Data application method
First Claim
1. A data application method for distributing digital content including moving-image data, the data application method comprising:
- a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key;
a step of generating watermarked second data in which the encryption key is embedded, as an invisible electronic watermark, into second data for permitting use unconditionally; and
a step of compositing and distributing the encrypted first data and the watermarked second data.
1 Assignment
0 Petitions
Accused Products
Abstract
Data application method enabling evaluations to be properly received while content is being protected, enabling content users to use only what they want to use in the amount they want to use it, and enabling advertising providers in certainty to have users use ads. The method includes: a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key; a step of generating watermarked second data in which the encryption key is embedded, as an invisible electronic watermark, into second data for permitting use unconditionally; and a step of compositing and distributing the encrypted first data and the watermarked second data.
41 Citations
19 Claims
-
1. A data application method for distributing digital content including moving-image data, the data application method comprising:
-
a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key;
a step of generating watermarked second data in which the encryption key is embedded, as an invisible electronic watermark, into second data for permitting use unconditionally; and
a step of compositing and distributing the encrypted first data and the watermarked second data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data application method for distributing digital content including moving-image data, the data application method comprising:
-
a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key;
a step of generating second data for permitting use unconditionally, and third data in which the encryption key is embedded as metadata; and
a step of compositing and distributing the encrypted first data, the second data and the third data. - View Dependent Claims (9, 10, 11)
-
-
12. A data use device for using digital content including encrypted first data into which first data is encrypted by means of predetermined encryption keys, and watermarked second data in which the encryption keys are embedded as invisible electronic watermarks, the data use device comprising:
-
an encryption-key extraction means for extracting encryption keys from the watermarked second data;
a data decryption means for decrypting, utilizing encryption keys extracted by said encryption-key extraction means, the encrypted first data into the first data;
an authentication means for verifying whether or not predetermined conditions for using the first data are met; and
a data output means for causing to be executed, based on user instructions and on results of verification by said authentication means, decryption of the first data by said encryption-key extraction means and said data decryption means, and for reproducing the decrypted first data as output or otherwise reproducing the second data as output. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer product for a data use device using digital content including encrypted first data into which first data is encrypted by means of predetermined encryption keys, and watermarked second data in which the encryption keys are embedded as invisible electronic watermarks, the computer product for causing a computer to function as a data use device comprising:
-
an encryption-key extraction means for extracting encryption keys from the watermarked second data;
a data decryption means for decrypting, utilizing encryption keys extracted by said encryption-key extraction means, the encrypted first data into the first data;
an authentication means for verifying whether or not predetermined conditions for using the first data are met; and
a data output means for causing to be executed, based on user instructions and on results of verification by said authentication means, decryption of the first data by encryption-key extraction output and said data decryption means, and for reproducing the decrypted first data as output or otherwise reproducing the second data as output.
-
Specification