Data management system
First Claim
1. A method for managing the use of data content by a data management center comprising a data center and a key center, said method comprising the steps of:
- said key center receiving a data content name, first user data, and a request for distribution of a first secret-key and a second secret-key from a first user;
said key center generating said first secret-key and said second secret-key, storing said data content name, first user data, first secret-key and second secret-key, and distributing said first secret-key and second secret-key to said first user;
said first user storing said first secret-key and said second secret-key in a storage unit;
said first user presenting said first user data to said data center, specifying said data content name, and requesting said data center to distribute said data content;
said data center transferring said first user data and said data content name to said key center and requesting transfer of said first secret-key and said second secret-key;
said key center transferring said first secret-key and said second secret key to said data center;
said data center entering said first user data as an electronic watermark in said data content requested by said first user, editing said data content to a first edited data content, encrypting said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributing said encrypted first edited data content to said first user, and storing a first scenario of editing process of said first edited data content;
said first user decrypting said encrypted first edited data content using said first secret-key and using said first edited data content thus decrypted, and abandoning said first secret key;
said first user encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content;
said first user re-decrypting said encrypted first edited data content using said second secret-key and re-using said first edited data content;
said first user re-encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content;
said first user entering a second user data as an electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypting said second edited data content using said second secret-key to obtain an encrypted second edited data content, transferring said encrypted second edited data content to a second user, and transferring a second scenario of editing process of said second edited data content to said key center;
said key center registering said second scenario of editing process;
said second user specifying said data content name to said key center, presenting said second user data, and requesting distribution of said second secret-key and a third secret-key;
said key center confirming by said second scenario that said second user is a valid user, generating and storing said third secret-key, and distributing said second secret-key and said third secret-key to said second user;
said second user decrypting said encrypted second edited data content using said second secret-key, using said second edited data content thus decrypted, and abandoning said second secret-key;
said second user re-encrypting said second edited data content using said third secret-key and storing said encrypted second edited data content;
said second user decrypting said encrypted second edited data content using said third secret-key and re-using said second edited data content;
said second user re-encrypting said second edited data content using said third secret-key and storing said encrypted second edited data content.
5 Assignments
0 Petitions
Accused Products
Abstract
To prevent piracy or leakage of data content, a cryptography technique and electronic watermark technique are combined together and used. In a data content supplied to a user, a user data is entered as electronic watermark by a data management center, and the data content with an electronic watermark entered in it is encrypted using a crypt key and is supplied. The encrypted data content is decrypted using a crypt key distributed from the data management center and is used. In case it is to be stored, it is encrypted using another crypt key. In case the data content is copied and transferred to other user, a user data of the other user is entered as electronic watermark, and a scenario to enter the user data of the other user as electronic watermark is registered at the data management center, and the data content with electronic watermark entered in it is encrypted using another crypt key and is supplied. When the validity of the other user is confirmed by the scenario, another crypt key is distributed to the other user. The encrypted data content is decrypted using another crypt key and is used. When it is to be stored, it is encrypted using still another key. In case the data content has been copied and transferred illegitimately, it is possible by verifying the electronic watermark to identify the user who has copied and transferred the data content illegitimately.
-
Citations
3 Claims
-
1. A method for managing the use of data content by a data management center comprising a data center and a key center, said method comprising the steps of:
-
said key center receiving a data content name, first user data, and a request for distribution of a first secret-key and a second secret-key from a first user; said key center generating said first secret-key and said second secret-key, storing said data content name, first user data, first secret-key and second secret-key, and distributing said first secret-key and second secret-key to said first user; said first user storing said first secret-key and said second secret-key in a storage unit; said first user presenting said first user data to said data center, specifying said data content name, and requesting said data center to distribute said data content; said data center transferring said first user data and said data content name to said key center and requesting transfer of said first secret-key and said second secret-key; said key center transferring said first secret-key and said second secret key to said data center; said data center entering said first user data as an electronic watermark in said data content requested by said first user, editing said data content to a first edited data content, encrypting said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributing said encrypted first edited data content to said first user, and storing a first scenario of editing process of said first edited data content; said first user decrypting said encrypted first edited data content using said first secret-key and using said first edited data content thus decrypted, and abandoning said first secret key; said first user encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content; said first user re-decrypting said encrypted first edited data content using said second secret-key and re-using said first edited data content; said first user re-encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content; said first user entering a second user data as an electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypting said second edited data content using said second secret-key to obtain an encrypted second edited data content, transferring said encrypted second edited data content to a second user, and transferring a second scenario of editing process of said second edited data content to said key center; said key center registering said second scenario of editing process; said second user specifying said data content name to said key center, presenting said second user data, and requesting distribution of said second secret-key and a third secret-key; said key center confirming by said second scenario that said second user is a valid user, generating and storing said third secret-key, and distributing said second secret-key and said third secret-key to said second user; said second user decrypting said encrypted second edited data content using said second secret-key, using said second edited data content thus decrypted, and abandoning said second secret-key; said second user re-encrypting said second edited data content using said third secret-key and storing said encrypted second edited data content; said second user decrypting said encrypted second edited data content using said third secret-key and re-using said second edited data content; said second user re-encrypting said second edited data content using said third secret-key and storing said encrypted second edited data content.
-
-
2. A method for managing the use of data content by a data management center comprising a data center and a key center, said method comprising the steps of:
-
said key center receiving a data content name, first user data, and a request for distribution of a first secret-key and a second secret-key from a first user; said key center generating said first secret-key and said second secret-key, storing said data content name, first user data, first secret-key and second secret-key, and distributing said first secret-key and second secret-key to said first user; said first user storing said first secret-key and said second secret-key in a storage unit; said first user presenting said first user data to said data center, specifying said data content name, and requesting said data center to distribute said data content; said data center transferring said first user data and said data content name to said key center and requesting transfer of said first secret-key and said second secret-key; said key center transferring said first secret-key and said second secret key to said data center; said data center entering said first user data as an electronic watermark in said data content requested by said first user, editing said data content to a first edited data content, encrypting said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributing said encrypted first edited data content to said first user, and storing a first scenario of editing process of said first edited data content; said first user decrypting said encrypted first edited data content using said first secret-key and using said first edited data content thus decrypted, and abandoning said first secret key; said first user encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content; said first user re-decrypting said encrypted first edited data content using said second secret-key and re-using said first edited data content; said first user re-encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content; said first user entering a second user data as an electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypting said second edited data content using said second secret-key to obtain an encrypted second edited data content, transferring said encrypted second edited data content to a second user, and transferring a second scenario of editing process of said second edited data content to said key center; said key center registering said second scenario of editing process; said key center generating a third secret-key, storing said second scenario of editing process and said third secret-key, and distributing said third secret-key to said first user; said first user encrypting said second edited data content using said third secret-key and transferring said encrypted second edited data content to said second user; said second user specifying said data content name to said key center, presenting said second user data, and requesting distribution of said third secret-key and a fourth secret-key; said key center confirming by said second scenario that said second user is a valid user, generating and storing said fourth secret-key, and distributing said third secret-key and said fourth secret-key to said second user; said second user decrypting said encrypted second edited data content using said third secret-key, using said second edited data content thus decrypted, and abandoning said third secret-key; said second user re-encrypting said second edited data content using said fourth secret-key and storing said encrypted second edited data content; said second user decrypting said encrypted second edited data content using said fourth secret-key and re-using said second edited data content; said second user re-encrypting said second edited data content using said fourth secret-key and storing said encrypted second edited data content.
-
-
3. A method for managing the use of data content by a data management center comprising a data center and a key center, said method comprising the steps of:
-
said data management center receiving a data content name, first user data, and a request for distribution of a first secret-key, a second secret-key, and a first data content from a first user; said data management center generating said first secret-key and said second secret-key, storing said data content name, said first user data, said first secret-key and said second secret-key, entering said first user data as an electronic watermark in said first data content to edit said first data content to a first edited data content, encrypting said first edited data content using said first secret-key to obtain an encrypted first edited data content, distributing said encrypted first edited data content to said first user, and storing a first scenario of editing process of said first edited data content; said first user storing said first secret-key and said second secret-key in a storage unit, decrypting said encrypted first edited data using said first secret key, using said first edited data content thus encrypted, and abandoning said first secret-key; said first user encrypting said first edited data content using said second secret-key and storing said encrypted first edited data content in said storage unit; said first user decrypting said encrypted first edited data content again using said second secret-key and re-using said first edited data content; said first user re-encrypting said first edited data content again using said second secret-key and storing said encrypted first edited data content in said storage unit; said first user entering a second user data as an electronic watermark in said first edited data content to edit said first edited data content to a second edited data content, encrypting said second edited data content using said second secret-key to obtain an encrypted second edited data content, transferring said encrypted second edited data content to a second user, and transferring a second scenario of editing process of said second edited data content to said data management center; said data management center registering said second scenario of editing process; said second user specifying said data content name to said data management center, presenting said second user data to said data management center, and requesting distribution of said second secret-key and a third secret-key; said data management center confirming by said second scenario of editing process that said second user is a valid user, generating and storing said third secret-key, and distributing said second secret-key and said third secret-key to said second user; said second user decrypting said encrypted second edited data using said second secret-key, using said second edited data content thus decrypted, and abandoning said second secret-key; said second user re-encrypting said second edited data content using said third secret-key and storing said encrypted second edited data content; said second user decrypting said encrypted second edited data content using said third secret-key and re-using said second edited data content; said second user re-encrypting said second edited data content and storing said encrypted second edited data content.
-
Specification