CN1759363A - Distribution and rights management of digital content - Google Patents

Distribution and rights management of digital content Download PDF

Info

Publication number
CN1759363A
CN1759363A CN 200480006377 CN200480006377A CN1759363A CN 1759363 A CN1759363 A CN 1759363A CN 200480006377 CN200480006377 CN 200480006377 CN 200480006377 A CN200480006377 A CN 200480006377A CN 1759363 A CN1759363 A CN 1759363A
Authority
CN
China
Prior art keywords
subscriber equipment
digital
file
information
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200480006377
Other languages
Chinese (zh)
Inventor
R·波乌
B·爱德蒙森
D·雅沃尔斯基
J·纽耶恩斯
S·刘易斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Provident Intellectual Property LLC
Original Assignee
Tennessee Pacific Group LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tennessee Pacific Group LLC filed Critical Tennessee Pacific Group LLC
Publication of CN1759363A publication Critical patent/CN1759363A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Techniques and systems for managing digital rights may be implemented to protect unauthorized copying of digital content and to help ensure payment to content owners and distributors. A digital wrapper (310, 1020) may be applied to the data file to prevent access (135, 340, 440) without valid authorization. Information relating to authorizations to access the data files and/or keys for accessing the data files may be stored and retrieved with data stored in a non-volatile storage area (220) of the user device (205). Software on the user's device may be used to identify the file (110, 415) and apply the digital wrapper (310, 455, 1020) to the identified file. Further, the software may be used to remove the digital wrapper (360, 686, 770) from the file in accordance with authorization to access the file. Payment or other credit may be distributed among distributors of data files using information associated with digital packaging.

Description

The distribution of digital content and managing entitlement
Related application
The application requires the right of priority of following application: in the 60/444th of submission on February 3rd, 2003, No. 581 U.S. Provisional Patent Application, be entitled as " Distribution and Rights Management of Digital Media ", and in the 10/726th of submission on Dec 2nd, 2003, No. 284 U.S. Patent applications are entitled as " Distribution andRights Management of Digital Content ".
Technical field
The present invention relates to digital rights management, relate in particular to authorization and the distribution of being convenient to Digital Media.
Background technology
Music industry is very chaotic at present.In decades, music company has controlled the physical distribution of the content that it creates.For the first time, the consumer obtains making it can control the instrument of this distribution of contents in history.The destructive state variation that technology fast-developing and that extensively adopt has caused the consumer to order about.It not is to be the preferred embodiments of answering an intrinsic difficult problem of conciliating answer word field distribution of contents that the mixing of legal and illegal solution is proved to be.Although the problem relevant with the content digital distribution may be relevant with music industry to a great extent, yet the other industries as the motion picture industry also face a same difficult problem.
Still do not have solution can both satisfy creator of content/holder at present, satisfy the consumer again.The unique digital distribution solution that extensively adopts appears in the various point to point networks at present.Yet, this solution allow consumer up to a million under the situation of it not being downloaded contents paying, the content that copyright is arranged of down-load music and other form.Content holder can not receive the expense that belongs to them.This situation has caused destructive revenue losses.
By their the endorsement permission to digital booking service, the many content creating entities as the music company have admitted that all digital distribution is a future trend.It is effective and the most most economical distribution means.At present, music industry does not adopt the possibility of this distribution media yet fully.Digital distribution is in other industries and all become universal with respect to the content of many types.Under the environment of other type content, produce, maybe may produce and problem similar problem that music industry is faced.
Present digital distribution model in the music industry for example is restricted to artificial purchasing model to the consumer, and these distribution model have only limited song to select, and are limited to other available option.In addition, these models have generally limited the content how consumer uses them to pay for it, and some models may fail to protect the infringement to basic works.
Summary of the invention
The system and the technology that are used for managing digital rights are provided.The inventor recognizes, existing to be used to protect the technology of Digital Media and other content be inadequate, and can be under the situation of not serious infringement user Lawful access Digital Media and other content the process of licensing digital right.In addition, this process can provide a kind of mechanism to reward user's sales promotion and this content of distribution.
One general aspect, the management of digital right relates to the data file that detects on the subscriber equipment.Data file comprises a digital packaging (digital wrapper), and it stops when not have effectively mandate the visit to the data file.The data that use is stored in the nonvolatile storage of subscriber equipment are implemented search to the information relevant with the mandate of visit data file.If find the mandate of visit data file at searching period, forbidden digit packing then.
Implementation comprises one or more following features.Data file can be a media file.Can implement in the license database on subscriber equipment the search that the information relevant with the granted access data file is carried out.License database can be arranged in the nonvolatile storage of subscriber equipment.The nonvolatile storage of subscriber equipment can be a basic input/output (BIOS).The data of storing in the nonvolatile storage of subscriber equipment can comprise the position of license database and/or the access key of license database, and this access key is that access permission card database is necessary.License database can comprise the access key of data file, and this access key is that the forbidding packing is necessary.The search that the information relevant with the mandate of visit data file is carried out can be determined to implement in the license database that is associated with remote server according to following, describedly determines to show that the local data base on the subscriber equipment does not comprise the information relevant with the mandate of visit data file.
The identification data of subscriber equipment can be sent to central server, and identification data is applicable to and allows the central server verifying user equipment.Identification data can comprise the digital cipher that is associated with subscriber equipment and/or and the user that is associated of subscriber equipment.Can provide mandate to purchase, and can receive the situation of accepting the proposal of buying (offer to purchase) to the visit data file.Digital packaging can be disabled in response to the acceptance of proposing (offer).The acceptance of proposing can be sent to central server.Message from central server can be received in response to the acceptance of proposing, the data that comprise in the message can be used for the forbidden digit packing.The identification data of subscriber equipment can be sent to central server, to allow the central server verifying user equipment.Identification data can comprise the digital cipher that is associated with subscriber equipment and/or and the user that is associated of subscriber equipment.The information relevant with the mandate of visit data file can be stored on the subscriber equipment.If do not find the mandate of visit data file at searching period, and if do not accept the proposal of visit data file authorizing is bought, then can the denied access data file.The search that the information relevant with the mandate of visit data file is carried out can comprise: use the executable instruction of storing in the digital packaging to determine whether subscriber equipment comprises the software that is used for the forbidden digit packing.
Another general aspect, on subscriber equipment, detect the data file that does not comprise digital packaging.Data file identifies with a file identification algorithm.Use the data of storing in the nonvolatile storage of subscriber equipment, the information relevant with the mandate of visit data file is implemented search.If find the mandate of visit data file at searching period, then allow the visit data file.
Implementation comprises one or more following features.The file identification algorithm can comprise a digital finger-print detection technique.Data file can be a media file.Can implement in the license database on subscriber equipment the search that the information relevant with the visit data file authorizing is carried out.The license database position of the data of storing in the nonvolatile storage of subscriber equipment in can the volatile storage area of identifying user equipment.The search that the information relevant with the mandate of visit data file is carried out can be implemented in the license database that is associated with remote server.Can be to buying the mandate of proposing the visit data file.If receive the situation of accepting of proposing purchase, then allow the visit data file.The information relevant with the mandate of visit data file can be accepted situation and be stored in the database on the subscriber equipment in response to what propose to buy.The digital packaging that is associated with the file that is identified can be applied to data file.
Another general aspect, by receiving the data file on the subscriber equipment and receive request, thereby distribute income according to the distribution of digital right to the right of buying the visit data file.Data file comprises a digital packaging, and described digital packaging comprises the information relevant with one or more distributors of data file.The information relevant with one or more distributors is extracted from digital packaging, based on the information of being extracted the letter of credit is distributed to one or more distributors.
Implementation comprises one or more following features.Digital packaging can also comprise and the relevant information of royalty right distribution of being distributed that the purchase of the right of described royalty right and visit data file is associated.The information of being extracted can be a unique file identifier, and distributor's information and/or royalty right assignment information can be searched with unique file identifier.The information of being searched can be searched from being positioned at the long-range central database of subscriber equipment.The request of purchase can be sent to central server, and the distribution of the letter of credit can be stored in the database that is associated with central server.
For participating in distribution of income, identified the user who receives the equipment of data file thereon in conjunction with digital rights distribution.Data file comprises a digital packaging, and described digital packaging comprises the information relevant with one or more distributors of data file.Digital packaging is modified to comprise the information relevant with user ID.Then, detect the data file that has modified digital packaging and can distribute to the user to the letter of credit.Digital packaging is not having visit data file under the situation of effectively authorizing applicable to preventing.The data file that has modified digital packaging can be sent to and consumer's associated device, and can receive purchase request to data file access from consumer device.Digital packaging on the consumer device can be disabled in response to the request that receives.The letter of credit that is used for consumer's purchase can distribute between one or more distributors.The information relevant with user ID can be the unique user identifier that is distributed by central server.
Another general aspect, by collecting the information (unique identification data that comprise subscriber equipment) relevant from subscriber equipment and generate a digital cipher, thereby on subscriber equipment, be convenient to digital rights management with the information of collecting with subscriber equipment.Digital cipher is stored and encrypts, and encrypted secret key is sent to subscriber equipment so that be stored on the subscriber equipment.Encrypted secret key and the information relevant with subscriber equipment are received subsequently, use the encryption key receive, the information that receives and/or the digital cipher of being stored to come verifying user equipment.
Implementation comprises one or more following features.Collect and the subscriber-related identification information of subscriber equipment, and with and this subscriber-related identification information generate digital cipher.Collected information is to collect according to the executable code of storing on the subscriber equipment.Digital cipher is generated and stored by central server.The checking of subscriber equipment comprises: encryption key is decrypted, and encryption key and the digital cipher stored is compared.The checking of subscriber equipment also can comprise: generate a digital cipher and described digital cipher and the digital cipher stored are compared with the information that receives relevant with subscriber equipment.Can authorize to the visit of a license database and/or to the visit of a digital document according to the checking of subscriber equipment.Unique identification data is extracted from the nonvolatile storage of subscriber equipment.
Also have one general aspect, be the input/output of the file transfer monitoring user equipment attempted.Detect by input/output and transmit attempting of a data file, and use a digital packaging in this data file of transmission forward direction that allows to be attempted.Digital packaging is applicable to the unwarranted visit that prevents the data file.
Implementation comprises one or more following features.Can the identification data file, can come the Applied Digital packing based on the identity of data file.Can be complementary based on the sign of the data file in the database on the identity of data file and the subscriber equipment and come the Applied Digital packing.The identification data file can be carried out with a file identification algorithm.Digital packaging comprises the information of identification data file and distributes relevant information with the letter of credit that the purchase of the described letter of credit and data file is associated.
Another general aspect, on first subscriber equipment sign one digital document, this digital document submits to a licence, this licence meets the license information of storing on first subscriber equipment.Receive digital document is copied to the request of second subscriber equipment from first subscriber equipment, and obtain and information that second subscriber equipment is associated, comprise the unique identification data of second subscriber equipment.Digital document is copied to second subscriber equipment from first subscriber equipment, and the digital document that sign is duplicated and the data of second subscriber equipment are stored on first subscriber equipment.
Implementation comprises one or more following features.The data of storing on first subscriber equipment can be synchronous with a central database.Can determine: duplicating based on license information of the digital document of being asked is authorized to.License information is included in the digital packaging of digital document.The license information of digital document can be stored on second subscriber equipment.
Also have one general aspect, the media file that sign is used to distribute.The access rule that sign and media file are associated comprises and the use right information relevant with cost of use.One digital packaging is applied to media file.Digital packaging comprises the identification data and the data relevant with access rule of media file, and is applicable to and prevents the unwarranted visit of media file.
Implementation comprises one or more following features.Digital packaging can be adapted to: use this media file and disabled for the user of the licence that media file is arranged.Digital packaging also comprises the information relevant with one or more distributors of media file.
Another general aspect, media file is encoded with license information, media file with digital packaging locking to prevent unwarranted visit.The media file of packing is loaded on the subscriber equipment.Instruction is installed on the subscriber equipment so that can the release media file.Instruction can identification medium file, and send a message to remote server, so that obtain to use the licence of media file according to the license information of in media file, encoding.Obtain the licence of media file from remote server, and allow visit media file on the subscriber equipment with licence.
Implementation comprises one or more following features.The licence of media file is stored on the subscriber equipment.Licence comprises the data that are used for the release media file.
Another general aspect, central database is applicable to the identifier of storage digital document, and the storage user license is to use digital document.Central server is used for receiving message by a network from a remote equipment.Each message that receives all comprises user's the user identifier and the identification information of digital document.Central server also is used to handle the paying information of licence so that use digital document, stores licence that uses digital document and the information that the user is associated, and the license information of digital document is sent to remote equipment.License information is applicable to and makes remote equipment allow the user to use this digital document.
Implementation comprises one or more following features.Central server also is used for receiving one or more digital ciphers from remote equipment, and deciphers described one or more digital cipher with at least one identity among authenticating remote equipment and the user.Central server also is used for being used for authenticating remote equipment from the data of remote equipment receiving equipment special use.Remote equipment can be support digital document to and the streamed server of user-dependent subscriber equipment.Remote equipment can store licenses information.Remote equipment can be the subscriber equipment that is associated with the user.Central server also can be used for receiving digital cipher that information, generation is associated with user and/or subscriber equipment and described digital cipher being sent to subscriber equipment from subscriber equipment.Digital cipher applicable to the enable access license information, comprise the license database and/or the digital document of license information.License information can be to be applicable to the data of forbidding to the digital packaging of digital file applications.
Above-mentioned technology can realize that described product comprises the machine readable media of storage instruction with method, system or product, and described instruction makes one or more processor executable operations.
The details of one or more implementations has been proposed in the accompanying drawings and the description below.From instructions and accompanying drawing and accessory rights claim, further feature will become apparent.
Description of drawings
Fig. 1 is the process flow diagram flow chart that is used to manage the digital right of a file, and this document is loaded into such as on the such subscriber equipment of computing machine.
Fig. 2 is the block diagram that is used for the representative system of managing digital rights.
Fig. 3 is the process flow diagram flow chart that is used for install software on subscriber equipment (" solution software "), and described software control is to the visit of agent-protected file.
Fig. 4 is the process flow diagram flow chart that is used for packing content, and this content arrives on the subscriber equipment that comprises solution software without any digital packaging.
Fig. 5 is used to generate unique consumer's identifier of user and/or to the signaling and the process flow diagram of the process of the key of user equipment specific.
Fig. 6 is signaling and the process flow diagram that has been used for the process of media file when the user has had the licence of media file.
Fig. 7 is signaling and the process flow diagram that is used for the process of media file when the user does not have the licence of media file.
Fig. 8 is signaling and the process flow diagram that is used for media file is duplicated or moves to from subscriber equipment the process of secondary device.
Fig. 9 illustrates the process flow diagram that is used to carry out the illustrative process of transmitting distribution.
Figure 10 is the process flow diagram that is used for the process of packaged media file.
Reference symbol identical in each accompanying drawing is represented components identical.
Embodiment
System described here and technology are about the distribution of digital media file and the computer implemented system of managing entitlement.Described system and technology are represented an end-to-end process, in fact this process supports the special digital file of any kind, comprise that music and other recording, film and other video, books and other write works and other file, such as those and finance, law, medical science, recreation and software industry file associated.Although following description mainly concentrates in the use of technology of combining music file, these technology can be applied to the digital document of other type of equal valuely.Similarly, although technology describe with the context of media file, yet these technology also can be used for the data file of multimedia file and other type.Described system and technology have been guaranteed content everyone have been compensated for the distribution and the use of its works, and a plurality of participation ranks in the income that sale and/or permission generated of Digital Media are provided.
Described technology works to the medium that arrive the medium at subscriber computer place with " packing " form (shielded) and arrive with " unpackaged " (promptly unprotected) form.The medium owner of a right can be with packing a file with entitlement with the relevant information of paying.This information is endowed a unique file ID, and is stored in the central database.File ID is stored and is sent out together with packing.Also can identify do not have the packing song or the Digital Media of other form.In case a file by system acquisition and sign, just can be searched as possessor and the information (for example by file that is identified and the unique file ID that is stored in the central database place are complementary) of paying requiring.The monitoring software (" solution software ") that provides according to described solution can be installed in the user automatically or manually to be attempted to visit on the arbitrary computing machine or miscellaneous equipment of a packed file thereon.In case be mounted, all of file I/O (I/O) system by computing machine medium in the future can or use file ID to identify or identify with file identification software.
Can create a user ID for each user.User ID can be stored on computers the safety zone, such as the BIOS of computing machine together with device-specific information.User ID can be stored with encryption or unencrypted form.This information can be represented a user ID key, the relevant permission that this key allows visit one local license database and held by the user.This local license database by reference, the solution software of storing on the computing machine can determine whether the user is authorized to use a specific file, if then untie this document.Even file is not packaged, also can allow or stop the visit or the use of file according to the business rules of local data base or the storage of central database layer.For example, business rules may stop the file that uses particular type, unless allow to use in the file of other type under need not the situation of licence, finds a licence in local data base.Because the user has a plurality of equipment usually, therefore relevant with user license information can be visited the whole medium of having permitted on more than equipment that he has by centralized stores to guarantee the user.
The user can be defined as individual or one group of relevant individual, such as the people or the commercial entity of family, family member, visit one shared privately owned equipment.In addition, when information was described to be stored in the database, information can be stored in a plurality of databases.
File can be forwarded to other user, perhaps exchanges between the user.Yet if documentation requirements one licence and new user do not buy media file, new user can not obtain the visit to file.In order to encourage the distribution of file, give user excitation in case media file or to the link " transmissions " (electrically transmission) of media file think to them understand to media file interested other people (for example taking in) so that may receive a part that generates by new buyer.The receiver is given excitation and transmits media file to buy media file (promptly can visit this document) and to continue, and makes them also can assign to income.The distribution scale number that wherein allows to assign to income can not add restriction.Yet, generally speaking, can limit the distribution scale number that wherein allows to assign to income.The levels of payment number of one particular media files can by content everyone and/or randomly set up by the distributor subsequently of media file.The price of paying maximum level number and this paying can with the paying price together, when creating unique file ID, set up for media file.If new user disapproves media file, he just can not obtain the visit to file, although he can supply that file transfers buy to other user.
File can comprise the rule of buying or transmitting, and described rule request and this document are bought or the transmission file associated together.For example, a first song may require it only to be sold as the part of the song collection as the special edition.Another example can require trailer, advertisement or other relevant material to be accompanied by a film or distributed TV programme.
In order to support ability according to the correct Resources allocation of a layering distribution technology, solution software on the subscriber computer can provide a kind of mechanism, whereby do not resell person and distributor their sign can be increased to one the packing media file on, this media file generally allows the person of reselling and distributor's sign, makes them to be compensated for the sale that relates in distribution channel.When a sales transactions occurring for a particular media files, the identification information that just can extract user in the distribution channel from the media file of packing is authorized to share income so that whom to determine at every turn.All Activity can be for paying and analyzing to be concentrated and follow the tracks of.The paying situation that central authorities' track database can be used for the tracking person of reselling, distributor's (may comprise the user who transmits packed file) and transmits the user of the no packed file that arrives.This back one situation can occur when for example following: the user is shared when coming from the song of a standard audio CD or DVD.The user ID of consulting can be imported when buying, and makes consultant (referrer) and the relevant person of reselling and distributor to be compensated.
The licence of file can be identified by a plurality of equipment of user.Method described here and technology can be provided for the user the management of a plurality of equipment rooms, share and the process of mobile licence.
Fig. 1 is the process flow diagram of process 100 that is used for the digital right of management document, and this document is loaded into such as on the such subscriber equipment of computing machine.Subscriber equipment comprises the software interface with I/O port, makes equipment can monitor All Files I/O, and just as fire wall, fire wall has scanned all traffics that enter and go out of computing machine, and check is moved into and shifts out all files of system.File can be loaded on the equipment with arbitrary class I/O port, comprises floppy drive, Ethernet or LAN connection, dial-up connection, CD-ROM or DVD driver, USB port, infrared data port, bluetooth or other wireless connections or is used for data transmission to subscriber equipment or therefrom transmit any other mechanism and/or the agreement of data.
When file is loaded on the subscriber equipment, file detected (step 105).The file that is detected is further checked with file identification software, so that sign this document (step 110).For example, file identification software can determine whether the file that receives represents a known song or a film (for example MP3, windows media or some other form).This document sign can be carried out by the software of realizing following technology, and described technology is described in following patented claim: the publication No. that people such as Roberts show, submit on July 31st, 2002 is 20030028796 U.S. Patent application; The publication No. that people such as Roberts show, submit on October 29th, 2002 is 20030046283 U.S. Patent application; And/or people such as the Wells publication No. showing, submit on July 22nd, 2002 is 20030086341 U.S. Patent application; All these applications all are transferred to Gracenote company, and all are incorporated into this by reference.This technology is extracted a digital finger-print from a digital document, and the fingerprint that is extracted is compared with the database of known works.More particularly, this technology can use algorithm detect media file type and media file be the possibility (shielded works for example express possibility) of interested file.Generally speaking, the built-in attribute of these algorithm checks files, rather than only according to file extension and the identification document type.Be confirmed as uninterested media file can be allowed to by, and need not further analyze this document.
If finding media file may be that institute is interested, then use additional algorithm to identify the media file (for example song of appointment, film, photo, works etc.) of appointment.Can identify and specify the finger print data of media file can be stored in central server, and visit with the Internet connection.Some files may have relevant file type, but can not be identified (if for example media file is represented the recording that the user generates, perhaps infeasible to the visit of digital finger-print central database).Can not add restriction and allow the visit of this file, but file may be marked as Unidentified (for example having visited an indication of this unidentified file by storage on subscriber equipment), this can handle in the future faster, if and media file is made a catalogue subsequently or by sign (but for example becoming the time spent in the Internet connection to the central numeral fingerprint database), identify media file when solution software may be used afterwards.If file is identified subsequently or makes a catalogue and be restricted, then can use the indication of being stored of the accessed mistake of the once unidentified file of expression to come the requirement purchasing licensee, so that continue to use this document or collect the licence fee that file is used.In some implementations, can store the data of limited quantity media file (for example 2000 first most popular song files) locally and supply fast access on computers.The finger print data of local storage can be updated periodically the variation of song files popularity (for example along with) from central server.
Even someone has attempted simulated papers (for example by changing filename, extension name or other attribute), and no matter file is to receive (for example reading compressed information with standard method) with compression or unpressed form, and above-mentioned file identification technology can both allow the accurate sign of file.This technology provides extremely low error rate less than 2% (the negative mistake less than 1% and less than 1% lookup error).
Also can use other file identification technology, such as watermark and fingerprint technique, known as the field of digital rights management.In some cases, may unnecessaryly come identification document with complicated file identification technology.But can come identification document based on filename or with the file ID attribute, described attribute can be included in the file and can be designed to is jamproof.For example, if media file is packaged, file identification software can be used for detecting packing and reads file ID information embedded in the packing.Therefore, file can identify with hidden file characteristic (for example fingerprint or watermark) or explicit file attributes (for example file identifier of storing in the file header).
In case identified file, just determined whether to permit this document on subscriber equipment, to use and/or use (step 115) by the specific user.This determines and can carry out by one or more by reference license databases that described license database can be stored in this locality (for example on subscriber equipment) and/or be stored in long-range (for example at the central server place).For guaranteeing that the license information in the license database is effective, can use one or more particular key to visit information, release license database and/or checking user, subscriber equipment and/or subscriber equipment from one's body licence, perhaps realize above-mentioned steps, following going through by communicating by letter with central server.If file is licensed, may allow user capture this document (step 120), this for example can comprise: separate the song that comprised in open file, the played file or film, storage or use the file on the subscriber equipment or by wireless or wired connection document flow is sent to subscriber equipment.Licence can be specified which kind of visit or the use of license file.
If file is not licensed, then can offer the user to a licence for buying (step 125).For example, the user may be directed to a website, buy there, perhaps a pop-up window may appear on display screen, whether wish to buy the licence of file or accept specific license terms for subscriber equipment inquiry user, and/or the user may be directed to the website of finishing purchase.Perhaps, the user has a service, and this service allows to buy in advance the letter of credit of the specific quantity that can be used for the licence purchase.As another kind of alternatives, the number of not permitting medium that uses in the specific period can be by solution software or other software at native monitoring, and this information can be used for calculating usage charges or price subsequently.License terms also can be used as a part of proposing purchasing licensee and is shown, and described clause is such as extended period, use and distribution limits and payment option.Determine then whether the user accepts licence (step 130) (having clicked the indication of accepting button or refusal button in the pop-up window by receiving the user).If the user does not accept licence, denied access this document (step 135) then.If the user accepts licence, comprise and abide by any payment terms, the user just is allowed to visit this document, and licensed license information or any other the necessary information stores (step 140) in license database of expression file.
Fig. 2 is the block diagram that is used for the representative system 200 of managing digital rights.Subscriber equipment 205 comprises a processor 210, and processor 210 can be carried out the instruction of storing in the storer 215 that links to each other with subscriber equipment 205 and/or other storage medium (not shown).Subscriber equipment can comprise some other nonvolatile memories of the essential information that BIOS (basic input/output) 220 or storage and subscriber equipment 205 are relevant.Subscriber equipment 205 can comprise one or more I/O ports 225, and described port 225 can be file and other data in the moving up and down and/or duplicating of subscriber equipment 205 (shown in 230).Processor 210 can monitor file and other data by I/O port 225 according to the instruction of storage in the storer 215, so that identify shielded (copyright is for example arranged) music, video, software or other file.
Storer 215 can comprise a local data base 235, the license information of the file that local data base 235 storage is licensed to be used on subscriber equipment 205 or used by one or more users.Find the solution certainly the scheme software decryption possibly and use one or more keys of storing among the BIOS220 to local data base 235 or to the visit of the information that comprises in the local data base 235.This key may be unique to user and/or subscriber equipment 205, and the process of access local database 235 can make the key and/or the license information of storage in the local data base 235 only effective for specific subscriber equipment 205.For example, if user's attempt is made unwarranted duplicating to key and/or license information on an optional equipment, then can be in the visit of refusing on the optional equipment the file of on subscriber equipment, permitting, unless be stored on the optional equipment for optional equipment has generated a new unique key and a license information.License information on the particular device can be updated in the future one day, upgrades and uses right or remove visit to file.The example that the ability of this renewal is carried out in expectation is to remove the old computing machine of permission.
Subscriber equipment 205 can be communicated by letter with central server 240 by network 245, and network 245 can comprise following one or more: LAN, WAN, internet, telephone network and any other network that is used to transmit data.Communication between subscriber equipment 205 and the central server 240 can be carried out with safe lane, such as Secure Sockets Layer(SSL), and/or can use encryption as PGP.Can the provide support service of digital right management system 200 of central server 240 connects by safety such as at least partly using that the information that transmits from subscriber equipment 205 generates key and authentication secret and license information periodically or when attempting to permit new media.In addition, central server 240 can provide the visit to central license database 250, the licence that these database 250 storages and sign are held by the personal user, and storage key authorization information.The storage of license information in central license database 250 provides redundant (for example just in case the nonvolatile storage of subscriber equipment has damage), can on another equipment, create data environment again through permission, permission transmission permission card between subscriber equipment allows the user to use the remote access that an equipment (for example mobile phone of some type) that does not have a volatile storage area carries out license information and allows that the stream of licensing digital file transmits.
For the subscriber equipment 205 of some types,, can carry out some functions with being in the long-range assembly of subscriber equipment such as some mobile phones.For example, some mobile phones may perhaps may not expected to do like this according to using not in the storage capacity of local storage file and license information.In this case, digital document (being such as but not limited to music or video) can be spread by wireless connections and be delivered to subscriber equipment.Local data base 235 can be arranged in wireless network, determines whether subscriber equipment has the processing of the permission of access specific files also can carry out on the server in wireless network.
In many cases, local data base 235 is in subscriber equipment 205 this locality.Yet in some cases, local data base 235 (together with other storage capacity) can be positioned on network drive or other external memory storage.Mapped or link under the situation of subscriber equipment 205 at network drive or external memory storage, can use an additional information to guarantee the safety of digital document fully.Particularly, may expect to describe the data that are written to network drive or external memory storage and follow the tracks of the memory location.In addition, may expect to identify the equipment and/or the user of energy access local database 235.
When having created local data base 235 for the user and position data write BIOS, information also can be written to network drive or external memory storage.Be written to network drive or external memory storage message identification the subscriber equipment or the machine that use unique user ID and/or device id to link to each other with network drive or external memory storage.For example, under the situation of family's share service device or other shared network server, driver has a plurality of users and/or device id (or both combinations) is stored in the encrypt file on network drive or the external memory storage.When a new engine is linked driver, the identification information of new engine is added to encrypt file on network drive or the external memory storage.This identification information can be followed the tracks of (for example at central server 240 or central database 250) by the concentrated area to prevent such situation: wherein excessive user or machine are using same medium, have therefore violated the rules of permission of medium.
Fig. 3 is the process flow diagram that is used for the process 300 of install software on subscriber equipment (" solution software "), and described software control is to the visit of agent-protected file.Solution software can be carried out a plurality of different functions, comprise acquisition of information, described information is used to generate that key is communicated by letter with central server, Monitoring Files I/O system, storage and search license information, identification document (for example with Gracenote or other technology), pack the purchase of conciliating open file and being convenient to licence from local data base.Solution software can be installed on the subscriber equipment with multitude of different ways.Traditional download and software installation process are a kind of modes that solution software is installed.Installation process can begin when subscriber equipment receives packed file.Other possible installation process can comprise: use by the song of solution software packaging as beginning of current peer-to-peer network, send solution software or to link, use instant message transmission or Email and other alternatives of the server of storage solution software.Process 300 shown in Figure 3 has illustrated owing to receiving the installation that a packed file begins.
At first, create a data file (step 305).If data file is a song, then the establishment of data file may comprise the artist of recording song and create artist, label and the publisher that can supply the song of distribution together.Perhaps, independent artist can oneself produce and announce the song that is used to distribute.Song is subsequently by " move (ripped) ", comprises from the such digital source of CD or DVD or an analog source obtains song and song is encoded into mp3 file, Windows Media file, Real Player file or be used for other media formats of playback on computing machine or music/media player device.
Can be applied to media file (step 310) to a digital packaging then.Other people in content everyone (for example record label, publisher or independent artist) or the distribution chain can or strengthen digital packaging to media file application, adjusting.Digital packaging can comprise such as title, author/artist and volume/collection such attribute and appointment entitlement, the right to use, royalty right expense and transmission pays the business rules of rank (promptly can pay individual's commission along distribution chain).The information of this combination is endowed one " unique file ID " (UFID), and can be stored in the central database (see figure 2).UFID is included in the packing between arbitrary and whole transmission period, and be used as a kind of identification medium file and trigger the mechanism of appointed function, described appointed function is paid the tip of incident, file usage database update and consumer's transduction activity with (micro-payment) expense allocation such as the copyright owner.Solution software can comprise the process of integrality to prevent that UFID and packing from altering that is used for authenticating documents and UFID thereof.For example, the file identification technology of discussing about the file that do not comprise unique embedded ID above can be used for " identification " file by generating an ID who derives.Check the ID that is derived with respect to the corresponding ID that has stored then, to guarantee that file and unique embedded identifier thereof are altered as yet.
Except the information relevant with media file, packing prevents the unwarranted visit of media file.In other words, packing prevents media file, unless the user has bought licence.In fact, packing places encrypted form to file, and it requires a key can visit basic media file.When the software application electronic distribution, generally be used for protecting the conventional digital packaging of software application can be used as the packing of media file.For example, packing can be same type with the commercial packing of Digital River, and the latter can be used for distributing such software, such as the Norton Antivirus (Norton Auntivirus) of Symantec company and the franchise system of Aladdin software.In case the user for him own or for equipment purchase a licence, just use a key to untie media file.This key can receive from central server.
Generally speaking, the whole communications between subscriber equipment and the central server are all encrypted with two-stage and are occurred.At first, transmission is encrypted by SSL/TLS (security socket layer/Transport Layer Security is also referred to as secure HTTP).Secondly, the key that is sent by PKI and private key to and a symmetrical key encrypted.Can be when mounted to the certificate of subscriber equipment distribution, to guarantee to trust the communication of computing machine to central server for user equipment specific.Certificate is pointed out the sender.Central server sends to the computing machine that is sending with its PKI then.The information that the computing machine that is sending is wanted to send to it with a symmetrical key is encrypted, and encrypts this symmetric key with the PKI of central server then.Central server uses its private key symmetric key of decoding, the information of using symmetric key to decode and receive then.The example of symmetric key algorithm comprises DES (digital enciphering system), 3DES (triple des) and simple password copy algorithm.Key is PGP (Pretty Good Privacy, a Pretty good privacy) to a common examples of cryptographic algorithm.Described method can be used for information is sent to subscriber equipment from central server conversely.
Usually, each media file all has a corresponding unique key, perhaps can share a specific key between two or more media files.In order to improve security, employed special encryption method can be unique for each file.Therefore, can use a plurality of encryption technologies, packing can comprise an encryption technology identifier notifies solution software is relevant to use for separating open file for which decryption technology.But packing also can comprise an executive module, and this assembly moves when the user attempts to open packaged file.In addition, but executive module determines whether to exist effective installation of solution software on subscriber equipment.
Notice and to encrypt the license database of equipment this locality.The above-mentioned symmetric key algorithm of the general use of this encryption.In order to improve security, can add a plurality of safe floors (also as mentioned above), and when communicating by letter, change encipherment scheme at any time with central server.Described technology has used the combination of data and encryption seed (seed) value to generate symmetric key.The element of these encryption seed comprises the information for local user and/or device-specific, comprises the information of the hardware and the nonvolatile memory of the equipment of being bound to.This has improved system and has made ability to the encryption of local machine-specific.Like this, be that encryption and the tagged keys that a system generates can not use in another system.
The file of packing is generally encrypted with above-mentioned symmetric key.The content of encrypting is stored in and can carries out in the packing.Thereby; key can be used for multiple different security function, comprise between the packaged file of protection (i.e. locking) and release, the locking and unlocking local data base, protection subscriber equipment and central server and/or the central database communicate by letter, verify the user, to the central server verifying user equipment and to the user equipment authentication central server.
Subscriber equipment can receive packaged file (step 315) by the distribution of media technology of physics or electricity subsequently.For example, the user can receive packaged file on its computing machine, and described file is from such as Morpheus, KaZaA, the so reciprocity platform of Napster, Grokster; The Email that receives from another people; By from the website, the file access and the downloading process of phone or satellite network, no matter whether this website is the legal distributor of digital content; In the file of individual that sends by instant message transmission or other direct method of attachment to the individual; Or by other media, such as network linking, CD-ROM or CDR, DVD-R, Zip dish or the like.
When packaged media file is opened or visited in user's attempt (for example by double-clicking file), but the executive module of digital packaging determines whether to have existed on the subscriber equipment effective installation (step 320) of solution software.Between the installation period of solution software, central server is created a unique key, this unique key can comprise with user-dependent " unique consumer ID " (UCID) and/or a Device keys.Unique key is by generating according to pre-defined algorithm combination numerous types of data, the data that described data type comprises device-specific information, collect from user's input, the data and local data base visit and the positional information that are generated by solution software or central server.At least some parts of data or data generally are sent to central server from subscriber equipment, and central server uses the data that receive to generate unique key.Central server is encrypted this information then and information is beamed back subscriber equipment, there in the non-volatile area of information stores safety on subscriber equipment, such as BIOS.In addition, unique key makes central server can discern the consumer, makes the user can use licensed data file and receive to pay so that file " sales promotion " (transmission) is arrived other consumer.Therefore the existence of unique key and executable solution software and support file show the effective installation that has solution software on subscriber equipment on the subscriber equipment.On the other hand, if having unique key but the user has removed all or part of software and supported file, it is necessary then reinstalling solution software.
Thereby, when the user attempts to visit packaged media file, solution software reads by the internal memory of implementing the BIOS tables of data, check BIOS whether one effective unique key is arranged, described BIOS tables of data is written to SMBIOS (being called DMI) standard, as defined in " system management BIOS is with reference to standard 2.3 editions (SystemManagement BIOS Reference Specification version 2.3 (the 2.1st joint-form standard)) ", wherein unique key is written into when solution software is installed.If do not find unique key, but then the executive module of packing determines whether also not install solution software.If find unique key in BIOS, then reading unique key and reading this key with central database is effective with unique key of guaranteeing to find.Central database decipher unique key and calculating and verify a verification and.As use verification and alternative, can use other verification method, such as comprising an additional keys or the token of shaking hands in the exchange between client devices and central server.In many situations or implementation, the checking of unique key validity can be carried out by the solution software on the subscriber equipment.If unique key and verification and do not match, but then the executive module of packing determines not install at present effective solution software.If unique key and verification and coupling are then determined to exist effectively to install.In some implementations, when having limited processing resource at local system (for example in mobile phone), the process that check is effectively installed can be carried out at the central server place.
In addition, if unique key represents to have the installation of effect, the solution software that then is positioned on the subscriber equipment can be verified the solution software that is positioned on the subscriber equipment with respect to the unique identification information of solution software, and described unique identification information is included in unique key of storing among the BIOS.For example, unique key of being stored among the BIOS can comprise solution software verification and and version, may not be stored with encrypted form, and and be positioned at the solution software on the subscriber equipment verification and and version compare.If this information does not match, but then the executive module of packing determines not install at present effective solution software.Otherwise, identify effective installation.
Although it is not shown in Fig. 3, has such situation: wherein packaged file licensed (licence that is access file has been stored in this locality or the central license database), the file that does not perhaps have a packing Already on the subscriber equipment (for example, before solution software was installed on the subscriber equipment, file was moved (rip) to subscriber equipment from CD).Under one situation of back, can suppose that the user is awarded the licence of access file.In order to determine whether file has been present on the subscriber equipment, generally the memory device that needs scanning to link to each other with subscriber equipment is present on the subscriber equipment to find which file.Below further discuss permit on the subscriber equipment or the file processing on the subscriber equipment Already in.
, then on subscriber equipment, provide the proposal (step 330) of solution software is installed if but the executive module of packing is determined effective solution software is not installed at present.This proposal can for example provide in the pop-up window.Determine then whether the user accepts this proposal so that solution software (step 335) (for example having clicked the indication of accepting button or refusal button in the pop-up window by receiving the user) to be installed.If the user does not accept this proposal, just solution software is not installed, and the media file (step 340) of denied access packing.If the user accepts this proposal, then the code that comprises from the central server of storage solution software code or in pack is installed solution software (step 345).
But in case if the executive module that solution software or packing be installed in step 345 determines to have existed effective installation (and the media file of supposition packing is not as yet by user and/or licensed on subscriber equipment) of solution software in step 320, but then on subscriber equipment, provide the perhaps proposal (step 325) of packaged media file of purchase.Perhaps, the user may be directed to the purchase that can finish file and the website of permission.Determine then whether the user accepts purchase and perhaps can propose (step 350).If not, then refuse visit (step 340) to the packaged media file.
In some implementations, the installation of solution software may not occur, but up to provided the proposal of buying packaged media file perhaps in step 325 after, or even the user step 350 accept to buy perhaps can propose after.Thereby, no matter in step 320 in effective installation of whether finding solution software on the subscriber equipment and in step 345, install before the copy of solution software, on subscriber equipment, provide the proposal that purchase perhaps can (step 325) packaged media file.In this case, solution software can be mounted, and need not require to determine in step 350 whether the user accepts to buy perhaps suggestible while or afterwards, for solution software a proposal that separates and acceptance are arranged.Thereby step 345 can be made peace step 350 greatly simultaneously or execution step 350 after, and step 330 and 335 can be omitted.As another kind of alternate ways, some other execution in step 330 and 335 that can be during process 300.
If the user has accepted to buy and perhaps can propose, just obtain paying information and send it to central server (step 355) from the user.Central server can comprise a little charging system, and the sale of this system keeps track media file licence and all will be sold the each side that pays, following further discussion for each is special-purpose.If this purchase is user's initial purchase media file, then import bill information, described bill information comprises payment methods and relevant information and address and telephone contact information.Otherwise the user can select to login and use former payment methods or import new payment methods.
Payment methods are processed.If pay failure, the user just can import different payment methods and retry.If the user selects no longer retry, if or be verified without any the payment methods that provide, transaction just is cancelled, and the denied access media file.Yet, suppose and pay successfully that media file is just untied (step 360), and can suitably be stored in license information in one local data base and/or the central database.
In case solution software has been installed on subscriber equipment, solution software all medium (step 365) on just can inspection user equipment are to determine whether arbitrary media file represents shielded content.This verification can be by the scanning user device memory content and identify known media file with a file identification technology and carry out.Then the media file of being discerned is packed so that make the user can sales promotion or sell he self catalogue storehouse, following further discussion.In special implementation, media file can be based on identification and packaged, perhaps may be not packaged, attempt till I/O system by subscriber equipment sends file up to the user.In addition, may require the user is its arbitrary institute content identified purchasing licensee that does not still have licence.Yet, in some implementations, when being installed, solution software may not wish to require for residing in the file purchasing licensee on the subscriber equipment, whether have this document (if for example installing on the subscriber equipment before the solution software, the user has paid for this document and gone to undue expense) legally because can not determine the user.Yet already present file can be based on to another equipment and/or another user's transmission and packaged on the subscriber equipment.
Fig. 4 is the process flow diagram of process 400 that the content that arrives without any digital packaging on the subscriber equipment is packed, and described subscriber equipment comprises solution software.At first, create a media file (step 405), as described in conjunction with Fig. 3.Media file receives (step 410) by the distribution of media technology of physics or electricity subsequently on the subscriber equipment that comprises solution software.Therefore solution software monitors file I/O system identifies the reception of media file.By using the file identification technology, solution software is by for example extracting a digital finger-print and the fingerprint of this fingerprint and known media type is compared from media file, thereby attempts identification medium file (step 415).Determine whether media file is identified (step 420).If not, suppose that then file is not protected by copyright, perhaps can allow visit (step 425) to media file.
If file is identified, determine then that media file is whether licensed on subscriber equipment, to use and/or use (step 430) by specific user.Usually, when file was identified, the file identification technology can identify the existing UFID that is associated with media file.Use on subscriber equipment in order to determine that media file is whether licensed, solution software can determine whether UFID is stored in the local data base, and described local data base comprises the UFID that permits media file.In some cases, the user has the licence to media file, but license information may not be stored on the subscriber equipment.For example, the user may use different equipment purchases one licence.The business rules of supposing media file not restricting media file is perhaps got rid of the use of media file on current user equipment for the use (being the equipment of initial permission media file on it) of a particular device, then can permit the visit to media file.Thereby, if in local data base, do not find UFID, then can check central database to determine whether the user has the licence of media file.
If determine that media file is licensed, then may allow visit (step 425) to media file.In some cases, may determine to exist an effective licence, and may allow media file, even file is not included in user's the license database.For example, if file is loaded on the subscriber equipment from a compact disk (CD), whether solution software just may identify CD is plant-manufactured, if can be programmed that to attempt xcopy be legal or allow with hypothesis.Thereby solution software may allow from an original CD xcopy, and can be the file storage license information (seeing the step 140 of Fig. 1) that duplicates from original CD.Yet solution software also can be programmed preventing the file that receives from CD is further duplicated.Particularly, solution software can be packed the file that duplicates from CD, perhaps when identifying file, perhaps when to detect file be I/O system transmissions by subscriber equipment.
If media file is not licensed, just provide the chance (step 435) of buying the licence that uses media file to the user.If the user selects not purchasing licensee, then can refuse visit (step 440) to media file.If the user determines to buy a licence, then obtain paying information and send it to central server (step 445) from the user.Suppose and pay successfully, then can suitably be stored in the license information of media file in local data base and/or the central database (step 450).Media file also can packagedly be used for further distribution (step 455), and this has guaranteed that media file is licensed, and can make suitable expense allocation before the media file at other people.As mentioned above, media file can be packed immediately.Perhaps, media file can be left unpacked form on subscriber equipment, and it is just packaged when sending media file only to attempt I/O system by subscriber equipment the user.
Fig. 5 be used to generate the user UCID and/or to the signaling and the process flow diagram of the process 500 of the key of user equipment specific.Usually, each user has a single UCID, and each subscriber equipment has the specialized equipment key of himself.UCID can be used for identifying user with the user license information of visit central server place storage, trace file source with sign pay (promptly when the user his/her UCID has been added to the file packing and with file distributing during to other buyer) and to be used for specific customer equipment identification be to belong to a specific user.The specialized equipment key can be used for release and/or visits local license database and allow the central server marks specialized equipment.By adding one by one simply or passing through according to a certain class encryption algorithm mixing key, UCID and special-purpose subscriber equipment key also can be merged into a combination key.UCID and proprietary user equipment combination of keys are used in the proprietary user equipment that belongs to a specific user distinguishes (for example making central server can follow the tracks of licensed file resident on which equipment).
Process 500 comprises operation on BIOS 510, central server 515 and the central database 520 of subscriber equipment 505, subscriber equipment 505 and communication therebetween.The installation of solution software begins (step 522) on the subscriber equipment 505.As a result, subscriber equipment 505 is to the request of central server 515 transmissions to solution software.In response to request 524, solution software is downloaded 526 to subscriber equipment 505 from central server 515.Solution software can be loaded (for example from be positioned at the file load on the subscriber equipment 505 or load from disk) in this locality, rather than sends request 524 and carry out and download 526.The terms and conditions that can point out the user to accept the licensing agreement of solution software, and can receive the situation of accepting (step 528) of licensing agreement.
The solution software that is loaded on the subscriber equipment 505 comprises the necessary executable code of user related information (step 530) that collection is specific.Some information can be collected automatically, and out of Memory may require user's manual input.For example, can point out the user to input unique user name or " handle (handle) ", password, e-mail address and other user's input information.This information can be used for the out of Memory stored in the licence of calling party and the central database, and/or be used on the subscriber equipment 505 that a plurality of users share visit to the local data base of user's special use.Automatically the information of collecting can comprise the visit and the positional information of device-specific information (for example system's common user ID, CPU ID, MAC Address, BIOS bootstrap block) and local data base.
The solution software that is loaded on the subscriber equipment 505 also is included in the 532 necessary executable codes that connect between subscriber equipment 505 and the central server 515.Generally speaking, the connection of the Internet between subscriber equipment 505 and the central server 515 is made automatically.If it is infeasible to be dynamically connected certainly, the manual process that then begins points out the user to begin a connection (using modulator-demodular unit, network etc.).If do not make any Internet connection, then installation is withdrawed from, and wherein the information of collecting in step 530 can be stored, and uses at the Internet connection time spent trial installation UCID and specialized equipment key but be provided with the back.The installation of solution software is withdrawed from step 522,524 and 526 similarly, if solution software is to install from central server 515.Internet connection is made by the safe lane as the Secure Sockets Layer(SSL).
The information that is sent to central server 515 can be sent out on this safe lane, and information has the additional encryption (for example also using PGP except the encryption that is provided is provided SSL) to its application.The message that is sent to central server 515 can respond with a success or failure code.Can be assumed to be the transmitted message that in a definite reasonable time frame able to programme, does not receive response and fail.By using the connection of being set up, the user profile of collecting in step 530 is sent out 534 to central server 515.
Central server 515 can be searched for 536 central databases 520 to determine whether the user is known.Whether compare the given data item of storage in one or more data item of user profile and the central database 520 known comprising to determine the user.For example, if user name in central database 520 but password do not match, then can point out the user with the login of correct password and/or notify this user name of user to be used.
If the user is not known, central server 515 just generates a UCID and/or a Device keys (step 538).UCID and Device keys can produce by making up selected quantity data item, described data item can be selected from various data available items, the visit of the user profile that receives that comprises the device-specific information that receives, collects from user's input, the local data base that receives and positional information, the data that generate by central server 515 and with the date and time or the relevant information of out of Memory of transaction.As mentioned above, UCID can with the specialized equipment cipher key combinations to create a combination key.Which data item is used and how data item is combined can be defined by the algorithm of storage in the central server 515.By generate UCID, Device keys and/or combination key at central server 515 places, then can generate at central server 515 places UCID, Device keys and/algorithm of combination key keeps safety, this can help prevent the user can generate UCID, Device keys and the combination key of personation.In addition, by using the information lacked than the whole user profile that receive from subscriber equipment 505 and/or selecting some data item to be used to generate UCID randomly, and, can further stop the reverse-engineering of UCIS, Device keys and combination key and/or the algorithm of generation UCID, Device keys and combination key by before UCID is sent to subscriber equipment 505, UCID being encrypted.
UCID, Device keys, combination key and/or additional machine specific information and other user profile become storage 540 in central database 520.UCID, Device keys and/or combination key also encrypted (step 542), UCID, Device keys and/or the combination key of encrypting is sent out 544 to subscriber equipment 505, and subscriber equipment 505 stores 546 to the UCID that encrypts, Device keys and/or combination key in BIOS 510.Key can be divided into a plurality of parts, and different keys partly can be stored in the position that separates among the BIOS.UCID, Device keys and/or combination key can be represented a PKI, and this PKI is used for the message between client computer and the central server is encrypted subsequently.Local license database is created (step 548) on subscriber equipment 505.For example, move a part of solution software code so that on subscriber equipment 505, create an encrypted license database.By the database and/or the information of storing in the database are encrypted, may prevent that the information that comprises in the database is readable, unless used suitable key.Generally speaking, license database is created on the hard disk driver of subscriber equipment 505, and a position indicator pointer is stored among the BIOS 510, but license database also can be created in BIOS 510.UCID that encrypts and Device keys and/or combination key (it comprises one or more position indicator pointers) use an industrial standard process to be written into BIOS, and described process is such as the Desktop Management Interface that is used to store extended data structure (DMI).
The consumer has a plurality of equipment and hope can use the file of having permitted on each equipment usually.Therefore in some cases, process 500 can begin on a new equipment, but is begun by the user who has UCID.Based on UCID, username and password and/or other identification information, central server 515 can determine that during search 536 user is known.The user still can install solution software on miscellaneous equipment, and logins with his/her username and password.Central server 515 can generate new UCID and generate a new equipment key (in step 538), and with new equipment information updating combination key.Like this, combination key can comprise the UCID and the device-specific information (for example specialized equipment key) of the armamentarium that the user has or uses.
When combination key was received by central database, combination key can be the known equipment of new equipment or user (using the device-specific information that comprises in the combination key) with identifying user (using the UCID part of combination key) and definite subscriber equipment by the central server deciphering.If equipment is a new equipment, new equipment just can be added to registered user's known device tabulation, and this equipment is permitted based on the licence of respective files then and used data file (for example can use the distinct device number of a media file under the situation of not buying additional license thereon).Combination key (and new equipment key) after UCID and/or the renewal also can be added to the BIOS of new equipment, and the equipment that makes can be associated with special user.When user's miscellaneous equipment was linked central server next time, the combination key after UCID and/or the renewal also can be added to the BIOS of user's miscellaneous equipment.Specialized equipment also can be associated with a plurality of users, and wherein each user has a license database that separates, and the license database that separates can be distinguished with a username and password.In addition, for the equipment that does not have solution software but be authorized to communicate by letter, can allow this equipment to use file through permitting based on the license information that is arranged in the licence storehouse with the licence storehouse in local data base or the central database 520.
In some cases, the equipment temporary visit that may allow the user to use for example to use is through the file of permission.For example, the user may wish to listen to a music file when friend's family.In this case, can be added to an optional equipment (for example having due date/time) to this equipment, file can licensed temporary permit to equipment temporarily, and perhaps file can be provided for this equipment with stream format.Yet, allow other people to visit their licence in order to prevent the user, the user may be limited to have can the licensed one limited time of the login of a while and/or this temporary permit at every turn or once only licensedly give an equipment.
Fig. 6 is signaling and the process flow diagram that has been used to visit the process 600 of this media file when the user has had the licence of media file.Process 600 comprises operation on BIOS 610, local data base 615, central server 620 and the central database 625 of subscriber equipment 605, subscriber equipment 605 and communication therebetween.Subscriber equipment 605 receives the file of a packing in the step 315 of Fig. 3.When the user attempts to open the file of this packing, can carry out packaging code and on subscriber equipment 605, move (step 630).Executable code may make subscriber equipment 605 effective installation (step 635) of check solution software earlier.Suppose and find effective installation, executable code may make effective UCID, Device keys and/or combination key (step 640) among the subscriber equipment 605 check BIOS 610, this step is included in when solution software is installed and writes under the situation of key, and the storer that the DMI form is carried out reads.
If find effective UCID, Device keys and/or combination key, the solution software on the subscriber equipment 605 just can be checked licence to packed file in the local data base 615 by sending a file license request 642.This search can be implemented (described UFID is included in the digital packaging) by the UFID of identification medium file and is attempted locating UFID and implement in local data base 615.Local data base 615 can be by comparing release to the unique machine information in one or more keys of storing among the BIOS and actual unique machine information.If information matches, solution software just can be deciphered local data base to read license information.If information does not match, then can design key, make to the trial of deciphering local data base can be not successfully unwarranted the duplicating of opposition license database to a distinct device (for example with), wherein have necessary contact central server 620 to obtain the authorization or registered user's equipment 605 (see figure 5)s.Deciphering to the license information that comprises in local data base 625 and/or the local data base 625 can be carried out with the digital cipher of storing among the BIOS, so that release local data base 625 or its content.
Suppose that local data base 625 is successfully deciphered, just response 644 that comprises necessary license information or the present indication of not permitting of expression file are turned back to subscriber equipment 605 on subscriber equipment 605.If returned license information, just allow visit (step 685) to file.Otherwise, have necessary visit central database 625 to determine that whether subscriber equipment 605 is an equipment of authorizing and/or determine whether to exist effective licence.When each visit central server 620 and/or central database, all be necessary the key stored on test subscriber's equipment the subscriber equipment 605 of relate to guarantee to communicate by letter effectively, authorizing with respect to canned data in the central database 625.Following steps have been described the test of a combination key.Although can use a combination key, other implementation also can be used UCID, Device keys and/or out of Memory.If in BIOS 610, find a combination key, then key that finds and additional machine specific information (being information or some information that original usefulness generates combination key) are sent 645 together and arrive central server 620 for checking.The combination key deciphering that 620 pairs of central servers receive is to search UCID (step 650) and embedded facility information.Central server calculates a verification and (step 655) for the unencrypted combination key in addition.Then, central server is with respect to the combination key (step 660) of canned data checking not encrypted in the central database.The checking combination key can comprise to verification and calculating.If canned data is complementary in unencrypted combination key, UCID and machine information and the central database, then the mandate 665 that continues is sent to subscriber equipment 605, the good authentication of expression combination key.If combination key be personation or from another device replication, then the machine specific information that sends together with combination key can not be complementary with canned data in the information that comprises in the unencryption key and the central server.
In response to authorizing 665, described mandate can be used once when linking central database 625 in each session, executable code makes the UFID of subscriber equipment 605 by trial positioning media file in local data base 615, thereby whether the licence (step 675) of media file is arranged in the search local data base 615.In some cases, if for example but the key information of local storage is destroyed by authorizing 665 to be updated, even so original search (642) is unsuccessful, this search also may success.If in local data base 615, do not find UFID, can search for then whether UFID is arranged in the central database 625.If in central database 625, find UFID, then upgrade 680 local data bases with license information.Suppose and located a licence, then allow to use media file (step 685).For example, solution software allows a media player application program to visit the music file of being asked.In some implementations, in case allow to use a media file on a specific subscriber equipment 605, this media file just is stored on the subscriber equipment 605 with unpacked form.Only software detection to media file when subscriber equipment 605 is replicated or moves on another equipment or the storage medium, just by solution software repeated application packing, can determine by Monitoring Files I/O system as mentioned above.In other implementation, media file can be stored on the subscriber equipment 605 with the form of packing, and can be when opening media file at every turn, unties with the license information of storing in the local data base 615 and packs.
Fig. 7 is under the user does not have the situation of licence of media file, is used for the signaling and the process flow diagram of the process 700 of media file.Process 700 comprises the operation and communicating by letter therebetween on subscriber equipment 705, local data base 715, central server 720 and the central database 725.Process 700 is to determine that the user does not have the licence of media file to begin (step 730).This determines to make in the step 675 of Fig. 6 the result to the failed searches of licence.Determine that in response to this subscriber equipment 705 notifies 735 central servers 720 to need a licence.Central server 720 responds with a payment request 740, and this request 740 is presented on the subscriber equipment 705 or the user is directed to the website that can obtain the information of paying.Subscriber equipment 705 receives paying information (step 745) from the user, and paying information is sent to central server 720.Paying information processed (step 755), comprise define how many licence fees be assigned to content everyone and/or be assigned to one or more users with disributed media file.Central database 725 usefulness represent that the information of the existing media file licence of user upgrades 760.Central database 725 also can upgrade with the paying assignment information.In addition, local data base 715 usefulness represent that the information of the existing media file licence of user upgrades 765.Based on the license information after upgrading, may allow the user to use media file (step 770) on the subscriber equipment 705.
If for example equipment can not be linked the Internet easily, then some equipment perhaps can not with the central server direct communication.The mode that media file can stop media file further not to be transferred to miscellaneous equipment with packing is transferred to this equipment.In these cases, the computer code part can be installed in the firmware, and small-sized local license database can be installed in the writable memory of equipment.Fig. 8 is signaling and the process flow diagram that is used for media file is duplicated or moves to from subscriber equipment 805 process 800 of secondary device 810.Process 800 comprises the operation and communicating by letter therebetween on subscriber equipment 805, secondary device 810, local data base 815, secondary device database 820 and the central server 825.Secondary device 810 for example can be: automobile audio system, cell phone, MP3 player or other portable set that satellite connects, and can link subscriber equipment with a cable, described cable includes but not limited to: IEEE 1394 firewire or USB cable perhaps can connect by wireless connections.A solution software version can be installed (for example when dispatching from the factory) on secondary device 810 in advance.
The request of transmission medium file is received (step 830) by subscriber equipment 805.In response to this, subscriber equipment 805 is to secondary device 810 requests one device id.Secondary device responds 840 with its device id.Subscriber equipment 805 confirms that the business rules that comprises allows the transmission (step 845) of being asked in the packing of media file.For example, business rules can be made restriction to the number of devices that media file copied to.Suppose that transmission is allowed to, then Bao Zhuan media file and corresponding license information can be transmitted 850 to secondary device 810.Secondary device 810 can be stored in license information in the secondary device database 820 (step 855).Collaborative preassembled solution software, license information can allow the media file of secondary device 810 visit packings.In addition, subscriber equipment 805 can upgrade the local license information (step 860) in the local data base 815.This renewal can be stored such information, and a copy of described information representation media file has been transferred to secondary device 810.
Subsequently, can set up 865 between subscriber equipment 805 and central server 825 connects.This connection can be set up in response to following attempt or requirement: the attempt of visit new media file, the attempt of location license information or the licence of subscriber equipment 805 periodically being verified storage in the local data base 815 are to continue the requirement of occupancy permit.By using this connection, the licence of storage upgrades and can be uploaded 870 to central server 825 (and being stored in the central database) in the local data base 815, makes central server can keep following the tracks of on it and has located the equipment of media file copy and prevented that media file is copied on the equipment more equipment that allows than business rules.Central server 825 also can be verified the existing licence of storage in 875 local data bases 815.
Also can provide technology, with the distribution of supporting media file between the user and make the user can benefit from the income that its media file produces to the result of other people distribution.The user can electronics mode send other the relevant consumer information of media file that has or appreciate with him.If make sale owing to transmitting the result, the user may earn the certain percentage of the income that follow-up sale generated of media file sale and media file.Media file comprises such information, and described information receives under the situation of media file from a person of reselling who identifies and distributor the user, the information that identifies original person of reselling and distributor and identify the user of further distribution media file.Based on the business rules that is associated with file, this information makes the person of reselling and user can receive the compensation of the purchase of making when transmitting media file.In addition, when file was sent out or receives with unpackaged form, the user of indication, the person of reselling and distributor still can be compensated, as long as their unique identification is included in the transaction data.For example, the buyer may identify the user of an indication, and central server can determine how the user of indication receives file and reconstruct distribution chain under this situation, comprises that those people of sign should share income.
Business rules can determine not have the user of media file licence whether still can benefit from the distribution again of media file.For example, the user can be stored at file on the server, as point of departure again and again, and can receive the transmission participating fee, even the user does not have the licence of the file that he is distributing.
Begin when friend sends the process of file as the people, the up-to-date packing version of solution software creation media file is prepared media file is used for transmittance process.This new packing comprise media file UFID, be applied to the business rules of media file and the UCID of originating user, the user is compensated when the song that sales promotion is bought by the user that receiving.The person of reselling and distributor's id information also can be included in the packing.When using subscriber equipment to move (rip) CD or DVD, solution software is carried out same process.For example, when the song on the CD was moved on the computing machine, the licence of song was installed in the license database.Subsequently, if the I/O system transmissions song by computing machine, then a packaging applications in song.Packing can comprise permission and paying information, and described information can be based on the song identity information that comprises in institute's move or based on the song identity information with file identification technology discussed above acquisition, and searched from central database.If song is burnt on the CD, the file of packing just can be written into CD.Perhaps, solution software can be created a pair of session id in the PC of CD readable region, and this pair session id comprises the media information file, such as the UFID and the UCID that have the person of reselling and distributor's information.In two session CD forms, the traditional audio file of audio portion branch permission at CD allows CD to play on the CD Player of routine.Yet if file is loaded in the equipment that solution software is installed on it, file can require permission.
Fig. 9 illustrates the process flow diagram that is used to carry out the illustrative process 900 of transmitting distribution.At first, user 2 receives a media file (step 905) from user 1.User 2 buys the licence (step 910) of the media file that receives from user 1.In conjunction with payment process, the business rules (step 915) that check and media file are associated.This check can be on subscriber equipment, carry out at the central server place or in the another position.Then, user 1 on commission one by the specified quantity (step 920) of business rules.Trust can be deposited in the little paying account of being managed by central server, can be deposited in user 1 for the account No. that is used to buy the media file licence or can be stored in user 1 by little charging system in the future.
Subsequently, user 3 receives a media file (step 925) from user 2.User 3 buys a licence (step 930) for the media file that receives from user 2.In conjunction with payment process, check and the business rules (step 935) that is associated of media file once more.Then, user 1 and user 2 on commission one by the specified quantity (step 940) of business rules.Thereby, can make multistage paying to the distribution of media file.
In some implementations, central server trusted and tracking are from all accounts of user's transduction activity, such as savings account.Everyone all follows the tracks of and uses their fund all accounts, or is used for additional music is paid, or recalls as fund, and described fund is recalled and will be transferred by electronic funds transfer (EFT) or other proper method monetization fund.All each side that this is applied to participate in revenue stream comprise user, the person of reselling, distributor and Content Management person, such as record company, publisher and artist.The bet amount of levels of payment number and each grade is all set up by everyone (normally copyright holder or publisher) of file when creating UFID, and can change according to business rules.
Figure 10 is the process flow diagram that is used for the process 1000 of packing one media file.This process is from selecting to want packaged media file (step 1005).Identify the business rules (step 1010) that will be associated with media file.Business rules can be set up by everyone or publisher of media file.Business rules can comprise paying information and the information relevant with the restriction of duplicating the aspect with the purposes of media file.For media file generates a UFID (step 1015).UFID can comprise business rules and/or can be used as the pointer that is stored in the business rules in the central database of finger.Generally speaking, UFID relevant with specific works (for example specifying artistical appointment recording), and no matter one to specify the copy of works be packing or unpacked.Thereby when using the file identification technology to identify a media file, the media file of being discerned has and the corresponding specific UFID of this media file.Then, the packaging applications that comprises UFID in media file (step 1020).Packing generally comprises the encryption of media file, makes the user only can remove this with the licence of media file and packs.Move the file that does not have packing although solution software has generally been got rid of, yet have such situation, wherein can not pack and move, if such as user's burning one standard audio CD, and the content of CD is moved to another computing machine subsequently.When file is not moved with having packing, can uses recognition technology to identify this document, and in central database, search relevant UFID and business rules thereof.
Described technology can make up with digital circuit, integrated circuit or with computer hardware, firmware, software or its and realize.The device that is used to realize described technology can realize that this software product is embodied on the machine readable storage device of being carried out by programmable processor with a software product (for example computer program); Handling operation can be carried out by a programmable processor, and this programmable processor is carried out described function by output is operated and generated to the input data thereby carry out an instruction repertorie.Described technology is preferably in one or more software programs and realizes, described software program can be carried out on a programmable system, described programmable system comprises at least one programmable processor, at least one input equipment and at least one output device, and wherein said programmable processor is used for receiving data and instruction and described data and instruction being sent to wherein from data-storage system.Each software program can be realized with senior processor-oriented or object oriented programming languages, perhaps realize with assembly language or machine language as required; In either case, described language can be language compiling or decipher.
For example, suitable processor comprises general and special-purpose microprocessor.Generally speaking, processor can receive instruction and data from ROM (read-only memory), random access memory and/or machine-readable signal (for example digital signal that receives by network).Generally speaking, computing machine can comprise the one or more large storage facilities that are used for storing data files; These equipment comprise disk, such as interior hard disk and removable dish, magneto-optic disk and the CD of connecing.The suitable memory device that visibly embodies software program instructions and data comprises the nonvolatile memory of form of ownership, comprise for example semiconductor storage unit, such as EPROM (EPROM), EEPROM (Electrically Erasable Read Only Memory) and flush memory device; Such as interior hard disk and the such disk of removable dish of connecing; Magneto-optic disk; And CD-ROM dish.Above-mentioned any all can be realized or be combined among the ASIC by ASIC (application specific integrated circuit).
In some implementations, subscriber equipment possibility neither one can or be enough to the local storage medium or the storer of storage solution software and/or local license database, and wherein file shows, plays or be delivered to the user on described subscriber equipment.In this case, file can be spread and deliver to subscriber equipment or temporarily be stored on the subscriber equipment.Therefore thereby processor of operational solution software can be positioned at long-rangely on it, and the control visit to file also can be positioned at long-range.This teleprocessing unit can be used as the agency of subscriber equipment that can not local canned data.
For mutual with the user is provided, described technology can realize on the computer system with display device and keyboard and indicating equipment, described display device is such as the monitor or LCD (LCD) screen that are used for to user's display message, described keyboard and indicating equipment such as: the user provides input used mouse or trace ball to computer system; Perhaps can be by the system of phonetic entry and presentation information; Perhaps other device as Braille input and output system.Computer system can be programmed so that a graphic user interface to be provided, and computer program is by described interface and user interactions.Had after the new technology as phonetic entry and output, just need not have a visual display unit to realize described technology.
Multiple implementation has been described.Yet be appreciated that and make various modifications.For example, the step shown in Fig. 1 and the 3-10 in the process can rearrange, and/or can omit specific step.Thereby other implementation is also in the scope of following claim.

Claims (118)

1. method that is used for managing digital rights, described method is characterised in that:
Detect the data file on the subscriber equipment, wherein said data file comprises a digital packaging that is used to prevent visit data file when not having effectively to authorize;
Use the data of the nonvolatile storage stored of subscriber equipment to search for the information relevant with the mandate of visit data file; And
If find the mandate of visit data file at searching period then forbid described digital packaging.
2. the method for claim 1 is characterized in that, described data file comprises a media file.
3. method as claimed in claim 1 or 2 is characterized in that, implements in the license database of search on subscriber equipment that the information relevant with the mandate of visit data file is carried out.
4. method as claimed in claim 3 is characterized in that described license database is arranged in the nonvolatile storage of subscriber equipment.
5. method as claimed in claim 4 is characterized in that, the nonvolatile storage of described subscriber equipment comprises a basic input/output (BIOS).
6. as the described method of arbitrary claim 3-5, it is characterized in that the data of storing in the nonvolatile storage of subscriber equipment comprise the position of license database.
7. as the described method of arbitrary claim 3-6, it is characterized in that the data of storing in the nonvolatile storage of subscriber equipment comprise the access key of license database, described access key is that access permission card database is necessary.
8. as the described method of arbitrary claim 3-7, it is characterized in that described license database comprises the access key of described data file, described access key is that the described packing of forbidding is necessary.
9. as the described method of arbitrary aforementioned claim, it is characterized in that the search that the information relevant with the mandate of visit data file is carried out is to implement in the license database relevant with a remote server.
10. method as claimed in claim 9, it is characterized in that, the search that the information relevant with the mandate of visit data file is carried out is in response to one and determines to implement that the local data base on described definite expression subscriber equipment does not comprise the information relevant with the mandate of visit data file in the license database relevant with described remote server.
11. as claim 9 or 10 described methods, its feature also is the identification data of subscriber equipment is sent to central server, wherein said identification data is applicable to and allows central server to verify described subscriber equipment.
12. method as claimed in claim 11 is characterized in that, described identification data comprises and following at least one digital cipher that is associated:
Subscriber equipment; And
The user who is associated with described subscriber equipment.
13. as the described method of arbitrary aforementioned claim, its feature also is:
Propose to buy mandate to the visit data file;
Receive the situation of accepting that described proposal is bought; And
Forbid described digital packaging in response to the acceptance of proposing.
14. method as claimed in claim 13, its feature also is:
The acceptance of described proposal is sent to a central server;
Receive a message in response to the acceptance of described proposal from described central server, the data that comprise in the wherein said message are used to forbid described digital packaging.
15. method as claimed in claim 14, its feature also are the identification data of described subscriber equipment is sent to central server, wherein said identification data is applicable to and allows central server to verify described subscriber equipment.
16. method as claimed in claim 15 is characterized in that, described identification data comprise with subscriber equipment and the user relevant with subscriber equipment at least one digital cipher that is associated.
17. as the described method of arbitrary claim 13-16, its feature also is, the relevant information of mandate of the data file on storage and the calling party equipment.
18. as the described method of arbitrary aforementioned claim, its feature also is, if if do not find the mandate of visit data file and do not accept at searching period the proposal of the mandate of visit data file is bought, the described data file of denied access then.
19. as the described method of arbitrary aforementioned claim, it is characterized in that, the search that the information relevant with the mandate of visit data file is carried out comprises: determine whether subscriber equipment comprises the software that is used for forbidden digit packing, described definitely make with the executable instruction of storing in the digital packaging.
20. a method that is used for managing digital rights, described method is characterised in that:
Detect the data file on the subscriber equipment, described method is characterized by:
Use a file identification algorithm to identify described data file;
Use the data of storing in the nonvolatile storage of subscriber equipment to search for the information relevant with the mandate of visit data file; And
If find the mandate of visit data file, then allow the described data file of visit at searching period.
21. method as claimed in claim 20 is characterized in that, described file identification algorithm comprises a digital finger-print detection technique.
22., it is characterized in that described data file comprises a media file as claim 20 or 21 described methods.
23. as the described method of arbitrary claim 20-22, it is characterized in that the search that the information relevant with the mandate of visit data file is carried out is to implement in the license database on subscriber equipment.
24. as the described method of arbitrary claim 20-23, it is characterized in that, the Data Identification of storing in the nonvolatile storage of subscriber equipment the position of license database in the volatile storage area of subscriber equipment.
25. as the described method of arbitrary claim 20-24, it is characterized in that the search that the information relevant with the mandate of visit data file is carried out is to implement in the license database that is associated with a remote server.
26. as the described method of arbitrary claim 20-25, its feature also is:
Propose to buy mandate to the visit data file;
Receive the acceptance that described proposal is bought; And
Allow to visit described data file in response to the acceptance of described proposal.
27. method as claimed in claim 26, its feature also be, the acceptance of buying in response to described proposal, and in the database of information stores on subscriber equipment relevant with the mandate of visit data file.
28. as the described method of arbitrary claim 20-27, its feature also is to use a digital packaging to described data file, described digital packaging and the file that is identified are associated.
29. one kind is carried out the distribution of income method in conjunction with the distribution of digital right, described method is characterised in that:
Receive a data file on subscriber equipment, described data file comprises a digital packaging, and described digital packaging comprises the information relevant with at least one distributor of data file;
Reception is to the request of the right of purchase visit data file;
From described digital packaging, extract the information relevant with at least one distributor; And
Based on the information of being extracted the letter of credit is distributed to described at least one distributor.
30. method as claimed in claim 29 is characterized in that, described digital packaging comprises also and the specified relevant information of loyalty distribution that described loyalty is distributed and the right purchase of visit data file is associated.
31. method as claimed in claim 30 is characterized in that, the information of being extracted comprises a unique file identifier, and the feature of described method also is: use described unique file identifier to search in distributor's information and the loyalty assignment information at least one.
32. method as claimed in claim 31 is characterized in that, the information of being searched is to search from being positioned at the long-range central database of subscriber equipment.
33. as the described method of arbitrary claim 29-32, its feature also is, the request of buying is sent to a central server, and letter of credit memory allocated in the database relevant with described central server.
34. one kind is carried out the distribution of income method in conjunction with the distribution of digital right, described method comprises the user of identifying user equipment, and described method is characterised in that:
Receive a data file on subscriber equipment, described data file comprises a digital packaging, and described digital packaging comprises the information relevant with one or more distributors of described data file; And
Revise described digital packaging to comprise the information relevant with described user ID, the data file that wherein detects amended digital packaging can be distributed to the user to the letter of credit.
35. method as claimed in claim 34 is characterized in that, described digital packaging is applicable to and prevents from not have the described data file of effective mandate accessing.
36. as claim 34 or 35 described methods, its feature also is:
The data file that amended digital packaging is arranged is sent to the equipment relevant with the consumer;
Receive the request of buying the visit of data file from described consumer device; And
Forbid the digital packaging on the described consumer device in response to the request that receives.
37. method as claimed in claim 36, its feature also are, at the letter of credit of described one or more distributor's distributed amongst consumers purchases.
38. as the described method of arbitrary claim 34-37, it is characterized in that the information relevant with user ID comprises unique user identifier of user, described unique user identifier is specified by a central server.
39., it is characterized in that described data file comprises a media file as the described method of arbitrary claim 34-38.
40. a method of being convenient to the digital rights management on the subscriber equipment, described method comprises:
Collect the information relevant with subscriber equipment from subscriber equipment, the described information relevant with subscriber equipment comprises the unique identifier data of subscriber equipment, and described method is characterized by:
The information that use is collected generates a digital cipher;
Store described digital cipher;
Encrypt described digital cipher;
Described digital cipher is sent to subscriber equipment for being stored on the subscriber equipment;
Receive encrypted secret key and the information relevant from described subscriber equipment with subscriber equipment; And
Verify described subscriber equipment at least two in the encryption key that use receives, the information that receives and the digital cipher stored.
41. method as claimed in claim 40, its feature also is: the subscriber-related identification information of collection and subscriber equipment, described digital cipher are that usefulness and subscriber-related identification information generate.
42., it is characterized in that the information of collecting is to collect according to the executable code of storing on the subscriber equipment as claim 40 or 41 described methods.
43., it is characterized in that described digital cipher is generated and storage by a central server as the described method of arbitrary claim 40-42.
44., it is characterized in that verifying user equipment comprises as the described method of arbitrary claim 40-43:
Encryption key is decrypted; And
Encryption key and the digital cipher of being stored are compared.
45., it is characterized in that verifying user equipment comprises as the described method of arbitrary claim 40-44:
The information relevant with subscriber equipment that use receives generates a digital cipher; And
Described digital cipher and the digital cipher of being stored are compared.
46. as the described method of arbitrary claim 40-45, its feature also is, authorizes the visit to license database in response to verifying user equipment.
47. as the described method of arbitrary claim 40-46, its feature also is, authorizes the visit to digital document in response to verifying user equipment.
48., it is characterized in that described unique identification data is to extract from the nonvolatile storage of subscriber equipment as the described method of arbitrary claim 40-47.
49. a method that is used for managing digital rights, described method is characterised in that:
For the attempt file transfer and the input/output of monitoring user equipment;
Detect the attempt of transmission one data file by described input/output;
Use a digital packaging in the described data file of transmission forward direction that allows to be attempted, described digital packaging is applicable to the unwarranted visit that prevents the data file.
50. method as claimed in claim 49 is characterized in that, described data file comprises a media file.
51. as claim 49 or 50 described methods, its feature also is to identify described data file, wherein said digital packaging is based on the identity of described data file and uses.
52. as the described method of arbitrary claim 49-51, it is characterized in that described digital packaging is based on the identity of described data file and the subscriber equipment in the database coupling of the sign of data file and uses.
53., it is characterized in that the identification data file comprises use one file identification algorithm as claim 51 or 52 described methods.
54. as the described method of arbitrary claim 49-53, it is characterized in that, described digital packaging comprise the information that identify described data file and with the relevant information of letter of credit distribution, the purchase of the described letter of credit and data file is associated.
55. a method that is used for managing digital rights, described method is characterised in that:
Identify the digital document on first subscriber equipment, wherein said digital document is obeyed a licence, and described licence meets the license information of storing on first subscriber equipment;
Reception copies to digital document the request of second subscriber equipment from described first subscriber equipment;
Obtain and the relevant information of described second subscriber equipment, comprise the unique identification data of second subscriber equipment;
Described digital document is copied to described second subscriber equipment from described first subscriber equipment;
On described first subscriber equipment, store data, described Data Identification the digital document that duplicated and identified described second subscriber equipment.
56. method as claimed in claim 55, its feature also are, and be synchronous data of storing on described first subscriber equipment and a central database.
57. as claim 55 or 56 described methods, its feature also is, determines that duplicating of the digital document of being asked is based on described license information and is authorized to.
58., it is characterized in that described license information is included in the digital packaging of described digital document as the described method of arbitrary claim 55-57.
59. as the described method of arbitrary claim 55-58, its feature also is, the license information of described digital document is stored on described second subscriber equipment.
60. a method that is used for managing digital rights, described method is characterised in that:
The media file that sign is used to distribute;
Identify the access rule relevant with described media file, wherein said access rule comprises the information relevant with the right to use and cost of use;
To described media file application one digital packaging, described digital packaging comprises the identification data and the data relevant with access rule of described media file, and described digital packaging is applicable to the unwarranted visit that prevents media file.
61. method as claimed in claim 60 is characterized in that, described digital packaging is applicable to that the user by the licence with media file uses media file to forbid.
62., it is characterized in that described digital packaging also comprises the information relevant with at least one distributor of described media file as claim 60 or 61 described methods.
63. a method that is used for managing digital rights, described method is characterised in that:
With license information one media file is encoded;
Lock described media file to prevent unwarranted visit with a digital packaging;
Media file through packing is loaded on the subscriber equipment;
Instruction is installed to allow the described media file of release on described subscriber equipment, wherein said instruction is used to identify described media file, and send a message according to the license information of in media file, encoding to remote server, so that obtain to use the licence of described media file;
Receive the licence of the described media file of visit from described remote server; And
The described licence of permission use visits the media file on the described subscriber equipment.
64. as the described method of claim 63, its feature is that also storage is used to visit the licence of the media file on the described subscriber equipment.
65., it is characterized in that described licence comprises the data that are used for the release media file as claim 63 or 64 described methods.
66. a system that is used for managing digital rights, described system is characterised in that:
Central database is used to store the identifier of a plurality of digital documents and is used to store the user license that uses digital document;
Central server, be used for receiving message from remote equipment by network, each message that receives all comprises user's the user identifier and the identification information of digital document, described central server also is used to handle the paying information of licence, to use described digital document, store an information that the licence that uses digital document is associated with the user and the license information of digital document is sent to remote equipment; And
Described license information is applicable to and makes remote equipment can allow the user to use described digital document.
67. as the described system of claim 66, it is characterized in that, described central server also is used for receiving one or more digital ciphers from described remote equipment, and to described one or more digital ciphers deciphering so that verify among described remote equipment and the described user identity of at least one.
68., it is characterized in that described central server also is used for being used to verify described remote equipment from described remote equipment receiving equipment exclusive data as claim 66 or 67 described systems.
69. as the described system of arbitrary claim 66-68, it is characterized in that described remote equipment comprises a server, described server is applicable to supports digital document to transmit to the stream with user-dependent subscriber equipment.
70., it is characterized in that the described license information of described remote device stores as the described system of arbitrary claim 66-69.
71., it is characterized in that described remote equipment comprises the subscriber equipment that is associated with described user as the described system of arbitrary claim 66-68.
72. as the described system of claim 71, it is characterized in that, described central server also is used for sending to described subscriber equipment from described subscriber equipment reception information, generation with at least one digital cipher that is associated of user and subscriber equipment and described digital cipher, and described digital cipher is applicable to and allows access permission card information, the license database that comprises license information and at least one in the digital document.
73. as the described system of arbitrary claim 66-72, it is characterized in that described license information comprises and is applicable to that forbidding is applied to the data of digital packaging of digital document.
74. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Detect the data file on the subscriber equipment, described data file comprises a digital packaging, and described digital packaging prevents to visit described data file when effectively not authorizing;
Use the data of storing in the nonvolatile storage of subscriber equipment to search for the information relevant with the mandate of visit data file; And
If find the mandate of visit data file at searching period, then forbid described digital packaging.
75., it is characterized in that the data of storing in the nonvolatile storage comprise the digital cipher that is used for the license database on the calling party equipment as the described article of claim 74.
76., it is characterized in that the data of storing in the nonvolatile storage comprise the positional information of license database as claim 74 or 75 described article.
77. as the described article of arbitrary claim 74-76, it is characterized in that the mandate of visit data file comprises the digital cipher that is used to forbid described digital packaging, described forbidden digit packing is to carry out with described digital cipher.
78. as the described article of arbitrary claim 74-77, it is characterized in that, the instruction that the storage of described machine readable media makes one or more processors carry out further operation comprises: monitor the file input system of described subscriber equipment, the data file on the wherein said detection subscriber equipment is that the result according to the Monitoring Files input system carries out.
79. as the described article of arbitrary claim 74-78, it is characterized in that, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation:
Detect the Device keys of storing on the subscriber equipment; And
Verify that described Device keys is to determine whether described subscriber equipment is once the equipment of authorizing, if described subscriber equipment is not authorized equipment then does not forbid digital packaging.
80. as the described article of arbitrary claim 74-79, it is characterized in that, the instruction that described machine readable media storage makes one or more processors carry out further operation comprises: if do not find the mandate of visit data file on subscriber equipment, then send a request message to remote server, request is to the mandate of visit data file.
81., it is characterized in that described request message comprises the request to the mandate of buying the visit data file as the described article of claim 80.
82. as the described article of claim 80, it is characterized in that, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation:
Receive a response message in response to described request message, wherein said response message comprises visiting the mandate of described data file; And
Use the mandate that comprises in the described response message to forbid described digital packaging to the visit data file.
83. as the described article of arbitrary claim 74-82, it is characterized in that, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation:
If do not find mandate to the visit data file at searching period, then the user to subscriber equipment provides the proposal of visit data file to buy;
Receive the situation of accepting that described proposal is bought; And
Store the indication of the situation of accepting of described proposal purchase.
84. as the described article of claim 83, it is characterized in that, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation: the indication of the situation of accepting of described proposal purchase is sent to a remote server.
85. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Detect the data file on the subscriber equipment;
Use a file identification algorithm to identify described data file;
Use the data of storing in the nonvolatile storage of subscriber equipment to search for the information relevant with the mandate of visit data file; And
If find mandate, then allow the described data file of visit to the visit data file at searching period.
86. as the described article of claim 85, it is characterized in that, described machine readable media storage instruction, described instruction make one or more processors carry out further, and operation comprises: monitor the input system of described subscriber equipment, wherein said detection data file takes place as the result who monitors.
87., it is characterized in that the data of storing in the nonvolatile storage comprise the digital cipher that is used for the license database on the calling party equipment as claim 85 or 86 described article.
88., it is characterized in that the data of storing in the nonvolatile storage comprise the positional information of described license database as the described article of arbitrary claim 85-87.
89. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
The information that reception is extracted from the digital packaging that is applied to a data file, the information of being extracted comprises the sign of described data file;
Reception is to the request of the mandate of purchase visit data file;
At least one distributor based on the described data file of being extracted of message identification; And
The letter of credit is distributed to the distributor who is identified according to predefined distribution structure.
90., it is characterized in that the information of being extracted comprises the identifier that is associated with each distributor who is identified as the described article of claim 89.
91. as the described article of arbitrary claim 89-90, it is characterized in that it is according to the information and executing of being extracted that the letter of credit is distributed to the distributor who is identified.
92. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Storage one data file on subscriber equipment, described data file comprises a digital packaging, described digital packaging comprises at least one or the relevant information of a plurality of distributor with described media file;
Identify the user of described subscriber equipment;
Revise described digital packaging and can distribute to the user to the letter of credit to comprise the information relevant, wherein to detect data file with amended digital packaging with user ID.
93., it is characterized in that described digital packaging comprises and the relevant information of letter of credit distribution that is user's appointment as the described article of claim 92.
94., it is characterized in that described digital packaging is used for preventing the visit data file when the effective mandate that does not have the visit data file as claim 92 or 93 described article.
95. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Receive the information relevant with subscriber equipment from described subscriber equipment, the information that receives comprises the unique identification data of described subscriber equipment;
The information that use receives generates a digital cipher;
Store described digital cipher;
Encrypt described digital cipher;
Encrypted secret key is sent to subscriber equipment be used to be stored in subscriber equipment;
Receive described encryption key and the information collected relevant with subscriber equipment from described subscriber equipment, the information of collecting is collected according to the instruction of storing on the subscriber equipment by subscriber equipment; And
Verify described subscriber equipment at least two in the encryption key that use receives, the information of collecting and the digital cipher stored.
96. as the described article of claim 95, it is characterized in that, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation:
From the request of described subscriber equipment reception to the mandate of visit data file; And
Send mandate to the visit data file in response to verifying user equipment.
97., it is characterized in that described encryption key and the information of collecting receive in conjunction with authorization requests as the described article of claim 96.
98., it is characterized in that the instruction that described machine readable media storage makes one or more processors carry out further operation comprises: store the indication to the mandate of visit data file in response to verifying user equipment as claim 96 or 97 described article.
99. as the described article of arbitrary claim 95-98, it is characterized in that, described machine readable instructions storage instruction, described instruction makes one or more processors carry out following further operation:
For the user who is associated with described subscriber equipment receives a unique identifier; And
Further use described user's unique identifier to generate described digital cipher.
100. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Input/output for the file transfer monitoring user equipment of being attempted;
Attempt by described input/output detected transmission data file;
Use a digital packaging in the described data file of transmission forward direction that allows to be attempted, wherein said digital packaging is used to prevent the unwarranted visit to the data file.
101., it is characterized in that the instruction that the storage of described machine readable media makes one or more processors carry out further operation comprises as the described article of claim 100: described data file is designated protectedly can not duplicated without permission.
102. as the described article of claim 101, it is characterized in that, described data file be designated protected can not duplicated without permission comprise: the identifier of described data file is placed the database of storing on the subscriber equipment.
103. as claim 101 or 102 described article, it is characterized in that, described data file be designated protected can not duplicated without permission comprise:
The message of the information that comprises the identification data file is sent to a remote server; And
Reception is to the response of described message, indicated that described data file is protected can not duplicated without permission.
104. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Identify the digital document on first subscriber equipment, described digital document is obeyed a licence, and described licence meets the license information of storing on first subscriber equipment;
Receive the request that described digital document is copied to second subscriber equipment from described first subscriber equipment;
Obtain and the relevant information of described second subscriber equipment, comprise the unique identification data of described second subscriber equipment;
Described digital document is copied to described second subscriber equipment from described first subscriber equipment;
On described first subscriber equipment, store data, described Data Identification the digital document that duplicated and identified described second subscriber equipment.
105. as the described article of claim 104, it is characterized in that the instruction that described machine readable media storage makes one or more processors carry out further operation comprises: is admissible according to described license information ascertainment digital document to duplicating of second subscriber equipment.
106., it is characterized in that receive the request of duplicating digital document and comprise: reception will attempt duplicating by the file output system of first subscriber equipment indication of described digital document as claim 104 or 105 described article.
107., it is characterized in that the instruction that described machine readable media storage makes one or more processors carry out further operation comprises: described data are sent to a remote server as the described article of arbitrary claim 104-106.
108. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Identify a media file;
The access rule that sign and described media file are associated, wherein said access rule comprises the information relevant with the right to use and cost of use;
To described media file application one digital packaging, described digital packaging comprises the identification data and the data relevant with access rule of described media file, and wherein said digital packaging is applicable to the unwarranted visit that prevents media file.
109. as the described article of claim 108, it is characterized in that, identify described media file and comprise that use one file identification algorithm identifies described media file.
110., it is characterized in that the access rule that sign and media file are associated comprises as claim 108 or 109 described article: receive access rule from a remote server.
111. as the described article of arbitrary claim 108-110, it is characterized in that, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation:
From the request of user's reception to the mandate of media file;
Notify a remote server relevant for request to the mandate of media file; And
Forbid described digital packaging to allow the described media file of user capture.
112., it is characterized in that the access rule that sign and media file are associated comprises: receive described access rule from the user as the described article of arbitrary claim 108-111.
113. article that comprise the machine readable media of storage instruction, described instruction make one or more processors carry out following operation:
Receive a digital cipher;
Described digital cipher is stored in the nonvolatile memory;
The license information of at least one digital document is stored in the license database in the volatile storage area;
Sign is to visiting the attempt of a designation number file; And
If described license database comprises the license information of the licence of sign designation number file, then allow to visit described digital document with described digital cipher.
114., it is characterized in that described digital cipher comprises the data to user equipment specific as the described article of claim 113, described machine readable media storage instruction, described instruction makes one or more processors carry out following further operation:
Search identification information from described subscriber equipment; And
Use described identification information and the data of user equipment specific are verified described digital cipher.
115. as claim 113 or 114 described article, it is characterized in that, described digital cipher comprises the position data of described license database, and the instruction that described machine readable media storage makes one or more processors carry out further operation comprises: use the position data from digital cipher to visit described license database.
116. as the described article of arbitrary claim 113-115, it is characterized in that, the instruction that described machine readable media storage makes one or more processors carry out further operation comprises: if described license database does not comprise the license information of the licence of sign designation number file, then prevent to visit described digital document.
117. as the described article of arbitrary claim 113-116, it is characterized in that described digital cipher comprises that to license database and license information at least one decipher necessary data.
118., it is characterized in that described license information comprises that forbidding is applied to the necessary data of digital packaging of designation number file as the described article of arbitrary claim 113-117.
CN 200480006377 2003-02-03 2004-01-28 Distribution and rights management of digital content Pending CN1759363A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US44458103P 2003-02-03 2003-02-03
US60/444,581 2003-02-03
US10/726,284 2003-12-02

Publications (1)

Publication Number Publication Date
CN1759363A true CN1759363A (en) 2006-04-12

Family

ID=36704029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200480006377 Pending CN1759363A (en) 2003-02-03 2004-01-28 Distribution and rights management of digital content

Country Status (1)

Country Link
CN (1) CN1759363A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100440235C (en) * 2006-04-24 2008-12-03 南京树声科技有限公司 Method and tool for searching unlawful computer game
CN101479715A (en) * 2006-06-30 2009-07-08 英特尔公司 Method and system for the protected storage of downloaded media content via a virtualized platform
CN102034033A (en) * 2009-09-25 2011-04-27 日立软件工程株式会社 Content approving apparatus
CN102663273A (en) * 2010-12-27 2012-09-12 西门子公司 Improved management of software licenses in a computer network
CN104951932A (en) * 2015-06-30 2015-09-30 曾庆义 Paid content acquisition method and system
CN105247527A (en) * 2013-03-15 2016-01-13 微软技术许可有限责任公司 Controlled application distribution
CN105531708A (en) * 2013-07-15 2016-04-27 雷米·斯威尔泽克 Systems and methods for monetizing discovery opportunities for media
CN109952576A (en) * 2016-09-09 2019-06-28 邓白氏公司 The permission of data in management access database
CN112529759A (en) * 2020-12-22 2021-03-19 北京百度网讯科技有限公司 Document processing method, device, equipment, storage medium and computer program product
CN112714894A (en) * 2018-09-17 2021-04-27 西门子股份公司 Method for managing a production process, computer program for carrying out the method and electronically readable data carrier

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100440235C (en) * 2006-04-24 2008-12-03 南京树声科技有限公司 Method and tool for searching unlawful computer game
US9323558B2 (en) 2006-06-30 2016-04-26 Intel Corporation Method and system for the protected storage of downloaded media content via a virtualized platform
CN101479715A (en) * 2006-06-30 2009-07-08 英特尔公司 Method and system for the protected storage of downloaded media content via a virtualized platform
CN101479715B (en) * 2006-06-30 2012-05-30 英特尔公司 Method and system for the protected storage of downloaded media content via a virtualized platform
CN102682081A (en) * 2006-06-30 2012-09-19 英特尔公司 Method and system for the protected storage of downloaded media content via a virtualized platform
US8949323B2 (en) 2006-06-30 2015-02-03 Intel Corporation Method and system for the protected storage of downloaded media content via a virtualized platform
CN102682081B (en) * 2006-06-30 2015-02-18 英特尔公司 Method and system for the protected storage of downloaded media content via a virtualized platform
CN102034033A (en) * 2009-09-25 2011-04-27 日立软件工程株式会社 Content approving apparatus
CN102034033B (en) * 2009-09-25 2014-08-13 株式会社日立解决方案 Content approving apparatus
CN102663273A (en) * 2010-12-27 2012-09-12 西门子公司 Improved management of software licenses in a computer network
CN102663273B (en) * 2010-12-27 2017-01-18 西门子公司 Improved management of software licenses in a computer network
CN105247527A (en) * 2013-03-15 2016-01-13 微软技术许可有限责任公司 Controlled application distribution
CN105247527B (en) * 2013-03-15 2018-06-22 微软技术许可有限责任公司 Controlled application is distributed
CN105531708A (en) * 2013-07-15 2016-04-27 雷米·斯威尔泽克 Systems and methods for monetizing discovery opportunities for media
CN104951932A (en) * 2015-06-30 2015-09-30 曾庆义 Paid content acquisition method and system
CN104951932B (en) * 2015-06-30 2020-12-08 曾庆义 Paid content acquisition method and system
CN109952576A (en) * 2016-09-09 2019-06-28 邓白氏公司 The permission of data in management access database
CN112714894A (en) * 2018-09-17 2021-04-27 西门子股份公司 Method for managing a production process, computer program for carrying out the method and electronically readable data carrier
US12164285B2 (en) 2018-09-17 2024-12-10 Siemens Aktiengesellschaft Method for managing a production process
CN112529759A (en) * 2020-12-22 2021-03-19 北京百度网讯科技有限公司 Document processing method, device, equipment, storage medium and computer program product
CN112529759B (en) * 2020-12-22 2024-05-14 北京百度网讯科技有限公司 Document processing method, apparatus, device, storage medium, and computer program product

Similar Documents

Publication Publication Date Title
US7496540B2 (en) System and method for securing digital content
US9246916B2 (en) Specifying rights in a digital rights license according to events
JP4511828B2 (en) System for transferring rights of digital works
US7134144B2 (en) Detecting and responding to a clock rollback in a digital rights management system on a computing device
CA2533076C (en) Flexible licensing architecture for licensing digital application
US7680743B2 (en) Software application protection by way of a digital rights management (DRM) system
JP4559639B2 (en) Digital digital rights management implementation architecture and method
US7080043B2 (en) Content revocation and license modification in a digital rights management (DRM) system on a computing device
US7366915B2 (en) Digital license with referral information
CN101036099A (en) Centralized management of digital rights licensing
US20050216548A1 (en) Method and system for digital content distribution
US20030172035A1 (en) Method and system for managing software licenses
US20060053079A1 (en) User-defined electronic stores for marketing digital rights licenses
US20050004873A1 (en) Distribution and rights management of digital content
US20010051928A1 (en) Protection of software by personalization, and an arrangement, method, and system therefor
US20060053080A1 (en) Centralized management of digital rights licensing
US20050192907A1 (en) Method for interdependently validating a digital content package and a corresponding digital license
KR20210037274A (en) Apparatus and method for managing contents
CN1759363A (en) Distribution and rights management of digital content
CN1340795A (en) Method and system for preventing electronic file piracy
KR100716719B1 (en) D.R.M based package contents providing method and apparatus therefor
JP4504246B2 (en) Digital data transaction method and system
JP2014038622A (en) Drm system and license repository
JP2012065353A (en) License repository device, method, and rendering device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: PULUOWEIDENGTE INTELLECTUAL PROPERTY CO., LTD.

Free format text: FORMER OWNER: TENNESSEE PACIFIC OCEAN GROUP CO., LTD.

Effective date: 20080725

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20080725

Address after: texas

Applicant after: Provident Intellectual Propert

Address before: Tennessee

Applicant before: Tennessee Pacific Group L. L. C.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20060412