WO2003085536A1 - Procede de protection d'un contenu de travail utilise pour la distribution de travail electronique - Google Patents

Procede de protection d'un contenu de travail utilise pour la distribution de travail electronique Download PDF

Info

Publication number
WO2003085536A1
WO2003085536A1 PCT/JP2003/004350 JP0304350W WO03085536A1 WO 2003085536 A1 WO2003085536 A1 WO 2003085536A1 JP 0304350 W JP0304350 W JP 0304350W WO 03085536 A1 WO03085536 A1 WO 03085536A1
Authority
WO
WIPO (PCT)
Prior art keywords
work
digital
distribution
file
works
Prior art date
Application number
PCT/JP2003/004350
Other languages
English (en)
Japanese (ja)
Inventor
Yasuo Miyazawa
Original Assignee
Scinet Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Scinet Corporation filed Critical Scinet Corporation
Publication of WO2003085536A1 publication Critical patent/WO2003085536A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Definitions

  • the present invention relates to a method for transferring an electronic work (for example, a bright image file, a music file, a video file, and a text format file) to a network such as an Internet or an electronic storage medium (currently, a CD-ROM and a DVD).
  • a network such as an Internet or an electronic storage medium (currently, a CD-ROM and a DVD).
  • an electronic work for example, a bright image file, a music file, a video file, and a text format file
  • a network such as an Internet or an electronic storage medium (currently, a CD-ROM and a DVD).
  • the present invention encrypts and writes digital work in a dummy digital file and distributes it.
  • the content can be distributed and played back with dedicated playback software that is suitable for each application. Therefore, there is no need to develop new protection methods for new digital works.
  • the digital work and various control information (for example, the number of times of use, the period of use, the time limit of use, and the billing system, etc.) are encrypted and set in the dummy digital file, and the contents of these works are reproduced in combination.
  • restrictions on users and enforce various regulations This allows the distributor to set various restrictions on the sale, price, and sales of various products, as well as various restrictions on use for users.
  • FIG. 1 is a block diagram when the present invention is applied to a music distribution system.
  • FIG. 2 is a flowchart showing how the playback software plays back a music file.
  • FIG. 1 is a block diagram when the present invention is applied to a music distribution system.
  • the distribution server uses the encryption software 13 to transfer the music file 10 and control information 12 (for example, the number of times of use, the time limit and time of use, the charging system, etc.) to the image file 1.
  • Encrypted and written in 1 (dummy digital file) to create image file 14.
  • the music file is reproduced by reproducing the image file 16 distributed to the user side by compounding it with the composite reproduction program 17 and reading it.
  • the composite reproduction program 17 can compose the control information 19 in the image file 16 and perform the number of uses, the expiration date, the use time limit, the billing, etc. when reproducing the read music file 18.
  • Figure 2 is a flow chart of the composite playback program 17 playing the music files 18 and actually protecting the copyrighted work and various usage restrictions (for example, restrictions on the number of uses, restrictions on the use period and time, billing system, etc.). The method of realizing is described.
  • the user executes the composite reproduction program 17 and uses the image file 16 distributed as an input file (step S1 in FIG. 2). After reading the image file, it decrypts the control information 19 which has been encrypted in advance and reads it (step S2 in Fig. 2), and by using it, various usage restrictions (for example, usage frequency limit, usage period and usage time limit, billing system) Etc.) can be implemented in the following format. Based on the composited and read control information 19 (Step S 2 in FIG. 2), various usage restrictions (restrictions on the number of times of use, restrictions on the use period, and restrictions on charging) can be determined. Perform a check (step S3 in Fig. 2).
  • various usage restrictions for example, usage frequency limit, usage period and usage time limit, billing system
  • step S4 a message indicating that the usage limit has been exceeded is displayed (step S4 in Fig. 2), and the process returns to the initial image file reading (step S1 in Fig. 2).
  • the music file 18 is expanded on the memory (step S5 in FIG. 2).
  • the music file 18 expanded on the memory is played by the composite playback program 17 (step S6 in FIG. 2).
  • step S8 the music playback is stopped (step S8 in FIG.
  • the data to be regulated is encoded as control information in a dummy digital file (image file) in advance, so that the reproduction program can take out the control information at the time of reproduction and restrict the number of times of use to the user.
  • ⁇ usage period Restrictions ⁇ Charging restrictions
  • Usage restrictions such as usage time restrictions can be applied.
  • Encrypted digital works are expanded only on the computer's memory during playback, making it impossible to copy and process them, thus protecting the work.
  • the data format of the copyrighted work to be protected is

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Reverberation, Karaoke And Other Acoustics (AREA)

Abstract

Actuellement, différents procédés de protection sont utilisés pour la distribution de travail électronique en fonction de leur logiciel de reproduction. Toutefois, ces procédés de protection utilisés pour la distribution sont insuffisants. On utilise une protection de programme pour un contenu de travail souhaité par un distributeur ainsi que des informations de réglage de l'utilisation destinées à un utilisateur, telles que la tarification, le temps, la période, le nombre de fois, etc. A cet effet, une pluralité de travaux électroniques est chiffrée et inscrite dans un faux fichier, de façon qu'ils soient tous protégés à la fois et qu'ils puissent être reproduits par un logiciel correspondant ou spécialisé. Le chiffrement et la détermination de diverses informations de contrôle (telles que la limitation du nombre de fois, la date limite d'utilisation, la limite de temps d'utilisation, etc.) conjointement avec les travaux contenus dans le faux fichier numérique permettent de déterminer diverses limites d'utilisation pour un utilisateur et d'empêcher la copie du travail et la modification des diverses déterminations d'informations sur les limites.
PCT/JP2003/004350 2002-04-04 2003-04-04 Procede de protection d'un contenu de travail utilise pour la distribution de travail electronique WO2003085536A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2002103010A JP2004005008A (ja) 2002-04-04 2002-04-04 電子著作物配布時における著作内容の保護方法
JP2002-103010 2002-04-04

Publications (1)

Publication Number Publication Date
WO2003085536A1 true WO2003085536A1 (fr) 2003-10-16

Family

ID=28786283

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2003/004350 WO2003085536A1 (fr) 2002-04-04 2003-04-04 Procede de protection d'un contenu de travail utilise pour la distribution de travail electronique

Country Status (2)

Country Link
JP (1) JP2004005008A (fr)
WO (1) WO2003085536A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4689644B2 (ja) * 2007-08-06 2011-05-25 Sbシステム株式会社 電子情報分割保存処理方法及び装置、電子情報分割復元処理方法及び装置並びにそれらのプログラム
CN103150518B (zh) * 2013-03-22 2016-02-17 腾讯科技(深圳)有限公司 一种文件实时防护的方法和装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11145840A (ja) * 1997-09-02 1999-05-28 Sony Corp 送信及び/又は記録装置、受信及び/又は再生装置、送受信/記録再生装置、送受信システム、送信及び/又は記録方法、受信及び/又は再生方法、伝送方法、並びに、記録媒体
JP2002084539A (ja) * 2000-09-07 2002-03-22 Asa Systems:Kk 逐次近似圧縮データへのビットプレーン分解ステガノグラフィの適用技術

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11145840A (ja) * 1997-09-02 1999-05-28 Sony Corp 送信及び/又は記録装置、受信及び/又は再生装置、送受信/記録再生装置、送受信システム、送信及び/又は記録方法、受信及び/又は再生方法、伝送方法、並びに、記録媒体
JP2002084539A (ja) * 2000-09-07 2002-03-22 Asa Systems:Kk 逐次近似圧縮データへのビットプレーン分解ステガノグラフィの適用技術

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Digital picture envelope for windows (digital efuto program no setsumei)", KIT DIGITAL PICTURE ENVELOPING RESEARCH GROUP, 20 March 2001 (2001-03-20), XP002970246, Retrieved from the Internet <URL:http://www.know.comp.kyutech.ac.jp/BPCS/DPENV/DPENV-program.html> [retrieved on 20030627] *
EIJI KAWAGUCHI, EASON RICHARD O.: "Denshi aburi dashi gijutsu no kaihatsu (first part)", BIT, KYORITSU SHUPPAN CO., LTD., vol. 32, no. 10, 1 October 2000 (2000-10-01), pages 35 - 41, XP002970244 *
EIJI KAWAGUCHI, EASON RICHARD O.: "Denshi aburi dashi gijutsu no kaihatsu (second part)", BIT, KYORITSU SHUPPAN CO., LTD., vol. 32, no. 11, 1 November 2000 (2000-11-01), pages 37 - 48, XP002970245 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system

Also Published As

Publication number Publication date
JP2004005008A (ja) 2004-01-08

Similar Documents

Publication Publication Date Title
JP3722584B2 (ja) 再生許可方法及び記録媒体
JP3073590B2 (ja) 電子化データ保護システム、使用許諾者側装置および使用者側装置
CN1331125C (zh) 用于控制在可移动媒体上分发的数字内容的使用和复制的方法
JP2013093096A (ja) デジタル創作物の流通と使用を制御する方法および装置
JP2002537724A (ja) 暗号化されたペイロードデータストリームを作成する方法及び装置、及び暗号化されたペイロードデータストリームを解読する方法及び装置
CN101030427B (zh) 用于记录内容的设备和方法
KR20000064791A (ko) 콘텐트 정보 및 그것과 관련된 추가정보를전송하는 방법 및 시스템
JP4561146B2 (ja) コンテンツ流通システム、暗号化装置、暗号化方法、情報処理プログラム、及び記憶媒体
CN103178957A (zh) 信息处理装置、信息处理***、信息处理方法和程序
JPH09138827A (ja) ディジタル著作物流通システム
WO2006077871A1 (fr) Dispositif de copie de contenu et méthode de copie de contenu
JP2002189481A (ja) 音楽配信方法
CN1306663A (zh) 借助于存储设备的密钥分配
JP5644467B2 (ja) 情報処理装置、および情報処理方法、並びにプログラム
WO2003085536A1 (fr) Procede de protection d&#39;un contenu de travail utilise pour la distribution de travail electronique
JPH09251714A (ja) ソフトウエア利用制御方式
JP2001118329A (ja) 情報処理装置および情報処理方法、プログラム記録媒体、並びにデータ記録媒体
CN1738236B (zh) 信息处理***和方法、信息传送及接收处理装置
US8180050B2 (en) System and method for self-decaying digital media files and for validated playback of same
JP7466086B2 (ja) Nft情報管理システムおよびnft情報管理プログラム
KR20060013099A (ko) 디지털 콘텐츠의 배포 시스템 및 그 방법
JP2001109761A (ja) コンテンツのn次利用流通システム
AU2006343229B2 (en) A method for protecting digital content by encrypting and decrypting a memory card
JP3184191B2 (ja) 電子化データ保護システム、使用許諾者側装置、使用者側装置、使用許諾情報生成処理方法および電子化データ復号処理方法
JP4684123B2 (ja) ライセンス生成装置、ライセンス記録装置、及びコンテンツ利用装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase