Digital literary work protection system and digital literary work protection method
First Claim
1. A digital content protection system for legally transmitting and receiving encrypted digital content, comprising:
- a first device operable to transmit encrypted digital content;
a second device operable to receive digital content from the first device; and
a specific server which stores device identifiers for several devices, each device identifier being unique to each device, and further storing information relating to an authentication procedure usable by each device, with the information relating to an authentication procedure being linked to the unique device identifier, wherein the first device determines whether an identifier unique to the second device is stored on the specific server, if the unique identifier is stored on the server, the first device determines that the second device is a legal device, and also determines, from the server, the appropriate authentication procedure for the second device based on the identifier, if the first device has the determined authentication procedure, the first device uses the determined procedure to verify the authenticity of the second device, or if the first device does not have the determined authentication procedure, the first device acquires the authentication procedure from an external and then uses the acquired procedure to validate the second device.
3 Assignments
0 Petitions
Accused Products
Abstract
In a digital content protection system for legally transmitting encrypted digital content from a transmitting device (20) to a receiving device (30), unique device identifiers for devices are registered to a specific server (40) in advance. The server (40) also stores in advance information relating to an authentication method usable by each device, associating the information relating to an authentication method with the unique device identifiers. The transmitting device (20) determines whether an identifier unique to the second device is stored on the server (40). If stored, the transmitting device (20) determines that the receiving device (30) is legal and determines from the server (40) the appropriate authentication procedure. If the transmitting device (20) has the determined procedure, the transmitting device (20) uses this procedure to verify the authenticity of the receiving device (30). If the transmitting device (20) does not have the determined procedure, the transmitting device acquires the authentication procedure from an external and then uses the acquired procedure to validate the receiving device (30).
35 Citations
12 Claims
-
1. A digital content protection system for legally transmitting and receiving encrypted digital content, comprising:
-
a first device operable to transmit encrypted digital content;
a second device operable to receive digital content from the first device; and
a specific server which stores device identifiers for several devices, each device identifier being unique to each device, and further storing information relating to an authentication procedure usable by each device, with the information relating to an authentication procedure being linked to the unique device identifier, wherein the first device determines whether an identifier unique to the second device is stored on the specific server, if the unique identifier is stored on the server, the first device determines that the second device is a legal device, and also determines, from the server, the appropriate authentication procedure for the second device based on the identifier, if the first device has the determined authentication procedure, the first device uses the determined procedure to verify the authenticity of the second device, or if the first device does not have the determined authentication procedure, the first device acquires the authentication procedure from an external and then uses the acquired procedure to validate the second device. - View Dependent Claims (2)
-
-
3. A receiving device which legally receives encrypted digital content transmitted from a transmitting device, comprising:
-
a private key that cannot be externally read;
a unique identifier that is paired with the private key; and
an encryption/decryption unit for downloading an algorithm from an external, wherein the receiving device transmits information about the unique identifier to the transmitting device to prove the authenticity of the receiving device, when the receiving device is authenticated, the receiving device receives encrypted digital content from the transmitting device, and decrypts the received content using the private key and the encryption/decryption unit according to the algorithm specified by the transmitting device.
-
-
4. A transmitting device which legally transmits encrypted digital content to a receiving device, wherein
the transmitting device is connected over a network to a specific server, the specific server storing identifiers unique to several devices to prove the authenticity of the devices, and also storing information about authentication procedures that can be used by the individual devices with each authentication procedure linked to each unique identifier, the transmitting device determines whether the identifier unique to the receiving device is stored in the specific server, if the unique identifier is stored, the transmitting device determines that the receiving device is legal, and determines the authentication procedure to be used from the specific server based on the unique identifier, and if the transmitting device has the determined authentication procedure, the transmitting device verifies the authenticity of the receiving device using the determined authentication procedure, or if the transmitting device does not have the determined authentication procedure, the transmitting device acquires the authentication procedure from an external and then verifies the receiving device using the acquired authentication procedure.
-
7. A method for legally transmitting encrypted digital content from a first device to a second device, comprising:
-
storing in advance, to a specific server, device identifiers for several devices, each device identifier unique to each device, and further storing in advance, to the specific server, information relating to an authentication procedure usable by each device with the information relating to the authentication procedure being linked to the unique device identifier;
determining whether an identifier unique to the second device is stored on the specific server;
if the unique identifier is stored on the server, determining that the second device is a legal device, and also determining, from the server, the authentication procedure for the second device based on the identifier; and
if the first device has the determined authentication procedure, using the determined procedure to verify the authenticity of the second device;
or if the first device does not have the determined authentication procedure, acquiring the authentication procedure from an external and then using the acquired procedure to validate the second device. - View Dependent Claims (8)
-
-
9. A method for legally receiving at a receiving device encrypted digital content transmitted from a transmitting device, wherein
the receiving device including a private key that cannot be externally read, a unique identifier that is paired with the private key, and an encryption/decryption unit operable to download an algorithm from an external, and the method comprises: -
transmitting information about the unique identifier to the transmitting device to prove the authenticity of the receiving device, when the receiving device is authenticated, receiving encrypted digital content from the transmitting device, and decrypting the received content using the private key and the encryption/decryption unit according to the algorithm specified by the transmitting device.
-
-
10. A method for legally transmitting encrypted digital content to a receiving device, comprising:
-
connecting over a network to a specific server, the specific server storing identifiers unique to each of several devices to prove the authenticity of the devices and storing information about the authentication procedures that can be used by the individual receiving devices, with the authentication procedures being linked to the unique identifiers, determining whether the identifier unique to a receiving device is stored in the specific server, if the unique identifier is stored, verifying that the receiving device is legal, and determining the authentication procedure to be used, from the specific server, based on the unique identifier, and if having the determined authentication procedure, verifying the authenticity of the receiving device using the determined authentication procedure, or if does not having the determined authentication procedure, acquiring the authentication procedure from an external and then verifying the receiving device using the acquired authentication procedure. - View Dependent Claims (11, 12)
-
Specification