Copy protection of data
First Claim
Patent Images
1. A method of copy protecting data sent from a server to a client for presentation to a user, comprising:
- cryptographically protecting the data;
sending the cryptographically protected data to the client; and
selectively controlling copying functions of the client in respect of the data whilst the data is being held by the client in a form suitable for presentation to the user.
3 Assignments
0 Petitions
Accused Products
Abstract
A copyright protection scheme is provided in which data is downloaded from a server 1, typically over the World Wide Web 2 to a client 3, for presentation to a user. The downloaded data is cryptographically protected, by encryption and hashing. When displayed by the client, storing and copying functions are selectively disabled in respect of the data, in order to to prevent unauthorised copying.
30 Citations
27 Claims
-
1. A method of copy protecting data sent from a server to a client for presentation to a user, comprising:
-
cryptographically protecting the data;
sending the cryptographically protected data to the client; and
selectively controlling copying functions of the client in respect of the data whilst the data is being held by the client in a form suitable for presentation to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of downloading encrypted data from a server to a client, including:
-
registering the client with the server by determining a machine identifier of the client by analysing its hardware and/or its software configuration, transmitting the machine identifier to the server, combining the transmitted machine identifier with a cryptographic key to to form a unique determinator for the client, and transmitting the unique determinator to the client, to be stored therein for use subsequently in identifying the client to the server, to permit encrypted data to be downloaded thereto from the server;
subsequently identifying the client to the server on the basis of the unique determinator; and
thendownloading data encrypted by means of the cryptographic key to the identified client, for decryption by the client using the key from the unique determinator. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification