+

WO2000038035A1 - Electronic data storage and display apparatus - Google Patents

Electronic data storage and display apparatus Download PDF

Info

Publication number
WO2000038035A1
WO2000038035A1 PCT/GB1999/004219 GB9904219W WO0038035A1 WO 2000038035 A1 WO2000038035 A1 WO 2000038035A1 GB 9904219 W GB9904219 W GB 9904219W WO 0038035 A1 WO0038035 A1 WO 0038035A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data store
encryption key
electronic
store
Prior art date
Application number
PCT/GB1999/004219
Other languages
French (fr)
Inventor
David Michael Jarman
Original Assignee
David Michael Jarman
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by David Michael Jarman filed Critical David Michael Jarman
Priority to GB0117025A priority Critical patent/GB2363649A/en
Priority to AU18677/00A priority patent/AU1867700A/en
Priority to CA002355713A priority patent/CA2355713A1/en
Priority to EP99962298A priority patent/EP1159664A1/en
Publication of WO2000038035A1 publication Critical patent/WO2000038035A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • This invention relates to electronic data storage and display apparatus, and in particular to such apparatus for the storage and display of electronic data that has commercial value such as electronically formatted books.
  • the data when rendered legible by suitable software is the text of a book
  • the data becomes available to the public not under the control of a distributor, copyright owner or the like then if electronic copies of that data may easily be made, the publisher of that data and possibly others will suffer economic damage, for example being able only to sell fewer copies of a book than would otherwise be the case.
  • the present invention provides apparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port, and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only Memory forming part of the apparatus, and the content of those addresses is used to encrypt/decrypt transmitted/received data.
  • an encryption/decryption key may be generated and used by reference to the addresses of resident code areas in ROM in the apparatus. This is explained in more detail below.
  • the user connects the apparatus of the present invention to an appropriate source of electronic data in the following manner :
  • the apparatus enters into electronic communication with the data source and sends an identification code to the data source
  • the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus
  • the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus
  • the data source transmits the identified data in encrypted form to the apparatus which decrypts that data and places it in the data storage means,
  • the data source transmits a new encryption key to the apparatus, which key overwrites the previous encryption key
  • the electronic data is encrypted when it is travelling between the owners or distributors of the data and the legitimate end user of the data. Because the encryption key between the data source and the apparatus is altered after each transaction, it will be very difficult for an illegitimate receiver of the data to decrypt that data. Even if that does prove possible, the illegitimate receiver only then gains the encryption key for one specific piece of apparatus the next time it connects to the data source and not the data source as a whole .
  • the apparatus stores two encryption keys, one of which is stored in either Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory, and the other of which is stored in Read Only Memory.
  • the encryption key in the Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory is the key that is rewritten when the apparatus interacts with a data store.
  • the encryption key in the Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory is 16 bytes in size.
  • the portion of Read Only Memory, the content of which is used to encrypt/decrypt transmitted/received data, is preferably 256 bytes in size.
  • the data storage means in the apparatus of the present invention is preferably non-volatile random access memory. It may, however, alternatively be in the form of a magnetic disk, built into the casing and so constructed that attempts to remove the disc would result in the destruction of at least the data on the disc, or any other known data storage media which could be built into the casing.
  • the method of communication between the apparatus of the present invention and the data store is most preferably via the telephone network, and at least one input/output port in the casing is adapted to connect to that network most preferably via an electromagnetic radiation link.
  • the data source are possible and at least one input/output port in the casing is appropriately configured for that connection.
  • the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form.
  • the computer hardware preferably includes user control means which will allow a user of the apparatus to move through the data in an appropriate fashion.
  • the display screen of the present invention is preferably of sufficient size that the viewing area thereof is at least 110mm by 180mm.
  • the screen is preferably of a type that has a low power consumption.
  • the apparatus additionally includes known means for the generation of sound.
  • the sound generation means can be controlled by the computer software that controls the display means, or by independent control means.
  • the reader of, for example, a book about ornithology may be played the sound of the bird which he is reading about.
  • the size of the data storage means in the apparatus of the present invention will be finite.
  • the apparatus of the present invention is configured so that it can export some or all of the data stored in the data storage means.
  • the apparatus is configured only to export the data in an encrypted form. It is clearly desirable that the exported data can be imported back onto the apparatus of the present invention, so that the data can be viewed again at a later date .
  • the data is preferably exported to and imported from a dedicated data store adapted to interact with the apparatus of the present invention.
  • the method of transfer of the data is as follows:
  • the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus
  • the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store,
  • the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form
  • the receiver of the encrypted data decrypts that data and stores it
  • the apparatus transmits a new data store encryption key to the data store, which key overwrites the previous data store encryption key
  • the method of transfer of the data is as follows: i) the apparatus enters into electronic communication with the data store,
  • the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form
  • the receiver of the data stores the data
  • the data store stores the data in encrypted form. Preferably there is, however, a little un- encrypted data attached to the encrypted data. That un-encrypted data can, for example, give an indication of the contents of the data, and/or the apparatus that placed the data in the data store and consequently the apparatus that can decrypt the data. This will allow more than one piece of apparatus of the present invention to use the data store.
  • the data transfer between the apparatus and the data store can be either via electrical or optical cables or via electromagnetic radiation.
  • the apparatus of the present invention may be provided with its own power source and/or means for taking power from an external power source.
  • the apparatus is provided with a computer chip that has the specification, details and method of operation as follows: SPECIFICATION
  • EEPROM 16 bytes of key memory (addresses 0 - 15) 112 bytes of user memory (addresses 16 - 127)
  • Version 1 0 of crypto uses a key length of 16 bytes
  • Each byte of key is used to access an 8 bit mask from withm a 256 byte lookup table
  • Each data byte is enc ⁇ ypted/decry ⁇ ted by exclusive o ⁇ ng it with the 8 bit mask
  • Steps 1 & 2 need only be done once to set eeprom write mode.
  • Steps 1 & 2 need only be done once to set data decrypt mode.
  • Steps 1 & 2 need only be done once to set data encrypt mode.
  • Steps 1 & 2 need only be done once to set eeprom read mode.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Digital Computer Display Output (AREA)

Abstract

Apparatus for displaying electronic format data is disclosed. It is particularly useful for displaying text material, e.g. as an electronic book. The apparatus has a casing with a display means such as a screen, and a data transmission/reception means enabling the apparatus to communicate with a source of data and to download data from the source for subsequent display. The data is encrypted for the download and decrypted within the apparatus to enable it to be displayed in clear. The distinctive feature of the invention is the use as an encryption/decryption key of data stored in addresses of a read only memory within the apparatus. Each time data is downloaded from the source, fresh addresses can be specified by the source, providing encryption/decryption keys for the next download session. This gives a very high degree of security as the keys themselves do not have to be transmitted.

Description

Electronic data storage and display apparatus
This invention relates to electronic data storage and display apparatus, and in particular to such apparatus for the storage and display of electronic data that has commercial value such as electronically formatted books.
With the advances in the fields of microchip and display screen technologies, and allied computing advances it is becoming increasingly economically viable to produce apparatus that is easily portable and can store, manipulate and display large quantities of electronic data. There is, however, often a reluctance on the part of the owners of that data to release it to members of the public because of the ease of replication of electronic data. For data with commercial value such replication deprives the parties involved with the genesis and distribution of the data of a suitable reward for the production or distribution of that data. For example, if the data when rendered legible by suitable software is the text of a book, then if the data becomes available to the public not under the control of a distributor, copyright owner or the like, then if electronic copies of that data may easily be made, the publisher of that data and possibly others will suffer economic damage, for example being able only to sell fewer copies of a book than would otherwise be the case.
One approach is to render the data "copy-protected".
This can be effective in some environments, though there is a widespread belief that copy -protection systems simply pose a challenge to those who would "circumvent them. However, copy-protection systems which rely on encryption and decryption of data provide some effectiveness, for example as described in WO 97/44736. However, the system is cumbersome and not always user- friendly. Systems which have been proposed for use in this area include those described in EP-A- 0665486 , WO 95/08231 and WO99/12087, though the last of these does not form part of the state of the art. All seek to enhance the security against copying by using cryptographic techniques and generally require the use of encryption/decryption keys which are transmitted, after an authenticated request has been received, e.g. over a suitable communications link which has been established for that purpose.
The present invention provides apparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port, and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only Memory forming part of the apparatus, and the content of those addresses is used to encrypt/decrypt transmitted/received data.
This approach, especially when used on a direct communications channel between user and information provider, rather than via a wide area network such as the internet, is advantageous as there is never any need to engage in a key request dialogue. Instead, an encryption/decryption key may be generated and used by reference to the addresses of resident code areas in ROM in the apparatus. This is explained in more detail below. In use, for example when the user of the apparatus wishes to obtain an electronic version of a book, the user connects the apparatus of the present invention to an appropriate source of electronic data in the following manner :
i) the apparatus enters into electronic communication with the data source and sends an identification code to the data source,
ii ) the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus,
ϋi) the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus,
iv) the data source transmits the identified data in encrypted form to the apparatus which decrypts that data and places it in the data storage means,
v) the data source transmits a new encryption key to the apparatus, which key overwrites the previous encryption key, and
vi) the communication between the apparatus and the data source is broken.
By having the apparatus and the data source interact in this fashion, the electronic data is encrypted when it is travelling between the owners or distributors of the data and the legitimate end user of the data. Because the encryption key between the data source and the apparatus is altered after each transaction, it will be very difficult for an illegitimate receiver of the data to decrypt that data. Even if that does prove possible, the illegitimate receiver only then gains the encryption key for one specific piece of apparatus the next time it connects to the data source and not the data source as a whole .
In a particularly preferred embodiment of the present invention the apparatus stores two encryption keys, one of which is stored in either Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory, and the other of which is stored in Read Only Memory. The encryption key in the Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory is the key that is rewritten when the apparatus interacts with a data store.
In a preferred embodiment of the present invention, the encryption key in the Electronically Erasable Programable Read Only Memory or non-volatile Random Access Memory is 16 bytes in size. The portion of Read Only Memory, the content of which is used to encrypt/decrypt transmitted/received data, is preferably 256 bytes in size.
The data storage means in the apparatus of the present invention is preferably non-volatile random access memory. It may, however, alternatively be in the form of a magnetic disk, built into the casing and so constructed that attempts to remove the disc would result in the destruction of at least the data on the disc, or any other known data storage media which could be built into the casing.
The method of communication between the apparatus of the present invention and the data store is most preferably via the telephone network, and at least one input/output port in the casing is adapted to connect to that network most preferably via an electromagnetic radiation link. In alternative embodiments other methods of connection the data source are possible and at least one input/output port in the casing is appropriately configured for that connection.
In a preferred embodiment of the present invention, the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form. The computer hardware preferably includes user control means which will allow a user of the apparatus to move through the data in an appropriate fashion. The display screen of the present invention is preferably of sufficient size that the viewing area thereof is at least 110mm by 180mm. The screen is preferably of a type that has a low power consumption.
In an alternative embodiment of the present invention, the apparatus additionally includes known means for the generation of sound. The sound generation means can be controlled by the computer software that controls the display means, or by independent control means. In this embodiment the reader of, for example, a book about ornithology may be played the sound of the bird which he is reading about.
It will be appreciated that the size of the data storage means in the apparatus of the present invention will be finite. As such, and to avoid the problem of either having to delete and loose a previously acquired set of data, or having to acquire a new apparatus, the apparatus of the present invention is configured so that it can export some or all of the data stored in the data storage means. To prevent duplicatable and readable copies of the data being exported, the apparatus is configured only to export the data in an encrypted form. It is clearly desirable that the exported data can be imported back onto the apparatus of the present invention, so that the data can be viewed again at a later date .
The data is preferably exported to and imported from a dedicated data store adapted to interact with the apparatus of the present invention. In the first preferred embodiment, the method of transfer of the data is as follows:
i) the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus,
ii) the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store,
iii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form,
iv) the receiver of the encrypted data decrypts that data and stores it,
v) the apparatus transmits a new data store encryption key to the data store, which key overwrites the previous data store encryption key, and
vi) the communication between the apparatus and the data store is broken.
In a second preferred embodiment the method of transfer of the data is as follows: i) the apparatus enters into electronic communication with the data store,
ii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form,
iii) the receiver of the data stores the data, and
iv) the communication between the apparatus and the data store is broken.
In this second embodiment the data store stores the data in encrypted form. Preferably there is, however, a little un- encrypted data attached to the encrypted data. That un-encrypted data can, for example, give an indication of the contents of the data, and/or the apparatus that placed the data in the data store and consequently the apparatus that can decrypt the data. This will allow more than one piece of apparatus of the present invention to use the data store.
In either of the two above described embodiments, the data transfer between the apparatus and the data store can be either via electrical or optical cables or via electromagnetic radiation.
The apparatus of the present invention may be provided with its own power source and/or means for taking power from an external power source.
In one particularly preferred embodiment of the present invention, the apparatus is provided with a computer chip that has the specification, details and method of operation as follows: SPECIFICATION
EEPROM: 16 bytes of key memory (addresses 0 - 15) 112 bytes of user memory (addresses 16 - 127)
POWER: 5mA @5V when active
6mA @5V when wπtmg to eeprom
10uA @5V m power saving mode.
CONVERSION RATE: appTox. 30KPS
MASK LOOKUP TABLE
Rom address 0 = 255 starting with address 0 = 255 the rom table is filled by
1 = 254 the following formula
2 = 253
3 = 252 rom table[ address ] = 255 - address
4 = 251
5 = 250
250 = 5 251 = 4
252 = 3
253 = 2 254 = 1 255 = 0
ENCRYPTION/PECRYPTION OPERATION
Version 1 0 of crypto uses a key length of 16 bytes
First wnte the 16 byte key to eeprom addresses 0 - 15
Each byte of key is used to access an 8 bit mask from withm a 256 byte lookup table
Each data byte is encτypted/decryρted by exclusive oπng it with the 8 bit mask
As each byte of data is encrypted/decrypted the mask is rotated one bit position to the left
After eight bit rotations a new mask is loaded using the next key in the sequence of sixteen
The sequence of masks wfll be repeated again when all sixteen have been used. OPERATION MODES EEPROM WRITE (mode 0)
1. Wait until BUSY Hne is a logic low.
2. Write number 0 (binary 00000000) to PORTO.
3. Wait until BUSY Hne is a logic low.
4. Write eeprom address (0 - 127) to PORT1.
5. Wait until BUSY line is a logic low.
6. Write eeprom data to PORT2.
Steps 1 & 2 need only be done once to set eeprom write mode.
DECRYPT DATA (mode 1)
1. Wait until BUSY Hne is a logic low.
2. Write number 1 (binary 00000001) to PORTO.
3. Wait until BUSY Hne is a logic low.
4. Write data for decryption to PORT2.
5. Wait until BUSY line is a logic low.
6. Read decrypted data from PORT3.
Steps 1 & 2 need only be done once to set data decrypt mode.
ENCRYPT DATA fmodc 2)
1. Wait until BUSY Hne is a logic low.
2. Write number 2 (binary 00000010) to PORTO.
3. Wait until BUSY Hne is a logic low.
4. Write data for encyption to PORT2.
5. Wait until BUSY line is a logic low.
6. Read encrypted data from PORT3.
Steps 1 & 2 need only be done once to set data encrypt mode. EEPROM READ (mode 3)
1. Wait until BUSY line is a logic low.
2. Write number 3 (binary 00000011) to PORTO.
3. Wait until BUSY Hne is a logic low.
4. Write eeprom address (0 - 127) to PORT2.
5. Wait until BUSY Hne is a logic low.
6. Read eeprom data from PORT3.
Steps 1 & 2 need only be done once to set eeprom read mode.
RESET COUNTERS (mode 4)
This will reset the rotate counter & key index to zero.
1. Wait until BUSY Hne is a logic low.
2. Write number 4 (binary 00000100) to PORTO.
POWER SAVING (mode S)
This will put the crypto pcb into sleep mode.
1. Wait until BUSY Hne is a logic low.
2. Write number 5 (binary 00000101) to PORTO.
3. Wait until BUSY line is a logic zero before proceeding. Waking up the crypto unit from power saving mode
1. Do a dummy read from PORTO or Write a new operation mode to PORTO.
2. Wait until BUSY Hne is a logic low before proceeding. 20 WAY IDC CONNECTOR PIN OUT & DESCRIPTION
1. GND Power supply 0V connection.
2. +5/3.3 VDC Power supply positive connection.
3. \RESET Active low external chip reset Leave disconnected if control of reset is not required. The chip takes approximately 80mS to reset after a low to high transition of the reset pin.
4. \RD Active low read control input
5. \WR Active low write control input
6. \CS Active low chip select input
7. AO Port address select input
8. Al Port address select input
9. D7 Bit 7 of bi-directional data bus.
10. D6 Bit 6 of bi-directional data bus.
11. D5 Bit 5 of bi-directional data bus.
12. D4 Bit 4 of bi-directional data bus.
13. D3 Bit 3 of bi-directional data bus.
14. D2 Bit 2 of bi-directional data bus.
15. Dl Bit 1 of bi-directional data bus.
16. DO Bit 0 of bi-directional data bus.
17. BUSY Active high busy output
18. \BUSY Active low busy output
19. RxD Serial data input (do not connect).
20. TxD Serial data output (do not connect).

Claims

Claims
Apparatus for the transmittal, reception, storage and display of data in an electronic format in which there is provided a casing that includes a data storage means, a data display means, and a data transmission/reception means including at least one output/input port, and wherein the data transmission/reception means includes means for decrypting received data and placing it in the data storage means, encrypting and transmitting data from the data storage means and means for storing at least one encryption key, and characterised in that one encryption key references addresses in a portion of Read Only Memory forming part of the apparatus, and the content of those addresses is used to encrypt/decrypt transmitted/received data..
Apparatus according to claim 1 in which at least one encryption/decryption key is stored in a portion of either Electronically Erasable Programable Read Only Memory or non volatile Random Access Memory, and may be rewritten by an external key issuing computer .
Apparatus according to claim 2 in which at least one encryption key is 16 bytes in size.
Apparatus according to any one of claims 1 to 3 in which the Read Only Memory is at least 256 bytes in size.
Apparatus according to any one of claims 1 to 4 in which the data storage means is comprised of non volatile Random Access Memory. Apparatus according to any one of claims 1 to 5 in which an output/input port is adapted to connect with a telephone socket via an electromagnetic radiation link.
Apparatus according to any one of claims 1 to 6 in which the display means includes a display screen and computer hardware and software to enable presentation of the data in graphical and/or textual form.
Apparatus according to any one of claims 1 to 7 which is provided with a computer chip that has the specification, details and method of operation as set out on attached sheets marked Al, A2 , A3, and
A4.
A method of using apparatus according to any one of claims 1 to 8 for the reception of electronic data from an external data source characterised in that:
i) the apparatus enters into electronic communication with the data source and sends an identification code to the data source,
ii) the data source confirms the identity of the apparatus and thereby determines what encryption key to use in communicating with the apparatus,
iii) the user of the apparatus causes the apparatus to send a code to the data source identifying the data to be received by the apparatus,
iv) the data source transmits the identified data in encrypted form to the apparatus which decrypts that data and places it in the data storage means,
v) the data source transmits a new encryption key to the apparatus, which key overwrites the previous encryption key, and
vi) the communication between the apparatus and the data source is broken.
A method according to claim 9 in which the means of electronic communication between the apparatus and the data source is via the telephone network.
A method according to claim 9 in which the means of electronic communication between the apparatus and the data source is via the internet.
A method according to anyone of claims 9 to 11 in which the electronic data is electronically stored text and/or graphics.
A method of using apparatus according to any one of claims 1 to 8 for the transfer of electronic data between the apparatus and an external data store characterised in that:
i) the apparatus enters into electronic communication with the data store which sends an identification code to the apparatus,
ii) the apparatus confirms the identity of the data store and thereby determines what data store encryption key to use in communicating with the data store,
iii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form,
iv) the receiver of the encrypted data decrypts that data and stores it,
v) the apparatus transmits a new data store encryption key to the data store, which key overwrites the previous data store encryption key, and
vi) the communication between the apparatus and the data store is broken.
A method of using apparatus according to any one of claims 1 to 8 for the transfer of electronic data between the apparatus and an external data store characterised in that:
i) the apparatus enters into electronic communication with the data store,
ii) the user of the apparatus causes the apparatus to transfer preselected data between the apparatus and the data store in encrypted form,
iii) the receiver of the data stores the data, and
iv) the communication between the apparatus and the data store is broken.
A method according to claim 14 in which the electronic data is transmitted from the data store to the apparatus, and is saved in the apparatus in decrypted form. A method according to claim 14 in which the electronic data is transmitted from the apparatus to the data store, and is saved in the data store in encrypted form, the encryption key being a permanent encryption key for that data held in the apparatus .
A method according to any one of claims 13 to 16 in which the data store will on interrogation by the apparatus, provide the apparatus with a list of the data stored within the data store.
A method according to any one of claims 13 to 17 in which the means of electronic communication between the apparatus and the data store is via electrical or optical cable.
A method according to any one of claims 13 to 17 in which the means of electronic communication between the apparatus and the data store is via electromagnetic radiation.
A method according to anyone of claims 13 to 19 in which the electronic data is electronically stored text and/or graphics.
PCT/GB1999/004219 1998-12-18 1999-12-20 Electronic data storage and display apparatus WO2000038035A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB0117025A GB2363649A (en) 1998-12-18 1999-12-20 Electronic data storage and display apparatus
AU18677/00A AU1867700A (en) 1998-12-18 1999-12-20 Electronic data storage and display apparatus
CA002355713A CA2355713A1 (en) 1998-12-18 1999-12-20 Electronic data storage and display apparatus
EP99962298A EP1159664A1 (en) 1998-12-18 1999-12-20 Electronic data storage and display apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9828093.6 1998-12-18
GBGB9828093.6A GB9828093D0 (en) 1998-12-18 1998-12-18 Electronic data storage and display apparatus

Publications (1)

Publication Number Publication Date
WO2000038035A1 true WO2000038035A1 (en) 2000-06-29

Family

ID=10844621

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1999/004219 WO2000038035A1 (en) 1998-12-18 1999-12-20 Electronic data storage and display apparatus

Country Status (6)

Country Link
EP (1) EP1159664A1 (en)
AU (1) AU1867700A (en)
CA (1) CA2355713A1 (en)
GB (2) GB9828093D0 (en)
WO (1) WO2000038035A1 (en)
ZA (1) ZA200105908B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2373597A (en) * 2001-03-20 2002-09-25 Hewlett Packard Co Restricted data access
US7380133B2 (en) 2000-12-22 2008-05-27 Nagravision S.A. Anti-cloning method
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2681165A1 (en) * 1991-09-05 1993-03-12 Gemplus Card Int Process for transmitting confidential information between two chip cards
WO1998008344A2 (en) * 1996-08-13 1998-02-26 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2681165A1 (en) * 1991-09-05 1993-03-12 Gemplus Card Int Process for transmitting confidential information between two chip cards
WO1998008344A2 (en) * 1996-08-13 1998-02-26 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7380133B2 (en) 2000-12-22 2008-05-27 Nagravision S.A. Anti-cloning method
GB2373597A (en) * 2001-03-20 2002-09-25 Hewlett Packard Co Restricted data access
GB2373597B (en) * 2001-03-20 2005-02-23 Hewlett Packard Co Restricted data access
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software
US9946855B2 (en) 2010-11-19 2018-04-17 Nagravision S.A. Method to detect cloned software

Also Published As

Publication number Publication date
GB9828093D0 (en) 1999-02-17
EP1159664A1 (en) 2001-12-05
AU1867700A (en) 2000-07-12
GB2363649A (en) 2002-01-02
CA2355713A1 (en) 2000-06-29
GB0117025D0 (en) 2001-09-05
ZA200105908B (en) 2002-02-21

Similar Documents

Publication Publication Date Title
US7337332B2 (en) Transferring electronic content
AU2005223902B2 (en) Authentication between device and portable storage
US6367019B1 (en) Copy security for portable music players
JP4857123B2 (en) Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
US20040243488A1 (en) Storage medium rental system
US20050210236A1 (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
WO2002050642A2 (en) Method for providing multimedia files and terminal therefor
JPH1069514A (en) Financial transaction processing system
WO2004109972A1 (en) User terminal for receiving license
WO2005119677A1 (en) Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
CN1981262A (en) Trusted license removal
US7107461B2 (en) Methods and apparatus for customizing a rewritable storage medium
AU778380B2 (en) Portable authorization device for authorizing use of protected information and associated method
GB2404828A (en) Copyright management where encrypted content and corresponding key are in same file
JP2002099514A (en) Digital data unauthorized use preventive method, digital data unauthorized use preventive system, registration device, distribution device, reproducing device and recording medium
EP1159664A1 (en) Electronic data storage and display apparatus
JP2001344216A (en) Download system using memory card with recording limit information
JPH1020778A (en) Encoding device, decoding device and ic card
JPH09146887A (en) Information fetch device
JP2002149061A (en) Rental contents distribution system and method therefor
JP3113063B2 (en) Information processing system
KR101322521B1 (en) The Method for Managing a DRM Rights Object in Smart Card
JP3797531B2 (en) System for preventing unauthorized copying of digital data
JP2003281476A (en) Communication system of ic card with cpu, ic card with cpu, management center and reading apparatus
JP3922537B2 (en) Content receiving and delivering system and network terminal thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2355713

Country of ref document: CA

Kind code of ref document: A

Ref document number: 2355713

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 09868314

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 512843

Country of ref document: NZ

Ref document number: 1999962298

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 18677/00

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 200117025

Country of ref document: GB

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2001/05908

Country of ref document: ZA

Ref document number: 200105908

Country of ref document: ZA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1999962298

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1999962298

Country of ref document: EP

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载