USRE43599E1 - Data management system - Google Patents
Data management system Download PDFInfo
- Publication number
- USRE43599E1 USRE43599E1 US11/701,943 US70194307A USRE43599E US RE43599 E1 USRE43599 E1 US RE43599E1 US 70194307 A US70194307 A US 70194307A US RE43599 E USRE43599 E US RE43599E
- Authority
- US
- United States
- Prior art keywords
- data content
- key
- secret
- editing scenario
- editing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000013523 data management Methods 0.000 title description 3
- 238000000034 method Methods 0.000 claims description 62
- 230000004044 response Effects 0.000 claims description 7
- 238000000151 deposition Methods 0.000 claims 3
- 238000004519 manufacturing process Methods 0.000 claims 3
- 238000012546 transfer Methods 0.000 description 21
- 238000004891 communication Methods 0.000 description 19
- 238000007726 management method Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000005764 inhibitory process Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Definitions
- the present application is also a Reissue of U.S. Pat. No. 6,076,077. More than one reissue application have been filed for the reissue of U.S. Pat. No. 6,076,077.
- the reissue applications are application Ser. Nos. 10/170,677, 11/701,946, 11/701,943 (the present application), and 11/701,945.
- the present invention relates to a system for managing copyrights in dealing in copyrighted digital data content, i.e., dealing in original digital data content and edited digital data content.
- Use of a data content includes not only referring to its contents but also normally effectively using by storing, copying, or editing obtained data content by a user. Moreover, it is possible to transmit data content which is edited by a user to another person via on-line basis by a communication line or via off-line basis using a proper recording medium. Furthermore, it is possible to transmit the edited data content to the database to be registered as new data content. In such a case, the user who has edited the data content may also be an information provider.
- the inventor of the present invention proposed a system for managing a copyright by obtaining a permit key from a key control center via a public telephone line in Japanese Patent Laid-Open No. 46419/1994 (GB 2269302A) and Japanese Patent Laid-Open No. 141004/1994 (U.S. Pat. No. 5,504,933) and moreover, proposed an apparatus for managing the copyright in Japanese Patent Laid-Open No. 132916/1994 (GB 2272822A).
- the database copyright management system of the above application in order to manage the copyright, either one or more of a program for managing the copyright, copyright information, and a copyright control message are used in addition to a use permit key corresponding to a requested use, and data content which has been transferred with encryption is decrypted to be used for viewing and editing, and the data content is encrypted again when used for storing, copying and transferring.
- the copyright control message is displayed when utilization beyond the range of the user's request or authorized operation is found to give caution or warning to a user and the copyright management program performs monitoring and managing so that utilization beyond the range of the user's request or authorized operation is not performed.
- the above-mentioned system comprises a key management center that manages a crypt key and a copyright management center that manages the database copyright.
- a key management center that manages a crypt key and a copyright management center that manages the database copyright.
- all of the data content delivered from a database is encrypted by a first crypt key
- a first user who wishes to uses data content directly from the database requests the key management center the key corresponding to the specific usage by presenting information on the first user to the center.
- the key management center transfers the information on the first user to the copyright management center.
- the copyright management center transfers this information together with a copyright management program to the key control center.
- the key control center On receiving the copyright management program, transfers the first crypt key and a second crypt key K 2 corresponding to the specific usage together with the copyright management program to the first user via a communication network.
- the first user On receiving the first crypt key, the first user uses this key to decrypt the data content for usage.
- the user uses the second crypt key to encrypt and decrypt data content when subsequently storing, copying or transmitting the data content.
- the first and second crypt keys are abandoned. If the first user wishes to use the data content again, the first and second crypt keys are re-delivered to the user from the copyright management center. The re-delivery of the second crypt key indicates a confirmation that the data content has been copied or transferred to a second user, and this is recorded in the copyright management center.
- the second user In requesting a secondary usage to the copyright management center, the second user presents the information on the first user and information on the original copyright to the copyright management center.
- the copyright management center transmits to the second user a permit key corresponding to the specific usage, together with a second crypt key (viewing permit key), a third crypt key (a permit key corresponding to the specific usage), and the copyright management program which have been encrypted.
- LAN Local Area Network
- Internet is now organized in global scale, by which a plurality of networks are utilized as if they are a single network.
- the access control method based on encryption is disclosed in U.S. Pat. Nos. 4,736,422, 5,224,163, 5,400,403, 5,457,746, and 5,584,023, in EP 438154 and EP 506435, and in Japanese Patent Laid-Open 145923/1993.
- the access control method based on encryption and digital signature is described in U.S. Pat. Nos. 4,919,545 and 5,465,299.
- Intranet is now being propagated, in which a plurality of LANs are connected with each other via Internet and these LANs are utilized as if they are a single LAN.
- information exchange is performed via Internet, which basically provides no guarantee for prevention of piracy, and information is encrypted to prevent the piracy when secret information is exchanged.
- both data content and software are supplied by a server as an object, which comprises program and data.
- a system called object container in which operating system, application program and data content are provided by a server and data content processing and data content storage are performed by a user terminal unit, which is an ordinary computer
- a system called server object in which operating system, application program and data content are provided by a server, and data content processing is performed by a user terminal unit called network computer, while data content storage is carried out by a server.
- a system is further developed, in which data content processing is also performed by the server, and the user terminal unit is provided only with input/output function, and the whole system functions as a single computer.
- object oriented programming performing various processing by using “object” integrated with data content and program handling data content, instead of general form file consisting of data header and data body.
- a storing portion called as “slot” in an envelope called as “instance” accommodates data called as “instance variable”.
- the slot is surrounded by one or more of procedures called as “method” for referring, processing, binding and so on, and the instance variable can be referred to or operated only via “method”. This function is called as “encapsulation”. Instruction from outside for make the “method” refer to or operate the instance variable is called as “message”.
- license network As rental network system, is considered.
- an enterprise providing network base such as communication lines also provides the systems other than communication lines such as fee charging system, security system, copyright management system, certification system, etc.
- a service enterprise utilizes these services and carries out network business as if it is his own system.
- Secret-key system is also called “common key system” because the same key is used for encryption and decryption, and because it is necessary to keep the key in secret, it is also called “secret-key system”.
- Typical examples of encryption algorithm using secret-key are: DES (Data Encryption Standard) system of National Bureau of Standards, FEAL (Fast Encryption Algorithm) system of NTT, and MISTY system of Mitsubishi Electric Corp.
- the secret-key is referred as “Ks”.
- the public-key system is a cryptosystem using a public-key being made public and a private-key, which is maintained in secret to those other than the owner of the key.
- One key is used for encryption and the other key is used for decryption.
- Typical example is RSA public-key system.
- the public-key is referred as “Kb”, and the private-key is referred as “Kv”.
- the encryption technique is the means to exclude illegitimate use of data content, but perfect operation is not guaranteed. Thus, the possibility of illegitimate use of data content cannot be completely excluded.
- electronic watermark technique cannot exclude the possibility of illegitimate use, but if illegitimate use is detected, it is possible to check the illegitimate use by verifying the content of electronic watermark, and there are a number of methods in this technique. These methods are described in Nikkei Electronics, No.683, 1997-2-24, pp.99-124, “‘Digital watermark’ to help stop to use illegal proprietary digital works in the multimedia age”. Also, description is given on this technique by Walter Bender et al., “Introducing data-hiding technology to support digital watermark for protecting copyrights”, IBM System Journal, vol. 35, Nos. 3 & 4, International Business Machines Corporation.
- a data content is handled as an object, and the data content, functioning as an object, is edited in accordance with a edit program. Therefore, the edited data content can be expressed by the original data content and the editing scenario, which describes the edit detail based on an edit program.
- the original data content to be utilized there are, in addition to the one stored in the database, those prepared originally by the data editor.
- the data content prepared by the data editor can also be handled in the same manner as the other data by storing it in the database.
- the user decrypts the encrypted editing scenario by using a crypt key obtained from a key management center, and obtains the original data content from the database in accordance with the editing scenario and reconstitutes the edited data content.
- FIG. 1 is a block diagram of an embodiment of a data management system.
- FIG. 2 illustrates an example of producing new data content using a plurality of data contents as objects.
- FIG. 3 is a block diagram of another embodiment of a data management system.
- FIG. 4 is an outlined block diagram of an embodiment of a data content dealing system.
- FIG. 5 is an outlined block diagram of another embodiment of a data content dealing system.
- FIG. 6 is an outlined block diagram of yet another embodiment of a data content dealing system.
- FIG. 7 is an outlined block diagram of a system dealing in en editing scenario.
- the present invention is a copyright management system for digital data.
- numerous specific details are set forth to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention.
- the edit processing of data content is performed by editing the original copyrighted data using an edit tool, which is an application program.
- the edited data content obtained by editing can be expressed by the utilized original data content, the information of the used edit tool and the editing process data. Specifically, in case the edit tool is available, it is possible to reproduce the edited data content by obtaining the original copyrighted data and the editing process data.
- edited data content can be reproduced as the original data content, edit tool and editing process data content (editing scenario) are specified. In other words, unless the original data content, edit tool and the editing scenario are specified, it is impossible to reproduce the edited data content.
- edited data content ⁇ A′ ⁇ is obtained by altering original data content A
- edited data content ⁇ A+X ⁇ is obtained by adding data content X to the original data content A by a user
- edited data content ⁇ A′′ ⁇ is obtained by dividing the original data content A into original data content elements A 1 , A 2 , A 3 . . . and changing the arrangement of the elements to such as A 3 , A 2 and A 1
- ⁇ is obtained by dividing the original data content A into original data content elements A 1 , A 2 , A 3 , . . . , also dividing the data content X of the user into X 1 , X 2 , X 3 , . . . and arranging these elements.
- edited data content ⁇ A+B+C . . . ⁇ is obtained by simply combining original data contents A, B, C, . . . ; a case in which edited data content such as ⁇ A+X ⁇ is obtained by adding data content X to the original data content A, B, C, . . . ; a case in which edited data content ⁇ A 1 +B 1 +C 1 + . . . +A 2 +B 2 +C 2 + . . . +A 3 +B 3 +C 3 + . . . ⁇ is obtained by dividing the original data content A, B, C, . . .
- combination of a plurality of original data contents, combination of a plurality of original data contents with user data content, division of a plurality of original data contents and change of the arrangements, and combination of divided plurality of original data contents with the user data content arise respectively a secondary copyright, which is necessary to be protected.
- the original copyright of the user of course, exists in the data content X 1 , X 2 , X 3 , . . . added by the user.
- Embodiment 1 The description of Embodiment 1 is given below referring to the drawing.
- FIG. 1 shows a schematic view of a data copyrights management system in which a user edits one original copyrighted data and transfers it to a next user.
- reference numerals 1 , 2 , and 3 represent databases that store text data or binary, audio, and/or picture data constituting computer graphics screens or programs, which is not encrypted; 9 is a communication line such as a public telephone line provided by a communication company or a CATV line provided by a cable television company; 10 is a recording medium such as a flexible disk; 4 is a primary user terminal; 5 is a secondary user terminal; 6 is a tertiary user terminal; and 7 is an n-th user terminal device.
- Reference numeral 8 represents a copyright management center for managing the data copyright.
- the databases 1 , 2 , and 3 , copyright management center 8 , primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 , and n-th user terminal 7 are connected to communication line 9 .
- encrypted data content is transmitted via the path shown by a broken line
- requests are transmitted from user terminal 4 , 5 , 6 , or 7 to database 1 , 2 , or 3 and copyright management center 8 via the path shown by a solid line.
- the permit key, copyright management program, and crypt key corresponding to a specific usage are transmitted from database 1 , 2 , or 3 and copyright management center 8 to user terminal 4 , 5 , 6 , or 7 via the path shown by an one-dot chain line.
- the Embodiment 1 employs a first public-key Kb 1 , a first private-key Kv 1 corresponding to the first public-key Kb 1 , a second public-key Kb 2 , and a second private-key Kv 2 corresponding to the second public-key Kb 2 that are prepared by a first user, and a first secret-key Ks 1 and a second secret-key Ks 2 prepared by the database.
- the database then transmits these encrypted data content Cmks 1 and the first and the second secret-keys Cks 1 kb 1 and Ck 2 kb 2 to the first user.
- the data content does not involve the copyright of first user because no modifications have been made to the data content. If, however, first user produces new data content based on the data content obtained or using a means for combining the original data content with other data content, the new data content involves a secondary exploitation right for first user, and first user has the original copyright for this secondary work.
- second user produces new data content based on the data content obtained from first user or combining with other data content
- the new data content involves a secondary exploitation right for the second user, and the second user has the original copyright of this secondary work.
- Databases 1 , 2 , and 3 store text data content or binary, digital audio, or digital picture data content constituting computer graphics screens or programs in unencrypted form. This data content is encrypted and supplied to the user terminal 4 via communication line 8 during a data content read operation in response to a request from first user terminal 4 .
- first user extracts parts M 4 , M 5 and M 6 constituting data content from a plurality of data contents M 1 , M 2 and M 3 obtained from one or more databases, and produces new data content M 7 from these parts M 4 , M 5 and M 6 .
- New data content M 7 involves a secondary copyright associated with the editing of original data content M 1 , M 2 and M 3 as well as the original copyright for original data content M 1 , M 2 and M 3 from which parts M 4 , M 5 and M 6 produce new data content M 7 .
- the original data content M 1 , M 2 and M 3 are encrypted using each of the second secret-keys Ks 21 , Ks 22 , Ks 23 supplied with each of data content M 1 , M 2 and M 3 when used for operations other than display; i.e., store, edit, copy or transmit:
- Cm 1 ks 21 E(M 1 ,Ks 21 )
- Cm 2 ks 22 E(M 2 ,Ks 22 )
- Cm 3 ks 23 E(M 3 ,Ks 23 ).
- the data content parts M 4 , M 5 and M 6 , of original data content are also encrypted using each of the second secret-keys Ks 21 , Ks 22 , Ks 23 supplied with each of the original data content when used for operations other than display:
- Cm 4 ks 21 E(M 4 ,Ks 21 )
- Cm 5 ks 22 E(M 5 ,Ks 22 )
- Cm 6 ks 23 E(M 6 ,Ks 23 ).
- second user Upon receipt of the encrypted original data content parts Cm 4 ks 21 , Cm 5 ks 22 and Cm 6 ks 23 , and the edit program Pe, second user requests second secret-keys Ks 21 , Ks 22 , Ks 23 for decryption of the encrypted original data content parts Cm 4 ks 21 , Cm 5 ks 22 and Cm 6 ks 23 by presenting the edit program Pe with the digital signature, to the copyright management center 8 .
- the digital signature Spe presented to the copyright management center is registered in the center as a valid procedure for authorizing the first user being a secondary copyright owner.
- agent-oriented software a user can synthesize data content with little labor.
- the agent-oriented software unlike the conventional one, is a program having autonomy, flexibility and cooperativeness, which is able to meet a user's request with its characteristics of autonomy, flexibility and cooperativeness in accordance with only a general instruction of the user without specifically giving every operation instruction to the software.
- agent program By incorporating the agent program into a basic system of a data copyright management system so that the database utilization of a user is monitored, and it is arranged that information including data utilization condition and charging is collected at the database or the copyright management center, using metering function placed in user terminal, and thus, it is possible to know the database utilization condition of the user at the database side or the copyright management center side and achieve more accurate copyright management.
- agent program and its data are also necessary to be protected in copyrights, and therefore, are encrypted like original data content.
- the data on copyrights can be handled in the computer programming or processing as “object” integrated of program and data content.
- Embodiment 2 is described referring to FIG. 3 .
- This embodiment uses first secret-key Ks 1 , second secret-key Ks 2 , third secret-key Ks 3 , plaintext original copyright label Lc 0 and plaintext copyright management program Pc.
- the data copyright management system shown in FIG. 3 comprises database 11 , key control center 12 , users 13 , 13 , 13 . . . and the network 14 that connects these entities.
- Database 11 receives data content from information providers(IP) 15 , 15 , 15 . . . . However, in some cases, data content is supplied directly to users 13 from information providers 16 , 16 , 16 . . . via communication line 14 without database 11 intervening.
- the data content used in the invention is the object comprising combined program and data content.
- Data is supplied from information providers 15 , 15 , 15 . . . to database 11 and to primary users 13 .
- data content is supplied from information providers 16 , 16 , 16 . . . via communication line 14 or via information record medium 17 such as CD-ROM or the like directly to primary users 13 without database 11 intervening.
- the solid line, broken line and one-dot chain line in this FIG. 3 show the path for data content and requests for crypt keys, path of encrypted data content and path of crypt keys, respectively.
- Primary users 13 are not merely users but can be information providers 15 or 16 that provide new data content (secondary copyrighted data) by combining or revising a plurality of obtained original data content.
- the original data content provided by each of information providers 15 and 16 has been encrypted to protect the copyright. Therefore, the use of the encrypted original data content obtained by first user 13 needs to be decrypted. All of the crypt keys for the decryption are deposited in key control center 12 to be controlled by the center.
- Each information provider 15 or 16 can adopt freely any cryptosystem. However, the cryptosystem described later and used after secondary utilization of data content is limited to one adopted by key control center 12 .
- Original plaintext copyright label Lc 0 is attached to encrypted original data content Cm 0 ks 1 provided for primary users 13 , and is used for obtaining primary use permit keys, etc.
- encrypted original data content Cm 0 ks 1 includes plaintext original copyright label Lc 0 and encrypted original data content Cm 0 ks 1 .
- the name of application programs in use, outlined explanation, fees and charging method are entered into plaintext original copyright label Lc 0 in addition to general information including the name of original creator, title name and creation date. The number of a crypt key is also entered if necessary. Digital signature by original creator added to plaintext original copyright label Lc 0 prevents false copyright claiming.
- Primary users 13 who require use of encrypted original data content Cm 0 ks 1 make a request to key control center 12 via communication line 14 for distributing primary use permit keys K 1 indicating original copyright label Lc 0 .
- Key control center 12 that has identified secret-key as first secret-key Ks 1 to be distributed, by original copyright label Lc 0 indicated, distributes this identified first secret-key Ks 1 to primary users 13 via network system 14 .
- the devices of primary users 13 Upon receipt of distributed primary use permit key K 1 , the devices of primary users 13 are turned to the copyright management mode, and the primary copyrighted data content becomes available for use to primary users 13 .
- key control center 12 charges as well as grasps the use condition of original data content and of the database used by primary users 13 .
- Primary users 13 who require to edit original copyrighted data content M 0 make a request to key control center 12 for distributing second secret-key Ks 2 via communication line 14 .
- Key control center 12 that receives the request for distributing second secret-key Ks 2 provides primary users 13 via communication line 14 .
- Primary users 13 that have received second secret-key Ks 2 edit original data content M 0 and obtain halfway edited data content M 0 ′.
- primary users 13 prepare third secret-key Ks 3 in order to execute the secondary copyright with reference to the data content edition concerning final editorial data content M 1 , and register third secret-key Ks 3 into key control center 12 .
- the key control center 12 also may prepare third secret-key Ks 3 and distribute it in response to a request from primary users 13 .
- Secondary users 19 who desire to use provided encrypted editorial data content Cm 1 ks 3 request key control center 12 for distributing third secret-key Ks 3 via communication line 14 .
- Key control center 12 that has received the request for distributing third secret-keys Ks 3 from secondary users 19 distributes third secret-key Ks 3 to secondary users 19 via communication line 14 .
- Embodiment 3 in which a user edits one original copyrighted data content and transfers it to a next user, is described as below referring to FIG. 4 .
- This embodiment uses “user label”, “copyright label” and “edit label” in order to protect data content copyrights and execute the copyrights.
- Information of the label owner is described in the user label; information relating copyrighted data content is described in the copyright label; and contains information of the edit tool and editing process data (editing scenario) are described in the edit label, which may be described edit tool (edit program) instead of edit tool information.
- the user label is generated by the data management center according to the information of the user when the user joins the system.
- the copyright label is generated by the data management center when the author of the data content presents the content to the data management center.
- the edit label is generated by the data management center, when the user who has edited the data content presents the user label and the editing scenario to the data management center. These are transferred to each label owner and are stored at the data management center.
- the original author A stores the original secret-key Ks 0 and encrypts the original data content M 0 without depending on the data management center, while the original secret-key Ks 0 must be stored at the data management center to utilize the original data content M 0 by the user (data content user).
- the data management center performs one-way hash to the original copyright label Lc 0 using algorithm such as MD 5, for example, to 16-byte data content amount, prepares an original copyright label fingerprint F 0 , and sends it to the original author A.
- This electronic fingerprint is prepared on each of the original data content and edited data content each time the original data content is edited and edited data content is obtained and is transferred, together with the data content.
- the edited data content Me 1 thus obtained contains copyright of the first user, who edited the data content, and also copyright of the original author who prepared the original data content.
- the copyright of the original author relating to the original data content M 0 can be protected by the original copyright label Lc 0 which has been registered, original copyright label fingerprint F 0 and the original secret-key Ks 0 corresponding to the original copyright label Lc 0 and also by the first user label Lu 1 and the first secret-key Ks 1 corresponding to the first user label Lu 1 .
- the secondary copyright of the first user relating to the edited data content Me 1 is not yet protected.
- the edited data content can be expressed by data content of the utilized original data content, information of the used edit tool and the editing scenario (editing process data content). Accordingly, these informations and editing scenario are entered in the first user label, i.e. the first edit label Le 1 .
- the user U 1 presents the first edit label Le 1 to the data management center so that the secondary exploitation right of the user U 1 is registered.
- Each user may put digital signature which one-way hash value of the user's label is encrypted using user's private-key on the user's label to be presented to the data management center. Then, the data management center decrypts the encrypted one-way hash value using the user's public-key, calculates the one-way hash value of the label and compares the two one-way hash values in order to verify validity of each user's label.
- the data content is encrypted using secret-key
- the secret-key for its decryption and secret-key for re-encryption used for storage, copying and transfer are distributed by the data management center based on the user label presented by the user.
- This network computer does not have data content storage unit and cannot store or copy the data content.
- the editing of data content is performed by modifying the original data content using the edit tool, and data content of the edited data content thus obtained can be expressed by the utilized original data content, information of the used edit tool and the editing scenario.
- the edited data content can be reproduced by specifying the utilized database, the used original data content, information of the used edit tool and the editing scenario. The same applies to the case where a plurality of data content obtained from a single database or a plurality of databases are utilized.
- the original copyright owner and the information provider holding the data content are discriminated from the user who does not hold data content, and are arranged on the network side with the data management center and the like.
- public-key and private-key are used. If original data content is transferred to a user, the original data content is encrypted by using a secret-key or a public-key of transferred destination for the purpose of security.
- the first user U 1 searches the data content and collects necessary data content utilizing the network, broadcasting or recording medium.
- the collected data content is simply stored temporarily on memory of the user U 1 . Even when data content storage unit such as a hard disk drive is included in the device of the user U 1 , the data content is not stored in the data content storage unit.
- inhibition of storage of the data content is performed by destroying the data content on memory, changing data content header on memory, turning the data content to one-way hash value, changing file name to non-storable file name, etc.
- the first user label Lu 1 is referred, and utilizing conditions of the original data content M 0 i and the edit tool Pe are recorded at the data management center and are utilized for charging of a fee.
- the computer of the first user U 1 When the computer of the first user U 1 is provided with a data content storage unit, there is possibility that the collected data content or the edited data content may be stored in the storage unit, however, storage inhibition as described above is carried out to exclude storage, copying and transfer.
- the data management center encrypts the first edited data content M 1 i and the edit tool Pe using the public-key Kb 2 of the second user U 2 :
- Cm 1 ikb 2 E(M 1 i,Kb 2 )
- Cpekb 2 E(Pe,Kb 2 ) and transfers the encrypted first edited data content Cm 1 ikb 2 and the encrypted edit tool Cpekb 2 to the second user U 2 .
- the data content is not stored by the user, but it is stored only in the database.
- the user controls and stores only the information relating to user and editing, i.e. the edit label having information of the utilized original data content and the used edit tool, the editing scenario and the information of the user who has edited. Only this edit label is encrypted and transferred between the users. Therefore, the data content is not stored, copied or transferred.
- the original data content handled in this system is an object, and the edited data content is expressed as the original data content object linked by an editing scenario. Therefore, only the editing scenario is dealt in.
- the user collects and links the original data content used in accordance with the editing scenario and reproduces the edited data content.
- the original data content may be collected or linked by the user himself, but the burden on the user may be reduced if it is performed in the system side or by using an agent program.
- a data content dealing center which serves as a core of the system, comprises a data content database, an editing scenario database, a key management center, and a data content dealing management center present on a network.
- the data content database stores the original data content provided by an information provider (IP) and supplies it in response to the request of the user.
- IP information provider
- the editing scenario database stores the editing scenario when the user obtained the edited data content by utilizing the original data content or user data content created by the user and supplies it in response to the request of the user.
- the key management center stores a secret key for encryption/decryption for the original data content, the user data content and the editing scenario and supplies it in response to the request of the user.
- a data content dealing management center prepares a catalog and advertises for the original data content or the edited data content and performs sales management and collecting a fee to the user, and also manages a copyright label of the data content to be stored in the data content database.
- An editing scenario dealing management center prepares a catalog and advertises for the edited data content and performs sales management and collecting a fee to the user, and further, when necessary, collects and links the original data content according to the editing scenario and manages a label for the editing scenario to be stored in the editing scenario database
- the original secret-key Ks 0 i may be prepared by the information provider IPi, or the information provider IPi may ask the key management center to generate it.
- the key management center generates the original secret-key Ks 0 i
- the information provider or the data content dealing center may add watermark to the original data content M 0 i to check illegitimate use and may store it.
- the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the original data content cannot be utilized as it is and posts it in the data content dealing center.
- the user's data content may be added. Therefore, as the data content to be used for edit in this embodiment, there are, in addition to a single data content, a plurality of original data contents, and user's data content.
- the edited data content comprises these data content and editing scenario, i.e. the details of editing. By obtaining these, it is possible to reproduce the edited data content.
- the original data content is originally stored in the data content database of the data content dealing center. Accordingly, data which is not yet stored in the data content dealing center when newly generated by editing of the data content, is the user's data content and the editing scenario.
- the original data content M 0 i is stored in the data content database of the data content dealing center. Accordingly, what is to be stored newly in the data content dealing center for executing secondary copyright of the first user includes the first editing scenario S 1 i and the first user data content Mu 1 i.
- the first user or the data content dealing center may add watermark to the original data content M 0 i to check illegitimate use and may store it.
- the database where the first secret-key Ks 1 i, the first editing scenario S 1 i and the first user data content Mu 1 i are to be stored may be the data content database where the original data content M 0 i is stored, or another scenario database may be provided to store them.
- the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the first edited data content cannot be utilized as it is and posts it in the data content dealing center.
- the encrypted original data content Cm 0 iks 0 i (shown as “m 0 i” in the figure), the encrypted first editing scenario Cs 1 iks 1 i (shown as “s 1 i” in the figure), the encrypted first user data content Cmu 1 iks 1 i (shown as “mu 1 i” in the figure), the encrypted original secret-key Cks 0 ikb 2 i and the encrypted first secret-key Cks 1 ikb 2 i are transferred to the second user U 2 i. And then, the data content dealing center charges for utilization of the original data content M 0 i and the first editing scenario S 1 i to the second user U 2 i.
- the original data content handled in the present system is an object, and the edited data content is expressed as the original data content object linked by the editing scenario. Therefore, only the editing scenario is dealt in.
- the editing scenario has been purchased or lent, the user collects and links the original data content used in accordance with the editing scenario and reproduces the edited data content.
- the original data content may be collected by the user himself, but the burden on the user may be reduced if it is performed in the system side or by using an agent program.
- a data content dealing center which serves as a core of the system, comprises a key management center, a data content database, a data content dealing management center, an editing scenario database, and an editing scenario market management center present on the network.
- the data content database stores the original data content provided by an information provider (IP) and supplies it to a data content editor.
- IP information provider
- the editing scenario database stores the editing scenario when the data content editor obtains the edited data content by utilizing the original data content or the editor's data content created by the data content editor and supplies it to the editing scenario sellers, who participate in auction.
- the key management center stores a secret-key for encryption/decryption for the original data content, the editor's data content and the editing scenario and supplies it to the data content editor or the editing scenario seller.
- the data content dealing management center prepares a catalog and advertises for the original data content and manages sales for the data content editor.
- the editing scenario market management center prepares a catalog and advertises for the edited data content, and manages editing scenario auction and collects a fee. Further, the editing scenario market management center collects and links the original data content according to the editing scenario, when necessary, and also manages a Ibe 1 for the editing scenario which is to be stored in the editing scenario database.
- the original secret-key Ks 0 i may be prepared by the information provider IPi, or the information provider IPi may ask the key management center to generate it.
- the key management, center generates the original secret-key Ks 0 i
- the information provider or the data content dealing center may add watermark to the original data content M 0 i to check illegitimate use and may store it.
- the data content dealing management center prepares a catalog by means to compress or to divide into parts so that the original data content cannot be utilized as it is and posts it in the data content dealing center.
- the data content of the data content editor may be added. Therefore, as the data content to be used for editing in this embodiment, there are, in addition to a single data content, a plurality of original data contents and the data content of the data content editor.
- the edited data content comprises the data content and the editing scenario, i.e. the detail of editing. By obtaining these, it is possible to reproduce the edited data content.
- the original data content is originally stored in the data content database of the data content dealing center. Accordingly, data which is not yet stored in the data content dealing center when newly generated by editing the data content, is the editor's data content of the data content editor and the editing scenario.
- the data content dealing center it is possible to handle the editor's data content of the data content editor who has edited the data content in the same manner as the original data content, and the data content editor can be an information provider. Further, it is also possible to sell utilization right of the editing scenario and/or the editor's data content by auction in the market. In this case, the utilization right of the editing scenario and the editor's data content may be plural for a single edited data content.
- the original data content M 0 i is stored in the data content database of the data content dealing center. Accordingly, what is to be stored newly in the data content dealing center is the editing scenario S 1 i and the editor's data content Medi.
- the encrypted editing scenario Cseiksei (shown as “sei” in the figure), the encrypted editor's data content Cmeiksei (shown as “mei” in the figure), and the encrypted secret-key Ckseikbc (shown as “ksei” in the figure) are transferred to the data content dealing center.
- the secret-key Ksei may be prepared by the data content editor Ei, or the data content editor Ei may ask the key management center to generate it.
- the key management center generates the secret-key Ksei
- the data content editor or the data content dealing center may add watermark to the editing scenario Sei and the editor's data content Medi to check illegitimate use and may store them.
- the database where the secret-key Ksei, the editing scenario Sei and the editor's data content Medi are to be stored may be the data content database where the original data content M 0 i is stored, or another scenario database may be provided to store them.
- the editing scenario market management center in the data content dealing center prepares a catalog by means to compress or to divide into parts so that the edited data content cannot be utilized as it is and posts it shown number of the selling utilization rights in the editing scenario market management center to announce the auction.
- the utilization right of the editing scenario and the editor's data content may be plural for a single edited data content.
- the content of the copyright label is changed from the one based on the data content editor label Lei to the one based on the editing scenario seller label Ldi.
- the secret-key Ksei of the data content editor cannot be used any more, and the secret-key Ksdi of the editing scenario seller can be used substantially.
- it instead of changing the content of the copyright label, it may be newly added based on the editing scenario seller label Ldi.
- the editing scenario seller who purchases the encrypted editing scenario Cseiksdi executes thereafter the utilization right of the purchased editing scenario.
- the original data content can also be sold by auction in the same manner as the editing scenario. However, it is preferable to avoid to sell to a specific seller because there may be a plurality of users utilizing the original data content.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Description
Cmks=E(M,Ks).
The operation to decrypt the cryptogram Cmks to the plain text data content M using a crypt key Ks is expressed as:
M=D(Cmks,Ks).
Cmkb=E(M,Kb).
The operation to decrypt the cryptogram Cmkb to the plain text data content M using a private-key Kv is expressed as:
M=D(Cmkv,Kv).
The operation to encrypt the plain text data content M to a cryptogram Cmkv using a private-key Kv is expressed as:
Cmkv=E(M,Kv),
and the operation to decrypt the cryptogram Cmkv to the plain text data content M using the public-key Kb is expressed as:
M=D(Cmkb,Kb).
Cmks1=E(M,Ks1)
and further encrypts the first secret-key Ks1 by the first public-key Kb1:
Cks1kb1=E(Ks1,Kb1)
and the second secret-key Ks2 by the second public-key Kb2:
Cks1kb2=E(Ks2,Kb2).
The database then transmits these encrypted data content Cmks1 and the first and the second secret-keys Cks1kb1 and Ck2kb2 to the first user.
Ks1=D(Kv1,Cks1kb1),
and decrypts the encrypted data content Cmks1 by the decrypted first secret-key Ks1:
M=D(Ks1,Cmks1)
and use it. The user decrypts encrypted second secret-key Cks2kb2 by the second private-key Kv2:
Ks2=D(Kv2,Cks2kb2),
which is subsequently used as a key for encrypting/decrypting of storing, copying, or transmitting data content.
Cm1ks21=E(M1,Ks21)
Cm2ks22=E(M2,Ks22)
Cm3ks23=E(M3,Ks23).
The data content parts M4, M5 and M6, of original data content are also encrypted using each of the second secret-keys Ks21, Ks22, Ks23 supplied with each of the original data content when used for operations other than display:
Cm4ks21=E(M4,Ks21)
Cm5ks22=E(M5,Ks22)
Cm6ks23=E(M6,Ks23).
Spe=D(Pe,Kv1)
and supplies encrypted original data content parts Cm4ks21, Cm5ks22 and Cm6ks23 to second user together with the edit program Pe with the digital signature, via
Pe=E(Spe,Kb1),
and determines if first user is a valid user to use the original data content to which the second secret-keys Ks21, Ks22, Ks23 correspond. If first user is the valid user, the center transmits the second secret-keys Ks21, Ks22, Ks23 to second user. Otherwise, it does not transmit the second secret-keys Ks21, Ks22, Ks23 to second user.
Cm0ks1=E(M0,Ks1),
and is provided to
M0=D(Cm0ks1,Ks1),
and use it.
Cm0ks1=E(M0,Ks1)
and re-encrypted original data content Cm0ks1 is stored.
Cm0′ks2=E(M0′,Ks2).
Cm1ks3=E(Ks3,M1),
and provide it for
M1=D(Ks3,Cm1ks3)
and use it.
- (1) The original author A presents the original copyright label Lc0 and requests the data management center to distribute original secret-key Ks0. The original author may transfer or deposit the original data content to an information provider or to database so that the information provider or the database can play a role of the original author.
- (2) When requested to distribute the original secret-key Ks0, the data management center encrypts the original secret-key Ks0 corresponding to the original copyright label Lc0 using public-key Kb0 of the original author A:
Cks0kb0=E(Ks0,Kb0)
and sends the encrypted original secret-key Cks0kba together with the original copyright label Lc0 to the original author A.
- (3) When the encrypted original secret-key Cks0kb0 is distributed, the original author A decrypts the encrypted original secret-key Cks0kb0 using private-key Kv0 of the original author A:
Ks0=D(Cks0kb0,Kv0),
encrypts the original data content M0 using the decrypted original secret-key Ks0:
Cm0ks0=E(M0,Ks0)
and transfers the encrypted original data content Cm0ks0, the original copyright label Lc0 and the original copyright label fingerprint F0 to the first user U1. - (4) When the encrypted original data content Cm0ks0, the original copyright label Lc0 and the original copyright label fingerprint F0 are transferred, the first user U1 presents the original copyright label Lc0, the original copyright label fingerprint F0 and first user label Lu1 and requests the data management center to distribute the original secret-key Ks0.
- (5) When requested to distribute the original secret-key ks0, the data management center confirms validity of the presented original copyright label Lc0 using the original copyright label fingerprint F0 and registers the first user label Lu1. At the same time, the original secret-key Ks0 corresponding to the original copyright label Lc0 is encrypted using public-key Kb1 of the first user U1:
Cks0kb1=E(Ks0,Kb1)
and the encrypted original secret-key Cks0kb1 is distributed to the first user U1. - (6) When the encrypted original secret-key Cks0kb1 is distributed, the first user U1 decrypts the encrypted original secret-key Cks0kb1 using private-key Kv1 of the first user U1:
Ks0=D(Cks0kb1,Kv1),
decrypts the encrypted original data content Cm0ks0 using the decrypted original secret-key Ks0:
M0=D(Cm0ks0,Ks0),
and edits the decrypted original data content M0 using the edit tool and obtains edited data content Me1.
- (7) To protect the secondary copyright of the first user relating to the edited data content Me1, label of the first user, who is the author of the edited data content, and its electronic fingerprinting are used in this embodiment.
- (8) When the first edit label Le1 is presented, the data management center confirms validity of the presented original copyright label Lc0 using the original copyright label fingerprint F0 and registers the first edit label Le1. At the same time, the electronic fingerprint F1 of the first edit label Le1 is prepared, and first edit secret-key Kse1 corresponding to the first edit label Le1 is encrypted by public-key Kb1 of the first user U1 at the data management center:
Ckse1kb1=E(Kse1,Kb1),
and the encrypted first edit secret-key Ckse1kb1 is distributed to the first user U1 together with the electronic fingerprint Fe1 of the first edit label Le1. - (9) When the encrypted first edit secret-key Ckse1kb1 and the electronic fingerprint Fe1 of the first edit label Le1 are distributed, the first user U1 decrypts the encrypted first edit secret-key Ckse1kb1 using private-key Kv1 of the first user U1:
Kse1=D(Ckse1kb1,Kv1),
encrypts the first edited data content Me1 using the decrypted first edit secret-key Kse1:
Cme1kse1=E(Me1,Kse1)
and transfers the encrypted first edited data content Cme1kse1 to the second user U2 together with the first edit label Le1, and the electronic fingerprint Fe1 of the first edit label Le1.
- (1)(2) The first user U1 presents the first user label Lu1 to the data management center, collects the original data content M0i (i=1, 2, 3, . . . ) from data content library of the information provider IP in the system and obtains a edit tool Pe. In this case, the original data content M0i and the edit tool Pe are encrypted using public-key Kb1 of the first user U1:
Cm0ikb1=E(M0i,Kb1)
Cpekb1=E(Pe,Kb1)
and the encrypted original data content Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed to the first user U1.
- (3) When the encrypted original data content Cm0ikb1 and the encrypted edit tool Cpekb1 are distributed, the first user U1 decrypts the distributed encrypted original data content Cm0ikb1 and the encrypted edit tool Cpekb1 using private-key Kv1 of the first user U1:
M0i=D(Cm0ikb1,Kv1)
Pe=D(Cpekb1,Kv1).
Using the decrypted edit tool Pe, the decrypted original data content M0i is edited, and a first edited data content M1i (i=1, 2, 3, . . . ) is obtained. - (4) Obtaining the first edited data content M1i, the first user U1 encrypts a first scenario S1i, which is the editing process data content for the first edited data content M1i, using public-key Kbc of the data management center:
Cs1ikbc=E(S1i,Kbc)
and presents the encrypted first scenario Cs1ikbc together with the first user label Lu1 to the data management center, so that secondary copyright of the user U1 is registered. - (5) When the encrypted first scenario Cs1ikbc is presented, the data management center decrypts the encrypted first scenario Cs1ikbc using private-key Kvc of the data management center:
S1i=D(Cs1ikbc,Kvc),
prepares a first edit label Le1 based on the presented user label of the first user U1 and the decrypted first scenario S1i, stores it in the data management center, encrypts the first edit label Le1 using public-key Kb1 of the first user U1:
Cle1kb1=E(Lei,Kb1),
and transfers the encrypted first edit label Cle1kb1 to the first user U1. - (6) When the encrypted first edit label Cle1kb1 is transferred, the first user U1 decrypts the encrypted first edit label Cle1kb1 using private-key Kv1 of the first user U1:
Le1=D(Cle1kb1,Kv1),
encrypts the decrypted first edit label Le1 using public-key Kb2 of the second user U2:
Cle1kb2=E(Le1,Kb2)
and transfers the encrypted first edit label Cle1kb2 to the second user U2, but the first edited data content M1i or the encrypted first edited data content is not transferred to the second user U2.
- (7) When the encrypted first edit label Cle1kb2 is transferred, the second user U2 decrypts the transferred encrypted first edit label Cle1kb2 using the private-key Kv2 of the second user U2:
Le1=D(Cle1kb2,Kv2),
encrypts the first edit label Le1 using the private-Key Kv2 of the second user U2:
Cle1kv2=E(Le1,Kv2)
and presents the encrypted first edit label Cle1kv2 together with the second user label Lu2 to the data management center. - (8) When the encrypted first edit label Cle1kv2 and the second user label Lu2 are presented, the data management center decrypts the presented encrypted first edit label Cle1kv2 using public-key Kb2 of the second user U2:
Le1=D(Cle1kv2,Kb2),
collects the original data content M0i shown on the decrypted first edit label Le1, edits the original data content M0i using the edit tool Pe based on the first scenario S1i described on the first edit label Le1, and reproduces the first edited data content M1i.
Cm1ikb2=E(M1i,Kb2)
Cpekb2=E(Pe,Kb2)
and transfers the encrypted first edited data content Cm1ikb2 and the encrypted edit tool Cpekb2 to the second user U2.
- (9) When the encrypted first edited data content Cm1ikb2 and the encrypted edit tool Cpekb2 are distributed, the second user U2 decrypts the distributed encrypted first edited data content Cm1ikb2 and the encrypted edit tool Cpekb2 using private-key Kv2 of the second user U2:
M1i=D(Cm1ikb2,Kv2)
Pe=D(Cpekb2,Kv2)
and edits the decrypted first edited data content M1i using the decrypted edit tool Pe, and the second edited data content M2i (i=1, 2, 3, . . . ) is obtained. - (10) When the second edited data content M2i is obtained, the second user U2 encrypts the second scenario S2i, which is editing process data content of the second edited data content M2i, using the public-key Kbc of the data management center:
Cs2ikbc=E(S2i,Kbc)
and presents the encrypted second scenario Cs2ikbc together with the second user label Lu2 to the data management center. - (11) When the encrypted second scenario Cs2ikbc is presented, the data management center decrypts the encrypted second scenario Cs2ikbc using the private-key Kvc of the data management center:
S2i=D(Cs2ikbc,Kvc),
prepares a second edit label Le2 based on the presented user label of the second user and the decrypted second scenario S2i, stores it in the data content management center, encrypts the second edit label Le2 using public-key Kb2 of the second user U2:
Cle2kb2=E(Le2,Kb2)
and transfers the encrypted second edit label Cle2kb2 to the second user U2. - (12) When the encrypted second edit label Cle2kb2 is transferred, the second user U2 decrypts the encrypted second edit label Cle2kb2 using private-key Kv2 of the second user U2:
Le2=D(Cle2kb2,Kv2),
encrypts the decrypted second edit label Le2 using public-key Kb3 of the third user U3:
Cle2kb3=E(Le2,Kb3)
and transfers the encrypted second edit label Cle2kb3 to the third user U3.
- (1) The information provider IPi (i=1, 2, 3, . . . ; the same applies hereinafter) encrypts the original data content M0i using an original secret-key K0i:
Cm0iks0i=E(M0i,Ks0i),
encrypts the corresponding original secret-key Ks0i using a public key Kbc of the data content dealing center:
Cks0ikbc=E(Ks0i,Kbc)
and supplies the encrypted original data content Cm0iks0i (shown as “m0i” in the figure) and the encrypted original secret-key Cks0ikbc (shown as “ks0i” in the figure) to the data content dealing center.
Cks0ikb0i=E(Ks0i,Kb0i).
Ks0i=D(Cks0ikb0i,Kv0i)
and the decrypted original secret-key Ks0i is used for encryption of the original data content M0i.
Ks0i=D(Cks0ikbc,Kvc),
decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
M0i=D(Cm0iks0i,Ks0i)
and stores the decrypted original data content M0i and the corresponding original secret-key Ks0i in the data content database.
- (2) After reviewing the original data content prepared in catalog, a first user U1i presents a first user label Lu1i and a public key Kb1i of the first user U1i, and by specifying the original data content to be utilized, requests for use to the data content dealing center.
- (3) Upon receipt of the request for use of the original data content M0i, the data content dealing center confirms the user label Lu1i to check for fee charging and identification, and then, encrypts the original data content M0i using the corresponding original secret-key Ks0i:
Cm0iks0i=E(M0i,Ks0i),
encrypts the original secret-key Ks0i using a public-key Kb1i of the first user U1i:
Cks0ikb1i=E(Ks0i,Kb1i)
and distributes the encrypte original data content Cm0iks0i and the encrypted original secret-key Cks0ikb1i to the first user U1i, and also charges for the original data content utilization to the first user U1i. - (4) When the encrypted original data content Cm0iks0i and the encrypted original secret-key Cks0ikb1i have been distributed, the first user U1i decrypts the encrypted original secret-key Cks0ikb1i using a private-key Kv1i of the first user U1i:
Ks0i=D(Cks0ikb1i,Kv1i),
decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
M0i=D(Cm0iks0i,Ks0i)
and creates a new first edited data content M1i using the decrypted original data content M0i.
- (5) The first edited data content M1i comprises the original data content M0i and a first editing scenario S1i. Further, in some cases, the first user data content Mu1i is added as a comprising element.
Cs1iks1i=W(S1i,Ks1i)
Cmu1iks1i=E(Mu1i,Ks1i),
encrypts the first secret-key Ks1i using a public-key Kbc of the data content dealing center:
Cks1ikbc=E(Ks1i,Kbc)
and transfers the encrypted first editing scenario Cs1iks1i (shown as “s1i” in the figure), the encrypted first user data content Cmu1iks1i (shown as “m1i” in the figure), and the encrypted first secret-key Cks1ikbc (shown as “ks1i” in the figure) to the data content dealing center.
Cks1ikb1i=E(Ks1i,Kb1i)
and the encrypted first secret-key Ck1ikb1i is distributed to the first user U1i. The first user U1i decrypts it using the private-key Kv1i:
Ks1i=D(Cks1ikb1i,Kv1i)
and the decrypted first secret-key K1i is used to encrypt the first editing scenario S1i and the first user data content Mu1i.
Ks1i=D(Cks1ikbc,Kvc)
decrypts the encrypted first editing scenario Cs1iks1i and the encrypted first user data content Cmu1iks1i using the decrypted first secret-key Ks1i:
S1i=D(Cs1iks1i,Ks1i)
Mu1i=D(Cmu1iks1i,Ks1i)
and generates a first user data content label and a first editing scenario label according to the first user label, and the decrypted first secret-key Ks1i, the first editing scenario S1i, the first user data content Mu1i, the first user data content label and the first editing scenario label are stored in the database.
- (6) After reviewing the original data content M0i and the first edited data content M1i prepared in catalog, a second user U2i presents a second user label Lu2i and a public-key Kb2i of the second user U2i. By specifying the original data content M0i and/or the first edited data content M1i to be utilized, a request for use is sent to the data content dealing center.
- (7) Upon receipt of the request for use of the original data content M0i and/or the first edited data content M1i, the data content dealing center confirms the user label Lu2i to check for fee charging and identification. Then, the original data content M0i requested for use, is encrypted using the corresponding original secret-key Ks0i. The first editing scenario S1i and the first user data content Mu1i are encrypted using the first secret-key Ks1i, the original secret-key Ks0i is encrypted using a public-key Kb2i, and the first secret-key Ks1i is encrypted using the public-key Kb2i:
Cm0iks0i=E(M0i,Ks0i)
Cs1iks1i=E(S1i,Ks1i)
Cmu1iks1i=E(Mu1i,Ks1i)
Cks0ikb2i=E(Ks0i,Kb2i)
Cks1ikb2i=E(Ks1i,Kb2i).
- (8) When the encrypted original data content Cm0iks0i, the encrypted first editing scenario Cs1iks1i, the encrypted first user data content Cmu1iks1i, the encrypted original secret-key Cks01kb2i and the encrypted first secret-key Cks1ikb2i have been transferred, the second user U2i decrypts the encrypted original secret-key Cks0ikb2i and the encrypted first secret-key Cks1ikb2i using a private-key Kv2i of the second user U2i:
Ks0i=D(Cks0ikb2i,Kv2i)
Ks1i=D(Cks1ikb2i,Kv1i).
Next, the encrypted original data content Cm0iks0i is decrypted using the decrypted original secret-key Ks0i, and the encrypted first editing scenario Cs1iks1i and the encrypted first user data content Cmu1iks1i are decrypted using the decrypted first secret-key Ks1i:
M0i=D(Cm0iks0i,Ks0i)
S1i=D(Cs1iks1i,Ks1i)
Mu1i=D(Cmu1iks1i,Ks1i)
and a new second edited data content M2i is created by utilizing the decrypted original data content M0i, the first editing scenario S1i and the first user data content Mu1i.
Cs2iks2i=E(S2i,Ks2i)
Cmu2iks2i=E(Mu2i,Ks2i).
Then, the second secret-key Ks2i is encrypted using the public-key Kbc of the data content dealing center:
Cks2ikbc=E(Ks2i,Kbc)
and the encrypted second editing scenario Cs2iks2i (shown as “s2i” in the figure), the encrypted second user data content Cmu2iks2i (shown as “mu2i” in the figure), and the encrypted second secret-key Cks2ikbc (shown as “ks2i” in the figure) are transferred to the data content dealing center
- (1) The information provider IPi (i=1, 2, 3, . . . ; the same applies hereinafter) encrypts the original data content M0i using an original secret-key K0i:
Cm0iks0i=E(M0i,Ks0i),
encrypts the corresponding original secret-key Ks0i using a public-key Kbc of the data content dealing center:
Cks0ikbc=E(Ks0i,Kbc)
and supplies the encrypted original data content Cm0iks0i (shown as “m0i” in the figure) and the encrypted original secret-key Cks0ikbc (shown as “ks0i” in the figure) to the data content dealing center.
Cks0ikb0i=E(Ks0i,Kb0i).
The encrypted original secret-key Cks0ikb0i is distributed to the information provider IPi, and is decrypted using a private-key Kv0i of the IP:
Ks0i=D(Cks0ikb0i,Kv0i)
and the decrypted original secret-key Ks0i is used for encryption of the original data content M0i.
Ks0i=D(Cks0ikbc,Kvc),
decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
M0i=D(Cm0iks0i,Ks0i)
and stores the decrypted original data content M0i and the corresponding original secret-key Ks0i to the data content database.
- (2) After reviewing the original data content, the data content editor Ei presents a data content editor label Lei and a public-key Kb1i of the data content editor Ei, and requests for utilization by specifying the original data content to be utilized, to the data content dealing center.
- (3) Upon receipt of the request for utilization of the original data content M0i, the data content dealing center confirms the user label Lei to check for fee charging and identification. Then, the original data content M0i is encrypted using the corresponding original secret-key Ks0i:
Cm0iks0i=E(M0i,Ks0i),
encrypts the original secret-key Ks0i using a public-key Kbei of the data content editor Ei:
Cks0ikbei=E(Ks0i,Kbei)
and distributes the encrypted original data content Cm0iks0i and the encrypted original secret-key Cks0ikbei to the data content editor Ei, and further, charges a fee for the original data content utilization to the data content editor Ei and an end user. - (4) When the encrypted original data content Cm0iks0i and the encrypted original secret-key Cks0ikbei have been distributed, the data content editor Ei decrypts the encrypted original secret-key Cks0ikbei using a private-key Kvei of the data content editor Ei:
Ks0i=E(Cks0ikbei,Kvei),
decrypts the encrypted original data content Cm0iks0i using the decrypted original secret-key Ks0i:
M0i=D(Cm0iks0i,Ks0i)
and creates an edited data content Mei utilizing the decrypted original data content M0i.
- (5) The edited data content Mei comprises the original data content M0i and the editing scenario Sei. Further, in some cases, the editor's data content is added as a comprising element.
Cseiksei=E(Sei,Ksei)
Smediksei=E(Medi,Ksei)
and encrypts the secret-key Ksei using the public-key Kbc of the data content dealing center:
Ckseikbc=E(Ksei,Kbc).
Then, the encrypted editing scenario Cseiksei (shown as “sei” in the figure), the encrypted editor's data content Cmeiksei (shown as “mei” in the figure), and the encrypted secret-key Ckseikbc (shown as “ksei” in the figure) are transferred to the data content dealing center.
Ckseikbei=E(Ksei,Kbei)
and the encrypted secret-key Ckseikbei is distributed to the data content editor Ei. The data content editor Ei decrypts it using own private-key Kvei:
Ksei=D(Ckseikbei,Kvei)
and the decrypted secret-key Ksei is used to encrypt the editing scenario Sei and the data content editor's data content Medi.
Ksei=D(Ckseikbc,Kvc).
Then, the encrypted editing scenario Cseiksei and the encrypted editor's data content Cmediksei are decrypted using the decrypted secret-key Ksei:
Sei=D(Cseiksei,Ksei)
Medi=D(Cmediksei,Ksei).
Then, a copyright label based on the data content editor label Lei is added to each of the decrypted secret-key Ksei, the editing scenario Sei and the editor's data content Medi, and these are stored in the database.
- (6) After reviewing the edited data content Mei prepared in catalog, each of a plurality of editing scenario sellers Di presents an editing scenario seller label Ldi and a public-key Kbdi of the editing scenario seller Di and requests to purchase the editing scenario Sei and the editor's data content Medi to the editing scenario market management center.
- (7) Upon receipt of the request to purchase the editing scenario Sei and the editor's data content Medi, the editing scenario market management center confirms the editing scenario seller label Ldi to check for fee charging and identification, performs the auction in the market, and sells the utilization right of the editing scenario Sei and the editor's data content Medi to a plurality of editing scenario sellers Di.
Cksdikbc=E(Ksdi,Kbc)
and transfers the encrypted secret-key Cksdikbc (shown as ksdi in the figure) to the editing scenario market management center.
- (8) The editing scenario market management center decrypts the presented encrypted secret-key Cksdikbc using the private-key Kvc of the data content dealing center:
Ksdi=D(Cksdikbc,Kvc)
encrypts the editing scenario Sei and the editor's data content Medi using the decrypted secret-key Ksdi of the editing scenario seller Di:
Cseiksdi=E(Sei,Ksdi)
Cmediksdi=E(Medi,Ksdi)
and sends the encrypted editing scenario Cseiksdi and encrypted editor's data content Cmediksdi to the editing scenario seller Di.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/701,943 USRE43599E1 (en) | 1994-10-27 | 2007-02-01 | Data management system |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP26420194 | 1994-10-27 | ||
JP6-264201 | 1994-10-27 | ||
US08/549,271 US5646999A (en) | 1994-10-27 | 1995-10-27 | Data coypright management method |
US08/733,504 US5974141A (en) | 1995-03-31 | 1996-10-18 | Data management system |
US08/846,661 US6076077A (en) | 1995-10-27 | 1997-04-29 | Data management system |
US10/170,677 USRE41657E1 (en) | 1994-10-27 | 2002-06-13 | Data management system |
US11/701,943 USRE43599E1 (en) | 1994-10-27 | 2007-02-01 | Data management system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/846,661 Reissue US6076077A (en) | 1994-10-27 | 1997-04-29 | Data management system |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE43599E1 true USRE43599E1 (en) | 2012-08-21 |
Family
ID=17399897
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/549,271 Expired - Lifetime US5646999A (en) | 1994-10-27 | 1995-10-27 | Data coypright management method |
US08/888,074 Expired - Lifetime US6097818A (en) | 1994-10-27 | 1997-07-03 | Data copyright management method |
US09/546,177 Expired - Lifetime US6272635B1 (en) | 1994-10-27 | 2000-04-10 | Data copyright management system |
US09/873,453 Expired - Lifetime US6463536B2 (en) | 1994-10-27 | 2001-06-05 | Data copyright management system |
US10/152,584 Expired - Lifetime US6721887B2 (en) | 1994-10-27 | 2002-05-23 | Data copyright management system |
US10/170,677 Expired - Lifetime USRE41657E1 (en) | 1994-10-27 | 2002-06-13 | Data management system |
US11/701,943 Expired - Lifetime USRE43599E1 (en) | 1994-10-27 | 2007-02-01 | Data management system |
Family Applications Before (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/549,271 Expired - Lifetime US5646999A (en) | 1994-10-27 | 1995-10-27 | Data coypright management method |
US08/888,074 Expired - Lifetime US6097818A (en) | 1994-10-27 | 1997-07-03 | Data copyright management method |
US09/546,177 Expired - Lifetime US6272635B1 (en) | 1994-10-27 | 2000-04-10 | Data copyright management system |
US09/873,453 Expired - Lifetime US6463536B2 (en) | 1994-10-27 | 2001-06-05 | Data copyright management system |
US10/152,584 Expired - Lifetime US6721887B2 (en) | 1994-10-27 | 2002-05-23 | Data copyright management system |
US10/170,677 Expired - Lifetime USRE41657E1 (en) | 1994-10-27 | 2002-06-13 | Data management system |
Country Status (4)
Country | Link |
---|---|
US (7) | US5646999A (en) |
EP (3) | EP1691315A1 (en) |
JP (2) | JPH08272745A (en) |
DE (1) | DE69535013T2 (en) |
Families Citing this family (191)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6574350B1 (en) | 1995-05-08 | 2003-06-03 | Digimarc Corporation | Digital watermarking employing both frail and robust watermarks |
US6681028B2 (en) | 1995-07-27 | 2004-01-20 | Digimarc Corporation | Paper-based control of computer systems |
US5841978A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Network linking method using steganographically embedded data objects |
US6122403A (en) | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US6681029B1 (en) | 1993-11-18 | 2004-01-20 | Digimarc Corporation | Decoding steganographic messages embedded in media signals |
US7313251B2 (en) * | 1993-11-18 | 2007-12-25 | Digimarc Corporation | Method and system for managing and controlling electronic media |
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
JPH07271865A (en) | 1994-04-01 | 1995-10-20 | Mitsubishi Corp | Method for managing copyright of data base |
US5974141A (en) * | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US7036019B1 (en) * | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US7302415B1 (en) * | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
US6002772A (en) * | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
DE69532153T2 (en) * | 1994-09-30 | 2004-09-02 | Mitsubishi Corp. | Data copyright management system |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US8094949B1 (en) | 1994-10-21 | 2012-01-10 | Digimarc Corporation | Music methods and systems |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
DE69532434T2 (en) * | 1994-10-27 | 2004-11-11 | Mitsubishi Corp. | Device for file copyright management system |
EP1691315A1 (en) | 1994-10-27 | 2006-08-16 | Intarsia Software LLC | Data copyright management system |
JPH08263438A (en) * | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US6738495B2 (en) * | 1995-05-08 | 2004-05-18 | Digimarc Corporation | Watermarking enhanced to withstand anticipated corruptions |
US6590996B1 (en) | 2000-02-14 | 2003-07-08 | Digimarc Corporation | Color adaptive watermarking |
US6721440B2 (en) | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US6728390B2 (en) | 1995-05-08 | 2004-04-27 | Digimarc Corporation | Methods and systems using multiple watermarks |
US6760463B2 (en) | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
JPH08329011A (en) * | 1995-06-02 | 1996-12-13 | Mitsubishi Corp | Data copyright management system |
US7171018B2 (en) | 1995-07-27 | 2007-01-30 | Digimarc Corporation | Portable devices and methods employing digital watermarking |
US6577746B1 (en) | 1999-12-28 | 2003-06-10 | Digimarc Corporation | Watermark-based object linking and embedding |
US7562392B1 (en) | 1999-05-19 | 2009-07-14 | Digimarc Corporation | Methods of interacting with audio and ambient music |
US6408331B1 (en) | 1995-07-27 | 2002-06-18 | Digimarc Corporation | Computer linking methods using encoded graphics |
US7051086B2 (en) | 1995-07-27 | 2006-05-23 | Digimarc Corporation | Method of linking on-line data to printed documents |
US6788800B1 (en) | 2000-07-25 | 2004-09-07 | Digimarc Corporation | Authenticating objects using embedded data |
US6411725B1 (en) | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US6829368B2 (en) | 2000-01-26 | 2004-12-07 | Digimarc Corporation | Establishing and interacting with on-line media collections using identifiers in media signals |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US6807534B1 (en) | 1995-10-13 | 2004-10-19 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US7047241B1 (en) | 1995-10-13 | 2006-05-16 | Digimarc Corporation | System and methods for managing digital creative works |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US5943423A (en) * | 1995-12-15 | 1999-08-24 | Entegrity Solutions Corporation | Smart token system for secure electronic transactions and identification |
WO1997043761A2 (en) * | 1996-05-15 | 1997-11-20 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
US6108637A (en) * | 1996-09-03 | 2000-08-22 | Nielsen Media Research, Inc. | Content display monitor |
US6978370B1 (en) | 1996-09-03 | 2005-12-20 | Cryptography Research, Inc. | Method and system for copy-prevention of digital copyright works |
US5835595A (en) * | 1996-09-04 | 1998-11-10 | At&T Corp | Method and apparatus for crytographically protecting data |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
WO1998026537A1 (en) * | 1996-12-12 | 1998-06-18 | Ascom Systec Ag | Method for electronically protected storage of data in a data bank |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
JP3625983B2 (en) * | 1997-03-12 | 2005-03-02 | 三菱商事株式会社 | Data management system |
EP0901282B1 (en) | 1997-09-03 | 2006-06-28 | Hitachi, Ltd. | Method for recording and reproducing electronic watermark information |
JP3638770B2 (en) * | 1997-12-05 | 2005-04-13 | 東京エレクトロンデバイス株式会社 | Storage device with test function |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
US7756892B2 (en) * | 2000-05-02 | 2010-07-13 | Digimarc Corporation | Using embedded data with file sharing |
US7689532B1 (en) | 2000-07-20 | 2010-03-30 | Digimarc Corporation | Using embedded data with file sharing |
US7602940B2 (en) | 1998-04-16 | 2009-10-13 | Digimarc Corporation | Steganographic data hiding using a device clock |
US8584255B2 (en) * | 1999-05-05 | 2013-11-12 | Sony United Kingdom Limited | Networked conditional access module |
JPH11328033A (en) * | 1998-05-20 | 1999-11-30 | Fujitsu Ltd | License transfer device |
JP3565715B2 (en) * | 1998-07-02 | 2004-09-15 | 松下電器産業株式会社 | Broadcast system and broadcast transceiver |
JP3216607B2 (en) * | 1998-07-29 | 2001-10-09 | 日本電気株式会社 | Digital work distribution system and method, digital work reproduction apparatus and method, and recording medium |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US8332478B2 (en) | 1998-10-01 | 2012-12-11 | Digimarc Corporation | Context sensitive connected content |
JP4763866B2 (en) | 1998-10-15 | 2011-08-31 | インターシア ソフトウェア エルエルシー | Method and apparatus for protecting digital data by double re-encryption |
US6408287B1 (en) | 1998-12-02 | 2002-06-18 | Pitney Bowes Inc. | Recording graphical information on the face of a mail piece and placing information about the graphical information in an information-based indicia |
US6427021B1 (en) | 1998-12-02 | 2002-07-30 | Pitney Bowes Inc. | Recording graphical and tracking information on the face of a mailpiece |
ID27991A (en) * | 1999-03-03 | 2001-05-03 | Sony Corp | DATA PROCESSING APARATUS, DATA PROCESSING METHOD, TERMINAL UNITS, AND TRANSMISSION METHODS OF DATA PROCESSING APARATUS |
US6868497B1 (en) * | 1999-03-10 | 2005-03-15 | Digimarc Corporation | Method and apparatus for automatic ID management |
US7073063B2 (en) | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US6973444B1 (en) | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US7136838B1 (en) * | 1999-03-27 | 2006-11-14 | Microsoft Corporation | Digital license and method for obtaining/providing a digital license |
US7103574B1 (en) * | 1999-03-27 | 2006-09-05 | Microsoft Corporation | Enforcement architecture and method for digital rights management |
US20020019814A1 (en) | 2001-03-01 | 2002-02-14 | Krishnamurthy Ganesan | Specifying rights in a digital rights license according to events |
US6829708B1 (en) | 1999-03-27 | 2004-12-07 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative of the relative security thereof |
GB2349548A (en) | 1999-04-27 | 2000-11-01 | Roke Manor Research | Downloading software to mobile telecommunication users |
JP4362888B2 (en) * | 1999-05-18 | 2009-11-11 | ソニー株式会社 | Information processing apparatus and method, and recording medium |
US20020032734A1 (en) | 2000-07-26 | 2002-03-14 | Rhoads Geoffrey B. | Collateral data combined with user characteristics to select web site |
US6981214B1 (en) | 1999-06-07 | 2005-12-27 | Hewlett-Packard Development Company, L.P. | Virtual editor and related methods for dynamically generating personalized publications |
US8103542B1 (en) | 1999-06-29 | 2012-01-24 | Digimarc Corporation | Digitally marked objects and promotional methods |
JP2001092721A (en) * | 1999-09-17 | 2001-04-06 | Fujitsu Ltd | Device and method for controlling content use and computer readable recording medium having content use control program recorded thereon |
US7194620B1 (en) * | 1999-09-24 | 2007-03-20 | Verizon Business Global Llc | Method for real-time data authentication |
US6876991B1 (en) | 1999-11-08 | 2005-04-05 | Collaborative Decision Platforms, Llc. | System, method and computer program product for a collaborative decision platform |
US6608919B1 (en) | 1999-11-10 | 2003-08-19 | Digimarc Corporation | Method and apparatus for encoding paper with information |
US6625297B1 (en) | 2000-02-10 | 2003-09-23 | Digimarc Corporation | Self-orienting watermarks |
US6834308B1 (en) | 2000-02-17 | 2004-12-21 | Audible Magic Corporation | Method and apparatus for identifying media content presented on a media playing device |
WO2001076136A1 (en) * | 2000-03-30 | 2001-10-11 | Sanyo Electric Co., Ltd. | Content data storage |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
GB0009634D0 (en) * | 2000-04-19 | 2000-06-07 | Infoclear Nv | The info2clear system for on-line copyright management |
US6804377B2 (en) | 2000-04-19 | 2004-10-12 | Digimarc Corporation | Detecting information hidden out-of-phase in color channels |
US7111168B2 (en) | 2000-05-01 | 2006-09-19 | Digimarc Corporation | Digital watermarking systems |
DE10025626A1 (en) * | 2000-05-24 | 2001-11-29 | Deutsche Telekom Ag | Encrypt data to be stored in an IV system |
US7111167B1 (en) | 2000-06-30 | 2006-09-19 | Intel Corporation | Digital watermarks with values derived from remote platforms |
US7039615B1 (en) | 2000-09-28 | 2006-05-02 | Microsoft Corporation | Retail transactions involving digital content in a digital rights management (DRM) system |
US7606898B1 (en) | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US7113900B1 (en) | 2000-10-24 | 2006-09-26 | Microsoft Corporation | System and method for logical modeling of distributed computer systems |
WO2002035327A2 (en) * | 2000-10-24 | 2002-05-02 | Nds Limited | Transferring electronic content |
US7562012B1 (en) | 2000-11-03 | 2009-07-14 | Audible Magic Corporation | Method and apparatus for creating a unique audio signature |
WO2002051150A2 (en) | 2000-12-18 | 2002-06-27 | Matsushita Electric Industrial Co., Ltd. | Encryption transmission system |
US7266704B2 (en) * | 2000-12-18 | 2007-09-04 | Digimarc Corporation | User-friendly rights management systems and methods |
US8055899B2 (en) | 2000-12-18 | 2011-11-08 | Digimarc Corporation | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities |
EP1223548A3 (en) * | 2001-01-10 | 2004-02-11 | Monolith Co., Ltd. | Copyright information embedding method and apparatus |
US20020094083A1 (en) * | 2001-01-12 | 2002-07-18 | Prabir Bhattacharya | Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content |
US7987510B2 (en) * | 2001-03-28 | 2011-07-26 | Rovi Solutions Corporation | Self-protecting digital content |
US20020141582A1 (en) * | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
US7363278B2 (en) | 2001-04-05 | 2008-04-22 | Audible Magic Corporation | Copyright detection and protection system and method |
JP2003032639A (en) * | 2001-05-09 | 2003-01-31 | Monolith Co Ltd | Image processing method and equipment, and contents recording method capable of being used for the method and the equipment |
US7529659B2 (en) | 2005-09-28 | 2009-05-05 | Audible Magic Corporation | Method and apparatus for identifying an unknown work |
US7877438B2 (en) | 2001-07-20 | 2011-01-25 | Audible Magic Corporation | Method and apparatus for identifying new media content |
US8972481B2 (en) | 2001-07-20 | 2015-03-03 | Audible Magic, Inc. | Playlist generation method and apparatus |
US6925475B2 (en) * | 2001-10-12 | 2005-08-02 | Commissariat A L'energie Atomique | Process and apparatus for management of multimedia databases |
US20030105739A1 (en) * | 2001-10-12 | 2003-06-05 | Hassane Essafi | Method and a system for identifying and verifying the content of multimedia documents |
US20030108205A1 (en) * | 2001-12-07 | 2003-06-12 | Bryan Joyner | System and method for providing encrypted data to a device |
US8001052B2 (en) * | 2001-12-10 | 2011-08-16 | Dunkeld Bryan C | System and method for unique digital asset identification and transaction management |
PT1456810E (en) | 2001-12-18 | 2011-07-25 | L 1 Secure Credentialing Inc | Multiple image security features for identification documents and methods of making same |
US7694887B2 (en) | 2001-12-24 | 2010-04-13 | L-1 Secure Credentialing, Inc. | Optically variable personalized indicia for identification documents |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
EP1459239B1 (en) | 2001-12-24 | 2012-04-04 | L-1 Secure Credentialing, Inc. | Covert variable information on id documents and methods of making same |
US7793846B2 (en) | 2001-12-24 | 2010-09-14 | L-1 Secure Credentialing, Inc. | Systems, compositions, and methods for full color laser engraving of ID documents |
DE10201441A1 (en) * | 2002-01-16 | 2003-08-14 | Infineon Technologies Ag | Pushing device and method for moving |
JP2003224556A (en) * | 2002-01-28 | 2003-08-08 | Toshiba Corp | Communication equipment and communication control method |
US20050080744A1 (en) * | 2002-02-04 | 2005-04-14 | Yoshiki Ashida | Content management system in web link |
JP4335492B2 (en) * | 2002-03-05 | 2009-09-30 | キヤノン株式会社 | Moving picture management method and apparatus |
US7277544B1 (en) * | 2002-05-07 | 2007-10-02 | Cinea, Inc. | Local content security system |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
US20030221105A1 (en) * | 2002-05-20 | 2003-11-27 | Autodesk, Inc. | Extensible mechanism for attaching digital signatures to different file types |
GB2389204A (en) * | 2002-06-01 | 2003-12-03 | Hewlett Packard Co | Updating a trusted information state |
US9349411B2 (en) * | 2002-07-16 | 2016-05-24 | Digimarc Corporation | Digital watermarking and fingerprinting applications for copy protection |
JP2004133576A (en) | 2002-10-09 | 2004-04-30 | Sony Corp | Information processor, content distribution server, license server and method, and computer program |
US7089429B2 (en) * | 2002-11-25 | 2006-08-08 | Nokia Corporation | Creation of local usage rights voucher |
AU2003298731A1 (en) | 2002-11-26 | 2004-06-18 | Digimarc Id Systems | Systems and methods for managing and detecting fraud in image databases used with identification documents |
US7712673B2 (en) | 2002-12-18 | 2010-05-11 | L-L Secure Credentialing, Inc. | Identification document with three dimensional image of bearer |
US8332326B2 (en) | 2003-02-01 | 2012-12-11 | Audible Magic Corporation | Method and apparatus to identify a work received by a processing system |
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US7660982B1 (en) | 2003-02-27 | 2010-02-09 | Weinblatt Lee S | Subscription broadcast security system |
US8122106B2 (en) | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US7890543B2 (en) | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7689676B2 (en) | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US7072807B2 (en) | 2003-03-06 | 2006-07-04 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US20060005030A1 (en) * | 2003-04-03 | 2006-01-05 | Web Bindery Llc | System and method for managing copyright information of electronic content |
US20050270572A1 (en) * | 2003-04-03 | 2005-12-08 | Web Bindery Llc | System and method for virtual print devices for command implementation |
US20040236640A1 (en) * | 2003-04-03 | 2004-11-25 | Peter Kassan | System for producing on-line content from web sites on demand |
US20060041839A1 (en) * | 2003-04-03 | 2006-02-23 | Peter Kassan | System and method for providing formatted print pages |
CA2522551C (en) | 2003-04-16 | 2009-12-22 | Digimarc Corporation | Three dimensional data storage |
US8055910B2 (en) | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
KR100493900B1 (en) * | 2003-08-21 | 2005-06-10 | 삼성전자주식회사 | Method for Sharing Rights Object Between Users |
US7562230B2 (en) * | 2003-10-14 | 2009-07-14 | Intel Corporation | Data security |
US20050154906A1 (en) * | 2003-11-05 | 2005-07-14 | Patrick Kriech | BIOS locked application media |
WO2005074187A1 (en) | 2004-01-29 | 2005-08-11 | Sony Corporation | Information processing device and method |
US7778422B2 (en) * | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
CN100388153C (en) * | 2004-03-02 | 2008-05-14 | 吴怡达 | File control apparatus |
US7744002B2 (en) | 2004-03-11 | 2010-06-29 | L-1 Secure Credentialing, Inc. | Tamper evident adhesive and identification document including same |
US7730207B2 (en) * | 2004-03-31 | 2010-06-01 | Microsoft Corporation | Routing in peer-to-peer networks |
US20050246529A1 (en) * | 2004-04-30 | 2005-11-03 | Microsoft Corporation | Isolated persistent identity storage for authentication of computing devies |
US8130746B2 (en) | 2004-07-28 | 2012-03-06 | Audible Magic Corporation | System for distributing decoy content in a peer to peer network |
AU2005272562A1 (en) * | 2004-08-13 | 2006-02-23 | Wink International Llc | Copyright license requesting |
GB0421774D0 (en) | 2004-09-30 | 2004-11-03 | Ttp Communications Ltd | Source code protection |
US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
US7711965B2 (en) * | 2004-10-20 | 2010-05-04 | Intel Corporation | Data security |
US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
JP4186941B2 (en) * | 2005-03-23 | 2008-11-26 | ヤマハ株式会社 | Automatic performance data editing / playback apparatus and program for controlling the same |
JP2006267491A (en) * | 2005-03-23 | 2006-10-05 | Yamaha Corp | Device for reproducing automatic playing data and program for realizing control method thereof |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US7802144B2 (en) | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
US7805375B2 (en) * | 2005-08-22 | 2010-09-28 | Microsoft Corporation | Digital license migration from first platform to second platform |
US7818810B2 (en) * | 2005-10-07 | 2010-10-19 | International Business Machines Corporation | Control of document content having extraction permissives |
US20070083510A1 (en) * | 2005-10-07 | 2007-04-12 | Mcardle James M | Capturing bibliographic attribution information during cut/copy/paste operations |
US8306918B2 (en) | 2005-10-11 | 2012-11-06 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
US7941309B2 (en) | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US8224751B2 (en) | 2006-05-03 | 2012-07-17 | Apple Inc. | Device-independent management of cryptographic information |
CN101449522B (en) * | 2006-07-05 | 2012-12-12 | 艾格瑞系统有限公司 | Systems and methods for implementing hands free operational environments |
US8010803B2 (en) * | 2006-10-12 | 2011-08-30 | Black Duck Software, Inc. | Methods and apparatus for automated export compliance |
WO2008068078A1 (en) * | 2006-12-07 | 2008-06-12 | International Business Machines Corporation | Remote controller having an rfid tag |
JP5147733B2 (en) * | 2007-02-07 | 2013-02-20 | パナソニック株式会社 | RECORDING DEVICE, SERVER DEVICE, RECORDING METHOD, RECORDING MEDIUM RECORDING COMPUTER PROGRAM, AND INTEGRATED CIRCUIT |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8347098B2 (en) | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US8006314B2 (en) | 2007-07-27 | 2011-08-23 | Audible Magic Corporation | System for identifying content of digital data |
US20150006411A1 (en) * | 2008-06-11 | 2015-01-01 | James D. Bennett | Creative work registry |
JP2008263644A (en) * | 2008-06-23 | 2008-10-30 | Mitsubishi Corp | Key management method, and key management apparatus |
US8199651B1 (en) | 2009-03-16 | 2012-06-12 | Audible Magic Corporation | Method and system for modifying communication flows at a port level |
JP4544366B2 (en) * | 2009-06-22 | 2010-09-15 | ソニー株式会社 | Content using device and information processing method |
JP5621250B2 (en) * | 2009-12-10 | 2014-11-12 | 富士通株式会社 | Application software protection method and stream editing processing system |
JP2010193506A (en) * | 2010-04-14 | 2010-09-02 | Intarsia Software Llc | Data content distribution system |
US20120185759A1 (en) * | 2011-01-13 | 2012-07-19 | Helen Balinsky | System and method for collaboratively editing a composite document |
US9081778B2 (en) | 2012-09-25 | 2015-07-14 | Audible Magic Corporation | Using digital fingerprints to associate data with a work |
KR102329886B1 (en) * | 2020-11-24 | 2021-11-22 | 주식회사 모블디 | Multidimensional copyright management method and system |
CN113992326B (en) * | 2021-10-26 | 2023-05-16 | 福建师范大学 | Non-interactive image editing validity detection method based on aggregation algorithm |
Citations (225)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4104721A (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4168396A (en) | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4225884A (en) | 1977-02-14 | 1980-09-30 | Telease, Inc. | Method and system for subscription television billing and access |
US4278337A (en) | 1978-02-07 | 1981-07-14 | Canon Kabushiki Kaisha | Electric motor drive device for camera |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4352952A (en) | 1978-06-12 | 1982-10-05 | Motorola Inc. | Data security module |
US4386233A (en) | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4465901A (en) | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
EP0121853A2 (en) | 1983-04-04 | 1984-10-17 | BURROUGHS CORPORATION (a Delaware corporation) | Data processing system having public encryption and private decryption keys |
JPS59169000U (en) | 1983-04-27 | 1984-11-12 | 日立照明株式会社 | Lighting equipment switching device |
US4527195A (en) | 1979-02-20 | 1985-07-02 | Payview Limited | Apparatus for encoding and decoding information |
JPS60102038U (en) | 1983-12-20 | 1985-07-11 | トラスト・トレ−デイング株式会社 | training equipment |
WO1985003830A1 (en) | 1984-02-23 | 1985-08-29 | American Telephone & Telegraph Company | Method and apparatus for subscription broadcast |
US4558176A (en) | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4567512A (en) | 1982-08-19 | 1986-01-28 | World Video Library, Inc. | Recorded program communication system |
US4588991A (en) | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
US4613901A (en) | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
EP0199410A1 (en) | 1985-04-19 | 1986-10-29 | La Radiotechnique Portenseigne | System for the secret transmission of audio signals, and television set for receiving such signals |
US4623918A (en) | 1983-05-02 | 1986-11-18 | Teleglobe Pay-Tv System, Inc. | Pay television system utilizing multi-frequency passive filters |
US4625276A (en) * | 1983-08-31 | 1986-11-25 | Vericard Corporation | Data logging and transfer system using portable and resident units |
JPS62169540U (en) | 1986-04-16 | 1987-10-27 | ||
DE3717261A1 (en) | 1987-05-22 | 1987-11-19 | Paul Bamberg | Method for selecting television programmes by telephone |
US4709266A (en) | 1985-01-14 | 1987-11-24 | Oak Industries Inc. | Satellite scrambling communication network using geographically separated uplinks |
US4710955A (en) | 1985-11-25 | 1987-12-01 | General Instrument Corporation | Cable television system with two-way telephone communication path |
US4736422A (en) | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
EP0158167A3 (en) | 1984-03-21 | 1988-05-18 | Atalla Corporation | Document security system, method and apparatus |
US4751732A (en) | 1984-07-06 | 1988-06-14 | Kabushiki Kaisha Toshiba | Broadcasting system |
US4757534A (en) | 1984-12-18 | 1988-07-12 | International Business Machines Corporation | Code protection using cryptography |
US4759062A (en) | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US4791565A (en) | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
JPS6461782A (en) | 1987-08-31 | 1989-03-08 | Sharp Kk | Coded record reproducer |
JPS6441387U (en) | 1987-09-08 | 1989-03-13 | ||
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4829569A (en) | 1984-09-21 | 1989-05-09 | Scientific-Atlanta, Inc. | Communication of individual messages to subscribers in a subscription television system |
US4850017A (en) | 1987-05-29 | 1989-07-18 | International Business Machines Corp. | Controlled use of cryptographic keys via generating station established control values |
US4852154A (en) | 1986-02-04 | 1989-07-25 | Pacific Bell | Pay-per-view CATV system |
US4862268A (en) | 1980-03-31 | 1989-08-29 | General Instrument Corporation | Addressable cable television control system with video format data transmission |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US4864614A (en) | 1983-07-15 | 1989-09-05 | U.S. Philips Corporation | Authorising coded signals |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
WO1989009528A1 (en) | 1988-04-01 | 1989-10-05 | Scientific Atlanta, Inc. | Set-top interface transactions in an impulse pay per view television system |
US4890321A (en) | 1986-07-08 | 1989-12-26 | Scientific Atlanta, Inc. | Communications format for a subscription television system permitting transmission of individual text messages to subscribers |
US4890319A (en) | 1984-09-21 | 1989-12-26 | Scientific-Atlantic, Inc. | Method for controlling copying of protected information transmitted over a communications link |
EP0341801A3 (en) | 1985-10-29 | 1990-02-07 | Payview Limited | Video scrambling systems |
US4905277A (en) | 1981-12-29 | 1990-02-27 | Fujitsu Limited | Method for enciphering and deciphering instructions in a microcomputer, and a microcomputer used for effecting same |
WO1990002382A1 (en) | 1988-08-16 | 1990-03-08 | Indata, Corporation | Information distribution system |
USRE33189E (en) | 1981-11-19 | 1990-03-27 | Communications Satellite Corporation | Security system for SSTV encryption |
US4916737A (en) | 1988-11-14 | 1990-04-10 | Teleglobe Pay-Tv System, Inc. | Secure anti-piracy encoded television system and method |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4995080A (en) | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
US5005200A (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5008853A (en) * | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5029207A (en) | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5036461A (en) | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
US5046093A (en) | 1989-09-05 | 1991-09-03 | General Instrument Corporation | CATV subscriber apparatus with intelligent remote control |
EP0391261A3 (en) | 1989-04-03 | 1991-10-09 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
US5060262A (en) | 1990-05-07 | 1991-10-22 | Bevins Jr George L | Video scrambling, audio masking and data transmission methods for wireless cable systems |
EP0459046A1 (en) | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
JPH03282989A (en) | 1990-03-30 | 1991-12-13 | Tonen Corp | Data storing method using memory card |
US5077665A (en) * | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5083309A (en) | 1989-11-23 | 1992-01-21 | Schlumberger Industries | Method and a system enabling software to be run securely |
US5091938A (en) | 1990-08-06 | 1992-02-25 | Nec Home Electronics, Ltd. | System and method for transmitting entertainment information to authorized ones of plural receivers |
US5126566A (en) | 1990-04-06 | 1992-06-30 | Jeol Ltd. | Dimension measurement system utilizing scanning electron beam |
US5138659A (en) | 1991-05-02 | 1992-08-11 | General Instrument Corporation | Conversion of television signal formats with retention of common control data stream |
US5142579A (en) | 1991-01-29 | 1992-08-25 | Anderson Walter M | Public key cryptographic system and method |
US5144663A (en) | 1986-04-18 | 1992-09-01 | Kudelski S.A. Fabrique D'engregistreurs Nagra | Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof |
US5146497A (en) | 1991-02-27 | 1992-09-08 | Motorola, Inc. | Group rekey in a communication system |
EP0518365A2 (en) | 1991-06-14 | 1992-12-16 | Nippon Telegraph And Telephone Corporation | method of implementing use of electronic cash |
US5173939A (en) | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
WO1993007715A1 (en) | 1991-10-03 | 1993-04-15 | Thomson Consumer Electronics S.A. | Method and apparatus for customizing a device with a smart card |
US5204961A (en) | 1990-06-25 | 1993-04-20 | Digital Equipment Corporation | Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols |
JPH05122701A (en) | 1991-10-25 | 1993-05-18 | Canon Inc | Charging information processing unit |
US5220604A (en) | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5227893A (en) | 1990-10-31 | 1993-07-13 | International Business Machines Corporation | Pseudo-bar code control of image transmission |
US5235641A (en) | 1990-03-13 | 1993-08-10 | Hitachi, Ltd. | File encryption method and file cryptographic system |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
JPH05298373A (en) | 1992-04-24 | 1993-11-12 | Olympus Optical Co Ltd | Portable type information terminal equipment |
GB2231244B (en) | 1989-04-10 | 1993-11-24 | Pioneer Electronic Corp | CATV system and CATV terminal unit |
US5270773A (en) | 1992-11-27 | 1993-12-14 | Xerox Corporation | Image producing device with security to prevent disclosure of sensitive documents |
US5291598A (en) | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
EP0532381B1 (en) | 1991-09-12 | 1994-03-30 | Gemplus Card International | Method and apparatus for certifying messages transmitted by a facsimile device |
US5301245A (en) | 1991-03-29 | 1994-04-05 | Pioneer Electronic Corporation | System for transmitting a commercial program in a CATV system |
EP0590763A1 (en) | 1992-07-27 | 1994-04-06 | Scitex Corporation Ltd. | Electronic separation scanner |
US5315657A (en) | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5323464A (en) * | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
US5341425A (en) | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5345508A (en) | 1993-08-23 | 1994-09-06 | Apple Computer, Inc. | Method and apparatus for variable-overhead cached encryption |
US5347581A (en) | 1993-09-15 | 1994-09-13 | Gemplus Developpement | Verification process for a communication system |
US5349662A (en) | 1992-05-21 | 1994-09-20 | International Business Machines Corporation | Method of and apparatus for providing automatic detection of user activity |
US5353351A (en) | 1992-06-09 | 1994-10-04 | At&T Bell Laboratories | Secure teleconferencing |
EP0542298A3 (en) | 1991-11-15 | 1994-11-23 | Citibank Na | Electronic monetary system |
US5369702A (en) | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
EP0421808B1 (en) | 1989-10-06 | 1994-12-28 | André Peter Mansvelt | Funds transfer system |
US5381480A (en) | 1993-09-20 | 1995-01-10 | International Business Machines Corporation | System for translating encrypted data |
US5392351A (en) | 1992-03-16 | 1995-02-21 | Fujitsu Limited | Electronic data protection system |
US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
EP0649074A1 (en) | 1993-10-18 | 1995-04-19 | Xerox Corporation | A system and method to measure and accrue copyright royalties |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5414772A (en) | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5428685A (en) | 1992-01-22 | 1995-06-27 | Fujitsu Limited | IC memory card and method of protecting data therein |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
WO1995020291A1 (en) | 1994-01-19 | 1995-07-27 | Highwater Fbi Limited | Method of and apparatus for manipulating digital data works |
US5438508A (en) | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5444782A (en) | 1993-03-09 | 1995-08-22 | Uunet Technologies, Inc. | Computer network encryption/decryption device |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
EP0665486A3 (en) | 1994-01-27 | 1995-09-13 | AT&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5455941A (en) | 1991-02-27 | 1995-10-03 | Canon Kabushiki Kaisha | System for detecting improper rewrites of data system for using separate reader writer passwords |
US5455863A (en) | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US5457746A (en) | 1993-09-14 | 1995-10-10 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5465299A (en) | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
US5475757A (en) | 1994-06-07 | 1995-12-12 | At&T Corp. | Secure data transmission method |
US5475758A (en) | 1993-01-22 | 1995-12-12 | Fujitsu Limited | User authenticating system and method in wide area distributed environment |
US5479514A (en) | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5497420A (en) | 1994-02-07 | 1996-03-05 | Le Groupe Vide/ otron Lte/ e | Cable TV system using passwords |
US5499340A (en) | 1994-01-12 | 1996-03-12 | Isogon Corporation | Method and apparatus for computer program usage monitoring |
US5504816A (en) | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5504818A (en) | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
US5504933A (en) | 1992-10-27 | 1996-04-02 | Mitsubishi Corporation | Pay broadcasting system |
US5504817A (en) | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
EP0354774B1 (en) | 1988-08-11 | 1996-04-10 | International Business Machines Corporation | Data cryptography using control vectors |
US5509073A (en) | 1992-11-26 | 1996-04-16 | Schlumberger Industries | Communications network |
US5511121A (en) | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
WO1996013113A1 (en) | 1994-10-12 | 1996-05-02 | Secure Computing Corporation | System and method for providing secure internetwork services |
US5515538A (en) | 1992-05-29 | 1996-05-07 | Sun Microsystems, Inc. | Apparatus and method for interrupt handling in a multi-threaded operating system kernel |
US5515441A (en) | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5532920A (en) | 1992-04-29 | 1996-07-02 | International Business Machines Corporation | Data processing system and method to enforce payment of royalties when copying softcopy books |
US5541994A (en) | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
WO1996023257A1 (en) | 1995-01-24 | 1996-08-01 | Tandem Computers Incorporated | Enhanced instrumentation software in fault tolerant systems |
EP0450841B1 (en) | 1990-03-29 | 1996-08-21 | Gte Laboratories Incorporated | Video control system |
US5553145A (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
WO1996027259A1 (en) | 1995-03-02 | 1996-09-06 | Signum Technologies Limited | Method of and apparatus for manipulating digital data works |
EP0506435B1 (en) | 1991-03-29 | 1996-10-23 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US5577121A (en) | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US5579223A (en) * | 1992-12-24 | 1996-11-26 | Microsoft Corporation | Method and system for incorporating modifications made to a computer program into a translated version of the computer program |
US5581682A (en) * | 1991-06-28 | 1996-12-03 | International Business Machines Corporation | Method for storing and retrieving annotations and redactions in final form documents |
US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
US5606613A (en) | 1994-12-22 | 1997-02-25 | Pitney Bowes Inc. | Method for identifying a metering accounting vault to digital printer |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
EP0489385B1 (en) | 1990-12-06 | 1997-03-19 | EDICO S.r.l. | System for the transmission and reception of encoded television signals |
US5633934A (en) | 1993-12-09 | 1997-05-27 | Hember; John T. | Local area nework encryption decryption system |
US5636277A (en) | 1994-09-30 | 1997-06-03 | Fujitsu Limited | System for licensing to use software products |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
US5646999A (en) | 1994-10-27 | 1997-07-08 | Mitsubishi Corporation | Data coypright management method |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
EP0438154B1 (en) | 1990-01-19 | 1997-07-16 | Canon Kabushiki Kaisha | Multimedia network system |
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
EP0398645B1 (en) | 1989-05-15 | 1997-08-06 | International Business Machines Corporation | System for controlling access privileges |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
US5680452A (en) | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
US5689587A (en) | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
EP0813133A2 (en) | 1996-06-11 | 1997-12-17 | International Business Machines Corporation | A uniform mechanism for using signed content |
WO1997050036A1 (en) | 1996-06-27 | 1997-12-31 | Institute Of Systems Science | Computationally efficient method for trusted and dynamic digital objects dissemination |
US5706210A (en) | 1995-03-01 | 1998-01-06 | Fujitsu Limited | Network monitoring device |
US5715393A (en) | 1993-08-16 | 1998-02-03 | Motorola, Inc. | Method for remote system process monitoring |
US5737413A (en) * | 1992-04-24 | 1998-04-07 | Fujitsu Limited | Information distribution system wherein storage medium storing ciphered information is distributed |
US5740549A (en) * | 1995-06-12 | 1998-04-14 | Pointcast, Inc. | Information and advertising distribution system and method |
US5740246A (en) | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US5745572A (en) | 1995-02-24 | 1998-04-28 | International Computers Limited | Cryptographic key management |
US5761655A (en) * | 1990-06-06 | 1998-06-02 | Alphatronix, Inc. | Image file storage and retrieval system |
US5765176A (en) | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
US5765152A (en) | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5771383A (en) | 1994-12-27 | 1998-06-23 | International Business Machines Corp. | Shared memory support method and apparatus for a microkernel data processing system |
US5812762A (en) | 1995-03-31 | 1998-09-22 | Samsung Electronics Co., Ltd. | Personal computer having card read/write controller |
US5818933A (en) | 1995-07-07 | 1998-10-06 | Mitsubishi Denki Kabushiki Kaisha | Copyright control system |
US5819092A (en) * | 1994-11-08 | 1998-10-06 | Vermeer Technologies, Inc. | Online service development tool with fee setting capabilities |
US5825892A (en) | 1996-10-28 | 1998-10-20 | International Business Machines Corporation | Protecting images with an image watermark |
US5832083A (en) | 1994-09-09 | 1998-11-03 | Fujitsu Limited | Method and device for utilizing data content |
US5835765A (en) | 1995-05-31 | 1998-11-10 | Mitsubishi Denki Kabushiki Kaisha | Computer operation management system for a computer operating system capable of simultaneously executing plural application programs |
US5835601A (en) | 1994-03-15 | 1998-11-10 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US5848158A (en) | 1995-06-02 | 1998-12-08 | Mitsubishi Corporation | Data copyright management system |
US5848155A (en) | 1996-09-04 | 1998-12-08 | Nec Research Institute, Inc. | Spread spectrum watermark for embedded signalling |
US5867579A (en) | 1994-10-27 | 1999-02-02 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5912969A (en) | 1994-03-31 | 1999-06-15 | Hitachi, Ltd. | Information receiving and recording/reproducing apparatus/method having function for limiting/delimiting for protecting copyright of recording information |
US5968175A (en) | 1994-03-29 | 1999-10-19 | Kabushiki Kaisha Toshiba | Software use method control system |
US5974141A (en) | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US5986690A (en) | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US6002772A (en) | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6026430A (en) | 1997-03-24 | 2000-02-15 | Butman; Ronald A. | Dynamic client registry apparatus and method |
US6044367A (en) | 1996-08-02 | 2000-03-28 | Hewlett-Packard Company | Distributed I/O store |
US6069952A (en) | 1994-09-30 | 2000-05-30 | Mitsubishi Corporation | Data copyright management system |
US6076077A (en) | 1995-10-27 | 2000-06-13 | Mitsubishi Corporation | Data management system |
US6091835A (en) | 1994-08-31 | 2000-07-18 | Penop Limited | Method and system for transcribing electronic affirmations |
US6097816A (en) | 1994-04-08 | 2000-08-01 | Mitsubishi Corporation | Crypt key system |
US6160891A (en) | 1997-10-20 | 2000-12-12 | Sun Microsystems, Inc. | Methods and apparatus for recovering keys |
JP3128541B2 (en) | 1991-02-06 | 2001-01-29 | イゲン,インコーポレーテッド | Apparatus for luminescence assay based on magnetic microparticles containing multiple magnets |
US6182218B1 (en) | 1994-12-13 | 2001-01-30 | Mitsubishi Corporation | Digital content management system using electronic watermark |
EP0551016B1 (en) | 1992-01-06 | 2001-03-14 | Canon Kabushiki Kaisha | Image processing method for adding an identification code to an image |
US6209092B1 (en) | 1997-01-27 | 2001-03-27 | U.S. Philips Corporation | Method and system for transferring content information and supplemental information relating thereto |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US20020021807A1 (en) | 1994-04-01 | 2002-02-21 | Mitsubishi Corporation | Method for controlling database copyrights |
JP3265241B2 (en) | 1997-09-10 | 2002-03-11 | シャープ株式会社 | Rice cooker and high frequency heating device |
US20020052850A1 (en) | 1994-10-27 | 2002-05-02 | Mitsubishi Corporation | Digital content management system and apparatus |
US6415271B1 (en) | 1993-02-10 | 2002-07-02 | Gm Network Limited | Electronic cash eliminating payment risk |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
US6519623B1 (en) | 1996-10-31 | 2003-02-11 | International Business Machines Corporation | Generic semaphore for concurrent access by multiple operating systems |
US6560339B1 (en) | 1998-02-17 | 2003-05-06 | Canon Kabushiki Kaisha | Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method |
US20030144963A1 (en) | 1994-09-30 | 2003-07-31 | Mitsubishi Corporation | Data copyright management system |
US6603864B1 (en) | 1998-10-30 | 2003-08-05 | Fuji Xerox Co., Ltd. | Image processing apparatus and image processing method |
EP0715243B1 (en) | 1994-11-23 | 2003-08-06 | ContentGuard Holdings, Inc. | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US6615258B1 (en) | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US6668324B1 (en) | 1999-12-13 | 2003-12-23 | Intel Corporation | System and method for safeguarding data within a device |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6851053B1 (en) | 1999-03-02 | 2005-02-01 | Microsoft Corporation | Multiparty conference authentication |
US6874089B2 (en) | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
EP0581227B1 (en) | 1992-07-28 | 2005-09-21 | Hitachi, Ltd. | Apparatus for the recording and/or the reproducing of video signals |
US20050262023A1 (en) | 1994-04-01 | 2005-11-24 | Intarsia Software Llc | Method for controlling database copyrights |
US7024681B1 (en) | 1997-12-04 | 2006-04-04 | Verizon Laboratories Inc. | Method and apparatus for near video on demand |
US7093295B1 (en) | 1998-10-15 | 2006-08-15 | Makoto Saito | Method and device for protecting digital data by double re-encryption |
JP4181282B2 (en) | 1999-09-16 | 2008-11-12 | 株式会社東芝 | Electronic currency terminal |
JP4268844B2 (en) | 2003-07-15 | 2009-05-27 | Tdk株式会社 | Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2783558B2 (en) * | 1988-09-30 | 1998-08-06 | 株式会社東芝 | Summary generation method and summary generation device |
JPH0714045Y2 (en) | 1989-04-05 | 1995-04-05 | 日産ディーゼル工業株式会社 | Vehicle intake system |
US5442778A (en) * | 1991-11-12 | 1995-08-15 | Xerox Corporation | Scatter-gather: a cluster-based method and apparatus for browsing large document collections |
JPH05316102A (en) | 1992-05-13 | 1993-11-26 | Mega Chips:Kk | Decoder |
JPH08185448A (en) | 1994-09-30 | 1996-07-16 | Mitsubishi Corp | System and device for managing data copyright |
US6690459B2 (en) | 2001-03-05 | 2004-02-10 | Trex Enterprises, Corp. | Method and apparatus for fiber alignment using light leaked from cladding |
JP4181182B2 (en) | 2006-03-08 | 2008-11-12 | ヤンマー農機株式会社 | Normal combine |
-
1995
- 1995-10-25 EP EP06011071A patent/EP1691315A1/en not_active Withdrawn
- 1995-10-25 EP EP06011072A patent/EP1691316A1/en not_active Withdrawn
- 1995-10-25 DE DE69535013T patent/DE69535013T2/en not_active Expired - Lifetime
- 1995-10-25 EP EP95116820A patent/EP0709760B1/en not_active Expired - Lifetime
- 1995-10-27 JP JP7280985A patent/JPH08272745A/en active Pending
- 1995-10-27 US US08/549,271 patent/US5646999A/en not_active Expired - Lifetime
-
1997
- 1997-07-03 US US08/888,074 patent/US6097818A/en not_active Expired - Lifetime
-
2000
- 2000-04-10 US US09/546,177 patent/US6272635B1/en not_active Expired - Lifetime
-
2001
- 2001-06-05 US US09/873,453 patent/US6463536B2/en not_active Expired - Lifetime
-
2002
- 2002-05-23 US US10/152,584 patent/US6721887B2/en not_active Expired - Lifetime
- 2002-06-13 US US10/170,677 patent/USRE41657E1/en not_active Expired - Lifetime
-
2005
- 2005-10-13 JP JP2005298846A patent/JP4101263B2/en not_active Expired - Lifetime
-
2007
- 2007-02-01 US US11/701,943 patent/USRE43599E1/en not_active Expired - Lifetime
Patent Citations (255)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4104721A (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4225884A (en) | 1977-02-14 | 1980-09-30 | Telease, Inc. | Method and system for subscription television billing and access |
US4168396A (en) | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4278337A (en) | 1978-02-07 | 1981-07-14 | Canon Kabushiki Kaisha | Electric motor drive device for camera |
US4352952A (en) | 1978-06-12 | 1982-10-05 | Motorola Inc. | Data security module |
US4527195A (en) | 1979-02-20 | 1985-07-02 | Payview Limited | Apparatus for encoding and decoding information |
US4465901A (en) | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4862268A (en) | 1980-03-31 | 1989-08-29 | General Instrument Corporation | Addressable cable television control system with video format data transmission |
US4386233A (en) | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
USRE33189E (en) | 1981-11-19 | 1990-03-27 | Communications Satellite Corporation | Security system for SSTV encryption |
US4905277A (en) | 1981-12-29 | 1990-02-27 | Fujitsu Limited | Method for enciphering and deciphering instructions in a microcomputer, and a microcomputer used for effecting same |
US4567512A (en) | 1982-08-19 | 1986-01-28 | World Video Library, Inc. | Recorded program communication system |
US4558176A (en) | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4588991A (en) | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
EP0121853A2 (en) | 1983-04-04 | 1984-10-17 | BURROUGHS CORPORATION (a Delaware corporation) | Data processing system having public encryption and private decryption keys |
JPS59169000U (en) | 1983-04-27 | 1984-11-12 | 日立照明株式会社 | Lighting equipment switching device |
US4623918A (en) | 1983-05-02 | 1986-11-18 | Teleglobe Pay-Tv System, Inc. | Pay television system utilizing multi-frequency passive filters |
US4613901A (en) | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
US4736422A (en) | 1983-06-30 | 1988-04-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
US4864614A (en) | 1983-07-15 | 1989-09-05 | U.S. Philips Corporation | Authorising coded signals |
US4625276A (en) * | 1983-08-31 | 1986-11-25 | Vericard Corporation | Data logging and transfer system using portable and resident units |
JPS60102038U (en) | 1983-12-20 | 1985-07-11 | トラスト・トレ−デイング株式会社 | training equipment |
WO1985003830A1 (en) | 1984-02-23 | 1985-08-29 | American Telephone & Telegraph Company | Method and apparatus for subscription broadcast |
EP0158167A3 (en) | 1984-03-21 | 1988-05-18 | Atalla Corporation | Document security system, method and apparatus |
US4791565A (en) | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4751732A (en) | 1984-07-06 | 1988-06-14 | Kabushiki Kaisha Toshiba | Broadcasting system |
US4890319A (en) | 1984-09-21 | 1989-12-26 | Scientific-Atlantic, Inc. | Method for controlling copying of protected information transmitted over a communications link |
US4829569A (en) | 1984-09-21 | 1989-05-09 | Scientific-Atlanta, Inc. | Communication of individual messages to subscribers in a subscription television system |
US4757534A (en) | 1984-12-18 | 1988-07-12 | International Business Machines Corporation | Code protection using cryptography |
EP0191162B1 (en) | 1984-12-18 | 1993-02-03 | International Business Machines Corporation | Method of software protection |
US4709266A (en) | 1985-01-14 | 1987-11-24 | Oak Industries Inc. | Satellite scrambling communication network using geographically separated uplinks |
EP0199410A1 (en) | 1985-04-19 | 1986-10-29 | La Radiotechnique Portenseigne | System for the secret transmission of audio signals, and television set for receiving such signals |
EP0341801A3 (en) | 1985-10-29 | 1990-02-07 | Payview Limited | Video scrambling systems |
US4710955A (en) | 1985-11-25 | 1987-12-01 | General Instrument Corporation | Cable television system with two-way telephone communication path |
US4852154A (en) | 1986-02-04 | 1989-07-25 | Pacific Bell | Pay-per-view CATV system |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
JPS62169540U (en) | 1986-04-16 | 1987-10-27 | ||
US5144663A (en) | 1986-04-18 | 1992-09-01 | Kudelski S.A. Fabrique D'engregistreurs Nagra | Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof |
US4890321A (en) | 1986-07-08 | 1989-12-26 | Scientific Atlanta, Inc. | Communications format for a subscription television system permitting transmission of individual text messages to subscribers |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
US4759062A (en) | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
DE3717261A1 (en) | 1987-05-22 | 1987-11-19 | Paul Bamberg | Method for selecting television programmes by telephone |
US4850017A (en) | 1987-05-29 | 1989-07-18 | International Business Machines Corp. | Controlled use of cryptographic keys via generating station established control values |
JPS6461782A (en) | 1987-08-31 | 1989-03-08 | Sharp Kk | Coded record reproducer |
JPS6441387U (en) | 1987-09-08 | 1989-03-13 | ||
US5008853A (en) * | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5005200A (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
WO1989009528A1 (en) | 1988-04-01 | 1989-10-05 | Scientific Atlanta, Inc. | Set-top interface transactions in an impulse pay per view television system |
US4864615A (en) | 1988-05-27 | 1989-09-05 | General Instrument Corporation | Reproduction of secure keys by using distributed key generation data |
US4995080A (en) | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
EP0354774B1 (en) | 1988-08-11 | 1996-04-10 | International Business Machines Corporation | Data cryptography using control vectors |
WO1990002382A1 (en) | 1988-08-16 | 1990-03-08 | Indata, Corporation | Information distribution system |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US4916737A (en) | 1988-11-14 | 1990-04-10 | Teleglobe Pay-Tv System, Inc. | Secure anti-piracy encoded television system and method |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
EP0391261A3 (en) | 1989-04-03 | 1991-10-09 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
GB2231244B (en) | 1989-04-10 | 1993-11-24 | Pioneer Electronic Corp | CATV system and CATV terminal unit |
EP0398645B1 (en) | 1989-05-15 | 1997-08-06 | International Business Machines Corporation | System for controlling access privileges |
US5077665A (en) * | 1989-05-25 | 1991-12-31 | Reuters Limited | Distributed matching system |
US5046093A (en) | 1989-09-05 | 1991-09-03 | General Instrument Corporation | CATV subscriber apparatus with intelligent remote control |
EP0421808B1 (en) | 1989-10-06 | 1994-12-28 | André Peter Mansvelt | Funds transfer system |
US5083309A (en) | 1989-11-23 | 1992-01-21 | Schlumberger Industries | Method and a system enabling software to be run securely |
EP0430734B1 (en) | 1989-11-23 | 1995-09-27 | Schlumberger Industries | System and method to securely operate a computerprogram |
EP0438154B1 (en) | 1990-01-19 | 1997-07-16 | Canon Kabushiki Kaisha | Multimedia network system |
US5029207A (en) | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5235641A (en) | 1990-03-13 | 1993-08-10 | Hitachi, Ltd. | File encryption method and file cryptographic system |
EP0450841B1 (en) | 1990-03-29 | 1996-08-21 | Gte Laboratories Incorporated | Video control system |
JPH03282989A (en) | 1990-03-30 | 1991-12-13 | Tonen Corp | Data storing method using memory card |
US5126566A (en) | 1990-04-06 | 1992-06-30 | Jeol Ltd. | Dimension measurement system utilizing scanning electron beam |
US5060262A (en) | 1990-05-07 | 1991-10-22 | Bevins Jr George L | Video scrambling, audio masking and data transmission methods for wireless cable systems |
US5036461A (en) | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
EP0459046A1 (en) | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
US5761655A (en) * | 1990-06-06 | 1998-06-02 | Alphatronix, Inc. | Image file storage and retrieval system |
US5204961A (en) | 1990-06-25 | 1993-04-20 | Digital Equipment Corporation | Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols |
US5091938B1 (en) | 1990-08-06 | 1997-02-04 | Nippon Denki Home Electronics | Digital data cryptographic system |
US5091938A (en) | 1990-08-06 | 1992-02-25 | Nec Home Electronics, Ltd. | System and method for transmitting entertainment information to authorized ones of plural receivers |
US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5173939A (en) | 1990-09-28 | 1992-12-22 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using compound principals |
US5220604A (en) | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
US5315657A (en) | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists |
US5227893A (en) | 1990-10-31 | 1993-07-13 | International Business Machines Corporation | Pseudo-bar code control of image transmission |
EP0489385B1 (en) | 1990-12-06 | 1997-03-19 | EDICO S.r.l. | System for the transmission and reception of encoded television signals |
US5142579A (en) | 1991-01-29 | 1992-08-25 | Anderson Walter M | Public key cryptographic system and method |
JP3128541B2 (en) | 1991-02-06 | 2001-01-29 | イゲン,インコーポレーテッド | Apparatus for luminescence assay based on magnetic microparticles containing multiple magnets |
US5455941A (en) | 1991-02-27 | 1995-10-03 | Canon Kabushiki Kaisha | System for detecting improper rewrites of data system for using separate reader writer passwords |
US5146497A (en) | 1991-02-27 | 1992-09-08 | Motorola, Inc. | Group rekey in a communication system |
US5301245A (en) | 1991-03-29 | 1994-04-05 | Pioneer Electronic Corporation | System for transmitting a commercial program in a CATV system |
EP0506435B1 (en) | 1991-03-29 | 1996-10-23 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US5504818A (en) | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
US5138659A (en) | 1991-05-02 | 1992-08-11 | General Instrument Corporation | Conversion of television signal formats with retention of common control data stream |
EP0518365A2 (en) | 1991-06-14 | 1992-12-16 | Nippon Telegraph And Telephone Corporation | method of implementing use of electronic cash |
US5581682A (en) * | 1991-06-28 | 1996-12-03 | International Business Machines Corporation | Method for storing and retrieving annotations and redactions in final form documents |
US5438508A (en) | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
EP0532381B1 (en) | 1991-09-12 | 1994-03-30 | Gemplus Card International | Method and apparatus for certifying messages transmitted by a facsimile device |
WO1993007715A1 (en) | 1991-10-03 | 1993-04-15 | Thomson Consumer Electronics S.A. | Method and apparatus for customizing a device with a smart card |
JPH05122701A (en) | 1991-10-25 | 1993-05-18 | Canon Inc | Charging information processing unit |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
EP0542298A3 (en) | 1991-11-15 | 1994-11-23 | Citibank Na | Electronic monetary system |
EP0551016B1 (en) | 1992-01-06 | 2001-03-14 | Canon Kabushiki Kaisha | Image processing method for adding an identification code to an image |
US5428685A (en) | 1992-01-22 | 1995-06-27 | Fujitsu Limited | IC memory card and method of protecting data therein |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5392351A (en) | 1992-03-16 | 1995-02-21 | Fujitsu Limited | Electronic data protection system |
EP0561685B1 (en) | 1992-03-16 | 2005-02-09 | Fujitsu Limited | An electronic data protection system |
US5796824A (en) * | 1992-03-16 | 1998-08-18 | Fujitsu Limited | Storage medium for preventing an irregular use by a third party |
US5291598A (en) | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
US5737413A (en) * | 1992-04-24 | 1998-04-07 | Fujitsu Limited | Information distribution system wherein storage medium storing ciphered information is distributed |
JPH05298373A (en) | 1992-04-24 | 1993-11-12 | Olympus Optical Co Ltd | Portable type information terminal equipment |
US5532920A (en) | 1992-04-29 | 1996-07-02 | International Business Machines Corporation | Data processing system and method to enforce payment of royalties when copying softcopy books |
US5349662A (en) | 1992-05-21 | 1994-09-20 | International Business Machines Corporation | Method of and apparatus for providing automatic detection of user activity |
US5515538A (en) | 1992-05-29 | 1996-05-07 | Sun Microsystems, Inc. | Apparatus and method for interrupt handling in a multi-threaded operating system kernel |
US5353351A (en) | 1992-06-09 | 1994-10-04 | At&T Bell Laboratories | Secure teleconferencing |
EP0590763A1 (en) | 1992-07-27 | 1994-04-06 | Scitex Corporation Ltd. | Electronic separation scanner |
EP0581227B1 (en) | 1992-07-28 | 2005-09-21 | Hitachi, Ltd. | Apparatus for the recording and/or the reproducing of video signals |
US5323464A (en) * | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5794115A (en) | 1992-10-27 | 1998-08-11 | Mitsubishi Corporation | Pay broadcasting system having a broadcasting station and a charging center |
US5504933A (en) | 1992-10-27 | 1996-04-02 | Mitsubishi Corporation | Pay broadcasting system |
US5901339A (en) | 1992-10-27 | 1999-05-04 | Mitsubishi Corporation | Pay broadcasting system |
US5509073A (en) | 1992-11-26 | 1996-04-16 | Schlumberger Industries | Communications network |
US5270773A (en) | 1992-11-27 | 1993-12-14 | Xerox Corporation | Image producing device with security to prevent disclosure of sensitive documents |
US5341425A (en) | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5465299A (en) | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
US5986690A (en) | 1992-12-09 | 1999-11-16 | Discovery Communications, Inc. | Electronic book selection and delivery system |
US5579223A (en) * | 1992-12-24 | 1996-11-26 | Microsoft Corporation | Method and system for incorporating modifications made to a computer program into a translated version of the computer program |
US5475758A (en) | 1993-01-22 | 1995-12-12 | Fujitsu Limited | User authenticating system and method in wide area distributed environment |
US6415271B1 (en) | 1993-02-10 | 2002-07-02 | Gm Network Limited | Electronic cash eliminating payment risk |
US5444782A (en) | 1993-03-09 | 1995-08-22 | Uunet Technologies, Inc. | Computer network encryption/decryption device |
US5414772A (en) | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5455863A (en) | 1993-06-29 | 1995-10-03 | Motorola, Inc. | Method and apparatus for efficient real-time authentication and encryption in a communication system |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
US5715393A (en) | 1993-08-16 | 1998-02-03 | Motorola, Inc. | Method for remote system process monitoring |
US5345508A (en) | 1993-08-23 | 1994-09-06 | Apple Computer, Inc. | Method and apparatus for variable-overhead cached encryption |
US5457746A (en) | 1993-09-14 | 1995-10-10 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5347581A (en) | 1993-09-15 | 1994-09-13 | Gemplus Developpement | Verification process for a communication system |
US5381480A (en) | 1993-09-20 | 1995-01-10 | International Business Machines Corporation | System for translating encrypted data |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5444779A (en) | 1993-10-18 | 1995-08-22 | Xerox Corporation | Electronic copyright royalty accounting system using glyphs |
US5369702A (en) | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
EP0649074A1 (en) | 1993-10-18 | 1995-04-19 | Xerox Corporation | A system and method to measure and accrue copyright royalties |
US5680452A (en) | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US5633934A (en) | 1993-12-09 | 1997-05-27 | Hember; John T. | Local area nework encryption decryption system |
US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5499340A (en) | 1994-01-12 | 1996-03-12 | Isogon Corporation | Method and apparatus for computer program usage monitoring |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
WO1995020291A1 (en) | 1994-01-19 | 1995-07-27 | Highwater Fbi Limited | Method of and apparatus for manipulating digital data works |
US5509074A (en) | 1994-01-27 | 1996-04-16 | At&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
EP0665486A3 (en) | 1994-01-27 | 1995-09-13 | AT&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5504816A (en) | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5497420A (en) | 1994-02-07 | 1996-03-05 | Le Groupe Vide/ otron Lte/ e | Cable TV system using passwords |
US5479514A (en) | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US5511121A (en) | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
US5835601A (en) | 1994-03-15 | 1998-11-10 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
US5968175A (en) | 1994-03-29 | 1999-10-19 | Kabushiki Kaisha Toshiba | Software use method control system |
US5912969A (en) | 1994-03-31 | 1999-06-15 | Hitachi, Ltd. | Information receiving and recording/reproducing apparatus/method having function for limiting/delimiting for protecting copyright of recording information |
EP0677949B1 (en) | 1994-04-01 | 2003-05-28 | Mitsubishi Corporation | Method for controlling copyright of encrypted digital data |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US7036019B1 (en) | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US20050262023A1 (en) | 1994-04-01 | 2005-11-24 | Intarsia Software Llc | Method for controlling database copyrights |
US20020021807A1 (en) | 1994-04-01 | 2002-02-21 | Mitsubishi Corporation | Method for controlling database copyrights |
US6097816A (en) | 1994-04-08 | 2000-08-01 | Mitsubishi Corporation | Crypt key system |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5504817A (en) | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
US5515441A (en) | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5475757A (en) | 1994-06-07 | 1995-12-12 | At&T Corp. | Secure data transmission method |
US5577121A (en) | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US6091835A (en) | 1994-08-31 | 2000-07-18 | Penop Limited | Method and system for transcribing electronic affirmations |
US5541994A (en) | 1994-09-07 | 1996-07-30 | Mytec Technologies Inc. | Fingerprint controlled public key cryptographic system |
US5832083A (en) | 1994-09-09 | 1998-11-03 | Fujitsu Limited | Method and device for utilizing data content |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
EP0704785B1 (en) | 1994-09-30 | 2003-11-19 | Mitsubishi Corporation | Data copyright management system |
US20030144963A1 (en) | 1994-09-30 | 2003-07-31 | Mitsubishi Corporation | Data copyright management system |
US6069952A (en) | 1994-09-30 | 2000-05-30 | Mitsubishi Corporation | Data copyright management system |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US5636277A (en) | 1994-09-30 | 1997-06-03 | Fujitsu Limited | System for licensing to use software products |
US6449717B1 (en) | 1994-09-30 | 2002-09-10 | Mitsubishi Corporation | Data copyright management system |
WO1996013113A1 (en) | 1994-10-12 | 1996-05-02 | Secure Computing Corporation | System and method for providing secure internetwork services |
US5864683A (en) | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
US6272635B1 (en) | 1994-10-27 | 2001-08-07 | Mitsubishi Corporation | Data copyright management system |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
US6721887B2 (en) | 1994-10-27 | 2004-04-13 | Mitsubishi Corporation | Data copyright management system |
EP0715241B1 (en) | 1994-10-27 | 2004-01-14 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6789197B1 (en) | 1994-10-27 | 2004-09-07 | Mitsubishi Corporation | Apparatus for data copyright management system |
US20020112173A1 (en) | 1994-10-27 | 2002-08-15 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5867579A (en) | 1994-10-27 | 1999-02-02 | Mitsubishi Corporation | Apparatus for data copyright management system |
US6438694B2 (en) | 1994-10-27 | 2002-08-20 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5646999A (en) | 1994-10-27 | 1997-07-08 | Mitsubishi Corporation | Data coypright management method |
US6408390B1 (en) | 1994-10-27 | 2002-06-18 | Mitsubishi Corporation | Apparatus for data copyright management system |
EP0709760B1 (en) | 1994-10-27 | 2006-05-31 | Intarsia Software LLC | Data copyright management system |
US6463536B2 (en) | 1994-10-27 | 2002-10-08 | Mitsubishi Corporation | Data copyright management system |
US6097818A (en) | 1994-10-27 | 2000-08-01 | Mitsubishi Corporation | Data copyright management method |
US6128605A (en) | 1994-10-27 | 2000-10-03 | Mitsubishi Corporation | Apparatus for data copyright management system |
US20020052850A1 (en) | 1994-10-27 | 2002-05-02 | Mitsubishi Corporation | Digital content management system and apparatus |
US5819092A (en) * | 1994-11-08 | 1998-10-06 | Vermeer Technologies, Inc. | Online service development tool with fee setting capabilities |
EP0715243B1 (en) | 1994-11-23 | 2003-08-06 | ContentGuard Holdings, Inc. | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5740246A (en) | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US6182218B1 (en) | 1994-12-13 | 2001-01-30 | Mitsubishi Corporation | Digital content management system using electronic watermark |
EP0719045B1 (en) | 1994-12-13 | 2003-10-29 | Mitsubishi Corporation | Crypt key system for secure electronic transactions |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5606613A (en) | 1994-12-22 | 1997-02-25 | Pitney Bowes Inc. | Method for identifying a metering accounting vault to digital printer |
US5771383A (en) | 1994-12-27 | 1998-06-23 | International Business Machines Corp. | Shared memory support method and apparatus for a microkernel data processing system |
WO1996023257A1 (en) | 1995-01-24 | 1996-08-01 | Tandem Computers Incorporated | Enhanced instrumentation software in fault tolerant systems |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
US5982891A (en) | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5642418A (en) | 1995-02-21 | 1997-06-24 | Bell Atlantic Network Services, Inc. | Satellite television system and method |
US5745572A (en) | 1995-02-24 | 1998-04-28 | International Computers Limited | Cryptographic key management |
US5706210A (en) | 1995-03-01 | 1998-01-06 | Fujitsu Limited | Network monitoring device |
WO1996027259A1 (en) | 1995-03-02 | 1996-09-06 | Signum Technologies Limited | Method of and apparatus for manipulating digital data works |
US5651064A (en) | 1995-03-08 | 1997-07-22 | 544483 Alberta Ltd. | System for preventing piracy of recorded media |
US5553145A (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
US5812762A (en) | 1995-03-31 | 1998-09-22 | Samsung Electronics Co., Ltd. | Personal computer having card read/write controller |
US5974141A (en) | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
US5835765A (en) | 1995-05-31 | 1998-11-10 | Mitsubishi Denki Kabushiki Kaisha | Computer operation management system for a computer operating system capable of simultaneously executing plural application programs |
US5848158A (en) | 1995-06-02 | 1998-12-08 | Mitsubishi Corporation | Data copyright management system |
US6081794A (en) | 1995-06-02 | 2000-06-27 | Mitsubishi Corporation | Data copyright management system |
EP0746126B1 (en) | 1995-06-02 | 2004-12-22 | Mitsubishi Corporation | System for data copyright management using key distribution |
US5740549A (en) * | 1995-06-12 | 1998-04-14 | Pointcast, Inc. | Information and advertising distribution system and method |
US5818933A (en) | 1995-07-07 | 1998-10-06 | Mitsubishi Denki Kabushiki Kaisha | Copyright control system |
US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6002772A (en) | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US5765152A (en) | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US6076077A (en) | 1995-10-27 | 2000-06-13 | Mitsubishi Corporation | Data management system |
US5689587A (en) | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
EP0813133A2 (en) | 1996-06-11 | 1997-12-17 | International Business Machines Corporation | A uniform mechanism for using signed content |
WO1997050036A1 (en) | 1996-06-27 | 1997-12-31 | Institute Of Systems Science | Computationally efficient method for trusted and dynamic digital objects dissemination |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US6044367A (en) | 1996-08-02 | 2000-03-28 | Hewlett-Packard Company | Distributed I/O store |
US5848155A (en) | 1996-09-04 | 1998-12-08 | Nec Research Institute, Inc. | Spread spectrum watermark for embedded signalling |
US5765176A (en) | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
US5825892A (en) | 1996-10-28 | 1998-10-20 | International Business Machines Corporation | Protecting images with an image watermark |
US6519623B1 (en) | 1996-10-31 | 2003-02-11 | International Business Machines Corporation | Generic semaphore for concurrent access by multiple operating systems |
US6209092B1 (en) | 1997-01-27 | 2001-03-27 | U.S. Philips Corporation | Method and system for transferring content information and supplemental information relating thereto |
US6026430A (en) | 1997-03-24 | 2000-02-15 | Butman; Ronald A. | Dynamic client registry apparatus and method |
JP3265241B2 (en) | 1997-09-10 | 2002-03-11 | シャープ株式会社 | Rice cooker and high frequency heating device |
US6615258B1 (en) | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US6160891A (en) | 1997-10-20 | 2000-12-12 | Sun Microsystems, Inc. | Methods and apparatus for recovering keys |
US7024681B1 (en) | 1997-12-04 | 2006-04-04 | Verizon Laboratories Inc. | Method and apparatus for near video on demand |
US6560339B1 (en) | 1998-02-17 | 2003-05-06 | Canon Kabushiki Kaisha | Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method |
US6574609B1 (en) | 1998-08-13 | 2003-06-03 | International Business Machines Corporation | Secure electronic content management system |
US6226618B1 (en) | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US7093295B1 (en) | 1998-10-15 | 2006-08-15 | Makoto Saito | Method and device for protecting digital data by double re-encryption |
US6603864B1 (en) | 1998-10-30 | 2003-08-05 | Fuji Xerox Co., Ltd. | Image processing apparatus and image processing method |
US6851053B1 (en) | 1999-03-02 | 2005-02-01 | Microsoft Corporation | Multiparty conference authentication |
JP4181282B2 (en) | 1999-09-16 | 2008-11-12 | 株式会社東芝 | Electronic currency terminal |
US6668324B1 (en) | 1999-12-13 | 2003-12-23 | Intel Corporation | System and method for safeguarding data within a device |
US6874089B2 (en) | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
JP4268844B2 (en) | 2003-07-15 | 2009-05-27 | Tdk株式会社 | Manufacturing method of multilayer ceramic electronic component and multilayer ceramic electronic component |
Non-Patent Citations (63)
Title |
---|
"Des Modes of Operation" U.S. FIPS Publication 81, Dec. 2, 1980, 23 pgs. |
Adachi, R., "Introduction to handcraft of Personal Computer" Natsume Publishing Co., 1983, pp. 141-155. |
Anonymous, "Encryption of Information to be Recorded so as to Prevent Unauthorized Playback" Research Disclosure No. 335, Mar. 1992, Emsworth, GB, p. 219. |
Anonymous, "Security" Government Executive, National Journal, Inc. Washington, vol. 29, issue 1, Jan. 1997, pp. 35-37. |
Bellovin, S.M. et al., "Network Firewalls" IEEE Communications Magazine, vol. 32, No. 9, Oct. 1994, pp. 50-57. |
Bryan, John "A look at five different firewall products and services you can install today" www.byte.com/art/9504/sec10/art6.htm, Apr. 1995. |
Fitch, K. "User Authentication and Software Distribution on the Web", ausweb97@scu.edu.au 5 Nov. 1996, pp. 1-12. |
Gale, Brent et al., "Satellite and Cable TV Scrambling and Descrambling" Baylin/Gale Productions, 2nd Edition, 1986, pp. 163-165. |
Grampp, F.T. et al., "Unix Operating System Security" AT&T Bell Laboratories Technical Journal, vol. 63, No. 8, Oct. 1984, New York, pp. 1649-1672. |
Harn, Lein, et al., "Software Authentication System for Information Integrity" Computers & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. II, Dec. 1, 1992, pp. 747-752, XP000332279. |
Hedberg, S.R. "HP's International Cryptography Framework: Compromise or Threat?" IEEE Computer, Jan. 1997, pp. 28-30. |
Kent, Stephen T., "Internet Privacy Enhanced Mail", Association for Computing Machinery, Communications of the ACM, Aug. 1993, vol. 36, issue 9, pp. 48-61. |
Komatsu, Naohisa, et al., "A Proposal on Digital Watermark in Document Image Communication and its Application to Realizing a Signature" Electronics & Communications in Japan Part I-Communications, vol. 73, No. 5, part 1, May 1, 1990, pp. 22-33. |
Lennil, P. "The IBM Microkernel Technology," OS/2 Developer, vol. 5, Nov. 1, 1993 (pp. 70-72, 74) XP000672962. |
Masuoka, Fujio, "Progressing Flash Memories" Kogyo Chosa-kai Co., Chapter 1: Semiconductor Memory, pp. 34-68. |
Matsumoto, Tsutomu et al., "Cryptographic Key Sharing" Technical Report of Institute of Electronics, Information and Communication Engineers (IEICE), Mar. 27, 1990, vol. 89, No. 482, pp. 33-47. |
Medvinsky, Gennady et al., "NetCash: A design for practical electronic currency on the Internet" University of Southern California Information Science Institute, Nov. 1993, pp. 2-7. |
Memon, Nasir, et al., "Protecting Digital Media Content" Association for Computing Machinery, Communications of the ACM, New York, Jul. 1998, vol. 41, issue 7, pp. 35-43. |
Menezes, Alfred, et al., "Handbook of Applied Cryptography" 1997, sec. 11.5.1, CRC Press, pp. 452-454. |
Messmer, Ellen, "IETF OKs Standard for Encryption," Network World, Feb. 15, 1993, vol. 10, Iss. 7. |
Morizaki, H., "Introduction to Electronic Devices" Gijustsu Hyoron Publishing Co., 1989, pp. 260-266. |
Murphy, Kathleen, "Digimarc Awarded Patent for Digital Watermarking" Business, Mar. 10, 1998, www.internetnews.com/bus-news/article.php/1961 1 , 2 pgs. |
Neuman, Clifford B., Proxy-Based Authorization and Accounting for Distributed Systems, Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993, pp. 283-291. |
Non-Final Office Action; U.S. Appl. No. 11/701,946; Mailed Apr. 29, 2008. |
Official Action in U.S. Appl. No. 11/701,945 issued Nov. 3, 2009, 12 pages. |
Official Action in U.S. Appl. No. 11/701,945 issued Oct. 28, 2010, 15 pages. |
Official Action in U.S. Appl. No. 11/701,946 issued Nov. 4, 2009, 12 pages. |
Official Action in U.S. Appl. No. 11/701,946 issued Sep. 21, 2010, 12 pages. |
Ohtaki, Yasuhiro et al., "Cryptographic Management for Superdistribution" Technical Research Report of Electronic Information Communication Association, Mar. 8, 1991, vol. 90, No. 460, pp. 33-42. |
Response to Official Action in U.S. Appl. No. 11/701,945 issued Nov. 3, 2009, mailed Mar. 2, 2010, 24 pages. |
Response to Official Action in U.S. Appl. No. 11/701,946 issued Apr. 29, 2008, mailed Jul. 28, 2009, 11 pages. |
Response to Official Action in U.S. Appl. No. 11/701,946 issued Nov. 4, 2009, mailed Jan. 4, 2010, 26 pages. |
Rozenblit, M. "Secure Software Distribution" IEEE Network Operations and Management Symposium, vol. 2, Feb. 14-18, 1994, pp. 486-496. |
Rubin, A.D., "Secure Distribution of Electronic Documents in an Hostile Environment" Computer Communications, vol. 18, No. 6, Jun. 1995, pp. 429-434. |
Rubin, A.D., "Trusted Distribution of Software Over the Internet" Network and Distributed System Security, Feb. 16-17, 1995, San Diego, California, pp. 47-53. |
Seki, Kazunori et al., "A Proposal of a New Distribution Scheme for Software Products", Keio Department of Instrumentation Engineering, Faculty of Science and Technology, Keio University, Research report made at the information Processing Association, Japan, Jul. 20, 1993, vol. 93, No. 64, pp. 19-28. |
Tatsuaki Okamoto, "Universal Electronic Cash", Technical Report of Institute of Electronics, Information and Communication Engineers (IEICE) Jul. 15, 1991, vol. 91, No. 127, pp. 39-47. |
Tirkel, A.Z. et al., "Electronic Water Mark", Conference Proceedings Dicta, Dec. 1993, pp. 666-673. |
U.S. Appl. No. 08/733,504, filed Oct. 18, 1996, Saito. |
U.S. Appl. No. 08/846,661, filed May 1, 1997, Saito. |
U.S. Appl. No. 08/895,493, filed Jul. 16, 1997, Saito. |
U.S. Appl. No. 09/362,955, filed Jul. 30, 1999, Saito. |
U.S. Appl. No. 09/476,334, filed Jan. 30, 2000, Saito. |
U.S. Appl. No. 09/665,902, filed Sep. 20, 2000, Saito. |
U.S. Appl. No. 09/985,279, filed Nov. 2, 2001, Saito. |
U.S. Appl. No. 10/013,507, filed Dec. 13, 2001, Saito. |
U.S. Appl. No. 10/170,677, filed Jun. 13, 2002, Saito. |
U.S. Appl. No. 11/404,124, filed Apr. 12, 2006, Saito. |
U.S. Appl. No. 11/441,973, filed May 25, 2006, Saito. |
U.S. Appl. No. 11/446,604, filed Jun. 1, 2006, Saito. |
U.S. Appl. No. 11/469,035, filed Aug. 31, 2006, Saito. |
U.S. Appl. No. 11/480,690, filed Jul. 3, 2006, Saito. |
U.S. Appl. No. 11/491,400, filed Jul. 20, 2006, Saito. |
U.S. Appl. No. 11/496,777, filed Jul. 31, 2006, Saito. |
U.S. Appl. No. 11/512,695, filed Aug. 29, 2006, Saito. |
U.S. Appl. No. 11/512,885, filed Aug. 29, 2006, Saito. |
U.S. Appl. No. 11/556,992, filed Nov. 6, 2006, Saito. |
U.S. Appl. No. 11/701,945, filed Feb. 1, 2007, Saito. |
U.S. Appl. No. 11/701,946, filed Feb. 1, 2007, Saito. |
Van Schyndel, R.G., et al., "A Digital Watermark" IEEE, Australia, 1994, pp. 86-90. |
Vigarie, J. "A Device for Real-Time Modification of . . . " 18th International Television Symposium and Technical Exhibition, Montreaux, Switzerland, Jun. 10-15, 1993, pp. 761-768. |
Wayner, P. "Digital Copyright Protection" AP Professional, 1997, pp. 1-7 and 14-17. |
Zhang, N.X. "Secure Code Distribution" IEEE Computer, Jun. 1997, pp. 76-79. |
Also Published As
Publication number | Publication date |
---|---|
JP4101263B2 (en) | 2008-06-18 |
US6463536B2 (en) | 2002-10-08 |
EP1691315A1 (en) | 2006-08-16 |
EP0709760A3 (en) | 1999-02-03 |
DE69535013T2 (en) | 2006-12-28 |
DE69535013D1 (en) | 2006-07-06 |
US6097818A (en) | 2000-08-01 |
US6272635B1 (en) | 2001-08-07 |
EP0709760A2 (en) | 1996-05-01 |
US6721887B2 (en) | 2004-04-13 |
USRE41657E1 (en) | 2010-09-07 |
US20020178372A1 (en) | 2002-11-28 |
JP2006085725A (en) | 2006-03-30 |
US20010027522A1 (en) | 2001-10-04 |
JPH08272745A (en) | 1996-10-18 |
EP1691316A1 (en) | 2006-08-16 |
EP0709760B1 (en) | 2006-05-31 |
US5646999A (en) | 1997-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE43599E1 (en) | Data management system | |
US6076077A (en) | Data management system | |
EP0878753A2 (en) | Data content dealing system | |
USRE42163E1 (en) | Data management system | |
US6449717B1 (en) | Data copyright management system | |
US6069952A (en) | Data copyright management system | |
US5974141A (en) | Data management system | |
US6002772A (en) | Data management system | |
US6741991B2 (en) | Data management system | |
US20070038575A1 (en) | Data copyright management system | |
US9245260B2 (en) | Data copyright management | |
US8595502B2 (en) | Data management system | |
EP0864959A2 (en) | Data management system | |
JP3173352B2 (en) | Digital work distribution system | |
EP0833241B1 (en) | Secure data management system | |
JPH08185448A (en) | System and device for managing data copyright | |
JP4431306B2 (en) | Terminal device, video conference data management method, and program | |
JP2001350727A (en) | Contents distribution system | |
JP4030486B2 (en) | Terminal device, digital cash management system | |
JP2004048557A (en) | Device, method and program of contents distribution and recording medium | |
JP2010193506A (en) | Data content distribution system | |
JP4845772B2 (en) | Data management system | |
JP2003242286A (en) | Terminal device and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MITSUBISHI CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SAITO, MAKOTO;REEL/FRAME:019256/0886 Effective date: 19961001 Owner name: INTARSIA SOFTWARE LLC, NEVADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:019257/0350 Effective date: 20050208 |
|
CC | Certificate of correction | ||
AS | Assignment |
Owner name: XYLON LLC, NEVADA Free format text: MERGER;ASSIGNOR:INTARSIA SOFTWARE LLC;REEL/FRAME:036743/0455 Effective date: 20150813 |
|
AS | Assignment |
Owner name: LF CAPITAL PARTNERS, LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 121 LLC;REEL/FRAME:049425/0896 Effective date: 20181219 |
|
AS | Assignment |
Owner name: PIRACY PROTECTION LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LF CAPITAL PARTNERS, LLC;REEL/FRAME:051364/0522 Effective date: 20190911 |