Method for controlling database copyrights
First Claim
1. A digital data management method, comprising the steps of:
- encrypting digital data to produce encrypted digital data supplied to a user, using a utilization permit key pre-defined to permit at least one of displaying, editing, storing, copying, and transferring of said digital data;
decrypting said encrypted digital data to decrypted digital data by using a display permit key, which is utilization permit key permitting displaying of said digital data, and displaying said decrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using a display permit key, which is said utilization permit key permitting displaying of said digital data, and displaying said decrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using an edit permit key, which is said utilization permit key permitting editing of said digital data, and editing said decrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using a storage permit key, which is said utilization permit key permitting storing of said digital data, encrypting again said decrypted digital data to encrypted digital data by using said storage permit key, and storing said encrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using a copy permit key, which is said utilization permit key permitting copying of said digital data, encrypting again said decrypted digital data to encrypted digital data by using said copy permit key, and copying said encrypted digital data; and
decrypting said encrypted digital data to decrypted digital data by using a transfer permit key, which is said utilization permit key permitting transferring of said digital data, encrypting again said decrypted digital data to encrypted digital data by using said transfer permit key, and transferring said encrypted digital data.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method for controlling copyrights of digital data in a database system including real time transmission of a digital picture. Copyrights are controlled using one or more of the following, as necessary, in addition to a permit key: a copyright control program, copyright information or copyright control message. The copyright control program, the copyright information and the copyright control message are supplied together with the permit key, or they are supplied together with the data. Otherwise, a part of them is supplied together with the permit key and the other part of them is supplied together with the data. The data, the permit key, the copyright control message, the copyright information and the copyright control program are (1) transmitted while encrypted, but are decrypted when used, or (2) they are transmitted while encrypted and decrypted for display only, otherwise remaining encrypted, or (3) they may not be encrypted at all.
-
Citations
28 Claims
-
1. A digital data management method, comprising the steps of:
-
encrypting digital data to produce encrypted digital data supplied to a user, using a utilization permit key pre-defined to permit at least one of displaying, editing, storing, copying, and transferring of said digital data;
decrypting said encrypted digital data to decrypted digital data by using a display permit key, which is utilization permit key permitting displaying of said digital data, and displaying said decrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using a display permit key, which is said utilization permit key permitting displaying of said digital data, and displaying said decrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using an edit permit key, which is said utilization permit key permitting editing of said digital data, and editing said decrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using a storage permit key, which is said utilization permit key permitting storing of said digital data, encrypting again said decrypted digital data to encrypted digital data by using said storage permit key, and storing said encrypted digital data;
decrypting said encrypted digital data to decrypted digital data by using a copy permit key, which is said utilization permit key permitting copying of said digital data, encrypting again said decrypted digital data to encrypted digital data by using said copy permit key, and copying said encrypted digital data; and
decrypting said encrypted digital data to decrypted digital data by using a transfer permit key, which is said utilization permit key permitting transferring of said digital data, encrypting again said decrypted digital data to encrypted digital data by using said transfer permit key, and transferring said encrypted digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification