Method for controlling database copyrights
First Claim
1. A method, comprising:
- receiving at a user device one or more of a plurality of utilization permit keys, wherein said plurality of utilization permit keys includes;
a first utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring; and
a second utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring, wherein one or more uses permitted by the second utilization permit key are different from the one or more uses permitted by the first utilization permit key; and
decrypting encrypted digital data using one or more of the received plurality of utilization permit keys that includes at least the first utilization permit key or the second utilization permit key for performance of only the use or uses of the digital data that are permitted by the received one or more utilization permit keys.
7 Assignments
0 Petitions
Accused Products
Abstract
In the present invention, copyrights of digital data in a database system including real time transmission of a digital picture are controlled. Permit keys including a crypt key, are used when data which is encrypted and supplied is displayed, edited, stored, copied and transferred. As necessary, one or more of a copyright control program, copyright information or copyright control message are used, in addition to the permit key. The copyright control program, the copyright information and the copyright control message are supplied together with the permit key, or together with the data, or a part of them is supplied together with the permit key and the other part of them is supplied together with the data. The permit key, the copyright control message, the copyright information and the copyright control program are supplied with encryption or without encryption. The data is transmitted with encryption and is decrypted to be used, and may be encrypted again when stored, copied or transferred.
-
Citations
35 Claims
-
1. A method, comprising:
-
receiving at a user device one or more of a plurality of utilization permit keys, wherein said plurality of utilization permit keys includes; a first utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring; anda second utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring, wherein one or more uses permitted by the second utilization permit key are different from the one or more uses permitted by the first utilization permit key; anddecrypting encrypted digital data using one or more of the received plurality of utilization permit keys that includes at least the first utilization permit key or the second utilization permit key for performance of only the use or uses of the digital data that are permitted by the received one or more utilization permit keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving at a user device one or more of a plurality of utilization permit keys, wherein said plurality of utilization permit keys includes; a first utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying editing, storing, copying, transferring; anda second utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring, wherein one or more uses permitted by the second utilization permit key are different from the one or more uses permitted by the first utilization permit key;decrypting encrypted digital data using one or more of the received plurality of utilization permit keys that include at least the first utilization permit key or the second utilization permit key only when the use or uses of the digital data permitted by the one or more received utilization permit keys are displaying digital data or editing digital data; and performing only the use of uses of the digital data that are permitted by the received one or more utilization permit keys. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An apparatus, comprising:
-
means for receiving by a user device one or more of a plurality of utilization permit keys, wherein said plurality of utilization permit keys includes; a first utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing;
copying, transferring, anda second utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring;
wherein one or more uses permitted by the second utilization permit key are different from the one or more uses permitted by the first utilization permit key; andmeans for decrypting encrypted digital data using one or more of the received plurality of utilization permit keys that includes at least the first utilization permit key or the second utilization permit key for performance of only the use or uses of the digital data that are permitted by the one or more received utilization permit keys. - View Dependent Claims (27, 28, 29, 30)
-
-
31. An article comprising:
- a computer readable storage medium having stored thereon instructions that, if executed by a user device, cause the user device to;
receive one or more of a plurality of utilization permit keys, wherein said plurality of utilization permit keys includes; a first utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring; anda second utilization permit key capable of use in cryptographic operations and configured to permit one or more of the following uses of digital data;
displaying, editing, storing, copying, transferring, wherein one or more uses permitted by the second utilization permit key are different from the one or more uses permitted by the first utilization permit key; anddecrypt encrypted digital data using one or more of the received plurality of utilization permit keys that includes at least the first utilization permit key or the second utilization permit key for performance of only the use or uses of the digital data that are permitted by the one or more received utilization permit keys. - View Dependent Claims (32, 33, 34, 35)
- a computer readable storage medium having stored thereon instructions that, if executed by a user device, cause the user device to;
Specification