Controlling database copyrights
First Claim
Patent Images
1. A method, comprising:
- a computer system receiving encrypted data; and
the computer system using a first utilization permit key associated with the received encrypted data to decrypt said received encrypted data, wherein the first utilization permit key is usable to authorize the performing of at least one, but not all, of a plurality of operations on a version of the decrypted data, wherein the plurality of operations include two or more of the following types of operations;
displaying, editing, storing, copying, transferring; and
wherein the first utilization permit key is usable to authorize the performing of at least one of the plurality of operations on a re-encrypted version of the decrypted data.
5 Assignments
0 Petitions
Accused Products
Abstract
Briefly, in accordance with one or more embodiments, copyrights of digital data may be controlled.
227 Citations
41 Claims
-
1. A method, comprising:
-
a computer system receiving encrypted data; and the computer system using a first utilization permit key associated with the received encrypted data to decrypt said received encrypted data, wherein the first utilization permit key is usable to authorize the performing of at least one, but not all, of a plurality of operations on a version of the decrypted data, wherein the plurality of operations include two or more of the following types of operations;
displaying, editing, storing, copying, transferring; andwherein the first utilization permit key is usable to authorize the performing of at least one of the plurality of operations on a re-encrypted version of the decrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
a computer system receiving encrypted data and a utilization permit key; the computer system using the utilization permit key on said received encrypted data, wherein said utilization permit key includes a first permit key and a second permit key; wherein said first permit key is pre-defined to permit the performing of a first function of a plurality of functions on said received data; wherein said second permit key is pre-defined to permit the performing of a second function of the plurality of functions on said received data, wherein the first function is different than the second function; and wherein said first permit key is pre-defined to permit the performing of the first function on a decrypted version of the received encrypted data, and wherein the second permit key is pre-defined to permit the performing of the second function on a re-encrypted version of the received encrypted data. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
a computer system receiving encrypted data; the computer system decrypting said received encrypted data; the computer system determining whether said decrypted data includes copyright information, and, if not, preventing use of said decrypted data; upon determining that the decrypted data includes copyright information, the computer system using a utilization permit key to authorize performing one or more of a plurality of operations on the decrypted data and one or more of the plurality of operations on a re-encrypted version of the decrypted data. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A method, comprising:
-
receiving, at a computing device, encrypted data; the computing device using a utilization permit key to authorize the performing of one or more, but not all, of a plurality of operations on said received encrypted data and prevent the performing of the remaining plurality of operations on said received encrypted data; and the computing device using a copyright management program to manage utilization of said received encrypted data, wherein said copyright management program is received along with said utilization permit key. - View Dependent Claims (23, 24)
-
-
25. A method, comprising:
a first computer system encrypting data using a utilization permit key, wherein the utilization permit key is usable by a second computer system to decrypt the encrypted data and to authorize the second computer system to perform a first set of one or more of a predetermined set of operations on the decrypted data and to perform a second set of one or more of the predetermined set of operations on a re-encrypted version of the decrypted data, wherein the operations in the first and second sets of operations are not identical, and wherein the first set of operations does not include all of the operations in the predetermined set of operations. - View Dependent Claims (26, 27)
-
28. An article of manufacture including a computer-readable medium having instructions stored thereon that, if executed by a computer system, cause the computer system to perform a method comprising:
-
receiving encrypted data; decrypting the received data using a utilization permit key, wherein the utilization permit key is farther configured to permit a first set of operations to be performed on the decrypted data, and to prevent a second set of operations from being performed on the decrypted data, and wherein the utilization permit key is further configured to permit at least one of the second set of operations to be performed on a re-encrypted version of the decrypted data. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A computing device, comprising:
-
a processor; memory storing program instructions executable by the computing device to; receive encrypted data; use a first utilization permit key associated with the received encrypted data to decrypt said received encrypted data; wherein the first utilization permit key is usable to authorize the performing of at least one, but not all, of a predetermined plurality of operations on a version of the decrypted data, wherein the predetermined plurality of operations include two or more of the following types of operations;
displaying, editing, storing, copying, transferring; andwherein the first utilization permit key is usable to authorize performing at least one, but not all, of the predetermined plurality of operations on a re-encrypted version of the decrypted data, including at least one of the predetermined plurality of operations that the first utilization permit key does not authorize performing with respect to the decrypted data. - View Dependent Claims (35, 36, 37, 38, 39)
-
-
40. An apparatus, comprising:
-
an interface configured to receive encrypted data; and means for using a utilization permit key to authorize the performing of one or more, but not all, of a predetermined plurality of operations and to prevent the performing of the remaining plurality of operations on a decrypted version of the received encrypted data, and for using the utilization permit key to authorize the performing of at least one of the predetermined plurality of operations on a re-encrypted version of the decrypted version of the received encrypted data.
-
-
41. A method comprising:
-
a computer system receiving encrypted data and a utilization permit key for the data; the computer system using a copyright management program to manage utilization of the received data, including; the computer system using the copyright management program to decrypt the received encrypted data using the utilization permit key; the computer system using the copyright management program to authorize performing a first set of one or more of a plurality of operations on the decrypted data and a second set of one or more of the plurality of operations on a re-encrypted version of the decrypted data, wherein the first and second set of operations are specified by the utilization permit key.
-
Specification