Data administration method
First Claim
1. A data administration method, which comprises:
- preparing a real data section by encrypting digital content to be distributed;
preparing a summary data section provided with symbol information symbol-converted for visual or auditory recognition of attributes of the digital content;
preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as an electronic watermark; and
preparing composite data in which the real data section and the consent-information-added summary data section are composited, and distributing the composite data.
2 Assignments
0 Petitions
Accused Products
Abstract
Data administration method which prevents the infringement of a copyright by encrypting and distributing digital content, and readily grasps which contents are contained in the digital content included in the data. Preparing symbol information symbolized so as to visually and auditorily recognize the contents of the digital content that conduct distribution (Step S12), embedding the symbol information in a header data section (Step S13), encrypting the digital content (Step S15), embedding consent information including the information on the contents key in the header data section as an electronic watermark (Step S16), and compositing the real data section and the consent-information-added header data section and distributing the composite data (Step S17).
72 Citations
20 Claims
-
1. A data administration method, which comprises:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section provided with symbol information symbol-converted for visual or auditory recognition of attributes of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as an electronic watermark; and preparing composite data in which the real data section and the consent-information-added summary data section are composited, and distributing the composite data. - View Dependent Claims (2)
-
-
3. A data administration method, which comprises:
-
preparing a real data section by encrypting digital content to be distributed; preparing a data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; preparing an annex data section in which use restriction information for restricting use of the digital content is encrypted; preparing composite data by compositing the real data section and the consent-information-added summary data section, simultaneously compositing the annex data section; and distributing the composite data. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A data administration method, comprising:
-
separating an annex data section from composite data distributed as a composite of a real data section in which digital content to be distributed is encrypted, in a summary data section enabling visual or auditory recognition of substance of the digital content, a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded as a visually or auditorily unrecognizable electronic watermark, and an annex data section in which use restriction information for restricting use of the digital content is encrypted; decrypting the annex data section and extracting the use restriction information; extracting the consent information embedded in the consent-information-added summary data section based on the use restriction information; obtaining from the consent information a content key for decrypting the digital content; and using the content key, decrypting the real data section into its original digital content to allow use by users.
-
-
11. A data administration method characterized by:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; embedding in the summary data section as a visually or auditorily unrecognizable electronic watermark a hash value generated from the real data section using a hash function; and
thereafterpreparing composite data in which the real data section and the consent-information-added summary data section are composited, and distributing the composite data.
-
-
12. A data administration method characterized by:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; and decrypting the real data section into digital content for sending out, by line-connecting to a predetermined contact destination, content information from the digital content that is decrypted, and therein embedding in the summary data section as a visually or auditorily unrecognizable electronic watermark the content information from the digital content that is decrypted and information on the predetermined contact destination; and
thereafterpreparing composite data in which the real data section and the consent-information-added summary data section are composited, and distributing the composite data.
-
-
13. A data administration method characterized by:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; preparing composite data in which the real data section and the consent-information-added summary data section are composited, and therein retaining within the composite data record-location information from a server in which the digital content is registered; and distributing the composite data. - View Dependent Claims (14)
-
-
15. A data administration method characterized by:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; and preparing composite data in which the real data section and the consent-information-added summary data section are composited, and therein retaining within the composite data biometric template information generated based on biometric information on a user of the digital content; and distributing the composite data. - View Dependent Claims (16)
-
-
17. A data administration method characterized by:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content, and identifying information specific to a recording medium for recording the digital content, are embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; and preparing composite data in which the real data section and the consent-information-added summary data section are composited, and distributing the composite data.
-
-
18. A data administration method characterized by:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content, and a control code allowing a given operation on an information device for reproducing the digital content, are embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; and preparing composite data in which the real data section and the consent-information-added summary data section are composited, and distributing the composite data.
-
-
19. A data administration method, which comprises:
-
preparing a real data section by encrypting digital content to be distributed; preparing a summary data section enabling visual or auditory recognition of substance of the digital content; preparing a consent-information-added summary data section in which consent information containing information on a content key used as an encryption key in encrypting the digital content is embedded in the summary data section as a visually or auditorily unrecognizable electronic watermark; and preparing composite data by compositing the real data section and the consent-information-added summary data section, and distributing the composite data;
characterized in thatprivileges information for the digital content including copyright information is embedded within the digital content as an electronic watermark. - View Dependent Claims (20)
-
Specification