Data copyright management system
First Claim
1. A method, comprising:
- sending a user access request for content from a computing device to a remote computer system;
responsive to the user access request, receiving, at the computing device, a first key and an encrypted content control program from the remote computer system;
decrypting the content control program using a secret key;
decrypting the content on the computing device using the first key and the content control program;
permitting a user to use the decrypted content within the computing device; and
after use of the decrypted content within the computing device and in response to the user initiating a transfer of the content external to the computing device, re-encrypting the decrypted content prior to the transfer, wherein said re-encrypting is performed using a second key, the second key being distinct from the secret key, and the content control program.
7 Assignments
0 Petitions
Accused Products
Abstract
A data copyright management system comprises a database for storing original data, a key control center for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections. Data supplied from the database to users is encrypted and distributed. The users decrypts the encrypted data by crypt keys obtained from the key control center or copyright management center. To supply data to users, there are the following two methods: a one-way supplying of encrypted data to users by means of broadcasting or the like; and two-way supplying of encrypted data to users corresponding to users'"'"' requests. A crypt key system used for encrypting data uses a secret-key cryptosystem, a public-key cryptosystem or a cryptosystem combining a secret-key and a public-key and further uses a copyright control program to control data copyrights. When a user stores, copies, or transfers data, the data is encrypted by a crypt key different from a crypt key used for supplying the data. The former crypt key is supplied from the key control center or from the copyright management center, or generated by the copyright control program. The present invention can be applied to a data copyright management system for using not only single data but also a plurality of data supplied from a single database or a plurality of data supplied from a plurality of databases. Further, an apparatus to be used by the user to perform data copyright management is proposed.
267 Citations
25 Claims
-
1. A method, comprising:
-
sending a user access request for content from a computing device to a remote computer system; responsive to the user access request, receiving, at the computing device, a first key and an encrypted content control program from the remote computer system; decrypting the content control program using a secret key; decrypting the content on the computing device using the first key and the content control program; permitting a user to use the decrypted content within the computing device; and after use of the decrypted content within the computing device and in response to the user initiating a transfer of the content external to the computing device, re-encrypting the decrypted content prior to the transfer, wherein said re-encrypting is performed using a second key, the second key being distinct from the secret key, and the content control program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
a processor; and memory, coupled to the processor, having program instructions stored thereon that are executable by the apparatus to cause the apparatus to perform operations including; sending, to a remote computer system, a request for content; responsive to the request, receiving a first key and an encrypted content control program from the remote computer system; decrypting the encrypted content control program using a secret key; decrypting the content using the first key and the decrypted content control program; permitting use of the decrypted content within the apparatus; and after use of the decrypted content within the apparatus and in response to initiation of a transfer of the decrypted content external to the apparatus, re-encrypting the decrypted content prior to the transfer, wherein the re-encrypting is performed using a second key, the second key being distinct from the secret key, and the decrypted content control program. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification