Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20090327137 A1
Publication typeApplication
Application numberUS 11/730,972
Publication dateDec 31, 2009
Filing dateApr 5, 2007
Priority dateMay 31, 2001
Also published asCA2596449A1, CA2596449C, CN101313327A, CN101313327B, CN102693376A, EP1847052A2, EP1847052A4, US7725401, US8412644, US20050197963, US20100241871, US20130185805, US20150149369, WO2006086099A2, WO2006086099A3
Publication number11730972, 730972, US 2009/0327137 A1, US 2009/327137 A1, US 20090327137 A1, US 20090327137A1, US 2009327137 A1, US 2009327137A1, US-A1-20090327137, US-A1-2009327137, US2009/0327137A1, US2009/327137A1, US20090327137 A1, US20090327137A1, US2009327137 A1, US2009327137A1
InventorsMichael Charles Raley, Edgardo Valenzuela, Bijan Tadayon, Aram Nahidipour, Xin Wang, Guillermo Lao, Thanh Ta
Original AssigneeMichael Charles Raley, Edgardo Valenzuela, Bijan Tadayon, Aram Nahidipour, Xin Wang, Guillermo Lao, Thanh Ta
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Method and apparatus for establishing usage rights for digital content to be created in the future
US 20090327137 A1
Abstract
A method for creating a digital work having content and usage rights related to the content, the digital work being adapted to be used within a system having repositories for controlling use of content, the method including issuing a license to a consumer, the license permitting the consumer to access the content of the digital work to be created in the future. The issuing step further includes determining the usage rights that can be included in the license, the usage rights specifying a type of use of the content that is enforceable by a repository; electronically generating a license based on the usage rights; and creating the digital work as the content is being created or after the content is created, wherein the step of creating the digital work includes securing the content before the digital work is distributed to the consumer.
Images(6)
Previous page
Next page
Claims(9)
1. A method for creating a digital work having content and usage rights related to the content, the digital work being adapted to be used within a system having repositories for controlling use of content, the method comprising:
issuing a license to a consumer, the license permitting the consumer to access the content of the digital work to be created in the future, wherein the issuing step further includes:
determining the usage rights that can be included in the license, the usage rights specifying a type of use of the content that is enforceable by a repository;
electronically generating a license based on the usage rights; and
creating the digital work as the content is being created or after the content is created, wherein the step of creating the digital work includes securing the content before the digital work is distributed to the consumer.
2. The method of claim 1, wherein said securing step comprises encrypting and storing the content.
3. A method for creating a digital work having content and usage rights related to the content, the digital work being adapted to be used within a system having repositories for controlling use of content, the method comprising:
issuing a license to a consumer, the license including a key that entitles the consumer to access the content of the digital work to be distributed in the future, wherein the issuing step further includes:
determining the usage rights that can be included in the license; the usage rights specifying a type of use of the content that is enforceable by a repository;
electronically generating a license based on the usage rights before the digital work is distributed; and
distributing the digital work to the consumer, wherein the digital work includes an encrypted content.
4. The method of claim 1, further comprising granting access to the content in accordance with the usage rights.
5. The method of claim 1, wherein said usage rights specify a user's right to at least one of alter, edit, copy, print, or view the content.
6. The method of claim 5, wherein said content creates at least one of a written, aural, graphical, audio, pictorial or video based element.
7. The method of claim 2, wherein said license includes a key for decrypting the encrypted content.
8. A method for creating a digital work having content and usage rights related to the content, the digital work being adapted to be used within a system having repositories for controlling use of content, the method comprising:
issuing an authorized token to a consumer, the authorization token entitling the consumer to exchange for a license to access the content of the digital work to be created in the future;
electronically generating a license based on the authorization token, the license includes a key that entitles the consumer to access the content of the digital work, wherein the license generating step further includes:
determining the usage rights that can be included in the license, the usage rights specifying a type of use of the content that is enforceable by a repository; and
exchanging the authorized token for the said license to access the content of the digital work, wherein the digital work includes an encrypted content and is created after the authorization token is issued to the consumer.
9. A method for creating a digital work having content and usage rights related to the content, the digital work being adapted to be used within a system having repositories for controlling use of content, the method comprising:
issuing an authorized token to a consumer, the authorization token entitling the consumer to exchange for a license to access the content of the digital work to be created in the future;
electronically exchanging the authorized token for a license to access the content of the digital work wherein the digital work includes encrypted content and is created after the authorization token is issued to the consumer, said exchanging step further includes:
determining the usage rights that can be included in the license, the usage rights specifying a type of use of the content that is enforceable by a repository;
generating a license based on the authorization token, the license includes a key that entitles the consumer to access the content of the digital work.
Description
    CROSS REFERENCE TO RELATED DOCUMENTS
  • [0001]
    The present invention is a continuation of commonly assigned, copending, U.S. patent application Ser. No. 11/052,209 of RALEY et al., entitled “METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE,” filed Feb. 8, 2005, now pending, which is a continuation-in-part U.S. patent application Ser. No. 09/867,747 of TADAYON et al., entitled “METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE,” filed May 31, 2001, now U.S. Pat. No. 6,876,984, the entire disclosures of all of which are hereby incorporated by reference herein.
  • BACKGROUND OF THE INVENTION
  • [0002]
    This invention relates generally to assignment of usage rights for digital works. In particular, this invention relates to establishing usage rights for before the content is created. Content that has not yet been created can be, for example, a live event (such as a sports event) that has not yet happened. It can also be, for example, a movie that has not yet been filmed or a book that has not yet been written. Moreover, the content in question could be, for example, a movie created many years ago. In that example this invention would pertain to the version of that movie in digital form, prepared and packaged for distribution in a manner described in this invention. Similarly, a two thousand year old book prepared as a new digital work can be content to be created in the future equally as with the case of the book that has not yet been written. Further, an item of content already in digital form can be content that has not been created where a new digital instantiation of the content is created.
  • [0003]
    One of the most important issues impeding the widespread distribution of digital works via electronic means, and the Internet in particular, is the current lack of protection of intellectual property rights of content owners during the distribution and the usage of the digital content. Efforts to resolve these issues have been termed “Intellectual Property Rights Management” (“IPRM”), “Digital Property Rights Management” (“DPRM”), “Intellectual Property Management” (“IPM”), “Rights Management” (“RM”), and “Electronic Copyright Management” (“ECM”), collectively referred to as “Digital Rights Management” (“DRM”) herein.
  • [0004]
    Due to the expansion of the Internet in the recent years, and the issues relating to privacy, authentication, authorization, accounting, payment and financial clearing, rights specification, rights verification, rights enforcement, document protection, and collection of licensing fees DRM has become even more important. Because the Internet is such a widely used network whereby many computer users communicate and trade ideas and information, the freedom at which electronically published works are reproduced and distributed is widespread and commonplace.
  • [0005]
    Two basic types DRM of schemes have been employed to attempt to solve the document protection problem: secure containers and trusted systems. A “secure container” (or simply an encrypted document) offers a way to keep document contents encrypted until a set of authorization conditions are met and some copyright terms are honored (e.g., payment for use). After the various conditions and terms are verified with the document provider, the document is released to the user in clear form. Commercial products such as IBM's CRYPTOLOPES™ and InterTrust's DIGIBOXES™ fall into this category. Clearly, the secure container approach provides a solution to protecting the document during delivery over insecure channels, but does not provide any mechanism to prevent legitimate users from obtaining the clear document and then using and redistributing it in violation of content owners' intellectual property.
  • [0006]
    Cryptographic mechanisms are typically used to encrypt (or “encipher”) documents that are then distributed and stored publicly, and ultimately privately deciphered by authorized users. This provides a basic form of protection during document delivery from a document distributor to an intended user over a public network, as well as during document storage on an insecure medium.
  • [0007]
    In the “trusted system” approach, the entire system is responsible for preventing unauthorized use and distribution of the document. Building a trusted system usually entails introducing new hardware such as a secure processor, secure storage and secure rendering devices. This also requires that all software applications that run on trusted systems be certified to be trusted. While building tamper-proof trusted systems is a real challenge to existing technologies, current market trends suggest that open and untrusted systems such as PC and workstations using browsers to access the Web, will be the dominant systems used to access digital works. In this sense, existing computing environments such as PCs and workstations equipped with popular operating systems (e.g., Windows™, Linux™, and UNIX) and rendering applications such as browsers are not trusted systems and cannot be made trusted without significantly altering their architectures. Of course, alteration of the architecture defeats a primary purpose of the Web, i.e. flexibility and compatibility.
  • [0008]
    U.S. Pat. Nos. 5,530,235, 5,634,012, 5,715,403, 5,638,443, and 5,629,980 introduced many basic concept of DRM. All of these patents are hereby incorporated herein by reference in their entirety. U.S. Pat. No. 5,634,012 discloses a system for controlling the distribution of digital documents. Each rendering device has a repository associated therewith. A predetermined set of usage transaction steps define a protocol used by the repositories for carrying out usage rights associated with a document. Usage rights are encapsulated with the content or otherwise associated with the digital work to travel with the content. The usage rights can permit various types of use such as, viewing only, use once, distribution, and the like. Rights can be granted based on payment or other conditions.
  • [0009]
    In conventional DRM techniques, a content owner, or other authorized party, specifies the rights after the content has been created and protects, e.g. encrypts, the content at the same time. A private key is used to encrypt the content, and a label is generated which specifies the usage rights. The rights label and the protected content are then associated and stored. A license to the content can later be generated for a user to permit the user to use or access the content. The license includes a private key which has been encrypted using a public key in known manner.
  • [0010]
    To access the content, the private key can be used to decrypt the encrypted public key, allowing the user to decrypt the content. This technique works well if the content is available at the time of the rights specification. However, this technique breaks-down if one wants to specify rights for content and issue a license for the content before the content is available. For example, a distributor of streaming video to a live future event, or of photographs to a future event, may want to begin selling licenses to the content prior to the event. Conventional DRM systems fall short of presenting processes for improving the security, user interface, organization, structure, and accuracy of the DRM system, particularly for those works that are not yet in existence.
  • SUMMARY OF THE INVENTION
  • [0011]
    An aspect of the invention is to obviate the problems noted above in the prior technology and permit usage rights to be assigned to a work prior to creation of the work.
  • [0012]
    A further aspect of the invention, includes a method for creating a digital work having content and usage rights related to the content, the digital work being adapted to be used within a system having repositories for controlling use of content, the method including issuing a license to a consumer, the license permitting the consumer to access the content of the digital work to be created in the future. The issuing step further includes determining the usage rights that can be included in the license, the usage rights specifying a type of use of the content that is enforceable by a repository; electronically generating a license based on the usage rights; and creating the digital work as the content is being created or after the content is created, wherein the step of creating the digital work includes securing the content before the digital work is distributed to the consumer.
  • BRIEF DESCRIPTION OF THE DRAWING
  • [0013]
    Various embodiments of this invention will be described in detail, with reference to the following figures, wherein:
  • [0014]
    FIG. 1 is a flowchart of a method for providing usage rights for digital content before creation of the content in accordance with the an embodiment of the invention; and
  • [0015]
    FIG. 2 is a content creation device for providing usage rights for digital content to be created in the future in accordance with an embodiment of the invention.
  • [0016]
    FIG. 3 illustrates the relationship between usage rights, a label and future digital content in accordance with an embodiment for this invention.
  • [0017]
    FIG. 4 is a black diagram of a service which selects appropriate protected digital content based on the client's environment in accordance with an embodiment of the invention.
  • [0018]
    FIG. 5 is a flowchart of a method for providing usage rights for digital content to be created in accordance with an embodiment of the invention.
  • DETAILED DESCRIPTION
  • [0019]
    The phrase “digital work” as used herein refers to any type of element having content in computed readable form. “Content” as used herein refers to the viewable or otherwise usable portion of a digital work. The phrase “usage rights” refers to permissions, in the form of a manner of use, granted to a user of an existing digital work or a digital work to be created in the future with respect to use, access, distribution, and the like of the content of the work. In addition, usage rights may have one or more conditions which must be satisfied before the permissions may be exercised.
  • [0020]
    FIG. 1 illustrates an embodiment of a method for providing usage rights for content of a digital work before the content is created. For each step in this illustration, it is possible that the content, license, label, keys or other data used may be encrypted for added security. In step 100 a label specifying usage rights, to be associated with digital content that is not yet created, is generated. The usage rights label can include usage rights, such as the right to print, copy, alter, edit or view the digital work or any other right, permission, or restriction, such as those contained in the XrML™ language or other usage rights grammar. Alternatively, the usage rights label may include merely an identification of the work and other descriptive data and the specific granted usage rights can be contained in the license discussed below. In the case of using the XrML™ language, the label can be an extensible markup language (XML) document specifying the usage rights. In addition, the future content can have many different versions of usage rights and thus a label can be generated for each version. In step 110, a key, such as a conventional public key, is generated in a known manner and associated with the label.
  • [0021]
    In step 120, a user request for use of, i.e. a license to, the content to be created is received. Keep in mind that the content itself need not be in existence yet. For example, the content can be a video recording or stream of a sporting event to occur in the future. In step 130, a distributor of the content, or another authorized party, issues a license to the user. The license can include a private key corresponding to the public key generated in step 110 and may include usage rights or other descriptive data. Once, again, keep in mind that the content itself need not be in existence yet. Accordingly, the distributor is able to sell a license to view the event prior to the event.
  • [0022]
    In step 140, the content is created. Of course, this step can be accomplished by another party. However the content is created, the salient point is that the content somehow comes into existence after rights are assigned for it. The usage rights label can be encapsulated with or attached to the content whereby copies of the digital work will also carry the usage rights label. Alternatively, the label can be stored separately from the content but be associated through flags, calls, or the like. Therefore, the term “associated” as used herein refers broadly to creating a correspondence between the content and the label so the label will be applied to the content. Once the usage rights label is associated with the content, the content can be secured using the key generated in step 110. The digital content can be secured through any form of encryption or other known technique. For example pretty good privacy (PGP) encryption procedures can be used.
  • [0023]
    In step 160, the process determines whether there is a request for access to the secured digital content. If there are no requests, the process waits for a request. However, if there is a request for access, the process proceeds to step 170 where the usage rights associated with the digital work and/or license are checked to determine whether all the conditions, such as payment, associated with the usage rights have been satisfied. If all the conditions have been satisfied, the process proceeds to step 180 in which access to the content is granted, i.e., the content is downloaded, streamed, or otherwise transferred to the user. In step 190, the user's private key is used to decrypt the content in a known manner.
  • [0024]
    The association of the usage rights with the content may occur in a variety of ways. For example, if the usage rights will be the same for the entire content of a digital work, the usage rights can be attached when the digital work is processed for deposit in a distribution server of other device. However, if the content of the digital work has a variety of different usage rights for various components, the usage rights can be attached as the work is being created. Various authoring tools and/or digital work assembling tools can be utilized for providing an automated process of attaching the usage rights. Because each part of a digital work can have its own usage rights, there can be instances where the usage rights of a “part” will be different from its parent. As such, conflict rules can be established to dictate when and how a right may be exercised.
  • [0025]
    FIG. 2 illustrates a content creation device, a video recorder, in accordance with a preferred embodiment of the invention. The content creation device 300 includes a controller 302, a LCD display 304, a smart-card reader 306, a memory 307, a keypad 308, a rights assignment engine 310, eye/iris recognition sensors 312, a cable connection 313, a handle 314, and symmetric finger print recognition sensors 316,318. Also, lens system 320 permits recording of video images. Controller 302 and rights assignment engine 310 of the preferred embodiment are accomplished through a microprocessor based device programmed in a desired manner.
  • [0026]
    While FIG. 2 shows the controller 302 and the rights assignment engine 310 as separate units, the functions performed by these units may be combined in one processor or may be further divided among plural processors such as digital signal processors and/or performed by dedicated hardware such as application specific integrated circuits (ASIC), e.g., hard-wired electronic or logic circuits or programmable logic devices, or other hardware or software implementations.
  • [0027]
    The smart-card reader 306 can be used for reading cards inserted therein. For example, a license, usage rights, or identification can be embedded in the card and communicated to the controller 302 and/or the rights assignment engine 310. LCD display 304, the smart card reader 306, keypad 308 and software interfaces constitute a user interface of creation server 300. The user interface permits a user to input information such as identification data, and access requests and provides feedback as to operation of creation device 300. The content creation device 300 of the preferred embodiment is a video recorder; however, it can be any type of recording device, for example, a still-image camera, an animation generator, or an audio recorder.
  • [0028]
    The rights assignment engine 310 can be accessed via the cable connection 313. For example, a rights assignment computer (not illustrated), such as any computer running XrML™ and related tools, can be coupled to the rights assignment engine 310 via cable connection 313 to download a usage rights label or template, similar to the label described above, indicating usage rights for content to be created by the content creation device 300 in the future. Any content created by the content creation device 300 will automatically be associated with the usage rights label or labels stored in rights assignment engine 310. Alternatively, the usage rights label can be composed using the user interface of creation device 300. In either case, one or more labels are and corresponding keys generated and stored in rights assignment engine 310 along with instructions indicating how the labels are to be assigned to content recorded by creation device. 300.
  • [0029]
    The instructions can cause the usage rights labels to be assigned in any manner and can include any permissions and/or restrictions. For example, in the case of a video recorder, each part of the video sequence or frames can selectively be assigned different rights. This makes the rights assignment process very flexible and dynamic and permits rights assignment to be made in real time as content is created or prior to creation.
  • [0030]
    The content creation device 300 can utilize a unique device ID, a user's smart card, encryption (e.g. PKI) technology, a PIN, or any biometrics system to assign rights based on the identity of the user, the recording device itself, the data on the smart card, or the like. For example, fingerprint recognition sensors 316, 318 or iris recognition sensor 312 can be used for recognition or authentication of the user's identify to permit rights assignment engine 310 to use a corresponding set of rights associated with the user. For example, all content recorded by person A will have one set of rights and all content recorded by person B will have a different set of rights.
  • [0031]
    The content creation device 300 records content in a conventional manner. However, labels and keys generated in steps 100 and 110 described above are stored and associated with content recorded by content recorder 300 during or soon after recording. Accordingly, steps 140 and 150 described above are also accomplished by content creation device 300. For security purposes, a token or pre-paid card (or magnetic card and smart card, or any of its variations, such as memory-type or synchronous communication card, ISO 7816-compliant card, EMV-type card) can be used for the storage of fees and micro-payments, or keeping track of those fees with associated rights. Such cards can be read using the smart card reader 306.
  • [0032]
    It can be seen that the invention permits usage rights for a work to be created and associated with content prior to the creation of the content. The usage rights define how the future digital work may be used and distributed. These pre-established usage rights become apart of the future digital work and controls the usage and distribution of the content of such work.
  • [0033]
    In the preferred embodiment, after the rights have been established for a future content, a private key associated with the future content is assigned and a rights label is generated. This private key, along with the rights label, is stored. A user can purchase the content (present or future) after the label has been inserted into the main server or other devices. After the content is purchased, the content owner can get a license for encryption which contains the public key encrypted by a private key. Alternatively, a single symmetric key can be used.
  • [0034]
    The label represented by step 100 in FIG. 1 may serve as a reference to another work. The label in this case would serve as a placeholder for future content. The label may be an empty file or contain computer interpretable or human interpretable data that may be used to later associate it with the future digital content. When it is created the label may include usage right information but it does not need to. The usage rights information can be supplied later. When the usage rights are generated, as represented by step 130 in FIG. 1, the content referred to by the usage rights would be the label, and need not be the actual digital content. The label could then be referenced to determine which digital content the user is requesting access to. The means of associating the label with the actual content may be done in a variety of ways including the use of human-interpretable text, numeric references, pointers, markup languages such as HTML and XML, programmable scripts or even SQL queries.
  • [0035]
    FIG. 3 illustrates this embodiment. In FIG. 3, license 220 containing usage rights is issued to a user. Since digital content 260 for the license does not yet exist, label 240 is created to act as a placeholder for the future content. The label would contain or imply a relationship between itself and digital content to be created in the future. This relationship may be implied such as naming the label using a product ID or other reference that can later be associated with the digital content, or it may be an actual reference such as human-interpretable text containing the name of the future content or content within the label that can later be used to derive the actual digital content. The label to which the license is bound is used in the appropriate manner to determine the actual digital content with which the label is associated. The rights and any conditions specified in the usage rights would apply to the actual content, not the label that it represents. The steps discussed above do not necessarily have to be performed in the order shown in the figure. For example, the label can be created before or after the license and before or after the content.
  • [0036]
    Usage rights associated with the future digital content may be specified within a license, the label or even the content itself. These usage rights apply to the digital content pointed to by the label, regardless of where they are stored and the method used for storage.
  • [0037]
    FIG. 5 illustrates an embodiment of a method for providing usage rights for content of a digital work that is created dynamically at the time the user requests it. The steps illustrated in FIG. 5 do not necessarily have to be performed in the order shown in the figure. For example the label can be created before or after the license and before or after the content. In step 500 a label representing digital content that is not yet created, is generated. The label can include usage rights, such as the right to print, copy, alter, edit or view the digital work or any other right, permission, condition or restriction, such as those contained in the ISO MPEG REL, XrML, ODRL, the Open Mobile Alliance REL or any other usage rights grammar. Alternatively, the usage rights label may include merely an identification of the work and other descriptive data and the specific granted usage rights can be contained in the license discussed below. In the case of using the ISO MPEG REL for example, the label can be an extensible markup language (XML) document specifying the usage rights. In addition, the future content can have many different versions of usage rights and thus a label can be generated for each version. In step 510, the label may be protected by using known encryption techniques.
  • [0038]
    In step 520, a distributor of the content, or another authorized party, makes available a license to a user. The license can be protected using a private key such as the one corresponding to the public key generated in step 110 and may include usage rights or other descriptive data. Once, again, keep in mind that the content itself need not be in existence yet. Accordingly, for example, a distributor is able to offer a license to view an event prior to the event occurring.
  • [0039]
    In step 530, a user obtains a license to (i.e. receives the right to use) the content to be created. The user may request the license or may receive the license without requesting it. Keep in mind that the content itself need not be in existence yet. For example, the content can be a video recording or stream of a sporting event to occur in the future.
  • [0040]
    In step 540, the content is created. Of course, this step can be accomplished by another party. However the content is created, the salient point is that the content somehow comes into existence after rights are assigned for it. In this embodiment, the content is created in response to the request for content performed previously in step 530. After the content is created, the label is associated with the content in step 550. The label can be encapsulated with or attached to the content whereby copies of the digital work will also carry the label. Alternatively, the label can be stored separately from the content but be associated through flags, calls, or the like. Therefore, the term “associated” as used herein refers broadly to creating a correspondence between the content and the label so the label will be applied to represent the content. Once the usage rights label is associated with the content, the content may or may not be secured using the key generated in step 510. The digital content can be secured through any form of encryption or other known technique. For example pretty good privacy (PGP) encryption procedures can be used.
  • [0041]
    In step 560 the usage rights associated with the digital work and/or license are checked to determine whether the use of the digital work is permitted by the usage rights and if there are conditions to the use, all the conditions, such as payment, associated with the usage rights whether the conditions have been satisfied. If the use attempted by the user is permitted and all the conditions, if any, have been satisfied, the process proceeds to step 570 in which access to the content is granted (e.g., the content is downloaded, streamed, or otherwise transferred to the user or the user is permitted to render the content or otherwise use the content in the permitted manner). In step 580, if the content was encrypted the user's private key is used to decrypt the content in a known manner.
  • [0042]
    The invention can be used in a subscription model (for example, for magazine or marketing reports) in which the future issues of the content have not been published, but the rights for those issues have already been assigned and stored. At an appropriate future time, the rights will be associated with the corresponding content. For example, by selling the content of a future event on a web site before the actual event, the traffic of the Web site can be drastically reduced and distributed over a longer period of time, making the requirements for the servers and the Web site easier to satisfy and less expensive to operate. Note, however, that the Web site selling the rights or tickets, i.e. the license, might be different from the Web site providing the content later on.
  • [0043]
    The invention may also be used in a flexible subscription model such as identifying multiple issues of a periodical. In this case, the label might contain human-readable text such as “Issues 34-56 of Newsweek Online” with the usage rights to the content specified in a separate license. The label in this case could represent multiple digital works with a single label.
  • [0044]
    Another possible use for this invention is the area of services. Some services take an instruction and then generate content as a return value. For example; a user may send a request to a service which contains some information about their operating system, platform or environment. The service could utilize this information to generate or select content appropriate to the user from plural instances of content and return both the content and usage rights that would allow the user to utilize the content. In other words, the service could generate protected digital content customized to a user service 400 receivers environment, such as the user's identity preferences, or computer system.
  • [0045]
    FIG. 4 illustrates this embodiment. Client request 402, consisting of a set of usage rights, along with information about the client environment. The request or usage rights are bound to label which exists within the service. When the service receives the request, it references the indicated label, combined with the client environment information to determine which content, Windows content 406 or Linux content 407 for example, is best suited to the user. As in previous embodiments, the usage rights and label were created prior to the existence of the digital content. Simply put, this embodiment allows the pre-sale and licensing of protected digital content.
  • [0046]
    This invention may even be used to help manage limited distribution where digital content is regulated or limited in some fashion. Imagine a content creator that wishes to restrict the number of copies a particular distributor is capable to selling. Such a business model might be created by placing a unique identifier on each copy of the digital content the creator gives to the distributor. This identifier might be a unique serial number or simply a date & time stamp. The distributor is given only the number of individualized copies of the digital content that they are authorized to sell each month. Once the quantity has been distributed, rather than turning away customers, the distributor might choose to use a label to represent the content they will receive the following month. This would allow them to better serve their customers, continue distribution of the content while at the same time honoring the content creator's desires by only distributing a limited amount each month.
  • [0047]
    Also, the invention allows a newspaper editor, for example, to send a camera crew to record content without worrying about the pictures being compromised in any way (for example, altered, edited, viewed by unauthorized personnel, or hidden and separately sold to another newspaper organization). In fact, the camera crew may have no rights whatsoever in the content as soon as the content is recorded.
  • [0048]
    Alternatively the editor can set the rights in such a way that the first 10 pictures, for example, will belong to the newspaper (work-related), and the next five pictures will belong to the cameraman (for personal use). This example illustrates the flexibility, security, confidence, certainty, and multiple relationships that can be arranged between parties (the cameraman and the editor in this example).
  • [0049]
    All future content may be assigned a content ID prior to existence of the content. Given the content ID information and the license for encryption, the content can be encrypted after creation in a manner that is available to be used by the users who have purchased the license. However, if the content ID information and the license for encryption are not available, access to the content shall be denied.
  • [0050]
    Further, a predetermined symmetric key can be generated in advance of content creation, and stored with the rights label. Afterwards, the same key can be used to encrypt the content once it is created. However, as noted above every user can receive a different key. In another alternative, the user can be given an authorization token, which the user can exchange for the license later on.
  • [0051]
    The controller 302 can process the security parameters and the rights management steps. Lost-card verification, lost-card reports, card-usage reports, security alert reports, and tracking reports can be associated or combined with the rights management reports, such as reports for revoked rights, denied rights, renewed rights, usage patterns, and micro-payments.
  • [0052]
    In the preferred embodiments, the label is a placeholder. the label need not have to have specific content or usage rights. The label can be a placeholder for both usage rights and content. Or for just one of these two. For example, the label can be a file with a pointer (or empty data portion) for three things: content, usage rights and an association means. The association means can be supplied first. The other two pieces of information can be supplied subsequently in any order. Conventionally, content is created first and then rights are associated with the content. With the invention, an association of content to rights can be created before the content is even created.
  • [0053]
    The invention may be readily implemented in software using object or object-oriented software development environment that provides portable source code that can be used on a variety of computer hardware platforms. For example the software can be written in the JAVA™ language and run in a JAVA™ virtual machine. Alternatively, the disclosed operations may be implemented partially or fully in a hardware using standard logic circuits or VLSI designs. The hardware can include any type of general purpose computer, dedicated computer, or other devices.
  • [0054]
    The distribution, accounting, and other functions of the distributor and clearinghouse can be accomplished by any party on any device. For example, the content can be rendered on an ebook reader or PDA in response to entry of a code or insertion of a smartcard into a reader and accounting can be accomplished when the digital work or accounting data is returned to a specific source. The division of tasks disclosed herein is only an example. Usage rights and or accounting data can be encapsulated with the digital work or can be stored separately. Code for rendering, decrypting, or otherwise permitting or limiting use of the content can be stored on any device or can be encapsulated with the digital work. Any distribution arrangement can be used with the invention and such arrangements can include any combination of devices, such as personal computers, servers, PDAs, and the like communicating with one another in any manner as is necessary to transfer the desired information.
  • [0055]
    The invention has been described in connection with the above embodiments. However, it should be appreciated that many alternates, modifications and variations may be made to the embodiments of the invention without departing from the scope of the invention as defined by the appended claims and legal equivalents.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US3790700 *Dec 17, 1971Feb 5, 1974Hughes Aircraft CoCatv program control system
US3798605 *Jun 30, 1971Mar 19, 1974IbmCentralized verification system
US4200700 *May 12, 1978Apr 29, 1980Idc Chemie AgMethod of after-foaming a mixture of a foam and a resin solution
US4323921 *Jan 23, 1980Apr 6, 1982Etablissement Public De Diffusion Dit "Telediffusion De France"System for transmitting information provided with means for controlling access to the information transmitted
US4429385 *Dec 31, 1981Jan 31, 1984American Newspaper Publishers AssociationMethod and apparatus for digital serial scanning with hierarchical and relational access
US4442486 *Nov 25, 1981Apr 10, 1984U.S. Philips CorporationProtected programmable apparatus
US4644493 *Sep 14, 1984Feb 17, 1987International Business Machines CorporationImplementing a shared higher level of privilege on personal computers for copy protection of software
US4736422 *Jul 2, 1984Apr 5, 1988Independent Broadcasting AuthorityEncrypted broadcast television system
US4740890 *Dec 22, 1983Apr 26, 1988Software Concepts, Inc.Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
US4796220 *Dec 15, 1986Jan 3, 1989Pride Software Development Corp.Method of controlling the copying of software
US4816655 *Dec 9, 1986Mar 28, 1989Centre D'etude De L'energie Nucleaire, "C.E.N."Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereof
US4817140 *Nov 5, 1986Mar 28, 1989International Business Machines Corp.Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US4827508 *Oct 14, 1986May 2, 1989Personal Library Software, Inc.Database usage metering and protection system and method
US4891838 *Nov 4, 1985Jan 2, 1990Dental Data Service, Inc.Computer accessing system
US4924378 *Jun 13, 1988May 8, 1990Prime Computer, Inc.License mangagement system and license storage key
US4999806 *Sep 4, 1987Mar 12, 1991Fred ChernowSoftware distribution system
US5010571 *Sep 10, 1986Apr 23, 1991Titan Linkabit CorporationMetering retrieval of encrypted data stored in customer data retrieval terminal
US5014234 *Aug 25, 1986May 7, 1991Ncr CorporationSystem with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5103476 *Nov 7, 1990Apr 7, 1992Waite David PSecure system for activating personal computer software at remote locations
US5113519 *May 15, 1989May 12, 1992International Business Machines CorporationMaintenance of file attributes in a distributed data processing system
US5183404 *Apr 8, 1992Feb 2, 1993Megahertz CorporationSystems for connection of physical/electrical media connectors to computer communications cards
US5191193 *Oct 9, 1990Mar 2, 1993Gemplus Card InternationalSystem of payment or information transfer by money card with electronic memory
US5204897 *Jul 14, 1992Apr 20, 1993Digital Equipment CorporationManagement interface for license management system
US5276444 *Sep 23, 1991Jan 4, 1994At&T Bell LaboratoriesCentralized security control system
US5276735 *Apr 17, 1992Jan 4, 1994Secure Computing CorporationData enclave and trusted path system
US5287408 *Aug 31, 1992Feb 15, 1994Autodesk, Inc.Apparatus and method for serializing and validating copies of computer software
US5291596 *Feb 16, 1993Mar 1, 1994Fuji Xerox Co., Ltd.Data management method and system with management table indicating right of use
US5293422 *Sep 23, 1992Mar 8, 1994Dynatek, Inc.Usage control system for computer software
US5301231 *Feb 12, 1992Apr 5, 1994International Business Machines CorporationUser defined function facility
US5311591 *Jun 3, 1993May 10, 1994Fischer Addison MComputer system security method and apparatus for creating and using program authorization information data structures
US5381526 *Sep 11, 1992Jan 10, 1995Eastman Kodak CompanyMethod and apparatus for storing and retrieving generalized image data
US5386369 *Jul 12, 1993Jan 31, 1995Globetrotter Software Inc.License metering system for software applications
US5390297 *Nov 10, 1987Feb 14, 1995Auto-Trol Technology CorporationSystem for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US5394469 *Feb 18, 1994Feb 28, 1995Infosafe Systems, Inc.Method and apparatus for retrieving secure information from mass storage media
US5410598 *Sep 27, 1994Apr 25, 1995Electronic Publishing Resources, Inc.Database usage metering and protection system and method
US5412717 *May 15, 1992May 2, 1995Fischer; Addison M.Computer system security method and apparatus having program authorization information data structures
US5414852 *Oct 30, 1992May 9, 1995International Business Machines CorporationMethod for protecting data in a computer system
US5485577 *Dec 16, 1994Jan 16, 1996General Instrument Corporation Of DelawareMethod and apparatus for incremental delivery of access rights
US5499298 *Mar 17, 1994Mar 12, 1996National University Of SingaporeControlled dissemination of digital information
US5502766 *Oct 26, 1993Mar 26, 1996Secure Computing CorporationData enclave and trusted path system
US5504814 *Jan 24, 1994Apr 2, 1996Hughes Aircraft CompanyEfficient security kernel for the 80960 extended architecture
US5504816 *Feb 2, 1994Apr 2, 1996Gi CorporationMethod and apparatus for controlling access to digital signals
US5504818 *Sep 30, 1994Apr 2, 1996Okano; HirokazuInformation processing system using error-correcting codes and cryptography
US5504837 *May 10, 1993Apr 2, 1996Bell Communications Research, Inc.Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes
US5509070 *Dec 15, 1992Apr 16, 1996Softlock Services Inc.Method for encouraging purchase of executable and non-executable software
US5619570 *Oct 8, 1993Apr 8, 1997Sony CorporationInformation furnishing and collection system
US5621797 *Dec 19, 1995Apr 15, 1997Citibank, N.A.Electronic ticket presentation and transfer method
US5625690 *Nov 15, 1993Apr 29, 1997Lucent Technologies Inc.Software pay per use system
US5629980 *Nov 23, 1994May 13, 1997Xerox CorporationSystem for controlling the distribution and use of digital works
US5633932 *Dec 19, 1995May 27, 1997Intel CorporationApparatus and method for preventing disclosure through user-authentication at a printing node
US5634012 *Nov 23, 1994May 27, 1997Xerox CorporationSystem for controlling the distribution and use of digital works having a fee reporting mechanism
US5708709 *Dec 8, 1995Jan 13, 1998Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US5708717 *Nov 29, 1995Jan 13, 1998Alasia; AlfredDigital anti-counterfeiting software method and apparatus
US5715403 *Nov 23, 1994Feb 3, 1998Xerox CorporationSystem for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5729741 *Apr 10, 1995Mar 17, 1998Golden Enterprises, Inc.System for storage and retrieval of diverse types of information obtained from different media sources which includes video, audio, and text transcriptions
US5734823 *Jul 25, 1996Mar 31, 1998Microtome, Inc.Systems and apparatus for electronic communication and storage of information
US5734891 *Jun 12, 1996Mar 31, 1998Saigh; Michael M.Systems and apparatus for electronic communication and storage of time encoded information
US5737413 *Apr 3, 1995Apr 7, 1998Fujitsu LimitedInformation distribution system wherein storage medium storing ciphered information is distributed
US5737416 *Aug 2, 1996Apr 7, 1998International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5745569 *Jan 17, 1996Apr 28, 1998The Dice CompanyMethod for stega-cipher protection of computer code
US5745879 *Sep 6, 1995Apr 28, 1998Digital Equipment CorporationMethod and system for managing execution of licensed programs
US5748783 *May 8, 1995May 5, 1998Digimarc CorporationMethod and apparatus for robust information coding
US5757907 *Apr 25, 1994May 26, 1998International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
US5862217 *Mar 28, 1996Jan 19, 1999Fotonation, Inc.Method and apparatus for in-camera encryption
US5870473 *Dec 14, 1995Feb 9, 1999Cybercash, Inc.Electronic transfer system and method
US5892900 *Aug 30, 1996Apr 6, 1999Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6020882 *Feb 10, 1998Feb 1, 2000U.S. Philips CorporationTelevision access control system
US6047067 *Dec 19, 1997Apr 4, 2000Citibank, N.A.Electronic-monetary system
US6169976 *Jul 2, 1998Jan 2, 2001Encommerce, Inc.Method and apparatus for regulating the use of licensed products
US6185683 *Dec 28, 1998Feb 6, 2001Intertrust Technologies Corp.Trusted and secure techniques, systems and methods for item delivery and execution
US6189037 *May 20, 1997Feb 13, 2001Intel CorporationBroadband data interface
US6189146 *Mar 18, 1998Feb 13, 2001Microsoft CorporationSystem and method for software licensing
US6209092 *Jan 27, 1998Mar 27, 2001U.S. Philips CorporationMethod and system for transferring content information and supplemental information relating thereto
US6216112 *May 27, 1998Apr 10, 2001William H. FullerMethod for software distribution and compensation with replenishable advertisements
US6219652 *Jun 1, 1998Apr 17, 2001Novell, Inc.Network license authentication
US6223286 *Mar 18, 1997Apr 24, 2001Kabushiki Kaisha ToshibaMulticast message transmission device and message receiving protocol device for realizing fair message delivery time for multicast message
US6226618 *Aug 13, 1998May 1, 2001International Business Machines CorporationElectronic content delivery system
US6233684 *Oct 10, 1997May 15, 2001Contenaguard Holdings, Inc.System for controlling the distribution and use of rendered digital works through watermaking
US6236971 *Nov 10, 1997May 22, 2001Contentguard Holdings, Inc.System for controlling the distribution and use of digital works using digital tickets
US6237786 *Jun 17, 1999May 29, 2001Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6240185 *Feb 10, 1999May 29, 2001Intertrust Technologies CorporationSteganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6345256 *Dec 1, 1998Feb 5, 2002International Business Machines CorporationAutomated method and apparatus to package digital content for electronic distribution using the identity of the source content
US6353888 *Jul 6, 1998Mar 5, 2002Fuji Xerox Co., Ltd.Access rights authentication apparatus
US6363488 *Jun 7, 1999Mar 26, 2002Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6516052 *Jun 23, 1998Feb 4, 2003British Telecommunications Public Limited CompanyMethod of scheduling connections
US6516413 *Feb 4, 1999Feb 4, 2003Fuji Xerox Co., Ltd.Apparatus and method for user authentication
US6523745 *Aug 5, 1997Feb 25, 2003Enix CorporationElectronic transaction system including a fingerprint identification encoding
US6853728 *Jul 21, 2000Feb 8, 2005The Directv Group, Inc.Video on demand pay per view services with unmodified conditional access functionality
US7484246 *Aug 31, 2001Jan 27, 2009Sony CorporationContent distribution system, content distribution method, information processing apparatus, and program providing medium
US20020001387 *Aug 6, 2001Jan 3, 2002Dillon Douglas M.Deferred billing, broadcast, electronic document distribution system and method
US20020004779 *Jun 28, 1999Jan 10, 2002James J. TurkElectronic cash eliminating payment risk
US20020035618 *Aug 1, 2001Mar 21, 2002Mendez Daniel J.System and method for transmitting workspace elements across a network
US20020044658 *Jun 14, 2001Apr 18, 2002Wasilewski Anthony J.Conditional access system
US20020049717 *May 10, 2001Apr 25, 2002Routtenberg Michael D.Digital content distribution system and method
US20030023564 *Jun 6, 2002Jan 30, 2003Contentguard Holdings, Inc.Digital rights management of content when content is a future live event
US20040015437 *Jun 9, 2001Jan 22, 2004Je-Hyung ChoiSystem for providing information using medium indicative of effective term and authorization of charged internet site and settling accounts for use of provided information
US20040024688 *Nov 6, 2001Feb 5, 2004Depeng BiDigital content distribution and subscription system
US20040052370 *Aug 11, 2003Mar 18, 2004Katznelson Ron D.Multichannel quadrature modulation
US20100106659 *Dec 31, 2009Apr 29, 2010Contentguard Holdings, Inc.System and method for enforcing usage rights associated with digital content
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7962416 *Nov 22, 2000Jun 14, 2011Ge Medical Technology Services, Inc.Method and system to remotely enable software-based options for a trial period
US8335985 *May 21, 2010Dec 18, 2012Fuji Xerox Co., Ltd.Document use managing system, document processing apparatus, manipulation authority managing apparatus, document managing apparatus and computer readable medium
US8856861 *Dec 20, 2007Oct 7, 2014Samsung Electronics Co., Ltd.Generic rights token and DRM-related service pointers in a common protected content file
US9026078Sep 18, 2013May 5, 2015At&T Intellectual Property I, LpMethod and apparatus for policy management in a communication system
US20090165080 *Dec 20, 2007Jun 25, 2009Samsung Electronics Co., LtdGeneric rights token and drm-related service pointers in a common protected content file
US20110145702 *May 21, 2010Jun 16, 2011Fuji Xerox Co., LtdDocument use managing system, document processing apparatus, manipulation authority managing apparatus, document managing apparatus and computer readable medium
Classifications
U.S. Classification705/54, 705/59, 705/55, 705/1.1
International ClassificationG06Q20/12, H04L9/32, H04L29/08, G09C1/00, H04K1/00, H04L29/06, G06F21/00, G06Q99/00, G11B20/00
Cooperative ClassificationG06Q50/184, G06F21/60, G06Q10/10, H04L63/10, G06F2221/2153, G06F21/10, G06F2221/2141, G11B20/0071, H04N21/83555, G06Q20/1235, H04L2463/102, H04L2463/101, H04N21/4627, G11B20/0021, H04N21/2541, H04N21/8355, G07F17/16, G11B20/00086, H04L67/34
European ClassificationH04N21/8355, H04N21/254R, G06Q20/1235, H04N21/8355L, G06F21/10, G11B20/00P10, G07F17/16, H04N21/4627, G11B20/00P5, H04L63/10, G11B20/00P, H04L29/08N33