Super-distribution of protected digital content
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-011/30
G06K-009/00
H04K-001/00
H04L-009/00
출원번호
UP-0255354
(2005-10-21)
등록번호
US-7590866
(2009-09-24)
발명자
/ 주소
Hurtado, Marco M.
Mahlbacher, James C.
Spagna, Richard L.
출원인 / 주소
International Business Machines Corporation
대리인 / 주소
Sawyer, Jr., Joseph A.
인용정보
피인용 횟수 :
15인용 특허 :
82
초록▼
Super distribution of protected digital content is disclosed. According to one embodiment of the invention previously purchased encrypted digital content is received from a purchaser of the digital content. The purchaser of the previously purchased encrypted digital content is different from the rec
Super distribution of protected digital content is disclosed. According to one embodiment of the invention previously purchased encrypted digital content is received from a purchaser of the digital content. The purchaser of the previously purchased encrypted digital content is different from the recipient of the encrypted digital content. A secure transmission is established with an authorization authority for decrypting the content. A first decryption key for decrypting at least part of the previously purchased encrypted content as permitted by the authorization authority is received from the authorization authority. The at least part of the previously purchased encrypted content is decrypted as permitted by the authorization authority.
대표청구항▼
What is claimed is: 1. A computer-implemented method for surer-distribution of digital content from a first end-user of the digital content to a second end-user of the digital content, the method comprising: receiving encrypted digital content from a first user of the encrypted digital content, by
What is claimed is: 1. A computer-implemented method for surer-distribution of digital content from a first end-user of the digital content to a second end-user of the digital content, the method comprising: receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and receiving authorization from an authorization authority, by the second end-user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein the authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content. 2. The computer-implemented method of claim 1, further comprising: establishing, by the second end-user of the encrypted digital content, a transmission with an authorization authority and receiving authorization for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content. 3. The method of claim 2, further comprising: decrypting, by the second end-user of the digital content, at least part of the encrypted digital content as permitted by the authorization authority, and wherein the encrypted content is usable by the second end-user for a predetermined limited time. 4. The computer-implemented method of claim 1, wherein the encrypted digital content includes usage conditions, the usage conditions specifying one or more pre-determined conditions of use for the encrypted digital content by the first end-user and specifying one or more pre-determined conditions of use for the encrypted digital content by the second end-user. 5. The computer-implemented method of claim 4, wherein the one or more pre-determined conditions of use for the encrypted digital content by the first end-user is different than the one or more pre-determined conditions of use for the encrypted digital content by the second end-user. 6. The computer-implemented method of claim 1, wherein the encrypted digital content is received in an encrypted form through an electronic network. 7. The computer-implemented method of claim 1, wherein the encrypted digital content corresponds to one or more of print media, a film, a game, a program, multimedia, or music. 8. The computer implemented method of claim 1, wherein the authorization authority is a clearinghouse entity that maintains a record of distribution of the encrypted digital content among all end-users of the encrypted digital content. 9. The computer implemented method 1, further comprising: determining that super-distribution is allowed by at least one usage condition in the encrypted digital content; and automatically contacting an authority to obtain a license and a decryption key. 10. A computer readable storage medium containing programming instructions for execution by a processor, the programming instructions comprising: receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and receiving authorization from an authorization authority, by the second end-user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein an authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content. 11. The computer readable storage medium of claim 10, further comprising the programming instructions of: establishing, by the second end-user of the encrypted digital content, a transmission with an authorization authority and receiving authorization for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content. 12. The computer readable storage medium of claim 10, wherein all the encrypted content is permitted by an authorization authority to be decrypted, and wherein the encrypted content is usable by the second end-user for a predetermined limited time. 13. The computer readable storage medium of claim 10, wherein the encrypted digital content includes usage conditions, the usage conditions specifying one or more pre-determined conditions of use for the encrypted digital content by the first end-user and specifying one or more pre-determined conditions of use for the encrypted digital content by the second end-user. 14. The computer readable storage medium of claim 13, wherein the one or more pre-determined conditions of use for the encrypted digital content by the first end-user is different than the one or more pre-determined conditions of use for the encrypted digital content by the second end-user. 15. The computer readable storage medium of claim 10, wherein the encrypted digital content is received in an encrypted form through an electronic network. 16. The computer readable storage medium of claim 10, wherein the encrypted digital content corresponds to one or more of print media, a film, a game, a program, multimedia, or music. 17. The computer readable storage medium of claim 10, wherein the authorization authority is a clearinghouse entity that maintains a record of distribution of the encrypted digital content among all end-users of the encrypted digital content. 18. The computer readable storage medium of claim 10, further comprising the programming instructions of: determining that super-distribution is allowed by at least one usage condition in the encrypted digital content; and automatically contacting the authority to obtain a license and a decryption key. 19. An information processing system comprising: a network interface coupled to a player application running on the information processing system for performing: receiving encrypted digital content from a first user of the encrypted digital content, by a second end-user of encrypted digital content, the first end-user of the encrypted digital content having previously purchased rights to use the encrypted digital content and being different from the second end-user of the encrypted digital content, wherein the encrypted digital content includes usage conditions specifying one or more predetermined conditions of use for the encrypted digital content by the first end-user and the second end-user, wherein the usage conditions include store usage conditions provided by an electronic store that received the encrypted digital content from a provider of the encrypted digital content, wherein the store usage conditions include at least one of provider usage condition that has been narrowed by the electronic store without invalidating the provider usage condition; and receiving authorization from an authorization authority, by the second end-user of the encrypted digital content, for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content, wherein the authorization authority permits the second end-user of the encrypted digital content to decrypt and use at least part of the encrypted digital content independent of the rights to use the encrypted digital content purchased by the first end-user of the encrypted digital content. 20. The information processing system of claim 19, further comprising: establishing, by the second end-user of the encrypted digital content, a transmission with an authorization authority and receiving authorization for decrypting the encrypted digital content received from the first end-user of the encrypted digital content without requiring the second end-user to have purchased rights to use the encrypted digital content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (82)
Schulhof Nathan (Los Gatos CA) Janky James M. (Los Altos CA), Apparatus for distributing subscription and on-demand audio programming.
Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Starkey James A. (Manchester MA), Database server system with methods for alerting clients of occurrence of database server events of interest to the clie.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
McLaughlin Robert (Arlington VA) Bullen M. James (Oakville CAX), Information service control point, which uses different types of storage devices, which retrieves information as blocks.
Garber Sharon R. (Crystal MN) Kozak Darryn J. (New Brighton MN) Kruse John M. (Minneapolis MN) Clare Mark K. (Fort Wayne IN), Intelligent optical navigator dynamic information presentation and navigation system.
Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
Mniszewski Susan M. (Los Alamos NM) Springer Edward A. (Los Alamos NM) Brenner David P. (North Collins NY), Method for encryption and transmission of digital keying data.
Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
Bird Raymond F. (Durham NC) Herzberg Amir (Bronx NY) Janson Philippe A. (Zurich NJ CHX) Kutten Shay (Rockaway NJ) Molva Refik A. (Juan les Pins NY FRX) Yung Marcel M. (New York NY), Multi-party secure session/conference.
Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL) Mutzabaugh Dennis M. (Mt. Prospect IL) Sgrigonoli Gary J. (Mt. Prospect IL), Secure data packet transmission system and method.
Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Jogand-Coulomb, Fabrice E.; Hutton, Henry R.; Lin, Jason T.; Halpern, Joseph E.; Sela, Rotem, Host device and method for super-distribution of content protected with a localized content encryption key.
Kobayashi, Yoshiyuki; Oishi, Tateo; Ueda, Kenjiro; Yamamoto, Kazuo, Information processing apparatus, information processing system, information processing method, and program.
Yazdani, Amir; Papagan, Ken M.; Hetzel, Cathy S.; Harsh, Aaron J.; Behnke, Chris R., Systems and methods for measuring consumption of entertainment commodities.
Michiels, Wilhelmus Petrus Adrianus Johannus; Gorissen, Paulus Mathias Hubertus Mechtildis Antonius, Tamper resistance of a digital data processing unit.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.