WO2006006783A1 - Apparatus and method for processing digital rights object - Google Patents
Apparatus and method for processing digital rights object Download PDFInfo
- Publication number
- WO2006006783A1 WO2006006783A1 PCT/KR2005/002154 KR2005002154W WO2006006783A1 WO 2006006783 A1 WO2006006783 A1 WO 2006006783A1 KR 2005002154 W KR2005002154 W KR 2005002154W WO 2006006783 A1 WO2006006783 A1 WO 2006006783A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rights object
- storage device
- portable storage
- rights
- frame
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000003860 storage Methods 0.000 claims abstract description 61
- 230000015572 biosynthetic process Effects 0.000 claims description 10
- 238000006243 chemical reaction Methods 0.000 description 44
- 230000006870 function Effects 0.000 description 17
- 230000006854 communication Effects 0.000 description 5
- 238000013478 data encryption standard Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1073—Conversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4184—External card to be used in combination with the client device, e.g. for conditional access providing storage capabilities, e.g. memory stick
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
- H04N21/83555—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed using a structured language for describing usage rules of the content, e.g. REL
Definitions
- Apparatuses and methods consistent with the present invention relate to processing a digital rights object, and more particularly, to converting the digital rights object received from a rights issuer into a format for communicating with a portable storage device and transmitting and receiving the converted format of the digital rights object so that the load of the portable storage device can be reduced and data transmission efficiency can be increased.
- DRM digital rights management
- DRM was introduced to solve this problem. DRM unlimitedly permits access to encrypted digital content, but it requires a license called a rights object in order to decrypt and play the encrypted digital content. Accordingly, DRM can efficiently protect digital content, unlike the existing method.
- FIG. 1 is an exemplary view schematically showing the concept of digital rights management.
- DRM relates to how content protected by a method such as cryptography
- 'encrypted content' (hereinafter, referred to as 'encrypted content') and the rights object for allowing access to the protected content are processed.
- users 110, 150 that want to access the content protected by DRM, a content issuer 120 for issuing the content, a rights issuer 130 for issuing the rights object including the right for accessing to the content, and a certification authority 140 for issuing a certificate are shown.
- the user A I lO can obtain desired content from the content issuer 120. At this time, the encrypted content protected by the DRM is obtained.
- the user A I lO can obtain the license for playing the encrypted content from the rights object received from the rights issuer 130.
- the user A I lO having the rights object can play the encrypted content. Since the encrypted content can be freely distributed, user A I lO can freely deliver the encrypted content to another user B 150.
- the user B 150 must have the rights object in order to play the encrypted content, and the rights object can be obtained from the rights issuer 130.
- the certification authority 140 issues the certificate representing that the user A I lO and the user B 150 are valid users. When manufacturing devices of the users 110, 150, the certificate may be input in the devices. However, if the certificate expires, the certificate can be reissued from the cer ⁇ tification authority 140.
- DRM can aid the digital content industry by protecting the manufacturers and suppliers of the digital content.
- FIG. 2 is an exemplary view schematically showing the concept of the digital right management using a security multimedia card.
- the user A 210 can obtain the encrypted content from a content issuer 220.
- the rights object includes information about the encryption of the content, the definition of the right for the content, and usage restriction information of the content.
- the rights object includes the actual right.
- the right for the content may include a play right and the usage restriction information may include a play number, a play time, and a play period.
- the right may include a move right or a copy right. That is, the rights object having the move right may be moved to another device or the security multimedia card, and the rights object having the copy right may be copied to another device or the security multimedia card.
- the original rights object is deactivated (this involves deleting the rights object or the right included in the rights object) by the movement of the rights object. But, in the case of the copy right, the original rights object can be used in the activated state.
- the user A 210 obtains the encrypted content and requests the rights object from the rights issuer 230 so as to obtain the play right thereof.
- the user A 210 can play the encrypted content using the received rights object.
- the user A 210 can deliver it using a portable storage device.
- the portable storage device may be the security multimedia card 260 having a DRM function, and in this case the user A 210 moves the rights object into the security multimedia card 260 after performing authentication with the security multimedia card 260.
- the user A 210 requests the play right from the security multimedia card 260 and then receives the play right (for example, a content encryption key) from the security multimedia card 260 so that the encrypted content can be played.
- the security multimedia card 260 moves the rights object to the user B 250 or allows the user B 250 to play the encrypted content.
- the rights object used in DRM includes rights object in ⁇ formation, DRM content management information, and DRM content usage restriction information.
- the rights object information includes an identifier for identifying a rights object from the other rights objects.
- DRM content is digital content where the usage is managed and controlled by the rights object, and the plural pieces of the DRM content management information may exist in one rights object.
- One set of DRM content management information includes a DRM content identifier and an encryption/decryption key for the DRM content.
- the plural pieces of the DRM content usage restriction information may exist in one rights object and the DRM content usage restriction information refers at least one set of DRM content management information. Also, the DRM content usage restriction information includes information for controlling the usage of the DRM content, such as a usage number, a usage period and a usage date. Disclosure of Invention
- the rights object used in DRM can be expressed in XML format, and in this case, the portable storage device such as a MMC card, an SD card or a USB storage medium must have an XML parser function for interpreting the rights objects.
- the portable storage device which has limited resources, is loaded so as to provide these functions. Also, since the XML rights object is not restricted in size, it may be difficult for the portable storage device to store the rights object.
- the rights object must be converted to a new format so that the rights object can be efficiently managed.
- An aspect of the present invention is to provide an apparatus and a method which converts an XML format of a digital rights object which is received from a rights issuer into a format for communicating with the portable storage device and transmits and receives the converted format of the rights object to/from the portable storage device so that the load of the portable storage device can be reduced and the data transmission efficiency can be increased.
- An apparatus for processing digital rights object comprises a transmitting/receiving module for receiving the rights object expressed in a Markup language from a rights issuer, a rights object converting module for converting the rights object received from the transmitting/receiving module into a frame having a format for communicating with a portable storage device, an interface for performing the connection with the portable storage device, and a control module for providing the frame to the portable storage device through the interface and receiving the converted format of the rights object from the portable storage device through the interface.
- a portable storage device comprises an interface for connecting with a device, a control module for receiving and interpreting a converted format of a rights object from the device through the interface and providing the converted format of the rights object to the device, and a storage module for storing the converted format of the rights object provided by the control module in a format supported by the portable storage device.
- a method for processing digital rights object comprises receiving the rights object expressed in a Markup language from a rights issuer, converting the received rights object into a frame having a format for communicating with a portable storage device, providing the frame to the portable storage device or receiving the frame from the portable storage device.
- a method for processing digital rights object comprises receiving a converted format of a rights object from a device, interpreting the converted format of the rights object, and storing the interpreted rights object in the format supported by a portable storage device.
- FIG. 1 is an exemplary view schematically showing the concept of digital rights management
- FIG. 2 is an exemplary view schematically showing the concept of the digital rights management using a security multimedia card
- FIG. 3 is an exemplary view showing the structure of a rights object
- FIG. 4 is a block diagram showing the structure of a device according to an embodiment of the present invention.
- FIG. 5 is an exemplary view showing the structure of a conversion frame according to an embodiment of the present invention.
- FIG. 6 is a flowchart showing a method for converting the rights object expressed by an XML format into the conversion frame according the embodiment of the present invention.
- FIG. 7 is a block diagram showing the structure of a security multimedia card according to an exemplary embodiment of the present invention.
- Public-key Cryptography or asymmetric cryptography refers to cryptography where the key used in decrypting the data is different from the key used in encrypting the data. Since the encryption key or the public key need not be secret, the encryption key can be exchanged in a general channel. This public-key cryptography algorithm is well known and it has the property that it is hard for a third party to discover the original text using the algorithm, the encryption key and the encrypted sentence. Examples of public-key cryptography include Diffie-Hellman, RSA, ElGamal, and Elliptic Curve. Since the public -key cryptography is slower than the symmetric -key cryptography by a factor of 100-1000, it is used in the key exchange or the digital signature, rather than for content encryption.
- Symmetric-key Cryptography or private-key cryptography refers to cryptography where the key used in decrypting the data is equal to the key used in encrypting the data.
- DES Data Encryption Standard
- AES Advanced Encryption Standard
- the certification authority produces certificates, which are messages which sign the identity and the public key of a specific subscriber with a private key of the certification authority. Accordingly, if the public key of the cer ⁇ tification authority is applied to the certificate, the integrity of the certificate can be easily checked, and thus, a third party can be prevented from freely altering the public key of a user.
- a Digital Signature is a document that is prepared by a signer.
- digital signatures include RSA digital signatures, ELGamal digital signatures, DSA digital signatures, and Schnorr digital signatures.
- RSA digital signature a transmitter of the encrypted message encrypts the message with his/her own private key and transmits it, and the receiver decrypts the encrypted message with the public key of the transmitter. In this case, it is proven that the encryption of the message was performed by the transmitter.
- Random numbers or strings are numbers or strings having randomness. Since the generation of a genuine random number is computationally expensive, a pseudo ⁇ random number may be used.
- the portable storage device used in the present invention includes a non- volatile readable and erasable property memory, such as a flash memory, and it can be connected to the device.
- a non- volatile readable and erasable property memory such as a flash memory
- Examples of the storage device include smart media, memory sticks, CF cards, SD cards and security multimedia cards. In the description below, the security multimedia card will be described.
- the device must perform the authentication to use the security multimedia card, and the authentication process will be described with reference to FIG. 4.
- FIG. 4 is a block diagram showing the structure of a device according to an embodiment of the present invention.
- the term 'module' used in the present embodiment means a software or hardware component such as a field-programmable gate array (FPGA) or an application specific integrated circuit (ASIC).
- the module performs certain functions and it may be constructed so that it exists in an addressable storage medium. Also, it may be constructed to perform the functions of or more processors. Accordingly, the module may include components such as software components, object oriented software components, class components and task component, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuits, data, databases, data structures, tables, arrays and variables.
- the components and modules can be coupled to form a smaller number of components and modules, or they can be separated into additional components and modules.
- the components and the modules can be embodied to perform the functions of one or more CPUs in the security multimedia card or the device.
- the device 400 In order to perform DRM processes, the device 400 must provide a security function, a function for storing the content and the rights object, a function for exchanging data, a data transmitting/receiving function for communicating with the content issuer or the rights issuer, and a DRM managing function. Accordingly, the device 400 includes an RSA module 440, a session key producing module 450 and an AES module 460 having the security function. Also, the device 400 includes a content/ rights storage module 430 for storing the content and rights, a MMC interface 410 for exchanging data with the security multimedia card and a control module 420 for controlling each module to perform the DRM process.
- the device 400 includes a transmitting/receiving module 470 for transmitting and receiving data, a rights object converting module 490 for converting the format of the rights object received from the rights issuer 230 and a display module 480 for displaying the content.
- the transmitting/receiving module 470 allows the device 400 to communicate with the content issuer or the rights issuer.
- the device 400 can receive the rights object or the encrypted content through the transmitting/receiving module 470.
- the rights object converting module 490 converts the rights object received from the rights issuer 230 through the transmitting/receiving module 470 into a suitable format for the security multimedia card, such as XML or WBXML (the rights expression language or REL). Accordingly, an XML or WBXML rights object is composed of an attribute and elements representing its role. For example, the play right expressed in XML is:
- the device 400 converts the XML format of the rights object into another format (hereinafter, referred to as 'conversion frame') by the rights object converting module 490.
- 'conversion frame' another format
- the conversion frame 500 includes a rights object information field 510, a DRM content management information field 520 and DRM content usage restriction in ⁇ formation fields 530.
- a conversion frame 500 has a fixed byte length and includes one set of DRM content management information, unlike the XML rights object expressed in FIG. 3. That is, the XML rights object includes a plurality of DRM content management information and a plurality of DRM content usage restriction information.
- the DRM content usage restriction information includes information which refers to DRM content management information. However, the conversion frame 500 includes one set of DRM content management information and it includes only the usage re ⁇ striction information for controlling the corresponding DRM content.
- the rights object information field 510 includes an identifier for identifying the rights object.
- the DRM content is digital content that is managed and controlled by the rights object.
- the DRM content management information field 520 includes a DRM content identifier for specific DRM content and an encryption/decryption key of the corresponding DRM content.
- the DRM content usage restriction information field 530 includes information for controlling the use of the DRM content. This information includes, for example, information regarding the play, display, execute, print, export, copy, and move licenses.
- the play license is the right for expressing the DRM content in audio/video form.
- control module 420 does not give the play right to the content that cannot be expressed by this method; for example, a Java game.
- the play license may have constraints. If the constraints are specified, the control module 420 grants the play right according to the constraint(s). If the constraint is not specified, the control module 420 grants an unlimited play right.
- the display license is the right for expressing the DRM content in a viewing device. Accordingly, the control module 420 does not give the display right to the content having a format that cannot be expressed in the viewing device, such as a gif or jpeg image.
- the execute license is the right for executing DRM content such as Java games or other application programs.
- the print license is the right for producing a hard copy of the DRM content (e.g., a jpeg image).
- the export license is the right for exporting the rights object to a DRM system or a content protecting structure, but not an OMA (Open Mobile Alliance) DRM system.
- the export license necessarily has constraints. The constraints specify which DRM system or content protecting structure the DRM content and the rights object can be exported to.
- In the export license there is a move mode and a copy mode. When exporting the rights object, the rights object in the current DRM system is deactivated in the move mode, but is not deactivated in the copy mode.
- the move license includes the move from the device to the security multimedia card and the move from the security multimedia card to the device.
- the move from the device to the security multimedia card transmits the rights object in the device to the security multimedia card and deactivates the original rights object in the device.
- the move from the security multimedia card to the device is similar to the move from the device to the security multimedia card.
- the copy license includes the copy from the device to the security multimedia card and the copy from the security multimedia card to the device.
- the copy from the device to the security multimedia card transmits the rights object in the device to the security multimedia card, but it does not deactivate the original rights object in the device.
- the copy from the security multimedia card to the device is similar to the copy from the device to the security multimedia card.
- the MMC interface 410 allows the device 400 to be connected with the security multimedia card.
- connecting the device 400 with the security multimedia card means that the interfaces of the security multimedia card and the device are electrically connected to each other.
- the term 'connection' should be interpreted as including communication through a wireless medium in the non-contact state.
- the RSA module 440 performs RSA public-key cryptography according to the request of the control module 420.
- RSA cryptography is used for the digital signature or the key exchange (a random number) in the authentication process.
- Other types of public-key cryptography may be used.
- the session key producing module 450 produces a random number to be delivered to the device, and it produces the session key using the random number received from the device and the random number it produced.
- the random number produced by the session key producing module 450 is encrypted through the RSA module and is delivered to the device through the MMC interface 410.
- Producing the random number by the session key producing module 450 is exemplary, and a random number may be selected from a plurality of random numbers already in existence.
- the AES module 460 is a symmetric-key cryptographic module and it performs the symmetric-key cryptography using the produced session key.
- the AES module is mainly used in receiving the encryption key of the content from the rights object and encrypting it with the session key.
- the AES module is used when important information is encrypted in the communication process with the device.
- the session key is used when the rights object is encrypted in the rights object moving process.
- the AES cryptography is also exemplary, and other symmetric -key cryptography methods such as DES may be used.
- the content/rights storage module 430 stores the encrypted content and the rights objects.
- the format of the rights object is converted by the rights object converting module 490.
- the rights objects are stored in an encrypted state.
- the device 400 encrypts the rights objects using the AES method and a unique key which cannot be read by the other devices or security multimedia cards, and it decrypts the encrypted rights objects using the unique key when the rights objects are moved or copied to other security multimedia cards or devices. Symmetric-key cryptography using the unique key is exemplary, and a method of encrypting the rights object with the private key of the device 400, and if necessary, decrypting it with the public key of the device 400 may be used.
- the display module 480 displays the content, which the rights object allows to be played, so that the user can view it.
- the display module 480 can be embodied by a liquid crystal display device such as TFT LCD or an organic EL device.
- FIG. 6 is a flowchart showing a method for converting the XML rights object into a conversion frame according to an embodiment of the present invention.
- the rights object converting module 490 If the rights object converting module 490 receives the rights object, the rights object converting module 490 begins to convert the rights object into the conversion frame, as shown in FIG. 6 (S600).
- the rights object converting module 490 produces the data structure of the conversion frame 500 shown in FIG. 5 (S606).
- the data structure has a fixed size and a portable storage device such as the security multimedia card can read or write the data structure.
- the size of the data structure is T bytes.
- the rights object converting module 490 sets the rights object information included in the rights object in the rights object information field 510 of the produced conversion frame 500 (S615). Also, rights object converting module 490 sets the u-th DRM content management information included in the rights object in the DRM content management information field 520 of the produced conversion frame 500 (S620).
- the rights object converting module 490 performs the process of verifying Y sets of usage restriction information included in the rights object, in order to set the usage restriction information in the conversion frame 500.
- the value V is increased by 1 and the increased value V is compared with the value 'Y' (S640).
- V is larger than 'Y', 'u' is increased by 1 and V is set to 1 in order to set the other
- step 610 is performed to produce a new conversion fame for the 11- th DRM rights object management information (S655, S610).
- the rights object converting module 490 completes the operation for converting the XML rights object into the conversion frame (S660).
- the control module 420 stores the plural conversion frames in the content/right storage module 430 or it transmits them to a portable storage device such as the security multimedia card through the MMC interface 410.
- any field f (1 £ a £ p) has a the length of 1 bytes from the location which the field f begins.
- FIG. 7 is a block diagram showing the structure of a security multimedia card according to an embodiment of the present invention.
- the security multimedia card 700 In order to perform the DRM process, the security multimedia card 700 must have a security function, a function for storing the content or the rights object, a function for exchanging the data with the device and a DRM managing function. Accordingly, the security multimedia card 700 includes an RSA module 740, a session key producing module 750, and an AES module 760 having the security function, a content/rights storage module 730, and an interface 710 for exchanging the data with the device, and a control module 720 for controlling each module to perform the DRM process. [90] The interface 710 allows the security multimedia card 700 to connect with the device. Connecting the security multimedia card 700 with the device means that the interfaces of the security multimedia card 700 and the device are electrically connected to each other. The word 'connection' should be interpreted to include communication performed through a wireless medium in a non-contact state.
- the control module 720 controls each module to perform the DRM process and receives the conversion frame produced by the rights object converting module 490 of the device through the interface 710.
- the control module 720 interprets the received conversion frame and provides the resultant data to each module, and it provides the rights object corresponding to the conversion frame to the device.
- the RSA module 740 performs RSA public-key cryptography according to the request of the control module 720.
- RSA cryptography is used in the digital signature and/or the key exchange (a random number) of the authentication process.
- Other types of public-key cryptography may be used.
- the session key producing module 750 produces the random number to be delivered to the device, and it produces the session key using the random number received from the device and the random number it produced.
- the random number produced by the session key producing module 750 is encrypted through the RSA module, and it is delivered to the device through the interface 710.
- Producing the random number by the session key producing module 750 is exemplary, and the random number may be selected from a plurality of random numbers which exist already.
- the AES module 760 is a symmetric-key cryptographic module that performs symmetric-key cryptography using the session key.
- the AES module is mainly used in receiving the encryption key from the rights object and encrypting it to produce the session key.
- the AES module is used when important information is encrypted in the communication process with the device.
- the session key is used when the rights object is encrypted in the rights object moving process.
- AES cryptography is also exemplary, and other symmetric-key cryptography methods such as DES may be used.
- the control module 720 of the security multimedia card 700 reads 1 a bytes after moving S bytes from the starting address of the conversion frame, when a reading any field f of the conversion frame.
- the control module 720 of the security multimedia card 700 In the case of writing the digital rights information of the DRM content to the conversion frame, the control module 720 of the security multimedia card 700 writes 1 a bytes after moving S a bytes from the starting address of the conversion frame, when writing the digital rights information of the DRM content to any field f of the conversion frame. [99] In the case of updating the information regarding the rights object stored in the conversion frame, the control module 720 of the security multimedia card 700 reads 1 a bytes after moving S bytes from the starting address of the conversion frame, updates the information, and writes 1 a bytes of information, when updating any field f a of the conversion frame.
- the device converts the format of the rights object received from the rights issuer into a format which does increase the overhead of the portable storage device, and then transmits/receives the converted format of the rights object to/from the portable storage device, the load of the portable storage device can be reduced. Also, by using the converted format of the rights object when the device transmits/receives the rights object to/from the portable storage device, the transmitting time can be shortened.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007517973A JP4584995B2 (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights objects |
CA2573852A CA2573852C (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights object |
EP05765956.7A EP1779258A4 (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights object |
NZ552357A NZ552357A (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights object |
AU2005263103A AU2005263103B2 (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights object |
MX2007000467A MX2007000467A (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights object. |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US58672404P | 2004-07-12 | 2004-07-12 | |
US60/586,724 | 2004-07-12 | ||
KR1020040073819A KR100597412B1 (en) | 2004-07-12 | 2004-09-15 | Apparatus and method for processing digital right objects |
KR10-2004-0073819 | 2004-09-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006006783A1 true WO2006006783A1 (en) | 2006-01-19 |
Family
ID=35784102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2005/002154 WO2006006783A1 (en) | 2004-07-12 | 2005-07-06 | Apparatus and method for processing digital rights object |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1779258A4 (en) |
JP (1) | JP4584995B2 (en) |
AU (1) | AU2005263103B2 (en) |
CA (1) | CA2573852C (en) |
WO (1) | WO2006006783A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1982271A1 (en) * | 2006-02-06 | 2008-10-22 | Samsung Electronics Co., Ltd. | Method and apparatus for generating rights object by means of delegation of authority |
EP2021946A1 (en) * | 2006-05-12 | 2009-02-11 | Samsung Electronics Co., Ltd. | Method and apparatus for efficiently providing location of contents encryption key |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20220015533A (en) * | 2020-07-31 | 2022-02-08 | 네이버웹툰 유한회사 | Method and system for providing contents |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1309926A1 (en) * | 2001-06-07 | 2003-05-14 | ContentGuard Holdings, Inc. | Method and system for subscription digital rights management |
KR20030071395A (en) * | 2002-02-28 | 2003-09-03 | 주식회사 마크애니 | System for protecting and managing digital contents |
US20040001594A1 (en) * | 2002-06-28 | 2004-01-01 | Microsoft Corporation | Systems and methods for providing secure server key operations |
KR20040001364A (en) * | 2002-06-27 | 2004-01-07 | 주식회사 케이티 | Cording/Decording Method by using Symmetric Key in Digital Rights Management System |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100471257C (en) * | 2001-04-19 | 2009-03-18 | 松下电器产业株式会社 | License management system, license management device, relay device and terminal device |
US7500017B2 (en) * | 2001-04-19 | 2009-03-03 | Microsoft Corporation | Method and system for providing an XML binary format |
US20030078890A1 (en) * | 2001-07-06 | 2003-04-24 | Joachim Schmidt | Multimedia content download apparatus and method using same |
US20040015426A1 (en) * | 2002-03-14 | 2004-01-22 | Bijan Tadayon | System and method for expressing usage rights with sound signals |
JP2004038876A (en) * | 2002-07-08 | 2004-02-05 | Hitachi Ltd | Data format conversion method and device for program and the like, and controller management system using the data format conversion device |
WO2004055651A1 (en) * | 2002-12-17 | 2004-07-01 | Koninklijke Philips Electronics N.V. | A simple digital right management language |
-
2005
- 2005-07-06 CA CA2573852A patent/CA2573852C/en not_active Expired - Fee Related
- 2005-07-06 WO PCT/KR2005/002154 patent/WO2006006783A1/en active Application Filing
- 2005-07-06 AU AU2005263103A patent/AU2005263103B2/en not_active Ceased
- 2005-07-06 JP JP2007517973A patent/JP4584995B2/en not_active Expired - Fee Related
- 2005-07-06 EP EP05765956.7A patent/EP1779258A4/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1309926A1 (en) * | 2001-06-07 | 2003-05-14 | ContentGuard Holdings, Inc. | Method and system for subscription digital rights management |
KR20030071395A (en) * | 2002-02-28 | 2003-09-03 | 주식회사 마크애니 | System for protecting and managing digital contents |
KR20040001364A (en) * | 2002-06-27 | 2004-01-07 | 주식회사 케이티 | Cording/Decording Method by using Symmetric Key in Digital Rights Management System |
US20040001594A1 (en) * | 2002-06-28 | 2004-01-01 | Microsoft Corporation | Systems and methods for providing secure server key operations |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1982271A1 (en) * | 2006-02-06 | 2008-10-22 | Samsung Electronics Co., Ltd. | Method and apparatus for generating rights object by means of delegation of authority |
EP1982271A4 (en) * | 2006-02-06 | 2014-04-02 | Samsung Electronics Co Ltd | Method and apparatus for generating rights object by means of delegation of authority |
EP2021946A1 (en) * | 2006-05-12 | 2009-02-11 | Samsung Electronics Co., Ltd. | Method and apparatus for efficiently providing location of contents encryption key |
JP2009537029A (en) * | 2006-05-12 | 2009-10-22 | サムスン エレクトロニクス カンパニー リミテッド | Method and apparatus for efficiently providing location of content encryption key |
US8340297B2 (en) | 2006-05-12 | 2012-12-25 | Samsung Electronics Co., Ltd. | Method and apparatus for efficiently providing location of contents encryption key |
EP2021946A4 (en) * | 2006-05-12 | 2015-01-07 | Samsung Electronics Co Ltd | Method and apparatus for efficiently providing location of contents encryption key |
Also Published As
Publication number | Publication date |
---|---|
EP1779258A4 (en) | 2016-03-02 |
EP1779258A1 (en) | 2007-05-02 |
CA2573852A1 (en) | 2006-01-19 |
JP4584995B2 (en) | 2010-11-24 |
JP2008503832A (en) | 2008-02-07 |
AU2005263103A1 (en) | 2006-01-19 |
CA2573852C (en) | 2013-01-22 |
AU2005263103B2 (en) | 2008-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8191129B2 (en) | Apparatus and method for processing digital rights object | |
CA2568088C (en) | Method and apparatus for transmitting rights object information between device and portable storage | |
CA2568155C (en) | Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same | |
AU2005225953B2 (en) | Method and apparatus for acquiring and removing information regarding digital rights objects | |
KR101100385B1 (en) | Method and apparatus for digital rights management by using certificate revocation list | |
US20050267845A1 (en) | Apparatus and method for sending and receiving digital rights objects in converted format between device and portable storage | |
CN101578608B (en) | Methods and apparatuses for accessing content based on a session ticket | |
CA2573852C (en) | Apparatus and method for processing digital rights object | |
CN101617318A (en) | Be used for method and apparatus that content and licence are linked |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005263103 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 552357 Country of ref document: NZ Ref document number: 2007517973 Country of ref document: JP |
|
REEP | Request for entry into the european phase |
Ref document number: 2005765956 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005765956 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580023400.3 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Country of ref document: MX Ref document number: MX/a/2007/000467 Ref document number: 2573852 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 72/MUMNP/2007 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2005263103 Country of ref document: AU Date of ref document: 20050706 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005263103 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2005765956 Country of ref document: EP |