Data copyright management system
First Claim
1. A data copyright management system for managing the copyright of data which is encrypted and supplied from a database to a user, said data copyright management system having the database and a key control center;
- wherein a key for decrypting said encrypted data is supplied from said key control center to said user;
said user uses said key for decrypting when said user displays or edits said data to decrypt said encrypted data; and
said data is re-encrypted when said user stores, copies or transfers said data or data which has been edited.
7 Assignments
0 Petitions
Accused Products
Abstract
A data copyright management system comprises a database for storing original data, a key control center for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections. Data supplied from the database to users is encrypted and distributed. The users decrypts the encrypted data by crypt keys obtained from the key control center or copyright management center. To supply data to users, there are the following two methods: a one way supplying of encrypted data to users by means of broadcasting or the like; and two-way supplying of encrypted data to users corresponding to users'"'"' requests. A crypt key system used for encrypting data uses a secret-key cryptosystem, a public-key cryptosystem or a cryptosystem combining a secret-key and a public-key and further uses a copyright control program to control data copyrights. When a user stores, copies, or transfers data, the data is encrypted by a crypt key different from a crypt key used for supplying the data. The former crypt key is supplied from the key control center or from the copyright management center, or generated by the copyright control program. The present invention can be applied to a data copyright management system for using not only single data but also a plurality of data supplied from a single database or a plurality of data supplied from a plurality of databases. Further, an apparatus to be used by the user to perform data copyright management is proposed.
135 Citations
70 Claims
-
1. A data copyright management system for managing the copyright of data which is encrypted and supplied from a database to a user, said data copyright management system having the database and a key control center;
-
wherein a key for decrypting said encrypted data is supplied from said key control center to said user;
said user uses said key for decrypting when said user displays or edits said data to decrypt said encrypted data; and
said data is re-encrypted when said user stores, copies or transfers said data or data which has been edited. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A data copyright management system for using data encrypted and supplied from a database to a user, said data copyright management system comprising the database, a key control center and a copyright management center,
wherein said data copyright management system uses secret-key, user information and copyright control program; -
said database encrypts the data with first secret-key to distribute the data to a first user via communication network, communication and broadcasting satellite, and record medium;
said first user provides the first user information to said key control center to request the use;
said key control center transfers said first user information to said copyright management center;
said key control center transfers the copyright control program together with said first secret-key and second secret-key to said first user via said communication network;
said first user uses said first secret-key with said copyright control program to decrypts aid encrypted data for use; and
said data decrypted is re-encrypted in the case where said decrypted data is stored, copied or transmitted with said copyright control program by using said second secret-key, and uncrypted-first user information is added. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A data copyright management system for using data encrypted and supplied from a database to a user, said data copyright management system comprising a database, a key control center and a copyright management center;
-
wherein said data copyright management system uses secret-key, user information and copyright control program;
first user presents the first user information to the database to request the use of the data;
said database encrypts requested said data by using first secret-key and transfers it to said first user via said communication network together with said first secret-key, second secret-key and said copyright control program;
said key control center transfers said first user information to said copyright management center;
said key control center transfers the copyright control program together with said first and second secret-keys to said first user via said communication network;
said first user decrypts and uses said encrypted data with said copyright control program by using said first secret-key; and
said data decrypted is re-encrypted when said decrypted data is stored copied or transmitted with said copyright control program by using said second secret-key, and uncrypted first user information is added. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A data copyright management system for using data encrypted and supplied from a database to a user, said data copyright management system comprising a database, a key control center and a copyright management center;
-
said data copyright management system uses secret-key, public-key and private-key;
first user presents first public-key, second public-key and first user information to request the use of the desired data to said key control center;
said database which receives the request for use encrypts said data by using first secret-key, encrypts said first secret-key by using said first public-key, and encrypts second secret-key by using said second public-key;
said encrypted data, said encrypted first secret-key, said encrypted second secret-key and said copyright control program are transmitted to said first user;
said first user decrypts said encrypted first secret-key by using first private-key, decrypts said encrypted data by using said decrypted first secret-key, and decrypts said encrypted second secret-key by using second private-key, with said copyright control program;
said data is encrypted and decrypted with said copyright control program by using the second secret-key in the case where said decrypted data is stored, copied or transmitted. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A data copyright management system for using a plurality of data encrypted each by different secret-keys and supplied from database to a user, said system using a secret-key, user information and a copyright control program, said data copyright management system comprising:
-
first user obtaining from a copyright management center a plurality of copyright control programs unique to original said plurality of data and a plurality of first secret-keys to decrypt said plurality of original data with a plurality of said first secret-keys;
one or a plurality of second secret-keys being generated with a plurality of copyright control programs unique to said plurality of original data;
wherein said plurality of original data which are used or edited are encrypted with said one or a plurality of second secret-keys with said plurality of copyright control programs unique to said plurality of original data to be stored, copied or transmitted together with the edition process data; and
said plurality of original data or said plurality of edited data encrypted with said one or plurality of second secret-keys are decrypted with said one or plurality of second secret-keys and said plurality of copyright control programs obtained from said copyright management center for second user to use and edit by using said edition process. - View Dependent Claims (33)
-
-
34. A data copyright management system for using data encrypted and supplied from a database to a user, using a crypt key, user information and a copyright control program, comprising:
-
said user presenting user information to said database;
said database supplying said data encrypted with first crypt key to first user;
said first user generating a second crypt key based on said first crypt key with said copyright control program;
said encrypted data being decrypted by using said first crypt key in the case where said first user uses said encrypted data; and
said decrypted data being reencrypted by using said second crypt key in the case where said first user stores, copies or transmits said decrypted data. - View Dependent Claims (35, 36)
-
-
37. A digital cash management system for using digital cash encrypted and supplied from a financial organization to first user, comprising:
-
said financial organization supplying a key for decrypting said encrypted digital cash data to said first user;
said digital cash data being decrypted by using said decrypting key in the case where said first use confirms said digital cash data; and
said data being reencrypted in the lase where said first user stores said decrypted digital cash case where changed digital cash data is stored, or in the case where digital cash data is transmitted to said second user. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A digital cash management system for using digital cash encrypted and supplied from a financial organization to a first user, said system using a crypt key, user information and digital cash management program, comprising:
-
said first user presenting the first user information to said financial organization;
said financial organization providing said first user with said digital cash data encrypted by the first crypt key;
wherein said first user generates a second crypt key on the basis of said first crypt key with said digital cash management program;
said encrypted digital cash data is decrypted by using said first crypt key in the case where said first user confirms said encrypted digital cash data;
said digital cash data decrypted is reencrypted by using said second crypt key to be stored said first user;
said decrypted digital cash data is reencrypted by using said second crypt key and said digital cash data reencrypted is transmitted to second user together with said first user information in the case where said decrypted digital cash data is transmitted to said second user;
said first user information is presented to said financial organization from said second user;
said financial organization generates said second crypt key based on said first user information and transfers said second crypt key to said second user; and
said second user decrypts said reencrypted digital cash data with said digital cash management program by using said second crypt key which is transferred. - View Dependent Claims (51, 52)
-
-
53. A digital cash management system for using a digital cash encrypted and supplied from a financial organization to first user, said system using a public-key and a private-key, comprising:
-
said first user presenting first public-key to said financial organization;
said financial organization encrypting digital cash data with said first public-key to supply to said first user;
said first user decrypting said digital cash data by using first private-key;
second user presenting second public-key to said first user;
said first user encrypting said digital cash data which is decrypted with said second public-key to transfer to said second user; and
said second user decrypting said digital cash data by using second private-key.
-
-
54. A video conference data management system for using video conference data encrypted and supplied from first user to second user, comprising:
-
a key for decrypting said encrypted video conference data being supplied from said first user to said second user;
said encrypted video conference data being decrypted by using said decrypting key in the case where said second user uses said video conference data; and
said data being reencrypted in the case where said second user stores decrypted said video conference data, in the case where edited video conference data is stored, or in the case where said video conference data is transmitted to third user. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A video conference data management system for using video conference data encrypted and supplied from first user to second user, said system using a crypt key, user information, and video conference data management program:
-
wherein said second user presents second user information to said first user;
said first user supplies to said second user said video conference data encrypted with the first crypt key;
said second user uses said video conference data management program to generate the second crypt key based on said first crypt key;
said encrypted video conference data is decrypted by using said first crypt key in the case where said second user uses said encrypted video conference data; and
said decrypted video conference data is reencrypted by using said second crypt key in the case where said second user stores, copies or transmits said decrypted video conference data. - View Dependent Claims (68, 69)
-
-
70. A data copyright management apparatus connected for use to a system bus in main body of user terminal, comprising a microprocessor, a read only memory, reading and writing memory and EEPROM connected to a microprocessor bus:
Specification