WO2010109237A1 - A method of and apparatus for protecting a data item - Google Patents
A method of and apparatus for protecting a data item Download PDFInfo
- Publication number
- WO2010109237A1 WO2010109237A1 PCT/GB2010/050499 GB2010050499W WO2010109237A1 WO 2010109237 A1 WO2010109237 A1 WO 2010109237A1 GB 2010050499 W GB2010050499 W GB 2010050499W WO 2010109237 A1 WO2010109237 A1 WO 2010109237A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data item
- consumed
- book
- portions
- audio
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 230000002250 progressing effect Effects 0.000 claims abstract description 3
- 238000004590 computer program Methods 0.000 claims description 3
- 230000009977 dual effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Definitions
- the present, invention relates to a method of and apparatus for protecting a data item, and to a computer program for implementing the method on a programmable data processor.
- a method of protecting a data item where, in use, the data item is consumed in a sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
- ⁇ t is thus possible to provide a process by which a piece of digitalized copy is encrypted into a form, that can be downloaded onto a device that decrypts the copy allowing it to be read a predetermined number of times (usually once) the copy is then degraded as described below in order to protect it from reuse or reproduction.
- a computer program for causing a programmable data processor to operate in accordance with the method of the first aspect of the present invention.
- a data processor and display device arranged to allow a user to consume a data item representing a book, audio or audio-visual presentation, wherein the data processor is adapted to degrade portions of the data item that have already been consumed.
- a digital data item representing , for example, a book is held on a merchant's server and is available for paid download as a one read book.
- the "One read book” is an encrypted book that is designed to be read once in its entirety roughly from beginning to end.
- a user may enter the merchants website and select a book for download.
- the server constructs a one read book, Irbook, from a master copy of the book that is retained on a secure server.
- the lrBook may only be decrypted by a single target reader and may only be read through a limited number of times (typically once) on that, target reader.
- the lrBook may, for example, be held in any proprietary or open source format so long as that format, allows the book to be held as a series of discrete chunks (such as sections, chapters, pages or lines) and includes the necessary software for the presentation of and navigation of those chunks on the target reader.
- ⁇ n use the reader device keeps a pointer, which in the context of a one read book can be thought of as a bookmark , and which is a data structure that identifies the readers current place in the book.
- the lrBook may have embedded data identifying the number of times the book may be read (typically once), the chunks kept behind the bookmark (i.e. portions which have already been read or "consumed” and the number of chunks decrypted ahead of the bookmark.
- the unencrypted chunks are referred to as the 'current' chunks and the reader of the book may view these at. will, This allows flexibility on a per lrBook basis in the amount of 'look ahead' and 'look back' that a reader is permitted when reading through the lrBook.
- the lrBook is, in use, read like any other eBook.
- chunks that have been read are deleted or re-encrypted. This processing causes those portions which have been consumed to be made inaccessible. Similarly chunks that are yet to be read are decrypted as necessary to ensure that the correct range of chunks are current.
- the reader attempts to access an encrypted chunk they may be provided with a "Can't read” page that may be specified within the lrBook.
- the contents of this page would typically include options to purchase another pay per read ,PPR, of the book, a full electronic copy of the book, or to order a physical copy of the book.
- a different page may optionally be presented for chunks already read and for chunks that have not. yet been read.
- Pay per read advantageously uses a dual key encrypted exchange of information between the supplier and the reader. This assures that only the authorized reader can decrypt the lrBook.
- the book When the book is opened for reading, it is decrypted using the secret key associated with the reader. Such a key may be held in memory that is not normally accessible to users.
- This encryption layer is distinct from the encryption used within the lrBook and does not constitute part, of this specification although the reader public key is likely to be used by the encryption used within the lrBook to avoid unnecessary key generation.
- the bookmark key associated with the irBook decrypts the chunks of the book that the bookmark identifies as current. The bookmark is protected such that it may be incremented but.
- the book cannot be decremented, or not decremented without a secure key, so the book can be read in its entirety only once by the reader, ⁇ f the book may be read more than once then it is possible to reset the bookmark to permit the specified number of reads after which the reset operation will fail displaying the "Can't read” page (and in any event the material will have been deleted).
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A method of protecting a data item where, in use, the data item is consumed by a user in a sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
Description
A METHOD OF AND APPARATUS FOR PROTECTING A DATA ITEM
FIELD OF THE INVENTION
The present, invention relates to a method of and apparatus for protecting a data item, and to a computer program for implementing the method on a programmable data processor.
BAQL^OUND OF THE DIVEKnON
Music and films have moved into the digital age where such audio and video items are available for download. This has simplified distribution but has made illegal copying more prevalent. Books had not made such a mass transition due to the intimate nature of the reading experience. However recently electronic readers, for example the SONY reader have become available which marry the convenience of electronic download with a book like reading experience.
SUMMARYΌFJΉEJNΎEIΠION
According to a first aspect of the present invention there is provided a method of protecting a data item where, in use, the data item is consumed in a sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
Thus a user can consume the data item. If the data item is a book, then "consumed" relates to reading, whereas for music and video "consumed" relates to listening and watching, respectively.
ϊt is thus possible to provide a process by which a piece of digitalized copy is encrypted into a form, that can be downloaded onto a device that decrypts the copy allowing it to be read a predetermined number of times (usually once) the copy is then degraded as
described below in order to protect it from reuse or reproduction.
According to a second aspect of the present invention there is provided a computer program for causing a programmable data processor to operate in accordance with the method of the first aspect of the present invention.
According to a third aspect of the present invention there is provided a data processor and display device arranged to allow a user to consume a data item representing a book, audio or audio-visual presentation, wherein the data processor is adapted to degrade portions of the data item that have already been consumed.
Description of a preferred embodiment of the invention ϊn a preferred embodiment a digital data item representing , for example, a book, is held on a merchant's server and is available for paid download as a one read book. The "One read book" is an encrypted book that is designed to be read once in its entirety roughly from beginning to end.
ϊn use, a user may enter the merchants website and select a book for download. The server constructs a one read book, Irbook, from a master copy of the book that is retained on a secure server. The lrBook may only be decrypted by a single target reader and may only be read through a limited number of times (typically once) on that, target reader.
The lrBook may, for example, be held in any proprietary or open source format so long as that format, allows the book to be held as a series of discrete chunks (such as sections, chapters, pages or lines) and includes the necessary software for the presentation of and navigation of those chunks on the target reader.
ϊn use the reader device keeps a pointer, which in the context of a one read book can be thought of as a bookmark , and which is a data structure that identifies the readers current place in the book.
The lrBook may have embedded data identifying the number of times the book may be read (typically once), the chunks kept behind the bookmark (i.e. portions which have already been read or "consumed" and the number of chunks decrypted ahead of the bookmark. The unencrypted chunks are referred to as the 'current' chunks and the reader of the book may view these at. will, This allows flexibility on a per lrBook basis in the amount of 'look ahead' and 'look back' that a reader is permitted when reading through the lrBook.
The lrBook is, in use, read like any other eBook. When the reader passes a chunk boundary (by whatever means - typically scrolling or selecting "Next page" or some such), chunks that have been read are deleted or re-encrypted. This processing causes those portions which have been consumed to be made inaccessible. Similarly chunks that are yet to be read are decrypted as necessary to ensure that the correct range of chunks are current.
ϊf the reader attempts to access an encrypted chunk they may be provided with a "Can't read" page that may be specified within the lrBook. The contents of this page would typically include options to purchase another pay per read ,PPR, of the book, a full electronic copy of the book, or to order a physical copy of the book. A different page may optionally be presented for chunks already read and for chunks that have not. yet been read.
Pay per read (PPR) advantageously uses a dual key encrypted exchange of information between the supplier and the reader. This assures that only the authorized reader can decrypt the lrBook.
When the book is opened for reading, it is decrypted using the secret key associated with the reader. Such a key may be held in memory that is not normally accessible to users. This encryption layer is distinct from the encryption used within the lrBook and does not constitute part, of this specification although the reader public key is likely to be used by the encryption used within the lrBook to avoid unnecessary key generation.
Once the lrBook is opened for reading, the bookmark key associated with the irBook decrypts the chunks of the book that the bookmark identifies as current. The bookmark is protected such that it may be incremented but. cannot be decremented, or not decremented without a secure key, so the book can be read in its entirety only once by the reader, ϊf the book may be read more than once then it is possible to reset the bookmark to permit the specified number of reads after which the reset operation will fail displaying the "Can't read" page (and in any event the material will have been deleted).
ft is thus possible to provide a method of protecting electronic books from copying or from unauthorized multiple accesses.
Although the invention has been described in the context of a book, it can be applied to any data item, such as music or video.
Claims
A method of protecting a data item where, in use, the data item is consumed in a sequence progressing from a start, to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them inaccessible or to degrade them.
A method as claimed in claim 1, in which portions that have been consumed by a user are deleted or encrypted.
A method as claimed in claim 2, in which portions that exceed a first threshold from the pointer are deleted or encrypted.
A method as claimed in claim 3, in which when the data item represents a book, the first threshold corresponds to a predetermined number of words, pages or chapters.
A method as claimed in any of the preceding claims, in which the data item is provided in an encrypted form, and the encryption key associated with a user or a user device is required to decrypt the data item.
A method as claimed in any of the preceding claims in which a portion of the data item representing a "current region" is kept in unencrypted form.
A method as claimed in any of the preceding claims in which the data item is an electronic representation of a book.
A method as claimed in any of the preceding claims in which the data item is an
audio or audio-visual item
A computer program for causing a programmable data processor to operate in accordance with the method of any of claims 1 to 8.
A data processor and display device arranged to allow a user to consume a data item representing a book, audio or audio-visual presentation, wherein the data processor is adapted to degrade portions of the data item which have already been consumed.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0904966A GB2468862A (en) | 2009-03-24 | 2009-03-24 | A method of protecting electronic content by encryption or deletion of consumed portions |
GB0904966.9 | 2009-03-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010109237A1 true WO2010109237A1 (en) | 2010-09-30 |
Family
ID=40640009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2010/050499 WO2010109237A1 (en) | 2009-03-24 | 2010-03-24 | A method of and apparatus for protecting a data item |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2468862A (en) |
WO (1) | WO2010109237A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2983606A1 (en) * | 2011-12-02 | 2013-06-07 | France Telecom | Method for accessing digital content e.g. audio, in terminal, involves allowing digital contents to be changed before restitution when access rights are forfeited, and modifying access rights in progressive manner with each restitution |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2816783A1 (en) * | 2000-11-10 | 2002-05-17 | Guillaume Dubost | Remote instantaneous transmission at 150 Mbytes per second of audio-visual data from a central point to an audio-visual data signal converter and display |
US20020176575A1 (en) * | 2000-12-07 | 2002-11-28 | Bahman Qawami | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US7336788B1 (en) * | 1992-12-09 | 2008-02-26 | Discovery Communicatoins Inc. | Electronic book secure communication with home subsystem |
US20080270308A1 (en) * | 2007-04-27 | 2008-10-30 | General Instrument Corporation | Method and Apparatus for Providing a Secure Trick Play |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0812452A4 (en) * | 1995-12-14 | 1999-09-15 | Motorola Inc | System and method for limiting access to a book card |
-
2009
- 2009-03-24 GB GB0904966A patent/GB2468862A/en not_active Withdrawn
-
2010
- 2010-03-24 WO PCT/GB2010/050499 patent/WO2010109237A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7336788B1 (en) * | 1992-12-09 | 2008-02-26 | Discovery Communicatoins Inc. | Electronic book secure communication with home subsystem |
FR2816783A1 (en) * | 2000-11-10 | 2002-05-17 | Guillaume Dubost | Remote instantaneous transmission at 150 Mbytes per second of audio-visual data from a central point to an audio-visual data signal converter and display |
US20020176575A1 (en) * | 2000-12-07 | 2002-11-28 | Bahman Qawami | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
US20080270308A1 (en) * | 2007-04-27 | 2008-10-30 | General Instrument Corporation | Method and Apparatus for Providing a Secure Trick Play |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2983606A1 (en) * | 2011-12-02 | 2013-06-07 | France Telecom | Method for accessing digital content e.g. audio, in terminal, involves allowing digital contents to be changed before restitution when access rights are forfeited, and modifying access rights in progressive manner with each restitution |
Also Published As
Publication number | Publication date |
---|---|
GB0904966D0 (en) | 2009-05-06 |
GB2468862A (en) | 2010-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9536058B2 (en) | Apparatus and method for managing digital copyright on EPUB-based content, and apparatus and method for providing EPUB-based content according to user's right | |
CN102016863B (en) | Embedded licenses for content | |
JP4857123B2 (en) | Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method | |
EP2188756B1 (en) | Device and method for a backup of rights objects | |
US8417966B1 (en) | System and method for measuring and reporting consumption of rights-protected media content | |
CN103942470A (en) | Electronic audio-visual product copyright management method with source tracing function | |
NO332664B1 (en) | Procedure for Using a Rights Template to Obtain a Signed Rights Mark (SRL) for Digital Content in a Digital Rights Management System | |
CN102073826A (en) | System and method for digital copyright management using lightweight digital watermark adding component | |
US11080368B2 (en) | Digital rights management system and digital rights protection method | |
CN109145617B (en) | Block chain-based digital copyright protection method and system | |
GB2404828A (en) | Copyright management where encrypted content and corresponding key are in same file | |
TWI553473B (en) | Secure data storage and transfer for portable data storage devices | |
CN101251880B (en) | System and method for protecting digital data using electronic key | |
EP3408775A1 (en) | Method and system for conditional access via license of proprietary functionality | |
CN1996323B (en) | Method and apparatus for re-importing content | |
WO2010109237A1 (en) | A method of and apparatus for protecting a data item | |
US20040123126A1 (en) | Method and apparatus for deterring piracy | |
WO2011043171A1 (en) | Copyrighted work redistribution promotion system | |
US20090177712A1 (en) | Digital data Recording device | |
AU2006343229B2 (en) | A method for protecting digital content by encrypting and decrypting a memory card | |
CN111597513B (en) | Multimedia processing method, device and storage disk | |
EP2203866A1 (en) | Replacement of keys | |
US20080235139A1 (en) | Apparatus and methods for distributing digital content | |
JP4684123B2 (en) | License generating device, license recording device, and content using device | |
KR20160069455A (en) | Protecting system and method for electronic book with supporting individual copy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10712957 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10712957 Country of ref document: EP Kind code of ref document: A1 |