled with (smart card) PKI technology.
- client devices utilizing non-PC client platforms, such as Set Top Boxes (STBs) and mobile telephones enabled with (smart card) PKI technology.
- STBs Set Top Boxes
- a client device employed at a content destination 22 may run an interactive application (e.g., the OpenTV software suite) to order secure content items using a regular pay television smart card.
- an interactive application e.g., the OpenTV software suite
- the digital rights client 48 and secure device 46 interface with the local content server 40 (e.g., a media server) and client applications to secure a control channel (such as RTSP or HTTP) and data channel (such as MPEG-4 over RTP).
- a control channel such as RTSP or HTTP
- data channel such as MPEG-4 over RTP
- the secure device server 44 provides an interface for external payment registration servers (such as used for regular web sites) to allow automated purse management.
- a collection of digital rights agents 28 are responsible for performing the bulk of cryptographic and security operations pertaining to access operations to the digital rights network 39 by users.
- a discussion of exemplary cryptographic and security operations/technologies that may be utilized by any one of the digital rights agents 28 of the collection of digital rights agents 28 is provided below.
- a content provider 16 may utilize Windows Media DRM for encryption and copy protection of Windows Media content (i.e., content encrypted and compressed utilizing technologies developed by Microsoft Corp. of Redmond, Washington State).
- a content provider 16 may utilize Real DRM for encryption and copy protection of Real content (i.e., content encrypted and compressed utilizing technologies developed by Real Networks, L e. of Seattle, Washington State).
- a content provider 16 may utilize MPEG-4 IPMP compliant solutions in conjunction with MPEG-4 manufacturers to encrypt MPEG-4 data, according to MPEG-2 / DVB principles.
- a digital rights agent 28 may utilize Windows Media DRM for generation and delivery of Windows Media licenses.
- a digital rights agent 28 may utilize Real DRM for generation and delivery of Real licenses.
- They digital rights agent 28 may utilize MPEG-4 IPMP compliant solutions in conjunction with MPEG-4 manufacturers to deliver licenses to MPEG-4 compliant terminals.
- a client-side HTTPS or username/password may be utilized mutually to authenticate a user of the digital rights network and a digital rights agent 28.
- the digital rights network may utilize HTTPS to protect the link between a user and a digital rights agent 28.
- a digital rights management service provider 38 as an operator of the digital rights network 39, utilizes AES to encrypt user and content rights data before the rights data is forwarded to the internal servers (e.g., content and user servers 120 and 122) for storage.
- the rights data is retrieved from the appropriate internal server, decrypted and delivered through HTTPS to authorized users.
- the digital rights agent 28 will enforce (through user authentication) that the user and content data is only provided to authorized users. Encryption is combined with HMAC signatures to prevent modification of the content.
- All data belonging to a certain commerce service provider 42 (e.g., a CRM operator) is encrypted with a provider-specific storage key.
- Digital rights agents 28 retrieve the provider-specific storage key from a central key management systems (not shown) using regular key exchange protocols.
- the provider-specific storage key may be frequently cycled to minimize damage in case of key exposure.
- the digital rights network 39 may utilize media server plug-ins to enforce access control.
- User credentials are provided by the requesting digital rights client 48 as part of the content request URL (RTSP, MMS) and verified by the plug-in.
- the digital rights network 39 utilizes XML, HTTP, HTTPS and LDAP for all of internal and external interfaces, as illustrated in Figure 8.
- the exemplary HTTP request contains the following elements:
- the requested content ID existing of o Crmld The CRM operator ID (e.g., 'ESPN') of the requested content
- o Accountld The account ID (e.g., 'NBA') of the requested content owner
- o Itemld The content item ID (e.g.,'s34') of the requested content.
- the search string is used for web application content items (e.g., an ASP or Java servlet), where the search-string is appended to the base URL associated with the registered content ID.
- the qCrmld provides the CRM operator ID of the requesting user.
- This URL may lead to sports content provided by Net36 / NBA, using an NBA user account. A non-registered user will be redirected to the NBA registration URL.
- the digital rights network 39 identifies a policy associated with a content item by combining the CRM ID, account ID and the item ID and querying internal content and policy tables.
- Content may refer to:
- a key used to encrypt the content An authorized user will receive a license to decrypt the content (license type is "IPMPvO” or "WDRMv7").
- a link to the actual content or a link to the META file (like SMIL or ASX). An authorized user will receive the registered link or the META file combined with additional authentication parameters to request the content.
- Applications are configured by an operator of the digital rights network 39 (e.g., the digital rights management (DRM) service provider 38).
- Exemplary predefined interactive applications include: a. /Sentriq/ ⁇ CRM ID>/Home, the default page. b. /Sentriq/ ⁇ CRM ID>/ Accounts, to manage users & accounts. c. /Sentriq/ ⁇ CRM ID>/History, to view user history. d. /Sentriq/ ⁇ CRM ID>/My Account, for customer self-care. e. /Sentriq/ ⁇ CRM ID>/Policy, to manage content policies. f. /Sentriq/ ⁇ CRM ID>/Content, to manage content. g. /Sentriq/ ⁇ CRM ID>/Statistics, to view content statistics. Exemplary use scenarios for the above applications include:
- a content provider 16 may register an MPEG-4 IPMP key without a link to the actual content.
- the digital rights network 39 will in this case issue a MPEG-4 IPMP license for authorized users and update the user's rights.
- a content provider 16 may register a MPEG-4 IPMP key with a link to the actual content.
- the digital rights network 39 will issue an MPEG-4 IPMP license for authorized users and update the user's rights, and redirect the user to the actual content with the appropriate authentication parameters.
- a content provider 16 may register a Microsoft DRM key without a link to the actual content.
- the digital rights network 39 will issue a Microsoft DRM license for authorized users and update the user's rights.
- a content provider 16 may register a Real video file without a key but with a link to the actual content.
- the digital rights network 39 will redirect the user to the appropriate link and update the user's rights.
- a commerce service provider 42 may query or edit user rights using the registered user management application.
- users of the digital rights network 39 may access to the digital rights network 39 utilizing content management systems 160, to perform content policy management, and user management systems 162, to perform user rights management.
- the digital rights network 39 may provide appropriate external interfaces, for example (1) content management interfaces and (2) user management interfaces.
- Further exemplary external interfaces that may be provided by the digital rights network 39 include (3) an access data interface and (4) a media platform interface.
- the digital rights network 39 may provide default tools for content management, but also allow external applications to automate the content management process.
- the content management interfaces may allow a content provider 16 to configure content access policies (e.g., pricing, geographic control, parental control, subscription, etc.), and allow a content provider 16 to protect and registered content.
- the digital rights network 39 may provide an interface to:
- a content provider 16 is regarded as being to the responsible for managing content rights.
- the digital rights network 39 provides a number of interfaces for accessing, protecting, monetizing and tracking content.
- the interfaces allow for easy integration into existing content management systems and online content catalogs. Exemplary interfaces, illustrated in Figure 10, include:
- An HTTP server interface allowing a content provider 16 to register content and manage associated access policies. Content rights are exclusively used to enable protected Internet Media distribution and to provide detailed statistics and demographics to the content provider.
- An access gateway interface for authenticated user HTTP requests This allows a for example, for personalized promotion and advertisement insertion.
- content items are identified by the triplet Crmld - Accountld - Itemld:
- a content item can be a single piece of content (streaming media), a subscription or an interactive web application.
- Content policies may be identified by the triplet Crmld - Accountld - Policyld.
- a user can access content items that have been registered with the digital rights network 39 via the content management interface.
- the user may be requested to provide a payment or a PIN code before access to content is granted, depending on content access policy and user settings.
- the user may be redirected to an external source for content delivery (in case of streaming media).
- the user may be redirected to a CRM specific registration site if he has no account.
- an API that may be utilized to GET a content item: https://agent.sentriq.net/services/ ⁇ CrmId>/ ⁇ AccountId>/ ⁇ ItemId>[ ⁇ search>]
- the user authentication process can be made 'non-interruptive' by POSTING the necessary user credentials:
- the content item can be, for example:
- the digital rights network 39 provides web-based tools to manage content items.
- the interfaces described are provided to allow advanced integration into content management systems, such as automated content registration.
- Type Content type (when creating a new content item)
- the HTTP response contains the XML document with the content information.
- UserCrmld The ID of the user CRM operator. (The policy may vary depending on the user's CRM id and roaming agreements.)
- Regionld The region ID.
- the HTTP response contains the XML document with the content and policy data.
- a content provider 16 can manage content policies hosted within the digital rights network 39.
- the content policy identifies the content access criteria such as a payment, a subscription or other criteria.
- Policyld The ID of the policy.
- UserCrmld The ID of the user CRM operator. (The policy may vary depending on the user's CRM id and roaming agreements.)
- Regionld The region ID.
- the HTTP response contains the XML document with the policy data.
- the following exemplary URL is used to query (GET) or set (POST) policy data for account 'LaLakers' content policy 'PremiumGames'.
- the digital rights network 39 may provide default tools for user management, but also allows for external applications to automate the user management process.
- the user management interfaces may allow a CRM operator to register users, and manage their rights, including subscriptions, parental, regional and debit/credit control.
- the digital rights network may provide an interface to:
- the digital rights network 39 provides an interface for effective and secure user/account management.
- the interface allows for easy integration with existing CRM systems 160, as illustrated in Figure 11.
- the digital rights network 39 in one embodiment provides an HTTP server interface to allow a CRM operator to register users or 'subscribers' and associate users with rights, such as debit, credit and subscriptions. Subscriber information and rights may be exclusively used to enable protected Internet Media transactions. Subscriber information is typically not forwarded to content owners without the explicit request of the CRM operator.
- the digital rights network 39 forwards user events (e.g., Internet broadcast Pay Per View transactions) to the CRM system 160.
- the digital rights network 39 also provides an access gateway interface for authenticated user HTTP requests. This allows, for example, a CRM operator to securely manage access of users and CRM customer service operators to the CRM system 160.
- users are in one embodiment identified by the triplet Crmld - Account - Userld:
- Accountld allowing the CRM operator to identify the user account, like a CRM specific account id (username) or email address.
- a CRM operator has a relationship with multiple accounts. An account may be associated with multiple users (e.g., in case of corporate accounts), but is often only associated with one user (e.g., in case of traditional Pay Media subscription accounts). All user management messages contain the triplet to identify the associated user. Access rights are defined at a user level.
- the digital rights network 39 provides an HTTP / XML interface to enable the CRM operator to manage user rights.
- Predefined XML tags are used within the digital rights network to authenticate and authorize users before access to content is granted.
- Accountld The ID of the user's account.
- QCrmld The CRM ID of the requesting user (operator).
- the QCrmld is typically equal to the Crmld.
- a certain Customer Service Representative can manage accounts for multiple CRM operators.
- the HTTP response contains the XML document with the user rights.
- the digital rights network 39 provides an HTTP / XML interface to enable the CRM operator to manage account data.
- Accountld The ID of the user' s account.
- QCrmld The CRM ID of the requesting user (operator).
- the QCrmld is typically equal to the Crmld.
- a certain Customer Service Representative can manage accounts for multiple CRM operators.
- this access operation is undefined if the user is identified utilizing a secure certificate, instead of username/password.
- a CRM operator may be required to manage which and how many devices are mapped to the same user and associated rights.
- Devices are typically identified using a certificate serial number, telephone number or a device address.
- the digital rights network 39 facilitates the binding of the device identifier to user rights according to CRM instructions.
- the CRM operator creates a user account with the appropriate rights including a secret user 'bind ID' and a 'bind expire date').
- the bind ID can be any random string, and should only be forwarded to the user that will own those rights.
- the user is redirected to a bind URL (as specified below) before the bind date expires.
- bind ID of the bind URL matches the bind ID in the appropriate user XML document, and the current date falls within the bind expire date, then the user device ID is bound with the user rights. The bind ID is removed from the user rights to prevent fraud. 5. The user is redirected to the URL as requested by the referrer.
- a CRM operator can bind user rights to a device (certificate) by redirecting the user to the following URL: https://agent.sentriq.net/services/Bind[ ⁇ search>]
- Accountld The ID of the user's account.
- Bindld The ID of the bind request. This ID must match the bind ID as registered with the User XML document (see scenario description).
- the digital rights network 39 operates to depend a return code to the return URL to flag any errors that took place during the bind process:
- the digital rights network 39 may grant X.509 certificates to users to enable secure user authentication.
- the certificate is bound to the user machine and cannot easily be copied to other machines.
- CRM operators typically do not use this API directly, but use the 'Bind' API to provide certificates to users.
- a CRM operator can into the exemplary embodiment redirect the user to collect a certificate using the following URL: http://cert.sentriq.net/getCert[ ⁇ search>]
- the application will generate a certificate for the user and return the user to the originating web page.
- 'Search' contains the following parameters:
- the digital rights network 39 operates to depend a return code to the return URL to flag any errors that took place during the certificate generation process.
- the digital rights network 39 enables service providers to protect and personalized web applications, such as "guided by”, customize self-care” and "account management". Each web application can be configured with a different access policy, enabling schemes such as subscriptions or even pay per view for accessing online web services.
- the digital rights network provides the following default applications for a CRM operator:
- the digital rights network 39 may be viewed as acting like a proxy, and verifies the application access policy and the user rights before forwarding the user HTTP request to the hosted web application.
- the forwarded HTTP request includes private HTTP header fields particular to the digital rights network 39:
- This optional field contains the XML user rights XML document, and is omitted if the user has no CRM account.
- device-id This optional field contains the device (authentication) identifier such as the certificate serial number, and is omitted if the user (device) has not been authenticated.
- This optional field contains the CRM operator ID from the requesting user.
- account-id This optional field contains the account ID from the requesting user.
- This optional field contains the user ID of the requesting user.
- This optional field contains the ISO country code that has been resolved by the internal geo-locater using the client IP address.
- the information held in these fields can be used by the web application to check the users rights and personalize the user experience.
- the digital rights network 39 can block the user based on the configured access policy, the application server is responsible for checking the values of the private HTTP headers as defined above. The digital rights network 39 will ensure that any invalid private HTTP headers of an incoming request are cleared before forwarding the request, to prevent hackers from masquerading legitimate users.
- a browser (optionally operating in conjunction with a digital rights client 48) sends a regular HTTP GET or POST request to the digital rights agent 28 to access the application.
- the digital rights agent 28 authenticates the user and collects the user rights 126 and the content rights 124.
- the digital rights agent 28 forwards the HTTP request to the appropriate application, including the private HTTP headers containing user information. 4.
- the application server receives the request and returns a response, tailored to the user's profile.
- the agent processes the response and returns the reply to the browser (and/or digital rights client 28).
- the processing of the response may include the insertion of user or session specific information at the direction of the application server using HTML directives. This is done to personalize the response at the digital rights agent 28 and browser (and/or digital rights client 48) instead of at the central server, allowing for scaleable solutions.
- user can be directed to one of the applications using the following URL: https://agent.sentriq.net services/ ⁇ App>[search]
- the digital rights agent 28 authenticates the user, verifies access policies and forwards the URL request to the configured application with the private header fields.
- the response from the application server may contain HTML directives for the digital rights agent 28 to include user, content or session JavaScript objects in the resulting web page. Exemplary HTML directives to generate JavaScript objects are included in the HTML response as follows:
- directives are replaced by JavaScript classes that contain public content, user and session parameters respectively.
- a directive may indicate a specific XML attribute as follows:
- HTML page For example, the following HTML page:
- the digital rights network 39 may be integrated with a number of the media platforms, such as Windows Media Technology (including Windows Media DRM) and Real.
- the digital rights network 39 seeks to be media platform agnostic, but requires integration with media encoding, server and decoding in order to provide a proper end-to-end protection level.
- the interfaces for the various exemplary media platforms are discussed below..
- the digital rights network 39 utilizes Windows Media DRM for encryption of Windows Media content and the Real DRM for encryption of Real content.
- the digital rights network 39 may also implements a number of internal interfaces, examples of which are provided below: Digital Rights Agent ⁇ > LDAP Server Interface:
- a digital rights agent 28 may utilize standard LDAP to interface with an LDAP server.
- a digital rights agent 28 may utilize standard HTTP to interface with the content and user servers 120 and 122. To access internal data tables, the following URL is used: http:// ⁇ server>/scripts/data.dll/ ⁇ queryld>r ⁇ search>l
- the content of the HTTP request message contains the actual user data (XML).
- the content of the HTTP response message contains the actual user data (XML).
- the network ID and agent ID are recorded by a data server. This enables asynchronous notification of the corresponding digital rights agent 28 in case the user data is updated.
- exemplary tables of the may be maintained within databases of the content and user servers 120 and 122 of the digital rights network 39.
- the exemplary tables contain a generic XML structure to hold the actual fields.
- the exemplary database provides queries for accessing all tables through the primary and secondary indexes.
- UserList List of users for a certain crmld, accountld, including userld and NickName fields.
- PolicyList List of all policies for a certain crmld, accountld, including policyld and description.
- a LDAP server is used to map a user authentication ID to an entry in the user rights database.
- FIG 13 is a diagrammatic representation of a machine in the form of computer system 200 within which software, in the form of a series of machine-readable instructions, for performing any one of the methods discussed above may be executed.
- the computer system 200 includes a processor 202, a main memory 204 and a static memory 206, which communicate via a bus 208.
- the computer system 200 is further shown to include a video display unit 210 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)).
- LCD liquid crystal display
- CRT cathode ray tube
- the computer system 200 also includes an alphanumeric input device 212 (e.g., a keyboard), a cursor control device 214 (e.g., a mouse), a disk drive unit 216, a signal generation device 218 (e.g., a speaker) and a network interface device 220.
- the disk drive unit 216 accommodates a machine-readable medium 222 on which software 224 embodying any one of the methods described above is stored.
- the software 224 is shown to also reside, completely or at least partially, within the main memory 204 and/or within the processor 202.
- the software 224 may furthermore be transmitted or received by the network interface device 220.
- machine-readable medium shall be taken to include any medium that is capable of storing or encoding a sequence of instructions for execution by a machine, such as the computer system 200, and that causes the machine to perform the methods of the present invention.
- machine-readable medium shall be taken to include, but not be limited to, solid-state memories, optical and magnetic disks, and carrier wave signals.
- the software 224 can be executed on a variety of hardware platforms and for interface to a variety of operating systems.
- the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
- Such expressions are merely a shorthand way of saying that execution of the software by a machine, such as the computer system 200, to perform an action or a produce a result.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01970672A EP1433095A4 (fr) | 2001-09-07 | 2001-09-07 | Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre |
PCT/US2001/027712 WO2003023676A1 (fr) | 2001-09-07 | 2001-09-07 | Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre |
AU2001290653A AU2001290653B2 (en) | 2001-09-07 | 2001-09-07 | A distributed digital rights network (DRN), and methods to access, operate and implement the same |
US10/489,132 US20050021467A1 (en) | 2001-09-07 | 2001-09-07 | Distributed digital rights network (drn), and methods to access operate and implement the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2001/027712 WO2003023676A1 (fr) | 2001-09-07 | 2001-09-07 | Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003023676A1 true WO2003023676A1 (fr) | 2003-03-20 |
Family
ID=21742819
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/027712 WO2003023676A1 (fr) | 2001-09-07 | 2001-09-07 | Reseau distribue de gestion de droits numeriques et procedes permettant d'acceder a ce reseau, de l'utiliser et de le mettre en oeuvre |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1433095A4 (fr) |
AU (1) | AU2001290653B2 (fr) |
WO (1) | WO2003023676A1 (fr) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1439450A2 (fr) * | 2003-01-20 | 2004-07-21 | Matsushita Electric Industrial Co., Ltd. | Serveur gérant la distribution de licences, appareil de redélivrance de licenses et serveur permettant la vente de licences |
DE10317037A1 (de) * | 2003-04-14 | 2004-11-04 | Orga Kartensysteme Gmbh | Verfahren zum Schutz von Daten gegen unberechtigte Benutzung auf einem Mobilfunkgerät |
WO2004100493A1 (fr) * | 2003-05-09 | 2004-11-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Systeme et procede de mise en antememoire repartie et de redistribution dans un reseau de donnees sans fil |
DE10331154A1 (de) * | 2003-07-07 | 2005-02-10 | Hünig, Veit | Verfahren und eine Anordnung zur Bereitstellung eines weltweiten TV- und/oder Video-Netzwerkes |
EP1713206A1 (fr) * | 2005-04-11 | 2006-10-18 | Last Mile Communications/Tivis Limited | Réséau de communication distribué comprenant des stations de base connectées sans fil |
WO2008021594A2 (fr) * | 2006-05-08 | 2008-02-21 | Sandisk Corporation | Distribution en borne numérique de stockage sécurisée |
EP2263159A2 (fr) * | 2008-04-09 | 2010-12-22 | Level 3 Communications, LLC | Gestion de demande de contenu basée sur des règles |
KR101134638B1 (ko) | 2004-04-20 | 2012-04-09 | 삼성전자주식회사 | 홈 네트워크 하에서의 drm 시스템을 구성하기 위한방법 및 장치 |
US9426244B2 (en) | 2008-04-09 | 2016-08-23 | Level 3 Communications, Llc | Content delivery in a network |
US9680686B2 (en) | 2006-05-08 | 2017-06-13 | Sandisk Technologies Llc | Media with pluggable codec methods |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002001335A2 (fr) * | 2000-06-27 | 2002-01-03 | Microsoft Corporation | Systeme et procede d'activation d'un dispositif de rendu dans une architecture multiniveau de gestion des droits |
US20020010860A1 (en) * | 2000-01-27 | 2002-01-24 | Chu Chang-Nam | Method for operating internet site offering encrypted contents |
US20020013772A1 (en) * | 1999-03-27 | 2002-01-31 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like |
US20020026581A1 (en) * | 2000-08-31 | 2002-02-28 | Sony Corporation | Content distribution system, a content distribution method, an information processing apparatus, and a program providing medium |
US20020042779A1 (en) * | 2000-10-11 | 2002-04-11 | Yoshimichi Osaka | Method for authenticating users |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU6362800A (en) * | 1999-07-23 | 2001-02-13 | Supertracks, Com, Inc. | Digital/internet distribution channel management system for digital content |
EP1407360A4 (fr) * | 2000-06-16 | 2009-08-12 | Entriq Inc | Procedes et systemes servant a distribuer un contenu par l'intermediaire d'un reseau mettant en application des agents d'acces conditionnel distribues et des agents securises pour effectuer la gestion de droits numeriques (drm) |
JP4503794B2 (ja) * | 2000-07-19 | 2010-07-14 | 株式会社日立製作所 | コンテンツ提供方法及び装置 |
-
2001
- 2001-09-07 WO PCT/US2001/027712 patent/WO2003023676A1/fr active Application Filing
- 2001-09-07 AU AU2001290653A patent/AU2001290653B2/en not_active Ceased
- 2001-09-07 EP EP01970672A patent/EP1433095A4/fr not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020013772A1 (en) * | 1999-03-27 | 2002-01-31 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like |
US20020010860A1 (en) * | 2000-01-27 | 2002-01-24 | Chu Chang-Nam | Method for operating internet site offering encrypted contents |
WO2002001335A2 (fr) * | 2000-06-27 | 2002-01-03 | Microsoft Corporation | Systeme et procede d'activation d'un dispositif de rendu dans une architecture multiniveau de gestion des droits |
US20020026581A1 (en) * | 2000-08-31 | 2002-02-28 | Sony Corporation | Content distribution system, a content distribution method, an information processing apparatus, and a program providing medium |
US20020042779A1 (en) * | 2000-10-11 | 2002-04-11 | Yoshimichi Osaka | Method for authenticating users |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1439450A2 (fr) * | 2003-01-20 | 2004-07-21 | Matsushita Electric Industrial Co., Ltd. | Serveur gérant la distribution de licences, appareil de redélivrance de licenses et serveur permettant la vente de licences |
EP1439450A3 (fr) * | 2003-01-20 | 2006-01-18 | Matsushita Electric Industrial Co., Ltd. | Serveur gérant la distribution de licences, appareil de redélivrance de licenses et serveur permettant la vente de licences |
DE10317037A1 (de) * | 2003-04-14 | 2004-11-04 | Orga Kartensysteme Gmbh | Verfahren zum Schutz von Daten gegen unberechtigte Benutzung auf einem Mobilfunkgerät |
WO2004100493A1 (fr) * | 2003-05-09 | 2004-11-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Systeme et procede de mise en antememoire repartie et de redistribution dans un reseau de donnees sans fil |
DE10331154A1 (de) * | 2003-07-07 | 2005-02-10 | Hünig, Veit | Verfahren und eine Anordnung zur Bereitstellung eines weltweiten TV- und/oder Video-Netzwerkes |
KR101134638B1 (ko) | 2004-04-20 | 2012-04-09 | 삼성전자주식회사 | 홈 네트워크 하에서의 drm 시스템을 구성하기 위한방법 및 장치 |
EP1713206A1 (fr) * | 2005-04-11 | 2006-10-18 | Last Mile Communications/Tivis Limited | Réséau de communication distribué comprenant des stations de base connectées sans fil |
WO2008021594A2 (fr) * | 2006-05-08 | 2008-02-21 | Sandisk Corporation | Distribution en borne numérique de stockage sécurisée |
WO2008021594A3 (fr) * | 2006-05-08 | 2008-04-17 | Sandisk Corp | Distribution en borne numérique de stockage sécurisée |
US9680686B2 (en) | 2006-05-08 | 2017-06-13 | Sandisk Technologies Llc | Media with pluggable codec methods |
EP2263159A2 (fr) * | 2008-04-09 | 2010-12-22 | Level 3 Communications, LLC | Gestion de demande de contenu basée sur des règles |
EP2263159A4 (fr) * | 2008-04-09 | 2014-04-02 | Level 3 Communications Llc | Gestion de demande de contenu basée sur des règles |
US9185158B2 (en) | 2008-04-09 | 2015-11-10 | Level 3 Communications, Llc | Content delivery in a network |
US9426244B2 (en) | 2008-04-09 | 2016-08-23 | Level 3 Communications, Llc | Content delivery in a network |
Also Published As
Publication number | Publication date |
---|---|
EP1433095A1 (fr) | 2004-06-30 |
EP1433095A4 (fr) | 2005-09-28 |
AU2001290653B2 (en) | 2008-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050021467A1 (en) | Distributed digital rights network (drn), and methods to access operate and implement the same | |
US20040168184A1 (en) | Multiple content provider user interface | |
US7107462B2 (en) | Method and system to store and distribute encryption keys | |
US7228427B2 (en) | Method and system to securely distribute content via a network | |
US6961858B2 (en) | Method and system to secure content for distribution via a network | |
US7389531B2 (en) | Method and system to dynamically present a payment gateway for content distributed via a network | |
US7404084B2 (en) | Method and system to digitally sign and deliver content in a geographically controlled manner via a network | |
US9418376B2 (en) | Method and system to digitally sign and deliver content in a geographically controlled manner via a network | |
US6993137B2 (en) | Method and system to securely distribute content via a network | |
US7706540B2 (en) | Content distribution using set of session keys | |
US7237255B2 (en) | Method and system to dynamically present a payment gateway for content distributed via a network | |
US20050066353A1 (en) | Method and system to monitor delivery of content to a content destination | |
AU2001269856A1 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) | |
AU2001290653B2 (en) | A distributed digital rights network (DRN), and methods to access, operate and implement the same | |
AU2007234620B2 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM) | |
AU2007234622B2 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ PH PL PT RO SD SE SG SI SK SL TJ TM TR TT TZ UG US UZ VN YU ZA |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZW AM AZ BY KG KZ MD TJ TM AT BE CH CY DE DK ES FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2001290653 Country of ref document: AU |
|
REEP | Request for entry into the european phase |
Ref document number: 2001970672 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001970672 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001970672 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10489132 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: JP |