Copy protection of data
DCFirst Claim
Patent Images
1. A method of protecting data sent from a server to a client, said method comprising:
- running a program portion at the client, the program portion generating and uploading to the server a request for access to data;
cryptographically protecting the data;
sending the cryptographically protected data to the client; and
after the running of the program portion has begun and under control of the program portion at the client, converting the cryptographically protected data to an unprotected form and selectively controlling access to copy or save functions at the client in respect of the data in its unprotected form.
4 Assignments
Litigations
1 Petition
Accused Products
Abstract
A copyright protection scheme downloads data from a server, typically over the World Wide Web to a client for presentation to a user. The downloaded data is cryptographically protected, by encryption and hashing. When displayed by the client, storing and copying functions are selectively disabled in respect of the data, in order to prevent unauthorized copying.
-
Citations
26 Claims
-
1. A method of protecting data sent from a server to a client, said method comprising:
-
running a program portion at the client, the program portion generating and uploading to the server a request for access to data; cryptographically protecting the data; sending the cryptographically protected data to the client; and after the running of the program portion has begun and under control of the program portion at the client, converting the cryptographically protected data to an unprotected form and selectively controlling access to copy or save functions at the client in respect of the data in its unprotected form. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 12, 14, 15, 16, 17, 18, 21)
-
-
9. A method of controlling access to data downloaded from a server computer to a client computer, said method comprising:
-
downloading a protected copy of requested data from a server to a client; and before using said protected copy, running a program at the client so that after running the program at the client has begun at the client, the program serves to both;
(a) unprotect the downloaded data thereby to provide access to an unprotected copy of the requested data, and (b) suppress client computer copy or save functions with respect to the unprotected copy of the requested data.
-
-
10. A method of controlling access to data sent from a server to a client, said method comprising:
-
running a program portion at the client, the program portion generating and uploading to the server a request for access to data; cryptographically protecting the data; sending the cryptographically protected data to the client; and after access to the program portion is permitted and under control of the program portion, converting the cryptographically protected data to an unprotected form and restricting or preventing access to copy or save functions at the client in respect of the data in its unprotected form.
-
-
11. A method of controlling access to data downloaded from a server computer to a client computer, said method comprising:
-
downloading a protected copy of requested data from a server to a client; and running a program at the client after access to the program is permitted to both;
(a) unprotect the downloaded data thereby to provide access to an unprotected copy of the requested data, and (b) restrict or prevent client computer copy or save functions with respect to the unprotected copy of the requested data.
-
-
13. A server for providing access to data sets in a protected form, the server comprising:
-
an input for receiving a request for access to a data set; protecting means for cryptographically protecting the requested data set; and generating means for generating a program portion for sending to the source of the access request, wherein said program portion is operable and after the program portion is permitted to run at the source of the access request, in use; to generate a request for access to the cryptographically protected data set; on receipt of the cryptographically protected data set, to convert it into an unprotected form; and to selectively control access to copy or save functions in respect of the data set when in said unprotected form.
-
-
19. A method of protecting data downloaded from a server computer to a client computer, said method comprising:
-
downloading a protected copy of requested data from a server to a client; and running a program at the client after access to the program is permitted to both;
(a) unprotect the downloaded data thereby to provide access to an unprotected copy of the requested data, and (b) restrict or prevent client computer copy and save functions with respect to the unprotected copy of the requested data. - View Dependent Claims (20)
-
-
22. A computer program carrier medium containing a computer program which are executable by a computer to perform method steps for implementing a server, the method steps comprising:
-
receiving a request for access to a data set; cryptographically protecting the requested data set; and generating a program portion for sending to the source of the access request, wherein said program portion is operable and after the program portion is permitted to run at the source of the access request, in use; generating a request for access to the cryptographically protected data set; on receipt of the cryptographically protected data set, converting it into an unprotected form; and selectively controlling access to copy or save functions in respect of the data set when in said unprotected form.
-
-
23. A method of protecting data downloaded from a server computer to a client computer, said method comprising:
-
downloading a protected copy of requested data from a server to a client; and running a program at the client so that after running the program at the client has begun at the client, the program serves to both;
(a) unprotect the downloaded data thereby to provide access to an unprotected copy of the requested data, and (b) suppress client computer copy and save functions with respect to the unprotected copy of the requested data. - View Dependent Claims (24)
-
-
25. A method of protecting data sent from a server to a client, said method comprising:
-
running a program portion at the client, the program portion generating and uploading to the server a request for access to data; cryptographically protecting the data; sending the cryptographically protected data to the client; and after access to the program portion is permitted and under control of the program portion, converting the cryptographically protected data to an unprotected form and restricting or preventing access to copy or save functions at the client in respect of the data in its unprotected form.
-
-
26. A server for providing access to data sets in a protected form, the server comprising:
-
an input for receiving a request for access to a data set; protecting means for cryptographically protecting the requested data set; and generating means for generating a program portion for sending to the source of the access request, wherein after access to the program portion is permitted and said program portion is operable, in use; to generate a request for access to the cryptographically protected data set; on receipt of the cryptographically protected data set, to convert it into an unprotected form; and to restrict or prevent access to copy or save functions in respect of the data set when in said unprotected form.
-
Specification