×

Data management system

  • US 20020059238A1
  • Filed: 11/02/2001
  • Published: 05/16/2002
  • Est. Priority Date: 09/30/1994
  • Status: Active Grant
First Claim
Patent Images

1. A data management system, in which users utilize data content of a data center, whereby:

  • a data management center comprises a data center and a key center;

    a first user specifies a data content name to said key center, presents a user data and requests a distribution of a first secret-key and a second secret-key;

    when requested to distribute said first secret-key and said second secret-key, said key center generates said first secret-key and said second secret-key, stores said data content name, a first user data, said first secret-key and said second secret-key, and distributes said first secret-key and said second secret-key to said first user;

    when said first secret-key and said second secret-key are distributed, said first user stores said first secret-key and said second secret-key in a storage unit;

    when said first secret-key and said second secret-key are stored in said storage unit, said first user presents said first user data, specifies said data content name, and requests said data center to distribute the data content;

    when requested to distribute said data content, said data center transfers said first user data and said data content name presented by said first user to said key center, asking to transfer said first secret-key and said second secret-key;

    when said first user data and said data content name are transferred, said key center transfers said first secret-key and said second secret-key to said data center;

    when said first secret-key and said second secret-key are transferred, said data center enters said first user data as electronic watermark in said data content requested by said first user and edits said data content to a first edited data content, encrypts said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributes said encrypted first edited data content to said first user and stores a first scenario of editing process of said first edited data content;

    when said encrypted first edited data content is distributed, said first user decrypts said encrypted first edited data content using said first secret-key and uses said first edited data content thus decrypted, and said first secret-key is abandoned at this time;

    when said first edited data content is stored in the storage unit, said first edited data content is encrypted using said second secret-key and is stored;

    when said encrypted first edited data content is re-used, said encrypted first edited data content is re-decrypted using said second secret-key and re-used;

    when said first edited data content is stored again, said first edited data content is encrypted again using said second secret-key and is stored;

    when said first user transfers said first edited data content to a second user, said first user enters a second user data as electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypts said second edited data content using said second secret-key to obtain an encrypted second edited data content, transfers said encrypted second edited data content to said second user, and a second scenario of editing process of said second edited data content is transferred to said key center and is registered;

    when said encrypted second edited data content is transferred, said second user specifies said data content name to said key center, presents said second user data, and requests distribution of said second secret-key and a third secret-key;

    when requested to distribute said second secret-key and said third secret-key, said key center confirms by said second scenario that said second user is a valid user, generates and stores said third secret-key, and distributes said second secret-key and said third secret-key to said second user;

    when said second secret-key and said third secret-key are distributed, said second user decrypts said encrypted second edited data content using said second secret-key and uses said second edited data content thus decrypted, and said second secret-key is abandoned at this time;

    when said second edited data content is stored, said second edited data content is re-encrypted using said third secret-key and is stored;

    when said encrypted second edited data content is re-used, said encrypted second edited data content is decrypted using said third secret-key and is re-used;

    when said second edited data content is stored again, said second edited data content is re-encrypted using said third secret-key and is stored again; and

    the same operation is repeated thereafter.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×