WO2005066824A1 - Method and apparatus for limiting number of times contents can be accessed using hashing chain - Google Patents
Method and apparatus for limiting number of times contents can be accessed using hashing chain Download PDFInfo
- Publication number
- WO2005066824A1 WO2005066824A1 PCT/KR2005/000054 KR2005000054W WO2005066824A1 WO 2005066824 A1 WO2005066824 A1 WO 2005066824A1 KR 2005000054 W KR2005000054 W KR 2005000054W WO 2005066824 A1 WO2005066824 A1 WO 2005066824A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- contents
- hash
- hash chain
- axessed
- user terminal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000003247 decreasing effect Effects 0.000 claims abstract description 3
- 230000006870 function Effects 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000033458 reproduction Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Definitions
- the present invention relates to technology of limiting a number of times digital contents disseminated over a network can be accessed, and more particularly, to a method and apparatus for limiting the number of times that the digital contents can be accessed using a hash chain, and a computer readable recording medium on which a program executing the method is recorded.
- Korean Patent No. 2002-18427 entitled ' System for automatically erasing digital contents
- Korean Patent No. 2002-5614 entitled 'Method and system for safely distributing computer software products,' provides a system distributing a software program over a network or using a portable storage medium such as a DVD or a CD-ROM and not allowing a user to axess the software program after the software program has be reproduced a set number of times or after a set period of time has passed.
- Korean Patent No. 2001 -88881 entitled 'Method of protecting copyrights on contents,' provides a method in which digital contents requested by a mobile communications terminal and information regarding a limited number of times that the digital contents can be reproduced are transmitted. Once this is received, the mobile communications terminal can reproduce the digital contents only up to the limited number of times
- Korean Patent No. 2002-18427 the audio and visual quality of the digital contents deteriorate whenever reproduced.
- Korean Patent No. 2002-5614 uses a public key infrastructure (PKf) notorious for its inefficient operation.
- PKf public key infrastructure
- Korean Patent No. 2001-88881 since a user manages the information regarding the limited number of times that the digital contents can be reproduced, the information can be modified or illegally disseminated. Disclosure of Invention Technical Solution [7]
- the present invention provides a method and apparatus for simply and securely limiting a number of times that digital contents can be axessed using a hash chain.
- the present invention may be used to limit a number of times contents are axessed simply and securely using the one-wayness of a hash function and a hash chain composed of hash values corresponding to a limit number.
- the present invention further provides a method of transmitting contents securely. In this method, whenever a user axesses a system, the contents are encrypted using a hash value, and encrypted contents are transmitted to the user.
- a contents supplier not a user terminal, manages information regarding axess authority of the contents, thus preventing illegal distribution of the contents by the ill-intended manipulation or hacking by the user. Description of Drawings [11] FIG.
- FIG. 1 is a block diagram of a system limiting a number of times that digital contents can be accessed according to an exemplary embodiment of the present invention
- FIG. 2 illustrates a method of purchasing authority to axess contents axording to an exemplary embodiment of the present invention
- FIG. 3 illustrates a user information database of a contents supplying server of the system of FIG. 1 axording to an exemplary embodiment of the present invention
- FIG. 4 illustrates a hash chain database of the contents supplying server of the system of FIG. 1 axording to an exemplary embodiment of the present invention
- FIG. 1 is a block diagram of a system limiting a number of times that digital contents can be accessed according to an exemplary embodiment of the present invention
- FIG. 2 illustrates a method of purchasing authority to axess contents axording to an exemplary embodiment of the present invention
- FIG. 3 illustrates a user information database of a contents supplying server of the system of FIG. 1 axor
- FIG. 5 illustrates a method of axessing the contents for a j time axording to an exemplary embodiment of the present invention
- FIG. 6 illustrates a method of limiting the number of times of axess to the contents axording to an exemplary embodiment of the present invention.
- Best Mode [17] The present invention further provides a method and apparatus for limiting the number of times that the digital contents can be axessed in which a digital contents supplier manages information regarding a limited number of times that the digital contents can be axessed, thereby effectively managing copyrights on the digital contents.
- an apparatus limiting a number of times contents are axessed by a user terminal.
- the apparatus includes a hash chain generator receiving information indicating selected contents by the user terminal and information indicating how many times (n) the user terminal has authority to axess the selected contents and generating a hash chain comprising n hash values derived from a seed value; and a contents axess manager deleting the hash values one by one from the hash chain whenever the user terminal axesses the selected contents such that the number of times the contents can be axessed by the user terminal is decreased by the number of deleted hash values.
- the hash chain generator may generate the seed value randomly and transmit the generated seed value to the user terminal such that the user terminal can also generate a hash chain identical to the hash chain generated by the hash chain generator based on the seed value.
- the seed value may be received from the user terminal.
- the contents axess manager may encrypt the contents using one of the hash values of the hash chain and transmit encrypted contents to the user terminal, thereby allowing the user terminal to axess the contents.
- the hash value used for encryption may be deleted from the hash chain.
- the contents axess manager may encrypt the selected contents using a hash value corresponding to a total number of times that the contents have been axessed, transmit the encrypted contents to the user terminal when the hash value corresponding to the total number of times that the selected contents have been axessed is received from the user terminal, and point a pointer of the hash chain to a hash value corresponding to a next number of times the selected contents have been axessed.
- Axording to another aspect of the present invention there is provided a method of limiting a number of times contents are axessed.
- the method includes receiving information indicating selected contents by a user terminal and information indicating how many times (n) the user terminal has authority to axess the selected contents, and generating a hash chain comprising n hash values derived from a seed value.
- the seed value may be received from a terminal requesting axess to the contents.
- the seed value may be generated by a server allowing axess to the contents.
- a method of limiting a number of times contents are axessed by a contents requester having authority to axess the contents n times.
- the method includes preparing a hash chain with respect to the contents, the hash chain comprising n hash values derived from a seed value; and deleting a hash value from the hash chain whenever the contents requester axesses the contents such that the total number of hash values deleted equals the number of times that the contents have been axessed by the contents requester.
- the deleting the hash value from the hash chain whenever the contents requester axesses the contents may include encrypting the contents using one of the hash values of the hash chain and transmitting encrypted contents to the contents requester, thereby allowing the contents requester to axess the contents.
- the hash value used for encryption may be deleted from the hash chain.
- the encrypting the contents using one of the hash values of the hash chain and transmitting the encrypted contents to the contents requester may include encrypting the contents using a hash value corresponding to a total number of times that the contents have been axessed and transmitting the encrypted contents to the contents requester when receiving the hash value corresponding to the total number of times that the contents have been axessed from the contents requester; and pointing a pointer of the hash chain to a hash value corresponding to a next number of times that the contents have been axessed.
- a computer readable recording medium on which a program executing a method of limiting a number of times contents are axessed by a contents requester having authority to axess the contents n times has been recorded.
- an apparatus having authority to axess contents n times.
- the apparatus includes a hash chain generator generating a hash chain comprising n hash values derived from a seed value; a hash chain manager transmitting to a contents supplier a hash value corresponding to a total number of times that the contents have been axessed; and a contents decrypter decrypting encrypted contents received from the contents supplier using the hash value corresponding to the total number of times that the contents have been axessed.
- the hash chain manager may delete the hash value corresponding to the total number of times that the contents have been used from the hash chain.
- the seed value may be received from the contents supplier.
- a computer readable recording medium on which a program executing a method of limiting a number of times contents are axessed by a contents requester having authority to axess the contents n times is recorded.
- the method includes generating a hash chain comprising n hash values derived from a seed value; transmitting to the contents supplying server a hash value corresponding to a total number of times that the contents have been axessed; receiving encrypted contents using the hash value corresponding to the axumulated number of axess to the contents from the contents supplying server; and decrypting the encrypted contents encrypted using the hash value corresponding to the total number of times that the contents have been axessed.
- the generating the hash chain including n hash values derived from a seed value may further include generating the seed value randomly and transmitting the generated seed value to the contents supplying server such that the contents supplying server can also generate a hash chain identical to the hash chain generated by the hash chain generator based on the seed value.
- the seed value may be received from the contents supplying server.
- the method may further include deleting the hash value corresponding to the total number of times that the contents have been axessed from the hash chain after completing the decrypting the encrypted contents; and pointing a pointer of the hash chain to a hash value corresponding to a next number of times that the contents have been axessed.
- FIG. 1 is a block diagram of a system limiting a number of times that digital contents can be axessed axording to an exemplary embodiment of the present invention.
- the system includes a contents supplying server 10 and a user terminal 15 axessing the contents supplying server 10 through a wireless or wired communications network.
- the contents supplying server 10 includes a user information database (DB) 110, a hash chain DB 114, a contents DB 118, a user authenticator 120, a seed value generator 122, a has chain generator 124, a hash chain manager 126, a contents encrypter 128, and a communicator 130.
- the user information DB 110 stores user IDs registered in the contents supplying server 10.
- the hash chain DB 114 stores a plurality of hash values to be used as encryption keys for encrypting contents to be transmitted to the user terminal 15.
- the contents DB 118 stores contents to be transmitted to the user terminal 15.
- the user authenticator 120 authenticates the user terminal 15 requesting the contents.
- the seed value generator 122 generates and outputs seed values required for generating a hash chain.
- the hash chain generator 124 generates a hash chain composed of a plurality of hash values derived from the seed values generated by the seed value generator 122.
- the hash chain manager 126 manages the hash chain DB 114 by determining whether a user is authorized to axess contents, outputting a hash value to be used as an encryption key for encrypting the contents, and deleting the hash value used as an encryption key from the hash chain.
- the contents encrypter 128 encrypts the contents requested by the user using the hash value output from the hash chain manager 126.
- the communicator 130 exchanges data with the user terminal 15.
- the contents supplying server 10 receives a request for purchasing contents from the user terminal 15, provides a web page for supplying the contents to the user terminal 15, and manages billing for the supply of the contents.
- the user terminal 15 includes a communicator 151, a hash chain generator 155, a hash chain DB 157, a contents decrypter 159, and a controller 153.
- the communicator 151 exchanges data with the contents supplying server 10.
- the hash chain generator 155 generates a hash chain including a plurality of hash values based on the seed value received from the contents supplying server 10.
- the hash chain DB 157 stores the generated hash chain.
- the contents decrypter 159 receives the contents encrypted using a predetermined hash value from the contents supplying server 10 and decrypts the encrypted contents using a predetermined hash value stored in the hash chain DB 157.
- the controller 153 controls the overall operation of the user terminal 15.
- the user information DB 110, the hash chain DB 114, and the contents DB 118 may be recording mediums such as hard discs.
- the user authenticator 120, the seed value generator 122, the hash chain generator 124, the hash chain manager 126, the contents encrypter 128, and the communicator 130 may ea h be embodied via a central processing unit (CPU), a memory device such as a random axess memory (RAM) or a read only memory (ROM), and a program executed by the CPU.
- CPU central processing unit
- RAM random axess memory
- ROM read only memory
- FIG. 2 illustrates a method axording to an exemplary embodiment of the present invention in which a user purchases authority to axess contents n times from the contents supplying server 10 using the user terminal 15, wherein n is a natural number.
- the controller 153 of the user terminal 15 receives from a user a request for purchasing contents ⁇ and a number of times of authorized axess to the contents ⁇ (hereinafter called a limit number) and transmits the request and the limit number to the contents supplying server 10 via the communicator 151 (Operation S202).
- the user authenticator 120 of the contents supplying server 10 authenticates the user using user information stored in the user information DB 110 and transmits the request for purchasing the contents ⁇ to the seed value generator 122 (Operation S204).
- the seed value generator 122 receives the request for purchasing the contents ⁇ and randomly generates a seed value S, based on which a hash chain composed of hash values for determining the limit number is generated.
- the seed value generator 122 transmits the request, the limit number, and the seed value S to both the hash chain generator 124 and the user terminal 15 (Operation S206).
- the hash chain generator 124 generates a hash chain including n hash values based on the request for purchasing the contents ⁇ , the limit number, and the seed value S received from the seed value generator 122, and stores the hash chain in the hash chain DB 114 (Operation S208).
- the hash chain generator 155 of the user terminal 15 also generates a hash chain including n hash values based on the seed value S received from the seed value generator 122 of the contents supplying server 10, the request for purchasing the contents ⁇ , and the limit number received from controller 153, and stores the hash chain in the hash chain DB 157.
- the hash chain generators 124 and 155 generate the hash chains using identical hash functions.
- the hash function should meet the conditions of weak collision freeness and one- wayness.
- a hash function H(x) has one-wayness if, when given H(a), it is difficult to find a.
- FIG. 3 illustrates the user information DB 110 of the contents supplying server 10 according to an exemplary embodiment of the present invention.
- FIG. 3 illustrates the user information DB 110 of the contents supplying server 10 according to an exemplary embodiment of the present invention.
- the user information DB 110 includes a plurality of tables in which purchase histories are sorted axording to user ID.
- the hash chain DB 114 includes a plurality of tables in which the hash values generated by the hash chain generator 124 based on a seed value generated by the seed value generator 122 are sorted axording to contents that a user purchased.
- a user for example, Samsung, purchased authority to axess first contents ⁇ 1, second contents ⁇ 2, and third contents ⁇ 3.
- FIG. 3 a user, for example, Samsung, purchased authority to axess first contents ⁇ 1, second contents ⁇ 2, and third contents ⁇ 3.
- the user Samsung
- FIG. 5 illustrates a method in which a user who has purchased the authority to axess the contents ⁇ n times axesses the contents ⁇ using the user terminal 15 according to an exemplary embodiment of the present invention.
- the controller 153 of the user terminal 15 transmits to the contents supplying server 10 a j request for axessing the contents ⁇ and a hash value ⁇ corresponding to the j n-J axess to the contents ⁇ (Operation S502).
- the user authenticator 120 of the contents supplying server 10 authenticates the user by determining whether the user has the authority to axess the contents ⁇ based on the user information stored in the user information DB 110.
- the user authenticator 120 determines that the user has the authority to axess the contents ⁇
- the user authenticator 120 transmits the request for axessing the contents ⁇ and the hash value ⁇ to the hash chain manager 126 n-J (Operation S504).
- the user terminal 15 decrypts the encrypted contents ⁇ received from the contents supplying server 10 using the hash value ⁇ received from the hash chain DB 157, under the control of the n-J controller 153 (Operation S510). [44] When the transmission and decryption of the encrypted contents ⁇ are complete, the hash value ⁇ is deleted from the hash chain DBs 114 and 157 (Operation S514).
- the hash chain manager 126 and the controller 153 may control each of the hash chain DBs 114 and 157 using a pointer such that the hash values stored in the hash chain DBs 114 and 157 can be sequentially selected, first from those that were directly derived from the seed values. Therefore, as soon as the hash value ⁇ is deleted from the hash chain DBs n-J 114 and 157, the pointer points to a next hash value ⁇ n-J-l
- FIG. 6 illustrates a method of limiting the number of times the first contents ⁇ are axessed by a user, for example, Samsung, having the authority to axess the first contents ⁇ five times.
- the user terminal 15 When the user terminal 15 axesses the first contents ⁇ for the 1 1 first time, the user terminal 15 transmits a fourth hash value ⁇ to the contents 4 supplying server 10.
- the contents supplying server 10 encrypts the first contents ⁇ using the fourth hash value ⁇ stored in the hash chain DB 114 and transmits the fourth 4 hash value ⁇ to the user terminal 15.
- the contents supplying server 10 deletes the fourth hash value ⁇ from the hash chain DB 114 and points the pointer to a third hash value 4 ⁇
- the user terminal 15 also deletes the fourth hash value ⁇ from the hash chain DB 3 4 157 and points its pointer to the third hash value ⁇ 3
- the user terminal 15 When the user terminal 15 axesses the first contents ⁇ for the second time, it transmits the third hash value ⁇ to the contents supplying server 10. Then, the 3 contents supplying server 10 determines whether its third hash value ⁇ , at which its 3 pointer is presently pointing, matches the third hash value ⁇ received from the user 3 terminal 15. If they match, the contents supplying server 10 encrypts the first contents ⁇ using the third hash value ⁇ and transmits the third hash value ⁇ to the user 1 3 3 terminal 15. When the third hash value ⁇ has been transmitted to the user terminal 15, 3 the contents supplying server 10 deletes the third hash value ⁇ from the hash chain 3 DB 114 and points its pointer to a next hash value.
- the user terminal 15 also deletes the third hash value ⁇ from the hash chain DB 157 and points its pointer to the next 3 hash value.
- the contents supplying server 10 does not allow the user terminal 15 to axess the first contents ⁇ because the fourth hash value ⁇ is not present therein. 1 4
- the contents supplying server 10 generate seed values.
- the system axording to an embodiment of the present invention may be configured such that the user's terminal 15 generates the seed values, and the contents supplying server 10 receives the seed values.
- the hash chain DBs 114 and 157 may be configured such that hash values of a hash chain are deleted randomly rather than sequentially as illustrated in FIG. 6.
- the user terminal 15 randomly extracts a hash value from the hash chain DB 157 and transmits the hash value to the contents supplying server 10.
- the contents supplying server 10 encrypts the contents using the hash value and transmits encrypted contents to the user terminal 15. Then, the user terminal 15 decrypts the encrypted contents.
- the hash value is deleted from the hash chain DBs 114 and 157.
- the present invention relates to a contents supplying server, a method of limiting a number of times contents can be axessed by a user terminal, and a recording medium on which a program executing the method is recorded.
- the recording medium may be a magnetic or optical recording medium or a medium for carrier- wave transmission over a network such as the Internet.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05721746A EP1614047A1 (en) | 2004-01-08 | 2005-01-08 | Method and apparatus for limiting number of times contents can be accessed using hashing chain |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020040001095A KR100982515B1 (en) | 2004-01-08 | 2004-01-08 | Apparatus and method for constraining the count of access to digital contents using a hash chain |
KR10-2004-0001095 | 2004-01-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005066824A1 true WO2005066824A1 (en) | 2005-07-21 |
Family
ID=36751951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2005/000054 WO2005066824A1 (en) | 2004-01-08 | 2005-01-08 | Method and apparatus for limiting number of times contents can be accessed using hashing chain |
Country Status (5)
Country | Link |
---|---|
US (1) | US7788728B2 (en) |
EP (1) | EP1614047A1 (en) |
KR (1) | KR100982515B1 (en) |
CN (1) | CN1771487A (en) |
WO (1) | WO2005066824A1 (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100599938B1 (en) * | 2004-08-09 | 2006-07-13 | 한국전자통신연구원 | Hash table address dispersion apparatus and method, pattern matching apparatus using it |
US20090210695A1 (en) * | 2005-01-06 | 2009-08-20 | Amir Shahindoust | System and method for securely communicating electronic documents to an associated document processing device |
KR100772521B1 (en) * | 2005-12-12 | 2007-11-01 | 한국전자통신연구원 | RFID tag authentication apparatus and method in RFID system |
US20070245152A1 (en) * | 2006-04-13 | 2007-10-18 | Erix Pizano | Biometric authentication system for enhancing network security |
US8538014B2 (en) * | 2008-05-12 | 2013-09-17 | Oracle America, Inc. | Fast computation of one-way hash sequences |
CN102725737B (en) * | 2009-12-04 | 2016-04-20 | 密码研究公司 | The encryption and decryption of anti-leak can be verified |
EP2458777A1 (en) * | 2010-11-30 | 2012-05-30 | Irdeto B.V. | Deriving one or more cryptographic keys of a sequence of keys |
JP5897040B2 (en) * | 2011-02-01 | 2016-03-30 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | Secure access to emergency personal health records |
KR101802521B1 (en) * | 2011-05-30 | 2017-11-30 | 삼성전자주식회사 | Device and method for performing encryption and decryption of data in wireless terminal |
KR101319586B1 (en) * | 2012-06-19 | 2013-10-16 | 경기대학교 산학협력단 | Cloud computing network system and method for authenticating client |
US8990905B1 (en) * | 2012-09-28 | 2015-03-24 | Emc Corporation | Protected resource access control utilizing intermediate values of a hash chain |
US9172698B1 (en) * | 2012-10-12 | 2015-10-27 | Ut-Battelle, Llc | System and method for key generation in security tokens |
US8984602B1 (en) | 2013-06-28 | 2015-03-17 | Emc Corporation | Protected resource access control utilizing credentials based on message authentication codes and hash chain values |
US9455977B1 (en) | 2014-06-20 | 2016-09-27 | Emc Corporation | Remote management interface using credentials associated with respective access control intervals |
US9503442B1 (en) * | 2014-06-20 | 2016-11-22 | EMC IP Holding Company LLC | Credential-based application programming interface keys |
US9374373B1 (en) * | 2015-02-03 | 2016-06-21 | Hong Kong Applied Science And Technology Research Institute Co., Ltd. | Encryption techniques for improved sharing and distribution of encrypted content |
WO2019018337A1 (en) | 2017-07-20 | 2019-01-24 | Walmart Apollo, Llc | Task management of autonomous product delivery vehicles |
US20190025818A1 (en) * | 2017-07-21 | 2019-01-24 | Walmart Apollo, Llc | Autonomous product delivery vehicle fleet master-slave relationship management |
KR102473377B1 (en) * | 2017-12-06 | 2022-12-02 | 재단법인대구경북과학기술원 | Method and system for providing digital test service based on hash chain |
US11621826B2 (en) * | 2019-12-06 | 2023-04-04 | Mastercard International Incorporated | Method and system for HTTP session management using hash chains |
KR102503607B1 (en) * | 2020-12-31 | 2023-02-23 | 재단법인대구경북과학기술원 | System and method for lantern control |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000004458A1 (en) * | 1998-07-14 | 2000-01-27 | Massachusetts Institute Of Technology | Global document hosting system utilizing embedded content distributed ghost servers |
KR20000029105A (en) * | 1998-10-16 | 2000-05-25 | 마츠시타 덴끼 산교 가부시키가이샤 | Production protection system dealing with contents that are digital production |
WO2002019598A2 (en) * | 2000-08-28 | 2002-03-07 | Contentguard Holdings, Inc. | Systems and methods for integrity certification and verification of content consumption environments |
WO2002086725A1 (en) * | 2001-04-18 | 2002-10-31 | Motorola, Inc., A Corporation Of The State Of Delaware | A system and method for secure and convenient management of digital electronic content |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5796839A (en) * | 1995-10-16 | 1998-08-18 | Sony Corporation | Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium |
US6119229A (en) | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
JP3758316B2 (en) | 1997-07-07 | 2006-03-22 | 富士ゼロックス株式会社 | Software license management apparatus and method |
US6069647A (en) | 1998-01-29 | 2000-05-30 | Intel Corporation | Conditional access and content security method |
US6363149B1 (en) * | 1999-10-01 | 2002-03-26 | Sony Corporation | Method and apparatus for accessing stored digital programs |
US6766305B1 (en) | 1999-03-12 | 2004-07-20 | Curl Corporation | Licensing system and method for freely distributed information |
JP3977549B2 (en) | 1999-04-30 | 2007-09-19 | 株式会社東芝 | Content management method, content usage management system, content usage management device, and playback device |
US7143445B1 (en) | 1999-05-31 | 2006-11-28 | Sony Corporation | Information processing apparatus, information processing method, and program storage medium |
KR100351141B1 (en) * | 1999-07-13 | 2002-09-09 | 엘지전자 주식회사 | The playback limitation method of data write in digital |
US6425280B1 (en) | 1999-07-30 | 2002-07-30 | International Business Machines Corporation | Wafer alignment jig for wafer-handling systems |
KR20010086038A (en) | 1999-09-17 | 2001-09-07 | 이데이 노부유끼 | Data providing system and method therefor |
US20010034839A1 (en) | 1999-12-24 | 2001-10-25 | Guenter Karjoth | Method and apparatus for secure transmission of data and applications |
US20020114465A1 (en) | 2000-01-05 | 2002-08-22 | Shen-Orr D. Chaim | Digital content delivery system and method |
JP3818021B2 (en) | 2000-06-06 | 2006-09-06 | 日本ビクター株式会社 | Control word encryption device and control word decryption device |
US7174568B2 (en) | 2001-01-31 | 2007-02-06 | Sony Computer Entertainment America Inc. | Method and system for securely distributing computer software products |
SG99387A1 (en) | 2001-02-02 | 2003-10-27 | Matsushita Electric Ind Co Ltd | Content usage management system and content usage management method |
JP3899918B2 (en) | 2001-12-11 | 2007-03-28 | 株式会社日立製作所 | Login authentication method, its execution system, and its processing program |
KR20030016151A (en) * | 2001-12-31 | 2003-02-26 | 에스케이 텔레콤주식회사 | Method for protecting a copyright of contents |
JP4139114B2 (en) | 2002-02-04 | 2008-08-27 | 松下電器産業株式会社 | Digital content management apparatus and digital content management program |
KR20020037308A (en) | 2002-04-04 | 2002-05-18 | 조배수 | Digital Contents automatic Removel system |
-
2004
- 2004-01-08 KR KR1020040001095A patent/KR100982515B1/en active IP Right Grant
-
2005
- 2005-01-07 US US11/030,560 patent/US7788728B2/en active Active
- 2005-01-08 EP EP05721746A patent/EP1614047A1/en not_active Withdrawn
- 2005-01-08 CN CNA2005800002059A patent/CN1771487A/en active Pending
- 2005-01-08 WO PCT/KR2005/000054 patent/WO2005066824A1/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000004458A1 (en) * | 1998-07-14 | 2000-01-27 | Massachusetts Institute Of Technology | Global document hosting system utilizing embedded content distributed ghost servers |
KR20000029105A (en) * | 1998-10-16 | 2000-05-25 | 마츠시타 덴끼 산교 가부시키가이샤 | Production protection system dealing with contents that are digital production |
WO2002019598A2 (en) * | 2000-08-28 | 2002-03-07 | Contentguard Holdings, Inc. | Systems and methods for integrity certification and verification of content consumption environments |
WO2002086725A1 (en) * | 2001-04-18 | 2002-10-31 | Motorola, Inc., A Corporation Of The State Of Delaware | A system and method for secure and convenient management of digital electronic content |
Also Published As
Publication number | Publication date |
---|---|
KR100982515B1 (en) | 2010-09-16 |
EP1614047A1 (en) | 2006-01-11 |
CN1771487A (en) | 2006-05-10 |
KR20050072939A (en) | 2005-07-13 |
US20050256910A1 (en) | 2005-11-17 |
US7788728B2 (en) | 2010-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7788728B2 (en) | Method and apparatus for limiting number of times contents can be accessed using hash chain | |
RU2352985C2 (en) | Method and device for authorisation of operations with content | |
US7336791B2 (en) | Information processing apparatus | |
CN100435163C (en) | Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program | |
CN101262336B (en) | Method and system for providing DRM license | |
EP2267628B1 (en) | Token passing technique for media playback devices | |
US7426639B2 (en) | Information processing apparatus and method for managing grouped devices in an encrypted environment | |
CN100527142C (en) | Information server, information device, information processing system, information processing method, and information processing program | |
US20020138442A1 (en) | Content provision device and method and license server capable of facilitating circulation of encrypted content data | |
EP1282262A1 (en) | Information processing apparatus | |
EP1292065A1 (en) | Information processing apparatus | |
US20060080529A1 (en) | Digital rights management conversion method and apparatus | |
CN101657823B (en) | Content utilizes system and content Application way | |
WO2003088059A1 (en) | Information processing device, method, recording medium, and program | |
CN105893792B (en) | Digital copyright management method, device and system | |
CN101262332A (en) | Method and system for mutual authentication between mobile and host devices | |
US20030009667A1 (en) | Data terminal device that can easily obtain content data again, a program executed in such terminal device, and recording medium recorded with such program | |
WO2006065012A1 (en) | System for issuing licenses to protect multi-level distributed digital contents and method thereof | |
JP2002359616A (en) | Information processor and method, license server, and program | |
US8755521B2 (en) | Security method and system for media playback devices | |
JP2004048557A (en) | Device, method and program of contents distribution and recording medium | |
KR20040032369A (en) | Method and System for protecting digital contents using terminal-unique-key | |
KR100566633B1 (en) | Method of digital rights management for the content owner | |
CN115879125A (en) | Information management system based on block chain | |
KR20100031186A (en) | Contents playback management system and contents playback management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005721746 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20058002059 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2005721746 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |