Updating usage conditions in lieu of download digital rights management protected content
First Claim
1. A method on an end user system encoding watermarks with usage conditions of previously received encrypted digital content without receiving additional copies of the encrypted digital content, the method comprising:
- sending to an electronic store a request from a user to acquire additional usage rights for encrypted digital content which has been previously received, wherein included with the encrypted digital content is;
at least one usage right;
a first watermark identifying a source of the encrypted digital content, wherein the first watermark includes transaction information and an identification of a clearing house which is separate from an identification of a store from which the encrypted digital content was purchased; and
at least one watermarking instruction containing parameters and information for creating a second watermark on an end user system with transaction information to track each distribution of the encrypted digital content;
receiving from the electronic store a hash value which uniquely identifies the encrypted digital content associated with the request to acquire additional usage rights for the encrypted digital content;
comparing the hash value received from the electronic store with a previously stored hash value corresponding to the previously received encrypted digital content;
updating the usage conditions associated with the encrypted digital content in response to the hash value received from the electronic store matching the previously stored hash value, wherein the watermarking instruction has been updated by a clearing house which is separate from a store from which the encrypted digital content was purchased;
generating the second watermark, on the end user system, based upon the parameters and information in the watermarking instruction and the usage conditions which have been updated without re-receiving another copy of the encrypted digital content, wherein the generating the second watermark is performed in a tamper resistant environment so as to deter unauthorized access to the watermarking instruction;
applying the second watermark to the encrypted digital content so as to overwrite the first watermark;
decrypting the encrypted digital content with a first decrypting key; and
reencrypting the digital content along with the second water mark with a second encryption key, wherein the second encrypting key is a symmetric key locally generated at the end user device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method on an end user system for creating additional copies onto at least one computer readable medium such as CDs, DVDs, ZipDisks™, tape, Flash memory, and RAM. The method comprising the steps of: receiving encrypted content with associated usage conditions and a first hash value; receiving a selection from an end user to create at least one copy of the encrypted content onto at least one computer readable medium; sending a request to an online electronic store of the encrypted content selected to be copied; receiving from the electronic store a description of the content selected to be copied along with a second hash value; and determining if the first hash value received is identical to the second hash value and if the first hash and the second hash value is identical authorizing the creating additional copies onto at least one computer readable medium.
-
Citations
3 Claims
-
1. A method on an end user system encoding watermarks with usage conditions of previously received encrypted digital content without receiving additional copies of the encrypted digital content, the method comprising:
-
sending to an electronic store a request from a user to acquire additional usage rights for encrypted digital content which has been previously received, wherein included with the encrypted digital content is; at least one usage right; a first watermark identifying a source of the encrypted digital content, wherein the first watermark includes transaction information and an identification of a clearing house which is separate from an identification of a store from which the encrypted digital content was purchased; and at least one watermarking instruction containing parameters and information for creating a second watermark on an end user system with transaction information to track each distribution of the encrypted digital content; receiving from the electronic store a hash value which uniquely identifies the encrypted digital content associated with the request to acquire additional usage rights for the encrypted digital content; comparing the hash value received from the electronic store with a previously stored hash value corresponding to the previously received encrypted digital content; updating the usage conditions associated with the encrypted digital content in response to the hash value received from the electronic store matching the previously stored hash value, wherein the watermarking instruction has been updated by a clearing house which is separate from a store from which the encrypted digital content was purchased; generating the second watermark, on the end user system, based upon the parameters and information in the watermarking instruction and the usage conditions which have been updated without re-receiving another copy of the encrypted digital content, wherein the generating the second watermark is performed in a tamper resistant environment so as to deter unauthorized access to the watermarking instruction; applying the second watermark to the encrypted digital content so as to overwrite the first watermark; decrypting the encrypted digital content with a first decrypting key; and reencrypting the digital content along with the second water mark with a second encryption key, wherein the second encrypting key is a symmetric key locally generated at the end user device.
-
-
2. A computer readable medium encoded with programming instructions for encoding watermarks with usage conditions of previously received encrypted digital content without receiving additional copies of the encrypted digital content, the programming instructions comprising:
-
sending to an electronic store a request from a user to acquire additional usage rights for encrypted digital content which has been previously received, wherein included with the encrypted digital content is; at least one usage right; a first watermark identifying a source of the encrypted digital content, wherein the first watermark includes transaction information and an identification of a clearing house which is separate from an identification of a store from which the encrypted digital content was purchased; and at least one watermarking instruction containing parameters and information for creating a second watermark on an end user system with transaction information to track each distribution of the encrypted digital content; receiving from an electronic store a hash value which uniquely identifies the encrypted digital content associated with the request to acquire additional usage rights for the encrypted digital content; comparing the hash value received from the electronic store with a previously stored hash value corresponding to the previously received encrypted digital content; updating the usage conditions associated with the encrypted digital content in response to the hash value received from the electronic store matching the previously stored hash value, wherein the watermarking instruction has been updated by a clearing house which is separate from a store from which the encrypted digital content was purchased; generating the second watermark, on the end user system, based upon the parameters and information in the watermarking instruction and the usage conditions which have been updated without re-receiving another copy of the encrypted digital content, wherein the generating the second watermark is performed in a tamper resistant environment so as to deter unauthorized access to the watermarking instruction; applying the second watermark to the encrypted digital content so as to overwrite the first watermark; decrypting the encrypted digital content with a first decrypting key; and reencrypting the digital content along with the second water mark with a second encryption key, wherein the second encrypting key is a symmetric key locally generated at the end user device.
-
-
3. An information processing system for encoding watermarks with usage conditions of previously received encrypted digital content without receiving additional copies of the encrypted digital content, the system comprising:
-
a processor coupled to memory storing encrypted digital content and said processor is programmed to sending to an electronic store a request from a user to acquire additional usage rights for encrypted digital content which has been previously received, wherein included with the encrypted digital content is; at least one usage right; a first watermark identifying a source of the encrypted digital content, wherein the first watermark includes transaction information and an identification of a clearing house which is separate from an identification of a store from which the encrypted digital content was purchased; and at least one watermarking instruction containing parameters and information for creating a second watermark with transaction information to track each distribution of the encrypted digital content; a tamper resistant environment deterring unauthorized access to the encrypted digital content, the tamper resistant environment including software instructions performed by the processor, wherein said processor is programmed to; receiving from the electronic store an hash value which uniquely identifies the encrypted digital content associated with a request to acquire additional usage rights for the encrypted digital content; comparing the hash value received from the electronic store with a previously stored hash value corresponding to the previously received encrypted digital content; updating the usage conditions associated with the encrypted digital content in response to the hash value received from the electronic store matching the previously stored hash value, wherein the watermarking instruction has been updated by a clearing house which is separate from a store from which the encrypted digital content was purchased; and generating the second watermark based upon the parameters and information in the watermarking instruction and the usage conditions which have been updated without re-receiving another copy of the encrypted digital content; applying the second watermark to the encrypted digital content; decrypting the encrypted digital content with a first decrypting key; and reencrypting the digital content along with the second water mark with a second encryption key, wherein the second encrypting key is a symmetric key locally generated.
-
Specification