Systems and methods for authoring and protecting digital property
First Claim
1. A method for authoring data for electronic distribution comprising:
- protecting data portions by encrypting the data portions with a data key;
encrypting a data decrypting key with an encrypting key;
storing rules in a storage device, the rules defining constraints associated with access rights to the data portions; and
distributing the data portions such that the protected data portions may be accessed via an access control mechanism and redistribution of the protected data portions is governed by the access control mechanism.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and device are provided for controlling access to data. Portions of the data are protected and rules concerning access rights to the data are determined. Access to the protected portions of the data is prevented, other than in a non-useable form; and users are provided access to the data only in accordance with the rules as enforced by a mechanism protected by tamper detection. A method is also provided for distributing data for subsequent controlled use of those data. The method includes protecting portions of the data; preventing access to the protected portions of the data other than in a non-useable form; determining rules concerning access rights to the data; protecting the rules; and providing a package including: the protected portions of the data and the protected rules. A user is provided controlled access to the distributed data only in accordance with the rules as enforced by a mechanism protected by tamper protection. A device is provided for controlling access to data having protected data portions and rules concerning access rights to the data. The device includes means for storing the rules; and means for accessing the protected data portions only in accordance with the rules, whereby user access to the protected data portions is permitted only if the rules indicate that the user is allowed to access the portions of the data.
65 Citations
38 Claims
-
1. A method for authoring data for electronic distribution comprising:
-
protecting data portions by encrypting the data portions with a data key;
encrypting a data decrypting key with an encrypting key;
storing rules in a storage device, the rules defining constraints associated with access rights to the data portions; and
distributing the data portions such that the protected data portions may be accessed via an access control mechanism and redistribution of the protected data portions is governed by the access control mechanism. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authoring data for electronic distribution comprising:
-
protected data portions by encrypting the data portions with a data key;
for each of a plurality of key encrypting keys, encrypting a data decrypting key with the respective key encrypting key (KR) to produce a plurality of encrypted data decryption keys;
protecting rules defining constraints associated with access rights to the data, the rules being configured such that the rules enforce monotonicity of restrictions on protected data portions when the protected data is redistributed; and
distributing the protected data portions, the protected rules, and at least one of the encrypted data decryption keys. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of producing a movie comprising:
-
encrypting at least some of the data portions representing the movie using a data key (KD) to create protected data portions;
storing the protected data portions;
encrypting a data decrypting key (KD′
) with a key-encrypting key (KR);
providing rules associated with the movie, the rules defining constraints including an inheritance rule defining rights to create a derivative work including at least one of the data portions associated with the movie and defining a set of rules to be associated with the derivative work, the set of rules associated with the derivative work being associated only with those data portions associated with the movie. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of producing a movie comprising:
-
protecting data portions associated with the movie using a data key (KD);
storing the protected data portions;
for each of a plurality of key encrypting keys (KR) encrypting the data decrypting key (KD′
) with a respective key encrypting key (KR) after obtaining the data key (KD) using a respective data decrypting key (KD′
) to provide a plurality of users with access to the encrypted data portions;
storing at least some of the encrypted data keys;
providing rules associated with the movie, the rules defining constraints including an inheritance rule defining rights to create a derivative work including at least one of the data portions associated with the movie and defining a set of rules to be associated with the derivative work, the set of rules associated with the derivative work being associated only with those data portions associated with the movie;
storing the rules associated with the movie; and
transmitting the protected data portions, at least some of the encrypted data keys, and the rules associated with a movie to an output device. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification