Data copyright management system
4 Assignments
0 Petitions
Accused Products
Abstract
A data copyright management system comprises a database for storing original data, a key control center for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections. Data supplied from the database to users is encrypted and distributed. The users decrypts the encrypted data by crypt keys obtained from the key control center or copyright management center. To supply data to users, there are the following two methods: a one-way supplying of encrypted data to users by means of broadcasting or the like; and two-way supplying of encrypted data to users corresponding to users'"'"' requests. A crypt key system used for encrypting data uses a secret-key cryptosystem, a public-key cryptosystem or a cryptosystem combining a secret-key and a public-key and further uses a copyright control program to control data copyrights. When a user stores, copies, or transfers data, the data is encrypted by a crypt key different from a crypt key used for supplying the data. The former crypt key is supplied from the key control center or from the copyright management center, or generated by the copyright control program. The present invention can be applied to a data copyright management system for using not only single data but also a plurality of data supplied from a single database or a plurality of data supplied from a plurality of databases. Further, an apparatus to be used by the user to perform data copyright management is proposed.
106 Citations
149 Claims
-
1-70. -70. (canceled)
-
71. A terminal device comprising:
-
means for receiving a first encryption-key and a second encryption-key from a copy management system;
means for receiving encrypted data;
means for decrypting said encrypted data according to said first encryption-key for display; and
means for re-encrypting said displayed data according to said second encryption-key. - View Dependent Claims (72, 75, 76, 77, 78, 79, 80, 81, 82)
-
-
73. A terminal device comprising:
-
means for receiving a first encryption-key and a second encryption-key from a copy management system;
means for receiving encrypted data;
means for decrypting said encrypted data to decrypted data according to said first encryption-key;
means for processing said decrypted data; and
means for re-encrypting said processed data to re-encrypted data using said second encryption-key. - View Dependent Claims (74)
-
-
83. A terminal device comprising:
-
means for receiving a decryption key to decrypt the encrypted data received from a copy management system;
means for decrypting said encrypted data to decrypted data for display according to said decryption key; and
means for encrypting said decrypted data to re-encrypted data according to an encryption key prior to said decrypted data being stored, copied and/or transferred.
-
-
84. A terminal device for communicating with a copy management system, said terminal device comprising:
-
means for receiving a decryption key from the copy management system;
means for decrypting encrypted data to decrypted data according to said decryption key;
means for processing said decrypted data; and
re-encrypting means for encrypting said processed data to re-encrypted data using an encryption key prior to the processed data being stored, copied and/or transferred.
-
-
85. A data copy management system, said data copy management system comprising:
-
a copy management center; and
a database comprising;
means for receiving a request of use, presenting primary user information from a primary user terminal;
means for transferring a first encryption-key, a second encryption key and an encrypted copy management program to the primary user terminal; and
means for transferring the primary user information to the copy management center.
-
-
86. A method comprising:
-
receiving primary user information from a primary user terminal;
transferring a first encryption-key to encrypt requested data using the first encryption-key and to decrypt the encrypted data;
transferring a second encryption-key to re-encrypt the decrypted data;
transferring an encrypted copy management program to the primary user terminal; and
transferring the primary user information to the copy management center.
-
-
87. A terminal device comprising:
-
a key receiving unit to receive a first encryption-key and a second encryption-key from the copy management system;
a data receiving unit to receive encrypted data;
a decrypting unit to decrypt said encrypted data to provide decrypted data according to said first encryption-key in response to processing said encrypted data; and
an encrypting unit to re-encrypt said displayed data according to said second encryption-key.
-
-
88. A computer-readable storage medium having stored thereon machine-readable instructions operable to:
-
receive a first encryption-key and a second encryption-key;
receive encrypted data;
decrypt said encrypted data to decrypted data according to said first encryption-key in response to display of said encrypted data; and
re-encrypt said displayed data according to said second encryption-key. - View Dependent Claims (89)
-
-
90. A computer-readable storage medium having machine-readable instructions stored thereon operable to:
-
receive a first encryption-key and a second encryption-key from a copy management system;
receive encrypted data;
decrypt said encrypted data to decrypted data according to said first encryption-key in response to processing said encrypted data; and
re-encrypt said processed data according to said second encryption-key. - View Dependent Claims (91)
-
-
92. A system comprising:
-
a terminal device capable of receiving data;
a copy management system is capable of managing a copying of data supplied as encrypted data from a database, wherein said database is capable of supplying an encrypted copy management system;
said copy management system capable of decrypting said encrypted data in response to processing of said encrypted data according to a first encryption key; and
said copy management system further is capable of re-encrypting said decrypted data to re-encrypted data according to a second encryption key. - View Dependent Claims (93, 94, 95, 96)
-
-
97. A method comprising:
-
communicating with a copy management system capable of managing copying of data;
supplying encrypted data from a database to a terminal device;
receiving a first encryption-key and a second encryption-key from the copy management system;
receiving encrypted data;
decrypting said encrypted data to provide decrypted data according to said first encryption-key in response to processing said encrypted data; and
re-encrypting said processed data according to said second encryption-key.
-
-
98. A method comprising:
-
receiving encrypted digital cash data;
decrypting the encrypted digital cash data according to a decryption key;
obtaining a re-encryption key; and
re-encrypting the decrypted digital cash data according to the re-encryption key by a system for handling storage, copy, and/or transmission of the decrypted digital cash data. - View Dependent Claims (99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116)
-
-
117. A method comprising:
-
receiving first user information;
transmitting encrypted digital cash data in response to said receiving;
decrypting the encrypted digital cash data according to a first crypt key;
generating a second crypt key on the basis of the first crypt key; and
re-encrypting the decrypted digital cash data using the second crypt key by a digital cash management program capable of handling storage, copy, and/or transmission of the decrypted digital cash data. - View Dependent Claims (118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 135)
-
-
136. A method comprising:
-
presenting a first public key to a financial organization;
receiving encrypted digital cash data from the financial organization in response to said presenting;
decrypting the encrypted digital cash data using a first private key by a digital cash management program;
receiving a second public key;
re-encrypting the decrypted digital cash data using the second public key;
transmitting the re-encrypted digital cash data; and
decrypting the re-encrypted digital cash data using a second private key by a-digital cash management program. - View Dependent Claims (137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149)
-
Specification