Data copyright management
DCFirst Claim
Patent Images
1. A method performed by a first computing device, the method comprising:
- receiving an encrypted version of a first set of protected digital data;
receiving a first crypt key specifically associated with the first set of protected digital data;
decrypting the encrypted version of the first set of protected digital data using the first crypt key to produce decrypted digital data;
managing forms of usage of the first set of protected digital data, wherein said managing includes, for a first form of usage requested by a user of the first computing device;
when the first form of usage is one of a first set of usages, permitting the first form of usage using the decrypted digital data; and
when the first form of usage is one of a second set of usages distinct from usages in the first set, permitting the first form of usage on a re-encrypted version of the decrypted digital data generated by re-encrypting the decrypted digital data using a second crypt key.
7 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Embodiments of methods, apparatuses, devices, and/or systems for data copyright management are described. According to one embodiment of this disclosure, data copyright management may include displaying, storing, copying, editing, and/or transferring digital data. According to an embodiment, data copyright management may include protecting digital data copyrights. Various embodiments of this disclosure may use cryptographic keys to implement portions of the data copyright management disclosed.
-
Citations
39 Claims
-
1. A method performed by a first computing device, the method comprising:
-
receiving an encrypted version of a first set of protected digital data; receiving a first crypt key specifically associated with the first set of protected digital data; decrypting the encrypted version of the first set of protected digital data using the first crypt key to produce decrypted digital data; managing forms of usage of the first set of protected digital data, wherein said managing includes, for a first form of usage requested by a user of the first computing device; when the first form of usage is one of a first set of usages, permitting the first form of usage using the decrypted digital data; and when the first form of usage is one of a second set of usages distinct from usages in the first set, permitting the first form of usage on a re-encrypted version of the decrypted digital data generated by re-encrypting the decrypted digital data using a second crypt key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A storage medium storing instructions, that, if executed by a first computing device, result in:
-
decrypting an encrypted version of a first set of protected digital data by using a first crypt key to produce decrypted digital data before performing a first operation specified by a user of the first computing device, wherein the first crypt key is specifically associated with the first set of protected digital data; managing forms of usage of the first set of protected digital data, wherein said managing includes, for a first form of usage requested by a user of the first computing device; when the first form of usage is one of a first set of usages, permitting the first form of usage using the decrypted digital data; and when the first form of usage is one of a second set of usages distinct from usages in the first set, permitting the first form of usage on a re-encrypted version of the decrypted digital data generated by re-encrypting the decrypted digital data using a second crypt key. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system, comprising:
-
a processor unit including one or more processors; a memory storing program instructions executable by the processor unit to; decrypt an encrypted version of a first set of protected digital data using a first crypt key to produce decrypted digital data; manage forms of usages of the first set of protected digital data, including; permitting a first, user-requested, form of usage on the decrypted digital data when the first form of usage is one of a first set of usages; and permitting the first, user-requested, form of usage on a re-encrypted version of the first set of protected digital data when the first form of usage is one of a second set of usages distinct from those in the first set of usages, wherein the encrypted version of the first set of protected digital data is generated by re-encrypting the decrypted digital data using a second crypt key. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
Specification