Abstract:
PROBLEM TO BE SOLVED: To render a encrypted digital content in accordance with a license chain. SOLUTION: A request to render the encrypted content is received and a chain of licenses corresponding to the content is located. The chain includes a leaf license linked to the content at one end of the chain, a root license at the other end of the chain and intermediate licenses therebetween. The leaf license and the intermediate licenses in the chain are each bound to the adjoining license in the chain toward the root license and the root license is bound to an owner of a private key (PR-U). For each license in the chain, the license is verified and it is confirmed that the license allows the content to be rendered. A decryption key is obtained from the leaf license based on the application of the (PR-U) to the root license, the obtained key is applied to the encrypted content and the decrypted content is rendered. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To prevent free distribution of contents for protecting a copy of a medium such as a CD while allowing copying of the contents to a computing device and the like. SOLUTION: Digital contents are encrypted according to contents key CK to form CK contents. The CK contents, a license generator, a starting file, and license generating information are arranged on a digital storage medium. The license generator generates a digital license matching the arranged contents, and the generated license includes the contents key CK. The starting file is read and executed when the medium is mounted to the computing device, and when the starting file is executed, the license generator is executed. The license generating information includes the contents key CK, and an optional condition, status, a rule and/or requirement for installing the license. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a security-protected, simple, and low cost copy protecting system having low throughput. SOLUTION: A source generates a medium key(KM) and a media secret table having a plurality of entries, each including the (KM) encrypted by the public key (PU-PD) of a plurality of devices, and obtains the medium ID from a medium, and generates a content key (KD) for a piece of content, and encrypts the content into (KD (contents)) by using the (KD), and encrypts the (KD) into (KM (KD)) by using the (KM), and generates a package including the (KD (contents)), the (KM (KD)), the media ID and a signature verifiable by using the (KM) based on at least the medium ID, and copies the generated package and the media secret table to the medium. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To attain encryption of digital rights management and data protection for a content in a device not provided with interactive authentication. SOLUTION: A device for rendering a content in a medium retrieves a table from the medium, retrieves a device private key (PR-PD), specifies an entry of the table based on the (PR-PD), retrieves (PU-PD(RND)) from the specified entry, and applies the (PR-PD) to the (PU-PD(RND)) to disclose a random key (RND). Next, the device retrieves (RND(PR-PM)) from the table, applies the (RND) to the (RND(PR-PM)) for disclosing a medium private key (PR-PM), retrieves (PU-PM(KD)) from a lisence, applies the (PR-PM) to the (PU-PM(KD)) for disclosing a content key (KD), retrieves (KD(content)) from the medium, and applies the (KD) to the (KD(content)) for disclosing the content. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide architecture or a method by which metering of data is performed and metered data is reported to a metering service. SOLUTION: The metered data is accumulated, is indexed within a metering database of a client to a metering ID (MID) and a content-associated ID (KID), the client selects a particular MID and metered data in the metering database having the selected MID, constructs a challenge based on the selected metered data, sends the same to the metering service. The metering service obtains the metered data from the challenge, stores the same, and constructs a response. The client receives the response including a list of KIDs of the selected metered data in the challenge and processes the list of KIDs by, for each KID in the list, deleting the metered data from the metering database having the selected MID and the KID. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for verifying sub-objects in a header object and to provide a data structure. SOLUTION: The header object for a data file comprises the sub objects which specify properties of the data stream, and contains information needed to properly verify and interpret the information within the data object. In order to allow the protection of any set of sub-objects without requiring that the sub-objects follow any specific ordering, a new sub-object is introduced which includes region specifiers identifying regions within the sub-objects and verification information for those regions. This new sub-object in the header object allows the modification of non-protected regions and reorganization of the sub-objects in a header without invalidating verification information. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide digital rights management (DRAM) encryption and data protection for contents on a device without interactive authentication. SOLUTION: A device 62 renders contents on a medium by obtaining a table 64 from a medium 61, obtaining a device key (DK) of the device 62 and an index value of such DK, indexing into an entry of the table based upon the obtained index value, selecting an encrypted secret from the indexed-into entry, applying the obtained device key (DK) to the encrypted secret to expose the secret, and applying the exposed secret to render the contents. COPYRIGHT: (C)2004,JPO
Abstract:
A sequence of content keys are shared between a receiver of pieces of digital content and a computing device upon which the content is to be rendered. The receiver encrypts each piece of content according to a corresponding content key in the sequence and forwards the encrypted content to the computing device and the computing device decrypts the encrypted content according to the corresponding content key. The receiver initially transmits to the computing device an initialization digital license with an initial content key (CK0) therein. The receiver and the computing device each derive a new content key (CKx) in the sequence from the initial content key (CK(0)) in the sequence on an as-needed basis and in a coordinated fashion. The initialization license is required only once for the sequence of content keys, and the receiver need not explicitly communicate (CKx) to the computing device for each piece of content.
Abstract:
Described herein are one or more implementations for transforming (e.g., transcoding) DRM-protected digital media content while retaining associated DRM-information (e.g., a user license its related information).
Abstract:
A receiver tunes content and initially does not locate information relating to requirements for a corresponding license, and therefore constructs a default message including default requirements and sends such constructed default message with such default requirements to a computing device that is to render the content. The computing device upon receiving the sent default message with the default requirements constructs a default version of a license based on such received default requirements, stores such constructed default version of the license in a license store of such computing device, and thereafter renders the content only in accordance with the default version of the license.