WO2005093544A1 - Method of and system for generating an authorized domain - Google Patents

Method of and system for generating an authorized domain Download PDF

Info

Publication number
WO2005093544A1
WO2005093544A1 PCT/IB2005/050910 IB2005050910W WO2005093544A1 WO 2005093544 A1 WO2005093544 A1 WO 2005093544A1 IB 2005050910 W IB2005050910 W IB 2005050910W WO 2005093544 A1 WO2005093544 A1 WO 2005093544A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
given
domain
content item
bound
Prior art date
Application number
PCT/IB2005/050910
Other languages
French (fr)
Inventor
Petrus J. Lenoir
Franciscus L. A. J. Kamperman
Sebastiaan A. F. A. Van Den Heuvel
Robert P. Koster
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US10/599,272 priority Critical patent/US8863239B2/en
Priority to EP05709017A priority patent/EP1733292A1/en
Priority to NZ550080A priority patent/NZ550080A/en
Priority to AU2005225847A priority patent/AU2005225847B2/en
Priority to BRPI0509181-0A priority patent/BRPI0509181A/en
Priority to MXPA06010888A priority patent/MXPA06010888A/en
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to KR1020067019672A priority patent/KR101242140B1/en
Priority to JP2007504536A priority patent/JP4888910B2/en
Priority to CA002561229A priority patent/CA2561229A1/en
Publication of WO2005093544A1 publication Critical patent/WO2005093544A1/en
Priority to IL178230A priority patent/IL178230A0/en
Priority to NO20064909A priority patent/NO20064909L/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1012Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Definitions

  • the invention relates to a method of generating an Authorized Domain.
  • the invention further relates to a system for generating an Authorized Domain.
  • the invention relates to a computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to the invention.
  • the invention relates to an Authorized Domain and an Authorized Domain that has been generated by the method and/or the system according to the present invention.
  • the first category is called Copy Protection (CP) systems.
  • CP systems have traditionally been the main focus for consumer electronics (CE) devices, as this type of content protection is thought to be cheaply implemented and does not need bi-directional interaction with the content provider.
  • CE consumer electronics
  • Some examples are the Content Scrambling System (CSS), the protection system of DVD ROM discs and DTCP (a protection system for IEEE 1394 connections).
  • CCS Content Scrambling System
  • DTCP a protection system for IEEE 1394 connections.
  • the second category is known under several names. In the broadcast world, systems of this category are generally known as conditional access (CA) systems, while in the Internet world they are generally known as Digital Rights Management (DRM) systems.
  • CA conditional access
  • DRM Digital Rights Management
  • a home network can be defined as a set of devices that are interconnected using some kind of network technology (e.g. Ethernet, IEEE 1394, BlueTooth, 802.1 lb, 802.1 lg, etc.). Although network technology allows the different devices to communicate, this is not enough to allow devices to interoperate. To be able to do this, devices need to be able to discover and address the functions present in the other devices in the network. Such interoperability is provided by home networking middleware. Examples of home networking middleware are Jini, HAVi, UPnP, AVC.
  • Authorized Domains aims at finding a solution to both serve the interests of the content owners (that want protection of their copyrights) and the content consumers (that want unrestricted use of the content).
  • the basic principle is to have a controlled network environment in which content can be used relatively freely as long as it does not cross the border of the authorized domain.
  • authorized domains are centered around the home environment, also referred to as home networks.
  • home networks also referred to as home networks.
  • a user could for example take a portable device for audio and/or video with a limited amount of content with him on a trip, and use it in his hotel room to access or download additional content stored on his personal audio and/or video system at home.
  • an Authorized Domain is a system that allows access to content by devices in the domain, but not by any others.
  • an Authorized Domain etc.
  • One type of previous solutions include device based Authorized Domains (ADs).
  • a further example of a device based AD is e.g. given in international patent application WO 03/098931 (attorney docket PHNL020455) by the same applicant.
  • the domain is formed by a specific set of devices and content. Only the specific set of devices of the domain is allowed to access, use, etc. the content of that domain. There is not made any distinction of the various users of the specific set of devices.
  • a drawback of device based AD systems is that they typically do not provide the typical flexibility that a user wants or need, since users are restricted to a particular and limited set of devices.
  • a user is not allowed to exercise the rights that the user has obtained anytime and anywhere he chooses. For example, if a user is visiting a friend's house he is not able to access his legally purchased content on the friend's devices as these devices would not typically be part of the particular and limited set of devices forming the domain comprising the user's content.
  • person based Authorized Domains where the domain is based on persons instead of devices as was the case for device based ADs.
  • An example of such a system is e.g. described in international patent application serial number IB2003/004538 (attorney docket PHNL021063) by the same applicant, in which content is coupled to persons which then are grouped into a domain.
  • Person based Authorized Domains typically offer easier domain management compared to device based ADs.
  • person based systems require person identification which is not always convenient or preferred by users.
  • a visitor to your home may want to access your content. As he does not have a person id device for that domain it is not possible for him to access content. It would be preferred if devices in the home belonging to the domain could enable access of domain content by the visitor. Therefore there is a need for a hybrid person and device based authorized domain having the individual advantages of each system.
  • Such a hybrid person and device based authorized domain is proposed in European patent application serial number 03102281.7 (attorney docket PHNL030926) by the same applicant.
  • an Authorized Domain is proposed which combines two different approaches to define an AD.
  • the connecting part between the device and the person approach is a Domain Identifier.
  • the devices are preferably grouped together via a domain devices certificate (DDC), while the persons preferably are separately grouped via a domain users certificate (DTJC) and where content is directly or indirectly linked to a person.
  • DDC domain devices certificate
  • DTJC domain users certificate
  • a schematic representation of such an Authorized Domain (AD) can be seen in Figure 1, and will be explained in greater detail in the following.
  • An example of the first is e.g. letting all persons to a household be in the domain wherever they are using any device they possess. Setting a limit for the number of devices or sessions in the domain gives the disadvantage that this approach does not scale with the number of users using the Authorized Domain (AD). Therefore there is a need for a simple and more scalable implementation of the domain boundary.
  • AD Authorized Domain
  • a further object is to provide this in a simple, flexible and efficient way.
  • a simple and efficient way of implementing domain boundaries is enabled, since the domain boundaries may be coupled to users only (as now both devices and content are coupled to users). In this way, the domain boundary becomes less rigid and scales better. Additionally, a simple and efficient way of grouping devices and persons to an AD is obtained. Further, a hybrid device and person based Authorized Domain is provided. In this way, access is enabled to a content item of an authorized domain by a user operating a device either by verifying that the owner of a content item and the user is linked the same domain or by verifying that the owner of the device and the owner of the content item is linked to the same domain. Thereby, enhanced flexibility for one or more users when accessing content in an authorized domain is obtained while security of the content is still maintained. This is further done in a simple, secure and reliable way. In one embodiment, - each device may be bound to only a single user, or
  • each device may be bound to several users, where one user is indicated as a primary user for that particular device.
  • the method further comprises the step of: - importing, on a given device, at least one content item into the Authorized Domain given by the domain identifier by
  • the method further comprises
  • the method further comprises
  • the step of binding at least one user to the domain identifier comprises: - obtaining or generating a Domain Users List comprising the domain identifier and a unique identifier for a user thereby defining that the user is bound to the Authorized Domain.
  • the step of binding at least one device to at least one user comprises
  • a Device Owner List comprising a unique identifier for a user and a unique identifier for each device belonging to the user thereby defining that the at least one device is/are bound to the user
  • step of binding at least one device to at least one user comprises
  • the step of binding at least one content item to the Authorized Domain comprises:
  • the method further comprises the step of controlling access, by a given device being operated by a given user, to a given content item, the step comprising:
  • the method further comprises the step of controlling access, by a given device being operated by a given user, to a given content item being bound to the Authorized Domain and having a unique content identifier, comprising:
  • the Domain User List of the Authorized Domain comprises both a first user identifier, comprised in a Device Owner List comprising an identifier of the given device, and a second user identifier, linked to the given content item, thereby checking if the user bound to the given device is bound to the same Authorized Domain as the user bound to the content item, and
  • the step of controlling access of a given content item further comprises: - checking that the User Right for the given content item specifies that the given user has the right to access the given content item and only allowing access to the given content item in the affirmative.
  • every content item is encrypted and that a content right is bound to each content item and to a User Right, and that the content right of a given content item comprises a decryption key for decrypting the given content item.
  • - the Domain Users List (DUC) is implemented as or included in a Domain Users Certificate, and/or
  • DOC Device Owner List
  • the User Right is implemented as or included in a User Right Certificate.
  • Advantageous embodiments of the present invention are defined in the claims and described in detail in the following.
  • the embodiments of the system correspond to the embodiments of the method and have the same advantages for the same reasons.
  • the invention also relates to a computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to the present invention.
  • the invention also relates to an Authorized Domain (AD) that has been generated by the method or by the system according to the present invention.
  • AD Authorized Domain
  • Figure 1 schematically illustrate a hybrid device and person based Authorized Domain (AD) according to prior art
  • Figure 2a schematically illustrate a hybrid device and person based Authorized Domain (AD) according to the present invention
  • Figure 2b illustrate how each content item is linked to persons via a user right according to one embodiment of the present invention
  • Figure 3a schematically illustrate the coupling between users and devices according to a first aspect of the present invention
  • Figure 3b schematically illustrate the coupling between users and devices according to a second aspect of the present invention
  • Figure 4 schematically illustrate the elements of a Domain Users Certificate (DUC)
  • Figure 5 illustrates an exemplary (partial) data structure of a content container, a content right (CR) and a user right certificate (URC) according to the embodiment of the present invention shown in Figure 2a
  • Figure 6 schematically illustrate an exemplary system comprising devices and persons forming an authorized domain (AD).
  • DUC Domain Users Certificate
  • FIG. 1 schematically illustrate a hybrid device and person based Authorized Domain (AD) according to prior art.
  • AD Authorized Domain
  • Such a hybrid device and person based authorized domain is disclosed in European patent application serial number 03102281.7 (attorney docket PHNL030926) by the same applicant. Shown are an authorized domain (100) where a number of devices Dl, D2, D3, ..., DM (where M is equal to or larger than 1), a number of content items Cl, C2, C3, ..., CN 2 (where N 2 is equal to or larger than 1) and a number of persons/users PI, P2, P3, ..., PNi (where Ni is equal to or larger than 1) is bound to the AD.
  • M, NI and/or N2 may initially or at some time later be 0 in some states.
  • the devices, persons, and content items have been bound to the domain (100) via a domain identifier (Domain_ID) (101).
  • the content items (Cl, C2, C3, ..., CN ) are connected to the users (PI, P2, P3, ..., PNi) via user rights (URCl, ... URCN 2 ) (not shown), where preferably one content item is associated with one user right certificate specifying which rights a given person (or alternatively a given group of persons and/or all persons bound to the domain (100)) have in relation to the specific content item (or alternatively, several or all content items in the domain (100)).
  • IB2O03/004538 attorney docket PHNL021063 by the same applicant describes an implementation in which content is coupled to persons which then are grouped into a domain.
  • Authorized devices are preferably bound to the AD (100) by a certificate.
  • authorized persons/users are preferably also bound to the AD (100) via certificates.
  • Content items are, in this particular embodiment, bound to a person by means of a user right certificate (URC).
  • URC user right certificate
  • This user right certificate enables the use of a corresponding content right (CR) that preferably contains a cryptographic key for accessing the content, as will be explained in greater detail in connection with Figure 5.
  • a user right certificate (URC) is typically linked with one content item, but could also be linked with multiple content items.
  • FIG. 5 An exemplary partial data structure of a content container (contains a content item), a URC, and a CR are shown and explained in greater detail in connection with Figure 5.
  • Domain certificates are preferably issued by a domain authority. Alternatively, compliant devices with domain management capabilities can manage these certificates.
  • each content item Cl, C2, ..., CN is coupled (via URC(s)) to person PI, C N+I is coupled to person P2, and where C N+2 - C N2 are distributed among person(s) P3-PN-.
  • a given content item is preferably only allowed to be coupled to a single URC (indirectly via a content right) and thereby a single person.
  • a given content item could be coupled to multiple persons, as a CR can be linked to multiple URCs.
  • Persons PI, P2, ..., PN. and Domain devices Dl, D2, ..., DM are then grouped into forming the authorized domain (100).
  • the binding, i.e. grouping and coupling, of devices, persons and content is done by the use of certificates.
  • a Domain Devices Certificate or Domain Devices List (DDC) a Domain Users Certificate or Domain Users List (DUC), and a User Right Certificate or User Right List (URC) are used.
  • DDC Domain Devices Certificate or Domain Devices List
  • DUC Domain Users Certificate or Domain Users List
  • URC User Right Certificate or User Right List
  • the DDC lists the device(s), which are part of the domain (100), e.g. by comprising for each device a unique identifier.
  • the DUC lists the user(s), which are part of the domain, e.g. by comprising a unique identifier or a (e.g. public) cryptographic key or a hash thereof for each user.
  • the URC preferably exist for each content item (so in Figure 1 there are N 2 URCs) and indicates which rights the user (that the URC is linked to) has (and/or does not have) within the domain (100), and optionally a cross domain (X-AD rights), for the given content item linked to the URC.
  • an URC coupled to a given user e.g. lists each content item that is coupled to the given user and what rights the given user has in relation to each coupled content item.
  • only a single URC is used specifying the rights for every user, i.e. which content item(s) each user has coupled to him/her and what rights the user has (and/or does not have).
  • the DDC and DUC are associated with each other by means of a Domain Identifier (Domain_ID) (101) contained in both certificates.
  • Domain_ID Domain Identifier
  • a specific device e.g. device D3 wants to access a certain piece of content (e.g. content Cl) it has to be proved or checked, etc. (using the certificates) that the certain piece of content is coupled to a specific person (e.g. person PI) that is a member of the same domain (100) as the specific device.
  • This may e.g. by done by checking that an (unique) identifier of the specific device (e.g. device D3) is part of the DDC, that an (unique) identifier of the specific person (e.g.
  • the Domain ID may instead of being a random number be a reference to a data object e.g. a domain certificate.
  • this AD has the disadvantage that when content is imported into the domain (an action typically done on a device), e.g.
  • FIG 2a schematically illustrate a hybrid device and person based Authorized Domain (AD) according to the present invention. Shown is an Authorized Domain (AD) corresponding to the one shown in Figure 1 with exceptions as explained in the following.
  • devices are now linked to persons, or more specifically, each device is linked to a person (could it generally be persons??, i.e. more than one person has ownership over a single device) that has ownership over the particular device.
  • each device is linked only to a single person, whereby the ownership of the device is easily reflected.
  • each device may be linked to more than one person.
  • AD Authorized Domain
  • PI persons/users
  • Domain_ID domain identifier
  • a number of content items (Cl, C2, C3, ..., CN 2 ) is linked to the users, as explained in connection with Figure 1.
  • content item Cl, C2, ..., CN is coupled (preferably via URC(s) as explained in greater detail in connection with Figure 2b) to person PI
  • CN+I is coupled to person P2
  • C N+2 - CN are distributed among person(s)
  • a number of authorized devices (Dl, D2, D3, ..., DM) (where M is equal to or larger than 1) is bound to the users of the Authorized Domain (AD) (100), where the binding reflects that a given user has ownership of the bound device.
  • authorized devices are bound to the users (and thereby the AD (100) ) by a Device Owner Certificate (DOC), list or other suitable structure.
  • DOC Device Owner Certificate
  • a DOC exists for each device (as described in connection with Figure 3 a) defining which user (or users) has ownership of the given device.
  • a DOC exist for each person (as described in connection with Figure 3b) defining which devices within the domain that user has ownership over.
  • device may indicate to whom it belongs, e.g. by providing a DOC, list or other suitable structure.
  • device Dl and D2 are coupled to user PI
  • D3 is coupled to user P2
  • D4 - DM are distributed among users(s) P3 - PNj.
  • the user right (URC1, ..., URCN 2 ) is a single connection, binding, coupling etc. between one user and a content right (which is required to decrypt a piece of content). Therefore we now have five main entities in our system that could work as follows:
  • content items are preferably encrypted (there are many options, for example with a unique key per content title) and can be anywhere in the system; a content item is in this and later embodiments linked indirectly to a user right certificate (URC) via a content right (CR), as explained in connection with Figure 5.
  • URC user right certificate
  • CR content right
  • - content right contains cryptographic key(s) or other suitable protection means to access a certain (encrypted/protected) content item.
  • the system is flexible in the sense that content rights can be made unique per content title or even unique per specimen (copy) of content.
  • Content rights should be only transferred to compliant devices.
  • a more secure rule is to enforce that content rights may be only transferred to compliant devices that are operated by authorized users (i.e. users that are authorized to have access to the specific content right by means of their user rights).
  • Content rights might also be stored together with the content on for example an optical disk. However, content rights must be stored securely since they contain the content decryption key.
  • - user right certificate (URC1, ... URCN 2 ; not shown; see e.g. Figure 2b): a certificate, list, data structure or the like issued by the content provider that authorizes a person to use a certain content right (CR) (belonging to a certain piece of content).
  • User rights can in principle be anywhere in the system.
  • a user right certificate also comprise rules (e.g. restricted to viewers 18 years or older, European market only, etc.) describing the allowed access to a certain content item.
  • a (compliant) device can also preferably identify a user by means of a personalized identification device (e.g. such as a smart-card, a mobile phone, a biometric sensor, etc.) and collect certificates (e.g. from the smartcard, or from other devices) that prove that the user is allowed to use a certain content right. This content right could be obtained from the smart-card where it was stored (if it was stored there), or be obtained (securely transferred) from another compliant device on a network.
  • a personalized identification device e.g. such as a smart-card, a mobile phone, a biometric sensor, etc.
  • certificates e.g. from the smartcard, or from other devices
  • a user is identified by some biometric or preferably by a personalized identification device (e.g. a smartcard, mobile phone, a mobile phone containing a smartcard or other types of devices that uniquely identifies a user) that he/she is wearing, carrying or has access to.
  • a personalized identification device e.g. a smartcard, mobile phone, a mobile phone containing a smartcard or other types of devices that uniquely identifies a user
  • a mobile phone comprising a smart card or another device having storage means is preferred since it allows users to carry rights with them (for accessing content on off-line devices).
  • the identification device may itself be protected by a biometric authentication mechanism, so that anyone other than the legitimate owner cannot use the identification device.
  • a user may also be identified using public key technology or zero- knowledge protocols or a combination thereof.
  • the domain preferably with the use of certificates or alternatively with the use of lists or other suitable structures comprising the same described elements as for the certificates. It may be possible for the domain to comprise zero persons and/or zero devices and/or zero content items during some points. E.g. when initially building the domain it may comprise zero content items or zero devices bound to the domain, etc. In this way, a user that has been verified as belonging to the same domain as the content item being accessed may access the specific content using any device.
  • a user that is using a device that has been verified as belonging to the same domain as the content item being accessed may access the specific content using that specific device. Further all users may access the specific content item on that specific device. This gives enhanced flexibility for one or more users when accessing content in an AD while security of the content is still maintaining.
  • the devices in the Authorized Domain (AD) now are coupled to persons. So now, it is not necessary to obtain and handle additional information relating to who imported content must be linked to. In a preferred embodiment, it is possible to override or sidestep this automatic assignment and still use additional information to assign the content to another person within the Authorized Domain (AD).
  • a 'primary' person and one or more 'secondary' persons may be designated where the default automatic binding of an imported content item (Cl, C2, ..., CN 2 ) is done to the user (PI, P2, ..., PN-) that is designated primary person of the given device (Dl , D2, ..., DM) used during import.
  • PI, P2, ..., PN- primary person of the given device
  • Dl , D2, ..., DM primary person of the given device
  • a limit can be put on the maximum number of devices per user, thereby making the total number of devices in the domain dependent on the number of users. It is also to be understood that instead of having one list or certificate comprising users (i.e. the DUC) and one list or certificate comprising devices (i.e. DOC) above and in the following other arrangements may also be used. As an alternative, both devices and users could be comprised in a single list/certificate. Further, several lists/certificates comprising devices and/or several lists/certificates comprising users and/or combinations thereof may be used just as well.
  • Figure 2b illustrate how each content item is linked to persons via a user right according to one embodiment of the present invention.
  • the content items (Cl, C2, C3, ..., CN 2 ) are connected to the users (PI, P2, P3, ..., PNi) via user rights (URCl, ... URCN 2 ) (not shown), where preferably one content item is associated with one user right certificate specifying which rights a given person (or alternatively a given group of persons and/or all persons bound to the domain) have in relation to the specific content item (or alternatively, several or all content items in the domain).
  • content Cl, ..., CN are connected to user right URCl, ..., URC N, respectively, which all are connected to user PI
  • content C N+l is connected to user right URC N+l connected to user P2
  • content C N+2, ..., C N2 is connected to user rights URC N+2, ... , URC N2, which are distributed among users P4, ..., PNl .
  • the user right (URCl, ... URCN 2 ) is preferably a certificate, list, data structure or the like issued by the content provider that authorizes a person to use a certain content right (CR) (belonging to a certain piece of content).
  • User rights when implemented as a certificate
  • a user right certificate also comprise rules (e.g. restricted to viewers 18 years or older, European market only, etc.) describing allowed access to a certain content item.
  • Figure 3a schematically illustrate the coupling between users and devices according to a first aspect of the present invention. Shown are two Device Owner Certificates (DOC1, DOC2) each linked (as indicated by the arrows) to the same person/user, namely user PI. Further, DOC1 is linked to authorized device Dl, while DOC2 is linked to authorized device D2 (as indicated by the arrows). This reflects in a very simple and reliable way that user PI has ownership of devices Dl and D2. So when device Dl or D2 is used to import content into the Authorized Domain (AD) (e.g.
  • AD Authorized Domain
  • a DOC exists for each device.
  • Each DOC in this particular embodiment comprises a unique identifier (Devi ID or Dev2_ID) of the given device and a unique identifier of the user (Pers.l_ID) that the given device belongs to.
  • the device identifier for a given device e.g.
  • DevlJ-D is an (un-changeable at least by users) serial or ID number, etc.
  • the person/user identifier could e.g. be an ID or serial number for a given person, a name, a hash value of a public key of the user or in general any unique identifier of a person.
  • a user may e.g. identified by some biometric or preferably by a personalized identification device (e.g. a smartcard, mobile phone, a mobile phone comprising a smartcard or other types of devices that uniquely identifies a user) that he/she is wearing, carrying or has access to.
  • a mobile phone comprising a smart card or another device having storage means allows users to carry rights with them (for accessing content on off-line devices).
  • the identification device may itself be protected by a biometric authentication mechanism, so that anyone other than the legitimate owner cannot use the identification device.
  • a user may also be identified using public key technology or zero-knowledge protocols or a combination thereof.
  • the DOC is in one embodiment managed by a smartcard (e.g. acting as a person/user identification device). In this way, the smartcard acts as an AD management enabled device. In this case, the person private key is used to sign such certificates.
  • FIG. 3b schematically illustrate the coupling between users and devices according to a second aspect of the present invention. Shown are a single Device Owner Certificates (DOC1) linked (as indicated by the arrows) to the person/user PI. Further, DOC1 is linked to both authorized device Dl and to authorized device D2 (as indicated by the arrows). This reflects in a very simple and reliable way that user PI has ownership of devices Dl and D2. In this embodiment, a DOC exists for each user.
  • DOC1 Device Owner Certificates
  • Each DOC in this particular embodiment comprises a unique identifier (Devl_ID, Dev2_ID) for each device and a unique identifier of the user (Pers.l_ID) that the given device(s) belongs to.
  • DOCs as described both in connection with Figure 3a and 3b may be used in combination.
  • Figure 4 schematically illustrate the elements of a Domain Users Certificate (DUC).
  • the Domain Users Certificate (DUC) comprises a listing of unique identifiers
  • Pers IDl Pers_ID2, AIN for one or more users/persons belonging to the given domain, i.e. being authorized users in the domain.
  • the given domain that the listed users are authorized within is specified by the value of the Domain ID.
  • a Domain Users Certificate (DUC) is linked to the Domain ID and thereby defines the authorized domain that comprises both devices and users, since devices are linked to users, as described above e.g. in connection with Figures 3a and 3b. Certificates according to the present invention (DOC, DUC, etc.) could e.g. be implemented by well-known authorization certificate. Additionally, one useful option is to put a Domain D in a holder field of such a certificate implementing the DOC and/or the DUC.
  • FIG 5 illustrates an exemplary (partial) data structure of a content container, a content right (CR) and a user right certificate (URC) according to the embodiment of the present invention shown in Figure 2a.
  • a content container 501
  • the content container further comprises a content identifier (ContJ-D) unique for the particular content item embedded in the content container.
  • the content identifier (ContJ-D) is used to locate a given content item of the domain, e.g. by searching every content container belonging to the specific domain for a matching ContJ-D.
  • a content right (CR) (502) comprising a content identifier (ContJ-D) and a content encryption key (Cont Encr K).
  • the content identifier is used to establish a link to the encrypted content item (in a content container) that the content encryption key is for, i.e. the content that the key is needed to de-crypt and thereby enable access to.
  • the encryption key is a symmetrical key, i.e. the same key is used to both encrypt and decrypt data.
  • UR user right
  • User Right Certificate ULC
  • the URC comprises a content identifier (Cont_ID) used for linking a specific content item (and content right) with a specific URC.
  • the URC also comprises a person/user identifier (Pers_ID) that indicates which person the specific content is bound to.
  • the person/user identifier could e.g. be an ID or serial number for a given person, a name, a hash value of a public key of the user or in general any unique identifier of a person.
  • the URC comprises rights data (Rghts Dat) that define what the given user (as identified by the Pers_ID) is allowed to do in relation with the specific content item (contained in the content container comprising the same ContJ-D). These rights data may e.g.
  • a content right (CR) and a user right certificate (URC) according to the present invention consider the following example illustrating access to a given content item by a given user on a given device.
  • the content identifier (ContJ-D) for the given content item that the user wants to access and the person identifier (PersJ-D) of the given user are obtained.
  • the person identifier may e.g. be obtained on the basis of a personalized identification device (e.g. a PDA, a smart card, mobile phone, a mobile phone containing a smartcard, a biometric sensor, etc. or in another way).
  • the content identifier may e.g. be obtained on the basis of a file name, the selection of a file, from a header of the content container, etc. It is checked if the content item and the user belong to the (same) Authorized Domain.
  • Checking whether a user belongs to a domain is done by checking if the person identifier (Pers_ID) is comprised in a Domain Users Certificate (DUC) (shown in Figures 2a and 4). If so, then it has been verified that the user is part of the domain and is allowed to access content also being a part of the same domain. Then it is checked whether the given content item also belongs to the same domain, by checking if the content identifier of the content item is bound to a person bound to the same domain, i.e. by checking whether there exist a URC bound to the domain that comprises the same content identifier.
  • Pers_ID the person identifier
  • DUC Domain Users Certificate
  • the content item belongs to the same domain and the user (given that the user and/or the device that is used have been verified) therefore has the right to access it.
  • the rights data (Rghts Dat) of the URC may also specify a restricted access to the content item.
  • the rights data may specify rules, rights, conditions for the person identified with Pers_ID and/or rules, rights, conditions in general. For example, it could specify that that every user in the domain has play rights while the user linked via Pers_ID in addition has exclusive first generation copy rights.
  • the given content item is linked to a user belonging to the same Authorized Domain (AD) as the given user, and allowing access for the given user via the given device and/or other devices to the content item if so.
  • AD Authorized Domain
  • the user will obtain access to the content item using a specific device.
  • the user is not part of the domain or no valid user ID can be obtained (e.g. because it is a friend accessing the content)
  • the device used for access has to be an authorized device within the same domain as the content item being accessed. This is done by obtaining the Pers_ID of the URC that the content item was bound to, i.e. the content owner of the content item being accessed is determined.
  • content owner is meant as content owner within the domain and not the entity that has the right to assigns rights, such as authors, music labels, film studios, etc.
  • it is checked whether a user, the given content item is linked to, and a user, the given device is linked to, belongs to the same Authorized Domain (AD), and allowing access for the given user and/or other users via the given device to the content item if so.
  • the device identifier (Dev_ID) of the given device being used to access the content is obtained.
  • the obtained device identifier (Dev_ID) is used to determine the user that the device belongs to.
  • the obtained content identifier is used to locate the content right (CR) of the specific content item being accessed in order to obtain the cryptographic key that has to be used to decrypt the encrypted content item.
  • the content container comprising the encrypted content item is also located using the content identifier.
  • the key in the content right (CR) is used to decrypt the content item which is now accessible, e.g. for rendering, copying on an optical disk, editing, etc.
  • the content item may also be decrypted using the content right before sending it to the device for access, whereby only the content item needs to be transmitted.
  • this requires special measures in order to protect the content item during transfer so that it is not possible to 'leak' the unprotected content.
  • Devices in the example is a television set (504), a digital video system (510), a music set (509) and a portable device (507) that is in wireless communication with the network (508) via a wireless access point (506).
  • a user/person (505) Further schematically shown is a user/person (505).
  • an Authorized Domain (100) has the user (505) bound to it in addition to the television set (504), the digital video (510), the music set (509) and a number of content items (not shown) (all bound according to Figure 2a via persons/users).
  • the user wants to access a given content item on the portable device (507).
  • He may be located the same place as the devices or at another place (e.g. in a hotel room).
  • the person (505) belongs to the same domain (100) as the content owner since the portable device (507) does not. This may be done by uniquely identifying the user e.g. using a smart card reader, e.g. in the portable device (507), which then may transfer the User ID to the network (508).
  • the content right and the content item is assumed to be on the portable device (507) (otherwise it may be transmitted there).
  • the user is then checked as described in connection with Figure 5. After validation of the user, then the content item may be accessed.
  • an Authorized Domain (100) has the television set (504), the digital video (510), the music set (509) and the portable device (507) bound to it in addition to a number of content items (not shown) (all bound according to Figure 2a via persons/users).
  • the user (505) is in this scenario not bound to the Authorized Domain (100) as he e.g. may be a neighbor or friend visiting.
  • the user also wants to access a given content item on the portable device (507). For a user to obtain access to the content item according to the invention, it has to be checked that the owner of the portable device (507) belongs to the same domain (100) as the owner of the content since the person (505) does not.
  • any reference signs placed between parentheses shall not be constructed as limiting the claim.
  • the word “comprising” does not exclude the presence of elements or steps other than those listed in a claim.
  • the word "a” or “an” preceding an element does not exclude the presence of a plurality of such elements.
  • the invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Abstract

This invention relates to a system and a method of generating an Authorized Domain (AI)), the method comprising the steps of selecting a domain identifier (Domain ID) uniquely identifying the Authorized Domain, binding at least one user (P1, P2, ..., PN1) to the domain identifier (Domain ID), and binding at least one device (Dl, D2, ..., DM) to at least one user (P1, P2, ..., PN1), thereby obtaining a number of devices (D1, D2, ..., DM) and a number of users (P1, P2, ..., PN1) that is authorized to access a content item (C1, C2, CN2) of said Authorized Domain (100). Hereby, a number of verified devices (Dl, D2, ..., DM) and a number of verified persons (P1, P2, ..., PN1) that is authorized to access a content item of said Authorized Domain (100) is obtained. Additionally, it is possible to enable automatic assignment of imported content being imported on a device belonging to the Authorized Domain (AD) since it now is given to which person a given authorized device belongs to. Further, a simple and efficient way of implementing domain boundaries is enabled.

Description

Method of and system for generating an Authorized Domain
The invention relates to a method of generating an Authorized Domain. The invention further relates to a system for generating an Authorized Domain. Further, the invention relates to a computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to the invention. Additionally, the invention relates to an Authorized Domain and an Authorized Domain that has been generated by the method and/or the system according to the present invention.
In recent years, the amount of content protection systems is growing in a rapid pace. Some of these systems only protect the content against illegal copying, while others are also prohibiting the user to get access to the content. The first category is called Copy Protection (CP) systems. CP systems have traditionally been the main focus for consumer electronics (CE) devices, as this type of content protection is thought to be cheaply implemented and does not need bi-directional interaction with the content provider. Some examples are the Content Scrambling System (CSS), the protection system of DVD ROM discs and DTCP (a protection system for IEEE 1394 connections). The second category is known under several names. In the broadcast world, systems of this category are generally known as conditional access (CA) systems, while in the Internet world they are generally known as Digital Rights Management (DRM) systems. A home network can be defined as a set of devices that are interconnected using some kind of network technology (e.g. Ethernet, IEEE 1394, BlueTooth, 802.1 lb, 802.1 lg, etc.). Although network technology allows the different devices to communicate, this is not enough to allow devices to interoperate. To be able to do this, devices need to be able to discover and address the functions present in the other devices in the network. Such interoperability is provided by home networking middleware. Examples of home networking middleware are Jini, HAVi, UPnP, AVC. The concept of Authorized Domains (ADs) aims at finding a solution to both serve the interests of the content owners (that want protection of their copyrights) and the content consumers (that want unrestricted use of the content). The basic principle is to have a controlled network environment in which content can be used relatively freely as long as it does not cross the border of the authorized domain. Typically, authorized domains are centered around the home environment, also referred to as home networks. Of course, other scenarios are also possible. A user could for example take a portable device for audio and/or video with a limited amount of content with him on a trip, and use it in his hotel room to access or download additional content stored on his personal audio and/or video system at home. Even though the portable device is outside the home network, it is a part of the user's authorized domain. In this way, an Authorized Domain (AD) is a system that allows access to content by devices in the domain, but not by any others. For a more extensive introduction to the use of an Authorized Domain, etc., see S.A.F.A. van den Heuvel, W. Jonker, F.L.A.J. Kamperman, P.J. Lenoir, Secure Content Management in Authorised Domains, Philips Research, The Netherlands, IBC 2002 conference publication, pages 467-474, held at 12-16 September 2002. Various proposals exist that implement the concept of authorized domains to some extent. One type of previous solutions include device based Authorized Domains (ADs). Examples of such systems are SmartRight (Thomson Multimedia), xCP, and NetDRM (Matshushita). A further example of a device based AD is e.g. given in international patent application WO 03/098931 (attorney docket PHNL020455) by the same applicant. In typical device based ADs, the domain is formed by a specific set of devices and content. Only the specific set of devices of the domain is allowed to access, use, etc. the content of that domain. There is not made any distinction of the various users of the specific set of devices. A drawback of device based AD systems is that they typically do not provide the typical flexibility that a user wants or need, since users are restricted to a particular and limited set of devices. In this way, a user is not allowed to exercise the rights that the user has obtained anytime and anywhere he chooses. For example, if a user is visiting a friend's house he is not able to access his legally purchased content on the friend's devices as these devices would not typically be part of the particular and limited set of devices forming the domain comprising the user's content. Another type of previous solutions is person based Authorized Domains, where the domain is based on persons instead of devices as was the case for device based ADs. An example of such a system is e.g. described in international patent application serial number IB2003/004538 (attorney docket PHNL021063) by the same applicant, in which content is coupled to persons which then are grouped into a domain. In a typical person based AD access to content bound to that AD is allowed by only a specific and limited set of users, but e.g. using any compliant device. Person based Authorized Domains typically offer easier domain management compared to device based ADs. However, person based systems require person identification which is not always convenient or preferred by users. Further, a visitor to your home may want to access your content. As he does not have a person id device for that domain it is not possible for him to access content. It would be preferred if devices in the home belonging to the domain could enable access of domain content by the visitor. Therefore there is a need for a hybrid person and device based authorized domain having the individual advantages of each system. Such a hybrid person and device based authorized domain is proposed in European patent application serial number 03102281.7 (attorney docket PHNL030926) by the same applicant. In that application an Authorized Domain (AD) is proposed which combines two different approaches to define an AD. The connecting part between the device and the person approach is a Domain Identifier. The devices are preferably grouped together via a domain devices certificate (DDC), while the persons preferably are separately grouped via a domain users certificate (DTJC) and where content is directly or indirectly linked to a person. A schematic representation of such an Authorized Domain (AD) can be seen in Figure 1, and will be explained in greater detail in the following. However, this AD has the disadvantage that when content is imported into the domain (an action typically done on a device), e.g. from a delivery DRM and/or CA system, it is not directly clear to which person the content has to be attributed. In other words, at the moment of import, the system needs additional information of whom it must link the content to. Therefore there is a need for a simple implementation where the information 'to whom belongs content imported in the domain' is easily and/or directly obtainable. An additional problem is that no simple and effective domain boundary is available. In prior art systems/methods, domain boundaries are typically defined by a maximum number of devices, a limited number of sessions, etc., which are either technically difficult to implement or easy to implement but then do not provide the desired characteristics of a domain boundary. An example of the first is e.g. letting all persons to a household be in the domain wherever they are using any device they possess. Setting a limit for the number of devices or sessions in the domain gives the disadvantage that this approach does not scale with the number of users using the Authorized Domain (AD). Therefore there is a need for a simple and more scalable implementation of the domain boundary.
It is an object of the invention to provide a method and corresponding system for providing/generating an Authorized Domain structure based on both persons and devices that solves the above-mentioned shortcomings of prior art. A further object is to provide this in a simple, flexible and efficient way. These objects, among others, are achieved by a method (and corresponding system) of generating an Authorized Domain as claimed in claim 1. In this way, a number of verified devices and a number of verified persons that is authorized to access a content item of said Authorized Domain are obtained. Additionally, it is possible to enable automatic assignment of imported content being imported on a device belonging to the Authorized Domain (AD) since it now is given to which person a given authorized device belongs to. Further, a simple and efficient way of implementing domain boundaries is enabled, since the domain boundaries may be coupled to users only (as now both devices and content are coupled to users). In this way, the domain boundary becomes less rigid and scales better. Additionally, a simple and efficient way of grouping devices and persons to an AD is obtained. Further, a hybrid device and person based Authorized Domain is provided. In this way, access is enabled to a content item of an authorized domain by a user operating a device either by verifying that the owner of a content item and the user is linked the same domain or by verifying that the owner of the device and the owner of the content item is linked to the same domain. Thereby, enhanced flexibility for one or more users when accessing content in an authorized domain is obtained while security of the content is still maintained. This is further done in a simple, secure and reliable way. In one embodiment, - each device may be bound to only a single user, or
- each device may be bound to several users, where one user is indicated as a primary user for that particular device. In one embodiment, the method further comprises the step of: - importing, on a given device, at least one content item into the Authorized Domain given by the domain identifier by
- automatically binding, by default, the at least one imported content item to the single user that the given device is bound to or to the user (PI, P2, ..., PN-) indicated as primary user for the given device, or
- binding the at least one imported content item to another user using additional information, when non-default binding is to be used. In one embodiment, the method further comprises
- providing an Authorized Domain size limitation, where the limitation relates to a maximum number of users. Further, a limit can be put on the maximum number of devices per user, thereby making the total number of devices in the domain dependent on the number of users. In one embodiment, the method further comprises
- using a user identification device as a personal Authorized Domain manager, and/or - using a personal mobile device as a personal Authorized Domain manager, and/or
- using a mobile phone as a personal Authorized Domain manager, and/or
- using a PDA (personal digital assistant) as a personal Authorized Domain manager. In one embodiment, the step of binding at least one user to the domain identifier comprises: - obtaining or generating a Domain Users List comprising the domain identifier and a unique identifier for a user thereby defining that the user is bound to the Authorized Domain. In one embodiment, the step of binding at least one device to at least one user comprises
- obtaining or generating a Device Owner List comprising a unique identifier for a user and a unique identifier for each device belonging to the user thereby defining that the at least one device is/are bound to the user,
- or in that the step of binding at least one device to at least one user comprises
- obtaining or generating a Device Owner List for each device to be bound, the Device Owner List comprising a unique identifier for a user and a unique identifier for a device belonging to the user thereby defining that the device is bound to the user. In one embodiment, the step of binding at least one content item to the Authorized Domain comprises:
- binding a content item to a User Right, where said User Right is bound to a user bound to the Authorized Domain. In one embodiment, the User Right comprises rights data representing which rights exists in relation to the at least one content item bound to the User Right. In one embodiment, the method further comprises the step of controlling access, by a given device being operated by a given user, to a given content item, the step comprising:
- checking whether a user, the given content item is linked to, and a user ,the given device is linked to, belongs to the same Authorized Domain, and allowing access for the given user and/or other users via the given device to the content item if so, and/or - checking if the given content item is linked to a user belonging to the same Authorized
Domain as the given user, and allowing access for the given user via the given device and/or other devices to the content item if so. In one embodiment, the method further comprises the step of controlling access, by a given device being operated by a given user, to a given content item being bound to the Authorized Domain and having a unique content identifier, comprising:
- checking if the Domain User List of the Authorized Domain comprises both a first user identifier, comprised in a Device Owner List comprising an identifier of the given device, and a second user identifier, linked to the given content item, thereby checking if the user bound to the given device is bound to the same Authorized Domain as the user bound to the content item, and
- allowing access to the given content item by the given device operated by any user and/or
- checking if the Domain User List of the Authorized Domain, that the content item is bound to, comprises a user identifier of the given user thereby checking if the given user is bound to the same Authorized Domain as the content item, and
- allowing access to the given content item by any device including the given device operated by the given user. In one embodiment, the step of controlling access of a given content item further comprises: - checking that the User Right for the given content item specifies that the given user has the right to access the given content item and only allowing access to the given content item in the affirmative. In one embodiment, every content item is encrypted and that a content right is bound to each content item and to a User Right, and that the content right of a given content item comprises a decryption key for decrypting the given content item. In one embodiment, - the Domain Users List (DUC) is implemented as or included in a Domain Users Certificate, and/or
- the Device Owner List (DOC) is implemented as or included in a Device Owner Certificate, and/or
- the User Right is implemented as or included in a User Right Certificate. Advantageous embodiments of the present invention are defined in the claims and described in detail in the following. The embodiments of the system correspond to the embodiments of the method and have the same advantages for the same reasons. Further, the invention also relates to a computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to the present invention. The invention also relates to an Authorized Domain (AD) that has been generated by the method or by the system according to the present invention.
These and other aspects of the invention will be apparent from and elucidated with reference to the illustrative embodiments shown in the drawings, in which: Figure 1 schematically illustrate a hybrid device and person based Authorized Domain (AD) according to prior art; Figure 2a schematically illustrate a hybrid device and person based Authorized Domain (AD) according to the present invention; Figure 2b illustrate how each content item is linked to persons via a user right according to one embodiment of the present invention; Figure 3a schematically illustrate the coupling between users and devices according to a first aspect of the present invention; Figure 3b schematically illustrate the coupling between users and devices according to a second aspect of the present invention; Figure 4 schematically illustrate the elements of a Domain Users Certificate (DUC); Figure 5 illustrates an exemplary (partial) data structure of a content container, a content right (CR) and a user right certificate (URC) according to the embodiment of the present invention shown in Figure 2a; Figure 6 schematically illustrate an exemplary system comprising devices and persons forming an authorized domain (AD). Throughout the figures, same reference numerals indicate similar or corresponding features. Some of the features indicated in the drawings are typically implemented in software, and as such represent software entities, such as software modules or objects.
Figure 1 schematically illustrate a hybrid device and person based Authorized Domain (AD) according to prior art. Such a hybrid device and person based authorized domain is disclosed in European patent application serial number 03102281.7 (attorney docket PHNL030926) by the same applicant. Shown are an authorized domain (100) where a number of devices Dl, D2, D3, ..., DM (where M is equal to or larger than 1), a number of content items Cl, C2, C3, ..., CN2 (where N2 is equal to or larger than 1) and a number of persons/users PI, P2, P3, ..., PNi (where Ni is equal to or larger than 1) is bound to the AD. Please note that M, NI and/or N2 may initially or at some time later be 0 in some states. The devices, persons, and content items have been bound to the domain (100) via a domain identifier (Domain_ID) (101). The content items (Cl, C2, C3, ..., CN ) are connected to the users (PI, P2, P3, ..., PNi) via user rights (URCl, ... URCN2) (not shown), where preferably one content item is associated with one user right certificate specifying which rights a given person (or alternatively a given group of persons and/or all persons bound to the domain (100)) have in relation to the specific content item (or alternatively, several or all content items in the domain (100)). In another embodiment of European patent application serial number 03102281.7 (attorney docket PHNL030926), the content items (Cl, C2, C3, ..., CN2) are connected to the Domain Identifier (101) via one or more Domain Rights (DRC) (not shown), e.g. implemented as a certificate. For more information on an authorized domain architecture and implementation options, the reader is referred to international patent application WO 03/047204 (attorney docket PHNL010880) by the same applicant or international patent application WO 03/098931 (attorney docket PHNL020455) also by the same applicant. The latter application more specifically describes an implementation in which content and devices are coupled to a domain. Additionally, international patent application serial number IB2O03/004538 (attorney docket PHNL021063) by the same applicant describes an implementation in which content is coupled to persons which then are grouped into a domain. Authorized devices are preferably bound to the AD (100) by a certificate. Likewise authorized persons/users are preferably also bound to the AD (100) via certificates. Content items are, in this particular embodiment, bound to a person by means of a user right certificate (URC). This user right certificate enables the use of a corresponding content right (CR) that preferably contains a cryptographic key for accessing the content, as will be explained in greater detail in connection with Figure 5. A user right certificate (URC) is typically linked with one content item, but could also be linked with multiple content items. An exemplary partial data structure of a content container (contains a content item), a URC, and a CR are shown and explained in greater detail in connection with Figure 5. Domain certificates are preferably issued by a domain authority. Alternatively, compliant devices with domain management capabilities can manage these certificates. In the specific example shown in Figure 1, each content item Cl, C2, ..., CN is coupled (via URC(s)) to person PI, CN+I is coupled to person P2, and where CN+2 - CN2 are distributed among person(s) P3-PN-. A given content item is preferably only allowed to be coupled to a single URC (indirectly via a content right) and thereby a single person. If several users needs a copy of the same content item it would in this embodiment be present once for each user and treated as different content items, which make rights management simpler. Alternatively and just as applicable, a given content item could be coupled to multiple persons, as a CR can be linked to multiple URCs. Persons PI, P2, ..., PN. and Domain devices Dl, D2, ..., DM are then grouped into forming the authorized domain (100). The binding, i.e. grouping and coupling, of devices, persons and content is done by the use of certificates. Preferably, a Domain Devices Certificate or Domain Devices List (DDC), a Domain Users Certificate or Domain Users List (DUC), and a User Right Certificate or User Right List (URC) are used. In the following reference is only made to certificates, although it is to be understood that such structures may e.g. be implemented as lists or the like instead. The DDC lists the device(s), which are part of the domain (100), e.g. by comprising for each device a unique identifier. The DUC lists the user(s), which are part of the domain, e.g. by comprising a unique identifier or a (e.g. public) cryptographic key or a hash thereof for each user. The URC preferably exist for each content item (so in Figure 1 there are N2 URCs) and indicates which rights the user (that the URC is linked to) has (and/or does not have) within the domain (100), and optionally a cross domain (X-AD rights), for the given content item linked to the URC. Alternatively, an URC coupled to a given user e.g. lists each content item that is coupled to the given user and what rights the given user has in relation to each coupled content item. Alternatively, only a single URC is used specifying the rights for every user, i.e. which content item(s) each user has coupled to him/her and what rights the user has (and/or does not have). The DDC and DUC are associated with each other by means of a Domain Identifier (Domain_ID) (101) contained in both certificates. In the prior art, if a specific device (e.g. device D3) wants to access a certain piece of content (e.g. content Cl) it has to be proved or checked, etc. (using the certificates) that the certain piece of content is coupled to a specific person (e.g. person PI) that is a member of the same domain (100) as the specific device. This may e.g. by done by checking that an (unique) identifier of the specific device (e.g. device D3) is part of the DDC, that an (unique) identifier of the specific person (e.g. person PI) is part of the DUC, that both the DDC and DUC comprises the same Domain Identifier (e.g. DomainJD = 4 or Domain ID = 8 byte value (e.g. generated randomly); not shown), and that the URC for the specific person (e.g. URC1) specifies that the specific person has the right to access the certain piece of content (e.g. if it is within the validity period of his license or have not been used more than three times, etc.). Alternatively, the Domain ID may instead of being a random number be a reference to a data object e.g. a domain certificate. However, this AD has the disadvantage that when content is imported into the domain (an action typically done on a device), e.g. from a delivery DRM and/or CA system, it is not directly clear to which person the content has to be attributed. In other words, at the moment of import, the system needs additional information of whom it must link the content to. Further, no simple and effective domain boundary is available. Domain boundaries are typically defined by a maximum number of devices, a limited number of sessions, etc., which are either technically difficult to implement or easy to implement but then do not provide the desired characteristics of a domain boundary. An example of the last is e.g. letting all persons to a household be in the domain wherever they are using any device they possess. Such a domain boundary is not useful. Additionally, setting a limit for the number of devices or sessions in the domain gives the disadvantage that this approach does not scale with the number of users using the Authorized Domain (AD). Figure 2a schematically illustrate a hybrid device and person based Authorized Domain (AD) according to the present invention. Shown is an Authorized Domain (AD) corresponding to the one shown in Figure 1 with exceptions as explained in the following. Instead of linking authorized devices of the domain directly to the domain identifier (Domain_ID) (101), as in Figure 1, devices are now linked to persons, or more specifically, each device is linked to a person (could it generally be persons??, i.e. more than one person has ownership over a single device) that has ownership over the particular device. In the shown embodiment, each device is linked only to a single person, whereby the ownership of the device is easily reflected. Alternatively, each device may be linked to more than one person. Shown is an Authorized Domain (AD) (100) where a number of persons/users (PI, P2, ..., PNi) are bound to a domain identifier (Domain_ID) (101), as explained in connection with Figure 1. Further, a number of content items (Cl, C2, C3, ..., CN2) is linked to the users, as explained in connection with Figure 1. In the specific example shown in Figure 2a, content item Cl, C2, ..., CN is coupled (preferably via URC(s) as explained in greater detail in connection with Figure 2b) to person PI, CN+I is coupled to person P2, and CN+2 - CN are distributed among person(s)
According to the present invention, a number of authorized devices (Dl, D2, D3, ..., DM) (where M is equal to or larger than 1) is bound to the users of the Authorized Domain (AD) (100), where the binding reflects that a given user has ownership of the bound device. Preferably, authorized devices are bound to the users (and thereby the AD (100) ) by a Device Owner Certificate (DOC), list or other suitable structure. In one embodiment, a DOC exists for each device (as described in connection with Figure 3 a) defining which user (or users) has ownership of the given device. Alternatively, a DOC exist for each person (as described in connection with Figure 3b) defining which devices within the domain that user has ownership over. In yet another alternative embodiment, device may indicate to whom it belongs, e.g. by providing a DOC, list or other suitable structure. In the specific example shown in Figure 2a, device Dl and D2 are coupled to user PI , D3 is coupled to user P2, and D4 - DM are distributed among users(s) P3 - PNj. As mentioned, the user right (URC1, ..., URCN2) is a single connection, binding, coupling etc. between one user and a content right (which is required to decrypt a piece of content). Therefore we now have five main entities in our system that could work as follows:
- content (Cl, C2, C3, ..., CN2): content items are preferably encrypted (there are many options, for example with a unique key per content title) and can be anywhere in the system; a content item is in this and later embodiments linked indirectly to a user right certificate (URC) via a content right (CR), as explained in connection with Figure 5.
- content right (CR; not shown; see e.g. Figure 5): contains cryptographic key(s) or other suitable protection means to access a certain (encrypted/protected) content item. The system is flexible in the sense that content rights can be made unique per content title or even unique per specimen (copy) of content. Content rights should be only transferred to compliant devices. A more secure rule is to enforce that content rights may be only transferred to compliant devices that are operated by authorized users (i.e. users that are authorized to have access to the specific content right by means of their user rights). Content rights might also be stored together with the content on for example an optical disk. However, content rights must be stored securely since they contain the content decryption key.
- user right certificate (URC1, ... URCN2; not shown; see e.g. Figure 2b): a certificate, list, data structure or the like issued by the content provider that authorizes a person to use a certain content right (CR) (belonging to a certain piece of content). User rights can in principle be anywhere in the system. Preferably, a user right certificate also comprise rules (e.g. restricted to viewers 18 years or older, European market only, etc.) describing the allowed access to a certain content item.
- device (Dl, D2, D3, ..., DM): a device that is used to play, operate, record, present, display, modify, etc. a content item. Additionally, a (compliant) device can also preferably identify a user by means of a personalized identification device (e.g. such as a smart-card, a mobile phone, a biometric sensor, etc.) and collect certificates (e.g. from the smartcard, or from other devices) that prove that the user is allowed to use a certain content right. This content right could be obtained from the smart-card where it was stored (if it was stored there), or be obtained (securely transferred) from another compliant device on a network.
- user/person (PI, P2, P3, ..., PNi): A user is identified by some biometric or preferably by a personalized identification device (e.g. a smartcard, mobile phone, a mobile phone containing a smartcard or other types of devices that uniquely identifies a user) that he/she is wearing, carrying or has access to. A mobile phone comprising a smart card or another device having storage means is preferred since it allows users to carry rights with them (for accessing content on off-line devices). The identification device may itself be protected by a biometric authentication mechanism, so that anyone other than the legitimate owner cannot use the identification device. A user may also be identified using public key technology or zero- knowledge protocols or a combination thereof. Please note that in practice content can only be accessed/used by means of a user operating a device. In the following text we assume that devices used in the system are compliant and "public" devices. This means that a device will adhere to certain operation rules (e.g. will not illegally output content on an unprotected digital interface) and that ownership of a device is not important (public). Device compliance management, i.e. compliant device identification, renew-ability of devices, and revocation of devices, will be assumed to be in place (using known techniques), and will not be considered further here. By having the content items coupled to persons (e.g. via URCs) the ownership of content is easily reflected. Additionally, it is easier to administer a split of the AD, since by splitting the persons the appropriate content items is also split, since the content items are linked to persons. Hereby, one or more persons, one or more devices (via a person), and at least one content item (via a person) are linked together in the domain preferably with the use of certificates or alternatively with the use of lists or other suitable structures comprising the same described elements as for the certificates. It may be possible for the domain to comprise zero persons and/or zero devices and/or zero content items during some points. E.g. when initially building the domain it may comprise zero content items or zero devices bound to the domain, etc. In this way, a user that has been verified as belonging to the same domain as the content item being accessed may access the specific content using any device. Additionally, a user that is using a device that has been verified as belonging to the same domain as the content item being accessed may access the specific content using that specific device. Further all users may access the specific content item on that specific device. This gives enhanced flexibility for one or more users when accessing content in an AD while security of the content is still maintaining. Further, during import of new content items it is now possible to automatically assign the newly imported content to the person to whom the device used for import belongs to, since the devices in the Authorized Domain (AD) now are coupled to persons. So now, it is not necessary to obtain and handle additional information relating to who imported content must be linked to. In a preferred embodiment, it is possible to override or sidestep this automatic assignment and still use additional information to assign the content to another person within the Authorized Domain (AD). In the embodiment where a given device may be linked to multiple persons, a 'primary' person and one or more 'secondary' persons may be designated where the default automatic binding of an imported content item (Cl, C2, ..., CN2) is done to the user (PI, P2, ..., PN-) that is designated primary person of the given device (Dl , D2, ..., DM) used during import. Additionally, a simple and efficient way of implementing domain boundaries is enabled, since the domain boundaries may be coupled to users only (as now both devices and content are coupled to users). In effect, an Authorized Domain (AD) size limitation is provided, where the limitation relates to a maximum number of users instead of a maximum number of devices or a maximum number of sessions. Further, a limit can be put on the maximum number of devices per user, thereby making the total number of devices in the domain dependent on the number of users. It is also to be understood that instead of having one list or certificate comprising users (i.e. the DUC) and one list or certificate comprising devices (i.e. DOC) above and in the following other arrangements may also be used. As an alternative, both devices and users could be comprised in a single list/certificate. Further, several lists/certificates comprising devices and/or several lists/certificates comprising users and/or combinations thereof may be used just as well. Figure 2b illustrate how each content item is linked to persons via a user right according to one embodiment of the present invention. The content items (Cl, C2, C3, ..., CN2) are connected to the users (PI, P2, P3, ..., PNi) via user rights (URCl, ... URCN2) (not shown), where preferably one content item is associated with one user right certificate specifying which rights a given person (or alternatively a given group of persons and/or all persons bound to the domain) have in relation to the specific content item (or alternatively, several or all content items in the domain). In the shown example, content Cl, ..., CN are connected to user right URCl, ..., URC N, respectively, which all are connected to user PI, content C N+l is connected to user right URC N+l connected to user P2, while content C N+2, ..., C N2 is connected to user rights URC N+2, ... , URC N2, which are distributed among users P4, ..., PNl . The user right (URCl, ... URCN2) is preferably a certificate, list, data structure or the like issued by the content provider that authorizes a person to use a certain content right (CR) (belonging to a certain piece of content). User rights (when implemented as a certificate) can in principle be anywhere in the system. Preferably, a user right certificate also comprise rules (e.g. restricted to viewers 18 years or older, European market only, etc.) describing allowed access to a certain content item. Figure 3a schematically illustrate the coupling between users and devices according to a first aspect of the present invention. Shown are two Device Owner Certificates (DOC1, DOC2) each linked (as indicated by the arrows) to the same person/user, namely user PI. Further, DOC1 is linked to authorized device Dl, while DOC2 is linked to authorized device D2 (as indicated by the arrows). This reflects in a very simple and reliable way that user PI has ownership of devices Dl and D2. So when device Dl or D2 is used to import content into the Authorized Domain (AD) (e.g. by user PI or another user), then it is possible to automatically assign the imported content to user PI. If the content should be assigned to another user it is preferably possible to override the automatic assignment. In this embodiment, a DOC exists for each device. Each DOC in this particular embodiment comprises a unique identifier (Devi ID or Dev2_ID) of the given device and a unique identifier of the user (Pers.l_ID) that the given device belongs to. In a preferred embodiment, the device identifier for a given device, e.g.
DevlJ-D, is an (un-changeable at least by users) serial or ID number, etc. The person/user identifier could e.g. be an ID or serial number for a given person, a name, a hash value of a public key of the user or in general any unique identifier of a person. A user may e.g. identified by some biometric or preferably by a personalized identification device (e.g. a smartcard, mobile phone, a mobile phone comprising a smartcard or other types of devices that uniquely identifies a user) that he/she is wearing, carrying or has access to. A mobile phone comprising a smart card or another device having storage means allows users to carry rights with them (for accessing content on off-line devices). In a networked environment, it is not required that the user carries the rights with him. The identification device may itself be protected by a biometric authentication mechanism, so that anyone other than the legitimate owner cannot use the identification device. A user may also be identified using public key technology or zero-knowledge protocols or a combination thereof. The DOC is in one embodiment managed by a smartcard (e.g. acting as a person/user identification device). In this way, the smartcard acts as an AD management enabled device. In this case, the person private key is used to sign such certificates.
Alternatively, an AD compliant device with AD management capabilities could manage such certificates, which however, would require further security measure. Figure 3b schematically illustrate the coupling between users and devices according to a second aspect of the present invention. Shown are a single Device Owner Certificates (DOC1) linked (as indicated by the arrows) to the person/user PI. Further, DOC1 is linked to both authorized device Dl and to authorized device D2 (as indicated by the arrows). This reflects in a very simple and reliable way that user PI has ownership of devices Dl and D2. In this embodiment, a DOC exists for each user. Each DOC in this particular embodiment comprises a unique identifier (Devl_ID, Dev2_ID) for each device and a unique identifier of the user (Pers.l_ID) that the given device(s) belongs to. Alternatively, DOCs as described both in connection with Figure 3a and 3b may be used in combination. Figure 4 schematically illustrate the elements of a Domain Users Certificate (DUC). The Domain Users Certificate (DUC) comprises a listing of unique identifiers
(Pers IDl, Pers_ID2, ...) for one or more users/persons belonging to the given domain, i.e. being authorized users in the domain. The given domain that the listed users are authorized within is specified by the value of the Domain ID. A Domain Users Certificate (DUC) is linked to the Domain ID and thereby defines the authorized domain that comprises both devices and users, since devices are linked to users, as described above e.g. in connection with Figures 3a and 3b. Certificates according to the present invention (DOC, DUC, etc.) could e.g. be implemented by well-known authorization certificate. Additionally, one useful option is to put a Domain D in a holder field of such a certificate implementing the DOC and/or the DUC. Figure 5 illustrates an exemplary (partial) data structure of a content container, a content right (CR) and a user right certificate (URC) according to the embodiment of the present invention shown in Figure 2a. Shown is a content container (501) which contains protected data/content (Encr_Cont) e.g. obtained from a Service Provider. The content container further comprises a content identifier (ContJ-D) unique for the particular content item embedded in the content container. In this way, the content identifier (ContJ-D) is used to locate a given content item of the domain, e.g. by searching every content container belonging to the specific domain for a matching ContJ-D. Also shown is a content right (CR) (502) comprising a content identifier (ContJ-D) and a content encryption key (Cont Encr K). The content identifier is used to establish a link to the encrypted content item (in a content container) that the content encryption key is for, i.e. the content that the key is needed to de-crypt and thereby enable access to. In this particular embodiment, the encryption key is a symmetrical key, i.e. the same key is used to both encrypt and decrypt data. Alternatively, other secure schemes may be used. Further shown is a user right (UR)/User Right Certificate (URC) (503). The URC comprises a content identifier (Cont_ID) used for linking a specific content item (and content right) with a specific URC. The URC also comprises a person/user identifier (Pers_ID) that indicates which person the specific content is bound to. The person/user identifier could e.g. be an ID or serial number for a given person, a name, a hash value of a public key of the user or in general any unique identifier of a person. Further, the URC comprises rights data (Rghts Dat) that define what the given user (as identified by the Pers_ID) is allowed to do in relation with the specific content item (contained in the content container comprising the same ContJ-D). These rights data may e.g. specify play rights (e.g. restricted to viewers 18 years or older, European market only, etc.), one-generation copy rights, a validity period, not used more than three times etc. Further, the rights data (Rghts Dat) may also define what all users are allowed to do in relation with the specific content item (which may be the same or different than the rights of the person identified by Pers_ID). To illustrate the use of a content container, a content right (CR) and a user right certificate (URC) according to the present invention consider the following example illustrating access to a given content item by a given user on a given device. The content identifier (ContJ-D) for the given content item that the user wants to access and the person identifier (PersJ-D) of the given user are obtained. The person identifier may e.g. be obtained on the basis of a personalized identification device (e.g. a PDA, a smart card, mobile phone, a mobile phone containing a smartcard, a biometric sensor, etc. or in another way). The content identifier may e.g. be obtained on the basis of a file name, the selection of a file, from a header of the content container, etc. It is checked if the content item and the user belong to the (same) Authorized Domain. Checking whether a user belongs to a domain is done by checking if the person identifier (Pers_ID) is comprised in a Domain Users Certificate (DUC) (shown in Figures 2a and 4). If so, then it has been verified that the user is part of the domain and is allowed to access content also being a part of the same domain. Then it is checked whether the given content item also belongs to the same domain, by checking if the content identifier of the content item is bound to a person bound to the same domain, i.e. by checking whether there exist a URC bound to the domain that comprises the same content identifier. If so, then the content item belongs to the same domain and the user (given that the user and/or the device that is used have been verified) therefore has the right to access it. Further, the rights data (Rghts Dat) of the URC may also specify a restricted access to the content item. The rights data may specify rules, rights, conditions for the person identified with Pers_ID and/or rules, rights, conditions in general. For example, it could specify that that every user in the domain has play rights while the user linked via Pers_ID in addition has exclusive first generation copy rights. In effect, it is checked if the given content item is linked to a user belonging to the same Authorized Domain (AD) as the given user, and allowing access for the given user via the given device and/or other devices to the content item if so. Usually, the user will obtain access to the content item using a specific device.
If the user is not part of the domain or no valid user ID can be obtained (e.g. because it is a friend accessing the content), then it has to be checked whether the specific device that the user is using to access the content item is part of the same domain as the content item in order to allow the user to access the content item, since he is not (or it can not be established that he is) part of the same domain as the content item. I.e. the device used for access has to be an authorized device within the same domain as the content item being accessed. This is done by obtaining the Pers_ID of the URC that the content item was bound to, i.e. the content owner of the content item being accessed is determined. Here and in the following, content owner is meant as content owner within the domain and not the entity that has the right to assigns rights, such as authors, music labels, film studios, etc. In effect, it is checked whether a user, the given content item is linked to, and a user, the given device is linked to, belongs to the same Authorized Domain (AD), and allowing access for the given user and/or other users via the given device to the content item if so. Then the device identifier (Dev_ID) of the given device being used to access the content is obtained. The obtained device identifier (Dev_ID) is used to determine the user that the device belongs to. This is done by determining which DOC (shown in Figure 2a, 3a and 3b) comprises the device identifier and retrieving the user identifier (Pers_ID) enclosed therein, i.e. this determines the device owner. Then it has to be checked whether the content owner and the device owner are part of the same domain. This is done by checking whether the DUC comprising the domain identifier (Domain_ID) contains the user identifier (PersJ-D) of both the content owner and the device owner. If this is the case, then the user (and all other users) may use the specific device to access the specific content (and all other content of that domain). These three steps of validating access to the content item, the user and the device may alternatively be done in another order than the one described and e.g. also in parallel at least to a certain extent. After it has been verified that - the current user and the user that the content item being accessed belongs to and/or that the user that the device belongs to and the user that the content belongs to is part of the same domain as the content,
- then the obtained content identifier is used to locate the content right (CR) of the specific content item being accessed in order to obtain the cryptographic key that has to be used to decrypt the encrypted content item. Further, the content container comprising the encrypted content item is also located using the content identifier. Finally, the key in the content right (CR) is used to decrypt the content item which is now accessible, e.g. for rendering, copying on an optical disk, editing, etc. Alternatively, the content item may also be decrypted using the content right before sending it to the device for access, whereby only the content item needs to be transmitted. However, this requires special measures in order to protect the content item during transfer so that it is not possible to 'leak' the unprotected content. This process is illustrated in Figure 5 by the arrows linking the Cont ID of the various structures. In this way, if a specific user that has been verified as belonging to the same domain as the content item being accessed then there is, as mentioned, no need for checking whether the device he is using also belongs to the same domain. Further, the validated user may access the specific content item using all devices. Likewise, if a specific device has been verified as belonging to the same domain as the content item being accessed, then all users may access the specific content item using that specific device and there is no need to verify the user. Therefore, enhanced flexibility for one or more users when accessing content in an AD is obtained while security of the content is still maintaining. Figure 6 schematically illustrate an exemplary system comprising devices and persons forming an authorized domain (AJD). Shown is network (508) that enables communication between a number of devices e.g. in a household. Devices in the example is a television set (504), a digital video system (510), a music set (509) and a portable device (507) that is in wireless communication with the network (508) via a wireless access point (506). Further schematically shown is a user/person (505). In one exemplary scenario, an Authorized Domain (100) has the user (505) bound to it in addition to the television set (504), the digital video (510), the music set (509) and a number of content items (not shown) (all bound according to Figure 2a via persons/users). In this scenario, the user wants to access a given content item on the portable device (507). He may be located the same place as the devices or at another place (e.g. in a hotel room). For a user to obtain access to the content item according to the invention, it has to be checked that the person (505) belongs to the same domain (100) as the content owner since the portable device (507) does not. This may be done by uniquely identifying the user e.g. using a smart card reader, e.g. in the portable device (507), which then may transfer the User ID to the network (508). The content right and the content item is assumed to be on the portable device (507) (otherwise it may be transmitted there). The user is then checked as described in connection with Figure 5. After validation of the user, then the content item may be accessed. In another exemplary scenario, an Authorized Domain (100) has the television set (504), the digital video (510), the music set (509) and the portable device (507) bound to it in addition to a number of content items (not shown) (all bound according to Figure 2a via persons/users). The user (505) is in this scenario not bound to the Authorized Domain (100) as he e.g. may be a neighbor or friend visiting. In this scenario, the user also wants to access a given content item on the portable device (507). For a user to obtain access to the content item according to the invention, it has to be checked that the owner of the portable device (507) belongs to the same domain (100) as the owner of the content since the person (505) does not. This may be done by checking if the portable device (507) is bound to the same domain as the content item as described in connection with Figure 5. After validation of the device, then the content item may be accessed by the user on the portable device (507). In the claims, any reference signs placed between parentheses shall not be constructed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps other than those listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Claims

CLAIMS:
1. A method of generating an Authorized Domain (AD), the method comprising the steps of
- selecting a domain identifier (DomainJD) uniquely identifying the Authorized Domain (100),
- binding at least one user (PI, P2, ..., PNi) to the domain identifier (DomainJD), and
- binding at least one device (Dl , D2, ..., DM) to at least one user (PI, P2, ..., PNi), - thereby obtaining a number of devices (Dl, D2, ..., DM) and a number of users (PI, P2, ..., PNi) that is authorized to access a content item (Cl, C2, ..., CN2) of said Authorized Domain (100).
2. A method according to claim 1, characterized in that
- each device (Dl, D2, ..., DM) may be bound to only a single user, or
- each device (Dl, D2, ..., DM) may be bound to several users, where one user is indicated as a primary user for that particular device (Dl, D2, ..., DM).
3. A method according to claim 2, characterized in that the method further comprises the step of:
- importing, on a given device (Dl , D2, ..., DM), at least one content item (Cl, C2, ..., CN ) into the Authorized Domain (AD) given by the domain identifier (DomainJD) by - automatically binding, by default, the at least one imported content item (Cl, C2, ..., CN2) to the single user (PI, P2, ..., PNi) that the given device (Dl, D2, ..., DM) is bound to or to the user (PI, P2, ..., PNi) indicated as primary user for the given device (Dl, D2, ..., DM), or
- binding the at least one imported content item (Cl, C2, ..., CN2) to another user (PI, P2, ..., PNi) using additional information, when non-default binding is to be used.
4. A method according to any of claims 1 - 3, characterized in that the method further comprises - providing an Authorized Domain (AD) size limitation, where the limitation relates to a maximum number of users.
5. A method according to any of claims 1 - 4, characterized in that the method further comprises using a user identification device as a personal Authorized Domain (AD) manager, and/or using a personal mobile device as a personal Authorized Domain manager, and/or using a mobile phone as a personal Authorized Domain manager, and/or using a PDA (personal digital assistant) as a personal Authorized Domain manager and/or.
6. A method according to any of claims 1 - 5, characterized in that the step of binding at least one user (PI, P2, .. ., PNi) to the domain identifier (Domain ID) comprises: obtaining or generating a Domain Users List (DUC) comprising the domain identifier (Domain_ID) and a unique identifier (Pers_IDl, Pers_ID2, ..., Pers IDNi) for a user (PI, P2, ..., PNi) thereby defining that the user is bound to the Authorized Domain (100).
7. A method according to any of claims 1 - 6, characterized in that the step of binding at least one device (Dl, D2, ..., DM) to at least one user (PI, P2, ..., PNi) comprises obtaining or generating a Device Owner List (DOC) comprising a unique identifier
(Pers_IDl, Pers_ID2, ..., PersJDNi) for a user (PI, P2, ..., PNi) and a unique identifier (DeyJDl, Dev_ID2, ..., DevJDM) for each device (Dl, D2, ..., DM) belonging to the user thereby defining that the at least one device is/are bound to the user (PI, P2, ..., PNi), or in that the step of binding at least one device (Dl, D2, ..., DM) to at least one user (PI, P2, ..., PNi) comprises obtaining or generating a Device Owner List (DOC) for each device (Dl, D2, ..., DM) to be bound, the Device Owner List (DOC) comprising a unique identifier (PersJ-Dl, Pers_ID2, ..., PersJDNi) for a user (PI, P2, . .., PNi) and a unique identifier (DevJDl, Dev_ID2, ..., Dev_IDM) for a device (Dl, D2, ..., DM) belonging to the user thereby defining that the device is bound to the user (PI, P2, ..., PNi).
8. A method according to any of claims 1 - 7, characterized in that the step of binding at least one content item (Cl, C2, ..., CN ) to the Authorized Domain (AD) comprises: binding a content item (Cl, C2, ..., CTSfc) to a User Right (URCl, URC2, ... URCN2), where said User Right (URCl, URC2, ... URCN2) is bound to a user (PI, P2, ..., PNi) bound to the Authorized Domain (100).
9. A method according to claim 8, characterized in that the User Right (URCl,
URC2, ... URCN2) comprises rights data (Rghts Dat) representing which rights exists in relation to the at least one content item (Cl, C2, ..., CN2) bound to the User Right (URCl, URC2, ... URCN2).
10. A method according to any one of the previous claims, characterized in that the method further comprises the step of controlling access, by a given device being operated by a given user, to a given content item (Cl, C2, ..., CN2), the step comprising: checking whether a user, the given content item (Cl, C2, ..., CN2) is linked to, and a user, the given device is linked to, belongs to the same Authorized Domain (AD), and allowing access for the given user and/or other users via the given device to the content item if so, and/or checking if the given content item (Cl , C2, ..., CN ) is linked to a user belonging to the same Authorized Domain (AD) as the given user, and allowing access for the given user via the given device and/or other devices to the content item if so.
11. A method according to any one of claims 6 - 9, characterized in that the method further comprises the step of controlling access, by a given device being operated by a given user, to a given content item (C 1, C2, ..., CN ) being bound to the Authorized Domain (100) and having a unique content identifier (Cont_JD), comprising: checking if the Domain User List (DUC) of the Authorized Domain (100) comprises both a first user identifier (PersJD), comprised in a Device Owner List (DOC) comprising an identifier (Devl_ID, Dev2_ID) of the given device, and a second user identifier (PersJ-D), linked to the given content item (Cl, C2, ..., CN ), thereby checking if the user bound to the given device is bound to the same Authorized Domain (100) as the user bound to the content item, and allowing access to the given content item (Cl, C2, ..., CN ) by the given device (Dl, D2, ...,
DM) operated by any user and/or checking if the Domain User List (DUC) of the Authorized Domain (100), that the content item is bound to, comprises a user identifier (PersJD) of the given user (PI, P2, ..., PNi) thereby checking if the given user is bound to the same Authorized Domain (100) as the content item, and allowing access to the given content item (Cl, C2, ..., CN2) by any device including the given device operated by the given user.
12. A method according to any of claims 10 - 11, characterized in that the step of controlling access of a given content item further comprises: checking that the User Right (URCl, URC2, ... URCN2) for the given content item specifies that the given user (PI, P2, ..., PNi) has the right to access the given content item (Cl, C2, ..., CN2) and only allowing access to the given content item (Cl, C2, ..., CN2) in the affirmative.
13. A method according to any of claims 1 - 12, characterized in that every content item is encrypted and that a content right (CR) is bound to each content item and to a User Right (URCl, URC2, ... URCN2), and that the content right (CR) of a given content item comprises a decryption key for decrypting the given content item.
14. A method according to any of claims 6 - 13, characterized in that the Domain Users List (DUC) is implemented as or included in a Domain Users Certificate, and/or the Device Owner List (DOC) is implemented as or included in a Device Owner Certificate, and/or the User Right (URCl, URC2, ..., URCN2) is implemented as or included in a User Right Certificate.
15. A method according to any previous claim, characterized by binding at least one content item (Cl, C2, ..., CN2) to at least one user (PI, P2, ..., PNi).
16. A system for generating an Authorized Domain (AD), the system comprising: means for obtaining a domain identifier (DomainJD) uniquely identifying the Authorized Domain (100), means for binding at least one user (PI, P2, ..., PNi) to the domain identifier (DomainJD), and means for binding at least one device (Dl, D2, ..., DM) to at least one user (PI, P2, ..., PNi), thereby obtaining a number of devices (Dl, D2, ..., DM) and a number of persons (PI, P2, ..., PNi) that is authorized to access a content item of said Authorized Domain (100).
17. A system according to claim 16, characterized in that each device (Dl, D2, ..., DM) may be bound to only a single user, or each device (Dl, D2, ..., DM) may be bound to several users, where one user is indicated as a primary user for that particular device (Dl, D2, ..., DM).
18. A system according to claim 17, characterized in that the system further comprises means for: importing, on a given device (Dl, D2, . .., DM), at least one content item (Cl, C2, ..., CN2) into the Authorized Domain (AD) given by the domain identifier (DomainJD) by automatically binding, by default, the at least one imported content item (Cl, C2, ..., CN2) to the single user (PI, P2, ..., PNi) that the given device (Dl, D2, ..., DM) is bound to or to the user (PI, P2, ..., PN ) indicated as primary user for the given device (Dl, D2, ..., DM), or binding the at least one imported content item (Cl, C2, ..., CN2) to another user (PI, P2, ..., PNi) using additional information, when non-default binding is to be used.
19. A system according to any of claims 16 - 18, characterized in that the system further comprises means for providing an Authorized Domain (AD) size limitation, where the limitation relates to a maximum number of users.
20. A system according to any of claims 16 - 19, characterized in that the system further comprises means for: using a user identification device as a personal Authorized Domain (AD) manager, and/or using a personal mobile device as a personal Authorized Domain manager, and/or using a mobile phone as a personal Authorized Domain manager, and/or using a PDA (personal digital assistant) as a personal Authorized Domain manager.
21. A system according to any of claims 16 - 20, characterized in that the means for binding at least one user (PI, P2, ..., PNi) to the domain identifier (DomainJD) is adapted to: obtain or generate a Domain Users List (DUC) comprising the domain identifier (DomainJD) and a unique identifier (PersJDl, PersJD2, ..., PersJDNi) for a user (PI, P2, ..., PNi) thereby defining that the user is bound to the Authorized Domain (100).
22. A system according to any of claims 16 - 21, characterized in that the means for binding at least one device (Dl, D2, ..., DM) to at least one user (PI, P2, ..., PNi) is adapted to obtain or generate a Device Owner List (DOC) comprising a unique identifier (PersJDl, PersJD2, ..., PersJDNi) for a user (PI, P2, ..., PNi) and a unique identifier (DevJDl, DevJD2, ..., DevJDM) for each device (Dl, D2, ..., DM) belonging to the user thereby defining that the at least one device is/are bound to the user (PI, P2, ..., PNi), or in that the means for binding at least one device (Dl, D2, ..., DM) to at least one user (PI, P2, ..., PNi) is adapted to obtain or generate a Device Owner List (DOC) for each device (Dl, D2, ..., DM) to be bound, the Device Owner List (DOC) comprising a unique identifier (PersJDl, PersJD2, ..., PersJDNi) for a user (PI, P2, ..., PNi) and a unique identifier (DevJDl, DevJD2, ..., DevJDM) for a device (Dl, D2, ..., DM) belonging to the user thereby defining that the device is bound to the user (PI, P2, ..., PNi).
23. A system according to any of claims 16 - 22, characterized in that the means for binding at least one content item (Cl, C2, ..., CN2) to the Authorized Domain (AD) is adapted to: bind a content item (Cl, C2, ..., CN2) to a User Right (URCl, URC2, ... URCN2), where said User Right (URCl, URC2, ... URCN2) is bound to a user (PI, P2, ..., PNi) bound to the Authorized Domain (100).
24. A system according to claim 23, characterized in that the User Right (URCl, URC2, ... URCN2) comprises rights data (Rghts Dat) representing which rights exists in relation to the at least one content item (C 1, C2, ..., CN2) bound to the User Right (URCl, URC2, ... URCN2).
25. A system according to any of claims 16 - 24, characterized in that the system further comprises the means for controlling access, by a given device being operated by a given user, to a given content item (Cl, C2, ..., CN2), where the means is adapted to: check whether a user, the given content item (Cl, C2, ..., CN2) is linked to, and a user, the given device is linked to, belongs to the same Authorized Domain (AD), and allowing access for the given user and/or other users via the given device to the content item if so, and/or check if the given content item (Cl, C2, ..., CN ) is linked to a user belonging to the same Authorized Domain (AD) as the given user, and allowing access for the given user via the given device and/or other devices to the content item if so.
26. A system according to any one of claims 21 - 25, characterized in that the system further comprises means for controlling access, by a given device being operated by a given user, to a given content item (Cl , C2, ..., CN2) being bound to the Authorized Domain (100) and having a unique content identifier (ContJD), where the means is adapted to: check if the Domain User List (DUC) of the Authorized Domain (100) comprises both a first user identifier (PersJD), comprised in a Device Owner List (DOC) comprising an identifier (Devi JD, Dev2JD) of the given device, and a second user identifier (PersJD), linked to the given content item (Cl, C2, ..., CN2), thereby checking if the user bound to the given device is bound to the same Authorized Domain (100) as the user bound to the content item, and allow access to the given content item (Cl, C2, ..., CN2) by the given device (Dl, D2, ..., DM) operated by any user and/or check if the Domain User List (DUC) of the Authorized Domain (100), that the content item is bound to, comprises a user identifier (PersJD) of the given user (PI, P2, ..., PNi) thereby checking if the given user is bound to the same Authorized Domain (100) as the content item, and allow access to the given content item (Cl, C2, ..., CN2) by any device including the given device operated by the given user.
27. A system according to any of claims 25 - 26, characterized in that the means for controlling access of a given content item is further adapted to: check that the User Right (URCl, URC2, ... URCN2) for the given content item specifies that the given user (PI, P2, ..., PNi) has the right to access the given content item (Cl, C2, ..., CN2) and only allow access to the given content item (Cl, C2, ..., CN2) in the affirmative.
28. A system according to any of claims 16 - 27, characterized in that every content item is encrypted and that a content right (CR) is bound to each content item and to a User Right (URCl, URC2, ... URCN2), and that the content right (CR) of a given content item comprises a decryption key for decrypting the given content item.
29. A system according to any of claims 20 - 28, characterized in that the Domain Users List (DUC) is implemented as or included in a Domain Users Certificate, and/or the Device Owner List (DOC) is implemented as or included in a Device Owner Certificate, and/or the User Right (URCl, URC2, ..., URCN2) is implemented as or included in a User Right Certificate.
30. A computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to any one of claims 1 - 15.
31. An Authorized Domain (AD) characterized in that the Authorized Domain (AD) has been generated by the method according to any one of claims 1 - 15 or by the system according to any one of claims 16 — 29.
32. An Authorized Domain (AD) structure comprising a domain identifier (DomainJD) uniquely identifying the Authorized Domain (100), a representation of at least one user (PI, P2, ..., PNi) bound to the domain identifier (DomainJD), and a representation of at least one device (Dl, D2, ..., DM) bound to at least one user (PI, P2,
..., PNι), thereby defining a number of devices (Dl , D2, ..., DM) and a number of users (PI, P2, ...,
PNi) that is authorized to access a content item (Cl, C2, ..., CN2) of said Authorized Domain (100).
PCT/IB2005/050910 2004-03-26 2005-03-15 Method of and system for generating an authorized domain WO2005093544A1 (en)

Priority Applications (11)

Application Number Priority Date Filing Date Title
EP05709017A EP1733292A1 (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain
NZ550080A NZ550080A (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain
AU2005225847A AU2005225847B2 (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain
BRPI0509181-0A BRPI0509181A (en) 2004-03-26 2005-03-15 method and system for generating an authorized domain, computer readable medium, authorized domain, and, authorized domain structure
MXPA06010888A MXPA06010888A (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain.
US10/599,272 US8863239B2 (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain
KR1020067019672A KR101242140B1 (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain
JP2007504536A JP4888910B2 (en) 2004-03-26 2005-03-15 Authorized domain generation method and system
CA002561229A CA2561229A1 (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain
IL178230A IL178230A0 (en) 2004-03-26 2006-09-21 Method of and system for generating an authorized domain
NO20064909A NO20064909L (en) 2004-03-26 2006-10-26 Method and system for producing an authorized domain

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP04101256.8 2004-03-26
EP04101256 2004-03-26

Publications (1)

Publication Number Publication Date
WO2005093544A1 true WO2005093544A1 (en) 2005-10-06

Family

ID=34961277

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/050910 WO2005093544A1 (en) 2004-03-26 2005-03-15 Method of and system for generating an authorized domain

Country Status (16)

Country Link
US (1) US8863239B2 (en)
EP (1) EP1733292A1 (en)
JP (1) JP4888910B2 (en)
KR (1) KR101242140B1 (en)
CN (1) CN100557547C (en)
AU (1) AU2005225847B2 (en)
BR (1) BRPI0509181A (en)
CA (1) CA2561229A1 (en)
IL (1) IL178230A0 (en)
MX (1) MXPA06010888A (en)
NO (1) NO20064909L (en)
NZ (1) NZ550080A (en)
RU (1) RU2006134030A (en)
UA (1) UA91975C2 (en)
WO (1) WO2005093544A1 (en)
ZA (1) ZA200607969B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1775670A1 (en) * 2005-10-13 2007-04-18 Samsung Electronics Co., Ltd. Method and system for providing DRM license
WO2007085989A2 (en) * 2006-01-26 2007-08-02 Koninklijke Philips Electronics N.V. Improved certificate chain validation
EP1860586A1 (en) * 2006-05-18 2007-11-28 Vodafone Holding GmbH Method and managing unit for managing the usage of digital content, rendering device
WO2008044210A2 (en) * 2006-10-12 2008-04-17 Koninklijke Philips Electronics N.V. License specific authorized domains
JP2008312190A (en) * 2007-06-13 2008-12-25 Samsung Electronics Co Ltd Method, device, and system which manage a/v profile
WO2010082123A1 (en) * 2009-01-16 2010-07-22 Nokia Corporation Method, apparatus and computer program product for a content protection system for protecting personal content
US8239962B2 (en) 2004-05-17 2012-08-07 Koninlijke Philips Electronics N.V. Processing rights in DRM systems
US8555361B2 (en) 2010-02-26 2013-10-08 Motorola Mobility Llc Dynamic cryptographic subscriber-device identity binding for subscriber mobility
US8561210B2 (en) 2004-11-01 2013-10-15 Koninklijke Philips N.V. Access to domain
KR101315082B1 (en) 2005-09-30 2013-11-21 코닌클리케 필립스 일렉트로닉스 엔.브이. Improved DRM System
US8752190B2 (en) 2005-05-19 2014-06-10 Adrea Llc Authorized domain policy method
US8761398B2 (en) 2006-05-02 2014-06-24 Koninkljijke Philips N.V. Access to authorized domains
US9009308B2 (en) 2003-07-24 2015-04-14 Koninklijke Philips N.V. Hybrid device and person based authorized domain architecture
US9356938B2 (en) 2005-02-04 2016-05-31 Koninklijke Philips N.V. Method, device, system, token creating authorized domains

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1866821A4 (en) * 2005-04-08 2011-03-09 Korea Electronics Telecomm Domain management method and domain context of users and devices based domain system
CA2612897C (en) * 2005-06-20 2020-10-06 Comcast Cable Holdings, Llc Method and system of managing and allocating communication related resources
FR2892222A1 (en) * 2005-10-17 2007-04-20 Thomson Licensing Sa METHOD FOR ETCHING, PROVIDING AND SECURE DISTRIBUTION OF DIGITAL DATA, ACCESS DEVICE AND RECORDER.
US8024794B1 (en) * 2005-11-30 2011-09-20 Amdocs Software Systems Limited Dynamic role based authorization system and method
US8443188B2 (en) * 2006-11-30 2013-05-14 Microsoft Corporation Using code access security for runtime accessibility checks
US8875259B2 (en) 2007-11-15 2014-10-28 Salesforce.Com, Inc. On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
US8584212B1 (en) * 2007-11-15 2013-11-12 Salesforce.Com, Inc. On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
KR20090067551A (en) * 2007-12-21 2009-06-25 삼성전자주식회사 Method and apparatus for using and limiting cluster-based contents, method and apparatus for authenticating access right of contents, and computer readable medium thereof
US20090254970A1 (en) * 2008-04-04 2009-10-08 Avaya Inc. Multi-tier security event correlation and mitigation
US9911457B2 (en) * 2008-09-24 2018-03-06 Disney Enterprises, Inc. System and method for providing a secure content with revocable access
US8407483B2 (en) * 2008-12-18 2013-03-26 Electronics And Telecommunications Research Institute Apparatus and method for authenticating personal use of contents by using portable storage
US20100162414A1 (en) * 2008-12-23 2010-06-24 General Instrument Corporation Digital Rights Management for Differing Domain-Size Restrictions
US8925096B2 (en) 2009-06-02 2014-12-30 Google Technology Holdings LLC System and method for securing the life-cycle of user domain rights objects
US8924715B2 (en) * 2010-10-28 2014-12-30 Stephan V. Schell Methods and apparatus for storage and execution of access control clients
US9166976B2 (en) * 2011-10-17 2015-10-20 Stephen Villoria Creation and management of digital content and workflow automation via a portable identification key
US9848236B2 (en) * 2011-10-17 2017-12-19 Mediapointe, Inc. System and method for digital media content creation and distribution
KR20160127167A (en) * 2012-03-08 2016-11-02 인텔 코포레이션 Multi-factor certificate authority
US9197700B2 (en) * 2013-01-18 2015-11-24 Apple Inc. Keychain syncing
US9077759B2 (en) 2013-01-18 2015-07-07 Apple Inc. Conflict resolution for keychain syncing
US10726102B2 (en) 2014-01-08 2020-07-28 Ipra Technologies Oy Ltd. Method of and system for providing access to access restricted content to a user
US10764357B1 (en) * 2014-12-19 2020-09-01 EMC IP Holding Company LLC Compliance-based application deployment system and method for a cloud computing environment
JP6663489B2 (en) * 2015-07-08 2020-03-11 アイピイアールエイ・テクノロジーズ・リミテッド・オーワイ Method and system for providing a user with access to restricted content
US10652023B2 (en) * 2015-12-30 2020-05-12 T-Mobile Usa, Inc. Persona and device based certificate management
US10972262B2 (en) 2015-12-30 2021-04-06 T-Mobile Usa, Inc. Persona and device based certificate management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020157002A1 (en) * 2001-04-18 2002-10-24 Messerges Thomas S. System and method for secure and convenient management of digital electronic content
US20030076955A1 (en) * 2001-10-18 2003-04-24 Jukka Alve System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
WO2003098931A1 (en) * 2002-05-22 2003-11-27 Koninklijke Philips Electronics N.V. Digital rights management method and system

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189146B1 (en) * 1998-03-18 2001-02-13 Microsoft Corporation System and method for software licensing
US6223291B1 (en) * 1999-03-26 2001-04-24 Motorola, Inc. Secure wireless electronic-commerce system with digital product certificates and digital license certificates
US7103574B1 (en) 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US7203966B2 (en) * 2001-06-27 2007-04-10 Microsoft Corporation Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
JP4177040B2 (en) * 2001-07-17 2008-11-05 松下電器産業株式会社 Content utilization apparatus, network system, and license information acquisition method
CN100419616C (en) * 2001-07-17 2008-09-17 松下电器产业株式会社 Content usage device and network system, and license information acquisition method
US7143443B2 (en) * 2001-10-01 2006-11-28 Ntt Docomo, Inc. Secure sharing of personal devices among different users
US20030093298A1 (en) * 2001-10-12 2003-05-15 Javier Hernandez System and method for providing secure remote access to patient files by authenticating personnel with biometric data
US6865555B2 (en) 2001-11-21 2005-03-08 Digeo, Inc. System and method for providing conditional access to digital content
JP2005527011A (en) 2001-11-27 2005-09-08 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Conditional access system
AU2003267764A1 (en) 2002-10-22 2004-05-13 Koninklijke Philips Electronics N.V. Method and device for authorizing content operations
JP4469631B2 (en) * 2003-02-28 2010-05-26 パナソニック株式会社 Terminal device, server device, license distribution system, license information handling method, and program
UA95220C2 (en) * 2003-07-24 2011-07-25 Конинлийке Филипс Электроникс Н.В. Hybrid architecture of the field of authorized content organized on the base on both devices and users
US8738537B2 (en) * 2003-11-21 2014-05-27 Intel Corporation System and method for relicensing content
US7676846B2 (en) * 2004-02-13 2010-03-09 Microsoft Corporation Binding content to an entity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020157002A1 (en) * 2001-04-18 2002-10-24 Messerges Thomas S. System and method for secure and convenient management of digital electronic content
US20030076955A1 (en) * 2001-10-18 2003-04-24 Jukka Alve System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
WO2003098931A1 (en) * 2002-05-22 2003-11-27 Koninklijke Philips Electronics N.V. Digital rights management method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HEUVEL VAN DEN S A F A ET AL: "Secure Content Management in Authorised Domains", INTERNATIONAL BROADCASTING CONVENTION, 15 September 2002 (2002-09-15), pages 467 - 474, XP002273504 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9009308B2 (en) 2003-07-24 2015-04-14 Koninklijke Philips N.V. Hybrid device and person based authorized domain architecture
US8239962B2 (en) 2004-05-17 2012-08-07 Koninlijke Philips Electronics N.V. Processing rights in DRM systems
US8561210B2 (en) 2004-11-01 2013-10-15 Koninklijke Philips N.V. Access to domain
US9356938B2 (en) 2005-02-04 2016-05-31 Koninklijke Philips N.V. Method, device, system, token creating authorized domains
US8752190B2 (en) 2005-05-19 2014-06-10 Adrea Llc Authorized domain policy method
US8776259B2 (en) 2005-09-30 2014-07-08 Koninklike Philips N.V. DRM system
US8595853B2 (en) 2005-09-30 2013-11-26 Koninklijke Philips N.V. DRM system
US9460271B2 (en) 2005-09-30 2016-10-04 Koninklijke Philips N.V. DRM system
KR101315082B1 (en) 2005-09-30 2013-11-21 코닌클리케 필립스 일렉트로닉스 엔.브이. Improved DRM System
EP2287771A3 (en) * 2005-10-13 2011-03-30 Samsung Electronics Co., Ltd. Method and system for providing DRM license
EP1775670A1 (en) * 2005-10-13 2007-04-18 Samsung Electronics Co., Ltd. Method and system for providing DRM license
EP2287770A3 (en) * 2005-10-13 2011-03-23 Samsung Electronics Co., Ltd. Method and system for providing DRM license
US8805742B2 (en) 2005-10-13 2014-08-12 Samsung Electronics Co., Ltd. Method and system for providing DRM license
US8103593B2 (en) 2005-10-13 2012-01-24 Samsung Electronics Co., Ltd. Method and system for providing DRM license
EP1775672A1 (en) 2005-10-13 2007-04-18 Samsung Electronics Co., Ltd. Method and system for providing DRM license
EP1775671A1 (en) * 2005-10-13 2007-04-18 Samsung Electronics Co., Ltd. Method and system for providing DRM license
WO2007085989A3 (en) * 2006-01-26 2007-11-01 Koninkl Philips Electronics Nv Improved certificate chain validation
WO2007085989A2 (en) * 2006-01-26 2007-08-02 Koninklijke Philips Electronics N.V. Improved certificate chain validation
US8761398B2 (en) 2006-05-02 2014-06-24 Koninkljijke Philips N.V. Access to authorized domains
EP1860586A1 (en) * 2006-05-18 2007-11-28 Vodafone Holding GmbH Method and managing unit for managing the usage of digital content, rendering device
JP2010506325A (en) * 2006-10-12 2010-02-25 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Authorization area specific to the license
US8886568B2 (en) 2006-10-12 2014-11-11 Koninklijke Philips N.V. License specific authorized domains
WO2008044210A3 (en) * 2006-10-12 2008-10-30 Koninkl Philips Electronics Nv License specific authorized domains
WO2008044210A2 (en) * 2006-10-12 2008-04-17 Koninklijke Philips Electronics N.V. License specific authorized domains
JP2008312190A (en) * 2007-06-13 2008-12-25 Samsung Electronics Co Ltd Method, device, and system which manage a/v profile
US8495749B2 (en) 2009-01-16 2013-07-23 Nokia Corporation Method, apparatus and computer program product for a content protection system for protecting personal content
WO2010082123A1 (en) * 2009-01-16 2010-07-22 Nokia Corporation Method, apparatus and computer program product for a content protection system for protecting personal content
US8555361B2 (en) 2010-02-26 2013-10-08 Motorola Mobility Llc Dynamic cryptographic subscriber-device identity binding for subscriber mobility
WO2011106769A3 (en) * 2010-02-26 2014-09-04 General Instrument Corporation Dynamic cryptographic subscriber-device identity binding for subscriber mobility

Also Published As

Publication number Publication date
CA2561229A1 (en) 2005-10-06
ZA200607969B (en) 2008-05-28
US20080244706A1 (en) 2008-10-02
US8863239B2 (en) 2014-10-14
NO20064909L (en) 2006-10-26
AU2005225847A1 (en) 2005-10-06
CN100557547C (en) 2009-11-04
JP4888910B2 (en) 2012-02-29
RU2006134030A (en) 2008-03-27
MXPA06010888A (en) 2006-12-15
NZ550080A (en) 2008-06-30
UA91975C2 (en) 2010-09-27
KR101242140B1 (en) 2013-03-12
BRPI0509181A (en) 2007-09-18
IL178230A0 (en) 2006-12-31
KR20060135833A (en) 2006-12-29
JP2007531102A (en) 2007-11-01
EP1733292A1 (en) 2006-12-20
AU2005225847B2 (en) 2011-05-26
CN1934519A (en) 2007-03-21

Similar Documents

Publication Publication Date Title
US8863239B2 (en) Method of and system for generating an authorized domain
US10038686B2 (en) Hybrid device and person based authorization domain architecture
US9356938B2 (en) Method, device, system, token creating authorized domains
US8239962B2 (en) Processing rights in DRM systems
US8761398B2 (en) Access to authorized domains
US20150039516A1 (en) System and method for distributing digital rights management digital content in a controlled network ensuring digital rights
JP2007519090A (en) Connection linked rights protection
US20090077667A1 (en) Method and device for handling digital licenses
AU2004260247B2 (en) Hybrid device and person based authorized domain architecture

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005709017

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 178230

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 550080

Country of ref document: NZ

Ref document number: 1020067019672

Country of ref document: KR

Ref document number: PA/a/2006/010888

Country of ref document: MX

Ref document number: 2561229

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 10599272

Country of ref document: US

Ref document number: 200580009453.X

Country of ref document: CN

Ref document number: 2007504536

Country of ref document: JP

Ref document number: 2006134030

Country of ref document: RU

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006/07969

Country of ref document: ZA

Ref document number: 200607969

Country of ref document: ZA

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 3843/CHENP/2006

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2005225847

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1200601760

Country of ref document: VN

ENP Entry into the national phase

Ref document number: 2005225847

Country of ref document: AU

Date of ref document: 20050315

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2005225847

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 2005709017

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020067019672

Country of ref document: KR

ENP Entry into the national phase

Ref document number: PI0509181

Country of ref document: BR