The content utilizing method includes the steps of encrypting the encrypted requested content with a predetermined encrypting key and transmitted to a content processing apparatus, generating and transmitting license control information including usage right information having identification informa
The content utilizing method includes the steps of encrypting the encrypted requested content with a predetermined encrypting key and transmitted to a content processing apparatus, generating and transmitting license control information including usage right information having identification information, and condition of use of the selected content and user specific information together with a decrypting key corresponding to the encrypting key to a usage right control server controlling the usage right of the content. If the utilizing authorization of the content is verified, the usage right information and the decrypting key are transmitted from the authorizing server to the content processing apparatus, and the content is decrypted by the decrypting key in the content processing apparatus and the decrypted content is processed based on the usage right information. In this manner an arbitrary content distribution is enabled to protect the content by a copyright protection without requiring a special recording media.
대표청구항▼
What is claimed is: 1. A content utilizing method in a system including a user terminal, a content server for providing a content, a content processing apparatus for processing a content, and a usage right control server for controlling a right of use of the content, the method comprising: a use re
What is claimed is: 1. A content utilizing method in a system including a user terminal, a content server for providing a content, a content processing apparatus for processing a content, and a usage right control server for controlling a right of use of the content, the method comprising: a use requesting step of specifying a content to be used and a condition of use therefor in said user terminal and requesting a use of the specified content to said content server; a content package transmitting step of encrypting the specified content with a first encrypting key in said content server and transmitting a content package including the encrypted content and a license control assistant program to said content processing apparatus; a license control information transmitting step of generating, in said content server, license control information including the license identifier, usage right information having the specified condition of use and a content identifier of the specified content, and a second encrypting key, and executing transmission together with a decrypting key corresponding to the first encrypting key to said usage right control server; a ticket transmitting step of generating, in said content server, a ticket including the license identifier and a second decrypting key corresponding to the second encrypting key and transmitting the ticket to said content processing apparatus; an execution step of executing, in said content processing apparatus, the license control assistant program included in the content packet for extracting the license identifier from the ticket and for transmitting the license identifier from said content processing apparatus to said usage right control server, and an authorization step of verifying, in said usage right control server, an authorization for use of the user by communicating with the license control assistant program executed in said content processing apparatus using the second encrypting key contained in the license control information corresponding to the transmitted license identifier; a usage right information transmitting step of transmitting, after the authorization is verified, the usage right information and the first decrypting key from said authorizing server to said content processing apparatus; and a content processing step of decrypting the encrypted content by the first decrypting key in said content processing apparatus and processing the decrypted content based on the usage right information. 2. A content utilizing method according to claim 1, wherein said authorization step includes: an authorization data transmitting step of encrypting predetermined data with the second encrypting key in said usage right control server to generate authorization data and transmitting such authorization data to said content processing apparatus; an authorization data returning step of decrypting said authorization data with the second decrypting key in said content processing apparatus and returning the decrypted data to said usage right control server; and a judgment step of judging a successful verification of an authorization for use of said user in case the decrypted data coincide with the predetermined data. 3. A content utilizing method according to claim 2, wherein the predetermined data include a random number. 4. A content utilizing method according to claim 3, wherein the predetermined data include identification information of the user or the content. 5. A content utilizing method according to claim 1, wherein the second encrypting key and the decrypting key are a same user key, and such user key is transmitted from said user terminal to said content server, then included in the ticket and transmitted to said content processing apparatus, and included in the license control information and transmitted to said usage right control server. 6. A content utilizing method according to claim 1, wherein the second encrypting key is a public key of the user, and the second decrypting key is a secret key corresponding to the public key. 7. A content utilizing method according to claim 1, wherein the authorization step includes: an authorization data transmitting step of generating predetermined authorization data in said usage right control server and transmitting such authorization data to said content processing apparatus; an authorization data returning step of encrypting the authorization data with the second encrypting key in said content processing apparatus and returning the encrypted data to said usage right control server; and a judgment step of decrypting the returned encrypted data with a second decrypting key and judging a successful verification of an authorization for use of the user in case the decrypted data coincide with the predetermined authorization data. 8. A content utilizing method according to claim 7, wherein the predetermined authorization data includes a random number. 9. A content utilizing method according to claim 1, wherein the condition of use includes a kind of processing of the content. 10. A content utilizing method according to claim 1, wherein the condition of use includes a fee charging method. 11. A content utilizing method according to claim 10, wherein the fee charging method includes a charging method according to an amount of use. 12. A content utilizing method according to claim 1, wherein in said license control information transmitting step, license control information including usage right information capable of describing plural usage rights is generated, and in said content processing step, a usage right is selected among the plural usage rights and the content is processed based on the selected usage right. 13. A content utilizing method according to claim 1, wherein the usage right information describes charge information for the execution of the usage right, and the method further comprises a charging step of executing a charging process according to the charging information when the usage right is executed. 14. A content utilizing method according to claim 13, further comprising a charge checking step of checking a charge prior to the execution of the usage right.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (9)
Phillip M. Adams, Media-independent document security method and apparatus.
DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.