+

WO2009037663A2 - Procédé et système de gestion d'adaptations d'un contenu numérique - Google Patents

Procédé et système de gestion d'adaptations d'un contenu numérique Download PDF

Info

Publication number
WO2009037663A2
WO2009037663A2 PCT/IB2008/053800 IB2008053800W WO2009037663A2 WO 2009037663 A2 WO2009037663 A2 WO 2009037663A2 IB 2008053800 W IB2008053800 W IB 2008053800W WO 2009037663 A2 WO2009037663 A2 WO 2009037663A2
Authority
WO
WIPO (PCT)
Prior art keywords
digital content
parties
adaptations
party
content
Prior art date
Application number
PCT/IB2008/053800
Other languages
English (en)
Other versions
WO2009037663A3 (fr
Inventor
Marijn C. Damstra
Boris Skoric
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Publication of WO2009037663A2 publication Critical patent/WO2009037663A2/fr
Publication of WO2009037663A3 publication Critical patent/WO2009037663A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/637Control signals issued by the client directed to the server or network components
    • H04N21/6377Control signals issued by the client directed to the server or network components directed to server
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/02Editing, e.g. varying the order of information signals recorded on, or reproduced from, record carriers
    • G11B27/031Electronic editing of digitised analogue information signals, e.g. audio or video signals
    • G11B27/034Electronic editing of digitised analogue information signals, e.g. audio or video signals on discs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/472End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
    • H04N21/47205End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for manipulating displayed content, e.g. interacting with MPEG-4 objects, editing locally
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/65Transmission of management data between client and server
    • H04N21/658Transmission by the client directed to the server
    • H04N21/6582Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/85Assembly of content; Generation of multimedia applications
    • H04N21/854Content authoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Definitions

  • the present invention relates to a method and a system for managing adaptation of digital content by multiple parties where the parties communicate via a communication channel.
  • This phenomenon is YouTube.
  • Multiple parties typically perform the creation of content.
  • Content from a first party is adapted and the result is distributed, others can then view and further adapt the content.
  • Such a content adaptation is often referred to as co-creation, and is depicted graphically in Fig. 1, where three authors, Al, A2 and A3 100 contribute to a co-created work, where the contribution Cl, C2 and C3 101 for each respective author undergoes a co-creation process (Co P) 102 that results in a co- creation X (Co X) 103, which is subsequently distributed by a distributor (D) 104 to a consumer (C) 105.
  • the co-created work Y 106 from Al first obtains a previously co-created work from Y (Co Y) 106 from the distributor.
  • An author who contributes to a co-created work faces three major issues.
  • the other authors can deny a contributing author.
  • the other authors publish the co-created work without acknowledging (i.e. excluding) the first author.
  • a contributing author cannot block publication of the co-created work.
  • the contributing author does not agree with the (artistic) direction the co-created work is taking, he would like to withdraw his contributions to that work.
  • the contributing author would like to prevent the co-created work from being published on an undesired platform or in an undesired context.
  • an author wants to prevent his contribution to be reused in future co-created work by the authors, other than the current work in which he is involved.
  • the time stamping approach requires an author to register his contribution at a trusted third party.
  • the author then receives a signed timestamp for this contribution. Having registered his contribution, he can then offer it to the other authors involved in the co-creation session. Should the other authors deny his authorship of his contribution to the co-created work, e.g. after publishing it, the author can prove his authorship by showing the signed timestamp. For this, the author needs to prove that his contribution is present in the co- created work.
  • the third party is also able to misuse the author's contribution; this can be prevented by sending a (perceptual) hash of the contribution to the third party, instead of the contribution itself.
  • the author first embeds a unique number (e.g. his identity) in his contribution. Having watermarked his contribution, he can then offer it to the other authors involved in the co-creation session. Should the other authors deny his authorship the author can prove his authorship by showing his watermark in the co-created work. Unfortunately, this may not be successful as his contribution will be modified during the co-creation process, thereby destroying the watermark. Also, the contribution may be a very small piece of content, or not even content (e.g. an operation) making it infeasible to embed the watermark.
  • a unique number e.g. his identity
  • 3D modeling Another example of co-creation of digital content is 3D modeling.
  • the creation of 3D models has become highly popular.
  • players in computer games create their own 3D objects.
  • great value is attached to these objects. This has resulted in players buying such objects from other players.
  • the objects are handed over inside the game, whereas the monetary part of the transaction is performed outside the game.
  • An example of such a game is SecondLife.
  • the creation of simple 3D models of objects is evolving into the creation of highly sophisticated 3D models of both sceneries and actors. As the amount of work in creating these models is significant, it is likely that substantial monetary value will be attributed to these models.
  • Users of SecondLife have already complained about so-called CopyBots copying their self-made models.
  • Current models show a high realism of graphics. This raises high expectations for the mechanics to match up in terms of realism (natural looking motion). More and more effort will be spent to model these mechanics better, e.g. the walking behavior of a human. This behavior
  • the object of the present invention is to overcome the above mentioned drawbacks by providing a method and a system for managing such adaptations of digital content.
  • the present invention relates to a method of managing adaptation of digital content by multiple parties where the parties communicate via a communication channel, the method comprising: - distributing a downscaled version of the digital content to at least some of the parties, registering the adaptations performed on the digital content and associating the adaptations to the party making them, communicating the adaptations between the parties until the parties approve a final version of the adapted content, applying the approved adaptations to a full scale version of the digital content, and publishing the approved adapted digital content.
  • three major problems are solved. The first solved problem being that other parties can no longer deny another that contributed to the adapted digital content, because the signature of all the parties that participated in the adaptations on the content are associated to the editing operations. If e.g.
  • the second problem solved is that a contributing author can now block a publication of the adapted content that he/she participated in.
  • an author A can prevent publication of content adapted by author A, B and C if author A does not agree with the end result.
  • Alternatives for blocking publication could be e.g. removing the contribution from author A in the adapted digital content. This means that the authors would then only be B and C.
  • the third solved problem is that a re-use of an author's contribution is prevented in future adaptations on the content, because this author must always agree on the adaptations being made.
  • the method comprises a step of providing a trusted party with a full scale version of the digital content by sending the full scale version of the digital content from the parties sides to the trusted party. This is performed preferably after the parties have agreed on the adaptations performed. In that way, it is ensured that the parties will not provide their full scale version until it is certain that all parties have agreed on the adaptations being done on the multimedia content.
  • the distribution of the downscaled version of the digital content to the other parties is performed via the trusted party. In that way, the communication between the parties is performed centrally, but this could of course also be done directly between the parties as disclosed here above.
  • the trusted party is a trusted server or a trusted client locally situated at one or more of the parties sides. In that way, the trusted party can either be an external server or located at one or more party's side.
  • the adaptations made on one party side are made on the downscaled version of the digital content possessed by another party, where the adaptations are registered in a log file uniquely assigned to the party making the adaptations.
  • the parties can exchange a downscale version of their digital content, wherein at e.g. a first party side the editing operations on the downscaled digital content provided by another party is registered in a first log file, and vice verse, at a second party side the editing operations on the downscaled digital content provided by the first party is registered in e.g. a second log file.
  • the step of communicating the editing operations could be done by sending the first log file to the second party side where it is added to the second log file at the second party side, and sending the second log file provided at the second party side to the first party side where it is added to the first log file at the first party side.
  • the parties have a complete log file of the editing operations.
  • the trusted client is located at e.g. the second party, a full scale version of the digital content to the second party's trusted client, wherein the step of adapting the digital content would be adapting, at the second party's trusted client side, the full-scale digital content according to the editing operations as recorded in the log file.
  • the adaptations are sent to the trusted party which collects them and applies them on a downscaled version, the applying resulting in adapted digital content, the step of communicating the adaptations between the parties comprising sending from the trusted party side the downscaled version of the adapted digital content along with the adaptations performed by the parties.
  • the parties can see a final (or non- final) version of the adapted content and thus judge whether or not they agree on the changes being made. Since the editing operations are associated with the content the parties can also see who participated in the changes being made in the content and even what kind of operations he/she did.
  • the step of approving the adapted digital content for publication comprises signing a certificate stating that the parties approve the adaptations made on the digital content and that they further approve the parties having contributed to the adapted digital content. In that way, it is ensured that the parties agree on the adaptations being made, and agree on the parties that participated in the adapted digital content.
  • a situation could occur that one party does not want to co-operate with another party, or one party after looking at the adapted digital content does not agree on the changes being made and therefore can deny acknowledging the adapted content.
  • author A and author B create content together. Author A is unhappy with the result and decides not to approve the content by blocking the publication.
  • the digital content includes one or more of a video content, audio content, digital image content, color or texture content, scripts, model parameters, 3D images, 3D video, and wherein the downscaled version of the digital content is obtained by means of one or more of the following: downscaling digital images by reducing the resolution of the video, or downscaling video by reducing the sampling frequency of the digital content, or downscaling audio by reducing sampling frequency or quantization level of audio samples, or downscaling by taking a subset of the digital data., or downscaling by applying lossy compression, or downscaling by applying partial encryption, or downscaling by applying noise addition, or downscaling by applying reduction of the number of parameters, or a combination of one or more of the above.
  • Downscaling the video may include reduction in spatial resolution (horizontal, vertical and/or depth) or reduction in temporal resolution, or by reducing quantization level, or by converting color (e.g. RGB) data into gray values (BW), and the like.
  • Downscaling the images may include reduction in spatial resolution (horizontal, vertical and/or depth), reducing quantization level, converting color (e.g. RGB) data into gray values (BW), and the like. Accordingly, the only content the parties have access to is a content of reduced quality. Due to the reduced resolution of e.g. a video file, such files although accessible by the other parties have limited appeal.
  • the digital content is a three-dimensional model and the trusted party is a trusted server configured to operate on 3D models, and wherein a downscaled version of the digital content is a 2D projection of the 3D model.
  • the 3D models may also include e.g. mechanical model describing the behavior of the 3D model when interacting with a second model, or any description of how the model would react to/behave under certain stimuli. This may be described by an algorithm, rule set, lookup table, formula etc included by the 3D model.
  • Downscaling the 3D model can be achieved by the same methods as for images, but also by projecting the 3D model on a 2D plane, reducing the order of the behavioral/mechanical model/formula (i.e. approximating 4 th order mechanical model with 2 nd order mechanical model etc). Downscaling may also include removing (part of) the rule set, lookup table etc from the 3D model's data structure.
  • the 3D model can be used to create digital content, for example 3D images,
  • the owner of the 3D model may desire to protect his 3D model as well as have the ability to block publication.
  • Protecting the 3D model can be achieved by downscaling it by means of 2D projection.
  • the resulting 2D projection can be protected by e.g. (i) having a trusted party that requires permission from all co-creating parties, or (ii) having an "after the fact" system where co-created content is always accompanied by signatures from all contributing parties.
  • the parties which do not trust each other and possess their own 3D models can share their models in a joint workspace, namely, via the trusted party.
  • party A does not have access to 3D model possessed by party B, and vice verse.
  • the trusted party via the trusted party they can share their models in the joint workspace.
  • the step of publishing the digital content is done on a full scale version of the approved adapted digital content.
  • the present invention relates to a computer program product for instructing a processing unit to execute the above mention method steps when the product is run on a computer.
  • the present invention relates to a system for managing adaptation of digital content by multiple parties where the parties communicate via a communication channel, the system comprising: a processor adapted to distribute a downscaled version of the digital content to at least some of the parties, a processor adapted to register the adaptations performed on the digital content and associating the adaptations to the party making them, a processor adapted to communicate the adaptations between the parties until the parties approve a final version of the adapted content, a processor adapted to apply the approved adaptations to a full scale version of the digital content, and publishing the approved adapted digital content.
  • the aspects of the present invention may each be combined with any of the other aspects.
  • Fig. 1 shows a prior art method of co-creation process or adaptation process in which three parties contribute to a co-created work Co x
  • Fig. 2 shows a flowchart of a method according to the present invention of managing adaptation or co-creation of digital content by multiple parties possessing at least a portion of the digital content where the parties communicate via communication channels
  • Fig. 1 shows a prior art method of co-creation process or adaptation process in which three parties contribute to a co-created work Co x
  • Fig. 2 shows a flowchart of a method according to the present invention of managing adaptation or co-creation of digital content by multiple parties possessing at least a portion of the digital content where the parties communicate via communication channels
  • Figs. 3 and 4 show one embodiment according to the present invention where all the parties are registered at a trusted Server that hosts a co-creation session,
  • Figs. 5 and 6 shows another embodiment according to the present invention where all parties send their downscaled contributions of the digital content to each other
  • Figs. 7 and 8 shows an embodiment according to the present invention where the digital content is a 3D model
  • Fig. 9 depict graphically a protocol in which party B uses an encrypted model x of party A, where party B performs operations under encryption (e.g. rotation, projection) and returns the encrypted projection x to party A, where party A then decrypts the desired projection and returns it to party B, and
  • encryption e.g. rotation, projection
  • Fig. 10 depicts a system according to the present invention for managing adaptation of digital content by multiple parties possessing at least a portion of the digital content where the parties communicate via communication channels.
  • Fig. 2 shows a flowchart of a method according to the present invention of managing adaptation or co-creation of digital content by multiple parties which may initially possess at least a portion of the digital content, or initially possessing no content at all, and which communicate via a communication channel.
  • adaptation by multiple parties may also be formulated as co-creation by multiple parties, but this term will be used in some of the embodiments that will be discussed later.
  • adaptation is meant any kind of changes made in the digital content, i.e.
  • the multiple parties may e.g. be multiple authors of digital content or a portion of the content.
  • the digital content can be e.g. video or audio content or digital image content, or color or texture content, or a combination thereof, or a three-dimensional (3D) model, and the like.
  • the communication channel may e.g.
  • the user can e.g. be communicating user their PC or laptop computer, or using PDAs, mobile phones and any such hand-held devices that are adapted to communicate in a wireless (or wired) way.
  • a full scale version (Sl) 201 of the digital content is provided to a trusted party.
  • the trusted party may e.g. be a trusted server or a trusted client locally situated at the party side.
  • the sending of the full scale version may either be done as an initial step, or as will be discussed later, after the parties agree on the adapted digital content. Accordingly, by sending the full scale version to the trusted party, it is ensured that the un-trusted parties have no access to the full scale version.
  • a downscaled version of the digital content possessed by the parties is distributed between the remaining parties (S2) 203.
  • the methods of downscaling may as an example, but is not limited to, include downscaling digital images by reducing the resolution of the video, downscaling video by reducing the sampling frequency of the digital content, downscaling audio by reducing sampling frequency and quantization level of audio samples, downscaling by taking a subset of the digital data and applying lossy compression, downscaling by taking a subset of the digital data and applying partial encryption, downscaling by taking a subset of the digital data and applying noise addition, downscaling by taking a subset of the digital data and applying reduction of the number of parameters, and Subset.
  • the downscaling depends very much on the specific embodiment at hand, e.g. each party may use a tool to downscale his content, various editing software programs as mentioned above may be implemented for this.
  • the trusted party performs the downscaling.
  • the version of the digital content may e.g. be a version having reduced resolution, or reduced sampling frequency, or reduced quantization level. If the digital content is a three-dimensional model the downscaled version is a 2D projection of the 3D model. This distribution may be done via the trusted party, i.e. via the trusted server or trusted client locally situation at the parties side.
  • the downscale version may be distribution between the un-trusted parties, because such a reduced resolution has a limited appeal for the parties.
  • the adaptations being made on the digital content are now registered (S3) 205 and associated to the party making the adaptations. Therefore, if party A makes some adaptations they will be uniquely assigned to party A. This may be done by registering all the adaptations to a log file, e.g. log where O 1 is the operations made by the parties on the digital content. Preferably, these log files are managed by the trusted party that collects all the adaptations made by the parties and puts them e.g. in a single log file L.
  • the adaptations are communicated between the parties (S4) 207. This may be done via the trusted party, if any, or via the un-trusted parties.
  • party A can either be a trusted or un-trusted party
  • party A may perform adaptation consisting of operation Ol and 02, i.e. the resulting log file will be Log ⁇ Ol,O2 ⁇ , where these operations are performed on the downscaled version possessed by party A.
  • party A sends the Log-file along with the downscale version of the adapted digital content to party B, which also makes some adaptations, e.g. 03 and 04, on the adapted content received by party A.
  • party A and B could also just as well communicate only their suggested adaptations to be done without sending adapted version of the digital content.
  • this communication may be managed by the trusted party, i.e. all the communications go through the trusted party, or directly via the un-trusted parties.
  • the adaptations are communicated between the parties (S5) 209 until the parties approve a final version of the adapted content.
  • party A and B exchange their adaptations between each other until they agree on them. In one embodiment, and as mentioned above, this is done in the absence of the adapted low scale version of the digital content so that the parties cannot see how the adapted content looks like.
  • a downscaled version of the adapted digital content is sent along with the adaptations performed by the parties, and in that way the parties can see how the adapted content looks like.
  • the digital content is an image of person
  • one editing operation performed by party A could be that the left arm should be red, and the right arm should be yellow.
  • the parties approve on the adaptations being made e.g. party A and B agree on the colors of the arms and the legs
  • the approved adaptations are sent to the trusted party (if party A and B were un-trusted parties) which then applied the editing operations on a full scale version of the digital content (S6) 211.
  • the adapted digital content is published (S7) 213. In one embodiment this is done on a full scale version of the digital content. However, this does not necessarily have to be done on a full scale version.
  • the final content that gets published could well be a 2D movie, which is a downgraded version of the 3D input content
  • the adapted digital content is not published until all the parties have agreed on the editing operations and since the editing operations are uniquely assigned to the parties making them they will not be published until the parties also agree on the co- authors of the content.
  • a situation could e.g. occur that one of the parties has a bad reputation, and the other parties do not want to have their name "signed" along with this name.
  • the "honest” party can therefore "back-out” and not participate in the adaptations, or co-creations, with this "dishonest” party.
  • Another example could be where the author's contribution includes the mixing of audio tracks, or composing a new video by mixing/merging several videos, creating an animation by manipulating 3D models etc. In these cases it is more likely an author will invest considerable time/resources in creating his contribution, thus considering it to be valuable.
  • the step of sending the full scale version of the digital content to the trusted party in step (S 1) is performed after the parties have agreed on the adaptations performed by means of establishing a secure channel with the trusted party and sending the full scale version via the secure channel. Therefore, the parties do not need to share their full scale versions of the digital content until at the final step where the parties have agreed on the adaptations being made, and also have agreed on the parties participating in the adaptations.
  • the step of approving the digital content for publication comprises signing a certificate stating that the parties approve the adaptations made on the digital content and that they acknowledge the parties having contributed to the adapted digital content.
  • Figs. 3 and 4 show one embodiment according to the present invention where all parties, here below referred to as authors, are register at a trusted Server (S) 301 that hosts a co-creation session. During this session multiple authors, Author 1 (A l) 302 and Author 2 (A_2) 303 contribute to a co-created work C ⁇ o ⁇ L by sending their downscaled contributions Ci L and C 2 L , editing operations Oi and O 2 , etcetera to the Server 301.
  • S trusted Server
  • This co-creation session is an iterative process, in which all authors jointly create a converging work C ⁇ o ⁇ L - Note that this session does not need to be synchronous, real-time, or limited in duration. Authors can contribute at any given time.
  • the authors When finalizing the co-created work, the authors decide to publish it. For this, the authors need to sign a certificate stating that 1) they agree with the co-created work C ⁇ o ⁇ L and 2) acknowledge that all registered authors of the co-creation session have contributed to the work.
  • the server creates a first certificate CERTi and sends it to e.g. the first author. The first author then signs it, returns it to the server, who sends it to the second author etc.
  • This results for example in a certificate CERTi ⁇ C ⁇ o ⁇ L , L, IDl, ID2, Pl, P2, $1, $2, $S ⁇ signed by the server and all authors.
  • the list of authors consists of the author identifiers IDi and their public keys Pi. Signatures are denoted as $i. It should however be noted that various certificates can be used, and that the above mentioned certificate is only an example.
  • each author establishes a secure channel with the server (S) 301, e.g. by means of public key cryptography with encryption key PS. Via these channels, all authors send their encrypted full-scale contributions EpS[C 1 11 ] to the server. This is depicted graphically in Fig. 4, showing a trusted Server that outputs the end result of a co-creation process, as approved by all authors involved.
  • the server checks the first certificate CERTi to see whether all authors' signatures $i are present. The server then constructs the full-scale co-created work C ⁇ o ⁇ H by applying all logged editing operations Oi , O 2 , etcetera from log L to the contributions C 1 11 .
  • the server does not allow any contribution C 1 11 , or the co-created work C ⁇ o ⁇ H , to leave the server.
  • the server returns the encrypted co-created work E[C ⁇ o ⁇ H ] to all authors A 1 .
  • the end result C ⁇ o ⁇ L may either be encrypted or not, where the former case is e.g. when the authors want to protect the end-result throughout any distribution that may occur afterwards.
  • Fig. 5 shows another embodiment according to the present invention.
  • a trusted server (S) 301 is required for hosting a secure co-creation session.
  • the authors 501, 502 can protect their contributions by using a trusted client locally.
  • a trusted client may be a piece of software (computer program) that is runs on the hardware of a device (e.g. a PC, notebook, CE appliance etc).
  • This software should be tamper-resistant, various examples of such software are known from the field of copy-protection, e.g. software clients for rendering content protected in a Digital Rights Management (DRM) system.
  • DRM Digital Rights Management
  • Fig. 6 depicts the next step, where all authors 501, 502 provide their encrypted full-scale contributions EpS[C 1 11 ] to one author's trusted client 505.
  • Fig. 7 shows graphically an embodiment according to the present invention where the digital content is a 3D model.
  • a trusted server 701 computes 2D projections from models in secure 3D environment. Projection requests by un-trusted parties 702 are in one embodiment filtered before processing. Corresponding 2D projections are returned to un- trusted client.
  • model may, but is no limited to, all valuable data serving as input to the co-creation process. This can comprise all kinds of static data such as geometric parameters, behavior parameters, text, audio, pictures and video, but also executable code.
  • Geometric parameters may include a point cloud, wire mesh (polygon model,
  • Behavioral parameters may include a mechanical model describing the behavior of the 3D object when interacting with a second object, or any description of how the model would react to/behave under certain stimuli. This may be described by an 1) algorithm, 2) rule set, 3) lookup table, 4) formula etc included by the 3D object's data structure. This also includes textural information (e.g. color), and material properties (refraction or absorption coefficients) and mechanical properties (elasticity etc).
  • textural information e.g. color
  • material properties refraction or absorption coefficients
  • mechanical properties elasticity etc.
  • a session is set up at the trusted server 701.
  • the server does not trust the party 702.
  • a 3D environment is available at the server 701. E.g. some models are placed in the environment, some in the background as scenery and some interacting models in the foreground.
  • the party can send queries (Req.) 704 to the server 701 (e.g. move model 3 in front of model 2).
  • a filter (F) 703 is applied to these queries, to prevent unauthorized use of the 3D models.
  • the server 701 then computes the desired 2D projection based on the query and the 3D models. Finally, the desired projection 705 is returned to the party 702.
  • party A has created model 1 and model 2
  • party B has created model 3.
  • Party A and B do not trust each other, and therefore do not want to give their models to each other.
  • a trusted server e.g. such as sever 701
  • they can share their models in a joint workspace.
  • 2D projections they do not have access to the 3D models.
  • the filter 703 is used to block undesired requests, e.g. probing of a model until the 3D model can be reconstructed from a series of 2D projections.
  • A's server responds to B's queries by giving 2D projections of A's models (and vice versa). When they have all the projections they need, A and B can finish the 2D animation.
  • a server computes 2D projections from models in 3D environment. Requests for projections are filtered 803 before processing. Corresponding 2D projections are returned to party 802. The party 802 creates 2D projection of own model and merges projection with received projection.
  • the 3D model is physically located on a hardware platform controlled by the owner of the model.
  • the valuable parts of the model are hidden from the un-trusted party using "obfuscation".
  • the model is embedded in a piece of software. All the valuable data structures and algorithms are protected against reverse-engineering by software obfuscation techniques, such as disclosed in www.dotfuscator.com and Sergei Gaissarian. "Prelininary report on optimizing compilers and code transformations", Technical report, Department of Compiler Technology, Institute or system programming, Russian Academy of Sciences, June 2000, Vladimir Zakharov. (2001).
  • the un-trusted party sends queries to the software.
  • the software decides if it wants to answer. If so, it computes the requested projection and outputs it.
  • the model may also be embedded in reconfigurable hardware, e.g. FPGA. Obfuscation techniques also exist for FPGA. Everything is the same as for a) except that a bit stream is sent instead of executable code, (a) and (b) can be combined.
  • the program running on un-trusted hardware can be thought of as an "agent" acting according to the wishes of its creator.
  • cryptography is used to protect parameters.
  • Valuable parameters are handed over to the un-trusted party only in encrypted form.
  • the un-trusted party operates on the parameters under encryption, i.e. without decrypting.
  • a plaintext time coordinate e.g. generate a bird's wing position/orientation from a known time and hidden behavior parameters
  • the un-trusted party sends the result of the computation back to the owner of the parameters, who then decrypts the projection.
  • An example of the protocol is shown in Fig. 9, where an encrypted object x is e.g. rotated and projected by B.
  • an encrypted object x is e.g. rotated and projected by B.
  • the agent allows the un-trusted co-creator to modify some parts of the agent, but not the critical parts. For instance, it may be allowed to change some colors but not shapes and motion patterns.
  • the agent behaves as a sort of DRM client, trusted by the content owner. It creates licenses on behalf of the content owner, e.g. a license that allows playback of the content that was (co-) generated by the agent.
  • Fig. 10 shows a system 1000 for managing adaptation of digital content 1114 by multiple parties that may possess at least a portion 1110-1113 of the digital content where the parties communicate via communication channels 1006-1009.
  • the system comprises a transmitter (T) 1115 for sending a full scale version of the digital content 1110-1113 possessed by the respective party to a trusted party 1001, and a processor (P) 1116a,b for distributing a downscaled version 1117-1120 of the digital content possessed by the parties to at least some of the remaining parties via the communication channels 1006- 1009.
  • This processor may either be located at the trusted party side 1001 or at the parties 1002-1005 sides.
  • a processor located at the parties side 1116b is further adapted to register and store the adaptations performed on the digital content and associating the adaptations to the party making them.
  • the processor 1116b then communicates the adaptations between the parties 1002-1005 via the communication channels 1006-1009. This is an iterative process and is done until the parties approve a final version of the adapted content.
  • the processor 1116b located at the trusted party side 1001 applies the approved adaptations to a full scale version of the digital content, and subsequently publishes the approved adapted digital content, which may be a full scale version 1114 of the approved adapted digital content.
  • the parties 1002-1005 may be communicating via different kinds of communication channels, e.g.
  • wired or wireless network such as the Internet, ad-hoc communication channel, local area network (LAN) such as the Ethernet, Wi-Fi and the like.
  • LAN local area network
  • the users can e.g. be communicating via such communication channels using devices such as PC or laptop computers, PDAs, mobile phones and any types of hand-held devices comprising transmitter and preferable a processor that is adapted to communicate in a wired or wireless way.
  • the trusted party 1001 shown here may be a trusted server or a trusted client locally situated at the party side 1002-1004.
  • Certain specific details of the disclosed embodiment are set forth for purposes of explanation rather than limitation, so as to provide a clear and thorough understanding of the present invention. However, it should be understood by those skilled in this art, that the present invention might be practiced in other embodiments that do not conform exactly to the details set forth herein, without departing significantly from the spirit and scope of this disclosure. Further, in this context, and for the purposes of brevity and clarity, detailed descriptions of well-known apparatuses, circuits and methodologies have been omitted so as to avoid unnecessary detail and possible confusion.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un procédé et un système de gestion d'adaptations d'un contenu numérique par de multiples intervenants communiquant par l'intermédiaire d'un canal de communication. Une version à échelle réduite du contenu numérique est distribuée à au moins certains des autres intervenants. Les adaptations apportées au contenu numérique sont enregistrées et associées à l'intervenant qui les apporte. Ces adaptations sont communiquées entre les intervenants les apportant jusqu'à ce que les intervenants approuvent une version finale du contenu adapté. Les adaptations sont appliquées à une version à pleine échelle du contenu numérique. Finalement, une version à pleine échelle du contenu numérique adapté et approuvé est publiée.
PCT/IB2008/053800 2007-09-21 2008-09-18 Procédé et système de gestion d'adaptations d'un contenu numérique WO2009037663A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP07116892.6 2007-09-21
EP07116892 2007-09-21

Publications (2)

Publication Number Publication Date
WO2009037663A2 true WO2009037663A2 (fr) 2009-03-26
WO2009037663A3 WO2009037663A3 (fr) 2009-10-15

Family

ID=40468537

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2008/053800 WO2009037663A2 (fr) 2007-09-21 2008-09-18 Procédé et système de gestion d'adaptations d'un contenu numérique

Country Status (1)

Country Link
WO (1) WO2009037663A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013033664A2 (fr) * 2011-09-01 2013-03-07 Websistant, L.L.C. Gestion de publication électronique sur serveur
WO2014015425A1 (fr) * 2012-07-26 2014-01-30 International Business Machines Corporation Analyse de contenu de source unique pour publication à plusieurs canaux

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5678040A (en) * 1993-10-29 1997-10-14 Motorola, Inc. Method for managing a hierarchical design transaction
AU1215000A (en) * 1998-10-27 2000-05-15 Receipt.Com, Inc. Mechanism for multiple party notarization of electronic transactions
US7188072B2 (en) * 2000-06-13 2007-03-06 Intergraph Software Technologies Company Systems and methods for the collaborative design, construction, and maintenance of fluid processing plants
GB0219909D0 (en) * 2002-08-28 2002-10-02 Koninkl Philips Electronics Nv Secure logging of transactions
CN1922863A (zh) * 2004-02-24 2007-02-28 皇家飞利浦电子股份有限公司 视频预告片

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHRISTIAN COLLBERG; CLARK THOMBORSON; DOUGLAS LOW: "A taxonomy of obfuscating transformations. Technical Report 148", July 1997
SERGEI GAISSARIAN: "Technical report, Department of Compiler Technology", June 2000, RUSSIAN ACADEMY OF SCIENCES, article "relininary report on optimizing compilers and code transfor»iations"
VLADIMIR ZAKHAROV: "Preliminary Analysis of the Security of Control Flow Code Transformations", 2001, RUSSIAN ACADEMY OF SCIENCE

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013033664A2 (fr) * 2011-09-01 2013-03-07 Websistant, L.L.C. Gestion de publication électronique sur serveur
WO2013033664A3 (fr) * 2011-09-01 2013-06-27 Websistant, L.L.C. Gestion de publication électronique sur serveur
US11720695B2 (en) 2011-09-01 2023-08-08 Websistant, L.L.C. Server-based electronic publication management
US12248589B2 (en) 2011-09-01 2025-03-11 Websistant, L.L.C. Server-based electronic publication management
WO2014015425A1 (fr) * 2012-07-26 2014-01-30 International Business Machines Corporation Analyse de contenu de source unique pour publication à plusieurs canaux
US9456229B2 (en) 2012-07-26 2016-09-27 International Business Machines Corporation Parsing single source content for multi-channel publishing

Also Published As

Publication number Publication date
WO2009037663A3 (fr) 2009-10-15

Similar Documents

Publication Publication Date Title
US11645369B2 (en) Blockchain digital rights management streaming library
US9032509B2 (en) Identity verification in virtual worlds using encoded data
US5982390A (en) Controlling personality manifestations by objects in a computer-assisted animation environment
US8782418B2 (en) Entertainment device
KR101574100B1 (ko) 디지털 콘텐츠 내 객체의 구매 또는 정보 요청을 가능하게 하는 방법 및 장치
US20100332827A1 (en) Creating and using secure communications channels for virtual universes
JP2004046833A (ja) デジタル著作権管理(drm)方式に関連したコンテンツのパブリッシング
US20110283362A1 (en) data storage device and method
TW202349301A (zh) 代表虛擬角色、物件和土地的動態非同質化代幣
US6678378B1 (en) 3-dimensional shape data encryption and decryption
Gutub Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation
CN110266687A (zh) 一种采用区块链技术的物联网安全代理数据共享模块设计方法
Frattolillo A buyer-friendly and mediated watermarking protocol for web context
EP4266232A1 (fr) Système cryptographique de gestion de biens numériques
Barua et al. A blockchain based decentralized video streaming platform with content protection system
KR101932956B1 (ko) 중앙 관리형 온라인 서비스에서 p2p 코드 교환 촉진
JP5203376B2 (ja) ライセンスに固有な認可領域
WO2009037663A2 (fr) Procédé et système de gestion d'adaptations d'un contenu numérique
JPWO2003067486A1 (ja) ウェブ・リンクにおけるコンテンツ管理システム
CN112954403B (zh) 视频加密方法、装置、设备及存储介质
KR20240147569A (ko) 컴퓨터-생성 콘텐츠의 공동 제작 및 편집을 위한 시스템 및 방법
Fan et al. A new usage control protocol for data protection of cloud environment
Frattolillo A digital rights management system based on cloud
Serrão et al. Approaching the rights management interoperability problem using intelligent brokerage mechanisms
US20240281805A1 (en) Trusted Service for Storage and Distribution of Personalized Assets for Use with 3rd Party Applications

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08807717

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载