WO2010109237A1 - A method of and apparatus for protecting a data item - Google Patents

A method of and apparatus for protecting a data item Download PDF

Info

Publication number
WO2010109237A1
WO2010109237A1 PCT/GB2010/050499 GB2010050499W WO2010109237A1 WO 2010109237 A1 WO2010109237 A1 WO 2010109237A1 GB 2010050499 W GB2010050499 W GB 2010050499W WO 2010109237 A1 WO2010109237 A1 WO 2010109237A1
Authority
WO
WIPO (PCT)
Prior art keywords
data item
consumed
book
portions
audio
Prior art date
Application number
PCT/GB2010/050499
Other languages
French (fr)
Inventor
Stephen Kennedy
Original Assignee
Stephen Kennedy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stephen Kennedy filed Critical Stephen Kennedy
Publication of WO2010109237A1 publication Critical patent/WO2010109237A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • the present, invention relates to a method of and apparatus for protecting a data item, and to a computer program for implementing the method on a programmable data processor.
  • a method of protecting a data item where, in use, the data item is consumed in a sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
  • ⁇ t is thus possible to provide a process by which a piece of digitalized copy is encrypted into a form, that can be downloaded onto a device that decrypts the copy allowing it to be read a predetermined number of times (usually once) the copy is then degraded as described below in order to protect it from reuse or reproduction.
  • a computer program for causing a programmable data processor to operate in accordance with the method of the first aspect of the present invention.
  • a data processor and display device arranged to allow a user to consume a data item representing a book, audio or audio-visual presentation, wherein the data processor is adapted to degrade portions of the data item that have already been consumed.
  • a digital data item representing , for example, a book is held on a merchant's server and is available for paid download as a one read book.
  • the "One read book” is an encrypted book that is designed to be read once in its entirety roughly from beginning to end.
  • a user may enter the merchants website and select a book for download.
  • the server constructs a one read book, Irbook, from a master copy of the book that is retained on a secure server.
  • the lrBook may only be decrypted by a single target reader and may only be read through a limited number of times (typically once) on that, target reader.
  • the lrBook may, for example, be held in any proprietary or open source format so long as that format, allows the book to be held as a series of discrete chunks (such as sections, chapters, pages or lines) and includes the necessary software for the presentation of and navigation of those chunks on the target reader.
  • ⁇ n use the reader device keeps a pointer, which in the context of a one read book can be thought of as a bookmark , and which is a data structure that identifies the readers current place in the book.
  • the lrBook may have embedded data identifying the number of times the book may be read (typically once), the chunks kept behind the bookmark (i.e. portions which have already been read or "consumed” and the number of chunks decrypted ahead of the bookmark.
  • the unencrypted chunks are referred to as the 'current' chunks and the reader of the book may view these at. will, This allows flexibility on a per lrBook basis in the amount of 'look ahead' and 'look back' that a reader is permitted when reading through the lrBook.
  • the lrBook is, in use, read like any other eBook.
  • chunks that have been read are deleted or re-encrypted. This processing causes those portions which have been consumed to be made inaccessible. Similarly chunks that are yet to be read are decrypted as necessary to ensure that the correct range of chunks are current.
  • the reader attempts to access an encrypted chunk they may be provided with a "Can't read” page that may be specified within the lrBook.
  • the contents of this page would typically include options to purchase another pay per read ,PPR, of the book, a full electronic copy of the book, or to order a physical copy of the book.
  • a different page may optionally be presented for chunks already read and for chunks that have not. yet been read.
  • Pay per read advantageously uses a dual key encrypted exchange of information between the supplier and the reader. This assures that only the authorized reader can decrypt the lrBook.
  • the book When the book is opened for reading, it is decrypted using the secret key associated with the reader. Such a key may be held in memory that is not normally accessible to users.
  • This encryption layer is distinct from the encryption used within the lrBook and does not constitute part, of this specification although the reader public key is likely to be used by the encryption used within the lrBook to avoid unnecessary key generation.
  • the bookmark key associated with the irBook decrypts the chunks of the book that the bookmark identifies as current. The bookmark is protected such that it may be incremented but.
  • the book cannot be decremented, or not decremented without a secure key, so the book can be read in its entirety only once by the reader, ⁇ f the book may be read more than once then it is possible to reset the bookmark to permit the specified number of reads after which the reset operation will fail displaying the "Can't read” page (and in any event the material will have been deleted).

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A method of protecting a data item where, in use, the data item is consumed by a user in a sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.

Description

A METHOD OF AND APPARATUS FOR PROTECTING A DATA ITEM
FIELD OF THE INVENTION
The present, invention relates to a method of and apparatus for protecting a data item, and to a computer program for implementing the method on a programmable data processor.
BAQL^OUND OF THE DIVEKnON
Music and films have moved into the digital age where such audio and video items are available for download. This has simplified distribution but has made illegal copying more prevalent. Books had not made such a mass transition due to the intimate nature of the reading experience. However recently electronic readers, for example the SONY reader have become available which marry the convenience of electronic download with a book like reading experience.
SUMMARYΌFJΉEJNΎEIΠION
According to a first aspect of the present invention there is provided a method of protecting a data item where, in use, the data item is consumed in a sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
Thus a user can consume the data item. If the data item is a book, then "consumed" relates to reading, whereas for music and video "consumed" relates to listening and watching, respectively.
ϊt is thus possible to provide a process by which a piece of digitalized copy is encrypted into a form, that can be downloaded onto a device that decrypts the copy allowing it to be read a predetermined number of times (usually once) the copy is then degraded as described below in order to protect it from reuse or reproduction.
According to a second aspect of the present invention there is provided a computer program for causing a programmable data processor to operate in accordance with the method of the first aspect of the present invention.
According to a third aspect of the present invention there is provided a data processor and display device arranged to allow a user to consume a data item representing a book, audio or audio-visual presentation, wherein the data processor is adapted to degrade portions of the data item that have already been consumed.
Description of a preferred embodiment of the invention ϊn a preferred embodiment a digital data item representing , for example, a book, is held on a merchant's server and is available for paid download as a one read book. The "One read book" is an encrypted book that is designed to be read once in its entirety roughly from beginning to end.
ϊn use, a user may enter the merchants website and select a book for download. The server constructs a one read book, Irbook, from a master copy of the book that is retained on a secure server. The lrBook may only be decrypted by a single target reader and may only be read through a limited number of times (typically once) on that, target reader.
The lrBook may, for example, be held in any proprietary or open source format so long as that format, allows the book to be held as a series of discrete chunks (such as sections, chapters, pages or lines) and includes the necessary software for the presentation of and navigation of those chunks on the target reader.
ϊn use the reader device keeps a pointer, which in the context of a one read book can be thought of as a bookmark , and which is a data structure that identifies the readers current place in the book. The lrBook may have embedded data identifying the number of times the book may be read (typically once), the chunks kept behind the bookmark (i.e. portions which have already been read or "consumed" and the number of chunks decrypted ahead of the bookmark. The unencrypted chunks are referred to as the 'current' chunks and the reader of the book may view these at. will, This allows flexibility on a per lrBook basis in the amount of 'look ahead' and 'look back' that a reader is permitted when reading through the lrBook.
The lrBook is, in use, read like any other eBook. When the reader passes a chunk boundary (by whatever means - typically scrolling or selecting "Next page" or some such), chunks that have been read are deleted or re-encrypted. This processing causes those portions which have been consumed to be made inaccessible. Similarly chunks that are yet to be read are decrypted as necessary to ensure that the correct range of chunks are current.
ϊf the reader attempts to access an encrypted chunk they may be provided with a "Can't read" page that may be specified within the lrBook. The contents of this page would typically include options to purchase another pay per read ,PPR, of the book, a full electronic copy of the book, or to order a physical copy of the book. A different page may optionally be presented for chunks already read and for chunks that have not. yet been read.
Pay per read (PPR) advantageously uses a dual key encrypted exchange of information between the supplier and the reader. This assures that only the authorized reader can decrypt the lrBook.
When the book is opened for reading, it is decrypted using the secret key associated with the reader. Such a key may be held in memory that is not normally accessible to users. This encryption layer is distinct from the encryption used within the lrBook and does not constitute part, of this specification although the reader public key is likely to be used by the encryption used within the lrBook to avoid unnecessary key generation. Once the lrBook is opened for reading, the bookmark key associated with the irBook decrypts the chunks of the book that the bookmark identifies as current. The bookmark is protected such that it may be incremented but. cannot be decremented, or not decremented without a secure key, so the book can be read in its entirety only once by the reader, ϊf the book may be read more than once then it is possible to reset the bookmark to permit the specified number of reads after which the reset operation will fail displaying the "Can't read" page (and in any event the material will have been deleted).
ft is thus possible to provide a method of protecting electronic books from copying or from unauthorized multiple accesses.
Although the invention has been described in the context of a book, it can be applied to any data item, such as music or video.

Claims

A method of protecting a data item where, in use, the data item is consumed in a sequence progressing from a start, to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
A method as claimed in claim 1, in which portions that have been consumed by a user are deleted or encrypted.
A method as claimed in claim 2, in which portions that exceed a first threshold from the pointer are deleted or encrypted.
A method as claimed in claim 3, in which when the data item represents a book, the first threshold corresponds to a predetermined number of words, pages or chapters.
A method as claimed in any of the preceding claims, in which the data item is provided in an encrypted form, and the encryption key associated with a user or a user device is required to decrypt the data item.
A method as claimed in any of the preceding claims in which a portion of the data item representing a "current region" is kept in unencrypted form.
A method as claimed in any of the preceding claims in which the data item is an electronic representation of a book.
A method as claimed in any of the preceding claims in which the data item is an audio or audio-visual item
A computer program for causing a programmable data processor to operate in accordance with the method of any of claims 1 to 8.
A data processor and display device arranged to allow a user to consume a data item representing a book, audio or audio-visual presentation, wherein the data processor is adapted to degrade portions of the data item which have already been consumed.
PCT/GB2010/050499 2009-03-24 2010-03-24 A method of and apparatus for protecting a data item WO2010109237A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0904966A GB2468862A (en) 2009-03-24 2009-03-24 A method of protecting electronic content by encryption or deletion of consumed portions
GB0904966.9 2009-03-24

Publications (1)

Publication Number Publication Date
WO2010109237A1 true WO2010109237A1 (en) 2010-09-30

Family

ID=40640009

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2010/050499 WO2010109237A1 (en) 2009-03-24 2010-03-24 A method of and apparatus for protecting a data item

Country Status (2)

Country Link
GB (1) GB2468862A (en)
WO (1) WO2010109237A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2983606A1 (en) * 2011-12-02 2013-06-07 France Telecom Method for accessing digital content e.g. audio, in terminal, involves allowing digital contents to be changed before restitution when access rights are forfeited, and modifying access rights in progressive manner with each restitution

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2816783A1 (en) * 2000-11-10 2002-05-17 Guillaume Dubost Remote instantaneous transmission at 150 Mbytes per second of audio-visual data from a central point to an audio-visual data signal converter and display
US20020176575A1 (en) * 2000-12-07 2002-11-28 Bahman Qawami System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
US7336788B1 (en) * 1992-12-09 2008-02-26 Discovery Communicatoins Inc. Electronic book secure communication with home subsystem
US20080270308A1 (en) * 2007-04-27 2008-10-30 General Instrument Corporation Method and Apparatus for Providing a Secure Trick Play

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0812452A4 (en) * 1995-12-14 1999-09-15 Motorola Inc System and method for limiting access to a book card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7336788B1 (en) * 1992-12-09 2008-02-26 Discovery Communicatoins Inc. Electronic book secure communication with home subsystem
FR2816783A1 (en) * 2000-11-10 2002-05-17 Guillaume Dubost Remote instantaneous transmission at 150 Mbytes per second of audio-visual data from a central point to an audio-visual data signal converter and display
US20020176575A1 (en) * 2000-12-07 2002-11-28 Bahman Qawami System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
US20080270308A1 (en) * 2007-04-27 2008-10-30 General Instrument Corporation Method and Apparatus for Providing a Secure Trick Play

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2983606A1 (en) * 2011-12-02 2013-06-07 France Telecom Method for accessing digital content e.g. audio, in terminal, involves allowing digital contents to be changed before restitution when access rights are forfeited, and modifying access rights in progressive manner with each restitution

Also Published As

Publication number Publication date
GB0904966D0 (en) 2009-05-06
GB2468862A (en) 2010-09-29

Similar Documents

Publication Publication Date Title
US9536058B2 (en) Apparatus and method for managing digital copyright on EPUB-based content, and apparatus and method for providing EPUB-based content according to user's right
CN102016863B (en) Embedded licenses for content
JP4857123B2 (en) Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
EP2188756B1 (en) Device and method for a backup of rights objects
US8417966B1 (en) System and method for measuring and reporting consumption of rights-protected media content
CN103942470A (en) Electronic audio-visual product copyright management method with source tracing function
NO332664B1 (en) Procedure for Using a Rights Template to Obtain a Signed Rights Mark (SRL) for Digital Content in a Digital Rights Management System
CN102073826A (en) System and method for digital copyright management using lightweight digital watermark adding component
US11080368B2 (en) Digital rights management system and digital rights protection method
CN109145617B (en) Block chain-based digital copyright protection method and system
GB2404828A (en) Copyright management where encrypted content and corresponding key are in same file
TWI553473B (en) Secure data storage and transfer for portable data storage devices
CN101251880B (en) System and method for protecting digital data using electronic key
EP3408775A1 (en) Method and system for conditional access via license of proprietary functionality
CN1996323B (en) Method and apparatus for re-importing content
WO2010109237A1 (en) A method of and apparatus for protecting a data item
US20040123126A1 (en) Method and apparatus for deterring piracy
WO2011043171A1 (en) Copyrighted work redistribution promotion system
US20090177712A1 (en) Digital data Recording device
AU2006343229B2 (en) A method for protecting digital content by encrypting and decrypting a memory card
CN111597513B (en) Multimedia processing method, device and storage disk
EP2203866A1 (en) Replacement of keys
US20080235139A1 (en) Apparatus and methods for distributing digital content
JP4684123B2 (en) License generating device, license recording device, and content using device
KR20160069455A (en) Protecting system and method for electronic book with supporting individual copy

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10712957

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10712957

Country of ref document: EP

Kind code of ref document: A1