Data management system
First Claim
1. A data management system, in which users utilize data content of a data center, whereby:
- a data management center comprises a data center and a key center;
a first user specifies a data content name to said key center, presents a user data and requests a distribution of a first secret-key and a second secret-key;
when requested to distribute said first secret-key and said second secret-key, said key center generates said first secret-key and said second secret-key, stores said data content name, a first user data, said first secret-key and said second secret-key, and distributes said first secret-key and said second secret-key to said first user;
when said first secret-key and said second secret-key are distributed, said first user stores said first secret-key and said second secret-key in a storage unit;
when said first secret-key and said second secret-key are stored in said storage unit, said first user presents said first user data, specifies said data content name, and requests said data center to distribute the data content;
when requested to distribute said data content, said data center transfers said first user data and said data content name presented by said first user to said key center, asking to transfer said first secret-key and said second secret-key;
when said first user data and said data content name are transferred, said key center transfers said first secret-key and said second secret-key to said data center;
when said first secret-key and said second secret-key are transferred, said data center enters said first user data as electronic watermark in said data content requested by said first user and edits said data content to a first edited data content, encrypts said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributes said encrypted first edited data content to said first user and stores a first scenario of editing process of said first edited data content;
when said encrypted first edited data content is distributed, said first user decrypts said encrypted first edited data content using said first secret-key and uses said first edited data content thus decrypted, and said first secret-key is abandoned at this time;
when said first edited data content is stored in the storage unit, said first edited data content is encrypted using said second secret-key and is stored;
when said encrypted first edited data content is re-used, said encrypted first edited data content is re-decrypted using said second secret-key and re-used;
when said first edited data content is stored again, said first edited data content is encrypted again using said second secret-key and is stored;
when said first user transfers said first edited data content to a second user, said first user enters a second user data as electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypts said second edited data content using said second secret-key to obtain an encrypted second edited data content, transfers said encrypted second edited data content to said second user, and a second scenario of editing process of said second edited data content is transferred to said key center and is registered;
when said encrypted second edited data content is transferred, said second user specifies said data content name to said key center, presents said second user data, and requests distribution of said second secret-key and a third secret-key;
when requested to distribute said second secret-key and said third secret-key, said key center confirms by said second scenario that said second user is a valid user, generates and stores said third secret-key, and distributes said second secret-key and said third secret-key to said second user;
when said second secret-key and said third secret-key are distributed, said second user decrypts said encrypted second edited data content using said second secret-key and uses said second edited data content thus decrypted, and said second secret-key is abandoned at this time;
when said second edited data content is stored, said second edited data content is re-encrypted using said third secret-key and is stored;
when said encrypted second edited data content is re-used, said encrypted second edited data content is decrypted using said third secret-key and is re-used;
when said second edited data content is stored again, said second edited data content is re-encrypted using said third secret-key and is stored again; and
the same operation is repeated thereafter.
5 Assignments
0 Petitions
Accused Products
Abstract
To prevent piracy or leakage of data content, a cryptography technique and electronic watermark technique are combined together and used. In a data content supplied to a user, a user data is entered as electronic watermark by a data management center, and the data content with an electronic watermark entered in it is encrypted using a crypt key and is supplied. The encrypted data content is decrypted using a crypt key distributed from the data management center and is used. In case it is to be stored, it is encrypted using another crypt key. In case the data content is copied and transferred to other user, a user data of the other user is entered as electronic watermark, and a scenario to enter the user data of the other user as electronic watermark is registered at the data management center, and the data content with electronic watermark entered in it is encrypted using another crypt key and is supplied. When the validity of the other user is confirmed by the scenario, another crypt key is distributed to the other user. The encrypted data content is decrypted using another crypt key and is used. When it is to be stored, it is encrypted using still another key. In case the data content has been copied and transferred illegitimately, it is possible by verifying the electronic watermark to identify the user who has copied and transferred the data content illegitimately.
-
Citations
4 Claims
-
1. A data management system, in which users utilize data content of a data center, whereby:
-
a data management center comprises a data center and a key center;
a first user specifies a data content name to said key center, presents a user data and requests a distribution of a first secret-key and a second secret-key;
when requested to distribute said first secret-key and said second secret-key, said key center generates said first secret-key and said second secret-key, stores said data content name, a first user data, said first secret-key and said second secret-key, and distributes said first secret-key and said second secret-key to said first user;
when said first secret-key and said second secret-key are distributed, said first user stores said first secret-key and said second secret-key in a storage unit;
when said first secret-key and said second secret-key are stored in said storage unit, said first user presents said first user data, specifies said data content name, and requests said data center to distribute the data content;
when requested to distribute said data content, said data center transfers said first user data and said data content name presented by said first user to said key center, asking to transfer said first secret-key and said second secret-key;
when said first user data and said data content name are transferred, said key center transfers said first secret-key and said second secret-key to said data center;
when said first secret-key and said second secret-key are transferred, said data center enters said first user data as electronic watermark in said data content requested by said first user and edits said data content to a first edited data content, encrypts said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributes said encrypted first edited data content to said first user and stores a first scenario of editing process of said first edited data content;
when said encrypted first edited data content is distributed, said first user decrypts said encrypted first edited data content using said first secret-key and uses said first edited data content thus decrypted, and said first secret-key is abandoned at this time;
when said first edited data content is stored in the storage unit, said first edited data content is encrypted using said second secret-key and is stored;
when said encrypted first edited data content is re-used, said encrypted first edited data content is re-decrypted using said second secret-key and re-used;
when said first edited data content is stored again, said first edited data content is encrypted again using said second secret-key and is stored;
when said first user transfers said first edited data content to a second user, said first user enters a second user data as electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypts said second edited data content using said second secret-key to obtain an encrypted second edited data content, transfers said encrypted second edited data content to said second user, and a second scenario of editing process of said second edited data content is transferred to said key center and is registered;
when said encrypted second edited data content is transferred, said second user specifies said data content name to said key center, presents said second user data, and requests distribution of said second secret-key and a third secret-key;
when requested to distribute said second secret-key and said third secret-key, said key center confirms by said second scenario that said second user is a valid user, generates and stores said third secret-key, and distributes said second secret-key and said third secret-key to said second user;
when said second secret-key and said third secret-key are distributed, said second user decrypts said encrypted second edited data content using said second secret-key and uses said second edited data content thus decrypted, and said second secret-key is abandoned at this time;
when said second edited data content is stored, said second edited data content is re-encrypted using said third secret-key and is stored;
when said encrypted second edited data content is re-used, said encrypted second edited data content is decrypted using said third secret-key and is re-used;
when said second edited data content is stored again, said second edited data content is re-encrypted using said third secret-key and is stored again; and
the same operation is repeated thereafter.
-
-
2. A data management system, in which users utilize data content of a data center, whereby:
-
a data management center comprises a data center and a key center;
a first user specifies a data content name to said key center, presents a user data and requests a distribution of a first secret-key and a second secret-key;
when requested to distribute said first secret-key and said second secret-key, said key center generates said first secret-key and said second secret-key, stores said data content name, the first user data, said first secret-key and said second secret-key, and distributes said first secret-key and said second secret-key to said first user;
when said first secret-key and said second secret-key are distributed, said first user stores said first secret-key and said second secret-key in a storage unit;
when said first secret-key and said second secret-key are stored in the storage unit, said first user presents said first user data, specifies said data content name, and requests to said data center to distribute the data content;
when requested to distribute said data content, said data center transfers said first user data and said data content name presented by said first user to said key center, asking to transfer said first secret-key and said second secret-key;
when said first user data and said data content name are transferred, said key center transfers said first secret-key and said second secret-key to said data center;
when said first secret-key and said second secret-key are transferred, said data center enters said first user data as electronic watermark to said data content requested by said first user and edits said data content to a first edited data content, encrypts said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributes said encrypted first edited data content to said first user and stores a first scenario of editing process of said first edited data content;
when said encrypted first edited data content is distributed, said first user decrypts said encrypted first edited data content using said fist secret-key and uses said first edited data content thus decrypted, and said first secret-key is abandoned at this time;
when said first edited data content is stored in the storage unit, said first edited data content is encrypted using said second secret-key and is stored;
when said encrypted first edited data content is re-used, said encrypted first edited data content is decrypted again using said second secret-key and re-used;
when said first edited data content is stored again, said first edited data content is re-encrypted using said second secret-key and is stored again;
when said first user transfers said first edited data content to a second user, said first user enters a second user data as electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypts said second edited data content using said second secret-key to obtain an encrypted second edited data content, transfers said encrypted second edited data content to said second user, and a second scenario of editing process of said second edited data content is transferred to said key center and is registered;
when said second scenario is transferred, said key center generates a third secret-key, stores said second scenario and said third secret-key, and distributes said third secret-key to said first user;
when said third secret-key is distributed, said first user encrypts said second edited data content using said third secret-key, and transfers the encrypted second edited data content to said second user;
when said encrypted second edited data content is transferred, said second user specifies said data content name to said key center, presents the second user data and requests distribution of said third secret-key and a fourth secret-key;
when requested to distribute said third secret-key and said fourth secret-key, said key center confirms by said second scenario that said second user is a valid user, generates and stores said fourth secret-key, and distributes said third secret-key and said fourth secret-key to said second user;
when said third secret-key and said fourth secret-key are distributed, said second user decrypts said encrypted second edited data content using said third secret-key and uses said second edited data content thus decrypted, and said third secret-key is abandoned at this time;
when said second edited data content is stored, said second edited data content is re-encrypted using said fourth secret-key and is stored;
when the encrypted second edited data content is re-used, said encrypted second edited data content is decrypted using said fourth secret-key and is re-used;
when said second edited data content is stored again, said second edited data content is re-encrypted using said fourth secret-key and is stored again; and
the same operation is repeated thereafter.
-
-
3. A data management system, in which users utilize data content of a data center, whereby:
-
a data management center comprises a data center and a key center;
a first user specifies a data content name to said data management center, presents a user data, and requests a distribution of a first secret-key, a second secret-key and data content;
when requested to distribute said first secret-key, said second secret-key and said data content, said data management center generates said first secret-key and said second secret-key, stores said data content name, the first user data, said first secret-key and said second secret-key, enters said first user data as electronic watermark in said data content to edit said data content to a first edited data content, encrypts said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributes said encrypted first edited data content to said first user, and stores a first scenario of editing process of said first edited data content;
when said first secret-key, said second secret-key and said encrypted first edited data content are distributed, said first user stores said first secret-key and said second secret-key distributed in a storage unit, and decrypts said encrypted first edited data content using said first secret-key and uses said first edited data content thus decrypted, and said first secret-key is abandoned at this time;
when said first edited data content is stored in the storage unit, said first edited data content is encrypted using said second secret-key and is stored;
when said encrypted first edited data content is re-used, said encrypted first edited data content is decrypted again using said second secret-key and re-used;
when said first edited data content is stored again in the storage unit, said first edited data content is re-encrypted using said second secret-key and is stored again;
when said first user transfers said first edited data content to a second user, said first user enters a second user data as electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypts said second edited data content using said second secret-key to obtain an encrypted second edited data content, transfers said encrypted second edited data content to said second user, and a second scenario of editing process of said second edited data content is transferred to said data management center and is registered;
when said encrypted second edited data content is transferred, said second user specifies said data content name to said data management center, presents said second user data, and requests distribution of said second secret-key and a third secret-key;
when requested to distribute said second secret-key and said third secret-key, said data management center confirms by said second scenario that said second user is a valid user, generates and stores said third secret-key, and distributes said second secret-key and said third secret-key to said second user;
when said second secret-key and said third secret-key are distributed, said second user decrypts said encrypted second edited data content using said second secret-key and uses said second edited data content thus decrypted, and said second secret-key is abandoned at this time;
when said second edited data content is stored, said second edited data content is re-encrypted using said third secret-key and is stored;
when said encrypted second edited data content is re-used, said encrypted second edited data content is decrypted using said third secret-key and is re-used;
when said second edited data content is stored again, said second edited data content is re-encrypted using said third secret-key and is stored again; and
the same operation is repeated thereafter.
-
-
4. A data management system, in which users utilize data of a data management center, whereby:
-
a data management program is designed as an object program which stores a user data and a secret-key in a slot;
a first user obtains an encrypted data content encrypted using a first secret-key;
when said encrypted data content is obtained, said first user obtains the data management program object stored in said slot with said first secret-key from said data management center, and stores the first user data in the slot of said data management program object;
when it is confirmed by the data management program that said first user data is already stored in the data management program object, an electronic watermark is generated based on said first user data;
said encrypted data content is decrypted using said first secret-key, and the data content thus decrypted is entered promptly said electronic watermark therein to be a first edited data content;
a second secret-key is generated by said data management program and is stored, and said first secret-key is abandoned at this time;
said first edited data content is then used;
when said first edited data content is stored, said first edited data content is encrypted first using said second secret-key to be an encrypted first edited data content;
when it is confirmed that said first edited data content has been the encrypted first edited data content, said encrypted first edited data content is stored;
when said first user re-uses said encrypted first edited data content, said encrypted first edited data content is decrypted using said second secret-key and is used;
when said first edited data content re-used by said first user is stored, said first edited data content is re-encrypted using said second secret-key, and said encrypted first edited data content is stored;
when said first user copies and transfers said first edited data content to a second user, said first edited data content is encrypted, and the encrypted first edited data content is copied and transferred; and
the same operation is repeated thereafter.
-
Specification