WO2002031618A2 - Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers - Google Patents
Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers Download PDFInfo
- Publication number
- WO2002031618A2 WO2002031618A2 PCT/SG2000/000173 SG0000173W WO0231618A2 WO 2002031618 A2 WO2002031618 A2 WO 2002031618A2 SG 0000173 W SG0000173 W SG 0000173W WO 0231618 A2 WO0231618 A2 WO 0231618A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- usage
- digital content
- reader
- content
- file
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000008569 process Effects 0.000 description 10
- 238000009434 installation Methods 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 6
- 238000009826 distribution Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Definitions
- This invention relates to a method and system for controlling usage and protecting against copying of digital multimedia content and their associated players or readers.
- watermarks are embedded in the content in an imperceptible fashion so that the content can be identified if the cryptographic container is breached.
- security measures and watermarking technologies are effective in protecting digital content to some extent, distinct problems exist in actual applications. Neither security measures nor digital watermarking can prevent digital content being illegally duplicated and distributed.
- the present invention provides copy protection and usage control for digital multimedia content and their associated players or readers installed in a digital computer or device.
- the prior art technologies fall into two categories.
- the first category is hardware-based.
- U.S. Pat. No. 4,562,306 which discloses a method for protecting computer software using an active coded hardware device, which must be plugged into the computer's communication port before the software can be run.
- U.S. Pat. No. 4,866,769 discloses a copy protection system for PC software distributed on discs, which provides a unique ID stored in a RAM of a PC in which software on a disc is to be used. This ID is accessible to the user of the computer. Prior to each use of the program, the software on the disc uses the PC and the source IDs and checkword to verify that the software is being used on the same PC on which it was installed.
- 4,849,836 discloses a system for preventing copying of software from computer disks, the system including a key sequence in a copy protection section of a program which is deliberately rendered ambiguous by repeatedly recording a word containing that sequence while gradually shifting the phase of the transition of a portion of the sequence until the sequence becomes a different sequence.
- U.S. Pat. No. 5,758,068 discloses a method and apparatus for software license management. It uses three identifier codes from a computer to control the access and usage of the software to this computer. These methods can restrict the use of the software to a single computer system, but they need additional hardware support and are not flexible.
- the second category is software-based.
- U.S. Pat. No. 5,199,066 discloses a method and apparatus for protecting software in which the use of software is enabled only when a predetermined intermediate code and a predetermined software code are identical.
- U.S. Pat. No. 5,109,413 discloses a method that allows software distributors to control the length of time or the number of times a user can run protected software. This method provides a trial period during which a potential purchaser can decide whether or not he or she wants to buy the software. After the trial period expires, either new software without usage control system is provided or instructions are given to users to disable the usage control system.
- U.S. Pat. No. 5,293,422 discloses a usage control system for computer software.
- the software comprises a set of units, each of the units being an interactive activity between the software and the user which can be separately completed from the interactive activities of the other units in the set.
- the completion of units is monitored by means of a copy-protected region of a recording medium and when all units have been completed, further access to the software is denied.
- the present invention provides a method for protecting digital content.
- the method may prevent digital content and their players or readers from being illegally duplicated and distributed, and may control and update permitted usage rights relating to the digital content.
- a method of protecting digital content to be installed to a client device from a remote server including the steps of: creating a player/reader for said digital content; creating a usage file associated with said digital content, said usage file including storage paths defining locations in said client device for storing copies of said usage file; embedding at least said storage paths in said player/reader to provide a protection enabled player/reader; installing said digital content and said protection enabled player/reader to said client device; installing said copies of said usage files in said locations defined by said storage paths; and adapting said protection enabled player/reader to verify the existence of said copies of said usage files at said locations in said client device prior to each playing/reading of said digital content.
- the method of the present invention may control usage of digital content on a personal computer or other device.
- the term "device” will be used herein to describe a PC (Personal Computer) or other terminal suitable for accessing digital content via the internet.
- encryption and watermarking techniques may be used to code the digital content. Encryption may ensure that the digital content cannot be used without an encryption key. Each item of digital content may be encrypted with a different key. Watermarking, may provide proof of copyright of the digital content and may facilitate tracing of illegal distributions of the digital content in the event that the encryption is breached.
- Copy protection according to the present invention may be arranged such that duplicated versions of original digital content cannot be played or read once it is installed in a client computer or device.
- the installed digital content also may not be copied from one computer or device to another computer or device, nor may it be renamed.
- a player or reader installed in one computer or device may not be used in another computer or device.
- the present invention may rely upon on-line facilities such as the internet to install the digital content purchased by a client.
- the client may be required to provide to a server which loads the digital content his personal information and configuration of his computer or device.
- the server may embed the relevant information into the associated player or reader and send it to the client computer or device.
- the item of digital content and its associated files may be installed in relevant locations of the client computer or device according to information embedded into the associated player or reader. If the digital content is to be correctly played or read by the player or reader, all of the associated files will need to exist in the correct locations of the computer or device.
- the usage file may include usage data, the encryption key and other information relating to an item of digital content. All usage files downloaded to the same client computer or device may be encrypted using the same key. This key may be embedded into the associated content player or reader. The encrypted usage file may be redundantly installed in different locations of the client computer or device. The locations are dependant on information embedded in the player or reader, obtained from the client and his computer or device. To play or read an item of digital content, all encrypted usage files corresponding to this item of content must exist in the client computer or device. Furthermore, a summary file may be created for each client computer or device. The summary file may contain a name identifying the digital content, details of any encryption key used to encrypt the digital content, and current usage data relating to the digital content installed on a particular computer/device.
- the summary file may be encrypted using the same key as the usage files and may be stored redundantly in locations of the computer/device identical to the locations of the usage files.
- the summary file may be updated after each playing or reading of the item of digital content. If permitted usage of an item of digital content has expired, usage files corresponding to this item of content may be deleted from the computer/device. The relevant record in the summary file may also be deleted. Without these files, the expired content cannot be played or read by the player or reader. If the client wants to replay or reread the digital content, he/she must connect to the server and request to install the content and relevant files to his computer/device.
- a usage control mechanism may be adopted to enforce terms and conditions of use of the digital content. Business rules may be associated with the digital content to be distributed.
- the usage control mechanism may be used to specify variable licensing parameters to manage and enforce terms and conditions of use.
- the usage control mechanism may encompass means for monitoring and tracing use of the digital content for reporting to owners of copyright in digital content.
- the usage control mechanism may be tamper- resistant and may be integrated into content protection mechanisms.
- FIG. 1 shows the general structure of a communications network between a client and a server
- Fig 2 shows a flow chart of a process associated with an online installation transaction
- Fig 3 shows a block diagram of a process for creating protected content
- Fig 4 shows a block diagram of a process for creating a protection enabled player/reader
- Fig 5 shows a flow chart of a process for installation of digital content in an on-line route:
- Fig 6 shows a flow chart of a process for creating and updating a summary file
- Fig 7 shows a flow chart of a process for playing/reading digital content.
- Fig.1 illustrates the general structure of communications between a client computer or device 10 (PC or other access devices) and a server 11 providing a source of content & associated services.
- Server 11 may include one or more sources for storing digital content and databases for current distribution.
- the services provided by server 11 include payment verification, player/reader creation, usage file creation and encryption, and on- line installation.
- Fig.2 illustrates a flow chart of a process associated with an online installation transaction, cpmmencing with the client sending a request (20) to server 11 for digital content to be installed on client device 10.
- the request includes the content name, conditions of usage and payment, and information about the configuration of client device 10.
- a player or reader corresponding to the digital content is created (24) and sent (25) to the client device 10.
- a usage file corresponding to the content is created (26) and encrypted.
- the encrypted usage file together with the encrypted digital content is installed (27) on client device 10 via the on-line installation service incorporated in server 11.
- Fig.3 shows a block diagram of an encryption and watermarking process.
- An imperceptible watermark is embedded in the digital content to provide marked content that may be identified as content that is subject to copyright protection.
- the watermark may be embedded in the plain or original digital content in any suitable manner and by any suitable means as is known in the art.
- the watermarked digital content is then encrypted using an encryption key corresponding to the content.
- the watermarked content may be encrypted in any suitable manner and by any suitable means as is known in the art.
- the encrypted and watermarked content is stored in the content source associated with Server 11.
- the relevant usage file is created and installed on client device 10 together with the content.
- the usage file includes the content name, its usage data (number of permitted playing/reading times, expiry date, etc), together with its encryption key.
- Each item of digital content to be distributed may correspond to a usage file. All usage files on the same device may be encrypted using an identical key. This key may be embedded into the players or readers for that device.
- the player/reader used to play/read the digital content is also installed on this device.
- the encryption key used to encrypt the usage files, the paths used to store the usage files in clients device 10, and a usage check and updating module may be embedded into a traditional player/reader to produce a protection enabled player/reader.
- the protection enabled player/reader of present invention is different from a traditional player/reader in that it can not only play/read the secure content, but is also able to distinguish original content and duplicated content as well as check usage of the digital content. If the content is duplicated or the permitted usage of the content has expired, the player/reader will be disabled and will not be able to play/read the content.
- Fig.4 illustrates the block diagram of the creation of a protection enabled player/reader.
- the digital content and its usage file should be installed on a client's device via an on-line route.
- Fig.5 illustrates the flowchart of an on-line installation process.
- server 11 Before the client can install an item of digital content on his device 10, he/she needs to answer some questions so that server 11 can obtain information about the configuration of the client device 10. Assuming that the client device 10 is installing the digital content for the first time (50), installation paths for the content and its usage files are created(51). The paths are embedded into the content player/reader (52) and stored together with device information (53) into the database at server 11.
- the player/reader is then sent via the internet to client device 10 (54). If client device 10 has already installed the player/reader, the digital content and its usage files will be installed on this device according to the installation paths and device information embedded in the player/reader (55). After installation, a content file and multiple redundant usage files are installed on client device 10. Redundant usage files are installed in different locations defined by the installation paths to facilitate copy protection. A client who installs an item of digital content and its usage files on his/her device, may know the location of the content, but will not know the locations of the usage files.
- a summary file for each device may also be required and information associated with the content may be included in the summary file.
- the summary file may be created by the player/reader when the digital content is first played/read on a device.
- the information and usage data associated with all items of digital content installed in this device may be included in the summary file.
- the usage data associated with an item of content in the summary file may be updated after each playing/reading of the item.
- the summary file may include a name identifying the content, its encryption key, and its usage data.
- Fig.6 illustrates a flowchart of a summary file creation and updating process.
- the present invention may provide copy protection and usage control.
- Copy protection may deny duplicated versions of original digital content the capacity to be played/read on another device. Copy protection may also deny the original content the capacity to be played/read on the device if eg., a permitted time frame for the item of content has expired, and may deny a renamed version of the original content the capacity to be played/read on the original or another device.
- Usage control may provide for playing/reading of content to comply with terms & conditions of usage as determined at the time of purchase. Usage control may ensure that any item of content cannot be played/read if its permitted usage time has expired.
- Fig.7 illustrates the flowchart of how an item of digital content can be correctly played/read.
- two conditions must be satisfied to play an item of content.
- the usage files corresponding to the item of content must exist in correct locations in the associated device as indicated by paths embedded into the player/reader.
- the summary file must include the information and usage data associated with the item of content. These two conditions may ensure that duplicated versions of the content cannot be played/read beyond its permitted usage either on the same device or on another devices.
- the locations in which the usage files and the summary file are stored will be different for different devices. These locations are recorded in the players/readers distributed to the respective devices. The client will only know the location where the digital content are stored, but will not know where the usage files and summary file are stored.
- Each item of content is encrypted with a unique key and these keys are recorded in the usage file and summary file.
- the usage file and summary file are encrypted using an identical key and this key is embedded in the player/reader. If a client makes copies of the digital content and the player/reader attempts to play the copied version of the content on another device, the content will not be played/read because the relevant usage files and summary file do not exist on that device. If the client plays the copied version of the content on the original device, the summary file wili be updated in the same manner as if the client had played/read the original content. If the client renames the copied file, it cannot be played/read because there will be no match with corresponding usage files.
- the player/reader may delete the relevant usage files associated with this item of content and may also delete elements associated with these content included in the summary file. Even if the item of content can be reserved after its usage has expired, it cannot be played/read, because its usage files have been deleted from the device.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention presents a method and system for controlling usage and protecting against copying of digital multimedia content (such as audio, video, image, and document) and their associated players or readers. The system is arranged so that digital content and their players or readers that are installed in one computer or device cannot be used if they are copied to another computer or device. The system may also be arranged so that duplicated digital content is not usable in the same computer or device. Usage data associated with each item of digital content may restrict the running time during which the content can be used and may be updated automatically after each usage of the content. The content may not be accessible if its permitted usage has expired.
Description
METHOD AND SYSTEM FOR CONTROLLING USAGE AND PROTECTING AGAINST COPYING OF DIGITAL MULTIMEDIA CONTENT AND ASSOCIATED PLAYERS/READERS
BACKGROUND OF THE INVENTION
Field of the Invention
This invention relates to a method and system for controlling usage and protecting against copying of digital multimedia content and their associated players or readers.
Description of Related Art
Rapid development of computer networks and increased use of multimedia data via the Internet have resulted in faster and more convenient exchange of digital information or content. However, the open environment of the Internet creates consequential problems with respect to enforcement of copyright in artistic works, and in particular, illegal distribution of digital multimedia works without the owner's authorization. To dissuade illegal copying, there exists a need for strengthening and assisting enforcement of copyright protection of such works. Typically, security measures and digital watermarking technologies have been used to protect digital content. Firstly, the digital content is stored in a cryptographic container before distribution to users. Secondly, a flexible licensing mechanism is used to control the right of those seeking access to the content. Thirdly, watermarks are embedded in the content in an imperceptible fashion so that the content can be identified if the cryptographic container is breached. Whilst security measures and watermarking technologies are effective in protecting digital content to some extent, distinct problems exist in actual applications. Neither security measures nor digital watermarking can prevent digital content being illegally duplicated and distributed. In order to better protect digital content and its usage, the present invention provides copy protection and usage control for digital multimedia content and their associated players or readers installed in a digital computer or device.
Various methods of copy protection and usage control have been developed to prevent unauthorized use of software. Compared with these methods, the present invention is more effective and simpler.
The prior art technologies fall into two categories. The first category is hardware-based. In this first category is U.S. Pat. No. 4,562,306 which discloses a method for protecting
computer software using an active coded hardware device, which must be plugged into the computer's communication port before the software can be run. U.S. Pat. No. 4,866,769 discloses a copy protection system for PC software distributed on discs, which provides a unique ID stored in a RAM of a PC in which software on a disc is to be used. This ID is accessible to the user of the computer. Prior to each use of the program, the software on the disc uses the PC and the source IDs and checkword to verify that the software is being used on the same PC on which it was installed. U.S. Pat. No. 4,849,836 discloses a system for preventing copying of software from computer disks, the system including a key sequence in a copy protection section of a program which is deliberately rendered ambiguous by repeatedly recording a word containing that sequence while gradually shifting the phase of the transition of a portion of the sequence until the sequence becomes a different sequence. U.S. Pat. No. 5,758,068 discloses a method and apparatus for software license management. It uses three identifier codes from a computer to control the access and usage of the software to this computer. These methods can restrict the use of the software to a single computer system, but they need additional hardware support and are not flexible.
The second category is software-based. In this second category is U.S. Pat. No. 5,199,066 which discloses a method and apparatus for protecting software in which the use of software is enabled only when a predetermined intermediate code and a predetermined software code are identical. U.S. Pat. No. 5,109,413 discloses a method that allows software distributors to control the length of time or the number of times a user can run protected software. This method provides a trial period during which a potential purchaser can decide whether or not he or she wants to buy the software. After the trial period expires, either new software without usage control system is provided or instructions are given to users to disable the usage control system. U.S. Pat. No. 5,293,422 discloses a usage control system for computer software. The software comprises a set of units, each of the units being an interactive activity between the software and the user which can be separately completed from the interactive activities of the other units in the set. The completion of units is monitored by means of a copy-protected region of a recording medium and when all units have been completed, further access to the software is denied. Although these approaches have to some extent limited use of computer software, they cannot provide adequate protection against duplication of the software and are susceptible to being circumvented.
SUMMARY OF THE INVENTION
The present invention provides a method for protecting digital content. The method may prevent digital content and their players or readers from being illegally duplicated and distributed, and may control and update permitted usage rights relating to the digital content.
According to the present invention there is provided a method of protecting digital content to be installed to a client device from a remote server, said method including the steps of: creating a player/reader for said digital content; creating a usage file associated with said digital content, said usage file including storage paths defining locations in said client device for storing copies of said usage file; embedding at least said storage paths in said player/reader to provide a protection enabled player/reader; installing said digital content and said protection enabled player/reader to said client device; installing said copies of said usage files in said locations defined by said storage paths; and adapting said protection enabled player/reader to verify the existence of said copies of said usage files at said locations in said client device prior to each playing/reading of said digital content.
The method of the present invention may control usage of digital content on a personal computer or other device. The term "device" will be used herein to describe a PC (Personal Computer) or other terminal suitable for accessing digital content via the internet. In order to further protect the digital content and prevent its illegal use, encryption and watermarking techniques may be used to code the digital content. Encryption may ensure that the digital content cannot be used without an encryption key. Each item of digital content may be encrypted with a different key. Watermarking, may provide proof of copyright of the digital content and may facilitate tracing of illegal distributions of the digital content in the event that the encryption is breached.
Copy protection according to the present invention may be arranged such that duplicated versions of original digital content cannot be played or read once it is installed in a client computer or device. The installed digital content also may not be copied from one computer or device to another computer or device, nor may it be renamed. A player or reader installed in one computer or device may not be used in another computer or device.
The present invention may rely upon on-line facilities such as the internet to install the digital content purchased by a client. In a transaction process, the client may be required to provide to a server which loads the digital content his personal information and configuration of his computer or device. The server may embed the relevant information into the associated player or reader and send it to the client computer or device. Meanwhile, the item of digital content and its associated files may be installed in relevant locations of the client computer or device according to information embedded into the associated player or reader. If the digital content is to be correctly played or read by the player or reader, all of the associated files will need to exist in the correct locations of the computer or device.
The usage file may include usage data, the encryption key and other information relating to an item of digital content. All usage files downloaded to the same client computer or device may be encrypted using the same key. This key may be embedded into the associated content player or reader. The encrypted usage file may be redundantly installed in different locations of the client computer or device. The locations are dependant on information embedded in the player or reader, obtained from the client and his computer or device. To play or read an item of digital content, all encrypted usage files corresponding to this item of content must exist in the client computer or device. Furthermore, a summary file may be created for each client computer or device. The summary file may contain a name identifying the digital content, details of any encryption key used to encrypt the digital content, and current usage data relating to the digital content installed on a particular computer/device. The summary file may be encrypted using the same key as the usage files and may be stored redundantly in locations of the computer/device identical to the locations of the usage files. The summary file may be updated after each playing or reading of the item of digital content. If permitted usage of an item of digital content has expired, usage files corresponding to this item of content may be deleted from the computer/device. The relevant record in the summary file may also be deleted. Without these files, the expired content cannot be played or read by the player or reader. If the client wants to replay or reread the digital content, he/she must connect to the server and request to install the content and relevant files to his computer/device.
A usage control mechanism may be adopted to enforce terms and conditions of use of the digital content. Business rules may be associated with the digital content to be distributed. The usage control mechanism may be used to specify variable licensing parameters to manage and enforce terms and conditions of use. The usage control mechanism may encompass means for monitoring and tracing use of the digital content for reporting to owners of copyright in digital content. The usage control mechanism may be tamper- resistant and may be integrated into content protection mechanisms.
DESCRIPTION OF THE DRAWINGS
A preferred embodiment of the present invention will be described with reference to the accompanying drawings wherein: Fig 1 shows the general structure of a communications network between a client and a server;
Fig 2 shows a flow chart of a process associated with an online installation transaction;
Fig 3 shows a block diagram of a process for creating protected content;
Fig 4 shows a block diagram of a process for creating a protection enabled player/reader; Fig 5 shows a flow chart of a process for installation of digital content in an on-line route:
Fig 6 shows a flow chart of a process for creating and updating a summary file; and
Fig 7 shows a flow chart of a process for playing/reading digital content.
DETAILED DESCRIPTION Fig.1 illustrates the general structure of communications between a client computer or device 10 (PC or other access devices) and a server 11 providing a source of content & associated services. Server 11 may include one or more sources for storing digital content and databases for current distribution. The services provided by server 11 include payment verification, player/reader creation, usage file creation and encryption, and on- line installation.
Fig.2 illustrates a flow chart of a process associated with an online installation transaction, cpmmencing with the client sending a request (20) to server 11 for digital content to be installed on client device 10. The request includes the content name, conditions of usage and payment, and information about the configuration of client device 10. Assuming that
payment is verified as correct (21 ,22) and it is the first time that the digital content is being installed on client device 10 (23), a player or reader corresponding to the digital content is created (24) and sent (25) to the client device 10. Meanwhile, a usage file corresponding to the content is created (26) and encrypted. The encrypted usage file together with the encrypted digital content is installed (27) on client device 10 via the on-line installation service incorporated in server 11.
To secure the digital content against unauthorised use and to monitor or trace illegal distribution of the digital content in the event that security is breached, encryption and watermarking is used to generate a secure digital content format. Fig.3 shows a block diagram of an encryption and watermarking process. An imperceptible watermark is embedded in the digital content to provide marked content that may be identified as content that is subject to copyright protection. The watermark may be embedded in the plain or original digital content in any suitable manner and by any suitable means as is known in the art. The watermarked digital content is then encrypted using an encryption key corresponding to the content. The watermarked content may be encrypted in any suitable manner and by any suitable means as is known in the art. The encrypted and watermarked content is stored in the content source associated with Server 11.
When an item of digital content is to be distributed to client device 10, the relevant usage file is created and installed on client device 10 together with the content. The usage file includes the content name, its usage data (number of permitted playing/reading times, expiry date, etc), together with its encryption key. Each item of digital content to be distributed may correspond to a usage file. All usage files on the same device may be encrypted using an identical key. This key may be embedded into the players or readers for that device.
If the digital content being installed in client device 10 for the first time, the player/reader used to play/read the digital content is also installed on this device. The encryption key used to encrypt the usage files, the paths used to store the usage files in clients device 10, and a usage check and updating module may be embedded into a traditional player/reader to produce a protection enabled player/reader. The protection enabled player/reader of
present invention is different from a traditional player/reader in that it can not only play/read the secure content, but is also able to distinguish original content and duplicated content as well as check usage of the digital content. If the content is duplicated or the permitted usage of the content has expired, the player/reader will be disabled and will not be able to play/read the content. Fig.4 illustrates the block diagram of the creation of a protection enabled player/reader.
In order to ensure that duplicated content cannot be played/read by the player/reader and to control usage of digital content, the digital content and its usage file should be installed on a client's device via an on-line route.
Fig.5 illustrates the flowchart of an on-line installation process. Before the client can install an item of digital content on his device 10, he/she needs to answer some questions so that server 11 can obtain information about the configuration of the client device 10. Assuming that the client device 10 is installing the digital content for the first time (50), installation paths for the content and its usage files are created(51). The paths are embedded into the content player/reader (52) and stored together with device information (53) into the database at server 11.
The player/reader is then sent via the internet to client device 10 (54). If client device 10 has already installed the player/reader, the digital content and its usage files will be installed on this device according to the installation paths and device information embedded in the player/reader (55). After installation, a content file and multiple redundant usage files are installed on client device 10. Redundant usage files are installed in different locations defined by the installation paths to facilitate copy protection. A client who installs an item of digital content and its usage files on his/her device, may know the location of the content, but will not know the locations of the usage files.
Before an item of digital content can be played/read, it may not be sufficient to produce the content and its usage files. A summary file for each device may also be required and information associated with the content may be included in the summary file. The summary file may be created by the player/reader when the digital content is first
played/read on a device. The information and usage data associated with all items of digital content installed in this device may be included in the summary file. The usage data associated with an item of content in the summary file may be updated after each playing/reading of the item. The summary file may include a name identifying the content, its encryption key, and its usage data. Fig.6 illustrates a flowchart of a summary file creation and updating process.
The present invention may provide copy protection and usage control. Copy protection may deny duplicated versions of original digital content the capacity to be played/read on another device. Copy protection may also deny the original content the capacity to be played/read on the device if eg., a permitted time frame for the item of content has expired, and may deny a renamed version of the original content the capacity to be played/read on the original or another device. Usage control may provide for playing/reading of content to comply with terms & conditions of usage as determined at the time of purchase. Usage control may ensure that any item of content cannot be played/read if its permitted usage time has expired.
Fig.7 illustrates the flowchart of how an item of digital content can be correctly played/read. According to Fig.7 two conditions must be satisfied to play an item of content. Firstly, the usage files corresponding to the item of content must exist in correct locations in the associated device as indicated by paths embedded into the player/reader. Secondly, the summary file must include the information and usage data associated with the item of content. These two conditions may ensure that duplicated versions of the content cannot be played/read beyond its permitted usage either on the same device or on another devices. The locations in which the usage files and the summary file are stored will be different for different devices. These locations are recorded in the players/readers distributed to the respective devices. The client will only know the location where the digital content are stored, but will not know where the usage files and summary file are stored.
Each item of content is encrypted with a unique key and these keys are recorded in the usage file and summary file. The usage file and summary file are encrypted using an identical key and this key is embedded in the player/reader.
If a client makes copies of the digital content and the player/reader attempts to play the copied version of the content on another device, the content will not be played/read because the relevant usage files and summary file do not exist on that device. If the client plays the copied version of the content on the original device, the summary file wili be updated in the same manner as if the client had played/read the original content. If the client renames the copied file, it cannot be played/read because there will be no match with corresponding usage files. If usage of an item of digital content has expired, the player/reader may delete the relevant usage files associated with this item of content and may also delete elements associated with these content included in the summary file. Even if the item of content can be reserved after its usage has expired, it cannot be played/read, because its usage files have been deleted from the device.
It is to be understood that various alterations, modifications and/or additions may be introduced into the construction and arrangement of the parts herein described without departing from the spirit or ambit of this invention.
Claims
1. A method of protecting digital content to be installed to a client device from a remote server, said method including the steps of: creating a player/reader for said digital content; creating a usage file associated with said digital content, said usage file including storage paths defining locations in said client device for storing copies of said usage file; embedding at least said storage paths in said player/reader to provide a protection enabled player/reader; installing said digital content and said protection enabled player/reader to said client device; installing said copies of said usage files in said locations defined by said storage paths; and adapting said protection enabled player/reader to verify the existence of said copies of said usage files at said locations in said client device prior to each playing/reading of said digital content.
2. A method according to claim 1 including the step of disabling said protection enabled player/reader if said protection enabled player/reader is unable to detect said copies of said usage files at said locations defined by the storage paths embedded therein.
3. A method according to claim 1 including the step of embedding a digital watermark into said digital content.
4. A method according to claim 3 including the step of encrypting the watermarked digital content by means of a watermark encryption key.
5. A method according to claim 4 wherein said watermark encryption key is unique to each item of digital content.
6. A method according to claim 1 including the step of encrypting said usage file by means of a usage encryption key.
7. A method according to claim 6 including the step of embedding said usage encryption key into said protection enabled player/reader.
8. A method according to claim 6 wherein said usage encryption key is identical for each usage file installed to said client device.
9. A method according to claim 1 wherein said client device includes a personal computer.
10. A method according to claim 1 wherein said usage file includes usage data associated with said digital content and details relating to any encryption key used to encrypt said digital content.
11. A method according to claim 1 including the step of embedding a summary file creation and updating module into said protection enabled player/reader.
12. A method according to claim 11 wherein said module is adapted to create a summary file prior to a first playing/reading of said digital content on said client device.
13. A method according to claim 12 wherein said module is adapted to update said summary file after each playing/reading of said digital content on said client device.
14. A method according to claim 12 wherein said summary file includes a name identifying said digital content, details of any encryption key used to encrypt the digital content and current usage data.
15. A method according to claim 13 wherein said digital content includes any copy of said digital content.
16. A method according to claim 14 wherein said summary file includes usage expiry information relating to an item of digital content and including the step of disabling said protection enabled player/reader if said current usage data indicates that permitted usage of said item of digital content has expired.
17. A method according to claim 16 wherein said usage expiry information includes a permitted usage expiry date or number of permitted playing/reading times.
18. A method according to claim 16 wherein said step of disabling includes the step of deleting one or more usage files associated with said item of digital content.
19. A method according to claim 1 wherein said client device is connectable to said remote server via a network such as the internet.
20. A method according to claim 1 wherein said digital content includes multimedia such as digital audio, video, image and document.
21. A system for implementing a method according to any one of the preceding claims.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2000/000173 WO2002031618A2 (en) | 2000-10-13 | 2000-10-13 | Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers |
GB0308420A GB2383872B (en) | 2000-10-13 | 2000-10-13 | Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2000/000173 WO2002031618A2 (en) | 2000-10-13 | 2000-10-13 | Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002031618A2 true WO2002031618A2 (en) | 2002-04-18 |
WO2002031618A3 WO2002031618A3 (en) | 2002-09-26 |
Family
ID=20428877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2000/000173 WO2002031618A2 (en) | 2000-10-13 | 2000-10-13 | Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2383872B (en) |
WO (1) | WO2002031618A2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8644969B2 (en) | 2003-01-02 | 2014-02-04 | Catch Media, Inc. | Content provisioning and revenue disbursement |
US8666524B2 (en) | 2003-01-02 | 2014-03-04 | Catch Media, Inc. | Portable music player and transmitter |
US8732086B2 (en) | 2003-01-02 | 2014-05-20 | Catch Media, Inc. | Method and system for managing rights for digital music |
US8918195B2 (en) | 2003-01-02 | 2014-12-23 | Catch Media, Inc. | Media management and tracking |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991876A (en) * | 1996-04-01 | 1999-11-23 | Copyright Clearance Center, Inc. | Electronic rights management and authorization system |
JP3079038B2 (en) * | 1996-06-10 | 2000-08-21 | キヤノン株式会社 | Developing device, process cartridge and image forming device |
US5878143A (en) * | 1996-08-16 | 1999-03-02 | Net 1, Inc. | Secure transmission of sensitive information over a public/insecure communications medium |
JP3625983B2 (en) * | 1997-03-12 | 2005-03-02 | 三菱商事株式会社 | Data management system |
US6754822B1 (en) * | 1998-04-30 | 2004-06-22 | Fraunhofer-Gesellschaft Zur Forderung Der Angewandten Forshung E.V. | Active watermarks and watermark agents |
-
2000
- 2000-10-13 GB GB0308420A patent/GB2383872B/en not_active Expired - Lifetime
- 2000-10-13 WO PCT/SG2000/000173 patent/WO2002031618A2/en active Search and Examination
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8644969B2 (en) | 2003-01-02 | 2014-02-04 | Catch Media, Inc. | Content provisioning and revenue disbursement |
US8666524B2 (en) | 2003-01-02 | 2014-03-04 | Catch Media, Inc. | Portable music player and transmitter |
US8732086B2 (en) | 2003-01-02 | 2014-05-20 | Catch Media, Inc. | Method and system for managing rights for digital music |
US8918195B2 (en) | 2003-01-02 | 2014-12-23 | Catch Media, Inc. | Media management and tracking |
US8996146B2 (en) | 2003-01-02 | 2015-03-31 | Catch Media, Inc. | Automatic digital music library builder |
Also Published As
Publication number | Publication date |
---|---|
WO2002031618A3 (en) | 2002-09-26 |
GB2383872A (en) | 2003-07-09 |
GB0308420D0 (en) | 2003-05-21 |
GB2383872B (en) | 2004-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6735699B1 (en) | Method and system for monitoring use of digital works | |
CN1331125C (en) | System and method for controlling the use and duplication of digital content distributed on removable media | |
CN1192380C (en) | Method and device for preventing non-arthorised use of multiple medium content | |
KR100467929B1 (en) | System for protecting and managing digital contents | |
CN100511453C (en) | Method and device for supplying a data set stored in a database | |
KR100201550B1 (en) | Information service processor | |
JP4305593B2 (en) | DATA RECORDING / REPRODUCING METHOD AND DEVICE, DATA RECORDING DEVICE AND METHOD | |
CN102016863B (en) | Embedded licenses for content | |
RU2279724C2 (en) | Method and device for controlling distribution and usage of digital works | |
US7328458B2 (en) | Authoring system, authoring key generator, authoring device, authoring method, and data supply device, information terminal and information distribution method | |
US20030028489A1 (en) | Method and apparatus for legitimate sharing of electronic content | |
KR20020083851A (en) | Method of protecting and managing digital contents and system for using thereof | |
US20070233601A1 (en) | Systems and methods for protecting digital content | |
US8645533B2 (en) | Content reproducing apparatus and content reproducing method | |
WO2004057793A1 (en) | Systems and methods for preventing and detecting unauthorized copying of software | |
US20080130058A1 (en) | Method of protecting digital data by utilizing an embedded watermark | |
JP2005353196A (en) | License management system and license management method | |
CN102713924A (en) | Secure time and space shifted audiovisual work | |
KR20030015742A (en) | System for tracking down illegal copies and distribution of digital contents | |
WO2002031618A2 (en) | Method and system for controlling usage and protecting against copying of digital multimedia content and associated players/readers | |
US20030083942A1 (en) | Method of enhancing the security of a protection mechanism | |
US20070220617A1 (en) | System for Distributing Digital Contents and Method Thereof | |
JP2004046592A (en) | Content management system | |
US20050120210A1 (en) | Method to minimize software piracy and enhance security in processes related with many industries | |
Xu et al. | Content protection and usage control for digital music |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): GB SG US |
|
ENP | Entry into the national phase |
Ref document number: 0308420 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20001013 Format of ref document f/p: F |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): GB SG US |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) |