WO2006065633A2 - Method and device for digital rights management - Google Patents

Method and device for digital rights management Download PDF

Info

Publication number
WO2006065633A2
WO2006065633A2 PCT/US2005/044532 US2005044532W WO2006065633A2 WO 2006065633 A2 WO2006065633 A2 WO 2006065633A2 US 2005044532 W US2005044532 W US 2005044532W WO 2006065633 A2 WO2006065633 A2 WO 2006065633A2
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
digital content
protected digital
bits
partial match
Prior art date
Application number
PCT/US2005/044532
Other languages
English (en)
French (fr)
Other versions
WO2006065633A3 (en
Inventor
Yan Gao
Yu Zhu
Original Assignee
Motorola Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc. filed Critical Motorola Inc.
Publication of WO2006065633A2 publication Critical patent/WO2006065633A2/en
Publication of WO2006065633A3 publication Critical patent/WO2006065633A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Definitions

  • the present invention relates generally to Digital Rights Management (DRM) and in particular, but not necessarily limited to, a method and a device associated with DRM that allows for group access of protected digital content.
  • DRM Digital Rights Management
  • Communicating electronic devices are becoming more widespread and many new applications are being developed for these devices. Communicating electronic devices are being used to handle digital content such as music, games, video clips, pictures, books; sensitive private data, such as medical records, financial data, credit card numbers; and security and safety situations, such as industrial controls, building automation, security alarms plus other content.
  • DRM includes permissions and constraints used to protect rights related to accessing and processing digital content. Content owners hope to protect their valuable digital content using DRM that is implemented by secure, tamper-resistant electronic devices, such as cellular phones.
  • the transfer of protected digital content can be via a peer-to-peer network or by a broadcast of a service provider to a group of devices or by a content provider allowing content access to one or more devices or by any other method or combination of devices.
  • current DRM schemas and methods and devices do not allow use of protected digital content by a group unless each member the group obtains permission to use the content by listing each unique identifier in a rights object provided by a licensed provider or copyright owner of the content.
  • the terms 'comprises', 'comprising', 'including' or similar terms are intended to mean a non-exclusive inclusion, such that a method or apparatus that comprises a list of elements does not include those elements solely, but may well include other elements not listed.
  • FIG. 1 is a block diagram illustrating circuitry of a mobile telephone in accordance with the present invention
  • FIG. 2 is a detailed block diagram of a communication system that typically includes a plurality of mobile telephones as illustrated FIG. 1;
  • FIG. 3 is a conceptual block diagram of what is stored in a static memory of the mobile telephones as illustrated FIG. 1; and FIG. 4 is a flow chart showing a method of operation of providing and using protected digital content according to an exemplary embodiment of the present invention.
  • a method for DRM of protected digital content including: Requesting usage of protected digital content to be used by an application supported by an electronics device having a device identity associated therewith; reading a rights object associated with and governing allowed use of the protected digital content; Determining from the rights object an identifier and at least one partial match identifier constraint; and
  • the identifier may be a user identifier identifying a user of the device.
  • One suitable identifier is an identifier of an RUIM or SIM or USIM.
  • the identifier may be an International Mobile Subscriber Identity or an International Mobile Equipment Identity number.
  • the identifier may be a telephone number corresponding to an International Mobile Subscriber Identity.
  • the least one partial match identifier constraint may be adjacent bits in the International Mobile Subscriber Identity.
  • the adjacent bits may be adjacent least significant bits or an adjacent most significant bits.
  • the adjacent bits may identify a networks provider, or may identify a country, region, state or city.
  • the least one partial match identifier constraint may suitably include matching from one or more of the following: a 10 most significant bits of the identifier; 10 least significant bits of the identifier; n adjacent bits of the identifier; n adjacent bits i bits from the least significant bit of the identifier; n adjacent bits i bits from the most significant bit of the identifier 11 th and 12* least significant bits of the identifier; or 11 th to 15 h least significant bits of the identifier, wherein n and i are integers.
  • Each partial match identifier constraint is allowed to be a combined with one or more other partial match identifier constraints by Boolean operators.
  • a device comprising: a memory storing both a protected digital content file and associated object rights, the object rights having an identifier and at least one partial match identifier constraint; a processor operatively coupled to the memory, at least one user interface and a keypad operatively coupled to the processor, wherein in response to a user command provided at the keypad the device determines from the rights object an identifier and at least one partial match identifier constraint, and thereafter allows the use by the user interface, governed by the rights object, of the protected digital content by the device only when a device identity that identifies the device exactly matches the identifier or partially matches the identifier as stipulated by the at least one partial match identifier constraint.
  • the identifier may be a user identifier identifying a user of the device.
  • One suitable identifier is a user identifier of an RUIM or SIM or USIM.
  • the identifier may be an International Mobile Subscriber Identity or an International Mobile Equipment Identity number.
  • the identifier may be a telephone number corresponding to an International Mobile Subscriber Identity.
  • a method for providing protected digital content including:
  • the identifier may be a user identifier identifying a user of the device.
  • One suitable identifier is a user identifier of an RUIM or SIM or USIM.
  • the identifier may be an International Mobile Subscriber Identity or an International Mobile Equipment Identity number.
  • the identifier may be a telephone number corresponding to an International Mobile Subscriber Identity.
  • the least one partial match identifier constraint may be adjacent bits in the telephone number corresponding to an International Mobile Subscriber Identity,
  • the adjacent bits may be adjacent least significant bits or an adjacent most significant bits.
  • the adjacent bits may identify a networks provider, or may identify a country, region, state or city.
  • the least one partial match identifier constraint may suitably include matching from one or more of the following: a 10 most significant bits of the identifier; 10 least significant bits of the identifier; n adjacent bits of the identifier; n adjacent bits i bits from the least significant bit of the identifier; n adjacent bits i bits from the most significant bit of the identifier 11 th and 12 th least significant bits of the identifier; or 11 th to 15 h least significant bits of the identifier, wherein n and i are integers.
  • Each partial match identifier constraint is allowed to be a combined with one or more other partial match identifier constraints by Boolean operators.
  • device identity includes: an International Mobile Subscriber Identity (IMSI), an International Mobile Equipment Identity (IMEI), internet addresses or any other possible suitable identifier.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • FIG. 1 there is a schematic diagram illustrating an electronics device in the form of a mobile station or mobile telephone 100 comprising a radio frequency communications unit 102 coupled to be in communication with a processor 103.
  • the mobile telephone 100 also has a keypad 106 and a display screen
  • screen 105 coupled to be in communication with the processor 103.
  • screen 105 may be a touch screen thereby making the keypad
  • the processor 103 includes an encoder/decoder 111 with an associated code
  • the processor 103 also includes a micro-processor 1 13 coupled, by a common data and address bus 117, to the encoder/decoder 111, a character Read Only Memory (ROM) 114, a Random Access Memory (RAM) 104, programmable read and write static memory 116, a short range wireless transceiver 180, a plug in memory module and network connection interface 160 and a Removable User Identity Module (RUIM) interface 118.
  • ROM Read Only Memory
  • RAM Random Access Memory
  • RUIM Removable User Identity Module
  • the static programmable memory 116 and a RUIM card 1 19 operatively coupled to the RUIM interface 118 each can store, amongst other things, Preferred Roaming Lists (PRLs), subscriber authentication data, selected incoming text messages and a Telephone Number Database (TND phonebook) comprising a number field for telephone numbers and a name field for identifiers associated with one of the numbers in the name field.
  • PRLs Preferred Roaming Lists
  • TDD phonebook Telephone Number Database
  • the RUIM card 119 and static memory 1 16 may also store passwords for allowing accessibility to password protected functions on the mobile telephone 100.
  • the RUIM card 119 is sometimes referred to or is interchangeably referred to as a Subscriber Identity Module (SIM) or Universal Subscriber Identify Module (USIM) and has stored thereon a unique International Mobile Subscriber Identity (IMSI).
  • SIM Subscriber Identity Module
  • USIM Universal Subscriber Identify Module
  • IMSI International Mobile Subscriber Identity
  • the micro-processor 113 has ports for coupling to the keypad 106, screen 105 and an alert 115 that typically contains an alert speaker, vibrator motor and associated drivers. Also, micro-processor 113 has ports for coupling to a microphone 135, a polyphonic speaker 170 and communications speaker 140.
  • the character Read only memory 114 stores code for decoding or encoding text messages that may be received by the communications unit 102. In this embodiment the character Read Only Memory 114, RUIM card 119, and static memory 116 may also store Operating Code (OC) for the micro-processor 113 and code for performing functions associated with the mobile telephone 100. Furthermore, the static memory 116 also stores digital content with corresponding rights object files and a rights expression language described later herein.
  • the radio frequency communications unit 102 is a combined receiver and transmitter having a common antenna 107.
  • the communications unit 102 has a transceiver 108 coupled to the antenna 107 via a radio frequency amplifier 109.
  • the transceiver 108 is also coupled to a combined modulator/demodulator 110 that couples the communications unit 102 to the processor 103.
  • FIG. 2 is a block diagram of a system 200 in accordance with an embodiment of the present invention.
  • system 200 comprises a plurality of electronic devices 201,202,203 typically in form of the mobile station or mobile telephone 100.
  • the electronic devices 201,202,203 can be any suitable network connectable devices such as, but not limited to, personal digital assistants, audio players, video players, portable computers and the like.
  • one or more of the electronic devices 201,202,203 can be typically equipped to play an MPEG Video Layer 4 file with a standard MPEG video codec.
  • one or more of the devices 201,202,203 may be equipped with an application to "play" an MPEG Audio Layer 3 (MP3) file with an application such as a standard MP3 player.
  • MP3 MPEG Audio Layer 3
  • the system 200 also comprises a plurality of content providers 205, 207, 209 and a network 210 allowing communication between electronic devices 201,202,203 (peer- to-peer communications) or communication between any of the content providers 205, 207, 209 and any of the electronic devices 201,202,203.
  • the content providers 205, 207, 209 suitably have databases that provide usable protected digital content to the electronic devices 201,202,203 after executing appropriate DRM protocols governed by usage limitations.
  • content provider 205 may provide protected digital content MP3 files to the electronics device 201 utilizing a DRM protocol as is being developed in MPEG-21 (ISO/EEC TR 21000-l:2001(E) "Part 1: Vision, Technologies and Strategy", available from http://www.iso.ch/iso/en/ittf/) while content provider 207 may provide protected digital video content to the electronic device 202 utilizing a second DRM protocol as described in the Open Mobile Alliance standard as will be apparent to a person skilled in the art.
  • the digital content that may be provided by content providers 205, 207, 209 include, but are not limited to, music, games, video, pictures, books, maps, software, plus any other digital content.
  • the content providers 205, 207, 209 can be communications network providers that provide communications networks and the peer-to-peer communications connections between electronics devices 201,202,203.
  • the 205-205 takes place over network 202.
  • the network 202 may take various forms such as but not limited to a cellular network, a local-area network, a wide-area network, a hard- wired connection or any other communications network.
  • FIG. 3 is a conceptual block diagram of what is stored in the static memory
  • the static memory 116 stores programs, files or modules including protected digital content files 310, 314, 318 and respective associated rights files (rights objects) 312, 316, 320 and a DRM agent 330.
  • the static memory 116 also stores programs for system services 340 and programs for applications 305, 307,309.
  • this exemplary embodiment illustrates the static memory 116 stores, amongst others, applications 305, 307,309, protected digital content files 310, 314, 318 rights files (rights objects) 312, 316, 320 and the DRM agent 330, it should be noted that any number of storage means could be used for storing one or more of the above.
  • Such storage means can include, but are not limited to, a hard disk storage coupled to interface 160, the Random Access Memory (RAM) 104, and smart card storage device or the RUIM card 119 coupled to the RUIM interface 118, or a removable memory device such as a Multi-Media Card (MMC) or removable memory coupled to interface 160.
  • MMC Multi-Media Card
  • FIG. 3 the conceptual block diagram of FIG. 3 is for illustrative purposes only and the programs, files or modules stored in the static memory 116 may be stored by any memory mapping allocation and the mapping may be allocated contiguously or segmented.
  • the rights files 312, 316, 320 may be embedded in the protected digital content files 310, 314, 318.
  • DRM is enforced and protected, for instance, on the protected digital content file 310 by use of the associated rights file 312.
  • the rights file 312 contains usage permissions and a Content Encryption Key (CEK) for the protected digital content file 310, and the content therein can be rendered or used only by devices having a permitted identifier (ID) possessing rights defined by the corresponding rights file 312.
  • CEK Content Encryption Key
  • Such rights are given to the device via the identifier (ID) that identifies the device or a module operatively coupled to the device such as an identification code (or number) that on the mobile telephone 100 would typically be an International Mobile Subscriber Identity (IMSI) residing on the RUIM.
  • IMSI International Mobile Subscriber Identity
  • a device such as the mobile telephone 100 will use the DRM agent 330 to authenticate licenses, parse and enforce rules, and parse, decrypt and consequently access or use the protected digital content in a manner that is governed by access rights provided by the rights file 312.
  • DRM agent 330 will use the system services 340 to help perform common functions, such as file-system management or decryption of the content in the protected digital content file 310.
  • a model, schema or convention of formatted, compiled or encrypted DRM rights residing in the rights files 312, 316, 320 suitably comprises, amongst others, permission rights (PR), constraint rights (CR) and security rights (SR).
  • PR permission rights
  • CR constraint rights
  • SR security rights
  • models, schemas, or conventions for the DRM rights are generally defined in, for instance, in the Open Mobile Alliance standard DRM Rights Expression Language.
  • the present invention suitably provides for, amongst others, the following:- Constraints (CR): number_of_usages; ; expiry_date; identity; ; end.
  • the number_of_usages constraints rights specifies the number of times a permission to use an asset may be granted, wherein the permission is defined by the permission rights (PR).
  • the expiry_date constraints rights specifies a time range or time limit for the permission to use an asset may be granted.
  • the identity constraints rights specifies an identifier (ID) or identifiers that have the granted permission (PR), defined by the permission rights, to use an asset.
  • the present invention makes use of the identity constraints rights (CR), wherein the identity has the following objects:- Permitted_Identifier : ⁇ 32 bits>; Matchl : ⁇ 10 most significant bits>;
  • Match2 ⁇ 10 least significant bits>
  • Match3 ⁇ n adjacent bits>
  • n is an integer between 2 and 31
  • n and i are integers between 1 and 16
  • n and i are integers between 1 and 16 Match6 : ⁇ 11 th and 12 th least significant bits>;
  • Matcb.8 Boolean AND / OR / NOT operators for that can be used on any or all of partial Matches of Matchl to Match7.
  • FIG. 4 there is illustrated a flow chart showing a method 400 of operation of the communication system 200.
  • the method 400 is initiated at a start block 410, by a suitable connection of one of devices 201, 202, 203 to one of the content providers 205, 207, 209, by the network 210.
  • the method 400 at a block 420, performs providing protected digital content and an associated rights object at a block 420.
  • the providing is performed over the network and can be Multimedia Messaging or downloading from a website or any other form of providing.
  • the providing can be performed by the Content provider 205 (who is essentially a rights object issuer) sending the protected digital content and an associated rights object in one or more Multimedia Messages to the mobile telephone 100.
  • the Content provider 205 who is essentially a rights object issuer
  • a block 430 there is performed receiving and storing the protected digital content and an associated rights object in the static memory 116.
  • the receiving is via the radio frequency communications unit 102 and, for example, the protected digital content is stored in the protected digital content file 310 and the rights object is stored in the rights file 312.
  • the protected digital content file 310 and the rights object stored in the rights file 312 can be received separately in one transmission or they can be received in two separate transmissions. Also, the rights object may be embedded in the protected digital content file 310.
  • this identifier is the International Mobile Subscriber Identity (IMSI) stored in the RUIM 119 or SIM or USIM, however other forms of identifier (ID) can be used including an International Mobile Equipment Identity (IMEI), internet addresses or any other possible suitable identifier depending typically on the type of system 200 and requirements of the content provider 205.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • this identifier (ID) is a permitted identifier (PID) that is stored in the 32 bit Permitted_Identifier object/field in the identity constraints rights (CR) that is included in the provided rights object.
  • PID Permitted_Identifier object/field
  • permitted identifier (PID) stored in the Permitted_Identif ⁇ er object/field may be a telephone number corresponding to an International Mobile Subscriber Identity (IMSI) or any other identifier (ID) such as an IMEI, internet addresses or any other possible suitable identifier could be used.
  • IMSI International Mobile Subscriber Identity
  • ID identifier
  • Also provided in the rights object is at least one partial match identifier constraint (Match 1 to Match8) that is allowed by the identity constraints rights (CR).
  • the partial match identifier constraint may be adjacent digits (bits) in a telephone number corresponding to an International Mobile Subscriber Identity.
  • the adjacent bits may be adjacent least significant bits or an adjacent most significant bits.
  • the adjacent bits may identify a networks provider, or may identify a country, region, state or city.
  • the least one partial match identifier constraint may suitably include matching: a 10 most significant bits of the identifier; 10 least significant bits of the identifier; n adjacent bits of the identifier; n adjacent bits i bits from the least significant bit of the identifier; n adjacent bits i bits from the most significant bit of the identifier 11 th and 12 th least significant bits of the identifier; or 11 th to 15 h least significant bits of the identifier, wherein n and i are integers.
  • the method 400 may terminate or effect further providing and receiving of more protected digital content and an associated rights object may be performed.
  • the mobile telephone 100 may be sent a user command, input at the keypad 106, requesting usage of the protected digital content. As illustrated, the requesting usage is performed immediately after block 430 completes the receiving and storing.
  • the requesting usage of the protected digital content is performed at a block 440, typically in response to the user command input at the keypad 105 (or automatically upon the receiving and storing of block 430.
  • the requesting usage of the protected digital content is for the content to be used by an application supported by the mobile telephone 100 that has a device identity, for instance, the identifier (ID) obtained from the International Mobile Subscriber Identity (IMSI).
  • ID the identifier obtained from the International Mobile Subscriber Identity
  • IMSI International Mobile Subscriber Identity
  • the method 400 performs reading the rights object in rights file 312 associated with and governing allowed use of the protected digital content in file 310.
  • one of applications 305,307, 309 capable of running MPEG Video Layer 4 files is selected to be used by the mobile telephone 100.
  • the method 400 performs determining from the rights object in file 312 the DRM rights including: the permitted identifier (PID) or permitted identifiers from the Permitted_Identifier object/field; and, if included in the identity constraints rights (CR), at least one partial match identifier constraint of
  • a test is then conducted, at a match test block 470, to check if the permitted identifier (PID) in the rights object file 312 either: exactly matches the device identity obtained from the identifier (ID); or partially matches the device identity obtained from the identifier (ID) as stipulated by the at least one partial match identifier constraint defined by the allowed set/selected matches (Match 1 to Match.8).
  • PID permitted identifier
  • the method at block 480, provides for disallowing use of the protected digital content stored in file 310.
  • the method at block 490 provides for allowing the use, governed by the rights object in file 312, of the protected digital content in file 310 by the mobile telephone 100 only when the device identity obtained from the identifier (ID) exactly matches the permitted identifier (PID) or partially matches the permitted identifier (PID) as stipulated by the at least one partial match identifier constraint defined by the allowed matches (Matchl to Match8).
  • the DRM agent 330 assisted by the system services decrypts, using the Content Encryption Key (CEK) in the rights object and plays the protected digital content in file 310 (an encrypted MPEG Video Layer 4 file) using application 305 (an MPEG player) on the screen 105 complemented by the polyphonic speaker 17O.
  • CEK Content Encryption Key
  • the method 400 then terminates, after block 480 or 490, at an end block 495.
  • the content provider, or copyright owner or licensee wishes to provide or allow use of their protected digital content to specific groups or regions then a suitable one or more of the at least one partial match identifier constraints defined by the allowed matches (Matchl to Match ⁇ ) of the identity constraints rights (CR) can be set in the rights object.
  • the content provider, or copyright owner or licensee can selectively allow large groups, specific subscription tiers, and regions to use and distribute via their radio communications unit 102 over a network, by hard wired connections or plug in devices using the interface 160, or by the short range transceiver 180 or by any other means.
  • match3 is selected to be included in the rights object and n is set to 2 then any telephone number with 2 adjacent bits matching any of the two adjacent bits of 65 12345678 will be able to use the protected digital content.
  • match4 can be used such that n is set to 2 and i is set to 8, hence only telephone numbers with 65 with their 9 th and 10 th digits (bits) will be able to use the protected digital content.
  • the device identity and permitted_Identifier may be any other possible allowable identifier including, but not limited to, the identifiers specifically referred to in this specification.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
PCT/US2005/044532 2004-12-17 2005-12-08 Method and device for digital rights management WO2006065633A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2004100821620A CN100412743C (zh) 2004-12-17 2004-12-17 用于数字权限管理的方法和装置
CN200410082162.0 2004-12-17

Publications (2)

Publication Number Publication Date
WO2006065633A2 true WO2006065633A2 (en) 2006-06-22
WO2006065633A3 WO2006065633A3 (en) 2006-10-19

Family

ID=36588392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/044532 WO2006065633A2 (en) 2004-12-17 2005-12-08 Method and device for digital rights management

Country Status (2)

Country Link
CN (1) CN100412743C (zh)
WO (1) WO2006065633A2 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2465769A (en) * 2008-11-27 2010-06-02 Symbian Software Ltd Method and apparatus relating to licenses necessary for the operation of a software application on a mobile terminal
CN103476149A (zh) * 2013-09-27 2013-12-25 惠州Tcl移动通信有限公司 一种通过识别imsi自动切换用户模式的方法及***
US8869289B2 (en) 2009-01-28 2014-10-21 Microsoft Corporation Software application verification
EP2779009A3 (en) * 2013-03-13 2014-12-10 Rockwell Automation Technologies, Inc. Code-enabled remote activation of software for industrial automation systems
US9519799B2 (en) 2009-06-01 2016-12-13 Koninklijke Philips N.V. Dynamic determination of access rights

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9356935B2 (en) * 2006-09-12 2016-05-31 Adobe Systems Incorporated Selective access to portions of digital content
KR20090022997A (ko) * 2007-08-29 2009-03-04 삼성전자주식회사 Drm 권리객체를 관리하는 방법 및 장치
WO2009086661A1 (zh) * 2007-12-29 2009-07-16 Motorola, Inc. 一种视频数据的接收和播放方法
CN102236750B (zh) 2010-04-29 2016-03-30 国际商业机器公司 在云存储***中进行权限控制的方法和装置
JP5760279B2 (ja) * 2010-05-25 2015-08-05 ティーピー ビジョン ホールディング ビー ヴィ メディアコンテンツに対するユーザのアクセスを制御する方法
WO2011144106A2 (zh) * 2011-05-27 2011-11-24 华为技术有限公司 一种控制配置参数的方法和装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20050021539A1 (en) * 2003-03-07 2005-01-27 Chaticom, Inc. Methods and systems for digital rights management of protected content

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1192381C (zh) * 1999-04-14 2005-03-09 松下电器产业株式会社 数据管理装置以及数据管理方法
US7191153B1 (en) * 1999-09-10 2007-03-13 Dphi Acquisitions, Inc. Content distribution method and apparatus
EP1222819B1 (en) * 1999-10-19 2004-07-21 Thomson Licensing S.A. System and method of verifying authorization for communicating protected content
KR100408287B1 (ko) * 2001-06-15 2003-12-03 삼성전자주식회사 컨텐트 보호 시스템 및 방법
JP3763142B2 (ja) * 2002-01-30 2006-04-05 ソニー株式会社 特権命令実行制御装置、特権命令実行制御方法、および特権命令実行制御プログラム
US7577999B2 (en) * 2003-02-11 2009-08-18 Microsoft Corporation Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
DE102004004101A1 (de) * 2003-03-14 2004-09-30 Siemens Ag Verfahren und System zum Schutz elektronischer Datenobjekte vor unberechtigtem Zugriff

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20050021539A1 (en) * 2003-03-07 2005-01-27 Chaticom, Inc. Methods and systems for digital rights management of protected content

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2465769A (en) * 2008-11-27 2010-06-02 Symbian Software Ltd Method and apparatus relating to licenses necessary for the operation of a software application on a mobile terminal
US8229505B2 (en) 2008-11-27 2012-07-24 Nokia Corporation Method and apparatus for storing a software license
US8869289B2 (en) 2009-01-28 2014-10-21 Microsoft Corporation Software application verification
US9519799B2 (en) 2009-06-01 2016-12-13 Koninklijke Philips N.V. Dynamic determination of access rights
EP2779009A3 (en) * 2013-03-13 2014-12-10 Rockwell Automation Technologies, Inc. Code-enabled remote activation of software for industrial automation systems
CN103476149A (zh) * 2013-09-27 2013-12-25 惠州Tcl移动通信有限公司 一种通过识别imsi自动切换用户模式的方法及***
US9503883B2 (en) 2013-09-27 2016-11-22 Huizhou Tcl Mobile Communication Co., Ltd. Method and system for automatically switching subscriber mode through identifying IMSI

Also Published As

Publication number Publication date
WO2006065633A3 (en) 2006-10-19
CN1790218A (zh) 2006-06-21
CN100412743C (zh) 2008-08-20

Similar Documents

Publication Publication Date Title
WO2006065633A2 (en) Method and device for digital rights management
RU2260918C2 (ru) Система и способ безопасного и удобного управления цифровым электронным контентом
RU2395166C2 (ru) Способ предоставления доступа к зашифрованному контенту одной из множества абонентских систем, устройство для предоставления доступа к зашифрованному контенту и способ формирования пакетов защищенного контента
CN100459780C (zh) 涉及防篡改身份模块的稳健灵活的数字权限管理
KR101242140B1 (ko) 허가된 도메인을 생성하기 위한 방법 및 시스템
KR101238490B1 (ko) 컨텐츠 라이센스의 휴대용 저장 장치에의 바인딩
US8484720B2 (en) Service binding method and system
CN102934118B (zh) 用户设备及其控制方法
US20100250388A1 (en) Method and apparatus for protecting drm contents
US20080027867A1 (en) Methods, Systems and Computer Program Products for Determining Usage Rights for Digital Content Based on Characterizing Information Thereof and Related Devices
JP2010512606A (ja) 移動ディジタル著作権管理ネットワークにおけるライセンス作成のための方法および装置
JP5837219B2 (ja) デジタルコンテンツ貸出のための方法及びシステム
EP1542117A1 (en) Binding content to a user
KR20070120577A (ko) 멀티미디어 콘텐츠로의 접속을 관리하기 위한 보안 방법 및장치
US20030009667A1 (en) Data terminal device that can easily obtain content data again, a program executed in such terminal device, and recording medium recorded with such program
US20100199105A1 (en) Method for playing digital contents and managing license and apparatus therefor
US20050138400A1 (en) Digital content protection method
US20040133632A1 (en) Method and apparatus for supporting multiple digital-rights management systems
JP2010509696A (ja) コンテンツを別のメモリデバイスに結合する方法および装置
CN100476845C (zh) 一种数字版权管理方法
EP1732023A1 (en) DRM system for devices communicating with a portable device
US20130024951A1 (en) Method and Device for Imposing Usage Constraints of Digital Content
CN102812470A (zh) 在第一次访问时的内容绑定
KR100648207B1 (ko) 디지털 컨텐츠의 유통방법
US20090313704A1 (en) Content management methods and systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05853454

Country of ref document: EP

Kind code of ref document: A2