Data management system
6 Assignments
0 Petitions
Accused Products
Abstract
To prevent piracy or leakage of data content, a cryptography technique and electronic watermark technique are combined together and used. In a data content supplied to a user, a user data is entered as electronic watermark by a data management center, and the data content with an electronic watermark entered in it is encrypted using a crypt key and is supplied. The encrypted data content is decrypted using a crypt key distributed from the data management center and is used. In case it is to be stored, it is encrypted using another crypt key. In case the data content is copied and transferred to other user, a user data of the other user is entered as electronic watermark, and a scenario to enter the user data of the other user as electronic watermark is registered at the data management center, and the data content with electronic watermark entered in it is encrypted using another crypt key and is supplied. When the validity of the other user is confirmed by the scenario, another crypt key is distributed to the other user. The encrypted data content is decrypted using another crypt key and is used. When it is to be stored, it is encrypted using still another key. In case the data content has been copied and transferred illegitimately, it is possible by verifying the electronic watermark to identify the user who has copied and transferred the data content illegitimately.
120 Citations
38 Claims
-
1-4. -4. (canceled)
-
5. A method comprising:
-
receiving a first data content from a data management center by a first user, wherein the first data content comprises a first user data entered as a first electronic watermark to said first data content; and
entering a second user data as a second electronic watermark to the first data content by the first user before transferring the first data content from the first user to a second user. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus, comprising:
-
means for receiving a first data content from a data management center by a first user, wherein the first data content comprises a first user data entered as a first electronic watermark to said first data content; and
means for entering a second user data as a second electronic watermark to the first data content by the first user before transferring the first data content from the first user to a second user. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. An apparatus, comprising:
a computing device, said computing device capable of;
receiving a first data content from a data management center by a first user, wherein the first data content comprises a first user data entered as a first electronic watermark to said first data content; and
entering a second user data as a second electronic watermark to the first data content by the first user before transferring the first data content from the first user to a second user. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
32. A method, comprising:
-
receiving an encrypted first data content from a data management center by a first user, wherein the encrypted first data content comprises first data content encrypted using a first secret key, and wherein the first data content comprises a first user data entered as a first electronic watermark to said first data content;
receiving the first secret key and a second secret key from the data management center by the first user, the first and second secret keys being different from each other;
decrypting the encrypted first data content by the first user using the first secret key;
entering second user data as a second electronic watermark to the first data content by the first user before transferring the first data content from the first user to a second user; and
re-encrypting the first data content by the first user using the second secret key before storing, copying, or transferring the first data content by the first user. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
Specification