US20080092239A1 - Method and system for secure distribution of selected content to be protected - Google Patents

Method and system for secure distribution of selected content to be protected Download PDF

Info

Publication number
US20080092239A1
US20080092239A1 US11/545,889 US54588906A US2008092239A1 US 20080092239 A1 US20080092239 A1 US 20080092239A1 US 54588906 A US54588906 A US 54588906A US 2008092239 A1 US2008092239 A1 US 2008092239A1
Authority
US
United States
Prior art keywords
encrypted
content
recipient device
key
appliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/545,889
Inventor
David H. Sitrick
Russell T. Fling
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OL Security LLC
Original Assignee
David H. Sitrick
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/545,889 priority Critical patent/US20080092239A1/en
Application filed by David H. Sitrick filed Critical David H. Sitrick
Assigned to SITRICK, DAVID H. reassignment SITRICK, DAVID H. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLING, RUSSELL T.
Publication of US20080092239A1 publication Critical patent/US20080092239A1/en
Assigned to SITRICK, DAVID H. reassignment SITRICK, DAVID H. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLING, RUSSELL T.
Assigned to BASSILIC TECHNOLOGIES LLC reassignment BASSILIC TECHNOLOGIES LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SITRICK, DAVID H.
Assigned to OL SECURITY LIMITED LIABILITY COMPANY reassignment OL SECURITY LIMITED LIABILITY COMPANY MERGER (SEE DOCUMENT FOR DETAILS). Assignors: BASSILIC TECHNOLOGIES LLC
Priority to US15/130,905 priority patent/US9679118B2/en
Priority to US15/619,369 priority patent/US10176305B2/en
Priority to US16/241,835 priority patent/US11003742B2/en
Priority to US17/092,109 priority patent/US11461434B2/en
Priority to US17/957,564 priority patent/US11868447B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/433Content storage operation, e.g. storage operation in response to a pause request, caching operations
    • H04N21/4334Recording operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/435Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Definitions

  • the present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files.
  • These electronic data files can be any type of content, such as for word processing, or image files (such as for audio, visual and audiovisual components), for movies, or still photo visual image files, or audio only files, or any type of stored data content, or content which when authorized is an executable application software program, etc.
  • image files such as for audio, visual and audiovisual components
  • audio, visual and audiovisual components for movies, or still photo visual image files, or audio only files, or any type of stored data content, or content which when authorized is an executable application software program, etc.
  • the present invention applies and works equally well with any of these forms of digital electronic data files.
  • Secure distribution usually involves encryption or proprietary conversion of some kind. There are many well-known options for this. Encryption, hash functions, other one-way functions, and symmetric and asymmetric encryption are well known to those skilled in the art. (To generally educate oneself, see Applied Cryptography, by Bruce Schneier, Chapter 2, Protocol Building Blocks; also see Section 2.3 on One-Way Functions). The present invention is not restricted to any specific type of encryption, and is compatible with any that otherwise fits specific design needs of an embodiment.
  • One-way functions are relatively easy to compute, but significantly harder to reverse. That is, given x it is easy to compute f(x), but given f(x) it is hard to compute x.
  • a trap-door one-way function is a special type of one-way function, one with a secret trapdoor. It is easy to compute in one direction and hard to compute in the other direction. But, if one knows the secret, one can easily compute the function in the other direction. That is, it is easy to compute f(x) given x, and hard to compute x given f(x). However, there is some secret information, y, such that given f(x) and y it is easy to compute x.
  • a one-way hash function can be implemented in many ways and has many names such as compression function, contraction function, message digest, fingerprint, cryptographic checksum, message integrity check (MIC), and manipulation detection code (MDC).
  • compression function contraction function
  • message digest fingerprint
  • cryptographic checksum message integrity check
  • MDC manipulation detection code
  • One-way hash functions are central to modem cryptography, and are another building block for many protocols.
  • Hash functions have been used in computer science for a long time.
  • a hash function is a function, mathematical or otherwise, that takes a variable-length input string (called a pre-image) and converts it to a fixed-length (generally smaller) output string (called a hash value).
  • hash functions are typically many-to-one, you cannot use them to determine with certainty that the two strings are equal, but you can use them to get a reasonable assurance of accuracy.
  • a one-way hash function is a hash function that works in one direction: It is easy to compute a hash value from pre-image, but it is hard to generate a pre-image that hashes to a particular value.
  • a good one-way hash function is also collision-free: It is hard to generate two pre-images with the same hash value.
  • the hash function can be public; there's no need for secrecy to the process.
  • the security of a one-way hash function is its one-wayness.
  • the output is not dependent on the input in any discernible way.
  • a single bit change in the pre-image changes, on the average, half of the bits in the hash value. Given a hash value, it is computationally unfeasible to find a pre-image that hashes to that value.
  • a hash function can be thought of as a way of fingerprinting files. Thus, to verify that someone has a particular file (that you also have), then ask him for the hash value. If he sends you the correct hash value, then it is almost certain that he has that file. Normally, a one-way hash function is used without a key, so that anyone can verify the hash. If one wants only the recipient to be able to verify the hash, then one can use Message Authentication Codes.
  • a Message Authentication Code also known as a data authentication code (DAC)
  • DAC data authentication code
  • a MAC can be created out of a hash function or a block encryption algorithm; there are also dedicated MACs.
  • Public-key cryptography as described in 1976 by Whitefield Diffie and Martin Hellman, uses two different keys—one public and the other private. It is computationally hard to deduce the private key from the public key.
  • Anyone with the public key can encrypt a message but only the person with the private key can decrypt the message.
  • Encryption is the easy direction. Instructions for encryption are the public key; anyone can encrypt a message. Decryption is the hard direction. In the best case, it is made hard enough that people with super computers and years could't decrypt the message without the secret.
  • the secret, or trap-door, is the private key. With that secret, decryption is as easy as encryption.
  • Party 1 sends Party 2 a public key.
  • Party 2 encrypts a message using Party 1's public key and sends it to party 1.
  • Party 1 decrypts Party 2's message using Party 1's private key.
  • a network of users agrees on a public-key cryptosystem. Every user has his or her own public key and private key, and the public keys are all published in a database somewhere.
  • one key is public (e.g., to encrypt or to decrypt), and the other key is private (e.g., to decrypt or to encrypt, respectively).
  • public-key algorithms are not a substitute for symmetric algorithms. They are not used to encrypt messages; they are used to encrypt keys. The reasons for this are that public-key algorithms are slow and that public-key cryptosystems are vulnerable to chosen-plaintext attacks.
  • public-key cryptography is used to secure and distribute session keys; those session keys are used with symmetric algorithms to secure message traffic. This is sometimes called a hybrid cryptosystem.
  • Public-key Cryptography or Public Key Cryptography refers to a form of cryptography in which each user has a public key and a private key. Messages are sent encrypted with the receiver's public key; the receiver decrypts them using the private key. Using this method, the private key never has to be revealed to anyone other than the user.
  • Private Key Encryption refers to a form of cryptography in which sender and receiver have the same key or similar keys.
  • Private Key Cryptography refers to a form of cryptography in which the encryptor and decryptor use the same key, which must be kept secret. This methodology is usually only used by a small group.
  • Secret Key Encryption refers to a form of cryptography in which sender and receiver share a secret key.
  • hash functions are one-way functions.
  • Encryption is different than Hashing.
  • Most encrypted content today is encrypted with an encryption key and then a decryption key is used to decrypt the data.
  • the encryption/decryption key pair are sometimes identical (the same) or a matched pair (but different). Either way, the decryption key must be supplied to decrypt the content. If a new decryption key is desired, the content must be re-encrypted. Further, as long as one has the decryption key and the encrypted content, it can be decrypted anywhere and once decrypted, the data can be copied as desired.
  • a need therefore, exists for encrypted content to be encrypted only once and yet can be distributed widely.
  • a need exists for the distributed encrypted content to only be available for use on certain specific authorized computers, for usage in accordance with defined usage rights (that can be fixed or have varying rights.
  • a need exists to minimize the computational power required to distribute content to a plurality of users (e.g., up to thousands or even to millions of customers) and a need exists to allow such content to be distributed on media such as mass produced CD-ROMs.
  • Server-based authentication while possible, is limited in utility by requiring connection to a server for authentication in order for an appliance to use a file.
  • an object of the present invention to provide a methodology and system to provide for the selectively controllable distribution of data files (content) to be protected, and selectively controllable computer appliance specific based usage options such as viewing and printing of electronic data files (or exporting of files, or running of an application software program). It is a further object to make the use of the methodology and system easy and straight forward for the provider of encryption services and for the consumer of decryption services.
  • the present invention provides in one embodiment, a system and methodology for uniquely encrypting the content for a specific remote appliance's specific usage so that content may be encrypted utilizing an Appliance Identification generated internally within the remote appliance and may also be selectively permitted to view and/or export and/or print and/or execute as an application, the electronic data file.
  • This Appliance Identification is utilized both in the encryption by the provider and is utilized in the recipient device as a part of decrypting in the recipient device (at the consumer level) so as to provide for appliance specific control of utilization of the encrypted content, wherein the control is provided responsive to generation of an appliance identification of a recipient device, such as provided by a query to hardware or installed software in the respective recipient device.
  • a system and methodology are set forth, providing a structure system architecture for production systems and for recipient systems.
  • the production systems are run by-or-for the owners (e.g., publishers or copyright owners) or distributors of content to be protected and distributed for restricted regulated controlled usage only on authorized recipient systems.
  • the usage can further be made specific to a particular recipient device system (e.g., the user's appliance).
  • the trusted provider's production system provides the production subsystem that works with the recipient subsystem comprised of the recipient system (e.g., recipient device).
  • protected content is made to be appliance specific. Consumers are supplied only a partial decryption key, wherein a respective utilized production key is encrypted utilizing the generated Appliance ID to provide an encrypted production key. This partial encryption key is useless until the Appliance ID is internally generated and provided by the recipient device appliance, to allow the decryption and generation at the recipient device of a production key copy, which is the key necessary to decrypt the protected content locally at the recipient device of the consumer. The consumer never is allowed to see the production key copy and cannot alter the Appliance ID because it is generated from fixed computer identification parameters.
  • DRM Data Rights Management
  • an Appliance ID provided by that specific recipient device is used by the trusted provider (production system) to encrypt the respective associated production key that was utilized for encrypting of respective associated selected files of original content (and associated ticket, where present) as used to generate the respective encrypted content (and where present, the respective associated encrypted ticket).
  • the trusted provider production system
  • the distributor can also choose to encrypt the same original file of selected content multiple times, each time differently for different distributions.
  • the user recipient device is given a key (password) to unlock and deliver usage rights and selectively control and allow access to the content.
  • This key is valid only for the respective content and is valid only on a particular computer.
  • each computer also has its own identifier, which is generated by respective application software on the recipient device as an Appliance ID.
  • the Appliance ID is generated from specific data within the recipient device, and it is not editable by the user of the recipient device.
  • tickets or associated control data [defining rights], associated with, or included with, or integrated within the original (and encrypted) content.
  • the tickets specify the usage rights for respective associated content that a particular computer recipient device is granted.
  • the particular recipient device provides for selective access to the protected (encrypted) content that is available locally at that particular recipient device computer (without requiring any access or connection to a central server).
  • the original (selected) content is encrypted responsive to an associated production key to generate respective associated encrypted content.
  • the encrypted content is made selectively available and only utilizable on the recipient device utilizing the respective application software program running on the respective particular computer.
  • the encrypted content is selectively usable only by the specific particular computer that generated the Appliance ID that was provided to the production subsystem, and that was utilized by the production subsystem to encrypt the respective production key, to provide as an encrypted production key, which is thereafter provided to the particular computer recipient device which utilizes the Appliance ID to decrypt the encrypted production key to generate a decrypted production key which is used to decrypt the encrypted content, and where appropriate, to decrypt the associated encrypted ticket to define usage rights for the associated encrypted content.
  • the production key is encrypted responsive to an Appliance ID (such as generated at the specific computer), to generate an encrypted production key that is provided to and can only be decrypted by the specific particular computer that provided the respective Appliance ID. The integrity of the distribution and controlled usage process is thus maintained.
  • encryption tools are used to convert original content into an encrypted form of encrypted content and to create production keys (used by the production subsystem). These tools can be implemented in multiple, alternative forms, such as stand-alone programs, ActiveX servers, etc.
  • the encrypted content can only be used with particular associated (and preferably authorized and validated) application software running on a computer system.
  • the associated authorized application software can be a stand-alone product, a plug-in, or can be included within another specific respective application software.
  • the associated application software provides for one or more of regulated selective viewing, annotating, collaborative networking, selective printing, selective exporting, and selective active execution of content representing executable application software.
  • a user must obtain an appliance specific key (e.g., a password, a hardware component or otherwise) for use in their particular computer in order to access the protected content.
  • the production key is combined in a secure way with or generated from the Appliance ID to generate an appliance specific key only usable for a particular specific computer recipient device. Tickets defining usage rights can be generated and included with, or separately associated with, or integrated into, the respective associated content (as encrypted) for granting rights to the respective encrypted content on the user's particular specific recipient device computer running the respective associated application software.
  • Authorization can be implemented, controlled and distributed, via a host web site(s) production subsystem, with delivery of the encrypted production key, and optionally the encrypted ticket and/or encrypted content provided to a user by direct download, email, regular postal mail, other electronic delivery or raw text, etc.
  • a particular specific computer (recipient device) running the respective application software or integrating in the associated application software into other software provides for control of the access to and usage of the encrypted content on the recipient device, and can also provide other functions.
  • client application software having the associated application software integrated therein
  • DRM data rights management
  • client applications can even be embedded into specific appliances, into specific other applications, or into computer operating systems.
  • various sub-programs that can be integrated into an associated application software's functionality can provide either or both of stand-alone or integrated modules into other software, to provide therefor, respective DRM compatible application software.
  • FIG. 1 is a block diagram at a system level showing the provider and consumer sides, and a data rights management overview, illustrating provider level encryption services and consumer decryption services;
  • FIG. 2 is a block diagram illustrating an alternative embodiment of FIG. 1 , where the provider side of the provider and consumer data rights management system provides a combined output of both the encrypted content and the encrypted production key as a single communication to the consumer side recipient device, illustrating both the state flow and system architecture associated therewith;
  • FIG. 3 is a block diagram and state flow diagram illustrating the provider encryption services and consumer decryption services with appliance specific based data rights management system, with associated rights ticket, further expounding on FIG. 1 ;
  • FIG. 4 is a block diagram and state flow diagram, illustrating the combined system of FIG. 3 with the provision of combined content with associated rights ticket;
  • FIGS. 5-8 illustrate more detailed block diagrams of the provider encryption services block 104 of FIGS. 1-4 ; wherein FIG. 5 illustrates a block diagram and state flow diagram for generation of an encrypted content output and an encrypted production key output;
  • FIG. 6 illustrates a detailed block diagram of the production key block 140 , illustrating the generation of the encrypted production key from the production key and an Appliance ID (preferably a jumbled Appliance ID, and securely communicated) coming from either the appliance (e.g., recipient device) or a storage means (e.g., history file for customer on a host server) storing the Appliance ID from the appliance.
  • Appliance ID preferably a jumbled Appliance ID, and securely communicated
  • FIG. 7 illustrates a detailed block of the content encryption block 102 , utilizing the production key and original encrypted content to generate the encrypted (original) content output;
  • FIG. 8 illustrates a more detailed diagram of the production key generation subsystem 101 , which provides for generation of a production key from either a saved key or by generation of a new key;
  • FIGS. 9-12 provide further details of the consumer decryption services subsystem 204 of FIGS. 1-4 (such as on one or more recipient systems running associated application software); wherein
  • FIG. 9 illustrates the block diagram and data flow related to the utilization of the communicated encrypted content, jumbled encrypted production key, and utilizing an internally generated Appliance ID to decrypt the production key to generate a production key copy, and for utilizing the production key copy to decrypt the encrypted content copy to provide (preferably-temporary) unencrypted content out;
  • FIG. 10 illustrates the subsystem 204 for generating the Appliance ID (and jumbled Appliance ID where utilized), for provision respectively within the consumer decryption services subsystem 204 and to the producer subsystem 104 ;
  • FIG. 11 illustrates the production key decryption subsystem providing for decryption of the encrypted production key utilizing the internally generated Appliance ID to generate an appliance key utilized to decrypt the encrypted production to provide a production key copy output to the consumer decryption subsystem 204 ;
  • FIG. 12 is a more detailed block diagram and state flow drawing of the decryption of content subsystem 202 of the consumer decryption subsystem 204 providing for decryption of the encrypted content copy utilizing the production key copy to generate the unencrypted content (preferably only temporarily storing the unencrypted content during its usage), for use by the consumer decryption subsystem 204 ;
  • FIGS. 13-15 illustrate various aspects of usage rights ticket generation, encryption, decoding, and utilization of a rights ticket of FIGS. 3-4 ;
  • FIG. 13 illustrates the encrypted ticket generator 401 of FIGS. 3-4 for providing an encrypted ticket output providing for associated defined rights, allowed usages, and Ticket IDs, wherein the encrypted ticket output is associated with production key and encrypted content;
  • FIG. 14 illustrates ticket decoding at the consumer decryption subsystem 204 and more specifically the utilization in the subsystem 430 of the encrypted ticket output of the encrypted ticket generator 401 wherein the encrypted ticket copy and production key copy are utilized by a decryption engine to generate a ticket copy which is utilized via ticket decode logic to determine rights and allowed usages and Ticket ID verification;
  • FIG. 15 illustrates the overall system operation for the encrypted ticket generator 401 and the resulting ticket decoding 430 , providing an overall production and consumer system block diagram and state and data flow diagram;
  • FIG. 16A is a detailed electrical computing system block diagram showing both electronic computing system hardware components, data components, and state flow and data flow for the complete distribution system including the production subsystem and consumer subsystem, with FIG. 16A illustrating the provision of independent non-combined separate outputs of an encrypted production key and associated encrypted content, and where applicable, also an associated encrypted ticket, wherein FIG. 16A provides a detailed system block diagram including data and state flow indications, for FIGS. 1 , 3 , and 5 - 15 , as well as FIGS. 18-28 and 30 - 33 ;
  • FIG. 16B is a detailed overall system block diagram and state and data flow diagram providing for a complete system illustration of the system as illustrated in FIGS. 2 , 9 , 10 , 11 and 12 , and FIG. 16B illustrates the system of 16 A where the encrypted content (and where applicable, the associated encrypted ticket) and the associated encrypted production key are combined into a single file output which is thereafter provided to the consumer subsystem (e.g., the recipient device), wherein FIG. 16B is analogous to FIG. 16A , except for the addition of combining logic and separating logic as present in FIG. 16B and not in FIG. 16A , wherein FIG. 16B relates to FIGS. 2 , 4 , 5 - 15 , and 16 - 33 ;
  • FIG. 17A illustrates the data storage structure and components therein, for the encrypted secure format (ESF) and associated encrypted production key (ESZ) as illustrated and discussed herein.
  • ESF encrypted secure format
  • EZ encrypted production key
  • FIG. 18 illustrates a flow chart and state flow diagram for production system encryption of selected content for a specific recipient device
  • FIG. 19 illustrates a flow chart and state flow diagram illustrating the decryption of the encrypted content and utilizing the encrypted production provided by the production subsystem (as illustrated in FIG. 18 ) to provide for a decrypted output, and further illustrates an aspect of the invention providing a flow chart and state flow for only temporarily storing decrypted content in a recipient device during actual usage and authorized utilization thereof;
  • FIG. 20 is a flow chart and state flow diagram illustrating the selection of authorized utilization, for selectively providing for one of printing, exporting, or viewing, or executing as an application program, of at least a portion of the decrypted content, either in accordance with predetermined default usage rights, or in accordance with a permission usage rights ticket as discussed herein;
  • FIG. 21 illustrates the reception and storing of the encrypted content and encrypted production output from the production system of FIG. 18 for storage at the recipient device and optionally, at a remotely coupled server;
  • FIG. 22 is a flow chart and state flow diagram, illustrating the production system ticket generation subsystem, providing a source of usage rights, selected original content, and an associated production encryption key used to generate an output of encrypted content with an associated encrypted ticket, either embedded or separate, regulating usage rights for the respective encrypted content.
  • the production system further provides for encryption of the production encryption key.
  • this encryption is responsive to an Appliance ID generated at a specific recipient device, in order to provide an encrypted production key which can only be utilized only at the specific recipient device that is associated with (and can regenerate) the generated Appliance ID.
  • FIG. 23 is a detailed system block diagram combined with a flow chart and state flow diagram, illustrating the utilization at the recipient device 204 of encrypted content with an associated ticket and of an associated encrypted production key, to provide for generation of decrypted content and a decrypted ticket, utilizing a decrypted production key generated internally within the recipient device.
  • the encrypted production encryption key is decrypted utilizing the associated Appliance ID also generated within the respective recipient device.
  • FIG. 24 is a flow chart and state flow diagram illustrating the control of selective usage within the recipient device of decrypted content responsive to a decrypted ticket as provided from within the recipient device, (see, for example, FIG. 23 ), to selectively provide for one of regulated usage of exporting, printing, executing of a file as an application program, or of viewing of a video presentation, for at least a portion of (or all of) the decrypted content and optionally for a defined number of usages, responsive to the usage rights permitted by the decrypted ticket, and also illustrates the process of storing control data with the encrypted ticket in the recipient device, for setting a defined number of usages permitted (e.g., to be printed or copied or exported or an application program executed);
  • a defined number of usages permitted e.g., to be printed or copied or exported or an application program executed
  • FIG. 25 shows an alternate embodiment, showing a flow chart, state flow, and data flow diagrams, illustrating processing in the recipient device of decrypted original content which original content is itself representative of a ticket defining usage rights for an associated data file, where the recipient device is responsive to a usage request for use of the respective associated data file, and regulates the usage on the recipient device of the associated data file as restricted to the defined usage rights for permitted usage as is granted by the permissions of the ticket of the original content, to provide for regulated permitted usage of the associated data file by the recipient device, such as printing, viewing, exporting, saving, or execution of an application program, represented by the associated data file;
  • FIG. 26 illustrates a flow chart and state flow diagram corresponding to the combined output systems of FIGS. 2 and 4 , herein, wherein encrypted content and an encrypted production key are combined to provide a combined encrypted output which is provided as a combined output to a recipient device, wherein the recipient device receives the combined encrypted output, and separates the combined content into separate files, an encrypted content copy file and an encrypted production key copy file, which are then separately decrypted in the recipient device to provide a decrypted encrypted production key which is utilized to decrypt the encrypted content to provide an output of decrypted content (the unencrypted content).
  • FIG. 27 illustrates a flow chart and state flow diagram for a production system providing (1) for the encryption of selected original content with a production encryption key; (2) for the encryption of encryption of the respective production encryption key with the same production key; and (3) encryption of the production encryption key to make the distributed protected content appliance specific, by encrypting the production key responsive to an Appliance ID generated at a recipient device to create the encrypted production key, and further provides for encryption, utilizing the same production encryption key, of a usage rights permission ticket output (generated by a ticket logic subsystem to provide a ticket output with defined rights for the associated encrypted content, and encrypts the generated ticket using the same production key as was utilize to encrypt the respective associated selected original content, so as to provide an encrypted ticket output which defines the usage rights, ticket ID, etc., for a ticket specifically associated with the respective encrypted content and encrypted production key, which made appliance specific via the encrypted production key, and are ultimately to be provided to a specific recipient device;
  • a usage rights permission ticket output generated by a ticket logic subsystem to provide a ticket output with defined rights for
  • FIG. 28 illustrates a flow chart and state flow diagram for implementing additional security within the recipient device, by storing the decrypted ticket at least in part, in a plurality of locations within storage of the recipient device, to provide for multi-level security verification capability and to increase the level of security;
  • FIG. 29 illustrates a flow chart and state flow diagram illustrating, within the recipient device, the altering of the multiple stored values for usage rights of decrypted content in the respective multiple locations of the storage device storage of the recipient device 1400 analogous to the storage and locations of FIG. 28 ;
  • FIG. 30 illustrates a flow chart and state flow diagram illustrating the operation, within the recipient device, to process and utilize an encrypted ticket, to provide for decrypting of the encrypting content on an appliance specific basis (in a preferred embodiment), to provide decryption of the ticket and ticket ID and other data for usage rights, and provides for validation of usage rights ticket (such as based on actual usage or verifying multiple stored tickets to validate usage rights) providing a validated usage rights signal to regulation logic which regulates the usage of decrypted content as output from FIG. 19 , for example, to provide for selectively regulated usage such as viewing, saving, exporting, running as an application program or printing.
  • the security system and methodology of the present invention provide for secure distribution and regulated control of usage for protected content provided to recipient device-based products. This mitigates concerns of publishers and editors who want to ensure their works are protected while preserving the ability for others to legally use a copy of the original content unencumbered. Protected works of original content are encrypted for security prior to transmission.
  • original content e.g., information
  • a trusted provider production system that only valid recipient device appliance software can read or use. Therefore, protected works stay protected no matter where they are, whether on one or more computers, CDs, or via the Internet.
  • only designated specific recipient devices and authorized trusted providers are able to decrypt this protected data.
  • An encrypted content file in accordance with one aspect of the present invention, is completely unreadable and unusable on any system except the intended specific authorized recipient device (or devices).
  • the protected content is not usable or readable on any other recipient device, or any other computer that is not authorized, or on any other system, or on CD-ROMS, on a PC, on the Internet, or anywhere else.
  • Each recipient device appliance has a unique identifier associated with it, that is used, in a preferred embodiment, during the encryption process to ensure that protected content is appliance specific and can only be viewed and/or otherwise usable on the recipient device (or devices) that is was intended for.
  • all protected content is also protected by affixing or displaying an appropriate copyright notice (or trade secret or other notice) that is not removable.
  • a production system generates a specific particular production (encryption) key as associated with the respective selected content.
  • the particular production key is used in encrypting said selected content.
  • a ticket (or other associated data) is generated to define permitted usage rights for the respective selected content, (either based on default criteria (e.g., no use, some uses, and full use) or based upon specific defined usage permission criteria.
  • the production system preferably uses RSA to encrypt its data.
  • RSA is an industry standard encryption used by thousands of companies around the world, including Citibank, Microsoft, Oracle, and Wells Fargo. It has resisted attempts to crack it for over four decades, and is a very powerful encryption solution more than suitable for protecting original content. However, any other encryption technology can also be utilized with the present invention. The choice is one of design consideration.
  • several functions that the recipient device would otherwise be able to perform can be selectively disabled (or enhanced) for respective particular encrypted content responsive to respective associated usage rights permissions.
  • default usage rights permit each authorized recipient device to be allowed to always be able to view encrypted original content that was intended for it.
  • Examples of functions that be selectively enabled (or disabled) include:
  • the system and methodology of the present invention provide for a production system and methodology for the production of protected content, production encryption keys, (and where applicable, associated usage rights) and for secure distribution by a trusted provider's production subsystem, to a consumer subsystem with a recipient device appliance running valid authorized respective associated application software.
  • the system and methodology of the present invention provides for secure distribution, transmission and storage for protected content at all times, thereby protecting the rights of the original content holders and owners and, therefore, ensuring that their original content works stay protected.
  • the present invention also provides for simplified user (consumer) interaction, and in an easy to use manner allows people to legitimately use protected content in permitted ways.
  • a system and methodology for secure distribution and protection of usage of protected content provides an infrastructure supporting one (or more recipient devices) user appliances—each recipient device comprised of a computer subsystem (processor, memory, display, etc.) running an (authorized, validated) executable application software program (herein also referred to as one of a specific (or particular) device (or appliance or recipient device), providing for one or more defined permitted uses of protected content, and optionally, additionally or alternatively, restricting any usage of the respective content to be only usable on a specific particular appliance.
  • the protected content is made appliance specific (only usable on a specific defined appliance).
  • the protected content can be of their own creation, or licensed from one or more multiple third parties of original content.
  • This system and methodology of the present invention also provides controls to be utilized by and for the benefit of owners, producers, distributors, and publishers, to utilize to limit the use of their protected content to (1) any authorized recipient device appliance (a computing system running an authorized copy of the associated application software (that is compatible with the methodology and structure and outputs used by the respective production subsystem to generate the protected (encrypted) content, etc.). (2) Additionally, control of usage can be further restricted to limit usage to only a specific appliance (or specific appliances) that are licensed, by making the protected content only usable on a specific particular designated one (or more) of the specific appliance recipient devices.
  • any authorized recipient device appliance a computing system running an authorized copy of the associated application software (that is compatible with the methodology and structure and outputs used by the respective production subsystem to generate the protected (encrypted) content, etc.
  • control of usage can be further restricted to limit usage to only a specific appliance (or specific appliances) that are licensed, by making the protected content only usable on a specific particular designated one (or more) of the specific appliance recipient devices.
  • the trusted provider's production system selects the level of security to be associated with protected content.
  • the options for security levels are completely flexible and variable, and can be set to be any of a plurality of levels over a range from limiting to only certain usage of the protected content on specific particular ones of recipient device/appliances, and ranging to permitting all uses of the protected content on any authorized recipient device (appliance), any usages desired to be regulated, including all permitations and combinations of the above.
  • usage is controlled to only be usable only on a specific designated one or ones of the recipient device(s).
  • the system and methodology provide for associated identification data of related information (such as the origination, date of creation, alternate titles, etc.) of the protected content information.
  • the association of the associated identification can be either physically associated with or logically mapped or indexed to the respective associated data file(s) (content, key, and ticket).
  • This related associated identification information can be either stored within (as a part of) the protected encrypted content, or provided as additional data stored separately from (but associated with) the respective protected encrypted content.
  • a data file of selected content is first converted and encrypted (and stored) in a proprietary file format by a trusted provider (with a production system) to provide for protection of the protected content information.
  • the proprietary encrypted security format (referred to alternatively as ESF format or protected content format or encrypted content) provides a file protection methodology, infrastructure and architecture. This file structure can contain one or multiple named objects that each may mutually exclusively be encrypted (or not).
  • a licensed user or a recipient device one using a computing system running authorized licensed application software, can utilize the protected content in the proprietary file format.
  • usage of the respective content on the recipient device can be even further restricted in accordance with associated usage rights or permissions associated with each respective file of encrypted content [that is, either embedded or as a separate rights data file component of the respective encrypted content or as a separate associated data file (e.g., a ticket)], when that security level is enabled during production.
  • the production system (also referred to as production subsystem) sets the permission (usage rights) level for each file that is selected (the selected file), the selected file is encrypted, to create a file of protected (encrypted) content.
  • the selected file is encrypted, to create a file of protected (encrypted) content.
  • multiple files can be encrypted as a group, at a selected set level of permission usage rights.
  • Protected content can be converted (and stored) at multiple usage levels.
  • levels of usage rights permission that can be set for a protected file (or group of files) include:
  • the only level of usage restriction that the user of the recipient device can set is for content of the user of the recipient device, and only at the Basic Level.
  • either Basic and Standard level encryptions can be performed for content of the recipient device.
  • the provider/producer of protected content can set any level of usage restrictions and encryption. After distribution, the user of a recipient device cannot alter usage restrictions unless permitted by the usage rights permissions, and then, preferably, only more restrictively than the original (to maintain security).
  • Enhanced usage level encryption of content can only be encrypted by a trusted provider of the content that has production encryption application software to provide for content encryption, and setting of usage right permissions (restrictions), etc.
  • the Enhanced usage restriction level in addition to content usage restrictions, as described above, provide for restricted access to the decrypted information, solely restricted to a particular specific one (or more) authorized remote device appliance(s). This is distinguished from the illustrated Basic and Standard Levels, where any licensed recipient device appliance can decrypt the Basic or Standard level encrypted content.
  • usage rights permissions are associated with a specific encrypted content file by the provider/producer [such as by an indexed mapping using an ID for mapping the usage rights to the respective file (or files)], and are further utilized by the associated authorized application software on one or more authorized recipient devices, for controlling usage on a respective recipient device for respective associated protected encrypted content.
  • the various security levels of encryption can be applied to any type of content and/or object, and multiple encryption levels can be used within a given file or files or set of information.
  • all encryption levels can optionally provide for notices (such as copyright notices), warning of the restricting of the use of the protected content as only for authorized licensed users.
  • An Enhanced Level Encryption option is preferable for maximum protection of content.
  • the data to be protected is encrypted using a private key (an encryption key) (such as of a RSA public/private data key pair).
  • This private key is provided by (generated or recalled from storage or otherwise provided) and kept by the trusted provider (or providers) only.
  • Trusted providers should, preferably, be a very limited group of entities, trustworthy to maintain confidentiality as to the keys, the process and all related aspects.
  • the encryption of the selected content by the private data key allows the selected content data to (1) be verified as legitimate data and, (2) not be altered by another third party, other than the intended recipient device, since none of them have, or can generate this key.
  • This encrypted protected data is unintelligible on any computer, CD-ROM or across any public network, without the public data key.
  • the public data key (also referred to as encryption key, or production key, or production encryption key, or authorization key) is never shared beyond the trusted provider without the public data key itself first being encrypted. Only a recipient device computing system capable of decrypting the public data key is able to use the information.
  • the public data key is encrypted (such as by using a RSA symmetric authorization key, or other means) responsive to a unique identification.
  • the unique identification is at least in part generated responsive to unique identifying information generated from within a specific recipient device.
  • the public data key can be provided by a particular recipient device (specific appliance).
  • the unique ID can also be provided by generation of a unique ID via software in the recipient device (either via a pool of pre-assigned numbers, via a random number type generator combined with other data (such as time of day, date, etc.)
  • the authorization key is confidential, and is maintained as a trade secret combination of a unique ID (also alternatively referred to as Appliance ID) generated by a particular recipient device appliance (such as generated based upon the unique network card MAC address, and/or other information).
  • the recipient device software application obfuscates the process (such as in the binary code) and uses the unique identification (ID) to decrypt the respective public data key that was encrypted at the trusted provider for the respective content.
  • the recipient device application software never reveals authorization keys to any user, and never stores (as decrypted) authorization keys in a file (except in an encrypted form), and minimizes the presence of any decrypted authorization key in RAM to a temporary transient presence.
  • This provides security at multiple levels, (1) since the protected (encrypted) content cannot generally be used by just any computer to utilize protected content, (2) since knowledge is needed of the specifics and the methodology, (3) since the computing system must be running the proper application software and (4) since the computing system must be comprised of components to enable the application software generates the unique ID and other information utilized by the application software to generate and Appliance ID that is used to decrypt the encrypted public data key (that cannot otherwise be determined and thus, the protected (encrypted) data cannot be used).
  • a system and methodology for generating, or otherwise providing production encryption keys, and storing, and selectively re-utilizing the keys.
  • a new encrypted production key public data key is created for every recipient device appliance (each with its own unique ID) within which the protected content data is to be selectively authorized for usage.
  • the production key can be encrypted using a respective unique ID from a particular recipient device, and then, the relatively small encrypted public data keys (encrypted production keys) can be sent to the selected ones of the recipient devices.
  • the encrypted production keys can only be used by the respective particular recipient device (specific recipient device that generated the respective unique ID utilized to encrypt the production encryption key), to authorize and be decrypted by the specific particular recipient device in providing for the permitted use of respective protected (encrypted) content on a selective basis.
  • a selected file (or files) of content data is encrypted only once with a single production encryption (public data) key.
  • encrypted data is not stored in an unencrypted form on any hard disk file on any recipient device appliance.
  • special usage permissions can be set by an authorized trusted provider to permit this operation.
  • first portion that is the actual original content data information (such as text, graphics, performance notation such as sheet music, data representative of a still or motion video or an audio image, an executable program file, or other data file) that is encrypted.
  • the second portion of selected content data is associated with a respective first portion.
  • the second portion defines permissions for the use of the respective associated first portion (the original content), (such as a permissions for viewing or printing viewable information).
  • the first portion (original content) and the associated second portion can each be separately encrypted as two separate files, or encrypted together as one file. In either case, the encryption is done using the same production key.
  • both the first portion and the second portion must be decrypted using the same public data key (encrypted production key), (which is decrypted by the respective recipient device).
  • Usage rights can be set according to multiple options. There can be a preset minimum usage (e.g., a default level of none to little rights, hanging up to an unrestricted level of all rights), selectively set based upon criteria or related to a specific transaction [such as transaction data (e.g., a credit card related transaction to purchase usage rights).
  • a preset minimum usage e.g., a default level of none to little rights, hanging up to an unrestricted level of all rights
  • transaction data e.g., a credit card related transaction to purchase usage rights
  • Appliances such as hierarchical-based levels
  • multiple levels ranging from maximum usage rights to minimum (or more restricted (relatively)
  • usage rights can be set to be based upon relative rank or importance of respective appliances (and their respective users). For example, a conductor is least restricted (having the most permissions), with each subsequent user group at a lesser usage rights level vis-à-vis the previous (higher) user. After conductor, the next level for a symphony would be concertmaster; then, principals for each instrument, and the next level would be lateral players (e.g., all violins, all cellos, etc.).
  • This hierarchical rights levels also apply to other types of user groups (e.g., a school, class).
  • Permissions for usage rights can be (1) regulated either by type of usage for any authorized recipient device appliance, or (2) regulated so as to only work on a particular specific appliance (or multiple particular specific appliances), and then further regulated to selectively control type of usage on a respective specific recipient device. There are many alternative options for usage permissions.
  • Examples include:
  • Permissions can also include other associated data, such as creator of the permissions, password, and modification of the permissions rights.
  • Permissions can also be set to limit usage to a defined number of times. Many options exist. For example, in one embodiment, during production of the encrypted content and associated usage rights permission, usage rights are set in the most restrictive state, in the absence of any explicit permissions. Many other options also can be selected, based upon design criteria and requirements of the trusted provider.
  • permissions data in the Enhanced level encryption model are encrypted twice, first, with the private data key, and then with the authorization key. Only the trusted provider/producer of the encrypted content is capable of performing the encryption of the production key (only it has the private data key). By encrypting the production key utilizing a unique Appliance ID generated at a particular specific recipient device appliance, only that particular specific recipient device appliance can decrypt or use the encrypted content, or encrypted permission associated with and related to the protected content. The Enhanced security level permissions cannot be changed by the user.
  • Permissions can be provided to the user in one complete package (integrated or otherwise combined as a single file or group of files) or in multiple packages (that is, the encrypted content file is separate from the associated encrypted usage rights file, and the encrypted content file is provided separately from the encrypted permission). Where encrypted content and associated encrypted usage rights permissions are provided as separate files, there are multiple options that can be selected.
  • the encrypted content can be (1) unusable on a recipient device without the associated separate encrypted permission file, or (2) usable in a recipient device in a minimal manner of usage without the associated usage rights file, or (3) usable to a predefined level of usage (from minimal to all options enable) on a recipient device without (unless it is present) the associated encrypted permission file, or (4) usable at whatever level of usage the respective associated encrypted usage rights permission file (or ticket) provides for, but only as per that level. (Many other options can be chosen. Again, the choice is again one of design options.)
  • the various individual permissions can be established and set by a trusted provider, at any time concurrent with or subsequent to the encryption of the respective protected (encrypted) content. However, preferably, only a trusted provider can generate related associated additional files (or tickets or packages) of permissions granting a broadening of usage rights for a previously encrypted content.
  • the recipient device user provides the provider subsystem with the recipient device's unique ID (and optionally other information) such as by providing appliance data (or other methods such as when unique ID changes have been made in the field).
  • the trusted provider then generates the encrypted public data keys (e.g., encrypted production key) and encrypted permission packages (e.g., encrypted ticket) for a user.
  • These can be sent to the recipient device with increased security, since a third party's use of this encrypted information requires a licensed application software program executing on a recipient device, and must be compatible with the trusted provider technology.
  • the decryption process further requires specific hardware (e.g. a particular specific recipient device) to generate the particular recipient device's unique ID.
  • the encrypted public data key is intended solely for a respective particular specific recipient device appliance, and is not usable on any other appliance. This provides for flexibility with security.
  • the encrypted public key may be stored on (but is unusable on) a separate appliance for backup or an intermediate device used in the transmission of the key to the intended particular specific appliance.
  • each appliance's key (for all of the multiple recipient devices) is stored together as one file of all the keys, as associated with the respective encrypted content file. Even though only one of those keys is valid for usage on each of the respective ones of the particular specific recipient device appliance, without compromising the security of the keys for the other appliances.
  • only one of those specific multiple recipient devices that can decrypt one of the keys
  • each recipient device can only utilize the encrypted production keys explicitly created specifically for it.
  • Key refers to a symbol or sequence of symbols or a data file, (or electrical or mathematical or mechanical or numerical correlates of symbols) (or mathematical data processing of data files) such as utilized by an encryption engine or other keyed conversion logic [and the corresponding decryption engine] in order to encrypt or decrypt any other data files (such as text).
  • Appliance is a term used as an alternative term for a computer system running application software that comprises a recipient device.
  • Recipient Device refers to any computer system executing (or running) application software (or otherwise), for getting appliance data from within the computer system for generating an Appliance ID for the recipient device, which is provided and used for encrypting a production key that was utilized for encrypting respective encrypted content, to provide an encrypted production key. Only the recipient device generating the Appliance ID can thereafter, decrypt the encrypted production key to utilize the respective decrypted content locally at a recipient device.
  • multiple encrypted production keys can be associated with encrypted content to permit usage of that content by a plurality of authorized recipient devices.
  • a fixed encrypted production key can be used to permit all recipient devices running the correct application software, to use the encrypted content in a preferred embodiment usage is as per defined usage rights (whether Read-Only, Read/Annotate, Network, or other) for regulating use of encrypted content.
  • Master Production Key refers to a master key that allows a document to be encrypted (or decrypted) regardless of what appliance is trying to open the document. This is useful for a production system to test, modify or re-authorize rights for encrypted content. Only a few production utilities are provided that can open a document with this key. The master production keys are never distributed to a consumer.
  • Document Production (Encryption) Key is a key that is utilized to provide for encryption (and decryption) by a specific recipient device appliance, and provides control for regulating usage of respective associated content [such as to open a particular (or group of) documents].
  • a group of documents can share the same document production key when designated for the same recipient device (or devices).
  • Appliance Authorization refers to a set of information utilized to provide for a unique identification and authorization, such as an appliance key such as generated from fixed data identifying the appliance (and preferably with an added password level of protection for use of the application software), and/or a program level for the respective application software program (feature set levels (e.g., Reader Only; Read-Annotate; Print; Export), and preferably also serial number (user identification) that authorizes the program to run at no more than a specified feature set (and preferably only on a specified appliance).
  • feature set levels e.g., Reader Only; Read-Annotate; Print; Export
  • serial number user identification
  • some are provided as a non-variable stand-alone product and is not capable of running all the features authorized.
  • a reduced feature reader product such as Acrobat Reader from Adobe Inc., or the eSReader from e-Stand, Inc., has very limited capabilities and doesn't include the fullest feature set but will only run with the limited feature set as fixed to be allowed.
  • Original content refers to any one or more of:
  • Key Production, usage, and retention strategy can be varied.
  • keys can be time-stamped or otherwise designated with a limited life.
  • all keys can be generally valid indefinitely (forever); however, in this case, the Appliance Authorization can be limited to a specific date as specified by the computer's system clock.
  • Appliance ID refers to a unique identifier associated with, and preferably generated by, a specific appliance. This unique identifier is preferably calculated on-the-fly [in the specific appliance (recipient device) executing respective authorized application software thereupon], based on unique features of the specific appliance.
  • a Ticket ID refers to a unique identifier associated with a specific ticket. This identifier is created when the ticket is generated, and is utilized in identifying and locating the respective specific ticket (e.g., for indexing, mapping, cataloging, and/or providing linking ID to associate the respective ticket with other components or content or files).
  • Document Keys are generated from the Production Keys and Appliance ID.
  • the respective production (encryption) key utilized for respective encrypted content is encrypted utilizing the Appliance ID as a key input to the encryption logic, (needed for both the encryption and the subsequent associated decryption) to generate a Document Key [comprised of the production key encrypted using the specific Appliance ID as an input].
  • document keys are generated upon the sale of a document to a customer, who either supplies their Appliance ID or which is a previously stored Appliance ID (historically by customer ID on file), such as a result of a previous authorization or previous document (of selected encrypted content) purchase.
  • the Document Key is required to unlock [using the respective application software within the recipient device to generate a generated Appliance ID (such as by access to the recipient device computing hardware and software)].
  • the application software applies the decrypted production key which is utilized thereafter in decrypting the encrypted content within the specific respective recipient device appliance and for controlled regulated use of the encrypted content in a decrypted (unencrypted content) form, by the specific respective recipient device.
  • data rights management system ( 10 ) is comprised of a provider encryption services subsystem ( 104 ) providing outputs of encrypted content ( 120 ), and encrypted production key ( 158 ).
  • the recipient device has control decryption logic (executed in the application software) generates an Appliance ID, and preferably jumbles the Appliance ID (such as utilizing a defined hash) to output a jumbled Appliance ID ( 157 ) production subsystem 104 .
  • the production system utilizes the Appliance ID (if necessary after first un-jumbling the jumbled Appliance ID) and encrypts the production encryption key responsive to the Appliance ID to generate an encrypted production encryption key (also called an encrypted production key).
  • Jumbling refers to processing of content to be communicated in a secure method. Jumbling can be accomplished in numerous alternative ways, such as use of secure socket layer (SSL), or hashing, encryption, etc. (For additional background, also see Applied Cryptography by Bruce Schneier; or other texts).
  • SSL secure socket layer
  • a jumble operation refers to a form of encryption used to transmit data between systems. This may be an encryption method using a predefined key on original transmitted data and outputs to encrypted transmitted data. It could also be an encryption method using a negotiated temporary key between the jumble and unjumble operations.
  • An unjumble operation is a decryption method that inputs encrypted transmitted data and outputs a copy of original transmitted data.
  • the decryption method and key is selected to be complimentary to the encryption method used in the jumble operation.
  • the outputs are each jumbled and are unjumbled by an authorized recipient device.
  • the jumbling (and respective un-jumbling) is optional, and while adding another level of security, is not a requirement of (or necessary to use of) the present invention.
  • the encrypted content and encrypted production encryption key are jumbled to provide jumbled outputs of a jumbled encrypted content ( 120 J) and a jumbled encrypted production key ( 158 T). These jumbled outputs ( 120 J and 158 T) are coupled to a recipient device.
  • the jumbled outputs are coupled to respective inputs 220 and 188 of the consumer decryption services subsystem 204 [such as a user's computer appliance (recipient device).
  • the provider subsystem 104 provides a host computing subsystem comprising a processor, storage, and running respective production application software to provide for operation of the provider subsystem 104 .
  • the provider subsystem 104 and consumer subsystem 204 are each further comprised of a communications interface for coupling communications therebetween.
  • the consumer decryption services subsystem 204 e.g., a recipient device
  • the consumer subsystem 204 provides an output of the Appliance ID ( 187 ) [e.g., preferably in one embodiment jumbled such as by utilizing an encryption to jumble the internally generated Appliance ID].
  • the consumer can call (phone), FAX, email, or directly couple via computer, to provide an output of the Appliance ID ( 187 ) to the input ( 157 ) of the provider encryption services subsystem ( 104 ).
  • the provider encryption services subsystem ( 104 ) utilizes the Appliance ID input ( 157 ) to encrypt the production encryption key which was utilized to encrypt respective associated content (if appropriate, first un-jumbling the jumbled Appliance ID), and the encrypted production key is coupled for output from the provider subsystem 104 (preferably jumbled for transmission) [illustrated as coupled to input 188 of the consumer services subsystem 204 ].
  • the encrypted content output ( 120 ) is jumbled and provided as jumbled encrypted content output ( 120 J), and is provided from the provider subsystem ( 104 ) and is coupled to an input ( 220 ) of the consumer decryption services subsystem ( 204 ).
  • the consumer decryption services subsystem ( 204 ) utilizes a jumble decryption to un-jumble the jumbled encrypted production key and to generate an encrypted production key copy, and then utilizes its internally generated Appliance ID to decrypt the encrypted production key copy, and then utilizes the decrypted production key to decrypt the associated respective encrypted content, to generate an output ( 200 ) of unencrypted content that is stored in the recipient device in its unencrypted form for usage by the application software of the recipient device in accordance with the respective associated defined usage rights.
  • storage of the unencrypted content in the memory of the recipient device of the consumer subsystem is only temporarily stored as unencrypted, responsive to the application software, so as to maximize security.
  • FIG. 2 an alternative embodiment to that of FIG. 1 is illustrated, showing the encrypted content and the encrypted production key being combined by the production system ( 104 ) as a single combined output, prior to communications to an external system, or otherwise coupled to a respective consumer subsystem ( 204 ) (recipient device).
  • the provider subsystem ( 104 ) and consumer subsystem ( 204 ) is jumbled, to add an extra level of security. This is optional; it is a design option [to add jumbling (or not)].
  • FIG. 2 shows the encrypted content and the encrypted production key being combined by the production system ( 104 ) as a single combined output, prior to communications to an external system, or otherwise coupled to a respective consumer subsystem ( 204 ) (recipient device).
  • all communications between the provider subsystem ( 104 ) and consumer subsystem ( 204 ) is jumbled, to add an extra level of security. This is optional; it is a design option [to add jumbling (or not)].
  • the provider encryption services subsystem ( 104 ) receives the (umbled) Appliance ID ( 187 ) from the recipient device ( 204 ), coupled to production subsystem ( 104 ) as an input ( 157 ) and the jumbled Appliance ID is dejumbled in the recipient device and is utilized to generate an Appliance ID (also referred to as an Appliance ID copy).
  • the production system ( 104 ) utilizes the Appliance ID copy to encrypt the respective associated production key that was utilized to encrypt the selected original content to create the respective encrypted content, responsive to the Appliance ID copy.
  • the provider encryption services subsystem ( 104 ) then provides an output of the encrypted production key ( 158 ) which is combined with the encrypted content output ( 120 ) utilizing combining logic 311 to provide a combined output ( 310 ) of the encrypted content 120 with the encrypted production key ( 158 ).
  • This combined output ( 310 ) is preferably jumbled prior to output from the production subsystem ( 104 ) to any external system.
  • the combined output ( 310 ) is then coupled as an input to separation logic ( 312 ) of the consumer decryption services subsystem (recipient device) ( 204 ).
  • the subsystem ( 204 ) provides a computing subsystem with a processor, memory, and display, and runs (executes) respective application software, to provide a recipient device appliance for a consumer to use to permit allowed usage of encrypted content.
  • the consumer subsystem ( 204 ) provides separation logic ( 312 ) for separating the encrypted content and the encrypted production key from the combined output ( 311 ). (If necessary, the jumbled combined input is first unjumbled.)
  • the consumer decryption services subsystem ( 204 ) then utilizes the internally generated Appliance ID to decrypt the (unjumbled) encrypted production key to generate a decrypted production key that is utilized to decrypt the encrypted content to provide an output of unencrypted content ( 200 ).
  • the unencrypted content ( 200 ) is stored locally in the recipient device (preferably, temporarily) only during and as needed for authorized usage (e.g., viewing, annotating, networking, saving, exporting) of the decrypted content in accordance with associated usage rights (if any) for the respective selected content.
  • authorized usage e.g., viewing, annotating, networking, saving, exporting
  • communications between the production subsystem ( 104 ) and consumer subsystem ( 204 ) are jumbled, (and then unjumbled by the respective other one of the consumer subsystem ( 204 ) and production subsystem ( 104 ), respectively), (such as Appliance ID, encrypted production key, etc.).
  • no jumbling may be needed, so it is not provided, and the present invention works equally well.
  • the jumbling (and unjumbling) adds another layer of security and its use is one of design choice.
  • encrypted content and Document IDs can be hosted on a host system (or saved as “groupings” or “sets” on CD ROMs) to be provided to one or more consumer subsystems ( 204 ).
  • a consumer can simply provide the Appliance ID and Document IDs for the desired selected encrypted content, and the host system can locate the selected content, and the associated respective production key used to encrypt the respective content as per the Document IDs, and encrypts the respective production key responsive to the provided Appliance ID and Document IDs received from the consumer, to generate and provide a document key that is provided to the consumer subsystem ( 204 ).
  • the consumer system ( 204 ) then generates an Appliance ID locally and uses it to decrypt the document key to get to the decrypted production key needed to decrypt the selected content (and, if appropriate, the respective associated encrypted ticket.).
  • multiple ones of unencrypted initial content files can each be encrypted with a different production key.
  • the encrypted production keys and encrypted content can be sent separately and individually, or combined and together.
  • the same production key can be used for all of the multiple unencrypted initial content files, or there can be multiple production keys used for encryption, and with some of the keys used on more than one unencrypted initial content file.
  • a production ID is associated with every production key.
  • This production ID should be relatively unique and the only relationship to production key is that there is a one-to-one relationship.
  • the production ID can be, for example, a random number, current time, random sequence of characters or a sequentially generated number that increases every time a new production key is generated, or other items, or a combination of these.
  • the production ID can be used as an index to find a production key for a respective file of associated encrypted content. In this case, the production ID is transmitted along with the encrypted initial content to the recipient device (and also subsequently with the encrypted production key).
  • the recipient device can be sent a respective production ID to a host [e.g., production subsystem ( 104 )], and the production subsystem ( 104 ) locates the associated respective production key for the respective production ID, and encrypts the respective production key and sends the encrypted production key to the respective recipient device (e.g., such as encrypted to be appliance specific responsive to the respective Appliance ID).
  • a host e.g., production subsystem ( 104 )
  • the production subsystem ( 104 ) locates the associated respective production key for the respective production ID, and encrypts the respective production key and sends the encrypted production key to the respective recipient device (e.g., such as encrypted to be appliance specific responsive to the respective Appliance ID).
  • the production ID associated with encrypted initial content is verified prior to use, and is compared to the respective production ID associated with an encrypted production key. If the production ID's match, then the respective encrypted production key can be used with the respective encrypted initial content to obtain the unencrypted initial content on the client machine (recipient device).
  • the Appliance ID may also be associated with the encrypted production key. This allows the client (e.g., the recipient device or system) to effectively ignore encrypted production keys that are not meant for that client recipient device, by comparing the client's Appliance ID with the respective Appliance ID associated with each of the respective ones of encrypted production keys.
  • the encrypted production keys are transmitted separately from the encrypted content.
  • the production key and encrypted initial content are transmitted together from server production subsystem ( 104 ) to client [recipient device (consumer subsystem ( 204 )].
  • client response device
  • the client recipient device ( 204 ) does not always know which encrypted production key goes with which encrypted initial content on which client. In this case, the client system ( 204 ) can still create the unencrypted initial content but the process will take longer.
  • the client system can try using every encrypted production key that it has available to decrypt the encrypted initial content. When the client determines the encrypted initial content is correct, it stops looking.
  • the client recipient device system ( 204 ) may not keep track of which document key is to be used for a particular document on a particular appliance. In this case, the client system ( 204 ) needs to check all the keys on the recipient device ( 204 ) for location of the correct particular document key. In this case, the client recipient device ( 204 ) finds the correct document key by decrypting the respective encrypted content with each respective production key, to attempt to generate the correct decrypted content for a selection, and then check the respective unencrypted initial content for correctness.
  • the recipient device ( 204 ) (client's) check for correctness of the respective unencrypted initial content requires that the client ( 204 ) has some knowledge of some aspect of the correct decrypted content. This could be a number of things.
  • the first part of the decrypted content can have a fixed set of initial characters (or a checksum on the content) or that the decrypted content follows respective specific rules. For example, most image files have a fixed string at the beginning. HTML and XML follow specific rules in their formation that can be checked.
  • a system and method for securely communicating content for use on a remote appliance without requiring server authentication.
  • the method is comprised of providing an unencrypted initial content; providing a production key; encrypting the unencrypted initial content responsive to the production key to generate encrypted content; providing an appliance identification (ID) initially generated at the remote appliance (and identifying the specific appliance); and encrypting the production key responsive to the Appliance ID, to generate an encrypted production key for the remote appliance (recipient device), to use which permits decryption only on the respective remote appliance (recipient device) and responsive to that respective remote appliance (recipient device) generating a respective Appliance ID [which is the same Appliance ID as was utilized for the encrypting of the respective production key by the production subsystem ( 104 ).
  • the unencrypted initial content can be provided by any source. Often, it is proprietary and copyrighted content that needs to have controlled access.
  • the initial (original) content can be comprised of text, images, application program code, audio, video, still video, or other data.
  • the production key can be any of a variety of data word sizes, types [such as binary data, generic character strings, alphanumeric character strings, and numeric character strings, etc.], and can be generated in many ways, ranging from defined algorithms for generating pools of IDs; to seeds for generating keys, to utilizing saved (previously generated) values, etc. Production key generation is also discussed further herein.
  • the production key size is determined by the requirements of the content encryption algorithm's key, and considerations of level of desired security.
  • the generation of the Appliance ID is based on unique characteristics of the appliance, such as based on the types of hardware options installed on the recipient device appliance, serial numbers, software options installed, or other data stored on the appliance.
  • the encrypted content is transmitted or otherwise provided to the recipient device to the remote appliance from the production subsystem ( 104 ).
  • the production key used to encrypt the encrypted content is encrypted responsive to the Appliance ID generated at the remote appliance.
  • the encrypted production key is transmitted or otherwise provided to the respective remote appliance generating the respective Appliance ID utilized to encrypt the respective production key.
  • the recipient device remote appliance uses the generated Appliance ID within the remote appliance (recipient device) as a key to unlock (decrypt) the encrypted production key.
  • the decrypted production key is utilized by the recipient device to decrypt the encrypted content, to generate the unencrypted content for use only on the respective recipient device remote appliance.
  • the distribution of the encrypted content can be electronically transmitted (e.g., download, email), stored on non-volatile storage (e.g., such as CDs or DVDs), etc.
  • the distribution of the encrypted production key can also be transmitted electronically (e.g., download, email), via CD or DVD, via regular mail, or FAX communication, etc.
  • the distribution of the encrypted content and respective associated encrypted production key can be provided independently and separately, or simultaneously and concurrently.
  • an appliance key is generated by hashing the Appliance ID generated within the recipient device in combination with a fixed password.
  • a decrypted production key is created from the encrypted production key, that is decrypted from the respective encrypted production key responsive to the respective appliance key.
  • the unencrypted content is decrypted from the encrypted content responsive to the production key generated responsive to the appliance key.
  • the appliance key is an alternative that offers an additional level of password security to the use of a generated Appliance ID, without further encryption, via use of a password.
  • the decision of Appliance ID versus Appliance Key is purely a design choice of level of desired security and other design/cost/use considerations, and either choice works equally well with the present invention.
  • the recipient device further selectively provides a display presentation on the respective remote appliance in accordance with respective usage rights (if any) for the respective decrypted (unencrypted) content, responsive to the unencrypted content.
  • the display presentation can be provided on one or more of an LCD, CRT, printer, where audio via audio speakers or audio headphones, radio transmitters, network transmitters, television monitors, POTS (plain old telephone service) phone, cell phone, or pagers.
  • the display presentation is selectively generated responsive to the unencrypted content and the usage rights for the respective unencrypted content.
  • the encrypted content can be provided to the remote appliance independently of (or simultaneously with) providing the encrypted production key to the remote appliance.
  • the production subsystem ( 104 ) first receives the Appliance ID (or appliance key) from a recipient device, and then, the production subsystem ( 104 ) generates a respective encrypted production key for respective associated selected encrypted content, using the Appliance ID, and then, provides for combining the encrypted content and encrypted production key to generate a combined encrypted output of respective content and respective production key the production subsystem ( 104 ) then provides for coupling the combined encrypted respective content and respective encrypted production key, to the recipient device ( 204 ) remote appliance.
  • the Appliance ID or appliance key
  • the method provides for utilizing the respective combined encrypted recipient device ( 204 ) content and respective encrypted production key within the remote appliance to automatically decrypt the encrypted production key to provide decrypted production key that is utilized by the recipient device to generate the unencrypted initial content.
  • the Appliance ID can be generated responsive to one or more of the following:
  • characteristics of the remote appliance that can be utilized:
  • the encrypting of the production key can be provided for in a number of alternative ways, including, but not limited to, one or more of:
  • the production subsystem process comprises providing multiple Appliance IDs and providing multiple production keys.
  • Each of the production keys is encrypted to generate a respective encrypted production key, responsive to the respective Appliance IDs. This is done for every combination of the Appliance IDs and the production keys.
  • the production system generates an encrypted production key list, responsive to encrypting the production keys.
  • This embodiment is useful when the one or multiple separate files of selected initial original content is to be made available to and will be used by, a plurality of appliances. Also, it is useful where it is desirable to selectively make available only certain ones of the selected content files on all of the specific appliances, but only usable on certain ones of the respective ones of the specific appliances.
  • the production keys associated with the respective files of specific initial content are selectively used to generate the respective encrypted production keys, based upon the respective Appliance ID or IDs that are to be allowed to have access to use the specific selected initial content.
  • the encrypted production key list is thereafter provided to a remote appliance recipient device.
  • the recipient device processes the encrypted production key list.
  • a single encrypted production key is selected from the encrypted production key list.
  • the recipient device provides for validating as known good content an attempted decryption of the respective selected content, responsive to at least a portion of the respective associated unencrypted initial content generated by attempting decryption with the presently selected single encrypted key. The process repeats until the correct key is found. If known good content is validated, the correct key has been found. Otherwise, another encrypted production key is selected from the encrypted production key list, responsive to a failed comparison of the unencrypted initial content with the known good content.
  • the selection, of a single key to try, can be as simple as starting by selecting the first encrypted production key in the list.
  • This selected encrypted production key is decrypted to provide a selected decrypted key, using the appliance's (internally generated) Appliance ID and then attempting to decrypt the respective encrypted original content responsive to the selected decrypted key.
  • the resulting decrypted content is checked to determine whether it is valid.
  • the decrypted respective original content will contain either specific known data or follow a specific format. For example, most image formats such as BMP, TIFF and JPEG begin with known data that can be compared. Likewise HTML and XML contain specific formats that can be verified. If the decrypted content is found to be valid, then, the correct encrypted production key has been found.
  • the decrypted content is not valid, that respective encrypted production key is for use with another Appliance ID or for different respective associated encrypted original content. In this case, the next encrypted production key in the list is selected, and checked as above. This continues a valid key is found or until the list is exhausted. If the list is exhausted without valid decrypted original content being found, then the encrypted production key for this Appliance ID and the respective associated encrypted original content is not in the respective list.
  • Appliance ID and/or content descriptions and/or Document ID can be included with the list of encrypted production key list.
  • the selection process is essentially the same as above, except that all encrypted production keys that are associated with other appliances' Appliance IDs and/or unwanted content descriptions can be initially rejected based upon checking for a valid appliance or content description or Document ID associated with a respective key, before validating and checking that the respective decrypted original content as decrypted using a respective key, is valid. This process and structure reduces the number of encrypted production keys in the list that are checked.
  • a production key list search and validation is required if the decrypted original content does not contain any known data or follow a specific format, since there is then no way to determine whether the respective decrypted original content is valid. In this case the decrypted original content is always assumed to be valid and the encrypted production key selected from the list must be correct as determined by other means, such as by use of the associated Appliance ID and/or content descriptions and/or Document ID, or otherwise.
  • the encrypting of the unencrypted initial content can be provided for in a number of alternative ways, including, but not limited to one or more of a) Data Encryption Standard (DES); b) RC2; c) RC4; d) Message Digest 5 (MD5); e) Rijndael; f) Triple DES; g) Digital Signature Algorithm (DSA); and h) RSA.
  • DES Data Encryption Standard
  • RC2 RC2
  • RC4 RC4
  • MD5 Message Digest 5
  • Rijndael Rijndael
  • f Triple DES
  • DSA Digital Signature Algorithm
  • RSA Digital Signature Algorithm
  • the unencrypted initial content can be any one or more of many alternate different types, such as one or more of a) Textual data (a series of characters when displayed in a visual representation provide a human recognizable information); b) image data (data that when displayed in a static visual representation imparts human responses from color and brightness); c) audio waveform data (data that when converted to pressure wave in air impart human responses from sound); d) MIDI data (data that when converted audio waveform data and then to pressure wave in air impart human responses from sound); e) video data (data that when displayed in a time-changing visual representation imparts human responses from color and brightness and optionally having an associated audio component); f) game data (data contains settings, game data and other program setting); g) business data (data that contains information on the operation of the business); h) application program code data for an executable program of any sort, such as from word processor, and image processor to video game and interactive entertainment; and other.
  • a) Textual data a series of characters when displayed in a visual representation provide
  • FIG. 3 an alternate embodiment to that of FIG. 1 is shown, further illustrating the providing for controlled usage rights of respective encrypted content, illustrated as accomplished by use of an encrypted ticket defining usage rights and associated with the respective encrypted content.
  • the operation of the provider encryption services subsystem 104 relative to the consumer decryption services subsystem 204 is substantially as discussed above with reference to FIG. 1 .
  • an output of the production key 140 (as used to encrypt respective selected original content to produce the respective encrypted content) is provided as an input to an encrypted ticket generator subsystem 401 , which utilizing the production key associated with the respective encrypted content as an encryption key, encrypts a respective associated generated ticket (defining usage rights for the respective encrypted content).
  • the generated ticket is encrypted (using the respective associated production key for the respective associated encrypted content) to generate an associated encrypted ticket for the respective encrypted content.
  • the encrypted ticket is utilized for communication to the consumer subsystem 204 .
  • the encrypted ticket is saved as illustrated, responsive to ticket logic, as a saved ticket.
  • the ticket logic ( 440 ) utilizes the decrypted production key copy ( 240 ), provided as an output internally within the recipient device ( 204 ) responsive to decryption within the consumer decryption services subsystem recipient device ( 204 ).
  • the ticket logic 440 decrypts the encrypted ticket utilizing the production key copy, and provides for analysis and derivation of a ticket rights output and a usage rights output [( 453 ) and ( 499 ), respectively], providing these outputs as inputs to usage control logic ( 501 ).
  • the usage logic ( 501 ) also receives as an input the temporary unencrypted content output ( 200 ) from the consumer decryption services subsystem recipient device ( 204 ).
  • the usage logic ( 501 ) is responsive to the ticket rights output and reduced usage output from the ticket logic ( 440 ), and based upon allowed usage rights and stored actual usage data, the recipient device subsystem ( 204 ) selectively provides for an output ( 503 ) of allowed usages (such as viewing, printing (and how may copies), saving, exporting, allowing execution of an application program, and optionally, selectively at what respective level, etc.).
  • a ticket is comprised of ticket content, that can be comprised of a ticket ID, a used indicator and other ticket components describing the usage rights the ticket is granting.
  • the ticket is encrypted with the same production key as the associated respective selected original initial content to form the encrypted ticket.
  • the production system initially provides for granting printing rights to a document.
  • the other illustrated ticket components are Appliance ID (e.g., which appliance will be able to print), Document ID (e.g., an index identifying which document to allow printing), expiration (e.g., date that rights expire), permissible times/dates for usage, permissible users of the appliance (e.g., which one (or more) recipient device consumer subsystem ( 204 )), and allowable number of copies (number of usages or copies to allow (e.g., to be viewed, printed, saved, executed, etc.).
  • Appliance ID e.g., which appliance will be able to print
  • Document ID e.g., an index identifying which document to allow printing
  • expiration e.g., date that rights expire
  • permissible times/dates for usage e.g., permissible users of the appliance (e.g., which one (or more) recipient device consumer subsystem ( 204 )
  • allowable number of copies number
  • a used indicator is stored (as encrypted) in the recipient device and provides the number of copies that can still be (are allowed to be) printed or otherwise used. When the printed copies (or usage number) are equal to the allowable copies (or usage), no more printing (or usage) is allowed by the recipient device ( 204 ), responsive to the ticket components.
  • usage rights can be set on some tickets so that some tickets never expire and those tickets grant rights forever (until used up, if usage restrictions apply).
  • the recipient device ( 204 ) executing associated respective authorized application software provides the necessary logic, also referred to as a client engine.
  • the recipient device ( 204 ) must maintain the ticket in confidence to preserve the ticket from being tampered with. Thus, only the encrypted ticket can be allowed to be stored permanently.
  • a used indicator where present, will need to be updated when a right is used.
  • the encrypted ticket is retrieved from storage by the recipient device (consumer subsystem) ( 204 ), and the application software within the recipient device ( 204 ) generates an Appliance ID used to decrypt the encrypted production key, to provide a decrypted production key. Then, the encrypted ticket is unencrypted with the decrypted production key, and the decrypted ticket is checked to see whether it applies to the current situation (to the respective encrypted content).
  • the used indicator is decrypted and checked to determine whether any usage rights are still available for this specific respective appliance recipient device (consumer subsystem) ( 204 ).
  • the decrypted ticket is modified to update the decrypted used indicator, and the updated ticket and updated used indicator are then encrypted with the production key, and then the encrypted (updated) ticket is stored within the recipient device ( 204 ) for later use. All tickets should preferably be saved locally on the client recipient device system as associated with the respective application software together, forever, so that the integrity of the used status can be maintained.
  • the storage structure for encrypted tickets usage can be in many forms. It is important however that usage and rights information be encrypted so it cannot be easily modified by unauthorized entities. If the ticket cannot be decrypted properly then no rights are granted. Even though the rights and usage information may be available in an unencrypted form as well, they cannot be used to grant rights. Without a properly decrypted ticket, the unencrypted rights and usage information can only be used for searching and finding an appropriate ticket. Furthermore, any attempts to modify the rights and usage information are identified, and if the unencrypted rights and usage information are not identical to the encrypted rights and usage information generated by a validated properly decrypted respective encrypted ticket. If tampering with any ticket is found, then that ticket is invalidated (all rights and usage are reset as not allowed).
  • An example of a storage structure for components of a ticket in accordance with one embodiment of the present invention is shown below using an XML format.
  • the structure utilized specifies several tags as components.
  • the “appid” tag specifies the respective valid appliance for the respective ticket.
  • the “docid” tag specifies the respective valid Document ID for the respective ticket.
  • the “tikid” tag specifies the ticket ID associated with the respective ticket for associative mapping thereto.
  • the “used“ tag specifies the number of prints that have been used. In this example, the value is “ ⁇ 1” which indicates that all the prints have been used.
  • the “ticket” tag specifies the encrypted rights and usage information.
  • the value of the ticket tag will contain all the tags above and the maximum number of prints allowed which is part of the rights to be granted. The maximum number of prints allowed are used to determine when the usage tag should be changed to “ ⁇ 1” to indicate that no more prints are granted from this tag.
  • the ticket tag will look to the casual observer as a series of random characters. However, when decrypted with the same key as the respective Document ID, the respective unencrypted rights and usage information is made available. For clarity of the example, a reduced length of the value of the ticket tag has been shown in this example. Preferably, it would be much longer so that all the appropriate information can be stored in it.
  • the storage location for the encrypted tickets can be the local client storage in the recipient device.
  • redundant storage is desired to minimize the loss of information. If stored redundantly, the tickets should be synchronized frequently, to make sure they are identical. If found to not be identical, then, the recipient device system makes the decision on the usage rights for the recipient device in the direction of reducing the rights to the lowest (least) rights of the multiple redundant tickets. For example, if one of the redundant tickets indicates that one more print is available and another redundant ticket (ticket ID identical) indicates that no prints are available, then, both redundant tickets are conformed (the one is changed) to indicate no prints are available.
  • the storage location for the redundant encrypted tickets can alternatively or additionally be a host or remote server.
  • the remote server can just provide the storage, or it can also provide some of the processing to determine whether to grant the rights.
  • the recipient device client subsystem running the respective application software must send necessary information (e.g., Appliance ID, ticket ID, Document ID, etc., other ticket components) to the server.
  • the server then generates an appropriate ticket after determining on the server the associated respective perspective usage rights, and then the server transmits a respective encrypted ticket back to the client.
  • associated control data is provided with the respective unencrypted content.
  • encrypting the unencrypted content is comprised of encrypting both the selected unencrypted original content together with respective associated control data, responsive to the production key, to provide encrypted content and associated control data (e.g., either as a separately provided associated encrypted ticket or as a combined integrated encrypted file [content and associated control data].
  • the associated control data defines usage rights for the respective associated content, and is provided at the production subsystem ( 104 ) based on the requirements of the initial content provider.
  • a recipient device appliance can be restricted so as to only permit predefined standard uses of the initial content (such as view only) even though the respective content can be enabled for other usage capabilities (such as annotate, print, save, network, export, save).
  • standard uses can be more fully featured, with the provider making usage restrictions.
  • the provider [production system ( 104 )] of the initial content can set up rights for exceptions to the standard uses. These exceptions can also be encoded in the associated control data to provide for selective control of usage of the respective associated content by the respective recipient device appliance.
  • This associated control data is encrypted with the same production key as the associated respective initial original content. This encryption can be done for one file (or portion) of selected initial content, or for multiple files of initial content (such as a grouping or collection of files). This encrypted associated control data can be for one file, or for the grouping, or one for each file in a grouping.
  • the encrypted associated control data is coupled (or otherwise provided) to a specific recipient device appliance.
  • the respective production key is encrypted by the production system ( 104 ), responsive to an appliance ID generated by the specific appliance. Thereafter, the respective encrypted production key is provided to the respective specific appliance.
  • the respective specific appliance locally generates an Appliance ID that is locally utilized by the specific appliance to decrypt the encrypted production key to generate a decrypted production key that is used to decrypt the encrypted content to generate respective decrypted content.
  • the decrypted production key is also used to decrypt the respective encrypted associated control data to generate decrypted associated control data.
  • the decrypted associated control data is used by the respective specific appliance to selectively control and provide for permitting only the allowed usage rights [as per the exceptions to the standard uses (or defined permitted usages)] of the decrypted initial content.
  • the selected initial (original) content is encrypted by the production subsystem ( 104 ), responsive to an associated production key to create respective encrypted content.
  • the encrypted content is transmitted, [or otherwise provided from the production system ( 104 ) (trusted provider)], to the respective specific remote appliance (recipient device).
  • the associated production key is encrypted using an Appliance ID provided from a specific remote appliance.
  • the encrypted production key is also transmitted (or otherwise provided) to the remote appliance.
  • the Appliance ID is then locally generated at the remote appliance and is used as a decryption key to unlock (decrypt) the respective encrypted production key to provide a respective decrypted production key.
  • the decrypted production key is utilized within the recipient device remote appliance, (1) to decrypt the respective encrypted content to provide decrypted content, and (2) to decrypt the respective encrypted associated control data to provide decrypted associated control data.
  • the recipient device selectively permits only permitted usages of the respective decrypted content only on the respective specific recipient device remote appliance, and only in accordance with and responsive to defined usage rights of the respective decrypted associated control data.
  • a display presentation can be selectively provided for viewing at the respective specific remote appliance responsive to the unencrypted initial content and respective associated control data (usage rights) providing content-view control.
  • the respective specific recipient device system can selectively permit printing of the unencrypted initial content responsive to the usage rights providing for content-print control.
  • the associated control data is set by the trusted provider (the production subsystem ( 104 ) (that is providing the respective associated selected initial content), and can define many alternative usage rights, such as one or more of (a) viewing privileges [selectively allows the initial content to only be viewed at certain times, or only for a certain length of time, or only for a limited number of times] or unlimited; (b) printing privileges [only allows the initial content to be printed at certain times, or for a certain length of time, or only a limited number of times] or unlimited or not at all; (c) exporting privileges [only allows the initial content to be exported at certain times, or for a certain length of time, or in certain file formats, or only a limited number of times] or not at all; (d) partial access privileges [only allows certain parts of the initial content to be available, (for any use, or for specific uses)]; (e) access privileges [only allows certain programs to access the initial content]; (f) running and execution privileges, [only allows certain programs to run on the appliance
  • a user of a recipient device e.g., the client
  • the recipient device would first check whether it has been granted unlimited printing rights. If those rights are available, the recipient device-client authorizes the printing and proceeds to print the document twice. If unlimited rights are not available, the recipient device-client searches for respective associated tickets that are valid for this specific appliance, and the respective proper Document ID and that the ticket has the right tag defining usage rights equal to “print”, and also that the respective ticket has the actual usage tag not equal to “ ⁇ 1” (See discussion elsewhere herein, regarding the example ticket). The recipient device-client will decrypt the ticket tag and check the ticket for validity using the document key for the Document ID.
  • the recipient device-client will be revised to increment the usage tag [or set it to ⁇ 1, if all the authorized copies have now been used].
  • the revised ticket is stored. Then, one print of the respective document is performed by the recipient device.
  • the second copy of the print follows the same procedure. The reason for repeating the process is because multiple tickets may be required (or otherwise be used), (each ticket may only allow 1 print) or printing problems could occur that results in rights being used up even though a print command doesn't actually physically print. However, using the print rights up only one at a time, sequentially, allows the print process to be aborted without using further rights. Alternatively, if desired, two print usages can be provided for, and providing the ticket has two print usages left, the print rights changed (appropriately for two print usages) in the ticket in one step.
  • the associated control data can be utilized to activate one or more of (at least one of): (a) viewing privileges; (b) printing privileges; (c) exporting privileges; (d) partial access privileges; (e) running privileges; and (f) independent access privileges.
  • These privileges are selectively allowed by the respective application software running on the specific appliance (recipient device), responsive to the respective associated control data for associated selected content.
  • the specific appliance is responsive to the associated control data to enable the standard uses of the respective selected initial content [as per the respective initial content and/or as per respective application software operational constraints, operating within the recipient device], and any exceptions to those uses as per the associated control data.
  • a specific recipient device appliance cannot share decrypted initial content with any other appliance or for any use on any appliance that is not allowed by these respective defined usage right privileges for the respective content. All other processes (e.g., operations within an appliance) and any appliances that are selectively permitted and allowed access to the respective decrypted initial content must honor and adhere to the privileges (e.g., usage rights) granted to them by the respective associated usage rights.
  • All other processes e.g., operations within an appliance
  • any appliances that are selectively permitted and allowed access to the respective decrypted initial content must honor and adhere to the privileges (e.g., usage rights) granted to them by the respective associated usage rights.
  • a display presentation can be selectively provided at the respective remote appliance responsive to the respective unencrypted initial content.
  • Selective printing of the respective unencrypted initial content can also be selectively provided, responsive to respective authorized usage rights of the respective associated control data as to printing privileges.
  • the number of allowed prints (number of copies that are allowed to be printed of the unencrypted content) is stored in and as a part of the associated control data.
  • a print count is also available to the specific appliance. This print count is either stored on the appliance or on a remote system. The print count is incremented every time a print is made and the new revised value is stored, respectively, on the appliance and/or the remote system. Printing is not allowed of respective selected content, if the print count is equal to or greater than the number of prints allowed as set forth in the respective associated control data.
  • the consumer's recipient device (remote appliance) system selectively provides a display presentation (at the remote appliance) responsive to the unencrypted initial content and to the respective associated viewing privileges, (if any), and selectively permits local printing of the unencrypted initial content responsive to the respective associated control data printing privileges.
  • system only selectively permits for viewing of the unencrypted initial content responsive to the presence of associated control data viewing privileges, to selectively provide a display presentation at the remote appliance responsive to the unencrypted initial content.
  • the recipient device system provides means to create unencrypted (or encrypted) exported content at the remote appliance responsive to the unencrypted initial content, responsive to the associated control data exporting privileges.
  • the recipient device system can provide a means to create additional unencrypted partial access content at the remote appliance (such as annotations) responsive to a portion of the unencrypted initial content, responsive to the associated control data partial access privileges.
  • the associated control data defines partial access privileges and provides for defining the beginning location and end location of the unencrypted initial content that is being granted.
  • the remote appliance begins decrypting the encrypted initial content (as described earlier), but does not store it until the beginning location is reached. The content is then stored until the end location is reached. Then the decrypting stops because no further access rights have been granted as to the respective unencrypted initial content, as to the respective appliance.
  • the unencrypted initial content can be encrypted in blocks of data.
  • the associated control data partial access privileges provide for defining the specific block of data (of the respective selected content) for which the appliance is being granted access to. Only this respective block of data is then decrypted for permitting access to that respective block of data of the respective unencrypted initial content by the respective appliance.
  • the operation of an independent computing system, or operation of the decrypted content as an executable software program on the specific appliance recipient device is controlled responsive to the respective associated control data for running privileges for the respective decrypted content.
  • the associated control data contains information on which running privileges are available for the respective associated selected content.
  • the independent system (or recipient device) must check the associated control data before running. If the proper running privileges are not granted for the respective associated selected content, then it will not allow that portion of the program to run.
  • the associated control data is utilized to provide for operation of an independent system and selectively regulates the independent system to permit access to the respective unencrypted initial content responsive to the respective associated control data independent access privileges.
  • Tickets can be used in a number of ways to allow the use of protected digital content, also referred to as PDC.
  • PDC protected digital content
  • the most secure uses of the PDC never allow the digital content to be stored in part or its entirety in an unencrypted form at any location. Practically, this is not possible because no one would have use of it at all so the owner of the PDC must determine how and how much of the PDC is used where.
  • the recipient devices implementing this invention must be approved or otherwise authorized, and follow the restrictions placed on it by the owner of the PDC. However, this is difficult to 100 % control, except in the most stringent security situations.
  • an encrypted document key can be sent to and stored on a specific appliance.
  • the specific appliance can retrieve the associated respective encrypted document key and use it to selectively decrypt and use the PDC as appropriate.
  • the encrypted document key need not be stored on the specific appliance but can be stored in another device that needs to be connected to the specific appliance.
  • the user of the appliance can enter the encrypted document key manually.
  • a ticket can also be supplied to a specific recipient device appliance that allows a specific use of the PDC. Part of the ticket can be a password that the user of the PDC must provide. It may also be required that another specific device be connected to the specific recipient device appliance. It may also be required that multiple PDCs are available on the same specific appliance. For example, suppose a first PDC, PDC-A, contains the social security numbers and associated addresses of every person in the United States. By default, the appliance can have the encrypted document key needed to access this information but no rights to use it. A ticket could be issued to that specific appliance that allows the specific appliance to verify the social security numbers for a person if supplied with a number.
  • the specific appliance would then allow the user of the specific appliance to enter a social security number and a name and verify that this is the person's social security number or not.
  • the specific appliance also has a PDC-B containing the social security benefits for a limited number of people.
  • a ticket could be issued to that specific appliance to allow the PDC-A to provide the address from a social security number if that social security number is also available in PDC-B.
  • the ticket can further be used to regulate and further restrict the use of the protected information content so as to have the user supply a password before being permitted to view the protected content information.
  • a device identifying the user (such as a smart card) could be specified in the ticket and the information would not be allowed without that device being connected to the respective recipient device appliance.
  • a ticket can also be used to control the operations that are allowed to use data in a PDC.
  • data from two different PDCs (PDC-A and PDC-B) was allowed to be combined when a ticket allowed it.
  • this is a relational database JOIN operation using SQL (ISO/IEC 9075 see http://www.iso.org), using a common field (social security number) to relate information in 2 different tables. This could extend to any number of other database operations using the SELECT, INSERT, SET, DELETE and many other clauses.
  • Regulated use operations in the examples herein include printing, (saving/exporting, allowing execution of a program, and viewing. However, there are many more operations that are possible. A custom analysis of the data is possible. Also, the data could be used to control a machine. For instance, a ticket could allow the appliance to move an object via a motor in a certain way this is not allowed otherwise. A ticket could also control if and how much of the associated PDC can be sent to another appliance. For instance, mapping programs allow the user to print out a one-page map but not the entire mapping information (unless the user prints each and every map possible which would be very time consuming). A ticket could also be used to allow the user of an appliance to access certain user operations.
  • the ticket could allow a user to access certain areas of protected content, or to only perform certain operations, such as for wagering (such as horse racing, and various games of chance) on a per appliance (appliance specific) setting.
  • Tickets can also be used to control the type of operations that are allowed to run without the need for any PDC. These operations are the same as above, but are not tied to a particular PDC.
  • the program runs, it checks tickets that give it the right to run. These tickets can be complex, and can depend on when the program is run, how many times it has run, requiring a password, requiring a specific device to be attached, requiring a barcode, fingerprint, retina or other biologically-related scan of a person or object.
  • the tickets can also determine what functions are available in a program. This allows an application program to be regulated and limited-based on the associated respective tickets that allow certain operations. The respective application program would check for the associated respective tickets to verify and selectively allow a certain function to operate, before permitting the executing of the code for that function.
  • Tickets can additionally, or alternatively, be associated with a plug-in. These tickets can control respective associated plug-ins by having the respective associated plug-in check the respective associated ticket every time the respective plug-in is used. The plug-in is not even loaded, if it is not allowed to be run.
  • Tickets can be utilized to not only to authenticate and regulate usage, but to also set up the level of usage of the selected original content.
  • the associated ticket can even be used to regulate and to set up the functionality and the feature set of the application software, variably set to a selected level of feature set comprised of from between minimal functions and features of a minimal feature set (e.g., bare bones), to a maximum functionality and features of a maximum feature set (e.g., fully maxed out).
  • selected content can be for one ubiquitous full-featured application program, which during an activation set up (on a recipient device computing system) establishes and sets operability level to set, responsive to the associated usage rights ticket.
  • FIG. 4 illustrates the system of FIG. 3 , with the addition of combining logic ( 107 ) at the production system ( 104 ), and separating logic ( 108 ) in the recipient device ( 204 ).
  • the provider subsystem ( 104 ) provides separate outputs from its encryption logic ( 106 ) of encrypted content ( 120 ) and an encrypted production key ( 158 ) which are combined by the combining logic ( 107 ) to provide a single combined output of encrypted content and encrypted production key encryption.
  • the encrypted content is comprised of encrypted content with its respective associated encrypted usage rights ticket.
  • the encrypted content is comprised of a combination of selected encrypted content with its respective associated encrypted usage rights ticket.
  • the recipient device ( 204 ) provides separating logic ( 108 ) that receives the combined output (CO) as output from the combining logic ( 107 ), and separates the combined output into individual separate outputs of encrypted content (with ticket) and associated respective encrypted production key as inputs to the decryption logic ( 109 ) of the recipient device ( 204 ), and the encrypted ticket is coupled to input ( 441 ) of ticket memory and logic ( 440 ), and thereafter, operation is as described in FIG. 3 .
  • FIGS. 5-8 illustrate more detailed block diagrams of the provider encryption services subsystem 104 of FIGS. 1-4 .
  • FIG. 5 illustrates a block diagram with associated state flow, illustrating further details of the generation of encrypted production key outputs for use by the production system ( 104 ) as an encryption key to use for encryption of respective associated content.
  • the details of a key creation methodology and system are also described with reference to FIGS. 8 , 16 , and 17 .
  • the provider encryption logic ( 106 ) of the production system ( 104 ) is illustrated in further detail, as to generation and usage of production encryption keys, as used for encrypting of respective associated content, associated control data, and usage rights tickets.
  • An Appliance ID ( 157 ) (preferably jumbled), as generated from a specific recipient device ( 204 ), is coupled as an input to encryption logic ( 103 ) of the production system ( 104 ) production key logic ( 101 ) that provides for an output of a specific selected production (encryption) key ( 135 ).
  • the specific selected production key is either generated (such as by a random number generator of keys, a seeded pool generator of keys, etc.), or selectively chosen from a stored database of keys, etc.
  • the production key ( 135 ) is coupled as an input to the data input of the production key encryption logic ( 103 ), which encrypts the respective specific selected production key, responsive to the Appliance ID ( 157 ), to provide an encrypted output of a respective encrypted production key ( 158 ), which is, preferably jumbled first and, provided as an output from the production system ( 104 ), for even that input to the respective recipient device (that provided the respective Appliance ID ( 157 ) utilized as an encryption key.
  • the production key ( 135 ) is also coupled as an input to an encryption key input to content encryption logic 9102 ).
  • Selection logic ( 50 ) in the production system ( 104 ) provides for selection of a particular file (or files) of specific particular original content, to provide an output of selected original content ( 51 ) coupled as an input to the data input of content encryption logic ( 102 ).
  • the content encryption logic ( 102 ) encrypts the selected original content ( 51 ), responsive to the associated respective specific particular production key ( 135 ), to provide an encrypted output of respective encrypted (selected) original content ( 120 ).
  • the selection logic ( 50 ) can be responsive to an operator (person) at the production system ( 104 ), or responsive to on-line purchase transactions, or a supplied order list, or in accordance with publishers or content owners' instructions, etc.
  • the generation of the encrypted content and encrypted production key can be accomplished in numerous alternative ways, the choice being one of design tradeoffs.
  • FIG. 6 illustrates a detailed block diagram showing details for the production key encryption subsystem ( 103 ), illustrating the generation of the encrypted production key ( 162 ) from the respective production key ( 135 ), and an Appliance ID ( 157 ), (preferably, a jumbled Appliance ID securely communicated), coming from either the recipient device appliance ( 204 ), or a storage means ( 174 ) within (or external to) the production system for storing the Appliance ID from the respective appliance.
  • the jumbling and unjumbling of encrypted production key output and the Appliance ID output are design choices, not requirements of the present invention, and are factors of the communications environment design choices.
  • the choice of communication between the production system ( 104 ) and the consumer system recipient device ( 204 ) can alternatively be of jumbled or of non-jumbled signals, such as encrypted content, and/or encrypted production key, and/or Appliance ID.
  • FIG. 6 also illustrates an additional embodiment providing additional security.
  • the Appliance ID ( 157 ) received by the production system ( 104 ) is, if needed first unjumbled (if it was originally jumbled), and is stored ( 174 ) as a stored Appliance ID, which is coupled as an Appliance ID output ( 156 ) coupled to the data input of appliance hash logic, which is a copy of (equivalent to) corresponding to hash logic ( 153 ) that is used similarly at the recipient device for decrypting the production key therein.
  • a password is provided ( 151 ) [such as internally generated (and provided securely to the respective content holding recipient device), or otherwise provided], as an encryption key input to the hash logic ( 153 ).
  • the hash logic ( 153 ) utilizes the Appliance ID ( 156 ) (as originally generated at a specific recipient device), responsive to the password (PO), to generate a hash value (or encrypt with encryption logic to generate an encrypted value) of an associated appliance key [which is a copy of the appliance key (that is, it is the same) that the recipient device generates internally, responsive to being provided the password (PO) (such as via user entry of data into the recipient device, via download, or otherwise), and responsive to the internal generation of the respective Appliance ID].
  • the appliance key output (AK) is coupled as an input to the (encryption) key input of appliance key encryption logic ( 160 ).
  • the respective selected production key ( 135 ) is coupled as an input to the data input of encryption logic ( 160 ), which encrypts the respective selected production key ( 135 ), responsive to the respective appliance key (AK), to provide an output of respective encrypted production key ( 162 ).
  • jumble logic ( 176 ) provides a jumbled encrypted production output ( 158 ), responsive to jumbling according to defined logic, the encrypted production key ( 162 ).
  • jumbling refers to processing of content to be communicated in a secure method. Jumbling can be accomplished in numerous alternative ways, such as use of secure socket layer (SSL), encryption, etc.
  • SSL secure socket layer
  • FIG. 7 illustrates a detailed block diagram of the content encryption subsystem 102 , utilizing the selected production key ( 133 ) and associated selected original unencrypted content ( 101 ) to generate a respective encrypted original content output ( 120 ).
  • the production key ( 135 ) is coupled as an encryption key input ( 110 k ) and coupled to a hash (or other one-way encryption function) logic ( 110 ).
  • the encryption key input ( 110 k ) provides the parameter to encrypt or lock [and decrypt or unlock], to provide for encryption (and later decryption) of the selected original unencrypted content ( 101 ) to produce an output of encrypted content ( 120 ).
  • any hashing or alternative encryption logic can be used consistent with the present invention for encrypting and decrypting of the original content, the production encryption key, the Appliance ID, the Appliance Key, a Document ID, and the ticket or associated control data.
  • FIG. 8 illustrates a more detailed diagram of the production key generation subsystem 101 , which provides for selection ( 137 ) of a production key ( 135 ) from either a saved key ( 133 ) or by generation (by any means that is secure) of a new key ( 131 ).
  • Selection logic ( 137 ) [such as responsive to a software programmed function, or responsive to a person, or otherwise], provides control for selecting ( 139 ) for a new key ( 131 ) to be generated ( 130 ), or for a stored key ( 133 ) to be utilized.
  • the selecting of the production key ( 139 ) provides an output of a selected production key ( 135 ) for use within the production system ( 104 ).
  • the new production key ( 135 ) is stored ( 136 ) as a saved key ( 136 ) for other use, and/or as associated with respective selected content, and is stored as a saved key for use as a production key ( 132 ).
  • a production key ( 135 ) is used to encrypt associated respective selected content to create encrypted content.
  • the production key ( 135 ) is also usable to encrypt associated control data, or a ticket, or a Document ID, etc. Thereafter, the production key is needed to provide the decryption key input to an equivalent hash function (or other encryption/decryption function) to unlock and decrypt the respective encrypted content to produce a copy of the original encrypted content.
  • an index variable (such as a Document ID) is associated with and stored with the respective encrypted content and the associated respective production key, so as to map the respective production key to its associated respective selected content and other encrypted data, (if any), that was encrypted using that respective production key.
  • FIGS. 9-12 provide further details of the consumer decryption services subsystem (the user's appliance or recipient device) 204 of FIGS. 1-4 .
  • FIG. 9 illustrates the block diagram and data flow, at the recipient device ( 204 ), related to the utilization of the communicated encrypted content, and (umbled) encrypted production key.
  • the recipient device ( 204 ) utilizes an internally generated ( 204 ) Appliance ID ( 186 ) as a decryption key input to production key decryption logic ( 204 ), which utilizes the Appliance ID as the decryption key to decrypt the encrypted production key ( 188 ) to generate a production key copy ( 240 ), and utilizes the production key copy to decrypt an encrypted content copy ( 220 ) [as provided from a production system ( 104 )], to provide unencrypted content output ( 200 ), that is stored (preferably, only kept temporarily in memory, and only during permitted usages). Furthermore, usage of the decrypted content at the recipient device is selectively provided responsive to and in accordance with the permitted usage rights.
  • FIG. 10 illustrates in generating of the Appliance ID and jumbled Appliance ID (where utilized) in the subsystem ( 204 ) for usage within the consumer decryption services subsystem ( 204 ) and provided, preferably in a protected format, to the producer subsystem ( 104 ).
  • the recipient device ( 204 ) computing system executes an authorized application program, which obtains appliance data ( 171 ) from within the hardware and software of the recipient device ( 204 ), which appliance data is input to a hash logic ( 172 ) (or other obfuscation or encryption means) to internally generate a generated Appliance ID ( 186 ), which is (1) provided as an internal Appliance ID signal ( 186 ) distributed within the recipient device ( 204 ), and, (2) provided as an output for input to the production system ( 104 ).
  • the internally generated Appliance ID ( 186 ) is input to jumble logic ( 173 ) which processes the internally generated Appliance ID ( 186 ) to generate a jumbled Appliance ID output ( 187 ), for coupling to the production system ( 104 ).
  • jumble logic 173
  • jumbled Appliance ID output 187
  • jumbling and unjumbling are design option choices, and the use or non-use, either is compatible with the present invention.
  • FIG. 11 illustrates the decryption of the production key within the recipient device ( 201 ), providing for decryption of the encrypted production key utilizing the internally generated Appliance ID to generate an appliance key utilized to decrypt the encrypted production to provide a production key copy output to the consumer decryption subsystem ( 204 ).
  • the jumbled signal (such as jumbled encrypted production key) is first dejumbled (such as to create an unjumbled encrypted production key) as a part of the process, as appropriate.
  • the jumbled encrypted production key ( 199 ), as input to the recipient device ( 204 ), is coupled as an input to dejumble logic ( 177 ), which processes the jumbled encrypted production key to provide an output of an encrypted production key ( 182 ) which is coupled as a data input to key decryption logic ( 26 ).
  • the internally generated Appliance ID ( 186 ) is coupled as a data input to appliance key hash logic ( 153 ), which (as illustrated) is responsive to a predefined password input ( 151 ) providing a key input to the appliance key has logic ( 153 ) [or other encryption logic type].
  • the use of the password is optional, and is utilized for higher security, requiring a password to decode (decrypt/hash) the Appliance ID to generate an appliance key.
  • the use of a password is not required, and the internally generated Appliance ID is used directly (or after some processing), as a decryption key for the production key decryption logic ( 260 ).
  • the production key decryption logic ( 260 ) decrypts the encrypted production key ( 182 ), responsive to the appliance key (as a decryption key), to provide an output of a decrypted production key (copy) ( 240 ).
  • FIG. 12 is a detailed block diagram of the content decryption subsystem ( 202 ), of the consumer decryption subsystem ( 204 ), providing for decryption by data content decryption logic ( 210 ), ( 220 ) as coupled to the data input of the data content decryption logic ( 210 ), and of the encrypted content copy ( 240 ) coupled as a decryption key input to the data content decryption logic ( 210 ) utilizing the production key copy wherein the data content decryption logic generates the unencrypted content ( 200 ) (preferably stored only temporarily) for use by the consumer decryption subsystem ( 204 ).
  • FIGS. 13-15 illustrate various aspects of the generation, encryption, decoding, and utilization of the rights ticket.
  • FIG. 13 illustrates the encrypted ticket generator ( 401 ) (as in FIGS. 3-4 ) of the production system ( 104 ), providing an encrypted ticket output ( 408 ), defining and providing for associated defined rights, allowed usages, and Ticket IDs for respective associated protected content.
  • the encrypted ticket output ( 408 ) is associated with its respective production key ( 140 ) and the respective associated encrypted content.
  • the production system ( 104 ) provides defined outputs for permitted rights ( 402 ) [defining those features, functions and options that are to be selectively restricted or permitted], allowed usage ( 403 ) [defining limits or restrictions on permitted rights, such as how many print copies are to be allowed for respective associated protected content, how many exports of are allowed for a respective associated protected content, etc.], a ticket ID [for uniquely identifying the ticket (such as for use in indexing or mapping of a respective ticket to respective associated protected content or a respective associated production key)], and a respective production key associated with the respective ticket ID ( 404 ) and the respective encrypted ticket ( 408 ).
  • Ticket data generation logic ( 405 ) processes the inputs of rights ( 402 ), allowed usage ( 403 ) and a ticket ID ( 404 ) to generate (according to defined logic) a respective ticket output ( 406 ) that is coupled as a data input to ticket encryption logic ( 407 ).
  • the respective associated production key ( 140 ) is coupled as an encryption key input to the ticket encryption logic ( 40 - 7 ), which responsive tot he production key ( 104 ) encrypts the ticket ( 406 ) to generate an encrypted ticket ( 408 ) that is provided for output to a specific recipient device (as associated with respective protected content for the specific recipient device.
  • the encryption of the respective production key ( 140 ), responsive to the generated Appliance ID of a particular specific appliance recipient device provides for appliance specific mapping of the respective encrypted content encrypted ticket and encrypted production key to be to the respective specific appliance associated with the respective generated Appliance ID. This is because the encrypted production key can then only be decrypted at the particular specific recipient device to generate the decrypted production key (copy) that can then be used to decrypt the respective associated encrypted content and respective associated encrypted ticket at that particular specific recipient device.
  • FIG. 14 illustrates ticket decoding at the consumer decryption subsystem ( 204 ), and the utilization therein of a ticket decoding subsystem ( 430 ).
  • the encrypted ticket output ( 408 ) of the encrypted ticket generator ( 401 ) is coupled to a data input of decryption logic ( 432 ).
  • the production key (copy) ( 240 ) is coupled to a decryption key input of the decryption logic ( 432 ), which responsive thereto, processes the encrypted ticket to decrypt it, to generate a ticket copy ( 433 ) which is coupled as an input to ticket decode logic ( 434 ) which decodes the ticket copy ( 433 ) [according to predefined logic] to determine and provide an output of Rights ( 435 ) and Allowed Usages ( 436 ) and Ticket ID ( 437 ) and its verification. Since (for appliance specific-based protection), the generated Appliance ID is needed to unlock (decrypt) the encrypted production key, this insures that only the specific appliance for the respective Appliance ID can in any way use the encrypted content or encrypted ticket.
  • FIG. 15 illustrates the saved ticket subsystem ( 440 ) (of FIGS. 3-4 ), showing details of the overall system operation (and data flow and state flow), for the encrypted ticket generator ( 401 ), and the resulting ticket decoding ( 430 ).
  • the recipient device ( 204 ) provides a usage request for specific selected protected content ( 42 ) [which initiates the processing of that request by the recipient device ( 204 )] that is coupled as an input to request response logic ( 442 ).
  • Ticket decoding logic ( 430 ) decrypts the encrypted ticket (copy) ( 441 ) responsive to the production key (copy) ( 240 ), and provides outputs of a ticket ID ( 437 ) [coupled as an input to the request response logic ( 442 )], allowed usage ( 436 ) [coupled as an input to anti-tampering logic ( 446 ) which resolves conflicting allowed usage information among multiple stored information for said allowed usage by selecting the least usage rights (least allowed usage)], and rights ( 435 ) defining permitted rights for the specific selected content [coupled to rights selection logic ( 447 ) for resolving conflicting rights information as among multiple stored information for said respective rights].
  • the rights selection logic ( 447 ) selects the lesser of the permitted rights [default rights ( 445 ) versus decoded ticket rights ( 435 )] to provide an output of ticket rights ( 449 ), which is coupled within the recipient device for usage in regulating the permitted rights and allowed usage in accordance with the ticket rights ( 449 ) for respective associated specific selected content.
  • the ticket rights output ( 449 ) is also coupled as an input [at ( 402 )] to encrypted ticket generator logic ( 401 ).
  • the anti-tampering logic ( 446 ) is responsive to the inputs of the default allowed usage ( 444 ) and the decoded ticket allowed usage ( 436 ), to select to lesser of the allowed usages represented thereby so as to provide an output of determined usage rights ( 448 ) [which is coupled as an input to usage regulation logic ( 452 ) which reduces the determined allowed usage (as per the usage request ( 42 )), such as by subtracting one (1) use (e.g., if the request was to print one copy, and the allowed usage is to print one (1) copy, then the usage reduction logic ( 452 ) reduces the allowed usage by the one printout requested, to leave zero (0) copies allowed to be printed].
  • the reduced allowed usage is output and coupled to both (1) other processes within the recipient device, and (2) as an input ( 403 ) to the encrypted ticket generator logic ( 401 ).
  • the decoded ticket ID ( 437 ) is also coupled as an input to the encrypted ticket generator ( 401 ), which responsive to the ticket rights ( 449 ) input ( 402 ), the decoded ticket ID ( 437 ) input ( 404 ), and the reduced allowed usage ( 453 ) input ( 403 ), provides an output of a revised encrypted ticket ( 408 ) which is coupled for storage ( 450 ) of the revised ticket which is stored among saved tickets ( 451 ).
  • the store ticket logic ( 450 ) provides a changed output coupled as an input to check location logic which provides for storing (and maintaining an index of the storage) the respective ticket (or portions thereof) in one or multiple locations, and provides a location output coupled to both the store ticket logic ( 450 ) and the request response logic ( 442 ), in both cases, providing for selective storage (or retrieval) of all stored locations for a respective ticket (or portions thereof).
  • selected original unencrypted content ( 100 ) is coupled as an input to the data input of data content encryption engine logic ( 110 ), which responsive to a production key ( 135 ) coupled as an input to the key input of data content encryption logic ( 110 ), provides for encrypting the original content ( 100 ) to provide an output of encrypted content ( 120 ).
  • the encryption of the selected original content ( 100 ) is processed by the encryption subsystem ( 102 ) [e.g., the dashed box ( 102 )], as per the state flow is as indicated and discussed with reference to the components within the encryption subsystem ( 102 ).
  • a production encryption key creation subsystem ( 101 ) [also referred to as production key or key] and methodology and state flow therefor, are also discussed as illustrated in FIG. 16A .
  • selection logic ( 134 ) provides for generation of a production key by either (1) generating a random key ( 130 ).
  • the selection logic ( 134 ) thus, selectively provides one of a new key or a saved key, in accordance with defined rules.
  • a new key is created periodically, and then utilized as a saved key for a defined period of time.
  • a new key can be used for each file, or for a group of related files.
  • the saved key output ( 133 ) or new key output key ( 131 ) are selected and coupled to the selection logic ( 134 ) which provides an output of the respective specific production key ( 135 ) which output is coupled to both (1) storage ( 60 ) logic for storing the respective specific production key ( 135 ) as a saved key in storage ( 132 ), which the saved key can later be utilized and retrieved as a previously saved key ( 132 ); and (2) the respective specific production key output ( 135 ) is also coupled and provided as an input to the encryption key input ( 140 ) of content encryption logic ( 110 ).
  • Numerous techniques can be utilized to generate or create the random key by the key creation logic ( 130 ). Additionally, numerous types of encryption technology can be utilized for the data content encryption logic engine ( 110 ).
  • a conversion program creates a new random production key on request. It also allows setting of a production key to a previously generated production key.
  • the first document created gets a new production key and the remaining documents in the group use the same production key as the first. This allows all the documents to be opened with a single document key. These documents can be sold together as a single package (e.g., such as a file or a CD-ROM).
  • a password level of security can be added on top of and in addition to the use of the Appliance ID to decrypt and decrypt the respective production key.
  • the production key ( 135 ) is also coupled to a production key encryption subsystem ( 103 ).
  • the production key ( 135 ) is coupled a Data Input of Production Key Encryption Logic ( 160 ).
  • a first password 151 is generated, which can be done by numerous means including a shared password content, or a generated password according to defined criteria, or provided as part of a transaction processing, etc.
  • the first password ( 151 ) is coupled to appliance hash logic ( 153 ) [an equivalent copy to a corresponding hash logic in the respective recipient device generating the Appliance ID ( 156 )], which responsive to an externally provided Appliance ID ( 156 ) provides an output of an appliance key (copy) ( 155 ) which is provided as an encryption key input to the production key encryption logic engine ( 160 ).
  • the production key encryption logic ( 160 ) encrypts the production key ( 135 ) responsive to the Appliance Key ( 155 ) to provide an output of encrypted production key output ( 162 ).
  • the encrypted content ( 120 ) and the encrypted production key ( 162 ) are both provided as outputs coupled to, and to be utilized by, a respective associated recipient device (the consumer's appliance) to reconstruct a copy of the selected original unencrypted content ( 100 ).
  • a respective associated recipient device the consumer's appliance
  • decryption of both the encrypted content ( 120 ) and of the encrypted production key ( 162 ) are required at the recipient device, because the decrypted production key is needed (and used) to decrypt the encrypted content ( 120 ).
  • the unique Appliance ID associated with a specific appliance is generated within the respective specific recipient device appliance and coupled to the production system ( 104 ), and is used therein to decrypt the respective specific encrypted content ( 120 ), and is also utilized in the respective recipient device as a critical element in decrypting the production key necessary to provide the encrypted production key ( 162 ) coupled to the specific consumer's recipient device ( 204 ) that provided the respective Appliance ID.
  • the encrypted production key ( 182 ) can only be used by the specific respective recipient device ( 204 ) provided the respective Appliance ID (or passworded Appliance Key) is utilized to encrypt the respective production key.
  • the recipient device generates the respective Appliance ID (or Appliance Key) ( 65 ), which is needed to generate a respective password protected Appliance Key ( 66 ), which is coupled to a decryption key input of the key decryption logic ( 260 ), which responsive thereto, utilizes the Appliance Key to decrypt the encrypted production key to generate a respective decrypted production key ( 240 ) as a decryption key input to content decryption logic ( 260 ), which responsive to the decrypted production key, decrypts a (copy) of the encrypted content ( 102 ) which provides an output of decrypted content ( 71 ).
  • the recipient device appliance at the consumer remote location provides appliance data ( 170 ) uniquely generated from within the appliance itself (such as via software running on the recipient device appliance).
  • appliance data examples include network address card address, MAC address, processor ID, etc.
  • the output from the appliance data generation logic ( 170 ) is coupled to appliance hash logic ( 172 ) which generates an internally created Appliance ID ( 156 ) which is provided (either through a jumble, without jumbling/unjumbling, unjumble logic ( 174 ) in the production system ( 104 ), or through direct connection), as an Appliance ID output ( 156 ) coupled to the product key encryption subsystem ( 103 ).
  • the internally generated Appliance ID ( 156 ) is coupled (within the recipient device) as a Data Input to the Appliance Key hash logic ( 153 ) corresponding to the Appliance Key hash copy logic ( 153 ), and responsive to the first password ( 75 ) that is provided as an input to the appliance hash key hash logic ( 153 ), which provides an output of a generated appliance key ( 185 ), corresponding to the appliance key copy ( 155 ).
  • the appliance key ( 185 ) is provided as a decryption key input to Decryption Logic ( 260 ), inversely corresponding to the encryption logic engine ( 160 ).
  • the encrypted production key ( 162 ) is provided as an input to the Decryption Key input of Decryption Logic ( 160 ) of the Production Key Decryption Subsystem ( 203 ), either directly jumble logic ( 176 ) of the Production Subsystem ( 104 ) and unjumble logic ( 177 ) of the consumer recipient device subsystem ( 204 ).
  • the encrypted production key ( 182 ) is coupled to the decryption production key logic ( 203 ) as a Data Input to the Production Key Decryption Logic ( 260 ) which responsive to the generated Appliance ID ( 156 ) provides as an output the production key (copy) ( 240 ) corresponding to the production key ( 140 ).
  • the production key copy ( 240 ) is output from the Production Key Decryption Logic ( 260 ) and is coupled to the Decryption Key input of the Data Content Decryption Logic ( 210 ) [corresponding to the inverse of the Data Content Encryption Logic ( 110 ).
  • the encrypted content (copy) ( 120 ) [corresponding directly to the encrypted content ( 120 )] is coupled as an input to the Data Input of the Content Decryption Logic ( 260 ) of the Content Decryption Subsystem ( 202 ).
  • the Data Content Decryption Logic ( 210 ) performs a decryption of the Encrypted Content (copy) ( 210 ), [the Decryption Logic inversely corresponding to the encryption of Data Content Encryption Logic ( 110 ) of the production subsystem ( 104 )], responsive to the production key input ( 240 ), to provide an output of unencrypted content ( 200 ).
  • the unencrypted content ( 200 ) is stored in the recipient device on a temporary basis only, preferably in transient memory (e.g., volatile RAM), and pursuant to defined criteria, so as to further maintain maximum protection of the respective protected original content.
  • the temporary nature of the decrypted content ( 200 ) is regulated by providing for maintaining the decrypted content in the unencrypted state, defined according to criteria such as only during permitted uses and/or only for a defined time period, and/or only during defined operations, etc.
  • FIG. 16B an alternate embodiment of FIG. 16 / a is illustrated, identical to FIG. 16 , except for the addition that the selected encrypted content ( 120 ) is combined [via the Combining Logic 980 ) of the Production Subsystem ( 104 )] with the encrypted production key ( 162 ) so as to provide a combined single output to provide to the consumer a respective specific recipient device ( 204 ) as a combined single file ( 81 ).
  • the combined single file ( 81 ) is separated by Separation Logic ( 82 ) [of the respective specific recipient device ( 204 ] back into separate outputs of a respective encrypted content (copy) and a respective encrypted production key (copy) ( 240 ), which are then processed in the recipient device ( 204 ) [of the consumer], as discussed above with reference to FIG. 16A .
  • the Content Decryption Logic ( 260 ) decrypts the encrypted production key ( 182 ) and then uses the decrypted production key ( 182 ) as a Decryption Input to Content Decryption Logic ( 210 ) to decrypt the respective encrypted content (copy) ( 210 ) so as to provide an output of respective corresponding unencrypted content ( 200 ).
  • the Content Decryption Logic ( 260 ) decrypts the encrypted production key ( 182 ) and then uses the decrypted production key ( 182 ) as a Decryption Input to Content Decryption Logic ( 210 ) to decrypt the respective encrypted content (copy) ( 210 ) so as to provide an output of respective corresponding unencrypted content ( 200 ).
  • FIG. 16B separate communications are not required, and only a single combined communication of one file is needed from the Production Subsystem ( 104 ) to the end user at the (consumer) recipient device ( 204 ).
  • the Appliance ID of the customer is not initially known at the time of encrypting the selected original content, and another initial method of identifying a legitimate purchaser of the product must be provided.
  • a serial number and password are provided with each product (of encrypted content).
  • the consumer must supply a valid serial number, password, email and Appliance ID to obtain their authorization, referred to as a Document Key (also referred to as Appliance Key Appliance Authorization).
  • This authorization is preferably sent by email, but can be handled via phone or fax or otherwise, preferably in a validated manner.
  • the serial number and password can be combined, but separating them allows the serial number to be placed on the outside of a product package for tracking purposes, and permits the use of preprinted security labels (such as holograms) for the serial number.
  • the encrypted content provides an encrypted secure format (ESF) file.
  • ESF encrypted secure format
  • the ESF file is created once and is not changed.
  • a Document ID is created at the time of creation, which uniquely identifies this document. This allows the document to be referred to by the host (provider subsystem ( 104 )) as well as provided between multiple ones of the consumer recipient devices (appliances) to identify a file uniquely, even if the user-friendly title (e.g., the name of a file) is changed. Because the file is only encrypted once and remains the same, the conversion (time-consuming part) is done only once and the files can be easily distributed on CD-ROM.
  • ESF production does not require knowledge about Encrypted Security Key (ESK), appliance authorization or Appliance IDs.
  • ESF production requires the ESF file (ESF) and the Production Encryption Key, also referred to as a Production Key, or Encrypted Security Key (ESK) or an ESZ file (ESZ). If the Production System ( 104 ) is encrypting “singles”, that is stand-alone selected original content files, then a new production key can be specified each time.
  • a custom encryption can be used that requires the user of the recipient device to have an Encrypted Security Key, and uses a generic encryption that allows any appliance running respective application software to open it (no production key is generated).
  • a generic encryption that allows any appliance running respective application software to open it (no production key is generated).
  • both types of encryption can provide for restricted control of usage rights, and can for example, regulate and have the print and export options selected, and can further provide that only respective application software (referred to as ESF programs) can read or otherwise use the protected documents.
  • ESF programs application software
  • the production key can be specified as “fixed” to a predefined value (or values) when converting the generic option.
  • the export option limits the types of export allowed. With one export option, a document can be exported, providing all its components use the same production key. For example, this allows someone to save his or her annotations with a respective protected document, but still requires the same document key (or Appliance ID or Appliance Key) to open it. If export is allowed, the document and the annotations can be exported. In an alternate embodiment, the document and annotations can be exported, but are first assigned another production key used to encrypt them. This technique can also be used to combine two or more documents into one.
  • Document attributes for and associated with selected original content can be set as desired.
  • the title is usually included. More attributes can be specified and they are completely a design choice, and can be arbitrary. Common attributes for sheet music include composer, part, instrument, copyright notice, etc.
  • Bookmarks can be selectively set during the encryption conversion process.
  • an ActiveX component can support this using description/page numbers information in a database.
  • description/page numbers information in a database.
  • Basic Production Workflow begins by specifying where on the system the original control file (text, PDF, or other image file program code file, etc.) to be converted is located.
  • the file name of the output (ESF) file and a temporary directory for intermediate files must also be specified.
  • the control logic will generate a random new key.
  • the generated production key is also available AFTER the conversion process. If converting several files provided in a collection that is sold as a package, then one can use that same production key for the remaining files in the collection after the key is generated for the first one processed.
  • ESZ (Production Key) files are only created when the system is using a custom production key. This file is for internal purposes only, should be kept confidential and should not be sent to the customer. Customers only receive encrypted production keys or encrypted document keys (that are in part comprised of a production key).
  • FIG. 17 illustrates the data storage structure and components therein, for the encrypted secure format (ESF) for protected content and associated encrypted production key (ESZ) as illustrated and discussed elsewhere herein.
  • ESF encrypted secure format
  • EZ encrypted production key
  • FIG. 17 illustrates the data structure and component layering for the ESF protected content data file format ( 500 ) and the associated production file structure encryption key (ESZ) ( 510 ).
  • the ESF file format ( 500 ) is comprised of multiple components ( 501 , 502 , 503 , 504 , 505 ).
  • the components as illustrated can be interchangeably comprised of multiple individual and mutually exclusive file components, each being separately selectively encrypted and/or compressed independent of the others, and all components together as an ESF file ( 500 ) being encrypted with the same respective production key (ESZ) ( 510 ).
  • FIG. 17 illustrates the data structure and component layering for the ESF protected content data file format ( 500 ) and the associated production file structure encryption key (ESZ) ( 510 ).
  • the components as illustrated can be interchangeably comprised of multiple individual and mutually exclusive file components, each being separately selectively encrypted and/or compressed independent of the others, and all components together as an ESF file ( 500 ) being encrypted with the same respective production key (ESZ) (
  • one of the component layers includes an ESF ID (or Document ID), and can also include other data such as a production key ID, other unique ID, time of day, date, user ID, etc. Additionally, one of the component layers preferably includes mapping data information relating to the contents of the ESF data file structure ( 500 ), and identifying the individual components within that specific file 500 .
  • the ESF data file structure ( 500 ) is comprised of multiple components.
  • an ENC component representing the encrypted protected content (such as any one or more of an image or other text, application program code, etc.), which can be any content component, such as element ( 501 ) of the data word structure ( 500 ).
  • the ESF data file structure can also include a component of data file structure for annotations or other overlay information that can be provided as associated with the encrypted content.
  • a part of each component is a descriptor of the component for that respective component (i.e., what that component is, whether the component is encrypted or not, whether the respective component is compressed or not, and any other unique IDs or descriptors).
  • each ESF file ( 500 ) is a respective specific related production encryption key (ESZ), which contains the encrypted production key utilized to encrypt the ESF file ( 500 ) components (at least those that are to be encrypted).
  • the production encryption key ( 510 ) further optionally contains additional data such as an ESF ID, an ESZ ID, and associated mapping or index data for associating the production key to one or more specific ESF files ( 500 ).
  • This additional data, and/or associated mapping feature can be especially useful where an entire grouping of file components is placed on a single storage medium such as a CD-ROM for mass distribution. Thereafter, the specific associated production encryption key that was utilized for encrypting of content for one or more specific CD-ROMs can be easily located, associated with and ultimately communicated to and utilized by the recipient device user having that CD-ROM.
  • One encrypted (ESF) file ( 500 ) can contain multiple components (sub-files) which each have a unique name within this ESF file, wherein each component can be selectively encrypted and/or compressed on an individual basis, mutually exclusive of the other components of the respective ESF file.
  • one component is selected original content to be protected, and, where present, another component defines usage rights (such as with tickets).
  • Usage rights tickets can be associated with any type of encrypted content (component), to provide for usage regulation of the respective decrypted content (or any usable feature or function thereof) on respective recipient devices (appliances).
  • the trusted provider's production system can create and assign usage rights (tickets).
  • the user's recipient device is further comprised of a local means for ticket generation and encryption logic to permit encryption of locally stored content. Restricted usage rights are added to at the recipient device to otherwise permitted usages for the respective locally stored content.
  • the recipient device can add usage restriction to content but only as to permitted usages not already restricted by a usage rights ticket.
  • the production system trusted provider
  • authorized recipient device can provide a ticket that can be used after the fact, [that is, after the encrypted content is already out of control of the trusted provider's production system (e.g., on a recipient device)] to grant additional rights which were originally restricted as part of the respective content original encryption.
  • one of the components of the ESF file structure ( 500 ) of FIG. 17 is the respective encrypted production key which is itself the data content that is the file content for that component.
  • FIG. 18 illustrates a flow chart and state flow diagram for production system encryption of selected content for a specific recipient device.
  • specific original content ( 522 ) is selected as selected original content ( 523 ), from the original content.
  • the selected original content ( 523 ) is coupled as a data input to encryption logic ( 524 ) (providing an encryption engine) encrypted responsive to a selected generated encrypted production key ( 533 ) output from the production encryption key generator subsystem ( 532 ).
  • the production encryption key generation logic ( 532 ) begins ( 530 ), to provide a selected production key ( 533 ) coupled as a Key Input for encryption logic ( 524 ) which responsive thereto provides an output of encrypted content [EC] ( 525 ).
  • the production key ( 533 ) is coupled as data. Input to encryption logic ( 534 ) which provides for encryption of the respective production key ( 533 ) responsive to an Appliance ID ( 542 ) [coupled from a previously stored Appliance ID as originally received from a recipient device user (or otherwise from storage), or coupled from and related to the respective Appliance ID originally generated at the recipient device ( 541 ).
  • the encryption logic ( 534 ) provides an output of an encrypted production key [EPK] ( 535 ), which is specifically encrypted for decryption by only the respective appliance that originally generated the appliance ID ( 542 ).
  • the encrypted content ( 525 ) is stored ( 526 ) for or within the production system ( 104 ), and the production processing of the encrypted content is complete ( 527 ).
  • the encrypted production key is stored for or within the production system 104 ( 536 ) and the encryption of the production key [EPK] ( 537 ) is complete. Thereafter, the encrypted content [EC] and respective encrypted production are provided to a recipient device. To use the encrypted content [EC], the respective recipient device 204 must then locally internally generate the corresponding Appliance ID, and utilizing associated application software running on the recipient device, decrypts the respective encrypted production key [EPK] responsive to the Appliance ID as locally generated within that respective recipient device. The recipient device 204 then utilizes the decrypted encrypted production key to decrypt the encrypted content.
  • the protected encrypted content is thus made appliance specific, without requiring the recipient device to be connected to a server for authentication.
  • FIG. 19 shows a flow chart and state flow and partial block diagram illustrating the decryption of the encrypted production key utilized to decrypt the encrypted content in the recipient device to provide a decrypted content output.
  • the encrypted content [EC] ( 550 ) is input to the recipient device ( 527 ) to provide the encrypted content input [EC] ( 550 ) as a data input to decryption logic (engine) ( 552 ) in the recipient device 204 .
  • the encrypted production key [EPK] ( 56 ) output ( 537 ) is provided to the recipient device 204 , and as a data input to production key decryption logic (engine) as an input ( 537 ) encrypted production content ( 562 ) within the recipient device 204 .
  • the recipient device 204 generates (or otherwise provides) appliance data and utilizes the appliance data to uniquely identify the specific particular recipient device 204 via logic ( 572 ).
  • the Appliance ID generated by the logic ( 572 ) for generating the Appliance ID output ( 526 ) is coupled as a Decryption Key Input to decryption logic (engine) ( 562 ).
  • the encrypted production key ( 563 ) is provided as a decryption key input to production key input to the decryption logic (engine) ( 562 ).
  • the decryption engine ( 562 ) decrypts the encrypted production key ( 560 ) to provide an output of a decrypted production key ( 563 ), which is temporarily stored ( 564 ) in the memory of the recipient device 204 .
  • the decrypted production key ( 565 ) is provided as an output, which is coupled as a Decryption Key Input to decryption logic (engine) ( 552 ).
  • the encrypted content ( 550 ) is coupled as a Data Input to the content decryption logic (engine) ( 552 ).
  • the protected content decryption engine ( 552 ) provides for decryption of the encrypted content [EC] ( 550 ) responsive to the decryption key of the decrypted production key [DPK] ( 565 ).
  • the decryption content logic ( 552 ) provides an output of decrypted content [DC] ( 553 ) which is stored as stored decrypted content ( 554 ) in the memory of the recipient device 204 .
  • all the decrypted content [DC] ( 554 ), the associated decrypted production key [DPK] 564 , and the associated generated Appliance ID, and appliance data utilized therein, are only stored temporarily within the recipient device memory, and only in the transient read-write memory, and preferably not written to a hard drive or non-volatile memory in an unencrypted form. This is to maintain optimal security for the decrypted content that has been decrypted from the encrypted content for the specific appliance's use only of the specific particular recipient device 204 (the one that generated the respective Appliance ID 526 ).
  • the recipient device 204 utilizing application software, provides for selectively regulated controlled use of the decrypted content [DC] by the recipient device [ 204 ] strictly, in accordance with the permitted usage rights allowed in accordance with the usage rights as defined by authorized associated application software of the specific recipient device 204 (and on the associated rights for the respective decrypted content [DK], regulating permitted usage for the encrypted content.
  • Those default usage rights can be set according to the wishes of the provider 104 , (ranging from very restricted, such as view only, or limited to a certain defined number of viewings, or printings).
  • the default set of usage rights can be fully enabled, unrestricted, wide open with all usages permitted, or anywhere in between. Again, it is a matter of design choice.
  • regulation of usages of protected content are provided at multiple levels and is flexible and able to support distribution of and usage of various different types of content are always more restricted. For maximum protection default usage rights on highly protected content are restricted in accordance with an associated ticket (associated with the decrypted content [DC]).
  • default usage rights are superceded and, as discussed elsewhere herein.
  • FIG. 20 is a flow chart and state flow and block diagram illustrating the responses within the specific authorized recipient device 204 , to a request for usage of protected content, and the termination of what rights are authorized, and the selective authorized utilization of respective decrypted content [DC], for selectively providing for one (or more) regulated uses of printing ( 606 ), exporting ( 616 ), or viewing ( 626 ), or otherwise usage of at least a portion of the decrypted content [DC], in accordance with selectively regulated usage rights ( 604 ), or in accordance with a permission usage rights ticket associated with respective specific decrypted content [DC], or in accordance with embedded usage rights in the encrypted content, or in accordance with predefined default usage rights defined by the associated application software on the recipient device (as per selected design standards and where applicable, user selection of preferences). Again, the selections are available, and are a design choice.
  • the output of the decrypted content [DC] ( 600 ) are provided as an input ( 5566 ) to the recipient device 204 and is coupled to control logic ( 602 ), providing for control of use of the respective decrypted content [DC].
  • the control logic ( 602 ) Responsive to the usage rights permissions for the respective decrypted content [DC] ( 600 ), the control logic ( 602 ) selectively provides regulated usage for one of a plurality of options ( 604 ), responsive to the associated usage rights for the respective decrypted content [DC] ( 600 ). As illustrated in FIG.
  • each of a plurality of options can be selectively regulated for a defined number of uses (e.g., zero, one to unlimited usage), for any one or more of a plurality of options, such as printing of at least one copy of at least a portion of the decrypted content ( 606 ), exporting of at least a portion of the decrypted content ( 616 ), and/or providing for a video presentation of at least a portion of the decrypted content on a local video display ( 626 ) of the recipient device 204 .
  • a defined number of uses e.g., zero, one to unlimited usage
  • any one or more of a plurality of options such as printing of at least one copy of at least a portion of the decrypted content ( 606 ), exporting of at least a portion of the decrypted content ( 616 ), and/or providing for a video presentation of at least a portion of the decrypted content on a local video display ( 626 ) of the recipient device 204 .
  • the associated usage rights can be set up for a restricted number of allowed usages, (such as for printing or exporting or running of an application, or number of times of viewing of an application), or for a limited defined time, or limited permission, or enablement of feature set or version of a product (e.g., Lite, Medium, Deluxe, Professional) or otherwise. These usage rights can be provided for by storage of additional information such as an associated encrypted ticket or as embedded usage rights within encrypted content, or otherwise, etc.). As discussed herein, these usage rights are related to permitted usage rights (such as a permitted number of copies allowed, or to be printed or viewed, or applications to be run and executed. [See also discussion with respect to FIG. 23 and FIG. 26 (and elsewhere herein).]
  • encrypted content [EC] is output ( 527 ) (such as from FIG. 18 ), providing an input of encrypted content ( 528 ) provided to the recipient device 204 which provides for selectively storing ( 630 ) the encrypted content [EC] ( 528 ) within the recipient device 204 .
  • An encrypted production key [EPK] is coupled ( 537 ) as an input to the recipient device 204 , and is also stored ( 630 ) within the recipient device 204 .
  • the encrypted content [EC] ( 528 ) and associated encrypted production key [EPK] ( 538 ) are stored ( 630 ) in the recipient device ( 204 ) on non-volatile storage within the recipient device 204 (such as on magnetic hard disk, optical storage such as CD-ROM and DVD, FLASHRAM, EPROM, or other non-volatile storage), internal to or coupled to the recipient device 204 .
  • the coupling provided from the production subsystem ( 537 ) (of FIG. 18 ) provides the necessary encrypted content and the associated encrypted production key, either separately or combined as appropriate, such as via one or more of CD-ROM, on-line download, or otherwise to a specific recipient device 204 .
  • the encrypted content could be provided on a CD-ROM, and the recipient device (user) receives the password via email.
  • the encrypted content [EC] and associated encrypted production key [EPK] can be downloaded in one transaction on-line to the recipient device 204 (or other computer), and even encrypted to be appliance specific.
  • the encrypted content [EC] and the encrypted production key [EPK] are additionally stored at a backup device as well (such as at a server of the trusted provider production system), to provide for accounting verification as well as for backup and to provide services such as lost file replacement services.
  • the backup encrypted content and backup encrypted production key as relate to materials provided (via CD-ROM or otherwise, such as via on-line download from a production subsystem or system) to the specific recipient device ( 204 ) can be backed up for a defined time (from forever, to only a defined limited time only, such as 30 or 60 days, to prevent from clogging the storage of the server).
  • FIG. 22 is a flow chart and state flow diagram, illustrating the production system ticket generation subsystem ( 640 ), providing a source of usage rights ( 642 ), selected original content ( 523 ) from stored original content ( 522 ), and an associated production encryption key ( 533 ) provided by the production system ( 532 ), and coupled as an encryption key input to content encryption logic (engine) ( 642 ), which uses the production encryption key ( 533 ) to generate an output of encrypted content [EC] with an associated encrypted ticket [ET], either embedded or separate, for regulating usage rights.
  • the production system further provides for encryption ( 534 ) of the production encryption key ( 533 ).
  • this encryption is responsive to an Appliance ID ( 543 ) generated at a respective specific recipient device, in order to provide an encrypted production key [EPK] ( 535 ) which can only be utilized only at the specific recipient device that is associated with (and can regenerate) the generated appliance ID.
  • FIG. 22 illustrates the methodology and state flow and block diagram for the provision (such as to a recipient device) of encrypted content with an associated encrypted ticket defining usage rights permissions.
  • the production system provides for an output of a permission usage rights ticket ( 643 ) defining permitted usage rights ( 642 ).
  • a specific definition is provided of permitted usage rights for a ticket associated with specific encrypted content ( 643 ).
  • the usage rights ticket is provided as an input to encryption logic (engine) ( 642 ).
  • Application software provides control logic in the production system ( 104 ), and provides for selection from the source of usage rights ( 642 ) of permitted usage rights permissions associated with a respective specific file or files of selected original content to be protected, and is provided as respective selected content ( 523 ) output from original content storage ( 522 ) which contains original content from which selected content to be protected is selected and output responsive to the control logic.
  • the selected original content ( 523 ) is provided as an additional input to be encrypted to the encryption logic (engine) ( 642 ).
  • a second encryption engine ( 642 B) (analogous to and operating in parallel with the encryption engine ( 642 ), separately provides for independent processing and separately outputting the permitted usage rights ticket ( 643 ).
  • the (generated or otherwise produced) production encryption key ( 533 ) (see, for example, FIG. 18 ) is provided or otherwise selected ( 532 ) to provide a production encryption key output ( 533 ), which is coupled as an encryption key input to the encryption logic (engine) ( 642 ).
  • the encryption logic (engine) ( 642 ) provides for encryption of selected original content ( 523 ) along with the respective associated usage rights ticket ( 643 ), to provide an output of a file of an encrypted content with associated encrypted usage rights ( 643 ), which is thereafter stored in the production system ( 104 ) as encrypted content with an associated ticket for regulating usage rights ( 644 ).
  • an encrypted production encryption key is delivered to a designated particular recipient device to enable that designated particular recipient device, and only that particular recipient device, to utilize the respective encrypted production encryption key to decrypt the encrypted content and associated encrypted usage rights ticket at the specific particular local recipient device.
  • the production system 104 at the trusted provider receives (or already has stored) ( 542 ) an Appliance ID ( 543 ) originally generated at a particular specific recipient device.
  • This generated Appliance ID is uniquely associated with that specific particular recipient device, and can be used both initially and thereafter) to uniquely encrypt any respective production encryption key for selected content.
  • the production system utilizes the specific Appliance ID ( 543 ) for appliance specific transactions relating to specific associated selected content, for encrypting specific production encryption key(s) associated with encryption of respective specific associated designated selected original content, to be provided for the respective associated specific particular recipient device.
  • the production system 104 can encrypt the production encryption key, either at the time of encrypting the selected original content or at a later time subsequent to completion ( 646 ) of encrypting of the content and associated ticket.
  • the production system 104 provides for generation ( 535 ) and storage ( 536 ) of the encrypted production key.
  • the Appliance ID generated at the recipient device ( 542 ) is provided as an appliance ID signal ( 543 ) coupled to the encryption logic (engine) ( 534 ) as an Encryption Key input.
  • the Production Encryption Key ( 533 ) is coupled to the input of the encryption logic (engine) ( 534 ). Responsive to the Appliance ID as an Encryption Key, the encryption logic (engine) ( 534 ) encrypts the Production Encryption Key ( 533 ) and provides for an output of an Encrypted Production Key [EPK] ( 535 ).
  • the Encrypted Production Key [EPK] ( 535 ) is stored ( 536 ) and the generation and storage of the specific particular appliance related encrypted production key is completed ( 537 ).
  • the production system 104 provides the Encrypted Production Key [EPK] ( 535 ) to the user of the recipient device (e.g., via email, mail, phone call, or otherwise), or directly to the specific particular recipient device 204 .
  • the specific particular recipient device 204 decrypts the Encrypted Production Key [EPK] ( 655 ) responsive to regeneration of the Appliance ID internally within the particular recipient device 204 , which is then utilized as a decryption key input to production key decryption logic to decrypt the Encrypted Production Key [EPK] to provide a Decrypted Production Encryption Key [DPK].
  • the Decrypted Production Encryption Key [DPK] ( 658 ) is utilized by content decryption logic (engine) ( 664 ) to decrypt the encrypted content ( 662 ) and to decrypt the associated encrypted ticket to define usage rights.
  • the recipient device thereafter utilizes the decrypted content specifically regulated in accordance with the usage rights.
  • FIG. 23 is a detailed system block diagram combined with a flow chart and state flow and block diagram, illustrating the utilization at the recipient device 204 of encrypted content [EC] ( 661 ) with an associated ticket [TICKET] and of an associated encrypted production key [EPK] ( 655 ), to provide decrypted content [DC] ( 666 ) and a decrypted ticket [DTKT] ( 668 ), utilizing a decrypted production key [DPK] ( 658 ) generated internally within the respective recipient device 204 .
  • the encrypted production encryption key [EPK] ( 655 ) is decrypted by the production key decryption logic ( 656 ) utilizing the associated Appliance ID ( 655 ) generated ( 652 ) and stored ( 654 ) and provided to be utilized within the respective recipient device 204 . Additionally, usage rights are stored within a local memory of the respective recipient device. Usage rights can be defined by the authorized application software on the recipient device, as per default values, or to the extent present, which are superceded by usage rights regulated by the associated ticket for respective content.
  • Usage rights regulate usage of associated content, such as the number of copies allowed to be used (e.g., printed) and provide for tracking and storing a number of copies already used (that is actual usage), and provides for storage of usage rights data (within the respective recipient device storage) in an encrypted format.
  • the storage is regulated to provide for temporary storage [only during utilization] of decrypted content and decrypted key ( 676 ) [and decrypted ticket ( 675 )], providing an output of permitted usages for the recipient device as to the respective content.
  • the encrypted content [EC] with ticket [TICKET] (e.g., such as in FIG. 22 ) is provided as an input ( 646 ) to the recipient device 204 , of the encrypted content [EC] with associated ticket [TICKET] ( 661 ), which is stored ( 662 ) in the recipient device 204 .
  • the encrypted content [EC] with ticket [TICKET] is provided as an input (either one input (where the encrypted content and associated encrypted ticket are combined as one) or as independent separate inputs) to content decryption logic (engine) ( 664 ).
  • a specific respective encrypted production key is provided from the production system (see for example ( 537 ) of FIG. 18 ).
  • This specific encrypted production key [EPK] is provided as an input ( 650 ) to the recipient device 204 which provides the encrypted production key signal ( 655 ) as an input to the production key decryption logic ( 656 ).
  • the recipient device 204 provides an internally generated Appliance ID ( 655 ) which (1) is provided to the production system 104 to provide appliance specific encryption; and (2) is utilized within the recipient device 204 , such as decrypting of a respective production encryption key ( 655 ) [associated with respective selected encrypted content] to decrypt the encrypted production key [EPK] ( 655 ).
  • Appliance ID generation logic ( 653 ) (such as via authorized (licensed/validated) application software ( 653 ) (running on a computing system within the recipient device 204 ), provides for generation ( 652 ) of an Appliance ID (see, for example, FIG. 10 ( 652 )).
  • the generated Appliance ID [GAID] is stored ( 654 ) within memory (preferably temporarily as described elsewhere herein) in the recipient device 204 .
  • the Appliance ID ( 655 ) is coupled as a Decryption Key input to production key decryption logic ( 656 ).
  • the production key decryption logic ( 656 ) provides for decryption of the encrypted production key ( 655 ) [coupled as a Data Input to the production key decryption logic ( 656 )], responsive to the Appliance ID ( 653 ) [at the decryption key input], to provide for generation of a decrypted production key [DPK] ( 657 ) which is temporarily stored ( 670 ) in local memory of the recipient device 204 and is also provided ( 658 ) as a Decryption Key Input of content decryption logic (engine) ( 664 ).
  • the content decryption logic ( 664 ) provides for decrypting the encrypted content [EC] and the associated encrypted ticket [TICKET] ( 661 ), responsive to the decrypted production key output [DPK] ( 658 ) and ( 670 ) provided from the temporary storage ( 670 ). Responsive to the decrypted production key [DPK] ( 658 ), the content decryption logic ( 664 ) decrypts the encrypted content [EC] and provides for temporary storage of the decrypted content [DC] ( 666 ) and further provides for decrypting of the encrypted ticket to provide an associated decrypted ticket [DTKT], and storage (preferably, temporarily) of the associated decrypted ticket ( 668 ).
  • decrypted ticket and associated decrypted content are preferably stored only temporarily, and only in transient memory (RAM), so as to maximize security of the system, and eliminate access to any decrypted secure components.]
  • RAM transient memory
  • the decrypted ticket ( 668 ) and decrypted content ( 666 ) provide for outputs coupling to a non-volatile area and volatile area of recipient device storage ( 670 ).
  • Certain file parts are stored only encrypted, and if stored at all decrypted, are only temporarily stored and only in non-permanent (e.g., RAM) memory.
  • the temporary decrypted content, decrypted production key and decrypted ticket are temporarily stored in storage of ( 676 ) of the recipient device 204 .
  • Additional storage of usage rights ( 672 ) is also provided such as storing the number of copies allowed to be printed or number of uses allowed of execution or viewing, or other number of allowed uses ( 673 ), and additionally, storage actual number of usages or copies printed, viewed, saved, exported, etc. ( 674 ). Additionally, temporary storage is provided for the decrypted ticket and usage rights permissions, for defining logic to be utilized in granting permitted usages ( 678 ).
  • the application software (running on the computing system of the recipient device 204 ) utilizes the stored usage rights ( 672 ) content [( 673 ), ( 674 ), and optionally ( 675 )] to (1) provide for control and regulation of permitted usages of respective associated temporary decrypted content ( 676 ) and (2) provides a permitted usage rights output ( 677 ) controlling permitted usages for regulating usage of the respective associated decrypted content ( 676 ), as well as (3) providing the decrypted content ( 676 ) as needed with the recipient device 204 so to permit to provide for the permitted usage. Responsive thereto, the application software of the recipient device 204 permits and provides for the permitted usages of the associated content on the respective recipient device 204 .
  • FIG. 24 is a flow chart and state flow and block diagram illustrating the control for of decrypted content [DC] ( 680 ) within a respective recipient device, responsive to a decrypted ticket [DC] ( 682 ) as provided from within the respective recipient device 204 (see, for example, [DC] and [DTKT] of FIG. 23 ), to selectively provide for regulated usage of one of exporting ( 696 ), printing ( 697 ), executing of a file as an application program ( 698 ), or viewing of a video presentation ( 699 ), for at least a portion of (or all of) the decrypted content [DC] ( 680 ) responsive to the usage rights permitted by the decrypted ticket [DT] ( 682 ).
  • the recipient device 204 to begin the regulated usage, responsive to a request in the recipient device 204 for usage, the recipient device 204 must retrieve ( 667 ) the selected decrypted content [DC] ( 681 ) output [such as output in FIG. 23 ( 669 )].
  • the decrypted content is locally stored ( 680 ) in the recipient device.
  • the usage of the decrypted content [DC] ( 681 ) is regulated by the recipient device 204 , in accordance with the respective associated stored usage rights [DI] ( 682 ) in memory [DTKT] ( 668 ) (as illustrated in FIG.
  • the decrypted ticket output [DT] ( 683 ) is decoded by decision and regulation logic ( 684 ). Responsive to the decrypted ticket [DT] ( 683 ), the decision logic ( 684 ) selectively provides for one of a plurality of defined options ( 685 ) for utilization of the decrypted content ( 681 ).
  • the recipient device Responsive to a user request or selection, or other authorized usage of the recipient device (such as automatically providing for viewing of certain content, or in accordance with permissions set during initial setup, or otherwise), the recipient device provides logic selectively providing for one of a plurality of options ( 685 ) such as for selecting of exporting ( 696 ) of at least a portion of the decrypted content ( 681 ) from the recipient device.
  • the selection of a usage option ( 685 ) can provide for selection providing for printing ( 687 ) of at least one copy of at least a portion of the decrypted content ( 697 ).
  • the selection of options ( 685 ) can provide for selection of executing as an application program ( 698 ) for at least a portion of the decrypted content ( 681 ).
  • the selection logic ( 685 ) can provide for selective viewing ( 699 ) of a video presentation for the decrypted content [DC] ( 681 ) (or for a portion of the decrypted content).
  • the examples of the five options are illustrated, and are not meant to be limiting. Many other options, including a smaller or larger set, or different set of options can be provided.
  • FIG. 25 illustrates an alternate embodiment, showing a flow chart, block diagram, and state flow and data flow, for processing in the recipient device 204 of decrypted original content ( 741 ) which itself is representative of a ticket defining usage rights for an associated data file ( 743 ).
  • the recipient device 204 is responsive to a usage request for use of the associated data ( 743 ), and regulates the usage of the associated data file ( 743 ) to the respective defined rights for usage as granted by the permission of the ticket ( 747 ) (the original content), to provide for regulated permitted usage within the respective recipient device of the associated data file ( 743 ), such as printing, viewing, exporting, saving, or execution of an application program, represented by the associated data file ( 743 ).
  • the original content ( 740 ) is a usage rights permission ticket, which is provided as an input to usage logic ( 744 ).
  • An associated data file ( 742 ) is provided ( 743 ) to usage regulation logic ( 744 ).
  • the logic ( 744 ) regulates usage rights of the associated date file ( 743 ) in accordance with the respective defined usage rights of the original content (ticket) ( 741 ) to provide a usage regulation output ( 747 ) for regulating permitted usage of the associated data file ( 743 ).
  • the regulated permitted usage of the associated data file is provided for in the recipient device responsive to the application software executing the logic ( 744 ) [and responsive to the ticket ( 741 )] to regulate usage of the respective associated data file ( 743 ) [in accordance with the usage rights of the ticket ( 741 )].
  • the original content [( 740 ), ( 741 )] can be any one or more of textual data, image data, audio-wave form data, video data, MIDI data, game data, business data, other data content, and application program code. Any of these types of original content can further have a respective associated ticket for regulating usage rights defining permitted uses for the respective type of associated original content.
  • the original content is itself a ticket for regulating usage rights defining permitted uses for an associated respective data file.
  • the associated respective data file can be (but does not need to be) provided with the respective original content, and can either be provided with it, or separately and at a separate time.
  • protected original content is encrypted by the production system 104 and selectively decrypted by the recipient device system 204 .
  • the associated data file is also encrypted by the production system 104 and selectively decrypted by the recipient device system 204 .
  • the decrypted original content output ( 741 ) and the decrypted associated data file output ( 743 ) are utilized within the recipient device 204 by logic ( 744 ), to provide for selective regulation of usage of the respective associated data file ( 743 ) to provide only the permitted usage of the associated data file ( 743 ), such as in accordance with the usage request ( 745 ) [from the user, or responsive to operation of the recipient device system 204 , itself].
  • logic ( 744 ) to provide for selective regulation of usage of the respective associated data file ( 743 ) to provide only the permitted usage of the associated data file ( 743 ), such as in accordance with the usage request ( 745 ) [from the user, or responsive to operation of the recipient device system 204 , itself].
  • the original content ( 741 ) is a ticket for regulating usage rights defining permitted uses for an associated respective data file ( 743 ), then the associated respective data file ( 743 ) can be comprised of one or more of textual data, image data, audio-wave form data, MIDI data, video data, game data, business data, other data content, and application program code (for which the usage rights define allowed uses, and/or permitted conditions of use (e.g., number of times, time of day, number of elapsed days, etc.), and/or permitted features to be used).
  • the usage rights define allowed uses, and/or permitted conditions of use (e.g., number of times, time of day, number of elapsed days, etc.), and/or permitted features to be used).
  • FIG. 26 illustrates a flow chart and state flow and block diagram corresponding in part to the combined output systems of FIGS. 2 and 4 , wherein encrypted content [EC] ( 753 ) and an encrypted production key (EPK] ( 763 ) are combined ( 754 ) to provide a combined encrypted output [CEO] ( 755 ) which is provided as a combined output ( 756 ) to a recipient device 204 , wherein the recipient device 204 receives the combined encrypted output ( 757 ), and separates ( 770 ) the combined content into separate ones of an encrypted content copy file [ECC] ( 771 ) and an encrypted production key copy file [EPKC] ( 772 ), which are then separately decrypted [( 774 ), ( 773 ), respectively] in the recipient device 204 to provide via decryption logic ( 773 ) a decrypted encrypted production key [DEPK ( 779 )] which is then utilized to decrypt via decryption logic ( 774 ) the encrypted content ( 771 ) to provide de
  • FIG. 26 illustrates the state flow, data flow, block diagram, and system element interaction for the combined system output (analogous to as illustrated in FIGS. 2 and 4 ).
  • the production system 104 provides ( 750 ) for the providing of encrypted content ( 752 ) (as described elsewhere herein), to provide an encrypted content output ( 753 ).
  • the production system provides ( 760 ) for generating (or otherwise providing) an encrypted production key ( 762 ), (in any of the manners as discussed elsewhere herein), providing for output of an encrypted production key output ( 763 ).
  • the encrypted content output [EC] ( 753 ) and encrypted production key [EPK] ( 763 ) are combined by combing logic ( 754 ) to provide a combined output [CO] ( 755 ) which is provided ( 756 ) by the production system 104 as a combined encrypted output (CEO) ( 755 ) to the recipient device 204 .
  • This combined encrypted output [CEO] ( 756 ) can be provided to the respective recipient device 204 in a number of ways, as discussed elsewhere herein, ranging from an email, regular mail, on a CD-ROM, or distributed in any other manner.
  • the recipient device 204 provides means for receiving ( 757 ) the combined encrypted output ( 756 ) received from the production system 104 (via any means), and provides separation logic ( 770 ) for separating the combined content [CO] to provide for separating the encrypted content from the encrypted production key to provide an output of an encrypted content copy ( 771 ) to storage within the recipient device 204 .
  • the encrypted content ( 771 ) is provided as an input to decryption logic ( 744 ).
  • the separation logic ( 770 ) provides the encrypted production key [EPK] ( 772 ) to decryption logic (engine) ( 773 ) to provide for decryption of the encrypted production key [EPK] responsive to the internally generated ( 775 ) Appliance ID ( 765 ) from within the recipient device 204 to provide the generated Appliance ID ( 765 ) as a Decryption Key Input to the production key decryption logic (engine) ( 773 ).
  • the decryption logic engine ( 773 ) provides for decryption of the encrypted production key copy [EPK] ( 772 ) provided as an input to the production key decryption logic ( 773 ).
  • the production decryption logic ( 773 ) Responsive to the generated Appliance ID ( 773 ) as a Decryption Key Input, the production decryption logic ( 773 ) provides for an output of a decrypted production key [DPK] ( 779 ), which is coupled as a Decryption Key Input to content decryption logic ( 774 ).
  • the content decryption logic (engine) ( 774 ) provides for decrypting of the encrypted content ( 771 ) (as coupled to the Data Input of the content decryption logic ( 774 ) to provide for an output of decrypted content (unencrypted content) (UC) ( 778 ) [which is preferably only temporarily stored, as discussed elsewhere herein].
  • the production system 104 provides for combining the encrypted content [EC] ( 153 ) and the encrypted production key [EPK] ( 763 ) to generate a single combined encrypted output [CEO] ( 755 ).
  • the production system 104 then provides the combined encrypted output [CEO] ( 755 ) which coupled ( 756 ) from the production system 104 to the recipient device.
  • the recipient device 204 provides for separating ( 770 ) the received combined encrypted output [CEO] ( 757 ) (at the recipient device) into an encrypted content copy ( 771 ) and encrypted production key copy ( 772 ).
  • the recipient device then provides for decrypting the encrypted production key copy [EPKC] ( 772 ) with the production key decryption logic ( 774 ) within the recipient device, to provide a decrypted production key [DPK] ( 779 ).
  • the decryption of the encrypted production key [EPK] ( 772 ) is explicitly appliance specific [only usable on a particular specific recipient device 204 ] by initially encrypting the respective encryption production key at the production system, responsive to an Appliance ID [coupled to the production system 104 ] internally generated from the particular recipient device specific appliance.
  • a separate unique ID (not an Appliance ID generated from a recipient device] is provided to the production system and is utilized as an encryption key utilized for encrypting of respective associated content, and to create a respective associated encrypted production key, and the internally generating an Appliance ID ( 775 ) and ( 765 ) is not required in this alternative preferred embodiment.
  • the encrypted production key [EPK] is decrypted at the recipient device to provide the decrypted production key [DPK], and utilizes the decrypted production key [DPK], to decrypt the encrypted content [EC] at the recipient device (responsive to the decrypted production key) to provide for unencrypted content [UC] corresponding to the original encrypted content for usage in accordance with permitted usages rights at a respective recipient device.
  • FIG. 27 illustrates a flow chart and state flow diagram and block diagram for a production system providing not only for the encryption of selected original content ( 783 ) with a production encryption key ( 793 ) but also encryption of the respective production encryption key ( 793 ) responsive to an Appliance ID ( 803 ) from a specific recipient device appliance, to make it appliance specific (by encrypting responsive to an Appliance ID generated at the respective specific recipient device and utilized as an encryption key input so as to create a respective production key). Further, utilizing the same respective production key as an encryption key input, a usage rights permission ticket output ( 813 ) is also encrypted ( 814 ) to create a respective encrypted ticket ( 815 ).
  • the usage rights ticket ( 813 ) is generated by ticket logic subsystem ( 812 ) to provide a ticket output ( 813 ) with defined rights for usage of the associated encrypted content [EC] ( 785 ).
  • the generated ticket ( 813 ) is encrypted ( 814 ) (responsive to the same production encryption key [PEK] ( 793 ) utilized to encrypt the respective associated selected original content), to provide an encrypted ticket output [ET] ( 815 ) which defines the usage rights (usage rights permissions, ticket ID, etc.,) for the respective ticket associated with the respective encrypted content and respective encrypted production key, which are ultimately provided to a respective recipient device.
  • Original content is provided ( 780 ), either from storage of the production system trusted provider, or via coupling of content to the trusted provider by the content owner.
  • selected original content ( 783 ) is provided ( 782 ) by the trusted provider production system to provide an output of selected original content ( 783 ). This can be done in accordance with a number of criteria, including responsive to manufacturing and marketing suggested guidelines of a company, to responding to a specific user's on-line transaction such as ordering content, to anything in between, or otherwise.
  • selected original content ( 783 ) is provided as an output, coupled as an input to content encryption logic (engine) ( 784 ).
  • the production system 104 provides ( 790 ) a production encryption key [PEK] ( 792 ), in any of the manners as discussed herein.
  • An output of a production encryption key [PEK] ( 793 ) is provided, and coupled as an Encryption Key Input to the content encryption logic ( 784 ).
  • the content encryption logic ( 784 ) then provides for encryption of the selected original content ( 783 ), responsive to the associated production encryption key [PEK] ( 793 ) [generated to be associated with and used for encryption of (and decryption of) the respective selected original content ( 783 ), (or otherwise selected to be associated)].
  • the content encryption logic ( 784 ) provides an output of encrypted content ( 785 ) to be stored at the production system ( 786 ). Additionally, the production encryption key ( 793 ) is coupled as a Data Input to production key encryption logic ( 794 ). Additionally ( 800 ), the production system 104 provides an Appliance ID ( 803 ) (that was generated ( 802 ) at a recipient device, or any other unique ID that can be used to activate a recipient device) and provides an output of an Appliance ID ( 803 ) coupled as an input, to the encryption Key Input of the production key encryption logic ( 794 ).
  • the production key encryption logic ( 794 ) provides for encryption of the production encryption key [PEK] ( 793 ) responsive to the Encryption Key Input of the Appliance ID ( 803 ), to provide an output of an encrypted production key [EPK] ( 795 ).
  • the encrypted production key [EPK] ( 795 ) is stored ( 796 ) in the production system 104 as an encrypted production key [EPK] and is associated with the stored respective encrypted content ( 786 ). Additionally ( 810 ), the production system 104 generates ( 812 ) a ticket output ( 813 ) with defined usage rights for the respective associated encrypted content [EC] ( 785 ).
  • the ticket ( 813 ) defines usage rights, and optionally has a ticket identification, a document identification, a production key identification, associated date, time, etc.
  • the ticket ( 813 ) can be structured for usage of the respective associated content in accordance with default usage rights, or according to specific defined usage rights of the specific ticket as specifically provided by the production system for specific explicit regulation of the associated specific encrypted content.
  • the ticket output ( 813 ) is coupled as an input to ticket encryption logic ( 814 ).
  • the ticket encryption logic ( 814 ) has the Appliance ID ( 803 ) coupled as an input to an Encryption Key Input of the ticket encryption logic ( 814 ).
  • the ticket encryption logic ( 814 ) provides for encryption of the ticket ( 813 ), responsive to the Appliance ID ( 803 ), to provide an output of an encrypted ticket ( 815 ).
  • the encrypted ticket ( 815 ) is stored ( 816 ) in the production system ( 104 ) as an encrypted ticket [ET] and is associated with the respective encrypted content [EC] and the respective associated encrypted production key [EPK].
  • the system and process provide for generating a ticket output associated with the respective encrypted content, where the ticket output provides for defining usage rights for regulating the usage of the respective encrypted content.
  • the respective ticket output is then encrypted, responsive to the associated respective production encryption key [that is, the same production key used to generate the respective associated encrypted content, to provide an encrypted ticket output.
  • the ticket output as discussed herein, can be comprised of usage rights, ticket ID, and optionally or alternatively other components.
  • the system and methodology of the present invention provide for validating the encrypted ticket output (which is provided to the recipient device), along with the encrypted production key and respective associated encrypted content.
  • the recipient device 204 decrypts the encrypted ticket (provided from the production system 104 ), and provides for validating the decrypted ticket output on the recipient device 204 , responsive to the ticket ID portion of the decrypted ticket output.
  • the recipient device system 204 responds to the usage rights defined by the ticket output, for regulating the usage [on the recipient device 204 ] of the decrypted content (which is preferably only stored temporarily on the recipient device during its usage), to provide for selective and restricted usage (of the respective decrypted content) in accordance with the defined usage rights and the validating.
  • the usage rights defined by the ticket output for regulating the usage [on the recipient device 204 ] of the decrypted content (which is preferably only stored temporarily on the recipient device during its usage), to provide for selective and restricted usage (of the respective decrypted content) in accordance with the defined usage rights and the validating.
  • FIG. 28 illustrates a flow chart, state flow and block diagram providing for additional security within the recipient device 204 , by storing the decrypted ticket, at least in part, in a plurality of locations within local storage of the recipient device 204 , to provide for multi-level verification capability and to increase security levels.
  • the decrypted ticket ( 823 ) is stored in a plurality of locations [A ( 831 ), B ( 832 ), C ( 833 ), D ( 834 )] within the local storage ( 830 ) of the recipient device 204 , and is then utilized by the recipient device 204 to ensure that no tampering has occurred to the decrypted ticket [DT] ( 823 ).
  • an encrypted ticket ( 823 ) is provided as an input to the recipient device 204 , and is stored ( 820 ) within the recipient device 204 .
  • Control logic ( 822 ), within the recipient device, provides for additional storage of the encrypted ticket ( 824 ) into a plurality of separated memory locations in the storage ( 830 ) of the recipient device 204 . All, or at least a part, of each of the multiple copies of the encrypted ticket is stored in each of a plurality of different locations A B C and D in the storage memory ( 830 ) of the recipient device.
  • the storage memory ( 830 ) is preferably the non-volatile storage, such as a magnetic hard disk drive, optical storage (e.g., CD, DVD, other), or otherwise.
  • the control logic ( 822 ) provides for the maintenance of the multiple copies of the respective encrypted ticket [ET] for usage rights, in the selected plurality of locations in the storage.
  • the control logic ( 824 ) provides a first output ( 831 ) to store at memory location A, an output 832 to store at memory location B, an output 833 to store at memory location C, and an output 834 to store at memory location D. More or less locations can be chosen as a design election choice. Thereafter, during validation of the ticket output, and regulation of usage responsive to the usage rights defined by the ticket, the control logic utilizes the multiple stored tickets. The respective stored ticket at each of the plurality of locations is examined, and responsive thereto, usage rights for the associated selected content are limited in accordance with results of the polling of the respective tickets at the multiple stored locations, and analysis of the respective stored tickets at the plurality of locations.
  • FIG. 29 illustrates a flow chart, state flow and block diagram, illustrating within the recipient device 204 , the altering ( 828 ) of the multiple stored values [A, B, C, D] for usage rights (of respective decrypted content) in the respective multiple locations of the storage ( 830 ) of the recipient device 204 [analogous to the storage as in FIG. 28 ].
  • the same locations can be re-utilized for the altered values, or new locations can be used.
  • the original content can have an associated ticket or be a ticket itself for an associated data file.
  • an output of permitted usage rights ( 749 ) are provided to the recipient device 204 , (see also as illustrated in FIG. 28 ), coupled to control logic ( 820 ) (within the recipient device 204 ) which provides (1) control for permitted usage of rights for the respective decrypted content [DC], and (2) monitors usage of rights of the respective content as per actual usage in accordance with the respective permitted usage rights.
  • the actual usage of regulated usage rights ( 749 ) is provided as an input to the control logic ( 826 ) [responsive to the usage of respective associated rights of respective associated decrypted content], which provides logic for altering ( 828 ) of stored usage values [A, B, C, D], responsive to the regulated permitted actual usage for the protected content (such as the associated data file).
  • the recipient device control logic ( 820 ) determines and maintains records of usage rights allowed and actual usage, (e.g., as discussed with reference to FIG. 28 ). In FIG.
  • the altered usage stored values ( 829 ) are updated to the locations [A, B, C, D] of the storage ( 830 ) [of the recipient device 204 ], to provide for modification of the values stored for both usage rights used, and for usage rights still left available, for the respective associated decrypted content.
  • the modified usage rights are encrypted and stored as encrypted ticket usage rights, so as to maintain the integrity of the multi-location anti-tampering structure.
  • the actual usage of rights of the decrypted content within the recipient device 204 results in the storing of altered values (as to actual usage) for the respective usage rights actually used in the respective plurality of locations.
  • FIG. 30 illustrates a flow chart, state flow and block diagram, illustrating the operation within the recipient device 204 to process and utilize an encrypted ticket ( 842 ), to provide for decrypting ( 844 ) of the encrypted ticket ( 843 ) [as illustrated elsewhere herein on an appliance specific basis], to provide decrypted ticket content ( 845 ) of the ticket and ticket ID [and as appropriate, other data for usage rights].
  • the recipient device 204 further provides for validation ( 848 ) of the decrypted usage rights ticket ( 846 ) (such as based on actual usage or verifying multiple respective stored tickets to validate usage rights), providing a validated usage rights signal ( 849 ) to provide an input to regulation logic ( 862 ) (such as executing authorized validated associated application software in the recipient device system), providing for regulated usage of the protected content.
  • the recipient device which regulates ( 862 ) the usage of the respective decrypted content [DC] ( 861 ), and provides for selectively regulated usage ( 864 ) (such as viewing, saving, exporting or printing), responsive to the validated (permitted) usage rights ( 849 ).
  • FIG. 30 further illustrates the provision of an additional associated encrypted ticket output ( 843 ) associated with respective encrypted content [EC] and a respective encrypted production key [EPK], (consistent with the discussion of figures provided herein).
  • an encrypted ticket output ( 843 ) is provided ( 842 ) [such as the encrypted ticket output 816 provided from the production system (as illustrated in FIG. 27 )].
  • the encrypted ticket output ( 843 ) is coupled from the production system 104 to the recipient device 204 , and is stored in memory of the recipient device 204 .
  • the encrypted ticket ( 843 ) is coupled as a Data Input to ticket decryption logic ( 844 ), which provides for decryption of the encrypted ticket ( 843 ), responsive to an internally generated appliance ID (at 853 ) coupled as a Decryption Key Input (KEY) to the ticket decryption logic ( 844 ).
  • the recipient device 204 internally generates ( 852 ) an Appliance ID ( 853 ) based on unique identifying data ( 850 ) [in any manner as discussed elsewhere herein], to provide the Appliance ID output ( 853 ) [that is coupled as an encryption key to the decryption logic ( 844 )].
  • the ticket decryption logic ( 844 ) provides for decryption of the encrypted ticket ( 843 ) to provide an output of a decrypted ticket ( 845 ).
  • the decrypted ticket is provided as an input to usage control logic ( 846 ) of the recipient device [such as responsive to application software (validated and authorized by a trusted provider) running on a computer system of the recipient device].
  • the recipient device 204 is responsive to the decrypted ticket ( 845 ) and provides for determining of usage rights (and regulation of usage responsive thereto) and validating of ticket ID [and/or other functions as desired and implemented].
  • the decrypted content ( 861 ) provided within the recipient device 204 is temporarily stored in the recipient device, and provided to the control logic ( 846 ), and the usage rights ticket is validated ( 848 ) for the respective content [such as based on ticket ID and other information as appropriate) ( 846 ), and the validated usage rights are provided as an output ( 849 ) coupled to usage regulation and control logic ( 862 ) as an input thereto.
  • the decrypted content ( 861 ) (such as illustrated output from FIG. 19 ) is coupled to the control logic ( 862 ) as well as, to be validated.
  • the logic provides for regulating usage ( 862 ) of the decrypted content ( 861 ) in accordance with the validated usage rights ( 849 ) to provide for an output ( 863 ) which is utilized by the recipient device 204 , to provide for selectively regulated usage at the recipient device of the decrypted content [DC], such as viewing, saving, exporting, printing, or other permitted usage as permitted by the validated usage rights for the respective decrypted content.
  • the system and methodology as in illustrated FIG. 30 provide for validating the ticket output within the recipient device, and then regulating the usage of the decrypted content on the recipient device responsive to the determined usage rights and the validating. This can provide for one or more of viewing, saving, exporting, printing, and executing of application represented by the decrypted content, responsive to the usage rights and the validating.
  • the system and methodology of the present invention as to Data Rights Management and secure distribution and regulation of protected content is applicable to distribution via on-line (Internet or Intranet, wired or wireless), via CD-ROM, email, on memory cards, or otherwise.
  • the present invention also eliminates the time loss and delays of server-based authentication of appliances, data and transactions, by providing (in some embodiments), appliance specific regulating of usage rights, without (ongoing) server authentication.
  • the systems and methodology of the present invention are also valuable in a large number of applications, from any transaction processing system, such as for businesses or consumers, and in specific regulated industries, such as banking, financial markets, military, and [gambling, gaming, wagering and betting, both on-line and in-casino-based and wireless and wired], as well as to server-based gaming and gambling.

Abstract

The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files.

Description

    RELATED APPLICATIONS
  • Not applicable.
  • FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
  • Not applicable.
  • FIELD OF THE INVENTION
  • The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files. These electronic data files can be any type of content, such as for word processing, or image files (such as for audio, visual and audiovisual components), for movies, or still photo visual image files, or audio only files, or any type of stored data content, or content which when authorized is an executable application software program, etc. The present invention applies and works equally well with any of these forms of digital electronic data files.
  • BACKGROUND OF THE INVENTION
  • There is a need to have controlled distribution of digital files in order to protect the proprietary ownership rights as well as non-copyrighted works and other rights including trade secret and business proprietary.
  • Heretofore, the provision of secured communication (or other distribution) of data files to be protected, has been provided utilizing a variety of techniques, all of which are complex and confusing to the users of the product. Furthermore, the so-called electronic data files, lack in actual security offered, and often fail in being utilized in the areas where it is needed.
  • In the case of distribution of data files of content comprising text, images, and electronic sheet music, a number of formats have been derived to securely transmit and restrict and selectively provide for either viewing and/or printing of electronic data files. Proprietary systems are available from the music composition software companies of Sibelius (providing a “Scorch” product), and a Finale/Make Music, Inc., which provides its own tools. Additionally, numerous encryption schemes have been derived for transfer of audio music files. These include those provided at the iTunes® website by Apple Computer, Inc., and analogous schemes from others. Additionally, the company PGP, Inc. (Pretty Good Privacy, Inc.), provides both free and purchasable commercial grade products implementing data encryption techniques to permit RSA encryption implementation on files representing data content or application files. Furthermore, many Adobe Acrobat, “PDF” data files are in use, but with minimal or no protection. Additionally, Windows XP, by Microsoft, Inc., offers options for encryption of files.
  • Secure distribution usually involves encryption or proprietary conversion of some kind. There are many well-known options for this. Encryption, hash functions, other one-way functions, and symmetric and asymmetric encryption are well known to those skilled in the art. (To generally educate oneself, see Applied Cryptography, by Bruce Schneier, Chapter 2, Protocol Building Blocks; also see Section 2.3 on One-Way Functions). The present invention is not restricted to any specific type of encryption, and is compatible with any that otherwise fits specific design needs of an embodiment.
  • Usage of specific terminology defined within this patent specification shall have the specific meaning ascribed it therein.
  • The notion of a one-way function is central to public-key cryptography. While not protocols in themselves, one-way functions are a fundamental building block.
  • One-way functions are relatively easy to compute, but significantly harder to reverse. That is, given x it is easy to compute f(x), but given f(x) it is hard to compute x.
  • A trap-door one-way function is a special type of one-way function, one with a secret trapdoor. It is easy to compute in one direction and hard to compute in the other direction. But, if one knows the secret, one can easily compute the function in the other direction. That is, it is easy to compute f(x) given x, and hard to compute x given f(x). However, there is some secret information, y, such that given f(x) and y it is easy to compute x.
  • A one-way hash function can be implemented in many ways and has many names such as compression function, contraction function, message digest, fingerprint, cryptographic checksum, message integrity check (MIC), and manipulation detection code (MDC). One-way hash functions are central to modem cryptography, and are another building block for many protocols.
  • Hash functions have been used in computer science for a long time. A hash function is a function, mathematical or otherwise, that takes a variable-length input string (called a pre-image) and converts it to a fixed-length (generally smaller) output string (called a hash value).
  • The point here is to produce a value that indicates whether a candidate pre-image is likely to be the same as the real pre-image. Because hash functions are typically many-to-one, you cannot use them to determine with certainty that the two strings are equal, but you can use them to get a reasonable assurance of accuracy.
  • A one-way hash function is a hash function that works in one direction: It is easy to compute a hash value from pre-image, but it is hard to generate a pre-image that hashes to a particular value. A good one-way hash function is also collision-free: It is hard to generate two pre-images with the same hash value.
  • The hash function can be public; there's no need for secrecy to the process. The security of a one-way hash function is its one-wayness. The output is not dependent on the input in any discernible way. A single bit change in the pre-image changes, on the average, half of the bits in the hash value. Given a hash value, it is computationally unfeasible to find a pre-image that hashes to that value.
  • A hash function can be thought of as a way of fingerprinting files. Thus, to verify that someone has a particular file (that you also have), then ask him for the hash value. If he sends you the correct hash value, then it is almost certain that he has that file. Normally, a one-way hash function is used without a key, so that anyone can verify the hash. If one wants only the recipient to be able to verify the hash, then one can use Message Authentication Codes.
  • A Message Authentication Code (MAC), also known as a data authentication code (DAC), is a one-way hash function with the addition of a secret key. The hash value is a function of both the pre-image and the key. The theory is exactly the same as hash functions, except only someone with the key can verify the hash value. A MAC can be created out of a hash function or a block encryption algorithm; there are also dedicated MACs.
  • Public-key cryptography, as described in 1976 by Whitefield Diffie and Martin Hellman, uses two different keys—one public and the other private. It is computationally hard to deduce the private key from the public key. Anyone with the public key can encrypt a message but only the person with the private key can decrypt the message.
  • Mathematically, the process is based on the trap-door one-way functions. Encryption is the easy direction. Instructions for encryption are the public key; anyone can encrypt a message. Decryption is the hard direction. In the best case, it is made hard enough that people with super computers and years couldn't decrypt the message without the secret. The secret, or trap-door, is the private key. With that secret, decryption is as easy as encryption.
  • To send a message using public-key cryptography:
  • (1) Both parties agree on a public-key cryptosystem.
  • (2) Party 1 sends Party 2 a public key.
  • (3) Party 2 encrypts a message using Party 1's public key and sends it to party 1.
  • (4) Party 1 decrypts Party 2's message using Party 1's private key.
  • Commonly, a network of users agrees on a public-key cryptosystem. Every user has his or her own public key and private key, and the public keys are all published in a database somewhere.
  • With asymmetric key encryption, one key is public (e.g., to encrypt or to decrypt), and the other key is private (e.g., to decrypt or to encrypt, respectively).
  • In the real world, public-key algorithms are not a substitute for symmetric algorithms. They are not used to encrypt messages; they are used to encrypt keys. The reasons for this are that public-key algorithms are slow and that public-key cryptosystems are vulnerable to chosen-plaintext attacks.
  • In most practical implementations public-key cryptography is used to secure and distribute session keys; those session keys are used with symmetric algorithms to secure message traffic. This is sometimes called a hybrid cryptosystem.
  • Using public-key cryptography for key distribution solves a very important key-management problem. With symmetric cryptography, the data encryption key sits around until it is used. If anyone ever gets their hands on it, they can decrypt messages encrypted with it. With the hybrid cryptosystem, the session key is created when it is needed to encrypt communications and destroyed when it is no longer needed. This drastically reduces the risk of compromising the session key. Of course, the private key is vulnerable to compromise, but it is at less risk because it is only used once per communication to encrypt a session key.
  • Public-key Cryptography or Public Key Cryptography refers to a form of cryptography in which each user has a public key and a private key. Messages are sent encrypted with the receiver's public key; the receiver decrypts them using the private key. Using this method, the private key never has to be revealed to anyone other than the user.
  • Private Key Encryption refers to a form of cryptography in which sender and receiver have the same key or similar keys.
  • Private Key Cryptography refers to a form of cryptography in which the encryptor and decryptor use the same key, which must be kept secret. This methodology is usually only used by a small group.
  • Secret Key Encryption refers to a form of cryptography in which sender and receiver share a secret key.
  • As discussed above, hash functions are one-way functions.
      • Hashing is one-way function. It cannot be reversed.
        • From the hash, you cannot compute the original message.
      • Hashing is repeatable.
        • If two parties apply the same hashing method to the same bit string, they will get the same hash.
      • Standard hash functions include:
      • 1. SHA-1—Secure Hash Algorithm (vers. 2)
        • NIST standard 1995
        • 160-bit message digest, input processed 512-bit blocks
      • 2. MD5—Message Digest 5
        • RFC 1321
        • 128-bit message digest
      • Prior applications of hash functions include:
        • A. Storing passwords on disk (Unix, Windows, Macintosh, Linux)
        • B. Creating a digest of a message (a fingerprint) later to be signed
        • C. Authentication: send Hash (random_value+key)
  • Encryption is different than Hashing.
      • encryption uses a key as an input to an encryption method, the output is similar in length to input; and
      • is reversible (ciphertext can be decrypted back to plaintext).
  • With Hashing,
      • a key is usually added to text; the two are combined, and the combination is hashed;
      • the output is of a fixed short length, regardless of input; and
      • it is a one-way function (hash cannot be “de-hashed” back to the original string).
  • Most encrypted content today is encrypted with an encryption key and then a decryption key is used to decrypt the data. The encryption/decryption key pair are sometimes identical (the same) or a matched pair (but different). Either way, the decryption key must be supplied to decrypt the content. If a new decryption key is desired, the content must be re-encrypted. Further, as long as one has the decryption key and the encrypted content, it can be decrypted anywhere and once decrypted, the data can be copied as desired.
  • A need, therefore, exists for encrypted content to be encrypted only once and yet can be distributed widely. A need exists for the distributed encrypted content to only be available for use on certain specific authorized computers, for usage in accordance with defined usage rights (that can be fixed or have varying rights. A need exists to minimize the computational power required to distribute content to a plurality of users (e.g., up to thousands or even to millions of customers) and a need exists to allow such content to be distributed on media such as mass produced CD-ROMs.
  • Server-based authentication, while possible, is limited in utility by requiring connection to a server for authentication in order for an appliance to use a file.
  • It is, therefore, an object of the present invention to provide a methodology and system to provide for the selectively controllable distribution of data files (content) to be protected, and selectively controllable computer appliance specific based usage options such as viewing and printing of electronic data files (or exporting of files, or running of an application software program). It is a further object to make the use of the methodology and system easy and straight forward for the provider of encryption services and for the consumer of decryption services.
  • SUMMARY OF THE INVENTION
  • In accordance with those and other objectives, the present invention provides in one embodiment, a system and methodology for uniquely encrypting the content for a specific remote appliance's specific usage so that content may be encrypted utilizing an Appliance Identification generated internally within the remote appliance and may also be selectively permitted to view and/or export and/or print and/or execute as an application, the electronic data file. This Appliance Identification is utilized both in the encryption by the provider and is utilized in the recipient device as a part of decrypting in the recipient device (at the consumer level) so as to provide for appliance specific control of utilization of the encrypted content, wherein the control is provided responsive to generation of an appliance identification of a recipient device, such as provided by a query to hardware or installed software in the respective recipient device.
  • In accordance with one aspect of the present invention, a system and methodology are set forth, providing a structure system architecture for production systems and for recipient systems. Usually, the production systems are run by-or-for the owners (e.g., publishers or copyright owners) or distributors of content to be protected and distributed for restricted regulated controlled usage only on authorized recipient systems. In a preferred embodiment, the usage can further be made specific to a particular recipient device system (e.g., the user's appliance). Overall, the trusted provider's production system provides the production subsystem that works with the recipient subsystem comprised of the recipient system (e.g., recipient device).
  • In accordance with another aspect of the present invention, protected content is made to be appliance specific. Consumers are supplied only a partial decryption key, wherein a respective utilized production key is encrypted utilizing the generated Appliance ID to provide an encrypted production key. This partial encryption key is useless until the Appliance ID is internally generated and provided by the recipient device appliance, to allow the decryption and generation at the recipient device of a production key copy, which is the key necessary to decrypt the protected content locally at the recipient device of the consumer. The consumer never is allowed to see the production key copy and cannot alter the Appliance ID because it is generated from fixed computer identification parameters.
  • The distribution of documents, whether they take the form of musical scores, pictures, movies or audio or executable software application programs, remained relatively secure when the distribution medium was a physical paper, tape, film or CD-ROM, respectively. The cost of duplication was typically much more than the cost of the legitimate item. However, with the advent of digital content this distribution cost drops significantly and is a concern for the owners of content (such as documents). For example, this problem exists in the distribution of electronic music.
  • In accordance with a further aspect of the present invention, Data Rights Management (DRM) is implemented by applying a single encryption to selected files of content for a specific distribution.
  • In accordance with still another embodiment, to further encrypt for a specific recipient device (such as a particular computer running respective application software), an Appliance ID provided by that specific recipient device (running the application software) is used by the trusted provider (production system) to encrypt the respective associated production key that was utilized for encrypting of respective associated selected files of original content (and associated ticket, where present) as used to generate the respective encrypted content (and where present, the respective associated encrypted ticket). This allows distribution of protected content via Internet download, email, or CD-ROM, etc.
  • Note, the distributor (trusted provider) can also choose to encrypt the same original file of selected content multiple times, each time differently for different distributions. In this case, the user recipient device is given a key (password) to unlock and deliver usage rights and selectively control and allow access to the content. This key is valid only for the respective content and is valid only on a particular computer. As discussed herein, each computer also has its own identifier, which is generated by respective application software on the recipient device as an Appliance ID. The Appliance ID is generated from specific data within the recipient device, and it is not editable by the user of the recipient device.
  • In one preferred embodiment, there are tickets (or associated control data) [defining rights], associated with, or included with, or integrated within the original (and encrypted) content. The tickets specify the usage rights for respective associated content that a particular computer recipient device is granted. Once the particular computer has the key(s), the respective associated ticket(s) and the respective associated encrypted content, the particular recipient device provides for selective access to the protected (encrypted) content that is available locally at that particular recipient device computer (without requiring any access or connection to a central server).
  • At the production subsystem where the content is encrypted initially, the original (selected) content is encrypted responsive to an associated production key to generate respective associated encrypted content. The encrypted content is made selectively available and only utilizable on the recipient device utilizing the respective application software program running on the respective particular computer. In this case, the encrypted content is selectively usable only by the specific particular computer that generated the Appliance ID that was provided to the production subsystem, and that was utilized by the production subsystem to encrypt the respective production key, to provide as an encrypted production key, which is thereafter provided to the particular computer recipient device which utilizes the Appliance ID to decrypt the encrypted production key to generate a decrypted production key which is used to decrypt the encrypted content, and where appropriate, to decrypt the associated encrypted ticket to define usage rights for the associated encrypted content. The production key is encrypted responsive to an Appliance ID (such as generated at the specific computer), to generate an encrypted production key that is provided to and can only be decrypted by the specific particular computer that provided the respective Appliance ID. The integrity of the distribution and controlled usage process is thus maintained.
  • In accordance with the production aspects of the present invention, encryption tools are used to convert original content into an encrypted form of encrypted content and to create production keys (used by the production subsystem). These tools can be implemented in multiple, alternative forms, such as stand-alone programs, ActiveX servers, etc. The encrypted content can only be used with particular associated (and preferably authorized and validated) application software running on a computer system. The associated authorized application software can be a stand-alone product, a plug-in, or can be included within another specific respective application software. In any case, the associated application software provides for one or more of regulated selective viewing, annotating, collaborative networking, selective printing, selective exporting, and selective active execution of content representing executable application software. Optionally, for another level of appliance specific protection, in addition to the above, a user must obtain an appliance specific key (e.g., a password, a hardware component or otherwise) for use in their particular computer in order to access the protected content. The production key is combined in a secure way with or generated from the Appliance ID to generate an appliance specific key only usable for a particular specific computer recipient device. Tickets defining usage rights can be generated and included with, or separately associated with, or integrated into, the respective associated content (as encrypted) for granting rights to the respective encrypted content on the user's particular specific recipient device computer running the respective associated application software. Authorization can be implemented, controlled and distributed, via a host web site(s) production subsystem, with delivery of the encrypted production key, and optionally the encrypted ticket and/or encrypted content provided to a user by direct download, email, regular postal mail, other electronic delivery or raw text, etc.
  • A particular specific computer (recipient device) running the respective application software or integrating in the associated application software into other software (also referred to as a client application), provides for control of the access to and usage of the encrypted content on the recipient device, and can also provide other functions. Additionally, other client application software (having the associated application software integrated therein) can be created to provide data rights management (DRM) functionality for other uses. These client applications can even be embedded into specific appliances, into specific other applications, or into computer operating systems. Alternatively, various sub-programs that can be integrated into an associated application software's functionality, can provide either or both of stand-alone or integrated modules into other software, to provide therefor, respective DRM compatible application software.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other aspects of the present invention will become clearer by reference to the accompanying drawings and detailed description of the drawings, wherein:
  • FIG. 1 is a block diagram at a system level showing the provider and consumer sides, and a data rights management overview, illustrating provider level encryption services and consumer decryption services;
  • FIG. 2 is a block diagram illustrating an alternative embodiment of FIG. 1, where the provider side of the provider and consumer data rights management system provides a combined output of both the encrypted content and the encrypted production key as a single communication to the consumer side recipient device, illustrating both the state flow and system architecture associated therewith;
  • FIG. 3 is a block diagram and state flow diagram illustrating the provider encryption services and consumer decryption services with appliance specific based data rights management system, with associated rights ticket, further expounding on FIG. 1;
  • FIG. 4 is a block diagram and state flow diagram, illustrating the combined system of FIG. 3 with the provision of combined content with associated rights ticket;
  • FIGS. 5-8 illustrate more detailed block diagrams of the provider encryption services block 104 of FIGS. 1-4; wherein FIG. 5 illustrates a block diagram and state flow diagram for generation of an encrypted content output and an encrypted production key output;
  • FIG. 6 illustrates a detailed block diagram of the production key block 140, illustrating the generation of the encrypted production key from the production key and an Appliance ID (preferably a jumbled Appliance ID, and securely communicated) coming from either the appliance (e.g., recipient device) or a storage means (e.g., history file for customer on a host server) storing the Appliance ID from the appliance.
  • FIG. 7 illustrates a detailed block of the content encryption block 102, utilizing the production key and original encrypted content to generate the encrypted (original) content output;
  • FIG. 8 illustrates a more detailed diagram of the production key generation subsystem 101, which provides for generation of a production key from either a saved key or by generation of a new key;
  • FIGS. 9-12 provide further details of the consumer decryption services subsystem 204 of FIGS. 1-4 (such as on one or more recipient systems running associated application software); wherein
  • FIG. 9 illustrates the block diagram and data flow related to the utilization of the communicated encrypted content, jumbled encrypted production key, and utilizing an internally generated Appliance ID to decrypt the production key to generate a production key copy, and for utilizing the production key copy to decrypt the encrypted content copy to provide (preferably-temporary) unencrypted content out;
  • FIG. 10 illustrates the subsystem 204 for generating the Appliance ID (and jumbled Appliance ID where utilized), for provision respectively within the consumer decryption services subsystem 204 and to the producer subsystem 104;
  • FIG. 11 illustrates the production key decryption subsystem providing for decryption of the encrypted production key utilizing the internally generated Appliance ID to generate an appliance key utilized to decrypt the encrypted production to provide a production key copy output to the consumer decryption subsystem 204;
  • FIG. 12 is a more detailed block diagram and state flow drawing of the decryption of content subsystem 202 of the consumer decryption subsystem 204 providing for decryption of the encrypted content copy utilizing the production key copy to generate the unencrypted content (preferably only temporarily storing the unencrypted content during its usage), for use by the consumer decryption subsystem 204;
  • FIGS. 13-15 illustrate various aspects of usage rights ticket generation, encryption, decoding, and utilization of a rights ticket of FIGS. 3-4; wherein
  • FIG. 13 illustrates the encrypted ticket generator 401 of FIGS. 3-4 for providing an encrypted ticket output providing for associated defined rights, allowed usages, and Ticket IDs, wherein the encrypted ticket output is associated with production key and encrypted content;
  • FIG. 14 illustrates ticket decoding at the consumer decryption subsystem 204 and more specifically the utilization in the subsystem 430 of the encrypted ticket output of the encrypted ticket generator 401 wherein the encrypted ticket copy and production key copy are utilized by a decryption engine to generate a ticket copy which is utilized via ticket decode logic to determine rights and allowed usages and Ticket ID verification;
  • FIG. 15 illustrates the overall system operation for the encrypted ticket generator 401 and the resulting ticket decoding 430, providing an overall production and consumer system block diagram and state and data flow diagram;
  • FIG. 16A is a detailed electrical computing system block diagram showing both electronic computing system hardware components, data components, and state flow and data flow for the complete distribution system including the production subsystem and consumer subsystem, with FIG. 16A illustrating the provision of independent non-combined separate outputs of an encrypted production key and associated encrypted content, and where applicable, also an associated encrypted ticket, wherein FIG. 16A provides a detailed system block diagram including data and state flow indications, for FIGS. 1, 3, and 5-15, as well as FIGS. 18-28 and 30-33;
  • FIG. 16B is a detailed overall system block diagram and state and data flow diagram providing for a complete system illustration of the system as illustrated in FIGS. 2, 9, 10, 11 and 12, and FIG. 16B illustrates the system of 16A where the encrypted content (and where applicable, the associated encrypted ticket) and the associated encrypted production key are combined into a single file output which is thereafter provided to the consumer subsystem (e.g., the recipient device), wherein FIG. 16B is analogous to FIG. 16A, except for the addition of combining logic and separating logic as present in FIG. 16B and not in FIG. 16A, wherein FIG. 16B relates to FIGS. 2, 4, 5-15, and 16-33;
  • FIG. 17A illustrates the data storage structure and components therein, for the encrypted secure format (ESF) and associated encrypted production key (ESZ) as illustrated and discussed herein.
  • FIG. 18 illustrates a flow chart and state flow diagram for production system encryption of selected content for a specific recipient device;
  • FIG. 19 illustrates a flow chart and state flow diagram illustrating the decryption of the encrypted content and utilizing the encrypted production provided by the production subsystem (as illustrated in FIG. 18) to provide for a decrypted output, and further illustrates an aspect of the invention providing a flow chart and state flow for only temporarily storing decrypted content in a recipient device during actual usage and authorized utilization thereof;
  • FIG. 20 is a flow chart and state flow diagram illustrating the selection of authorized utilization, for selectively providing for one of printing, exporting, or viewing, or executing as an application program, of at least a portion of the decrypted content, either in accordance with predetermined default usage rights, or in accordance with a permission usage rights ticket as discussed herein;
  • FIG. 21 illustrates the reception and storing of the encrypted content and encrypted production output from the production system of FIG. 18 for storage at the recipient device and optionally, at a remotely coupled server;
  • FIG. 22 is a flow chart and state flow diagram, illustrating the production system ticket generation subsystem, providing a source of usage rights, selected original content, and an associated production encryption key used to generate an output of encrypted content with an associated encrypted ticket, either embedded or separate, regulating usage rights for the respective encrypted content. The production system further provides for encryption of the production encryption key. In a preferred embodiment, this encryption is responsive to an Appliance ID generated at a specific recipient device, in order to provide an encrypted production key which can only be utilized only at the specific recipient device that is associated with (and can regenerate) the generated Appliance ID.
  • FIG. 23 is a detailed system block diagram combined with a flow chart and state flow diagram, illustrating the utilization at the recipient device 204 of encrypted content with an associated ticket and of an associated encrypted production key, to provide for generation of decrypted content and a decrypted ticket, utilizing a decrypted production key generated internally within the recipient device. The encrypted production encryption key is decrypted utilizing the associated Appliance ID also generated within the respective recipient device. The recipient device provides for recipient device storage of data usage rights within a local memory. Usage rights regulate the number of copies allowed to be used (e.g., printed) and track and store a number of copies already used (e.g., printed)=actual usage, etc., and provides for storage of usage rights data (within the recipient device storage) in an encrypted format. It provides for only temporary storage (of decrypted protected content and/or usage rights tickets) during utilization of the respective decrypted content and the respective decrypted key storage, providing an output controlling permitted usages of the respective content on the recipient device;
  • FIG. 24 is a flow chart and state flow diagram illustrating the control of selective usage within the recipient device of decrypted content responsive to a decrypted ticket as provided from within the recipient device, (see, for example, FIG. 23), to selectively provide for one of regulated usage of exporting, printing, executing of a file as an application program, or of viewing of a video presentation, for at least a portion of (or all of) the decrypted content and optionally for a defined number of usages, responsive to the usage rights permitted by the decrypted ticket, and also illustrates the process of storing control data with the encrypted ticket in the recipient device, for setting a defined number of usages permitted (e.g., to be printed or copied or exported or an application program executed);
  • FIG. 25 shows an alternate embodiment, showing a flow chart, state flow, and data flow diagrams, illustrating processing in the recipient device of decrypted original content which original content is itself representative of a ticket defining usage rights for an associated data file, where the recipient device is responsive to a usage request for use of the respective associated data file, and regulates the usage on the recipient device of the associated data file as restricted to the defined usage rights for permitted usage as is granted by the permissions of the ticket of the original content, to provide for regulated permitted usage of the associated data file by the recipient device, such as printing, viewing, exporting, saving, or execution of an application program, represented by the associated data file;
  • FIG. 26 illustrates a flow chart and state flow diagram corresponding to the combined output systems of FIGS. 2 and 4, herein, wherein encrypted content and an encrypted production key are combined to provide a combined encrypted output which is provided as a combined output to a recipient device, wherein the recipient device receives the combined encrypted output, and separates the combined content into separate files, an encrypted content copy file and an encrypted production key copy file, which are then separately decrypted in the recipient device to provide a decrypted encrypted production key which is utilized to decrypt the encrypted content to provide an output of decrypted content (the unencrypted content).
  • FIG. 27 illustrates a flow chart and state flow diagram for a production system providing (1) for the encryption of selected original content with a production encryption key; (2) for the encryption of encryption of the respective production encryption key with the same production key; and (3) encryption of the production encryption key to make the distributed protected content appliance specific, by encrypting the production key responsive to an Appliance ID generated at a recipient device to create the encrypted production key, and further provides for encryption, utilizing the same production encryption key, of a usage rights permission ticket output (generated by a ticket logic subsystem to provide a ticket output with defined rights for the associated encrypted content, and encrypts the generated ticket using the same production key as was utilize to encrypt the respective associated selected original content, so as to provide an encrypted ticket output which defines the usage rights, ticket ID, etc., for a ticket specifically associated with the respective encrypted content and encrypted production key, which made appliance specific via the encrypted production key, and are ultimately to be provided to a specific recipient device;
  • FIG. 28 illustrates a flow chart and state flow diagram for implementing additional security within the recipient device, by storing the decrypted ticket at least in part, in a plurality of locations within storage of the recipient device, to provide for multi-level security verification capability and to increase the level of security;
  • FIG. 29 illustrates a flow chart and state flow diagram illustrating, within the recipient device, the altering of the multiple stored values for usage rights of decrypted content in the respective multiple locations of the storage device storage of the recipient device 1400 analogous to the storage and locations of FIG. 28;
  • FIG. 30 illustrates a flow chart and state flow diagram illustrating the operation, within the recipient device, to process and utilize an encrypted ticket, to provide for decrypting of the encrypting content on an appliance specific basis (in a preferred embodiment), to provide decryption of the ticket and ticket ID and other data for usage rights, and provides for validation of usage rights ticket (such as based on actual usage or verifying multiple stored tickets to validate usage rights) providing a validated usage rights signal to regulation logic which regulates the usage of decrypted content as output from FIG. 19, for example, to provide for selectively regulated usage such as viewing, saving, exporting, running as an application program or printing.
  • DETAILED DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS
  • The ease of transmitting electronic data from one medium to another has necessitated advances in encryption to secure distribution to protect copyright and trade secrets. The security system and methodology of the present invention provided herein provide for secure distribution and regulated control of usage for protected content provided to recipient device-based products. This mitigates concerns of publishers and editors who want to ensure their works are protected while preserving the ability for others to legally use a copy of the original content unencumbered. Protected works of original content are encrypted for security prior to transmission.
  • In accordance with the present invention, original content (e.g., information) that is selected to be protected is encrypted and is stored in a proprietary, encrypted format by a trusted provider production system that only valid recipient device appliance software can read or use. Therefore, protected works stay protected no matter where they are, whether on one or more computers, CDs, or via the Internet. In accordance with the present invention, only designated specific recipient devices and authorized trusted providers are able to decrypt this protected data. An encrypted content file, in accordance with one aspect of the present invention, is completely unreadable and unusable on any system except the intended specific authorized recipient device (or devices). The protected content is not usable or readable on any other recipient device, or any other computer that is not authorized, or on any other system, or on CD-ROMS, on a PC, on the Internet, or anywhere else. Each recipient device appliance has a unique identifier associated with it, that is used, in a preferred embodiment, during the encryption process to ensure that protected content is appliance specific and can only be viewed and/or otherwise usable on the recipient device (or devices) that is was intended for. In one preferred embodiment, where copyright or trade secret protection is applicable, all protected content is also protected by affixing or displaying an appropriate copyright notice (or trade secret or other notice) that is not removable.
  • In another preferred embodiment, a production system generates a specific particular production (encryption) key as associated with the respective selected content. The particular production key is used in encrypting said selected content. A ticket (or other associated data) is generated to define permitted usage rights for the respective selected content, (either based on default criteria (e.g., no use, some uses, and full use) or based upon specific defined usage permission criteria. The production system preferably uses RSA to encrypt its data. RSA is an industry standard encryption used by thousands of companies around the world, including Citibank, Microsoft, Oracle, and Wells Fargo. It has resisted attempts to crack it for over four decades, and is a very powerful encryption solution more than suitable for protecting original content. However, any other encryption technology can also be utilized with the present invention. The choice is one of design consideration.
  • In a preferred embodiment, several functions that the recipient device would otherwise be able to perform can be selectively disabled (or enhanced) for respective particular encrypted content responsive to respective associated usage rights permissions. In one embodiment, default usage rights permit each authorized recipient device to be allowed to always be able to view encrypted original content that was intended for it.
  • Examples of functions that be selectively enabled (or disabled) include:
      • Permitting modification of original content on the recipient device that allows users to add their own custom markings (such as text, lines, graphics, or such as bowings, fingerings, and slurs, to sheet music) to the video display of the decrypted content on the specific recipient device. This feature can be selectively enabled or disabled for each respective file of particular original content.
      • Sharing of original content (as encrypted), allows for users to share data for the selected original content and the respective associated annotations (if any) to other specifically authorized recipient devices (or all authorized devices, such as on a network. This feature can be selectively enabled or disabled for each file of specific particular original content.
      • Exporting of Protected Original Content
      • The recipient device selectively allows users to save or export all or part of selected encrypted original content, and/or selectively also respective associated annotations (where applicable), and other respective associated metadata (properties such as the title and author, composer of a composition piece). The export is to another authorized recipient device appliance/computer. This feature can also be selectively enabled or disabled for each file of particular original content. The saving or exporting can be in the same format as the original selected content, or converted and stored in an alternative format (or one of multiple formats (such as a “save-as”)). The multiple formats can include additional encryption, different encryption, no encryption, conversion to a different file format, etc.
      • Printing of Protected Original Content
      • The recipient device allows users to print out for all or a specified portion of respective protected original content (selectively with and/or without annotations, or of only the annotations) to a selected attached printer. This feature can also be selectively enabled or disabled for particular works. Also, this feature can be set to regulate how many printed copies are to be allowed (e.g., 0, 1, 2, other).
      • Execution of the decrypted original content (or a part thereof) as an application program running on the recipient device, where there is an associated usage rights ticket, the uses and usage of the application program are regulated and defined as per the permissions of the associated ticket.
  • The system and methodology of the present invention, provide for a production system and methodology for the production of protected content, production encryption keys, (and where applicable, associated usage rights) and for secure distribution by a trusted provider's production subsystem, to a consumer subsystem with a recipient device appliance running valid authorized respective associated application software. The system and methodology of the present invention provides for secure distribution, transmission and storage for protected content at all times, thereby protecting the rights of the original content holders and owners and, therefore, ensuring that their original content works stay protected. The present invention also provides for simplified user (consumer) interaction, and in an easy to use manner allows people to legitimately use protected content in permitted ways.
  • In accordance with one aspect of the present invention, a system and methodology for secure distribution and protection of usage of protected content provides an infrastructure supporting one (or more recipient devices) user appliances—each recipient device comprised of a computer subsystem (processor, memory, display, etc.) running an (authorized, validated) executable application software program (herein also referred to as one of a specific (or particular) device (or appliance or recipient device), providing for one or more defined permitted uses of protected content, and optionally, additionally or alternatively, restricting any usage of the respective content to be only usable on a specific particular appliance. In other words, the protected content is made appliance specific (only usable on a specific defined appliance).
  • This system and methodology also allows users of the recipient device to efficiently interact with and use the protected content information. The protected content can be of their own creation, or licensed from one or more multiple third parties of original content.
  • This system and methodology of the present invention also provides controls to be utilized by and for the benefit of owners, producers, distributors, and publishers, to utilize to limit the use of their protected content to (1) any authorized recipient device appliance (a computing system running an authorized copy of the associated application software (that is compatible with the methodology and structure and outputs used by the respective production subsystem to generate the protected (encrypted) content, etc.). (2) Additionally, control of usage can be further restricted to limit usage to only a specific appliance (or specific appliances) that are licensed, by making the protected content only usable on a specific particular designated one (or more) of the specific appliance recipient devices.
  • In a preferred alternate embodiment, the trusted provider's production system selects the level of security to be associated with protected content. The options for security levels are completely flexible and variable, and can be set to be any of a plurality of levels over a range from limiting to only certain usage of the protected content on specific particular ones of recipient device/appliances, and ranging to permitting all uses of the protected content on any authorized recipient device (appliance), any usages desired to be regulated, including all permitations and combinations of the above. For maximum enhanced security, usage is controlled to only be usable only on a specific designated one or ones of the recipient device(s).
  • In accordance with another aspect of the present invention, the system and methodology provide for associated identification data of related information (such as the origination, date of creation, alternate titles, etc.) of the protected content information. The association of the associated identification can be either physically associated with or logically mapped or indexed to the respective associated data file(s) (content, key, and ticket). This related associated identification information can be either stored within (as a part of) the protected encrypted content, or provided as additional data stored separately from (but associated with) the respective protected encrypted content.
  • A data file of selected content is first converted and encrypted (and stored) in a proprietary file format by a trusted provider (with a production system) to provide for protection of the protected content information. The proprietary encrypted security format (referred to alternatively as ESF format or protected content format or encrypted content) provides a file protection methodology, infrastructure and architecture. This file structure can contain one or multiple named objects that each may mutually exclusively be encrypted (or not).
  • In a preferred embodiment, only a licensed user or a recipient device, one using a computing system running authorized licensed application software, can utilize the protected content in the proprietary file format. In one embodiment, usage of the respective content on the recipient device can be even further restricted in accordance with associated usage rights or permissions associated with each respective file of encrypted content [that is, either embedded or as a separate rights data file component of the respective encrypted content or as a separate associated data file (e.g., a ticket)], when that security level is enabled during production.
  • During the production of the protected content in the proprietary file format, the production system (also referred to as production subsystem) sets the permission (usage rights) level for each file that is selected (the selected file), the selected file is encrypted, to create a file of protected (encrypted) content. Alternatively, multiple files can be encrypted as a group, at a selected set level of permission usage rights. Protected content can be converted (and stored) at multiple usage levels.
  • Examples of levels of usage rights permission that can be set for a protected file (or group of files) include:
      • Basic Level—Predefined permissions only [e.g., (view only, no export, no print), (view and print once), (limited import), etc.], no additional usage restriction.
      • Standard Level—Permissions limited to usage restrictions such as view only, or view or print once, only, etc.
      • Enhanced Level—Permissions can be set to any one of a plurality of options for usage restriction of content, and further with unique appliance specific usage encryption.
  • There are many in-between, and additional other, usage levels, providing for setting of a level for one of various combinations of permitted usages, including types of encryption, etc., that can be defined and implemented, in accordance with use requirements and design choices.
  • In one embodiment, the only level of usage restriction that the user of the recipient device can set is for content of the user of the recipient device, and only at the Basic Level. Alternatively, either Basic and Standard level encryptions can be performed for content of the recipient device. The provider/producer of protected content can set any level of usage restrictions and encryption. After distribution, the user of a recipient device cannot alter usage restrictions unless permitted by the usage rights permissions, and then, preferably, only more restrictively than the original (to maintain security).
  • Enhanced usage level encryption of content can only be encrypted by a trusted provider of the content that has production encryption application software to provide for content encryption, and setting of usage right permissions (restrictions), etc. The Enhanced usage restriction level in addition to content usage restrictions, as described above, provide for restricted access to the decrypted information, solely restricted to a particular specific one (or more) authorized remote device appliance(s). This is distinguished from the illustrated Basic and Standard Levels, where any licensed recipient device appliance can decrypt the Basic or Standard level encrypted content.
  • In accordance with a preferred embodiment of the present invention, usage rights permissions are associated with a specific encrypted content file by the provider/producer [such as by an indexed mapping using an ID for mapping the usage rights to the respective file (or files)], and are further utilized by the associated authorized application software on one or more authorized recipient devices, for controlling usage on a respective recipient device for respective associated protected encrypted content.
  • The various security levels of encryption can be applied to any type of content and/or object, and multiple encryption levels can be used within a given file or files or set of information.
  • Additionally, all encryption levels can optionally provide for notices (such as copyright notices), warning of the restricting of the use of the protected content as only for authorized licensed users.
  • An Enhanced Level Encryption option is preferable for maximum protection of content.
  • With the Enhanced level of encryption level security, the data to be protected is encrypted using a private key (an encryption key) (such as of a RSA public/private data key pair). This private key is provided by (generated or recalled from storage or otherwise provided) and kept by the trusted provider (or providers) only. Trusted providers should, preferably, be a very limited group of entities, trustworthy to maintain confidentiality as to the keys, the process and all related aspects.
  • The encryption of the selected content by the private data key allows the selected content data to (1) be verified as legitimate data and, (2) not be altered by another third party, other than the intended recipient device, since none of them have, or can generate this key. This encrypted protected data is unintelligible on any computer, CD-ROM or across any public network, without the public data key. The public data key (also referred to as encryption key, or production key, or production encryption key, or authorization key) is never shared beyond the trusted provider without the public data key itself first being encrypted. Only a recipient device computing system capable of decrypting the public data key is able to use the information.
  • The public data key is encrypted (such as by using a RSA symmetric authorization key, or other means) responsive to a unique identification. Preferably, the unique identification is at least in part generated responsive to unique identifying information generated from within a specific recipient device. Alternatively, the public data key can be provided by a particular recipient device (specific appliance).
  • For example, the unique ID can also be provided by generation of a unique ID via software in the recipient device (either via a pool of pre-assigned numbers, via a random number type generator combined with other data (such as time of day, date, etc.) The authorization key is confidential, and is maintained as a trade secret combination of a unique ID (also alternatively referred to as Appliance ID) generated by a particular recipient device appliance (such as generated based upon the unique network card MAC address, and/or other information). The recipient device software application obfuscates the process (such as in the binary code) and uses the unique identification (ID) to decrypt the respective public data key that was encrypted at the trusted provider for the respective content. For optimum security, the recipient device application software never reveals authorization keys to any user, and never stores (as decrypted) authorization keys in a file (except in an encrypted form), and minimizes the presence of any decrypted authorization key in RAM to a temporary transient presence. This provides security at multiple levels, (1) since the protected (encrypted) content cannot generally be used by just any computer to utilize protected content, (2) since knowledge is needed of the specifics and the methodology, (3) since the computing system must be running the proper application software and (4) since the computing system must be comprised of components to enable the application software generates the unique ID and other information utilized by the application software to generate and Appliance ID that is used to decrypt the encrypted public data key (that cannot otherwise be determined and thus, the protected (encrypted) data cannot be used).
  • In accordance with one aspect of the present invention, a system and methodology is provided for generating, or otherwise providing production encryption keys, and storing, and selectively re-utilizing the keys. In a preferred embodiment, a new encrypted production key public data key is created for every recipient device appliance (each with its own unique ID) within which the protected content data is to be selectively authorized for usage.
  • This allows great versatility, such as permitting mass production and distribution of selected protected content, such as by placing the encrypted (protected content) data to be placed on a CD-ROM or via Internet. Thereafter, the production key can be encrypted using a respective unique ID from a particular recipient device, and then, the relatively small encrypted public data keys (encrypted production keys) can be sent to the selected ones of the recipient devices. The encrypted production keys can only be used by the respective particular recipient device (specific recipient device that generated the respective unique ID utilized to encrypt the production encryption key), to authorize and be decrypted by the specific particular recipient device in providing for the permitted use of respective protected (encrypted) content on a selective basis.
  • In one embodiment, a selected file (or files) of content data is encrypted only once with a single production encryption (public data) key. This allows one encrypted public data key to always be utilized to generate a respective encrypted production key (such as utilizing a particular unique ID to generate an appliance key) for that respective composition. This simplifies the process, and is useful in many applications, such as providing server-based on-line distribution of protected content.
  • For maximum security, encrypted data is not stored in an unencrypted form on any hard disk file on any recipient device appliance. However, if desired (for a special situation, for example), special usage permissions can be set by an authorized trusted provider to permit this operation.
  • In a preferred embodiment, with regulated usage rights, there are two (2) inter-related portions of selected content data that are encrypted for each file, portion of file, or group of files.
  • First, there is a first portion that is the actual original content data information (such as text, graphics, performance notation such as sheet music, data representative of a still or motion video or an audio image, an executable program file, or other data file) that is encrypted. The second portion of selected content data is associated with a respective first portion. The second portion defines permissions for the use of the respective associated first portion (the original content), (such as a permissions for viewing or printing viewable information). The first portion (original content) and the associated second portion (usage rights such as a ticket) can each be separately encrypted as two separate files, or encrypted together as one file. In either case, the encryption is done using the same production key. Then, at the recipient device appliance, both the first portion and the second portion must be decrypted using the same public data key (encrypted production key), (which is decrypted by the respective recipient device).
  • Only a trusted provider, (e.g., distributor/publisher) of the content can determine and set the usage rights permissions for associated encrypted (protected) content. Usage rights can be set according to multiple options. There can be a preset minimum usage (e.g., a default level of none to little rights, hanging up to an unrestricted level of all rights), selectively set based upon criteria or related to a specific transaction [such as transaction data (e.g., a credit card related transaction to purchase usage rights).
  • User level authorization of appliances (such as hierarchical-based levels), (e.g., multiple levels, ranging from maximum usage rights to minimum (or more restricted (relatively)) usage rights can be set to be based upon relative rank or importance of respective appliances (and their respective users). For example, a conductor is least restricted (having the most permissions), with each subsequent user group at a lesser usage rights level vis-à-vis the previous (higher) user. After conductor, the next level for a symphony would be concertmaster; then, principals for each instrument, and the next level would be lateral players (e.g., all violins, all cellos, etc.). This hierarchical rights levels also apply to other types of user groups (e.g., a school, class).
  • Permissions for usage rights can be (1) regulated either by type of usage for any authorized recipient device appliance, or (2) regulated so as to only work on a particular specific appliance (or multiple particular specific appliances), and then further regulated to selectively control type of usage on a respective specific recipient device. There are many alternative options for usage permissions.
  • Examples include:
      • Permissions by appliance (specific appliance (also called appliance specific) usage).
      • Permissions can be regulated by usage option type, such as:
      • Annotation (modifications allowed, or not, and to what degree).
      • Export ESF [encrypted content (optionally with associated usage rights)].
      • Export components of selected protected original content
        • individual pages exported to industry standard formats
        • annotations
        • other metadata
      • Print (zero, one copy, defined number of copies).
      • Execute as an application program at specified level of functionality and/or for specified number of uses.
  • Permissions can also include other associated data, such as creator of the permissions, password, and modification of the permissions rights.
  • Permissions can also be set to limit usage to a defined number of times. Many options exist. For example, in one embodiment, during production of the encrypted content and associated usage rights permission, usage rights are set in the most restrictive state, in the absence of any explicit permissions. Many other options also can be selected, based upon design criteria and requirements of the trusted provider.
  • In a preferred embodiment, permissions data in the Enhanced level encryption model are encrypted twice, first, with the private data key, and then with the authorization key. Only the trusted provider/producer of the encrypted content is capable of performing the encryption of the production key (only it has the private data key). By encrypting the production key utilizing a unique Appliance ID generated at a particular specific recipient device appliance, only that particular specific recipient device appliance can decrypt or use the encrypted content, or encrypted permission associated with and related to the protected content. The Enhanced security level permissions cannot be changed by the user.
  • Permissions can be provided to the user in one complete package (integrated or otherwise combined as a single file or group of files) or in multiple packages (that is, the encrypted content file is separate from the associated encrypted usage rights file, and the encrypted content file is provided separately from the encrypted permission). Where encrypted content and associated encrypted usage rights permissions are provided as separate files, there are multiple options that can be selected. The encrypted content can be (1) unusable on a recipient device without the associated separate encrypted permission file, or (2) usable in a recipient device in a minimal manner of usage without the associated usage rights file, or (3) usable to a predefined level of usage (from minimal to all options enable) on a recipient device without (unless it is present) the associated encrypted permission file, or (4) usable at whatever level of usage the respective associated encrypted usage rights permission file (or ticket) provides for, but only as per that level. (Many other options can be chosen. Again, the choice is again one of design options.) The various individual permissions can be established and set by a trusted provider, at any time concurrent with or subsequent to the encryption of the respective protected (encrypted) content. However, preferably, only a trusted provider can generate related associated additional files (or tickets or packages) of permissions granting a broadening of usage rights for a previously encrypted content.
  • In accordance with a defined process/methodology for secure distribution, the recipient device user provides the provider subsystem with the recipient device's unique ID (and optionally other information) such as by providing appliance data (or other methods such as when unique ID changes have been made in the field). The trusted provider then generates the encrypted public data keys (e.g., encrypted production key) and encrypted permission packages (e.g., encrypted ticket) for a user. These can be sent to the recipient device with increased security, since a third party's use of this encrypted information requires a licensed application software program executing on a recipient device, and must be compatible with the trusted provider technology. And in the “specific appliance only” embodiment, the decryption process further requires specific hardware (e.g. a particular specific recipient device) to generate the particular recipient device's unique ID.
  • The encrypted public data key is intended solely for a respective particular specific recipient device appliance, and is not usable on any other appliance. This provides for flexibility with security. For example, the encrypted public key may be stored on (but is unusable on) a separate appliance for backup or an intermediate device used in the transmission of the key to the intended particular specific appliance. When a single file (or files) of encrypted content is authorized for separate permitted usage on multiple recipient device appliances, each appliance's key (for all of the multiple recipient devices) is stored together as one file of all the keys, as associated with the respective encrypted content file. Even though only one of those keys is valid for usage on each of the respective ones of the particular specific recipient device appliance, without compromising the security of the keys for the other appliances. Thus, only one of those specific multiple recipient devices (that can decrypt one of the keys) can utilize that one respective encrypted content file, but not any other recipient device. Further, each recipient device can only utilize the encrypted production keys explicitly created specifically for it.
  • Key refers to a symbol or sequence of symbols or a data file, (or electrical or mathematical or mechanical or numerical correlates of symbols) (or mathematical data processing of data files) such as utilized by an encryption engine or other keyed conversion logic [and the corresponding decryption engine] in order to encrypt or decrypt any other data files (such as text).
  • Appliance is a term used as an alternative term for a computer system running application software that comprises a recipient device.
  • Recipient Device refers to any computer system executing (or running) application software (or otherwise), for getting appliance data from within the computer system for generating an Appliance ID for the recipient device, which is provided and used for encrypting a production key that was utilized for encrypting respective encrypted content, to provide an encrypted production key. Only the recipient device generating the Appliance ID can thereafter, decrypt the encrypted production key to utilize the respective decrypted content locally at a recipient device. In accordance with one aspect of the present invention, multiple encrypted production keys can be associated with encrypted content to permit usage of that content by a plurality of authorized recipient devices. Alternatively, a fixed encrypted production key can be used to permit all recipient devices running the correct application software, to use the encrypted content in a preferred embodiment usage is as per defined usage rights (whether Read-Only, Read/Annotate, Network, or other) for regulating use of encrypted content.
  • Master Production Key refers to a master key that allows a document to be encrypted (or decrypted) regardless of what appliance is trying to open the document. This is useful for a production system to test, modify or re-authorize rights for encrypted content. Only a few production utilities are provided that can open a document with this key. The master production keys are never distributed to a consumer.
  • Document Production (Encryption) Key (or Appliance Key) is a key that is utilized to provide for encryption (and decryption) by a specific recipient device appliance, and provides control for regulating usage of respective associated content [such as to open a particular (or group of) documents]. A group of documents can share the same document production key when designated for the same recipient device (or devices).
  • Appliance Authorization refers to a set of information utilized to provide for a unique identification and authorization, such as an appliance key such as generated from fixed data identifying the appliance (and preferably with an added password level of protection for use of the application software), and/or a program level for the respective application software program (feature set levels (e.g., Reader Only; Read-Annotate; Print; Export), and preferably also serial number (user identification) that authorizes the program to run at no more than a specified feature set (and preferably only on a specified appliance). Alternatively, some are provided as a non-variable stand-alone product and is not capable of running all the features authorized. For example, a reduced feature reader product, such as Acrobat Reader from Adobe Inc., or the eSReader from e-Stand, Inc., has very limited capabilities and doesn't include the fullest feature set but will only run with the limited feature set as fixed to be allowed.
  • Original content refers to any one or more of:
      • a) textual data;
      • b) image data;
      • c) audio waveform data;
      • d) MIDI data;
      • e) video data;
      • f) game data;
      • g) business data;
      • h) application program code;
      • i) textual data having a respective associated ticket for regulating usage rights defining permitted uses for the respective textual data;
      • j) image data having a respective associated ticket for regulating usage rights defining permitted uses for the respective image data;
      • k) audio waveform data having a respective associated ticket for regulating usage rights defining permitted uses for the respective audio waveform data;
      • l) MIDI data having a respective associated ticket for regulating usage rights defining permitted uses for the respective MIDI data;
      • m) video data having a respective associated ticket for regulating usage rights defining permitted uses for the respective video data;
      • n) game data having a respective associated ticket for regulating usage rights defining permitted uses for the respective game data;
      • o) business data having a respective associated ticket for regulating usage rights defining permitted uses for the respective business data;
      • p) application program code having a respective associated ticket for regulating usage rights defining (1) permitted uses for the respective application program code, and, optionally, (2) authorized functions and feature level for operation of the respective application code; and
      • q) a ticket for regulating usage rights defining permitted uses for an associated respective data file.
  • Key Production, usage, and retention strategy can be varied. For example keys can be time-stamped or otherwise designated with a limited life. Alternatively, all keys can be generally valid indefinitely (forever); however, in this case, the Appliance Authorization can be limited to a specific date as specified by the computer's system clock.
  • Appliance ID refers to a unique identifier associated with, and preferably generated by, a specific appliance. This unique identifier is preferably calculated on-the-fly [in the specific appliance (recipient device) executing respective authorized application software thereupon], based on unique features of the specific appliance.
  • A Ticket ID refers to a unique identifier associated with a specific ticket. This identifier is created when the ticket is generated, and is utilized in identifying and locating the respective specific ticket (e.g., for indexing, mapping, cataloging, and/or providing linking ID to associate the respective ticket with other components or content or files).
  • In a preferred embodiment, Document Keys are generated from the Production Keys and Appliance ID. For example, the respective production (encryption) key utilized for respective encrypted content is encrypted utilizing the Appliance ID as a key input to the encryption logic, (needed for both the encryption and the subsequent associated decryption) to generate a Document Key [comprised of the production key encrypted using the specific Appliance ID as an input]. For example, document keys are generated upon the sale of a document to a customer, who either supplies their Appliance ID or which is a previously stored Appliance ID (historically by customer ID on file), such as a result of a previous authorization or previous document (of selected encrypted content) purchase. The Document Key is required to unlock [using the respective application software within the recipient device to generate a generated Appliance ID (such as by access to the recipient device computing hardware and software)]. The application software applies the decrypted production key which is utilized thereafter in decrypting the encrypted content within the specific respective recipient device appliance and for controlled regulated use of the encrypted content in a decrypted (unencrypted content) form, by the specific respective recipient device.
  • As illustrated in FIG. 1, data rights management system (10) is comprised of a provider encryption services subsystem (104) providing outputs of encrypted content (120), and encrypted production key (158). The recipient device has control decryption logic (executed in the application software) generates an Appliance ID, and preferably jumbles the Appliance ID (such as utilizing a defined hash) to output a jumbled Appliance ID (157) production subsystem 104.
  • The production system utilizes the Appliance ID (if necessary after first un-jumbling the jumbled Appliance ID) and encrypts the production encryption key responsive to the Appliance ID to generate an encrypted production encryption key (also called an encrypted production key).
  • Jumbling refers to processing of content to be communicated in a secure method. Jumbling can be accomplished in numerous alternative ways, such as use of secure socket layer (SSL), or hashing, encryption, etc. (For additional background, also see Applied Cryptography by Bruce Schneier; or other texts).
  • A jumble operation refers to a form of encryption used to transmit data between systems. This may be an encryption method using a predefined key on original transmitted data and outputs to encrypted transmitted data. It could also be an encryption method using a negotiated temporary key between the jumble and unjumble operations.
  • An unjumble operation is a decryption method that inputs encrypted transmitted data and outputs a copy of original transmitted data. The decryption method and key is selected to be complimentary to the encryption method used in the jumble operation.
  • For additional security, the outputs are each jumbled and are unjumbled by an authorized recipient device. The jumbling (and respective un-jumbling) is optional, and while adding another level of security, is not a requirement of (or necessary to use of) the present invention. As illustrated in FIG. 1, the encrypted content and encrypted production encryption key are jumbled to provide jumbled outputs of a jumbled encrypted content (120J) and a jumbled encrypted production key (158T). These jumbled outputs (120J and 158T) are coupled to a recipient device. The jumbled outputs are coupled to respective inputs 220 and 188 of the consumer decryption services subsystem 204 [such as a user's computer appliance (recipient device). The provider subsystem 104 provides a host computing subsystem comprising a processor, storage, and running respective production application software to provide for operation of the provider subsystem 104. In a preferred embodiment, the provider subsystem 104 and consumer subsystem 204 are each further comprised of a communications interface for coupling communications therebetween. The consumer decryption services subsystem 204 (e.g., a recipient device) provides a computing subsystem running compatible application software to provide for selective viewing, annotating, networking, exporting, running as an executable application program, and saving, in accordance with respective associated defined usage rights. The consumer subsystem 204 provides an output of the Appliance ID (187) [e.g., preferably in one embodiment jumbled such as by utilizing an encryption to jumble the internally generated Appliance ID]. The consumer can call (phone), FAX, email, or directly couple via computer, to provide an output of the Appliance ID (187) to the input (157) of the provider encryption services subsystem (104). The provider encryption services subsystem (104) utilizes the Appliance ID input (157) to encrypt the production encryption key which was utilized to encrypt respective associated content (if appropriate, first un-jumbling the jumbled Appliance ID), and the encrypted production key is coupled for output from the provider subsystem 104 (preferably jumbled for transmission) [illustrated as coupled to input 188 of the consumer services subsystem 204]. The encrypted content output (120) is jumbled and provided as jumbled encrypted content output (120J), and is provided from the provider subsystem (104) and is coupled to an input (220) of the consumer decryption services subsystem (204). The consumer decryption services subsystem (204) utilizes a jumble decryption to un-jumble the jumbled encrypted production key and to generate an encrypted production key copy, and then utilizes its internally generated Appliance ID to decrypt the encrypted production key copy, and then utilizes the decrypted production key to decrypt the associated respective encrypted content, to generate an output (200) of unencrypted content that is stored in the recipient device in its unencrypted form for usage by the application software of the recipient device in accordance with the respective associated defined usage rights. Preferably, storage of the unencrypted content in the memory of the recipient device of the consumer subsystem is only temporarily stored as unencrypted, responsive to the application software, so as to maximize security.
  • Referring to FIG. 2, an alternative embodiment to that of FIG. 1 is illustrated, showing the encrypted content and the encrypted production key being combined by the production system (104) as a single combined output, prior to communications to an external system, or otherwise coupled to a respective consumer subsystem (204) (recipient device). As illustrated in FIG. 2, all communications between the provider subsystem (104) and consumer subsystem (204) is jumbled, to add an extra level of security. This is optional; it is a design option [to add jumbling (or not)]. As illustrated in FIG. 2, the provider encryption services subsystem (104) receives the (umbled) Appliance ID (187) from the recipient device (204), coupled to production subsystem (104) as an input (157) and the jumbled Appliance ID is dejumbled in the recipient device and is utilized to generate an Appliance ID (also referred to as an Appliance ID copy). The production system (104) utilizes the Appliance ID copy to encrypt the respective associated production key that was utilized to encrypt the selected original content to create the respective encrypted content, responsive to the Appliance ID copy. The provider encryption services subsystem (104) then provides an output of the encrypted production key (158) which is combined with the encrypted content output (120) utilizing combining logic 311 to provide a combined output (310) of the encrypted content 120 with the encrypted production key (158). This combined output (310) is preferably jumbled prior to output from the production subsystem (104) to any external system. The combined output (310) is then coupled as an input to separation logic (312) of the consumer decryption services subsystem (recipient device) (204).
  • The subsystem (204) provides a computing subsystem with a processor, memory, and display, and runs (executes) respective application software, to provide a recipient device appliance for a consumer to use to permit allowed usage of encrypted content. The consumer subsystem (204) provides separation logic (312) for separating the encrypted content and the encrypted production key from the combined output (311). (If necessary, the jumbled combined input is first unjumbled.) The consumer decryption services subsystem (204) then utilizes the internally generated Appliance ID to decrypt the (unjumbled) encrypted production key to generate a decrypted production key that is utilized to decrypt the encrypted content to provide an output of unencrypted content (200). The unencrypted content (200) is stored locally in the recipient device (preferably, temporarily) only during and as needed for authorized usage (e.g., viewing, annotating, networking, saving, exporting) of the decrypted content in accordance with associated usage rights (if any) for the respective selected content.
  • In one embodiment, for greater security, communications between the production subsystem (104) and consumer subsystem (204) are jumbled, (and then unjumbled by the respective other one of the consumer subsystem (204) and production subsystem (104), respectively), (such as Appliance ID, encrypted production key, etc.). In an alternative embodiment, where circumstances are correct, no jumbling may be needed, so it is not provided, and the present invention works equally well. The jumbling (and unjumbling) adds another layer of security and its use is one of design choice.
  • Furthermore, encrypted content and Document IDs can be hosted on a host system (or saved as “groupings” or “sets” on CD ROMs) to be provided to one or more consumer subsystems (204). In both these scenarios, a consumer can simply provide the Appliance ID and Document IDs for the desired selected encrypted content, and the host system can locate the selected content, and the associated respective production key used to encrypt the respective content as per the Document IDs, and encrypts the respective production key responsive to the provided Appliance ID and Document IDs received from the consumer, to generate and provide a document key that is provided to the consumer subsystem (204). The consumer system (204) then generates an Appliance ID locally and uses it to decrypt the document key to get to the decrypted production key needed to decrypt the selected content (and, if appropriate, the respective associated encrypted ticket.).
  • The discussion of the illustrated embodiments discussed so far herein have been directed to communications of single files and single keys.
  • In accordance with another illustrated embodiment of the present invention, in addition to communication and usage of single files and single keys, or multiple files encrypted with a same single key, alternatively, multiple ones of unencrypted initial content files can each be encrypted with a different production key. The encrypted production keys and encrypted content can be sent separately and individually, or combined and together.
  • The same production key can be used for all of the multiple unencrypted initial content files, or there can be multiple production keys used for encryption, and with some of the keys used on more than one unencrypted initial content file.
  • In accordance with another aspect of the present invention, a production ID is associated with every production key. This production ID should be relatively unique and the only relationship to production key is that there is a one-to-one relationship. The production ID can be, for example, a random number, current time, random sequence of characters or a sequentially generated number that increases every time a new production key is generated, or other items, or a combination of these. The production ID can be used as an index to find a production key for a respective file of associated encrypted content. In this case, the production ID is transmitted along with the encrypted initial content to the recipient device (and also subsequently with the encrypted production key). Thereafter, the recipient device can be sent a respective production ID to a host [e.g., production subsystem (104)], and the production subsystem (104) locates the associated respective production key for the respective production ID, and encrypts the respective production key and sends the encrypted production key to the respective recipient device (e.g., such as encrypted to be appliance specific responsive to the respective Appliance ID).
  • In accordance with one embodiment, the production ID associated with encrypted initial content is verified prior to use, and is compared to the respective production ID associated with an encrypted production key. If the production ID's match, then the respective encrypted production key can be used with the respective encrypted initial content to obtain the unencrypted initial content on the client machine (recipient device).
  • Additionally, or alternatively, to the production ID, the Appliance ID may also be associated with the encrypted production key. This allows the client (e.g., the recipient device or system) to effectively ignore encrypted production keys that are not meant for that client recipient device, by comparing the client's Appliance ID with the respective Appliance ID associated with each of the respective ones of encrypted production keys.
  • In one embodiment, the encrypted production keys are transmitted separately from the encrypted content. In an alternate embodiment, the production key and encrypted initial content are transmitted together from server production subsystem (104) to client [recipient device (consumer subsystem (204)]. In either case, there is a chance that the production ID or Appliance ID is not associated with the encrypted production key or the production ID is not associated with the encrypted initial content. The client recipient device (204) does not always know which encrypted production key goes with which encrypted initial content on which client. In this case, the client system (204) can still create the unencrypted initial content but the process will take longer.
  • There are many alternative ways to find the correct production key. For example, the client system (204) can try using every encrypted production key that it has available to decrypt the encrypted initial content. When the client determines the encrypted initial content is correct, it stops looking.
  • Alternatively, there may be times when the client recipient device system (204) does not keep track of which document key is to be used for a particular document on a particular appliance. In this case, the client system (204) needs to check all the keys on the recipient device (204) for location of the correct particular document key. In this case, the client recipient device (204) finds the correct document key by decrypting the respective encrypted content with each respective production key, to attempt to generate the correct decrypted content for a selection, and then check the respective unencrypted initial content for correctness.
  • The recipient device (204) (client's) check for correctness of the respective unencrypted initial content requires that the client (204) has some knowledge of some aspect of the correct decrypted content. This could be a number of things. For example, the first part of the decrypted content can have a fixed set of initial characters (or a checksum on the content) or that the decrypted content follows respective specific rules. For example, most image files have a fixed string at the beginning. HTML and XML follow specific rules in their formation that can be checked.
  • In accordance with still another aspect of the present invention, a system and method is provided for securely communicating content for use on a remote appliance without requiring server authentication. The method is comprised of providing an unencrypted initial content; providing a production key; encrypting the unencrypted initial content responsive to the production key to generate encrypted content; providing an appliance identification (ID) initially generated at the remote appliance (and identifying the specific appliance); and encrypting the production key responsive to the Appliance ID, to generate an encrypted production key for the remote appliance (recipient device), to use which permits decryption only on the respective remote appliance (recipient device) and responsive to that respective remote appliance (recipient device) generating a respective Appliance ID [which is the same Appliance ID as was utilized for the encrypting of the respective production key by the production subsystem (104).
  • The unencrypted initial content can be provided by any source. Often, it is proprietary and copyrighted content that needs to have controlled access. The initial (original) content can be comprised of text, images, application program code, audio, video, still video, or other data. The production key can be any of a variety of data word sizes, types [such as binary data, generic character strings, alphanumeric character strings, and numeric character strings, etc.], and can be generated in many ways, ranging from defined algorithms for generating pools of IDs; to seeds for generating keys, to utilizing saved (previously generated) values, etc. Production key generation is also discussed further herein. The production key size is determined by the requirements of the content encryption algorithm's key, and considerations of level of desired security.
  • Some of the types of content encryption (and corresponding decryption) that can be utilized [one or more, alone or in combination] are:
      • a) Data Encryption Standard (DES);
      • b) RC2;
      • c) RC4;
      • d) Message Digest 5 (MD5);
      • e) Rijndael;
      • f) Triple DES;
      • g) Digital Signature Algorithm (DSA); and
      • h) RSA.
  • These are examples. However, any type of encryption can be used, and is compatible with the present invention.
  • In each of the above situations, a key length that can be selected based on design tradeoffs and choices (e.g., legal, practical and security tradeoffs).
  • The generation of the Appliance ID is based on unique characteristics of the appliance, such as based on the types of hardware options installed on the recipient device appliance, serial numbers, software options installed, or other data stored on the appliance.
  • The encrypted content is transmitted or otherwise provided to the recipient device to the remote appliance from the production subsystem (104). The production key used to encrypt the encrypted content is encrypted responsive to the Appliance ID generated at the remote appliance. The encrypted production key is transmitted or otherwise provided to the respective remote appliance generating the respective Appliance ID utilized to encrypt the respective production key. Then, the recipient device remote appliance uses the generated Appliance ID within the remote appliance (recipient device) as a key to unlock (decrypt) the encrypted production key. The decrypted production key is utilized by the recipient device to decrypt the encrypted content, to generate the unencrypted content for use only on the respective recipient device remote appliance.
  • The distribution of the encrypted content can be electronically transmitted (e.g., download, email), stored on non-volatile storage (e.g., such as CDs or DVDs), etc. The distribution of the encrypted production key can also be transmitted electronically (e.g., download, email), via CD or DVD, via regular mail, or FAX communication, etc. The distribution of the encrypted content and respective associated encrypted production key can be provided independently and separately, or simultaneously and concurrently.
  • In one illustrated embodiment, an appliance key is generated by hashing the Appliance ID generated within the recipient device in combination with a fixed password. A decrypted production key is created from the encrypted production key, that is decrypted from the respective encrypted production key responsive to the respective appliance key. The unencrypted content is decrypted from the encrypted content responsive to the production key generated responsive to the appliance key.
  • The appliance key is an alternative that offers an additional level of password security to the use of a generated Appliance ID, without further encryption, via use of a password. Again, the decision of Appliance ID versus Appliance Key is purely a design choice of level of desired security and other design/cost/use considerations, and either choice works equally well with the present invention.
  • In one preferred embodiment, the recipient device further selectively provides a display presentation on the respective remote appliance in accordance with respective usage rights (if any) for the respective decrypted (unencrypted) content, responsive to the unencrypted content.
  • The display presentation can be provided on one or more of an LCD, CRT, printer, where audio via audio speakers or audio headphones, radio transmitters, network transmitters, television monitors, POTS (plain old telephone service) phone, cell phone, or pagers. The display presentation is selectively generated responsive to the unencrypted content and the usage rights for the respective unencrypted content.
  • As discussed herein, in alternate embodiments, the encrypted content can be provided to the remote appliance independently of (or simultaneously with) providing the encrypted production key to the remote appliance.
  • For example, in one embodiment, the production subsystem (104) first receives the Appliance ID (or appliance key) from a recipient device, and then, the production subsystem (104) generates a respective encrypted production key for respective associated selected encrypted content, using the Appliance ID, and then, provides for combining the encrypted content and encrypted production key to generate a combined encrypted output of respective content and respective production key the production subsystem (104) then provides for coupling the combined encrypted respective content and respective encrypted production key, to the recipient device (204) remote appliance. In this embodiment, the method provides for utilizing the respective combined encrypted recipient device (204) content and respective encrypted production key within the remote appliance to automatically decrypt the encrypted production key to provide decrypted production key that is utilized by the recipient device to generate the unencrypted initial content.
  • There are many alternative ways for generating the Appliance ID to uniquely identify a recipient device appliance. For example, the Appliance ID can be generated responsive to one or more of the following:
  • For example, characteristics of the remote appliance that can be utilized:
      • a) Hardware serial number (e.g., this can be obtained by accessing the hardware serial number through special methods on the appliance);
      • b) ROM checksum (e.g., this can be obtained by creating the checksum from the contents of a ROM on the appliance.);
      • c) Password (e.g., this can be obtained by storing the password somewhere on the appliance, or asking for the password from the user);
      • d) Installed hardware list (e.g., this can be obtained by checking the hardware that is on the appliance and providing a list of hardware);
      • e) Installed software list (e.g., this can be obtained by checking the software on the appliance and providing a list of software);
      • f) Location of special files (e.g., this can be obtained by checking the physical location of specific files on the appliance and providing that location);
      • g) Contents of special files (e.g., this can be obtained by checking the contents of specific files and providing the contents or a hashed value from the contents);
      • h) CPU ID (e.g., this can be obtained by accessing the CPU and providing the CPU ID);
      • i) Network addresses (e.g., this can be obtained by checking the network IP or MAC addresses on the network cards);
      • j) Hardware key devices (e.g., this can be obtained by accessing the hardware devices and providing the key responsive thereto);
      • k) Biometric readers, such as fingerprint and retinal reader (e.g., this can be obtained by accessing biometric readers and providing an identification of a person);
      • l) IUD card input (e.g., this can be obtained by reading a card reader device and providing a card ID);
      • m) Credit card input (e.g., this can be obtained by reading a credit card with a reader and providing identification information from the card); and
      • n) Information from outside the appliance (e.g., this can be obtained by sending information to identify the appliance to a remote system that provides authorization information in return. The authorization information can be algorithmically determined, or based on stored data on the remote system or otherwise securely generated).
  • The encrypting of the production key can be provided for in a number of alternative ways, including, but not limited to, one or more of:
      • i) Data Encryption Standard (DES);
      • j) RC2;
      • k) RC4;
      • l) Message Digest 5 (MD5);
      • m) Rijndael;
      • n) Triple DES;
      • o) Digital Signature Algorithm (DSA); and
      • p) RSA.
  • In an alternate embodiment, where one or a plurality of separate files of original content are to be used on a plurality of separate specific recipient devices (204) (appliances), the production subsystem process comprises providing multiple Appliance IDs and providing multiple production keys. Each of the production keys is encrypted to generate a respective encrypted production key, responsive to the respective Appliance IDs. This is done for every combination of the Appliance IDs and the production keys. The production system generates an encrypted production key list, responsive to encrypting the production keys.
  • This embodiment is useful when the one or multiple separate files of selected initial original content is to be made available to and will be used by, a plurality of appliances. Also, it is useful where it is desirable to selectively make available only certain ones of the selected content files on all of the specific appliances, but only usable on certain ones of the respective ones of the specific appliances. The production keys associated with the respective files of specific initial content are selectively used to generate the respective encrypted production keys, based upon the respective Appliance ID or IDs that are to be allowed to have access to use the specific selected initial content.
  • The encrypted production key list is thereafter provided to a remote appliance recipient device. The recipient device processes the encrypted production key list. First, a single encrypted production key is selected from the encrypted production key list. The recipient device provides for validating as known good content an attempted decryption of the respective selected content, responsive to at least a portion of the respective associated unencrypted initial content generated by attempting decryption with the presently selected single encrypted key. The process repeats until the correct key is found. If known good content is validated, the correct key has been found. Otherwise, another encrypted production key is selected from the encrypted production key list, responsive to a failed comparison of the unencrypted initial content with the known good content.
  • The selection, of a single key to try, can be as simple as starting by selecting the first encrypted production key in the list. This selected encrypted production key is decrypted to provide a selected decrypted key, using the appliance's (internally generated) Appliance ID and then attempting to decrypt the respective encrypted original content responsive to the selected decrypted key. The resulting decrypted content is checked to determine whether it is valid. The decrypted respective original content will contain either specific known data or follow a specific format. For example, most image formats such as BMP, TIFF and JPEG begin with known data that can be compared. Likewise HTML and XML contain specific formats that can be verified. If the decrypted content is found to be valid, then, the correct encrypted production key has been found. If the decrypted content is not valid, that respective encrypted production key is for use with another Appliance ID or for different respective associated encrypted original content. In this case, the next encrypted production key in the list is selected, and checked as above. This continues a valid key is found or until the list is exhausted. If the list is exhausted without valid decrypted original content being found, then the encrypted production key for this Appliance ID and the respective associated encrypted original content is not in the respective list.
  • Additionally, or alternatively, Appliance ID and/or content descriptions and/or Document ID can be included with the list of encrypted production key list. The selection process is essentially the same as above, except that all encrypted production keys that are associated with other appliances' Appliance IDs and/or unwanted content descriptions can be initially rejected based upon checking for a valid appliance or content description or Document ID associated with a respective key, before validating and checking that the respective decrypted original content as decrypted using a respective key, is valid. This process and structure reduces the number of encrypted production keys in the list that are checked.
  • A production key list search and validation is required if the decrypted original content does not contain any known data or follow a specific format, since there is then no way to determine whether the respective decrypted original content is valid. In this case the decrypted original content is always assumed to be valid and the encrypted production key selected from the list must be correct as determined by other means, such as by use of the associated Appliance ID and/or content descriptions and/or Document ID, or otherwise.
  • As discussed above, the encrypting of the unencrypted initial content can be provided for in a number of alternative ways, including, but not limited to one or more of a) Data Encryption Standard (DES); b) RC2; c) RC4; d) Message Digest 5 (MD5); e) Rijndael; f) Triple DES; g) Digital Signature Algorithm (DSA); and h) RSA.
  • Also, as discussed above, the unencrypted initial content can be any one or more of many alternate different types, such as one or more of a) Textual data (a series of characters when displayed in a visual representation provide a human recognizable information); b) image data (data that when displayed in a static visual representation imparts human responses from color and brightness); c) audio waveform data (data that when converted to pressure wave in air impart human responses from sound); d) MIDI data (data that when converted audio waveform data and then to pressure wave in air impart human responses from sound); e) video data (data that when displayed in a time-changing visual representation imparts human responses from color and brightness and optionally having an associated audio component); f) game data (data contains settings, game data and other program setting); g) business data (data that contains information on the operation of the business); h) application program code data for an executable program of any sort, such as from word processor, and image processor to video game and interactive entertainment; and other.
  • Referring to now FIG. 3, an alternate embodiment to that of FIG. 1 is shown, further illustrating the providing for controlled usage rights of respective encrypted content, illustrated as accomplished by use of an encrypted ticket defining usage rights and associated with the respective encrypted content. As illustrated in FIG. 3, the operation of the provider encryption services subsystem 104 relative to the consumer decryption services subsystem 204 is substantially as discussed above with reference to FIG. 1. However, additionally, as illustrated in FIG. 3, an output of the production key 140 (as used to encrypt respective selected original content to produce the respective encrypted content) is provided as an input to an encrypted ticket generator subsystem 401, which utilizing the production key associated with the respective encrypted content as an encryption key, encrypts a respective associated generated ticket (defining usage rights for the respective encrypted content). The generated ticket is encrypted (using the respective associated production key for the respective associated encrypted content) to generate an associated encrypted ticket for the respective encrypted content. [The encrypted ticket is utilized for communication to the consumer subsystem 204.] The encrypted ticket is saved as illustrated, responsive to ticket logic, as a saved ticket. The ticket logic (440) utilizes the decrypted production key copy (240), provided as an output internally within the recipient device (204) responsive to decryption within the consumer decryption services subsystem recipient device (204). The ticket logic 440 decrypts the encrypted ticket utilizing the production key copy, and provides for analysis and derivation of a ticket rights output and a usage rights output [(453) and (499), respectively], providing these outputs as inputs to usage control logic (501). The usage logic (501) also receives as an input the temporary unencrypted content output (200) from the consumer decryption services subsystem recipient device (204). Responsive to a requested usage input (502), indicating a request for usage (such as viewing or printing, or other usage privileges), the usage logic (501) is responsive to the ticket rights output and reduced usage output from the ticket logic (440), and based upon allowed usage rights and stored actual usage data, the recipient device subsystem (204) selectively provides for an output (503) of allowed usages (such as viewing, printing (and how may copies), saving, exporting, allowing execution of an application program, and optionally, selectively at what respective level, etc.).
  • Granting rights to respective selected original initial content can be done with an item called a ticket. A ticket is comprised of ticket content, that can be comprised of a ticket ID, a used indicator and other ticket components describing the usage rights the ticket is granting. The ticket is encrypted with the same production key as the associated respective selected original initial content to form the encrypted ticket.
  • As illustrated in FIG. 3, the production system initially provides for granting printing rights to a document. In this example, the other illustrated ticket components are Appliance ID (e.g., which appliance will be able to print), Document ID (e.g., an index identifying which document to allow printing), expiration (e.g., date that rights expire), permissible times/dates for usage, permissible users of the appliance (e.g., which one (or more) recipient device consumer subsystem (204)), and allowable number of copies (number of usages or copies to allow (e.g., to be viewed, printed, saved, executed, etc.). A used indicator is stored (as encrypted) in the recipient device and provides the number of copies that can still be (are allowed to be) printed or otherwise used. When the printed copies (or usage number) are equal to the allowable copies (or usage), no more printing (or usage) is allowed by the recipient device (204), responsive to the ticket components.
  • Numerous other usage rights and tickets can be utilized in accordance with the teachings of the present invention. For example, usage rights can be set on some tickets so that some tickets never expire and those tickets grant rights forever (until used up, if usage restrictions apply). The recipient device (204) executing associated respective authorized application software provides the necessary logic, also referred to as a client engine. The recipient device (204) must maintain the ticket in confidence to preserve the ticket from being tampered with. Thus, only the encrypted ticket can be allowed to be stored permanently.
  • Additionally, a used indicator, where present, will need to be updated when a right is used. In this case, the encrypted ticket is retrieved from storage by the recipient device (consumer subsystem) (204), and the application software within the recipient device (204) generates an Appliance ID used to decrypt the encrypted production key, to provide a decrypted production key. Then, the encrypted ticket is unencrypted with the decrypted production key, and the decrypted ticket is checked to see whether it applies to the current situation (to the respective encrypted content). The used indicator is decrypted and checked to determine whether any usage rights are still available for this specific respective appliance recipient device (consumer subsystem) (204). Then, if rights are still available, the decrypted ticket is modified to update the decrypted used indicator, and the updated ticket and updated used indicator are then encrypted with the production key, and then the encrypted (updated) ticket is stored within the recipient device (204) for later use. All tickets should preferably be saved locally on the client recipient device system as associated with the respective application software together, forever, so that the integrity of the used status can be maintained.
  • The storage structure for encrypted tickets usage can be in many forms. It is important however that usage and rights information be encrypted so it cannot be easily modified by unauthorized entities. If the ticket cannot be decrypted properly then no rights are granted. Even though the rights and usage information may be available in an unencrypted form as well, they cannot be used to grant rights. Without a properly decrypted ticket, the unencrypted rights and usage information can only be used for searching and finding an appropriate ticket. Furthermore, any attempts to modify the rights and usage information are identified, and if the unencrypted rights and usage information are not identical to the encrypted rights and usage information generated by a validated properly decrypted respective encrypted ticket. If tampering with any ticket is found, then that ticket is invalidated (all rights and usage are reset as not allowed).
  • An example of a storage structure for components of a ticket in accordance with one embodiment of the present invention is shown below using an XML format.
  • Example Ticket
  • <g appid=“ffgukgfgaw09t”
    docid=“htgbuk4t000d9t11”
    tikid=“7ggt38sua0p1kw18t8”
    right=“print”
    number = “1”
    used=“−1”
    ticket=
    “7d2f7725a2327f293eb6c42c136bc688a1e3a8b410b29a8f11df”
    />
  • In this above example, the structure utilized specifies several tags as components. The “appid” tag specifies the respective valid appliance for the respective ticket. The “docid” tag specifies the respective valid Document ID for the respective ticket. The “tikid” tag specifies the ticket ID associated with the respective ticket for associative mapping thereto. The “right” tag specifies the type of right that is being granted. As illustrated, right=print (the right to print). The “used“ tag specifies the number of prints that have been used. In this example, the value is “−1” which indicates that all the prints have been used.
  • The “ticket” tag specifies the encrypted rights and usage information. The value of the ticket tag will contain all the tags above and the maximum number of prints allowed which is part of the rights to be granted. The maximum number of prints allowed are used to determine when the usage tag should be changed to “−1” to indicate that no more prints are granted from this tag.
  • The ticket tag will look to the casual observer as a series of random characters. However, when decrypted with the same key as the respective Document ID, the respective unencrypted rights and usage information is made available. For clarity of the example, a reduced length of the value of the ticket tag has been shown in this example. Preferably, it would be much longer so that all the appropriate information can be stored in it.
  • In a preferred embodiment, the storage location for the encrypted tickets can be the local client storage in the recipient device. In this case, redundant storage is desired to minimize the loss of information. If stored redundantly, the tickets should be synchronized frequently, to make sure they are identical. If found to not be identical, then, the recipient device system makes the decision on the usage rights for the recipient device in the direction of reducing the rights to the lowest (least) rights of the multiple redundant tickets. For example, if one of the redundant tickets indicates that one more print is available and another redundant ticket (ticket ID identical) indicates that no prints are available, then, both redundant tickets are conformed (the one is changed) to indicate no prints are available.
  • The storage location for the redundant encrypted tickets can alternatively or additionally be a host or remote server. The remote server can just provide the storage, or it can also provide some of the processing to determine whether to grant the rights. In the later case, the recipient device client subsystem running the respective application software must send necessary information (e.g., Appliance ID, ticket ID, Document ID, etc., other ticket components) to the server. The server then generates an appropriate ticket after determining on the server the associated respective perspective usage rights, and then the server transmits a respective encrypted ticket back to the client.
  • In an alternate preferred embodiment, associated control data is provided with the respective unencrypted content. In this embodiment, encrypting the unencrypted content is comprised of encrypting both the selected unencrypted original content together with respective associated control data, responsive to the production key, to provide encrypted content and associated control data (e.g., either as a separately provided associated encrypted ticket or as a combined integrated encrypted file [content and associated control data].
  • The associated control data defines usage rights for the respective associated content, and is provided at the production subsystem (104) based on the requirements of the initial content provider. For example, in one embodiment, a recipient device appliance can be restricted so as to only permit predefined standard uses of the initial content (such as view only) even though the respective content can be enabled for other usage capabilities (such as annotate, print, save, network, export, save). Alternatively, standard uses can be more fully featured, with the provider making usage restrictions.] The provider [production system (104)] of the initial content can set up rights for exceptions to the standard uses. These exceptions can also be encoded in the associated control data to provide for selective control of usage of the respective associated content by the respective recipient device appliance. This associated control data is encrypted with the same production key as the associated respective initial original content. This encryption can be done for one file (or portion) of selected initial content, or for multiple files of initial content (such as a grouping or collection of files). This encrypted associated control data can be for one file, or for the grouping, or one for each file in a grouping. The encrypted associated control data is coupled (or otherwise provided) to a specific recipient device appliance. The respective production key is encrypted by the production system (104), responsive to an appliance ID generated by the specific appliance. Thereafter, the respective encrypted production key is provided to the respective specific appliance. Thereafter, the respective specific appliance locally generates an Appliance ID that is locally utilized by the specific appliance to decrypt the encrypted production key to generate a decrypted production key that is used to decrypt the encrypted content to generate respective decrypted content. The decrypted production key is also used to decrypt the respective encrypted associated control data to generate decrypted associated control data. The decrypted associated control data is used by the respective specific appliance to selectively control and provide for permitting only the allowed usage rights [as per the exceptions to the standard uses (or defined permitted usages)] of the decrypted initial content.
  • To provide a higher level of security, usage rights restrictions can be made appliance specific. The selected initial (original) content is encrypted by the production subsystem (104), responsive to an associated production key to create respective encrypted content. The encrypted content is transmitted, [or otherwise provided from the production system (104) (trusted provider)], to the respective specific remote appliance (recipient device). The associated production key is encrypted using an Appliance ID provided from a specific remote appliance. The encrypted production key is also transmitted (or otherwise provided) to the remote appliance. The Appliance ID is then locally generated at the remote appliance and is used as a decryption key to unlock (decrypt) the respective encrypted production key to provide a respective decrypted production key. The decrypted production key is utilized within the recipient device remote appliance, (1) to decrypt the respective encrypted content to provide decrypted content, and (2) to decrypt the respective encrypted associated control data to provide decrypted associated control data. The recipient device selectively permits only permitted usages of the respective decrypted content only on the respective specific recipient device remote appliance, and only in accordance with and responsive to defined usage rights of the respective decrypted associated control data.
  • Thereafter, a display presentation can be selectively provided for viewing at the respective specific remote appliance responsive to the unencrypted initial content and respective associated control data (usage rights) providing content-view control. The respective specific recipient device system can selectively permit printing of the unencrypted initial content responsive to the usage rights providing for content-print control.
  • The associated control data is set by the trusted provider (the production subsystem (104) (that is providing the respective associated selected initial content), and can define many alternative usage rights, such as one or more of (a) viewing privileges [selectively allows the initial content to only be viewed at certain times, or only for a certain length of time, or only for a limited number of times] or unlimited; (b) printing privileges [only allows the initial content to be printed at certain times, or for a certain length of time, or only a limited number of times] or unlimited or not at all; (c) exporting privileges [only allows the initial content to be exported at certain times, or for a certain length of time, or in certain file formats, or only a limited number of times] or not at all; (d) partial access privileges [only allows certain parts of the initial content to be available, (for any use, or for specific uses)]; (e) access privileges [only allows certain programs to access the initial content]; (f) running and execution privileges, [only allows certain programs to run on the appliance, or selectively allows the respective decrypted content (e.g., a part or all of the respective selected initial content), to be run on the appliance and executed as a software application program]; and (g) independent access privileges [the initial content provider may restrict operation at the recipient device so as to only allow certain processes to access the initial content].
  • As an example of operation, suppose that a user of a recipient device (e.g., the client) asks to print two copies of a controlled document of protected content. The recipient device would first check whether it has been granted unlimited printing rights. If those rights are available, the recipient device-client authorizes the printing and proceeds to print the document twice. If unlimited rights are not available, the recipient device-client searches for respective associated tickets that are valid for this specific appliance, and the respective proper Document ID and that the ticket has the right tag defining usage rights equal to “print”, and also that the respective ticket has the actual usage tag not equal to “−1” (See discussion elsewhere herein, regarding the example ticket). The recipient device-client will decrypt the ticket tag and check the ticket for validity using the document key for the Document ID. If valid, and sufficient print rights remain, the recipient device-client will be revised to increment the usage tag [or set it to −1, if all the authorized copies have now been used]. The revised ticket is stored. Then, one print of the respective document is performed by the recipient device. The second copy of the print follows the same procedure. The reason for repeating the process is because multiple tickets may be required (or otherwise be used), (each ticket may only allow 1 print) or printing problems could occur that results in rights being used up even though a print command doesn't actually physically print. However, using the print rights up only one at a time, sequentially, allows the print process to be aborted without using further rights. Alternatively, if desired, two print usages can be provided for, and providing the ticket has two print usages left, the print rights changed (appropriately for two print usages) in the ticket in one step.
  • The associated control data can be utilized to activate one or more of (at least one of): (a) viewing privileges; (b) printing privileges; (c) exporting privileges; (d) partial access privileges; (e) running privileges; and (f) independent access privileges. These privileges are selectively allowed by the respective application software running on the specific appliance (recipient device), responsive to the respective associated control data for associated selected content. The specific appliance is responsive to the associated control data to enable the standard uses of the respective selected initial content [as per the respective initial content and/or as per respective application software operational constraints, operating within the recipient device], and any exceptions to those uses as per the associated control data. In one embodiment of standard uses and exceptions, a specific recipient device appliance cannot share decrypted initial content with any other appliance or for any use on any appliance that is not allowed by these respective defined usage right privileges for the respective content. All other processes (e.g., operations within an appliance) and any appliances that are selectively permitted and allowed access to the respective decrypted initial content must honor and adhere to the privileges (e.g., usage rights) granted to them by the respective associated usage rights.
  • Thereafter, a display presentation can be selectively provided at the respective remote appliance responsive to the respective unencrypted initial content. Selective printing of the respective unencrypted initial content can also be selectively provided, responsive to respective authorized usage rights of the respective associated control data as to printing privileges.
  • The number of allowed prints (number of copies that are allowed to be printed of the unencrypted content) is stored in and as a part of the associated control data. A print count is also available to the specific appliance. This print count is either stored on the appliance or on a remote system. The print count is incremented every time a print is made and the new revised value is stored, respectively, on the appliance and/or the remote system. Printing is not allowed of respective selected content, if the print count is equal to or greater than the number of prints allowed as set forth in the respective associated control data.
  • Thus, the consumer's recipient device (remote appliance) system selectively provides a display presentation (at the remote appliance) responsive to the unencrypted initial content and to the respective associated viewing privileges, (if any), and selectively permits local printing of the unencrypted initial content responsive to the respective associated control data printing privileges.
  • In an alternate embodiment, the system only selectively permits for viewing of the unencrypted initial content responsive to the presence of associated control data viewing privileges, to selectively provide a display presentation at the remote appliance responsive to the unencrypted initial content.
  • In another embodiment, the recipient device system provides means to create unencrypted (or encrypted) exported content at the remote appliance responsive to the unencrypted initial content, responsive to the associated control data exporting privileges.
  • Alternatively, the recipient device system can provide a means to create additional unencrypted partial access content at the remote appliance (such as annotations) responsive to a portion of the unencrypted initial content, responsive to the associated control data partial access privileges. This can be accomplished in several ways. Two alternatives are presented here. First, the associated control data defines partial access privileges and provides for defining the beginning location and end location of the unencrypted initial content that is being granted. The remote appliance begins decrypting the encrypted initial content (as described earlier), but does not store it until the beginning location is reached. The content is then stored until the end location is reached. Then the decrypting stops because no further access rights have been granted as to the respective unencrypted initial content, as to the respective appliance. Second, the unencrypted initial content can be encrypted in blocks of data. Then the associated control data partial access privileges provide for defining the specific block of data (of the respective selected content) for which the appliance is being granted access to. Only this respective block of data is then decrypted for permitting access to that respective block of data of the respective unencrypted initial content by the respective appliance.
  • In another alternative embodiment, the operation of an independent computing system, or operation of the decrypted content as an executable software program on the specific appliance recipient device, is controlled responsive to the respective associated control data for running privileges for the respective decrypted content. The associated control data contains information on which running privileges are available for the respective associated selected content. The independent system (or recipient device) must check the associated control data before running. If the proper running privileges are not granted for the respective associated selected content, then it will not allow that portion of the program to run.
  • In one aspect of this alternative embodiment, the associated control data is utilized to provide for operation of an independent system and selectively regulates the independent system to permit access to the respective unencrypted initial content responsive to the respective associated control data independent access privileges.
  • Tickets can be used in a number of ways to allow the use of protected digital content, also referred to as PDC. The most secure uses of the PDC never allow the digital content to be stored in part or its entirety in an unencrypted form at any location. Practically, this is not possible because no one would have use of it at all so the owner of the PDC must determine how and how much of the PDC is used where. In order to control “where” the PDC can be used, the recipient devices implementing this invention must be approved or otherwise authorized, and follow the restrictions placed on it by the owner of the PDC. However, this is difficult to 100% control, except in the most stringent security situations. For instance, if the user is allowed to print a portion of the PDC on paper, then there is the exposure and risk that an office copy machine can make uncontrolled copies that portion of that representation of the PDC [notwithstanding copyright or other legal restrictions which might make the activity illegal]. The owner of the PDC must determine if this is an acceptable risk. However, tickets allow this decision and other like to be made appliance specific, on a “where” basis.
  • For instance, an encrypted document key can be sent to and stored on a specific appliance. Thus, whenever the PDC is needed on that specific appliance, the specific appliance can retrieve the associated respective encrypted document key and use it to selectively decrypt and use the PDC as appropriate. However, the encrypted document key need not be stored on the specific appliance but can be stored in another device that needs to be connected to the specific appliance. Alternatively, the user of the appliance can enter the encrypted document key manually. These provide alternative ways of controlling the where and when the PDC is used.
  • A ticket can also be supplied to a specific recipient device appliance that allows a specific use of the PDC. Part of the ticket can be a password that the user of the PDC must provide. It may also be required that another specific device be connected to the specific recipient device appliance. It may also be required that multiple PDCs are available on the same specific appliance. For example, suppose a first PDC, PDC-A, contains the social security numbers and associated addresses of every person in the United States. By default, the appliance can have the encrypted document key needed to access this information but no rights to use it. A ticket could be issued to that specific appliance that allows the specific appliance to verify the social security numbers for a person if supplied with a number. The specific appliance would then allow the user of the specific appliance to enter a social security number and a name and verify that this is the person's social security number or not. Now suppose that the specific appliance also has a PDC-B containing the social security benefits for a limited number of people. A ticket could be issued to that specific appliance to allow the PDC-A to provide the address from a social security number if that social security number is also available in PDC-B. The ticket can further be used to regulate and further restrict the use of the protected information content so as to have the user supply a password before being permitted to view the protected content information. In addition, a device identifying the user (such as a smart card) could be specified in the ticket and the information would not be allowed without that device being connected to the respective recipient device appliance.
  • As shown in the above example, a ticket can also be used to control the operations that are allowed to use data in a PDC. In the previous example, data from two different PDCs (PDC-A and PDC-B) was allowed to be combined when a ticket allowed it. In the general sense, this is a relational database JOIN operation using SQL (ISO/IEC 9075 see http://www.iso.org), using a common field (social security number) to relate information in 2 different tables. this could extend to any number of other database operations using the SELECT, INSERT, SET, DELETE and many other clauses.
  • Regulated use operations in the examples herein, include printing, (saving/exporting, allowing execution of a program, and viewing. However, there are many more operations that are possible. A custom analysis of the data is possible. Also, the data could be used to control a machine. For instance, a ticket could allow the appliance to move an object via a motor in a certain way this is not allowed otherwise. A ticket could also control if and how much of the associated PDC can be sent to another appliance. For instance, mapping programs allow the user to print out a one-page map but not the entire mapping information (unless the user prints each and every map possible which would be very time consuming). A ticket could also be used to allow the user of an appliance to access certain user operations. For instance, on a recipient device appliance used for wagering, the ticket could allow a user to access certain areas of protected content, or to only perform certain operations, such as for wagering (such as horse racing, and various games of chance) on a per appliance (appliance specific) setting.
  • Tickets can also be used to control the type of operations that are allowed to run without the need for any PDC. These operations are the same as above, but are not tied to a particular PDC. When the program runs, it checks tickets that give it the right to run. These tickets can be complex, and can depend on when the program is run, how many times it has run, requiring a password, requiring a specific device to be attached, requiring a barcode, fingerprint, retina or other biologically-related scan of a person or object.
  • The tickets can also determine what functions are available in a program. This allows an application program to be regulated and limited-based on the associated respective tickets that allow certain operations. The respective application program would check for the associated respective tickets to verify and selectively allow a certain function to operate, before permitting the executing of the code for that function.
  • Many programs also load plug-ins that allow the program to be extended with new functions. Tickets can additionally, or alternatively, be associated with a plug-in. These tickets can control respective associated plug-ins by having the respective associated plug-in check the respective associated ticket every time the respective plug-in is used. The plug-in is not even loaded, if it is not allowed to be run.
  • Tickets can be utilized to not only to authenticate and regulate usage, but to also set up the level of usage of the selected original content. Where the selected content is an application program, the associated ticket can even be used to regulate and to set up the functionality and the feature set of the application software, variably set to a selected level of feature set comprised of from between minimal functions and features of a minimal feature set (e.g., bare bones), to a maximum functionality and features of a maximum feature set (e.g., fully maxed out). Thus, while selected content can be for one ubiquitous full-featured application program, which during an activation set up (on a recipient device computing system) establishes and sets operability level to set, responsive to the associated usage rights ticket.
  • FIG. 4 illustrates the system of FIG. 3, with the addition of combining logic (107) at the production system (104), and separating logic (108) in the recipient device (204). The provider subsystem (104) provides separate outputs from its encryption logic (106) of encrypted content (120) and an encrypted production key (158) which are combined by the combining logic (107) to provide a single combined output of encrypted content and encrypted production key encryption. As illustrated, the encrypted content is comprised of encrypted content with its respective associated encrypted usage rights ticket. As illustrated, the encrypted content is comprised of a combination of selected encrypted content with its respective associated encrypted usage rights ticket. The recipient device (204) provides separating logic (108) that receives the combined output (CO) as output from the combining logic (107), and separates the combined output into individual separate outputs of encrypted content (with ticket) and associated respective encrypted production key as inputs to the decryption logic (109) of the recipient device (204), and the encrypted ticket is coupled to input (441) of ticket memory and logic (440), and thereafter, operation is as described in FIG. 3.
  • FIGS. 5-8 illustrate more detailed block diagrams of the provider encryption services subsystem 104 of FIGS. 1-4.
  • FIG. 5 illustrates a block diagram with associated state flow, illustrating further details of the generation of encrypted production key outputs for use by the production system (104) as an encryption key to use for encryption of respective associated content. The details of a key creation methodology and system are also described with reference to FIGS. 8, 16, and 17.
  • Referring to FIG. 5, the provider encryption logic (106) of the production system (104) is illustrated in further detail, as to generation and usage of production encryption keys, as used for encrypting of respective associated content, associated control data, and usage rights tickets. An Appliance ID (157) (preferably jumbled), as generated from a specific recipient device (204), is coupled as an input to encryption logic (103) of the production system (104) production key logic (101) that provides for an output of a specific selected production (encryption) key (135). The specific selected production key is either generated (such as by a random number generator of keys, a seeded pool generator of keys, etc.), or selectively chosen from a stored database of keys, etc. The production key (135) is coupled as an input to the data input of the production key encryption logic (103), which encrypts the respective specific selected production key, responsive to the Appliance ID (157), to provide an encrypted output of a respective encrypted production key (158), which is, preferably jumbled first and, provided as an output from the production system (104), for even that input to the respective recipient device (that provided the respective Appliance ID (157) utilized as an encryption key. The production key (135) is also coupled as an input to an encryption key input to content encryption logic 9102). Selection logic (50) in the production system (104) provides for selection of a particular file (or files) of specific particular original content, to provide an output of selected original content (51) coupled as an input to the data input of content encryption logic (102). The content encryption logic (102) encrypts the selected original content (51), responsive to the associated respective specific particular production key (135), to provide an encrypted output of respective encrypted (selected) original content (120).
  • The selection logic (50) can be responsive to an operator (person) at the production system (104), or responsive to on-line purchase transactions, or a supplied order list, or in accordance with publishers or content owners' instructions, etc.
  • As illustrated and discussed hereinafter, the generation of the encrypted content and encrypted production key can be accomplished in numerous alternative ways, the choice being one of design tradeoffs.
  • FIG. 6 illustrates a detailed block diagram showing details for the production key encryption subsystem (103), illustrating the generation of the encrypted production key (162) from the respective production key (135), and an Appliance ID (157), (preferably, a jumbled Appliance ID securely communicated), coming from either the recipient device appliance (204), or a storage means (174) within (or external to) the production system for storing the Appliance ID from the respective appliance. The jumbling and unjumbling of encrypted production key output and the Appliance ID output are design choices, not requirements of the present invention, and are factors of the communications environment design choices. The choice of communication between the production system (104) and the consumer system recipient device (204) can alternatively be of jumbled or of non-jumbled signals, such as encrypted content, and/or encrypted production key, and/or Appliance ID.
  • FIG. 6, also illustrates an additional embodiment providing additional security. The Appliance ID (157) received by the production system (104) is, if needed first unjumbled (if it was originally jumbled), and is stored (174) as a stored Appliance ID, which is coupled as an Appliance ID output (156) coupled to the data input of appliance hash logic, which is a copy of (equivalent to) corresponding to hash logic (153) that is used similarly at the recipient device for decrypting the production key therein. A password is provided (151) [such as internally generated (and provided securely to the respective content holding recipient device), or otherwise provided], as an encryption key input to the hash logic (153). The hash logic (153) utilizes the Appliance ID (156) (as originally generated at a specific recipient device), responsive to the password (PO), to generate a hash value (or encrypt with encryption logic to generate an encrypted value) of an associated appliance key [which is a copy of the appliance key (that is, it is the same) that the recipient device generates internally, responsive to being provided the password (PO) (such as via user entry of data into the recipient device, via download, or otherwise), and responsive to the internal generation of the respective Appliance ID].
  • The appliance key output (AK) is coupled as an input to the (encryption) key input of appliance key encryption logic (160). The respective selected production key (135) is coupled as an input to the data input of encryption logic (160), which encrypts the respective selected production key (135), responsive to the respective appliance key (AK), to provide an output of respective encrypted production key (162). Where jumbling is desired, jumble logic (176) provides a jumbled encrypted production output (158), responsive to jumbling according to defined logic, the encrypted production key (162).
  • As discussed hereinabove, jumbling refers to processing of content to be communicated in a secure method. Jumbling can be accomplished in numerous alternative ways, such as use of secure socket layer (SSL), encryption, etc.
  • FIG. 7 illustrates a detailed block diagram of the content encryption subsystem 102, utilizing the selected production key (133) and associated selected original unencrypted content (101) to generate a respective encrypted original content output (120). The production key (135) is coupled as an encryption key input (110 k) and coupled to a hash (or other one-way encryption function) logic (110). The encryption key input (110 k) provides the parameter to encrypt or lock [and decrypt or unlock], to provide for encryption (and later decryption) of the selected original unencrypted content (101) to produce an output of encrypted content (120). As described in detail elsewhere herein, any hashing or alternative encryption logic (and its inverse for decryption) can be used consistent with the present invention for encrypting and decrypting of the original content, the production encryption key, the Appliance ID, the Appliance Key, a Document ID, and the ticket or associated control data.
  • FIG. 8 illustrates a more detailed diagram of the production key generation subsystem 101, which provides for selection (137) of a production key (135) from either a saved key (133) or by generation (by any means that is secure) of a new key (131). Selection logic (137)[such as responsive to a software programmed function, or responsive to a person, or otherwise], provides control for selecting (139) for a new key (131) to be generated (130), or for a stored key (133) to be utilized. The selecting of the production key (139) provides an output of a selected production key (135) for use within the production system (104). When newly generated, the new production key (135) is stored (136) as a saved key (136) for other use, and/or as associated with respective selected content, and is stored as a saved key for use as a production key (132). A production key (135) is used to encrypt associated respective selected content to create encrypted content. The production key (135) is also usable to encrypt associated control data, or a ticket, or a Document ID, etc. Thereafter, the production key is needed to provide the decryption key input to an equivalent hash function (or other encryption/decryption function) to unlock and decrypt the respective encrypted content to produce a copy of the original encrypted content. In a preferred embodiment, an index variable (such as a Document ID) is associated with and stored with the respective encrypted content and the associated respective production key, so as to map the respective production key to its associated respective selected content and other encrypted data, (if any), that was encrypted using that respective production key.
  • FIGS. 9-12 provide further details of the consumer decryption services subsystem (the user's appliance or recipient device) 204 of FIGS. 1-4.
  • FIG. 9 illustrates the block diagram and data flow, at the recipient device (204), related to the utilization of the communicated encrypted content, and (umbled) encrypted production key. The recipient device (204) utilizes an internally generated (204) Appliance ID (186) as a decryption key input to production key decryption logic (204), which utilizes the Appliance ID as the decryption key to decrypt the encrypted production key (188) to generate a production key copy (240), and utilizes the production key copy to decrypt an encrypted content copy (220) [as provided from a production system (104)], to provide unencrypted content output (200), that is stored (preferably, only kept temporarily in memory, and only during permitted usages). Furthermore, usage of the decrypted content at the recipient device is selectively provided responsive to and in accordance with the permitted usage rights.
  • FIG. 10 illustrates in generating of the Appliance ID and jumbled Appliance ID (where utilized) in the subsystem (204) for usage within the consumer decryption services subsystem (204) and provided, preferably in a protected format, to the producer subsystem (104). The recipient device (204) computing system executes an authorized application program, which obtains appliance data (171) from within the hardware and software of the recipient device (204), which appliance data is input to a hash logic (172) (or other obfuscation or encryption means) to internally generate a generated Appliance ID (186), which is (1) provided as an internal Appliance ID signal (186) distributed within the recipient device (204), and, (2) provided as an output for input to the production system (104). As illustrated, the internally generated Appliance ID (186) is input to jumble logic (173) which processes the internally generated Appliance ID (186) to generate a jumbled Appliance ID output (187), for coupling to the production system (104). As discussed elsewhere herein, jumbling (and unjumbling) are design option choices, and the use or non-use, either is compatible with the present invention.
  • FIG. 11 illustrates the decryption of the production key within the recipient device (201), providing for decryption of the encrypted production key utilizing the internally generated Appliance ID to generate an appliance key utilized to decrypt the encrypted production to provide a production key copy output to the consumer decryption subsystem (204). Where jumbling is utilized, the jumbled signal (such as jumbled encrypted production key) is first dejumbled (such as to create an unjumbled encrypted production key) as a part of the process, as appropriate. As illustrated in FIG. 11, the jumbled encrypted production key (199), as input to the recipient device (204), is coupled as an input to dejumble logic (177), which processes the jumbled encrypted production key to provide an output of an encrypted production key (182) which is coupled as a data input to key decryption logic (26). Additionally, the internally generated Appliance ID (186) is coupled as a data input to appliance key hash logic (153), which (as illustrated) is responsive to a predefined password input (151) providing a key input to the appliance key has logic (153) [or other encryption logic type]. The use of the password is optional, and is utilized for higher security, requiring a password to decode (decrypt/hash) the Appliance ID to generate an appliance key. Alternatively, the use of a password is not required, and the internally generated Appliance ID is used directly (or after some processing), as a decryption key for the production key decryption logic (260). The production key decryption logic (260) decrypts the encrypted production key (182), responsive to the appliance key (as a decryption key), to provide an output of a decrypted production key (copy) (240).
  • FIG. 12 is a detailed block diagram of the content decryption subsystem (202), of the consumer decryption subsystem (204), providing for decryption by data content decryption logic (210), (220) as coupled to the data input of the data content decryption logic (210), and of the encrypted content copy (240) coupled as a decryption key input to the data content decryption logic (210) utilizing the production key copy wherein the data content decryption logic generates the unencrypted content (200) (preferably stored only temporarily) for use by the consumer decryption subsystem (204).
  • FIGS. 13-15 illustrate various aspects of the generation, encryption, decoding, and utilization of the rights ticket.
  • FIG. 13 illustrates the encrypted ticket generator (401) (as in FIGS. 3-4) of the production system (104), providing an encrypted ticket output (408), defining and providing for associated defined rights, allowed usages, and Ticket IDs for respective associated protected content. The encrypted ticket output (408) is associated with its respective production key (140) and the respective associated encrypted content. The production system (104) provides defined outputs for permitted rights (402) [defining those features, functions and options that are to be selectively restricted or permitted], allowed usage (403) [defining limits or restrictions on permitted rights, such as how many print copies are to be allowed for respective associated protected content, how many exports of are allowed for a respective associated protected content, etc.], a ticket ID [for uniquely identifying the ticket (such as for use in indexing or mapping of a respective ticket to respective associated protected content or a respective associated production key)], and a respective production key associated with the respective ticket ID (404) and the respective encrypted ticket (408). Ticket data generation logic (405) processes the inputs of rights (402), allowed usage (403) and a ticket ID (404) to generate (according to defined logic) a respective ticket output (406) that is coupled as a data input to ticket encryption logic (407). The respective associated production key (140) is coupled as an encryption key input to the ticket encryption logic (40-7), which responsive tot he production key (104) encrypts the ticket (406) to generate an encrypted ticket (408) that is provided for output to a specific recipient device (as associated with respective protected content for the specific recipient device. The encryption of the respective production key (140), responsive to the generated Appliance ID of a particular specific appliance recipient device provides for appliance specific mapping of the respective encrypted content encrypted ticket and encrypted production key to be to the respective specific appliance associated with the respective generated Appliance ID. This is because the encrypted production key can then only be decrypted at the particular specific recipient device to generate the decrypted production key (copy) that can then be used to decrypt the respective associated encrypted content and respective associated encrypted ticket at that particular specific recipient device.
  • FIG. 14 illustrates ticket decoding at the consumer decryption subsystem (204), and the utilization therein of a ticket decoding subsystem (430). The encrypted ticket output (408) of the encrypted ticket generator (401) is coupled to a data input of decryption logic (432). The production key (copy) (240) is coupled to a decryption key input of the decryption logic (432), which responsive thereto, processes the encrypted ticket to decrypt it, to generate a ticket copy (433) which is coupled as an input to ticket decode logic (434) which decodes the ticket copy (433) [according to predefined logic] to determine and provide an output of Rights (435) and Allowed Usages (436) and Ticket ID (437) and its verification. Since (for appliance specific-based protection), the generated Appliance ID is needed to unlock (decrypt) the encrypted production key, this insures that only the specific appliance for the respective Appliance ID can in any way use the encrypted content or encrypted ticket.
  • FIG. 15 illustrates the saved ticket subsystem (440) (of FIGS. 3-4), showing details of the overall system operation (and data flow and state flow), for the encrypted ticket generator (401), and the resulting ticket decoding (430). The recipient device (204) provides a usage request for specific selected protected content (42) [which initiates the processing of that request by the recipient device (204)] that is coupled as an input to request response logic (442). Ticket decoding logic (430) decrypts the encrypted ticket (copy) (441) responsive to the production key (copy) (240), and provides outputs of a ticket ID (437) [coupled as an input to the request response logic (442)], allowed usage (436) [coupled as an input to anti-tampering logic (446) which resolves conflicting allowed usage information among multiple stored information for said allowed usage by selecting the least usage rights (least allowed usage)], and rights (435) defining permitted rights for the specific selected content [coupled to rights selection logic (447) for resolving conflicting rights information as among multiple stored information for said respective rights]. The request response logic (442), responsive to the usage request (42) and the ticket ID (437), retrieves the respective associated ticket from the saved tickets (451), checking for all locations where multiple stored information exists for said respective ticket, and provides one of a ticket not available output [coupled as an input to saved ticket decoding logic (430), which decrypts the encrypted saved ticket responsive to the production key (copy) (240) to provide decrypted outputs of allowed usage (436) and ticket ID (437) coupled as inputs to default ticket information logic (443) which responsive thereto provides outputs of default allowed usage (444) [provided as an input to anti-tampering logic (446)] and default rights (445) [coupled as an input to rights selection logic (447), which has its other input coupled to the decoded ticket rights output (435)].
  • The rights selection logic (447) selects the lesser of the permitted rights [default rights (445) versus decoded ticket rights (435)] to provide an output of ticket rights (449), which is coupled within the recipient device for usage in regulating the permitted rights and allowed usage in accordance with the ticket rights (449) for respective associated specific selected content. The ticket rights output (449) is also coupled as an input [at (402)] to encrypted ticket generator logic (401).
  • The anti-tampering logic (446) is responsive to the inputs of the default allowed usage (444) and the decoded ticket allowed usage (436), to select to lesser of the allowed usages represented thereby so as to provide an output of determined usage rights (448) [which is coupled as an input to usage regulation logic (452) which reduces the determined allowed usage (as per the usage request (42)), such as by subtracting one (1) use (e.g., if the request was to print one copy, and the allowed usage is to print one (1) copy, then the usage reduction logic (452) reduces the allowed usage by the one printout requested, to leave zero (0) copies allowed to be printed]. The reduced allowed usage is output and coupled to both (1) other processes within the recipient device, and (2) as an input (403) to the encrypted ticket generator logic (401). The decoded ticket ID (437) is also coupled as an input to the encrypted ticket generator (401), which responsive to the ticket rights (449) input (402), the decoded ticket ID (437) input (404), and the reduced allowed usage (453) input (403), provides an output of a revised encrypted ticket (408) which is coupled for storage (450) of the revised ticket which is stored among saved tickets (451). Additionally, the store ticket logic (450) provides a changed output coupled as an input to check location logic which provides for storing (and maintaining an index of the storage) the respective ticket (or portions thereof) in one or multiple locations, and provides a location output coupled to both the store ticket logic (450) and the request response logic (442), in both cases, providing for selective storage (or retrieval) of all stored locations for a respective ticket (or portions thereof).
  • Referring to FIG. 16A, a methodology and system providing for the secured communications of protected content, as well as for the secure viewing and/or printing and/or exporting of the content, is provided. Referring to FIG. 16A, selected original unencrypted content (100) is coupled as an input to the data input of data content encryption engine logic (110), which responsive to a production key (135) coupled as an input to the key input of data content encryption logic (110), provides for encrypting the original content (100) to provide an output of encrypted content (120). The encryption of the selected original content (100) is processed by the encryption subsystem (102) [e.g., the dashed box (102)], as per the state flow is as indicated and discussed with reference to the components within the encryption subsystem (102).
  • A production encryption key creation subsystem (101) [also referred to as production key or key] and methodology and state flow therefor, are also discussed as illustrated in FIG. 16A. As illustrated, selection logic (134) provides for generation of a production key by either (1) generating a random key (130). This can be done in any convenient way, such as using discrete logic, or a state machine programmed with a variable, or a software routine, or other means to provide a new key (61) output (e.g., random number or polynomial generator, seeded pool, etc.) of a new key output (131); or alternatively, (2) the selection logic (134) accesses from storage a previously saved key (or keys) (132) are provided as an output (133) coupled to the selection logic (134). The selection logic (134), thus, selectively provides one of a new key or a saved key, in accordance with defined rules. In one embodiment, a new key is created periodically, and then utilized as a saved key for a defined period of time. Alternatively, a new key can be used for each file, or for a group of related files. As illustrated in FIG. 16A, the saved key output (133) or new key output key (131) are selected and coupled to the selection logic (134) which provides an output of the respective specific production key (135) which output is coupled to both (1) storage (60) logic for storing the respective specific production key (135) as a saved key in storage (132), which the saved key can later be utilized and retrieved as a previously saved key (132); and (2) the respective specific production key output (135) is also coupled and provided as an input to the encryption key input (140) of content encryption logic (110). Numerous techniques can be utilized to generate or create the random key by the key creation logic (130). Additionally, numerous types of encryption technology can be utilized for the data content encryption logic engine (110).
  • In a preferred embodiment, a conversion program creates a new random production key on request. It also allows setting of a production key to a previously generated production key. In one embodiment, when converting a group of documents, the first document created gets a new production key and the remaining documents in the group use the same production key as the first. This allows all the documents to be opened with a single document key. These documents can be sold together as a single package (e.g., such as a file or a CD-ROM).
  • For an extra level of security, a password level of security can be added on top of and in addition to the use of the Appliance ID to decrypt and decrypt the respective production key. The production key (135) is also coupled to a production key encryption subsystem (103). The production key (135) is coupled a Data Input of Production Key Encryption Logic (160). In the illustrated embodiment, a first password 151, is generated, which can be done by numerous means including a shared password content, or a generated password according to defined criteria, or provided as part of a transaction processing, etc. The first password (151) is coupled to appliance hash logic (153) [an equivalent copy to a corresponding hash logic in the respective recipient device generating the Appliance ID (156)], which responsive to an externally provided Appliance ID (156) provides an output of an appliance key (copy) (155) which is provided as an encryption key input to the production key encryption logic engine (160). The production key encryption logic (160) encrypts the production key (135) responsive to the Appliance Key (155) to provide an output of encrypted production key output (162).
  • The encrypted content (120) and the encrypted production key (162) are both provided as outputs coupled to, and to be utilized by, a respective associated recipient device (the consumer's appliance) to reconstruct a copy of the selected original unencrypted content (100). In order to provide for data rights management, decryption of both the encrypted content (120) and of the encrypted production key (162) are required at the recipient device, because the decrypted production key is needed (and used) to decrypt the encrypted content (120). To provide appliance specific control of decryption, the unique Appliance ID associated with a specific appliance is generated within the respective specific recipient device appliance and coupled to the production system (104), and is used therein to decrypt the respective specific encrypted content (120), and is also utilized in the respective recipient device as a critical element in decrypting the production key necessary to provide the encrypted production key (162) coupled to the specific consumer's recipient device (204) that provided the respective Appliance ID. The encrypted production key (182) can only be used by the specific respective recipient device (204) provided the respective Appliance ID (or passworded Appliance Key) is utilized to encrypt the respective production key.
  • The recipient device generates the respective Appliance ID (or Appliance Key) (65), which is needed to generate a respective password protected Appliance Key (66), which is coupled to a decryption key input of the key decryption logic (260), which responsive thereto, utilizes the Appliance Key to decrypt the encrypted production key to generate a respective decrypted production key (240) as a decryption key input to content decryption logic (260), which responsive to the decrypted production key, decrypts a (copy) of the encrypted content (102) which provides an output of decrypted content (71).
  • As illustrated in FIG. 16A, the recipient device appliance at the consumer remote location provides appliance data (170) uniquely generated from within the appliance itself (such as via software running on the recipient device appliance). Examples of types of factors that can be utilized as appliance data include network address card address, MAC address, processor ID, etc. The output from the appliance data generation logic (170) is coupled to appliance hash logic (172) which generates an internally created Appliance ID (156) which is provided (either through a jumble, without jumbling/unjumbling, unjumble logic (174) in the production system (104), or through direct connection), as an Appliance ID output (156) coupled to the product key encryption subsystem (103). Additionally, the internally generated Appliance ID (156) is coupled (within the recipient device) as a Data Input to the Appliance Key hash logic (153) corresponding to the Appliance Key hash copy logic (153), and responsive to the first password (75) that is provided as an input to the appliance hash key hash logic (153), which provides an output of a generated appliance key (185), corresponding to the appliance key copy (155). The appliance key (185) is provided as a decryption key input to Decryption Logic (260), inversely corresponding to the encryption logic engine (160). The encrypted production key (162) is provided as an input to the Decryption Key input of Decryption Logic (160) of the Production Key Decryption Subsystem (203), either directly jumble logic (176) of the Production Subsystem (104) and unjumble logic (177) of the consumer recipient device subsystem (204). The encrypted production key (182) is coupled to the decryption production key logic (203) as a Data Input to the Production Key Decryption Logic (260) which responsive to the generated Appliance ID (156) provides as an output the production key (copy) (240) corresponding to the production key (140). The production key copy (240) is output from the Production Key Decryption Logic (260) and is coupled to the Decryption Key input of the Data Content Decryption Logic (210) [corresponding to the inverse of the Data Content Encryption Logic (110). The encrypted content (copy) (120) [corresponding directly to the encrypted content (120)] is coupled as an input to the Data Input of the Content Decryption Logic (260) of the Content Decryption Subsystem (202). The Data Content Decryption Logic (210) performs a decryption of the Encrypted Content (copy) (210), [the Decryption Logic inversely corresponding to the encryption of Data Content Encryption Logic (110) of the production subsystem (104)], responsive to the production key input (240), to provide an output of unencrypted content (200). In a preferred embodiment, the unencrypted content (200) is stored in the recipient device on a temporary basis only, preferably in transient memory (e.g., volatile RAM), and pursuant to defined criteria, so as to further maintain maximum protection of the respective protected original content. The temporary nature of the decrypted content (200) is regulated by providing for maintaining the decrypted content in the unencrypted state, defined according to criteria such as only during permitted uses and/or only for a defined time period, and/or only during defined operations, etc.
  • Referring to FIG. 16B, an alternate embodiment of FIG. 16/a is illustrated, identical to FIG. 16, except for the addition that the selected encrypted content (120) is combined [via the Combining Logic 980) of the Production Subsystem (104)] with the encrypted production key (162) so as to provide a combined single output to provide to the consumer a respective specific recipient device (204) as a combined single file (81). On the consumer (recipient device) appliance side, the combined single file (81) is separated by Separation Logic (82) [of the respective specific recipient device (204] back into separate outputs of a respective encrypted content (copy) and a respective encrypted production key (copy) (240), which are then processed in the recipient device (204) [of the consumer], as discussed above with reference to FIG. 16A. The Content Decryption Logic (260) decrypts the encrypted production key (182) and then uses the decrypted production key (182) as a Decryption Input to Content Decryption Logic (210) to decrypt the respective encrypted content (copy) (210) so as to provide an output of respective corresponding unencrypted content (200). As illustrated in FIG. 16B, separate communications are not required, and only a single combined communication of one file is needed from the Production Subsystem (104) to the end user at the (consumer) recipient device (204).
  • In accordance with an additional embodiment, it is often the case that the Appliance ID of the customer is not initially known at the time of encrypting the selected original content, and another initial method of identifying a legitimate purchaser of the product must be provided. In one embodiment, with each product (of encrypted content), a serial number and password are provided. The consumer must supply a valid serial number, password, email and Appliance ID to obtain their authorization, referred to as a Document Key (also referred to as Appliance Key Appliance Authorization). This authorization is preferably sent by email, but can be handled via phone or fax or otherwise, preferably in a validated manner. The serial number and password can be combined, but separating them allows the serial number to be placed on the outside of a product package for tracking purposes, and permits the use of preprinted security labels (such as holograms) for the serial number.
  • In accordance with one embodiment, the encrypted content provides an encrypted secure format (ESF) file. The ESF file is created once and is not changed. For database management and control, a Document ID is created at the time of creation, which uniquely identifies this document. This allows the document to be referred to by the host (provider subsystem (104)) as well as provided between multiple ones of the consumer recipient devices (appliances) to identify a file uniquely, even if the user-friendly title (e.g., the name of a file) is changed. Because the file is only encrypted once and remains the same, the conversion (time-consuming part) is done only once and the files can be easily distributed on CD-ROM. However, for security, only by having an appropriate specific Document Key associated with a respective specific appliance [e.g., such as only that specific appliance can generate the respective Appliance ID used to create the encrypted Document ID, and only that respective specific appliance (or appliances) will be able to open or use the distributed files on the respective specific appliance(s)].
  • ESF production does not require knowledge about Encrypted Security Key (ESK), appliance authorization or Appliance IDs. ESF production requires the ESF file (ESF) and the Production Encryption Key, also referred to as a Production Key, or Encrypted Security Key (ESK) or an ESZ file (ESZ). If the Production System (104) is encrypting “singles”, that is stand-alone selected original content files, then a new production key can be specified each time.
  • Regarding encryption for singles there are multiple choices. For example, a custom encryption can be used that requires the user of the recipient device to have an Encrypted Security Key, and uses a generic encryption that allows any appliance running respective application software to open it (no production key is generated). Thus, without a production key, there are no appliance specific restrictions on control usage. However, both types of encryption (with and without Production Key) can provide for restricted control of usage rights, and can for example, regulate and have the print and export options selected, and can further provide that only respective application software (referred to as ESF programs) can read or otherwise use the protected documents. One reason to consider using the generic encryption, at least for some titles (especially public domain based), is that the cost of production (and to the consumer) is less, because there is no need for a Production Key. Obtaining the Production Key (and to a lesser extent the document key) requires more transactions on the purchase, so adds to the cost. Thus, generic encryption lowers the cost of goods sold. However, with generic encryption, the control of which specific recipient device appliance the protected content can run on is lost. However, many products find this acceptable (such as iTunes that live with this). The choice is again one of design tradeoffs.
  • In a preferred embodiment, for production, at the production subsystem (104), the production key can be specified as “fixed” to a predefined value (or values) when converting the generic option.
  • Usage rights control usage of respective associated protected content. There are many usage options. Each option can disable or enable (on applications that have this capability) the ability to Use a protected document (and how many times), such as printing, saving, exporting, etc.
  • The export option limits the types of export allowed. With one export option, a document can be exported, providing all its components use the same production key. For example, this allows someone to save his or her annotations with a respective protected document, but still requires the same document key (or Appliance ID or Appliance Key) to open it. If export is allowed, the document and the annotations can be exported. In an alternate embodiment, the document and annotations can be exported, but are first assigned another production key used to encrypt them. This technique can also be used to combine two or more documents into one.
  • Document attributes for and associated with selected original content can be set as desired. The title is usually included. More attributes can be specified and they are completely a design choice, and can be arbitrary. Common attributes for sheet music include composer, part, instrument, copyright notice, etc. One can specify as many attributes as wanted. In one embodiment, a fixed predefined number is provided for, such that, for example, any 5 attributes can be specified. And these attributes can be different on each document, although it will in general be desirable to standardize. Alternatively, any number of attributes can be specified.
  • Bookmarks can be selectively set during the encryption conversion process. For example, an ActiveX component can support this using description/page numbers information in a database. For further examples of Bookmarking, reference is made to U.S. Pat. Nos. 7,074,999 and 7,098,392 (assigned to the same Assignee as the present application), and is incorporated herein by reference.
  • Basic Production Workflow begins by specifying where on the system the original control file (text, PDF, or other image file program code file, etc.) to be converted is located. The file name of the output (ESF) file and a temporary directory for intermediate files (can be the same as the output ESF directory) must also be specified. There are a number of settings that control the conversion process. These include, for example, selecting production key, single/group, generic/custom, usage rights, etc.
  • An important setting is usage rights and the production key when set to control the use of the ESF file on particular appliances. The control logic will generate a random new key. The generated production key is also available AFTER the conversion process. If converting several files provided in a collection that is sold as a package, then one can use that same production key for the remaining files in the collection after the key is generated for the first one processed.
  • Thus, in summary, the basic operations of production side [of the Production Subsystem (102)] for providing encrypted content are:
      • Select the original content to be protected.
      • Save the file (original content) on the system or identify where it is stored.
      • Set the conversion parameters including the production key (or request a new one to be created).
      • Start the conversion.
      • Retrieve the production key if you requested a new one.
      • Move the ESF file (encrypted) to where ever you want to save it.
      • Move the ESZ file (production key) to wherever you want to save it.
      • Remove the original file if it isn't in a permanent location.
      • The conversion generator then cleans up after itself.
  • ESZ (Production Key) files are only created when the system is using a custom production key. This file is for internal purposes only, should be kept confidential and should not be sent to the customer. Customers only receive encrypted production keys or encrypted document keys (that are in part comprised of a production key).
  • In summary, the overall Production Workflow operations are:
      • Obtain the production key file (ESZ) from ESF Workflow.
      • Run the Encryption program (e.g., eSEncrypt program) on the original content (e.g., text, image, PDF files) to be encrypted (creates encrypted ESE files).
      • Move the ESE files to wherever you want to save them.
  • Next, Consumer Key Generation is provided.
      • The consumer identifies himself (serial number, password, registered email, etc.). This step is optional, but desirable for accounting and other purposes.
      • The consumer's appliance provides the Appliance ID associated with the consumer (or, if already previously and on the host system, requested, is retrieved from the ESF database). The Appliance ID is generated by application software running (executing) on the specific recipient device appliance from internal appliance data therein.
      • The Appliance ID and Production Key for the respective selected document are used to create a Document Key (Decryption Key) which is stored in a file. For example, the Appliance ID can be used to encrypt the respective production key (with or without use of a password), to provide the document key.
      • The Document Key file is sent to the consumer via the (registered) email, or otherwise.
      • The consumer saves the Document Key file in the appropriate directory where it can be used to validate the document for that appliance. Alternatively, the document key information is manually entered into the application by the consumer. Thereafter, the consumer's specific appliance utilizes the document key to decrypt the encrypted Production Key so as to permit decryption and access and use of the respective encrypted content.
  • FIG. 17 illustrates the data storage structure and components therein, for the encrypted secure format (ESF) for protected content and associated encrypted production key (ESZ) as illustrated and discussed elsewhere herein.
  • FIG. 17 illustrates the data structure and component layering for the ESF protected content data file format (500) and the associated production file structure encryption key (ESZ) (510). The ESF file format (500) is comprised of multiple components (501, 502, 503, 504, 505). The components as illustrated can be interchangeably comprised of multiple individual and mutually exclusive file components, each being separately selectively encrypted and/or compressed independent of the others, and all components together as an ESF file (500) being encrypted with the same respective production key (ESZ) (510). Preferably, as illustrated in FIG. 17, one of the component layers (505 as illustrated), includes an ESF ID (or Document ID), and can also include other data such as a production key ID, other unique ID, time of day, date, user ID, etc. Additionally, one of the component layers preferably includes mapping data information relating to the contents of the ESF data file structure (500), and identifying the individual components within that specific file 500.
  • The ESF data file structure (500) is comprised of multiple components. On such component is an ENC component representing the encrypted protected content (such as any one or more of an image or other text, application program code, etc.), which can be any content component, such as element (501) of the data word structure (500). The ESF data file structure can also include a component of data file structure for annotations or other overlay information that can be provided as associated with the encrypted content.
  • In a preferred embodiment, a part of each component is a descriptor of the component for that respective component (i.e., what that component is, whether the component is encrypted or not, whether the respective component is compressed or not, and any other unique IDs or descriptors).
  • Associated with each ESF file (500) is a respective specific related production encryption key (ESZ), which contains the encrypted production key utilized to encrypt the ESF file (500) components (at least those that are to be encrypted). The production encryption key (510) further optionally contains additional data such as an ESF ID, an ESZ ID, and associated mapping or index data for associating the production key to one or more specific ESF files (500).
  • This additional data, and/or associated mapping feature can be especially useful where an entire grouping of file components is placed on a single storage medium such as a CD-ROM for mass distribution. Thereafter, the specific associated production encryption key that was utilized for encrypting of content for one or more specific CD-ROMs can be easily located, associated with and ultimately communicated to and utilized by the recipient device user having that CD-ROM. One encrypted (ESF) file (500) can contain multiple components (sub-files) which each have a unique name within this ESF file, wherein each component can be selectively encrypted and/or compressed on an individual basis, mutually exclusive of the other components of the respective ESF file. In a preferred embodiment, one component is selected original content to be protected, and, where present, another component defines usage rights (such as with tickets). These are both examples of types of components that should always be encrypted. Other components can be encrypted or not, depending on intended permitted uses to be allowed at a recipient device (or devices). Generally, if a component is associated with a usage rights ticket or is otherwise to have its usage restricted, then that component must be encrypted. Usage rights tickets can be associated with any type of encrypted content (component), to provide for usage regulation of the respective decrypted content (or any usable feature or function thereof) on respective recipient devices (appliances). In a preferred embodiment, only the trusted provider's production system can create and assign usage rights (tickets). In an alternate embodiment, the user's recipient device is further comprised of a local means for ticket generation and encryption logic to permit encryption of locally stored content. Restricted usage rights are added to at the recipient device to otherwise permitted usages for the respective locally stored content. In another alternate embodiment, the recipient device can add usage restriction to content but only as to permitted usages not already restricted by a usage rights ticket.
  • In general, when a modification is made to a usage rights (ticket) restriction on usage and is after-added to protected content, that content must already be encrypted with usage restrictions that are more restricted than the to be granted ticket will permit. Thereafter, the production system (trusted provider) (or authorized recipient device, in one embodiment) can provide a ticket that can be used after the fact, [that is, after the encrypted content is already out of control of the trusted provider's production system (e.g., on a recipient device)] to grant additional rights which were originally restricted as part of the respective content original encryption.
  • In an alternative embodiment, one of the components of the ESF file structure (500) of FIG. 17 is the respective encrypted production key which is itself the data content that is the file content for that component.
  • FIG. 18 illustrates a flow chart and state flow diagram for production system encryption of selected content for a specific recipient device.
  • As illustrated in FIG. 18, to start (520), specific original content (522) is selected as selected original content (523), from the original content. The selected original content (523) is coupled as a data input to encryption logic (524) (providing an encryption engine) encrypted responsive to a selected generated encrypted production key (533) output from the production encryption key generator subsystem (532). Responsive to a request (from the production subsystem) to have selected original content encrypted (530), the production encryption key generation logic (532) begins (530), to provide a selected production key (533) coupled as a Key Input for encryption logic (524) which responsive thereto provides an output of encrypted content [EC] (525). Furthermore, the production key (533) is coupled as data. Input to encryption logic (534) which provides for encryption of the respective production key (533) responsive to an Appliance ID (542) [coupled from a previously stored Appliance ID as originally received from a recipient device user (or otherwise from storage), or coupled from and related to the respective Appliance ID originally generated at the recipient device (541). The encryption logic (534) provides an output of an encrypted production key [EPK] (535), which is specifically encrypted for decryption by only the respective appliance that originally generated the appliance ID (542). The encrypted content (525) is stored (526) for or within the production system (104), and the production processing of the encrypted content is complete (527). Further, the encrypted production key is stored for or within the production system 104 (536) and the encryption of the production key [EPK] (537) is complete. Thereafter, the encrypted content [EC] and respective encrypted production are provided to a recipient device. To use the encrypted content [EC], the respective recipient device 204 must then locally internally generate the corresponding Appliance ID, and utilizing associated application software running on the recipient device, decrypts the respective encrypted production key [EPK] responsive to the Appliance ID as locally generated within that respective recipient device. The recipient device 204 then utilizes the decrypted encrypted production key to decrypt the encrypted content. The protected encrypted content is thus made appliance specific, without requiring the recipient device to be connected to a server for authentication.
  • FIG. 19 shows a flow chart and state flow and partial block diagram illustrating the decryption of the encrypted production key utilized to decrypt the encrypted content in the recipient device to provide a decrypted content output.
  • As illustrated in FIG. 19, the encrypted content [EC] (550) is input to the recipient device (527) to provide the encrypted content input [EC] (550) as a data input to decryption logic (engine) (552) in the recipient device 204. Additionally, the encrypted production key [EPK] (56) output (537) is provided to the recipient device 204, and as a data input to production key decryption logic (engine) as an input (537) encrypted production content (562) within the recipient device 204. Additionally, (at 570), the recipient device 204 generates (or otherwise provides) appliance data and utilizes the appliance data to uniquely identify the specific particular recipient device 204 via logic (572). That provides for generation of an Appliance ID (573) responsive to the unique identification (574) for the specific recipient device 204, so as to provide an output of a generated appliance ID (573) which is coupled to and stored in a memory (575) of the recipient device 204. The Appliance ID generated by the logic (572) for generating the Appliance ID output (526) is coupled as a Decryption Key Input to decryption logic (engine) (562). The encrypted production key (563) is provided as a decryption key input to production key input to the decryption logic (engine) (562). Responsive to the Appliance ID (526) as a decryption key, the decryption engine (562) decrypts the encrypted production key (560) to provide an output of a decrypted production key (563), which is temporarily stored (564) in the memory of the recipient device 204. The decrypted production key (565) is provided as an output, which is coupled as a Decryption Key Input to decryption logic (engine) (552). The encrypted content (550) is coupled as a Data Input to the content decryption logic (engine) (552). The protected content decryption engine (552) provides for decryption of the encrypted content [EC] (550) responsive to the decryption key of the decrypted production key [DPK] (565). The decryption content logic (552) provides an output of decrypted content [DC] (553) which is stored as stored decrypted content (554) in the memory of the recipient device 204.
  • In a preferred embodiment, all the decrypted content [DC] (554), the associated decrypted production key [DPK] 564, and the associated generated Appliance ID, and appliance data utilized therein, are only stored temporarily within the recipient device memory, and only in the transient read-write memory, and preferably not written to a hard drive or non-volatile memory in an unencrypted form. This is to maintain optimal security for the decrypted content that has been decrypted from the encrypted content for the specific appliance's use only of the specific particular recipient device 204 (the one that generated the respective Appliance ID 526). At this point (556), the recipient device 204 utilizing application software, provides for selectively regulated controlled use of the decrypted content [DC] by the recipient device [204] strictly, in accordance with the permitted usage rights allowed in accordance with the usage rights as defined by authorized associated application software of the specific recipient device 204 (and on the associated rights for the respective decrypted content [DK], regulating permitted usage for the encrypted content.
  • In one embodiment, there is a default set of permitted usage rights which are automatically utilized by the authorized application software, in the absence of any separate associated usage rights ticket. Those default usage rights can be set according to the wishes of the provider 104, (ranging from very restricted, such as view only, or limited to a certain defined number of viewings, or printings). Alternatively, the default set of usage rights can be fully enabled, unrestricted, wide open with all usages permitted, or anywhere in between. Again, it is a matter of design choice. In a preferred embodiment, regulation of usages of protected content are provided at multiple levels and is flexible and able to support distribution of and usage of various different types of content are always more restricted. For maximum protection default usage rights on highly protected content are restricted in accordance with an associated ticket (associated with the decrypted content [DC]). In a regulated selected respective embodiment, default usage rights are superceded and, as discussed elsewhere herein.
  • FIG. 20 is a flow chart and state flow and block diagram illustrating the responses within the specific authorized recipient device 204, to a request for usage of protected content, and the termination of what rights are authorized, and the selective authorized utilization of respective decrypted content [DC], for selectively providing for one (or more) regulated uses of printing (606), exporting (616), or viewing (626), or otherwise usage of at least a portion of the decrypted content [DC], in accordance with selectively regulated usage rights (604), or in accordance with a permission usage rights ticket associated with respective specific decrypted content [DC], or in accordance with embedded usage rights in the encrypted content, or in accordance with predefined default usage rights defined by the associated application software on the recipient device (as per selected design standards and where applicable, user selection of preferences). Again, the selections are available, and are a design choice.
  • Referring to FIG. 20, the output of the decrypted content [DC] (600) (as shown in FIG. 19) are provided as an input (5566) to the recipient device 204 and is coupled to control logic (602), providing for control of use of the respective decrypted content [DC]. Responsive to the usage rights permissions for the respective decrypted content [DC] (600), the control logic (602) selectively provides regulated usage for one of a plurality of options (604), responsive to the associated usage rights for the respective decrypted content [DC] (600). As illustrated in FIG. 20, each of a plurality of options can be selectively regulated for a defined number of uses (e.g., zero, one to unlimited usage), for any one or more of a plurality of options, such as printing of at least one copy of at least a portion of the decrypted content (606), exporting of at least a portion of the decrypted content (616), and/or providing for a video presentation of at least a portion of the decrypted content on a local video display (626) of the recipient device 204. The associated usage rights can be set up for a restricted number of allowed usages, (such as for printing or exporting or running of an application, or number of times of viewing of an application), or for a limited defined time, or limited permission, or enablement of feature set or version of a product (e.g., Lite, Medium, Deluxe, Professional) or otherwise. These usage rights can be provided for by storage of additional information such as an associated encrypted ticket or as embedded usage rights within encrypted content, or otherwise, etc.). As discussed herein, these usage rights are related to permitted usage rights (such as a permitted number of copies allowed, or to be printed or viewed, or applications to be run and executed. [See also discussion with respect to FIG. 23 and FIG. 26 (and elsewhere herein).]
  • Referring to FIG. 21, encrypted content [EC] is output (527) (such as from FIG. 18), providing an input of encrypted content (528) provided to the recipient device 204 which provides for selectively storing (630) the encrypted content [EC] (528) within the recipient device 204. An encrypted production key [EPK] is coupled (537) as an input to the recipient device 204, and is also stored (630) within the recipient device 204. The encrypted content [EC] (528) and associated encrypted production key [EPK] (538) are stored (630) in the recipient device (204) on non-volatile storage within the recipient device 204 (such as on magnetic hard disk, optical storage such as CD-ROM and DVD, FLASHRAM, EPROM, or other non-volatile storage), internal to or coupled to the recipient device 204. Alternatively, the coupling provided from the production subsystem (537) (of FIG. 18), provides the necessary encrypted content and the associated encrypted production key, either separately or combined as appropriate, such as via one or more of CD-ROM, on-line download, or otherwise to a specific recipient device 204.
  • There are many alternatives for distribution to choose from. For example, the encrypted content could be provided on a CD-ROM, and the recipient device (user) receives the password via email. Alternatively, the encrypted content [EC] and associated encrypted production key [EPK] can be downloaded in one transaction on-line to the recipient device 204 (or other computer), and even encrypted to be appliance specific. In a preferred embodiment, the encrypted content [EC] and the encrypted production key [EPK] are additionally stored at a backup device as well (such as at a server of the trusted provider production system), to provide for accounting verification as well as for backup and to provide services such as lost file replacement services. The backup encrypted content and backup encrypted production key as relate to materials provided (via CD-ROM or otherwise, such as via on-line download from a production subsystem or system) to the specific recipient device (204) can be backed up for a defined time (from forever, to only a defined limited time only, such as 30 or 60 days, to prevent from clogging the storage of the server).
  • FIG. 22 is a flow chart and state flow diagram, illustrating the production system ticket generation subsystem (640), providing a source of usage rights (642), selected original content (523) from stored original content (522), and an associated production encryption key (533) provided by the production system (532), and coupled as an encryption key input to content encryption logic (engine) (642), which uses the production encryption key (533) to generate an output of encrypted content [EC] with an associated encrypted ticket [ET], either embedded or separate, for regulating usage rights. The production system further provides for encryption (534) of the production encryption key (533). In a preferred embodiment, this encryption is responsive to an Appliance ID (543) generated at a respective specific recipient device, in order to provide an encrypted production key [EPK] (535) which can only be utilized only at the specific recipient device that is associated with (and can regenerate) the generated appliance ID.
  • FIG. 22 illustrates the methodology and state flow and block diagram for the provision (such as to a recipient device) of encrypted content with an associated encrypted ticket defining usage rights permissions. The production system provides for an output of a permission usage rights ticket (643) defining permitted usage rights (642). A specific definition is provided of permitted usage rights for a ticket associated with specific encrypted content (643). The usage rights ticket is provided as an input to encryption logic (engine) (642). Application software provides control logic in the production system (104), and provides for selection from the source of usage rights (642) of permitted usage rights permissions associated with a respective specific file or files of selected original content to be protected, and is provided as respective selected content (523) output from original content storage (522) which contains original content from which selected content to be protected is selected and output responsive to the control logic. The selected original content (523) is provided as an additional input to be encrypted to the encryption logic (engine) (642). In an alternative embodiment, a second encryption engine (642B) (analogous to and operating in parallel with the encryption engine (642), separately provides for independent processing and separately outputting the permitted usage rights ticket (643).
  • The (generated or otherwise produced) production encryption key (533) (see, for example, FIG. 18) is provided or otherwise selected (532) to provide a production encryption key output (533), which is coupled as an encryption key input to the encryption logic (engine) (642). The encryption logic (engine) (642) provides for encryption of selected original content (523) along with the respective associated usage rights ticket (643), to provide an output of a file of an encrypted content with associated encrypted usage rights (643), which is thereafter stored in the production system (104) as encrypted content with an associated ticket for regulating usage rights (644).
  • Alternatively, a separate, but related processing is required next for securely delivering a production encryption key that was used for a specific associated encrypted content to a separate recipient device appliance. In a preferred embodiment, an encrypted production encryption key is delivered to a designated particular recipient device to enable that designated particular recipient device, and only that particular recipient device, to utilize the respective encrypted production encryption key to decrypt the encrypted content and associated encrypted usage rights ticket at the specific particular local recipient device. As illustrated in FIG. 22, ((540), analogous to FIG. 18) the production system 104 at the trusted provider, receives (or already has stored) (542) an Appliance ID (543) originally generated at a particular specific recipient device. This generated Appliance ID is uniquely associated with that specific particular recipient device, and can be used both initially and thereafter) to uniquely encrypt any respective production encryption key for selected content. The production system utilizes the specific Appliance ID (543) for appliance specific transactions relating to specific associated selected content, for encrypting specific production encryption key(s) associated with encryption of respective specific associated designated selected original content, to be provided for the respective associated specific particular recipient device. The production system 104 can encrypt the production encryption key, either at the time of encrypting the selected original content or at a later time subsequent to completion (646) of encrypting of the content and associated ticket. The production system 104 provides for generation (535) and storage (536) of the encrypted production key.
  • The Appliance ID generated at the recipient device (542) is provided as an appliance ID signal (543) coupled to the encryption logic (engine) (534) as an Encryption Key input. The Production Encryption Key (533) is coupled to the input of the encryption logic (engine) (534). Responsive to the Appliance ID as an Encryption Key, the encryption logic (engine) (534) encrypts the Production Encryption Key (533) and provides for an output of an Encrypted Production Key [EPK] (535). The Encrypted Production Key [EPK] (535) is stored (536) and the generation and storage of the specific particular appliance related encrypted production key is completed (537). Thereafter, the production system 104 provides the Encrypted Production Key [EPK] (535) to the user of the recipient device (e.g., via email, mail, phone call, or otherwise), or directly to the specific particular recipient device 204. Thereafter, as illustrated in FIG. 23, the specific particular recipient device 204 decrypts the Encrypted Production Key [EPK] (655) responsive to regeneration of the Appliance ID internally within the particular recipient device 204, which is then utilized as a decryption key input to production key decryption logic to decrypt the Encrypted Production Key [EPK] to provide a Decrypted Production Encryption Key [DPK]. The Decrypted Production Encryption Key [DPK] (658) is utilized by content decryption logic (engine) (664) to decrypt the encrypted content (662) and to decrypt the associated encrypted ticket to define usage rights. The recipient device thereafter utilizes the decrypted content specifically regulated in accordance with the usage rights.
  • FIG. 23 is a detailed system block diagram combined with a flow chart and state flow and block diagram, illustrating the utilization at the recipient device 204 of encrypted content [EC] (661) with an associated ticket [TICKET] and of an associated encrypted production key [EPK] (655), to provide decrypted content [DC] (666) and a decrypted ticket [DTKT] (668), utilizing a decrypted production key [DPK] (658) generated internally within the respective recipient device 204. The encrypted production encryption key [EPK] (655) is decrypted by the production key decryption logic (656) utilizing the associated Appliance ID (655) generated (652) and stored (654) and provided to be utilized within the respective recipient device 204. Additionally, usage rights are stored within a local memory of the respective recipient device. Usage rights can be defined by the authorized application software on the recipient device, as per default values, or to the extent present, which are superceded by usage rights regulated by the associated ticket for respective content. Usage rights regulate usage of associated content, such as the number of copies allowed to be used (e.g., printed) and provide for tracking and storing a number of copies already used (that is actual usage), and provides for storage of usage rights data (within the respective recipient device storage) in an encrypted format. However, the storage is regulated to provide for temporary storage [only during utilization] of decrypted content and decrypted key (676) [and decrypted ticket (675)], providing an output of permitted usages for the recipient device as to the respective content.
  • As illustrated in FIG. 23, the encrypted content [EC] with ticket [TICKET] (e.g., such as in FIG. 22) is provided as an input (646) to the recipient device 204, of the encrypted content [EC] with associated ticket [TICKET] (661), which is stored (662) in the recipient device 204. The encrypted content [EC] with ticket [TICKET] is provided as an input (either one input (where the encrypted content and associated encrypted ticket are combined as one) or as independent separate inputs) to content decryption logic (engine) (664). A specific respective encrypted production key is provided from the production system (see for example (537) of FIG. 18). This specific encrypted production key [EPK] is provided as an input (650) to the recipient device 204 which provides the encrypted production key signal (655) as an input to the production key decryption logic (656). The recipient device 204 provides an internally generated Appliance ID (655) which (1) is provided to the production system 104 to provide appliance specific encryption; and (2) is utilized within the recipient device 204, such as decrypting of a respective production encryption key (655) [associated with respective selected encrypted content] to decrypt the encrypted production key [EPK] (655). Appliance ID generation logic (653) (such as via authorized (licensed/validated) application software (653) (running on a computing system within the recipient device 204), provides for generation (652) of an Appliance ID (see, for example, FIG. 10 (652)). The generated Appliance ID [GAID] is stored (654) within memory (preferably temporarily as described elsewhere herein) in the recipient device 204. The Appliance ID (655) is coupled as a Decryption Key input to production key decryption logic (656). The production key decryption logic (656) provides for decryption of the encrypted production key (655) [coupled as a Data Input to the production key decryption logic (656)], responsive to the Appliance ID (653) [at the decryption key input], to provide for generation of a decrypted production key [DPK] (657) which is temporarily stored (670) in local memory of the recipient device 204 and is also provided (658) as a Decryption Key Input of content decryption logic (engine) (664). The content decryption logic (664) provides for decrypting the encrypted content [EC] and the associated encrypted ticket [TICKET] (661), responsive to the decrypted production key output [DPK] (658) and (670) provided from the temporary storage (670). Responsive to the decrypted production key [DPK] (658), the content decryption logic (664) decrypts the encrypted content [EC] and provides for temporary storage of the decrypted content [DC] (666) and further provides for decrypting of the encrypted ticket to provide an associated decrypted ticket [DTKT], and storage (preferably, temporarily) of the associated decrypted ticket (668). [Both the decrypted ticket and associated decrypted content are preferably stored only temporarily, and only in transient memory (RAM), so as to maximize security of the system, and eliminate access to any decrypted secure components.] This provides an additional level of protection, implemented in order to provide for selective restricted control of usage and management of respective protected encrypted content, by the recipient device.
  • As illustrated in FIG. 23, the decrypted ticket (668) and decrypted content (666) provide for outputs coupling to a non-volatile area and volatile area of recipient device storage (670). Certain file parts are stored only encrypted, and if stored at all decrypted, are only temporarily stored and only in non-permanent (e.g., RAM) memory. As illustrated in FIG. 23, the temporary decrypted content, decrypted production key and decrypted ticket are temporarily stored in storage of (676) of the recipient device 204. Additional storage of usage rights (672) is also provided such as storing the number of copies allowed to be printed or number of uses allowed of execution or viewing, or other number of allowed uses (673), and additionally, storage actual number of usages or copies printed, viewed, saved, exported, etc. (674). Additionally, temporary storage is provided for the decrypted ticket and usage rights permissions, for defining logic to be utilized in granting permitted usages (678). Responsive to the temporary decrypted ticket (675), and the defined number of copies allowed to be printed [(673) and (674)], and responsive to the temporary decrypted content (676), the application software (running on the computing system of the recipient device 204) utilizes the stored usage rights (672) content [(673), (674), and optionally (675)] to (1) provide for control and regulation of permitted usages of respective associated temporary decrypted content (676) and (2) provides a permitted usage rights output (677) controlling permitted usages for regulating usage of the respective associated decrypted content (676), as well as (3) providing the decrypted content (676) as needed with the recipient device 204 so to permit to provide for the permitted usage. Responsive thereto, the application software of the recipient device 204 permits and provides for the permitted usages of the associated content on the respective recipient device 204.
  • FIG. 24 is a flow chart and state flow and block diagram illustrating the control for of decrypted content [DC] (680) within a respective recipient device, responsive to a decrypted ticket [DC] (682) as provided from within the respective recipient device 204 (see, for example, [DC] and [DTKT] of FIG. 23), to selectively provide for regulated usage of one of exporting (696), printing (697), executing of a file as an application program (698), or viewing of a video presentation (699), for at least a portion of (or all of) the decrypted content [DC] (680) responsive to the usage rights permitted by the decrypted ticket [DT] (682).
  • As illustrated in FIG. 24, to begin the regulated usage, responsive to a request in the recipient device 204 for usage, the recipient device 204 must retrieve (667) the selected decrypted content [DC] (681) output [such as output in FIG. 23 (669)]. The decrypted content is locally stored (680) in the recipient device. The usage of the decrypted content [DC] (681) is regulated by the recipient device 204, in accordance with the respective associated stored usage rights [DI] (682) in memory [DTKT] (668) (as illustrated in FIG. 23), and provides logic (684) [such as in the application software of the recipient device 204], responsive to the decrypted ticket output (663) as stored temporarily locally (682) in the respective recipient device 204. The decrypted ticket output [DT] (683) is decoded by decision and regulation logic (684). Responsive to the decrypted ticket [DT] (683), the decision logic (684) selectively provides for one of a plurality of defined options (685) for utilization of the decrypted content (681). Responsive to a user request or selection, or other authorized usage of the recipient device (such as automatically providing for viewing of certain content, or in accordance with permissions set during initial setup, or otherwise), the recipient device provides logic selectively providing for one of a plurality of options (685) such as for selecting of exporting (696) of at least a portion of the decrypted content (681) from the recipient device. Alternatively, the selection of a usage option (685) can provide for selection providing for printing (687) of at least one copy of at least a portion of the decrypted content (697). Alternatively, the selection of options (685) can provide for selection of executing as an application program (698) for at least a portion of the decrypted content (681). Alternatively, the selection logic (685) can provide for selective viewing (699) of a video presentation for the decrypted content [DC] (681) (or for a portion of the decrypted content). The examples of the five options are illustrated, and are not meant to be limiting. Many other options, including a smaller or larger set, or different set of options can be provided.
  • FIG. 25 illustrates an alternate embodiment, showing a flow chart, block diagram, and state flow and data flow, for processing in the recipient device 204 of decrypted original content (741) which itself is representative of a ticket defining usage rights for an associated data file (743). The recipient device 204 is responsive to a usage request for use of the associated data (743), and regulates the usage of the associated data file (743) to the respective defined rights for usage as granted by the permission of the ticket (747) (the original content), to provide for regulated permitted usage within the respective recipient device of the associated data file (743), such as printing, viewing, exporting, saving, or execution of an application program, represented by the associated data file (743).
  • As illustrated in FIG. 25, (730), the original content (740) is a usage rights permission ticket, which is provided as an input to usage logic (744). An associated data file (742) is provided (743) to usage regulation logic (744). Responsive to a usage request (745), such as by the user of a recipient device (or by the recipient device via application software initial request), the logic (744) regulates usage rights of the associated date file (743) in accordance with the respective defined usage rights of the original content (ticket) (741) to provide a usage regulation output (747) for regulating permitted usage of the associated data file (743). The regulated permitted usage of the associated data file is provided for in the recipient device responsive to the application software executing the logic (744) [and responsive to the ticket (741)] to regulate usage of the respective associated data file (743) [in accordance with the usage rights of the ticket (741)].
  • The original content [(740), (741)], in another embodiment, can be any one or more of textual data, image data, audio-wave form data, video data, MIDI data, game data, business data, other data content, and application program code. Any of these types of original content can further have a respective associated ticket for regulating usage rights defining permitted uses for the respective type of associated original content.
  • As illustrated in FIG. 25, the original content is itself a ticket for regulating usage rights defining permitted uses for an associated respective data file. The associated respective data file can be (but does not need to be) provided with the respective original content, and can either be provided with it, or separately and at a separate time. As discussed elsewhere herein, protected original content is encrypted by the production system 104 and selectively decrypted by the recipient device system 204. The associated data file is also encrypted by the production system 104 and selectively decrypted by the recipient device system 204. Once decrypted within the recipient device system 204, the decrypted original content output (741) and the decrypted associated data file output (743) are utilized within the recipient device 204 by logic (744), to provide for selective regulation of usage of the respective associated data file (743) to provide only the permitted usage of the associated data file (743), such as in accordance with the usage request (745) [from the user, or responsive to operation of the recipient device system 204, itself]. When, as illustrated in FIG. 25, the original content (741) is a ticket for regulating usage rights defining permitted uses for an associated respective data file (743), then the associated respective data file (743) can be comprised of one or more of textual data, image data, audio-wave form data, MIDI data, video data, game data, business data, other data content, and application program code (for which the usage rights define allowed uses, and/or permitted conditions of use (e.g., number of times, time of day, number of elapsed days, etc.), and/or permitted features to be used).
  • FIG. 26 illustrates a flow chart and state flow and block diagram corresponding in part to the combined output systems of FIGS. 2 and 4, wherein encrypted content [EC] (753) and an encrypted production key (EPK] (763) are combined (754) to provide a combined encrypted output [CEO] (755) which is provided as a combined output (756) to a recipient device 204, wherein the recipient device 204 receives the combined encrypted output (757), and separates (770) the combined content into separate ones of an encrypted content copy file [ECC] (771) and an encrypted production key copy file [EPKC] (772), which are then separately decrypted [(774), (773), respectively] in the recipient device 204 to provide via decryption logic (773) a decrypted encrypted production key [DEPK (779)] which is then utilized to decrypt via decryption logic (774) the encrypted content (771) to provide decrypted content (778) (the unencrypted content).
  • FIG. 26 illustrates the state flow, data flow, block diagram, and system element interaction for the combined system output (analogous to as illustrated in FIGS. 2 and 4). The production system 104 provides (750) for the providing of encrypted content (752) (as described elsewhere herein), to provide an encrypted content output (753). The production system provides (760) for generating (or otherwise providing) an encrypted production key (762), (in any of the manners as discussed elsewhere herein), providing for output of an encrypted production key output (763). The encrypted content output [EC] (753) and encrypted production key [EPK] (763) are combined by combing logic (754) to provide a combined output [CO] (755) which is provided (756) by the production system 104 as a combined encrypted output (CEO) (755) to the recipient device 204. This combined encrypted output [CEO] (756) can be provided to the respective recipient device 204 in a number of ways, as discussed elsewhere herein, ranging from an email, regular mail, on a CD-ROM, or distributed in any other manner. The recipient device 204 provides means for receiving (757) the combined encrypted output (756) received from the production system 104 (via any means), and provides separation logic (770) for separating the combined content [CO] to provide for separating the encrypted content from the encrypted production key to provide an output of an encrypted content copy (771) to storage within the recipient device 204. The encrypted content (771) is provided as an input to decryption logic (744). The separation logic (770) provides the encrypted production key [EPK] (772) to decryption logic (engine) (773) to provide for decryption of the encrypted production key [EPK] responsive to the internally generated (775) Appliance ID (765) from within the recipient device 204 to provide the generated Appliance ID (765) as a Decryption Key Input to the production key decryption logic (engine) (773). The decryption logic engine (773) provides for decryption of the encrypted production key copy [EPK] (772) provided as an input to the production key decryption logic (773). Responsive to the generated Appliance ID (773) as a Decryption Key Input, the production decryption logic (773) provides for an output of a decrypted production key [DPK] (779), which is coupled as a Decryption Key Input to content decryption logic (774). The content decryption logic (engine) (774) provides for decrypting of the encrypted content (771) (as coupled to the Data Input of the content decryption logic (774) to provide for an output of decrypted content (unencrypted content) (UC) (778) [which is preferably only temporarily stored, as discussed elsewhere herein]. The production system 104 provides for combining the encrypted content [EC] (153) and the encrypted production key [EPK] (763) to generate a single combined encrypted output [CEO] (755). The production system 104 then provides the combined encrypted output [CEO] (755) which coupled (756) from the production system 104 to the recipient device. The recipient device 204 provides for separating (770) the received combined encrypted output [CEO] (757) (at the recipient device) into an encrypted content copy (771) and encrypted production key copy (772). The recipient device then provides for decrypting the encrypted production key copy [EPKC] (772) with the production key decryption logic (774) within the recipient device, to provide a decrypted production key [DPK] (779). In a preferred embodiment, the decryption of the encrypted production key [EPK] (772) is explicitly appliance specific [only usable on a particular specific recipient device 204] by initially encrypting the respective encryption production key at the production system, responsive to an Appliance ID [coupled to the production system 104] internally generated from the particular recipient device specific appliance.
  • In an alternate preferred embodiment, a separate unique ID [not an Appliance ID generated from a recipient device] is provided to the production system and is utilized as an encryption key utilized for encrypting of respective associated content, and to create a respective associated encrypted production key, and the internally generating an Appliance ID (775) and (765) is not required in this alternative preferred embodiment.
  • In all of these embodiments, the encrypted production key [EPK] is decrypted at the recipient device to provide the decrypted production key [DPK], and utilizes the decrypted production key [DPK], to decrypt the encrypted content [EC] at the recipient device (responsive to the decrypted production key) to provide for unencrypted content [UC] corresponding to the original encrypted content for usage in accordance with permitted usages rights at a respective recipient device.
  • FIG. 27 illustrates a flow chart and state flow diagram and block diagram for a production system providing not only for the encryption of selected original content (783) with a production encryption key (793) but also encryption of the respective production encryption key (793) responsive to an Appliance ID (803) from a specific recipient device appliance, to make it appliance specific (by encrypting responsive to an Appliance ID generated at the respective specific recipient device and utilized as an encryption key input so as to create a respective production key). Further, utilizing the same respective production key as an encryption key input, a usage rights permission ticket output (813) is also encrypted (814) to create a respective encrypted ticket (815). The usage rights ticket (813) is generated by ticket logic subsystem (812) to provide a ticket output (813) with defined rights for usage of the associated encrypted content [EC] (785). The generated ticket (813) is encrypted (814) (responsive to the same production encryption key [PEK] (793) utilized to encrypt the respective associated selected original content), to provide an encrypted ticket output [ET] (815) which defines the usage rights (usage rights permissions, ticket ID, etc.,) for the respective ticket associated with the respective encrypted content and respective encrypted production key, which are ultimately provided to a respective recipient device.
  • Referring to FIG. 27, there is illustrated the logic elements, system components, state flow and data flow, relating to the production system's generation of encrypted content, an associated encrypted production key, and further an associated encrypted ticket defining usage rights for the respective encrypted content. Original content is provided (780), either from storage of the production system trusted provider, or via coupling of content to the trusted provider by the content owner. In any event, selected original content (783) is provided (782) by the trusted provider production system to provide an output of selected original content (783). This can be done in accordance with a number of criteria, including responsive to manufacturing and marketing suggested guidelines of a company, to responding to a specific user's on-line transaction such as ordering content, to anything in between, or otherwise. In any event, selected original content (783) is provided as an output, coupled as an input to content encryption logic (engine) (784). The production system 104 provides (790) a production encryption key [PEK] (792), in any of the manners as discussed herein. An output of a production encryption key [PEK] (793) is provided, and coupled as an Encryption Key Input to the content encryption logic (784). The content encryption logic (784) then provides for encryption of the selected original content (783), responsive to the associated production encryption key [PEK] (793) [generated to be associated with and used for encryption of (and decryption of) the respective selected original content (783), (or otherwise selected to be associated)]. The content encryption logic (784) provides an output of encrypted content (785) to be stored at the production system (786). Additionally, the production encryption key (793) is coupled as a Data Input to production key encryption logic (794). Additionally (800), the production system 104 provides an Appliance ID (803) (that was generated (802) at a recipient device, or any other unique ID that can be used to activate a recipient device) and provides an output of an Appliance ID (803) coupled as an input, to the encryption Key Input of the production key encryption logic (794). The production key encryption logic (794) provides for encryption of the production encryption key [PEK] (793) responsive to the Encryption Key Input of the Appliance ID (803), to provide an output of an encrypted production key [EPK] (795). The encrypted production key [EPK] (795) is stored (796) in the production system 104 as an encrypted production key [EPK] and is associated with the stored respective encrypted content (786). Additionally (810), the production system 104 generates (812) a ticket output (813) with defined usage rights for the respective associated encrypted content [EC] (785). The ticket (813) defines usage rights, and optionally has a ticket identification, a document identification, a production key identification, associated date, time, etc. The ticket (813) can be structured for usage of the respective associated content in accordance with default usage rights, or according to specific defined usage rights of the specific ticket as specifically provided by the production system for specific explicit regulation of the associated specific encrypted content. The ticket output (813) is coupled as an input to ticket encryption logic (814). The ticket encryption logic (814) has the Appliance ID (803) coupled as an input to an Encryption Key Input of the ticket encryption logic (814). The ticket encryption logic (814) provides for encryption of the ticket (813), responsive to the Appliance ID (803), to provide an output of an encrypted ticket (815). The encrypted ticket (815) is stored (816) in the production system (104) as an encrypted ticket [ET] and is associated with the respective encrypted content [EC] and the respective associated encrypted production key [EPK].
  • Thus, the system and process provide for generating a ticket output associated with the respective encrypted content, where the ticket output provides for defining usage rights for regulating the usage of the respective encrypted content. The respective ticket output is then encrypted, responsive to the associated respective production encryption key [that is, the same production key used to generate the respective associated encrypted content, to provide an encrypted ticket output. The ticket output, as discussed herein, can be comprised of usage rights, ticket ID, and optionally or alternatively other components.
  • As illustrated and discussed with reference to FIG. 28, and elsewhere herein, the system and methodology of the present invention provide for validating the encrypted ticket output (which is provided to the recipient device), along with the encrypted production key and respective associated encrypted content. The recipient device 204 decrypts the encrypted ticket (provided from the production system 104), and provides for validating the decrypted ticket output on the recipient device 204, responsive to the ticket ID portion of the decrypted ticket output. Then, after validating the ticket output, the recipient device system 204 responds to the usage rights defined by the ticket output, for regulating the usage [on the recipient device 204] of the decrypted content (which is preferably only stored temporarily on the recipient device during its usage), to provide for selective and restricted usage (of the respective decrypted content) in accordance with the defined usage rights and the validating. Thus, there is provided, regulating of usage of one (or more) of viewing, saving, exporting, printing, and executing of application code of the decrypted content, on the recipient device 204, responsive to the defined usage rights and the validating.
  • FIG. 28 illustrates a flow chart, state flow and block diagram providing for additional security within the recipient device 204, by storing the decrypted ticket, at least in part, in a plurality of locations within local storage of the recipient device 204, to provide for multi-level verification capability and to increase security levels.
  • As illustrated in FIG. 28, for improved security, the decrypted ticket (823) is stored in a plurality of locations [A (831), B (832), C (833), D (834)] within the local storage (830) of the recipient device 204, and is then utilized by the recipient device 204 to ensure that no tampering has occurred to the decrypted ticket [DT] (823). As illustrated in FIG. 28, an encrypted ticket (823) is provided as an input to the recipient device 204, and is stored (820) within the recipient device 204. Control logic (822), within the recipient device, provides for additional storage of the encrypted ticket (824) into a plurality of separated memory locations in the storage (830) of the recipient device 204. All, or at least a part, of each of the multiple copies of the encrypted ticket is stored in each of a plurality of different locations A B C and D in the storage memory (830) of the recipient device. The storage memory (830) is preferably the non-volatile storage, such as a magnetic hard disk drive, optical storage (e.g., CD, DVD, other), or otherwise. The control logic (822) provides for the maintenance of the multiple copies of the respective encrypted ticket [ET] for usage rights, in the selected plurality of locations in the storage. This provides an additional level of protection against tampering. The control logic (824) provides a first output (831) to store at memory location A, an output 832 to store at memory location B, an output 833 to store at memory location C, and an output 834 to store at memory location D. More or less locations can be chosen as a design election choice. Thereafter, during validation of the ticket output, and regulation of usage responsive to the usage rights defined by the ticket, the control logic utilizes the multiple stored tickets. The respective stored ticket at each of the plurality of locations is examined, and responsive thereto, usage rights for the associated selected content are limited in accordance with results of the polling of the respective tickets at the multiple stored locations, and analysis of the respective stored tickets at the plurality of locations. In a preferred embodiment, after the polling, only the most restrictive usage rights of the polled tickets are observed [that is, the least permissive of the usage rights of the plurality of respective stored tickets], as a precaution against tampering by someone with any of the stored usage rights. However, if there is no tampering, all locations will confirm a same usage right.
  • FIG. 29 illustrates a flow chart, state flow and block diagram, illustrating within the recipient device 204, the altering (828) of the multiple stored values [A, B, C, D] for usage rights (of respective decrypted content) in the respective multiple locations of the storage (830) of the recipient device 204 [analogous to the storage as in FIG. 28]. The same locations can be re-utilized for the altered values, or new locations can be used.
  • The original content can have an associated ticket or be a ticket itself for an associated data file. In the illustrated embodiment of FIG. 29, an output of permitted usage rights (749) are provided to the recipient device 204, (see also as illustrated in FIG. 28), coupled to control logic (820) (within the recipient device 204) which provides (1) control for permitted usage of rights for the respective decrypted content [DC], and (2) monitors usage of rights of the respective content as per actual usage in accordance with the respective permitted usage rights. The actual usage of regulated usage rights (749) is provided as an input to the control logic (826) [responsive to the usage of respective associated rights of respective associated decrypted content], which provides logic for altering (828) of stored usage values [A, B, C, D], responsive to the regulated permitted actual usage for the protected content (such as the associated data file). The recipient device control logic (820) determines and maintains records of usage rights allowed and actual usage, (e.g., as discussed with reference to FIG. 28). In FIG. 29, the altered usage stored values (829) are updated to the locations [A, B, C, D] of the storage (830) [of the recipient device 204], to provide for modification of the values stored for both usage rights used, and for usage rights still left available, for the respective associated decrypted content. The modified usage rights are encrypted and stored as encrypted ticket usage rights, so as to maintain the integrity of the multi-location anti-tampering structure.
  • Many alternate options exist for selecting the multiple locations, including generating a pool of values, storing location values (encrypted) with the respective ticket and mapping to them, randomly generating location values, defining a table of locations to be utilized and mapped to, providing a defined set of locations, and updating and re-mapping locations on an adaptive basis over time, and/or any structure or methodology for securely assigning and mapping and keeping track of multiple ticket locations, [and (where utilized) any encryption keys or data needed]. Thus, after having stored the encrypted ticket at least in part in a plurality of locations within storage of the recipient device 204, the actual usage of rights of the decrypted content within the recipient device 204 results in the storing of altered values (as to actual usage) for the respective usage rights actually used in the respective plurality of locations.
  • FIG. 30 illustrates a flow chart, state flow and block diagram, illustrating the operation within the recipient device 204 to process and utilize an encrypted ticket (842), to provide for decrypting (844) of the encrypted ticket (843) [as illustrated elsewhere herein on an appliance specific basis], to provide decrypted ticket content (845) of the ticket and ticket ID [and as appropriate, other data for usage rights]. The recipient device 204 further provides for validation (848) of the decrypted usage rights ticket (846) (such as based on actual usage or verifying multiple respective stored tickets to validate usage rights), providing a validated usage rights signal (849) to provide an input to regulation logic (862) (such as executing authorized validated associated application software in the recipient device system), providing for regulated usage of the protected content. The recipient device, which regulates (862) the usage of the respective decrypted content [DC] (861), and provides for selectively regulated usage (864) (such as viewing, saving, exporting or printing), responsive to the validated (permitted) usage rights (849).
  • FIG. 30 further illustrates the provision of an additional associated encrypted ticket output (843) associated with respective encrypted content [EC] and a respective encrypted production key [EPK], (consistent with the discussion of figures provided herein). As illustrated in FIG. 30, (840), an encrypted ticket output (843) is provided (842) [such as the encrypted ticket output 816 provided from the production system (as illustrated in FIG. 27)]. The encrypted ticket output (843) is coupled from the production system 104 to the recipient device 204, and is stored in memory of the recipient device 204. The encrypted ticket (843) is coupled as a Data Input to ticket decryption logic (844), which provides for decryption of the encrypted ticket (843), responsive to an internally generated appliance ID (at 853) coupled as a Decryption Key Input (KEY) to the ticket decryption logic (844). The recipient device 204 internally generates (852) an Appliance ID (853) based on unique identifying data (850) [in any manner as discussed elsewhere herein], to provide the Appliance ID output (853) [that is coupled as an encryption key to the decryption logic (844)]. The ticket decryption logic (844) provides for decryption of the encrypted ticket (843) to provide an output of a decrypted ticket (845). The decrypted ticket is provided as an input to usage control logic (846) of the recipient device [such as responsive to application software (validated and authorized by a trusted provider) running on a computer system of the recipient device]. The recipient device 204 is responsive to the decrypted ticket (845) and provides for determining of usage rights (and regulation of usage responsive thereto) and validating of ticket ID [and/or other functions as desired and implemented]. The decrypted content (861) provided within the recipient device 204 (as discussed herein), is temporarily stored in the recipient device, and provided to the control logic (846), and the usage rights ticket is validated (848) for the respective content [such as based on ticket ID and other information as appropriate) (846), and the validated usage rights are provided as an output (849) coupled to usage regulation and control logic (862) as an input thereto. The decrypted content (861) (such as illustrated output from FIG. 19) is coupled to the control logic (862) as well as, to be validated. The logic provides for regulating usage (862) of the decrypted content (861) in accordance with the validated usage rights (849) to provide for an output (863) which is utilized by the recipient device 204, to provide for selectively regulated usage at the recipient device of the decrypted content [DC], such as viewing, saving, exporting, printing, or other permitted usage as permitted by the validated usage rights for the respective decrypted content.
  • The system and methodology as in illustrated FIG. 30 provide for validating the ticket output within the recipient device, and then regulating the usage of the decrypted content on the recipient device responsive to the determined usage rights and the validating. This can provide for one or more of viewing, saving, exporting, printing, and executing of application represented by the decrypted content, responsive to the usage rights and the validating.
  • The system and methodology of the present invention as to Data Rights Management and secure distribution and regulation of protected content, is applicable to distribution via on-line (Internet or Intranet, wired or wireless), via CD-ROM, email, on memory cards, or otherwise.
  • It is applicable to business, education, government, on-line research [such as LexisNexis, Westlaw, Google], on-line transactional (e.g., eBay, Amazon.com), video gaming, gambling, wagering, betting (especially server-based or wireless or wired, real-time or delayed), and any on-line commerce.
  • The present invention also eliminates the time loss and delays of server-based authentication of appliances, data and transactions, by providing (in some embodiments), appliance specific regulating of usage rights, without (ongoing) server authentication.
  • The systems and methodology of the present invention are also valuable in a large number of applications, from any transaction processing system, such as for businesses or consumers, and in specific regulated industries, such as banking, financial markets, military, and [gambling, gaming, wagering and betting, both on-line and in-casino-based and wireless and wired], as well as to server-based gaming and gambling.
  • From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims.

Claims (38)

1. A method for securely utilizing content, the method comprising:
providing encrypted content created from encrypting original content using a production encryption key to provide the encrypted content; and
providing an encrypted production key created from the production encryption key encrypted responsive to an appliance ID generated by a recipient device.
2. The method as in claim 1, the method further comprising:
providing the encrypted content and the encrypted production key to the recipient device;
generating at the recipient device a generated appliance ID;
decrypting the encrypted production key at the recipient device,
responsive to the generated appliance ID to provide a decrypted production key; and
decrypting the encrypted content at the recipient device, responsive to the decrypted production key, to provide decrypted content.
3. The method as in claim 2, the method further comprising:
temporarily storing the decrypted content within the recipient device.
4. The method as in claim 2, wherein the original content has an associated video representation, the method further comprising:
selectively providing at least one of a video presentation for viewing, selectively printing out, and exporting, at least one copy of at least a portion of the associated video presentation for the original content, and exporting, responsive to the respective decrypted content.
5. The method as in claim 1, further comprising:
storing the encrypted content and the encrypted production key on at least one of magnetic disks, storage, optical storage, other non-volatile storage, storage at the recipient device and a remote coupled server.
6. The method as in claim 1, wherein the original content is comprised of at least one of:
a) textual data;
b) image data;
c) audio waveform data;
d) MIDI data;
e) video data;
f) game data;
g) business data;
h) application program code;
i) textual data having a respective associated ticket for regulating usage rights defining permitted uses for the respective textual data;
j) image data having a respective associated ticket for regulating usage rights defining permitted uses for the respective image data;
k) audio waveform data having a respective associated ticket for regulating usage rights defining permitted uses for the respective;
l) MIDI data having a respective associated ticket for regulating usage rights defining permitted uses for the respective audio waveform data;
m) video data having a respective associated ticket for regulating usage rights defining permitted uses for the respective video data;
n) game data having a respective associated ticket for regulating usage rights defining permitted uses for the respective game data;
o) business data having a respective associated ticket for regulating usage rights defining permitted uses for the respective business data;
p) application program code having a respective associated ticket for regulating usage rights defining permitted uses for the respective application program code; and
q) a ticket for regulating usage rights defining permitted uses for an associated respective data file.
7. The method as in claim 1, wherein the original content is a ticket for regulating usage rights defining permitted uses for an associated respective data file.
8. The method as in claim 7, further comprising:
providing the associated respective data file;
wherein the associated respective data file is comprised of at least one of:
a) textual data;
b) image data;
c) audio waveform data;
d) MIDI data;
e) video data;
f) game data;
g) business data; and
h) application program code.
9. The method as in claim 1, further comprising:
combining the encrypted content and the encrypted production key as a combined encrypted output;
providing the combined encrypted output to the recipient device;
separating the combined encrypted output at the recipient device into an encrypted content copy and an encrypted production key copy;
decrypting the encrypted production key copy at the recipient device, to provide a decrypted production key; and
decrypting the encrypted content copy, at the remote appliance, responsive to the decrypted production key to provide unencrypted content.
10. The method as in claim 1, further comprising:
generating a ticket output associated with respective encrypted content, the ticket output providing defined usage rights for regulating usage rights of the encrypted content; and
encrypting the ticket output to provide an encrypted ticket output, responsive to the production key.
11. The method as in claim 10, wherein the ticket output is comprised of usage rights and a ticket ID, the method further comprising:
validating the ticket output on the remote appliance, responsive to the ticket ID;
regulating usage of at least one of viewing, saving, exporting, and
printing of the temporary decrypted content on a remote appliance, and exporting, responsive to the usage rights and the validating.
12. The method as in claim 1, the method further comprising:
providing decrypted content for the original content responsive to the encrypted content, the encrypted production key and the key encryption key.
13. The method as in claim 2, wherein the decrypted production key is only temporarily stored on the recipient device until completion of providing the decrypted content.
14. The method as in claim 1, the method further comprising:
hosting the encrypted content a remote coupled server for secure communication to the recipient device of at least one selected portion of the encrypted content;
providing for user selection of a selected portion of the encrypted content;
providing the generated appliance ID by the recipient device to the remote coupled server;
encrypting the production key associated with the selected portion of the encrypted content, responsive to the generated appliance ID from the recipient device, to generate an encrypted production key; and
communicating the selected portion of the encrypted content and the encrypted production key to the recipient device.
15. The method as in claim 14, further comprising:
storing for the selected portion of the encrypted content a serial number and an associated password on the remote coupled server;
providing the serial number and the password from the recipient device to the remote coupled server; and
providing the selected portion of the encrypted content to the recipient device responsive to the serial number and the password from the recipient device.
16. The method as in claim 14, further comprising:
requiring transaction authentication from the recipient device prior to providing the communication of the encrypted content to the recipient device; and
providing as the transaction authentication at least one of credit card, key code authorization number, serial number and associated password, and emailed signature.
17. The method as in claim 2, further comprising:
storing an associated serial number and associated password as associated with providing the encrypted content to the recipient device;
providing from the recipient device, a generated appliance ID and the associated serial number and the associated password;
encrypting the production key to generate an encrypted production key responsive to the generated appliance ID; and
communicating the encrypted production key to the recipient device.
18. The method as in claim 14, further comprising:
storing the production key, the appliance ID and the encrypted production key on the remote coupled server;
utilizing the stored production key for further encryption of content for communication to the recipient device that provides the appliance ID, for each selection of one of the portions of the encrypted content for communication to the recipient device; and
encrypting of additional selected portions of the original content responsive to the stored production key to generate respective associated additional selected portions of the encrypted content.
19. The method as in claim 1, wherein the original content is comprised of viewing content and a ticket for regulating assigned usage rights for the respective viewing content.
20. A system for securely utilizing content, the system comprising:
means for providing encrypted content created from encrypting original content using a production encryption key to provide the encrypted content; and
means for providing an encrypted production key created from the production encryption key encrypted responsive to an appliance ID generated by a recipient device.
21. The system as in claim 20, further comprising:
means for generating at the recipient device a generated appliance ID;
means for decrypting the encrypted production key at the recipient device, responsive to the generated appliance ID to provide a decrypted production key; and
means for decrypting the encrypted content at the recipient device, responsive to the decrypted production key, to provide decrypted content.
22. The system as in claim 21, wherein the original content has an associated video representation, the system further comprising:
means for selectively providing at least one of a video presentation for viewing, selectively printing out, and exporting, at least one copy of at least a portion of the associated video presentation for the original content, and exporting, responsive to the respective decrypted content.
23. The system as in claim 20, further comprising:
means for storing the encrypted content and the encrypted production key on at least one of magnetic storage, optical storage, other non-volatile storage, storage at the recipient device, and storage on a remote coupled server.
24. The system as in claim 20, wherein the original content is a ticket for regulating usage rights defining permitted uses for an associated respective data file.
25. The system as in claim 24, further comprising:
providing the associated respective data file;
wherein the associated respective data file is comprised of at least one of:
a) textual data;
b) image data;
c) audio waveform data;
d) MIDI data;
e) video data;
f) game data;
g) business data; and
h) application program code.
26. The system as in claim 20, further comprising:
means for combining the encrypted content and the encrypted production key as a combined encrypted output;
means for providing the combined encrypted output to the recipient device;
means for separating the combined encrypted output at the recipient device into an encrypted content copy and an encrypted production key copy;
means for decrypting the encrypted production key copy at the recipient device, to provide a decrypted production key; and
means for decrypting the encrypted content copy, at the remote appliance, responsive to the decrypted production key to provide unencrypted content.
27. The system as in claim 20, wherein the original content is comprised of at least one of:
a) textual data;
b) image data;
c) audio waveform data;
d) MIDI data;
e) video data;
f) game data;
g) business data;
h) application program code;
i) textual data having a respective associated ticket for regulating usage rights defining permitted uses for the respective textual data;
j) image data having a respective associated ticket for regulating usage rights defining permitted uses for the respective image data;
k) audio waveform data having a respective associated ticket for regulating usage rights defining permitted uses for the respective;
l) MIDI data having a respective associated ticket for regulating usage rights defining permitted uses for the respective audio waveform data;
m) video data having a respective associated ticket for regulating usage rights defining permitted uses for the respective video data;
n) game data having a respective associated ticket for regulating usage rights defining permitted uses for the respective game data;
o) business data having a respective associated ticket for regulating usage rights defining permitted uses for the respective business data;
p) application program code having a respective associated ticket for regulating usage rights defining permitted uses for the respective application program code; and
q) a ticket for regulating usage rights defining permitted uses for an associated respective data file.
28. The system as in claim 24, wherein the ticket is comprised of usage rights and a ticket ID, the system further comprising:
means for validating the ticket on the remote appliance, responsive to the ticket ID; and
means for regulating usage of at least one of viewing, saving, exporting, and printing of at least a portion of the temporary decrypted content on a remote appliance, responsive to the usage rights and the validating.
29. The system as in claim 20, further comprising:
means for hosting the encrypted content a remote coupled server for secure communication to the recipient device of at least one selected portion of the encrypted content;
means for providing for user selection of a selected portion of the encrypted content;
means for providing the generated appliance ID by the recipient device to the remote coupled server;
means for encrypting the production key associated with the selected portion of the encrypted content, responsive to the generated appliance ID by the recipient device, to generate an encrypted production key; and
means for communicating the selected portion of the encrypted content and the encrypted production key to the recipient device.
30. The system as in claim 29, further comprising:
means for storing for the selected portion of the encrypted content a serial number and an associated password on the remote coupled server;
means for providing the serial number and the password from the recipient device to the remote coupled server; and
means for providing the selected portion of the encrypted content to the recipient device responsive to the serial number and the password being provided from the recipient device.
31. The system as in claim 29, further comprising:
requiring transaction authentication from the recipient device prior to providing the communication of the encrypted content to the recipient device; and
providing as the transaction authentication at least one of credit card, key code authorization number, serial number and associated password, and emailed signature.
32. The system as in claim 20, further comprising:
means for storing an associated serial number and associated password as associated with providing the encrypted content to the recipient device;
means for providing from the recipient device, a generated appliance ID and the associated serial number and the associated password;
means for encrypting the production key to generate an encrypted production key responsive to the generated appliance ID from the recipient device; and
means for communicating the encrypted production key to the recipient device.
33. The system as in claim 29, further comprising:
means for storing the production key, the appliance ID and the encrypted production key on the remote coupled server;
means for utilizing the stored production key for further encryption of content for communication to the recipient device that provides the appliance ID, for each selection of one of the portions of the encrypted content for communication to the recipient device; and
means for encrypting of additional selected portions of the original content responsive to the stored production key to generate respective associated additional selected portions of the encrypted content.
34. The system as in claim 19, wherein the original content is comprised of viewing content and a ticket defining assigned usage rights.
35. A system for securely utilizing selected original content encrypted responsive to an associated production key:
a recipient device comprised of a processor, local memory;
application software operating on the recipient device to generate an Appliance ID uniquely associated with the recipient device and derived from appliance data form the recipient device; and
means for providing an encrypted production key created from the production encryption key encrypted responsive to the Appliance ID generated by the recipient device.
36. The system as in claim 34, further comprising:
means for generating at the recipient device a generated Appliance ID;
means for decrypting the encrypted production key at the recipient device;
responsive to the generated Appliance ID to provide a decrypted production key; and
means for decrypting the encrypted content at the recipient device, responsive to the decrypted production key, to provide decrypted content.
37. The system as in claim 36, further comprising:
means for selectively providing at least one of a video presentation for viewing, selectively printing out, and exporting, at least one copy of at least a portion of the associated video presentation for the original content, and exporting, responsive to the respective decrypted content, responsive to the application software.
38. A system for controlled distribution and usage of original content encrypted as an encrypted file, responsive to an associated production key, the system comprising:
application software running off a recipient device providing for selective viewing and usage of converted content;
wherein the application software generates an Appliance ID from uniquely identifying parameters of the recipient device;
means for communication of the Appliance ID to a host subsystem;
wherein the host subsystem is responsive to the Appliance ID to encrypt the associated production key to create an encrypted production key;
means for coupling the encrypted production key to the recipient device; and
wherein the application software is responsive to the generation of the Appliance ID and to the encrypted production key to generate a decrypted production key; and
means for providing decryption of the converted content responsive to the decrypted production key.
US11/545,889 2006-10-11 2006-10-11 Method and system for secure distribution of selected content to be protected Abandoned US20080092239A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US11/545,889 US20080092239A1 (en) 2006-10-11 2006-10-11 Method and system for secure distribution of selected content to be protected
US15/130,905 US9679118B2 (en) 2006-10-11 2016-04-15 Method and system for secure distribution of selected content to be protected
US15/619,369 US10176305B2 (en) 2006-10-11 2017-06-09 Method and system for secure distribution of selected content to be protected
US16/241,835 US11003742B2 (en) 2006-10-11 2019-01-07 Method and system for secure distribution of selected content to be protected
US17/092,109 US11461434B2 (en) 2006-10-11 2020-11-06 Method and system for secure distribution of selected content to be protected
US17/957,564 US11868447B2 (en) 2006-10-11 2022-09-30 Method and system for secure distribution of selected content to be protected

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/545,889 US20080092239A1 (en) 2006-10-11 2006-10-11 Method and system for secure distribution of selected content to be protected

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/130,905 Continuation US9679118B2 (en) 2006-10-11 2016-04-15 Method and system for secure distribution of selected content to be protected

Publications (1)

Publication Number Publication Date
US20080092239A1 true US20080092239A1 (en) 2008-04-17

Family

ID=39304565

Family Applications (6)

Application Number Title Priority Date Filing Date
US11/545,889 Abandoned US20080092239A1 (en) 2006-10-11 2006-10-11 Method and system for secure distribution of selected content to be protected
US15/130,905 Active US9679118B2 (en) 2006-10-11 2016-04-15 Method and system for secure distribution of selected content to be protected
US15/619,369 Expired - Fee Related US10176305B2 (en) 2006-10-11 2017-06-09 Method and system for secure distribution of selected content to be protected
US16/241,835 Active US11003742B2 (en) 2006-10-11 2019-01-07 Method and system for secure distribution of selected content to be protected
US17/092,109 Active 2027-01-21 US11461434B2 (en) 2006-10-11 2020-11-06 Method and system for secure distribution of selected content to be protected
US17/957,564 Active US11868447B2 (en) 2006-10-11 2022-09-30 Method and system for secure distribution of selected content to be protected

Family Applications After (5)

Application Number Title Priority Date Filing Date
US15/130,905 Active US9679118B2 (en) 2006-10-11 2016-04-15 Method and system for secure distribution of selected content to be protected
US15/619,369 Expired - Fee Related US10176305B2 (en) 2006-10-11 2017-06-09 Method and system for secure distribution of selected content to be protected
US16/241,835 Active US11003742B2 (en) 2006-10-11 2019-01-07 Method and system for secure distribution of selected content to be protected
US17/092,109 Active 2027-01-21 US11461434B2 (en) 2006-10-11 2020-11-06 Method and system for secure distribution of selected content to be protected
US17/957,564 Active US11868447B2 (en) 2006-10-11 2022-09-30 Method and system for secure distribution of selected content to be protected

Country Status (1)

Country Link
US (6) US20080092239A1 (en)

Cited By (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061889A1 (en) * 2005-09-12 2007-03-15 Sand Box Technologies Inc. System and method for controlling distribution of electronic information
US20070150964A1 (en) * 2002-02-21 2007-06-28 Adobe Systems Incorporated Application Rights Enabling
US20080072297A1 (en) * 2006-09-20 2008-03-20 Feitian Technologies Co., Ltd. Method for protecting software based on network
US20080092240A1 (en) * 2006-10-11 2008-04-17 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance specific basis
US20080098091A1 (en) * 2006-10-23 2008-04-24 Lucent Technologies,Inc. System and method for providing personalized multimedia broadcasting over a mobile telecommunications radio area network
US20080148067A1 (en) * 2006-10-11 2008-06-19 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US20080226079A1 (en) * 2007-03-14 2008-09-18 Samsung Electronics Co., Ltd. Method and apparatus for conditionally decrypting content
US20090019155A1 (en) * 2007-07-11 2009-01-15 Verizon Services Organization Inc. Token-based crediting of network usage
US20090031139A1 (en) * 2007-07-27 2009-01-29 Mohammed Alawi Geoffrey System and Method for Electronic Certification and Authentification
US20090298480A1 (en) * 2008-04-30 2009-12-03 Intertrust Technologies Corporation Data collection and targeted advertising systems and methods
US7827488B2 (en) 2000-11-27 2010-11-02 Sitrick David H Image tracking and substitution system and methodology for audio-visual presentations
US20100293058A1 (en) * 2008-04-30 2010-11-18 Intertrust Technologies Corporation Ad Selection Systems and Methods
US20100293050A1 (en) * 2008-04-30 2010-11-18 Intertrust Technologies Corporation Dynamic, Local Targeted Advertising Systems and Methods
WO2010135001A3 (en) * 2009-05-21 2011-02-03 Intertrust Technologies Corporation Content delivery systems and methods
US20110066861A1 (en) * 2009-08-17 2011-03-17 Cram, Inc. Digital content management and delivery
WO2011064672A1 (en) * 2009-11-24 2011-06-03 Ole Hansvold Method for transfer of access criteria for multi-domain and trans-domain distribution of video and other media content
US20110197144A1 (en) * 2010-01-06 2011-08-11 Terry Coatta Method And System Of Providing A Viewing Experience With Respect To A Document Having Read-only Content
US20110247085A1 (en) * 2010-03-30 2011-10-06 Hon Hai Precision Industry Co., Ltd. Electronic device and method of protecting software
US20110252243A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US8151114B2 (en) 2002-11-27 2012-04-03 Adobe Systems Incorporated Dynamic enabling of functionality in electronic document readers
US8281143B1 (en) * 2008-09-29 2012-10-02 Symantec Operating Corporation Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
US20120284645A1 (en) * 2011-05-06 2012-11-08 David H. Sitrick Systems And Methodologies Providing Controlled Voice And Data Communication Among A Plurality Of Computing Appliances Associated As Team Members Of At Least One Respective Team Or Of A Plurality Of Teams And Sub-Teams Within The Teams
US20120284643A1 (en) * 2011-05-06 2012-11-08 David H. Sitrick System And Methodology For Collaboration in Groups With Split Screen Displays
US20120284642A1 (en) * 2011-05-06 2012-11-08 David H. Sitrick System And Methodology For Collaboration, With Selective Display Of User Input Annotations Among Member Computing Appliances Of A Group/Team
US20130129086A1 (en) * 2011-11-22 2013-05-23 Combined Conditional Access Development And Support, Llc. Downloading of Data to Secure Devices
US8479304B1 (en) 2009-03-31 2013-07-02 Symantec Corporation Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
US20130315396A1 (en) * 2009-02-24 2013-11-28 Beyond Broadband Technology, Llc Internet Communication System For Secure Restricted Access
US8660960B2 (en) 2002-11-27 2014-02-25 Adobe Systems Incorporated Document digest allowing selective changes to a document
US20140129834A1 (en) * 2012-11-02 2014-05-08 Jacob Andrew Brill Providing User Authentication
US8756419B2 (en) 2010-04-07 2014-06-17 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US8799675B2 (en) 2012-01-05 2014-08-05 House Of Development Llc System and method for electronic certification and authentication of data
US8806352B2 (en) 2011-05-06 2014-08-12 David H. Sitrick System for collaboration of a specific image and utilizing selected annotations while viewing and relative to providing a display presentation
US20140289195A1 (en) * 2013-03-21 2014-09-25 Nextbit Systems Inc. Configurable application state synchronization
US8875011B2 (en) 2011-05-06 2014-10-28 David H. Sitrick Systems and methodologies providing for collaboration among a plurality of users at a plurality of computing appliances
US20140351586A1 (en) * 2012-02-20 2014-11-27 Lock Box Pty Ltd Cryptographic method and system
US8914735B2 (en) 2011-05-06 2014-12-16 David H. Sitrick Systems and methodologies providing collaboration and display among a plurality of users
US8918721B2 (en) 2011-05-06 2014-12-23 David H. Sitrick Systems and methodologies providing for collaboration by respective users of a plurality of computing appliances working concurrently on a common project having an associated display
US8918723B2 (en) * 2011-05-06 2014-12-23 David H. Sitrick Systems and methodologies comprising a plurality of computing appliances having input apparatus and display apparatus and logically structured as a main team
US8924859B2 (en) 2011-05-06 2014-12-30 David H. Sitrick Systems and methodologies supporting collaboration of users as members of a team, among a plurality of computing appliances
US8965809B1 (en) * 2009-05-21 2015-02-24 Stamps.Com Inc. Restricted printing of postage with layout constraints in a browser
US20150067540A1 (en) * 2013-09-02 2015-03-05 Samsung Electronics Co., Ltd. Display apparatus, portable device and screen display methods thereof
US8990677B2 (en) 2011-05-06 2015-03-24 David H. Sitrick System and methodology for collaboration utilizing combined display with evolving common shared underlying image
US9118462B2 (en) 2009-05-20 2015-08-25 Nokia Corporation Content sharing systems and methods
US9224129B2 (en) 2011-05-06 2015-12-29 David H. Sitrick System and methodology for multiple users concurrently working and viewing on a common project
US20150379276A1 (en) * 2014-06-27 2015-12-31 Freescale Semiconductor, Inc. System on a chip, controller and method for securing data
US9330366B2 (en) 2011-05-06 2016-05-03 David H. Sitrick System and method for collaboration via team and role designation and control and management of annotations
US20160224404A1 (en) * 2015-01-29 2016-08-04 Qualcomm Incorporated Selective block-based integrity protection techniques
CN106326761A (en) * 2016-09-05 2017-01-11 天脉聚源(北京)传媒科技有限公司 Encryption of SN number method and device
US20170034554A1 (en) * 2014-04-11 2017-02-02 Television Broadcast Limited Method of delivering and protecting media content
US9679118B2 (en) 2006-10-11 2017-06-13 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US9728107B1 (en) 2008-04-15 2017-08-08 Stamps.Com Inc. Systems and methods for protecting content when using a general purpose user interface application
EP3217276A1 (en) * 2016-03-08 2017-09-13 Ricoh Company, Ltd. Information processing system, job processing method, data storage apparatus, information device, and carrier means
US20170270020A1 (en) * 2016-03-18 2017-09-21 Kabushiki Kaisha Toshiba Information processing device, information processing method and computer program product
US20180253682A1 (en) * 2017-03-01 2018-09-06 Cvs Pharmacy, Inc. Intelligent Pre-Processing and Fulfillment of Mixed Orders
US10387669B1 (en) 2015-09-17 2019-08-20 Nextlabs, Inc. Protecting documents with centralized and discretionary policies
US10402485B2 (en) 2011-05-06 2019-09-03 David H. Sitrick Systems and methodologies providing controlled collaboration among a plurality of users
US20190319784A1 (en) * 2018-04-12 2019-10-17 Mastercard International Incorporated Method and system for managing centralized encryption and data format validation for secure real time multi-party data distribution
US10476662B2 (en) * 2017-04-10 2019-11-12 City University Of Hong Kong Method for operating a distributed key-value store
US20190384894A1 (en) * 2015-01-28 2019-12-19 IHP GmbH - Innovations for High Performance Microelectronics/Leibniz-Institut Fur Innovative Intrinsic authentication of program code
US10567853B2 (en) * 2013-08-14 2020-02-18 Amtel Corporation Smart grid appliance control
US10673647B2 (en) * 2016-09-28 2020-06-02 Digitalitaly S.r.l. Innovativa Digital mailbox
WO2020119306A1 (en) * 2018-12-12 2020-06-18 阿里巴巴集团控股有限公司 Blockchain-based invoice access method and apparatus, and electronic device
US10693634B2 (en) 2015-08-26 2020-06-23 Alibaba Group Holding Limited Key generation method and apparatus using double encryption
US10833857B2 (en) * 2018-01-29 2020-11-10 International Business Machines Corporation Encryption key management in a data storage system communicating with asynchronous key servers
US10891391B2 (en) * 2018-08-29 2021-01-12 International Business Machines Corporation Remote file storage with multiple access levels
US20210042434A1 (en) * 2011-08-02 2021-02-11 Api Market, Inc. Rights-based system
US11032062B2 (en) * 2019-09-17 2021-06-08 Switchbit, Inc. Data processing permits system with keys
US11263328B2 (en) * 2018-09-13 2022-03-01 Vmware, Inc. Encrypted log aggregation
CN114338154A (en) * 2021-12-28 2022-04-12 北京易华录信息技术股份有限公司 User identity authentication method, device, equipment and computer readable storage medium
US20220156411A1 (en) * 2019-08-29 2022-05-19 Google Llc Securing External Data Storage for a Secure Element Integrated on a System-on-Chip
US11386426B2 (en) 2018-12-27 2022-07-12 Advanced New Technologies Co., Ltd. Invoice invalidation method and apparatus based on blockchain, and electronic device
US20220311609A1 (en) * 2018-05-25 2022-09-29 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption
WO2023012444A1 (en) * 2021-08-05 2023-02-09 Olive Innovations Ltd Security module and method of scure communication
US11611595B2 (en) 2011-05-06 2023-03-21 David H. Sitrick Systems and methodologies providing collaboration among a plurality of computing appliances, utilizing a plurality of areas of memory to store user input as associated with an associated computing appliance providing the input
US11893089B1 (en) 2004-07-27 2024-02-06 Auctane, Inc. Systems and methods for protecting content when using a general purpose user interface application

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016054453A1 (en) * 2014-10-01 2016-04-07 VYRTY Corporation Secure access to individual information
US10348695B1 (en) 2016-05-26 2019-07-09 VYRTY Corporation Secure access to individual information
KR20180077431A (en) * 2016-12-29 2018-07-09 주식회사 인코어드 테크놀로지스 Server, Home Appliance and System Having a Function of Managing Power Demand and Method For Managing Power Usage Thereof
US10275605B2 (en) 2017-06-19 2019-04-30 Xerox Corporation System and method for supporting secure document tags for use in traditionally unsupported workflows
KR102317598B1 (en) * 2017-10-11 2021-10-26 삼성전자주식회사 Server, method for controlling the server and terminal apparatus
US11343330B2 (en) 2018-04-18 2022-05-24 VYRTY Corporation Secure access to individual information
US11101979B2 (en) 2019-05-30 2021-08-24 Kira Inc. Method and system for creating word-level differential privacy using feature hashing techniques
CN110995685B (en) * 2019-11-26 2022-07-19 中国银联股份有限公司 Data encryption and decryption method, device, system and storage medium
US11483147B2 (en) 2020-01-23 2022-10-25 Bank Of America Corporation Intelligent encryption based on user and data properties
US11425143B2 (en) 2020-01-23 2022-08-23 Bank Of America Corporation Sleeper keys
US11102005B2 (en) 2020-01-23 2021-08-24 Bank Of America Corporation Intelligent decryption based on user and data profiling
US11451389B2 (en) 2020-06-25 2022-09-20 Bank Of America Corporation Multi-encrypted message response manager
US11757846B2 (en) 2020-06-25 2023-09-12 Bank Of America Corporation Cognitive multi-encrypted mail platform
US11122021B1 (en) 2020-06-25 2021-09-14 Bank Of America Corporation Server for handling multi-encrypted messages
CN111782019B (en) * 2020-08-25 2021-10-15 郑州航空工业管理学院 Big data information processing device
US11431731B2 (en) * 2020-12-30 2022-08-30 Jose R. ROSAS BUSTOS Systems and methods of creating and operating a cloudless infrastructure of computing devices
US11673059B2 (en) * 2021-05-18 2023-06-13 Roblox Corporation Automatic presentation of suitable content
US11528144B1 (en) * 2022-06-09 2022-12-13 Uab 360 It Optimized access in a service environment

Citations (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5029207A (en) * 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5406626A (en) * 1993-03-15 1995-04-11 Macrovision Corporation Radio receiver for information dissemenation using subcarrier
US5870474A (en) * 1995-12-04 1999-02-09 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US6026366A (en) * 1993-09-22 2000-02-15 Motorola, Inc. Method for providing software to a remote computer
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system
US20020023217A1 (en) * 2000-08-04 2002-02-21 Wheeler Lynn Henry Manufacturing unique devices that generate digital signatures
US20020061185A1 (en) * 2000-11-17 2002-05-23 Hirotada Hirabayashi Apparatus and method for recording video data
US20020099947A1 (en) * 2001-01-19 2002-07-25 Xerox Corporation Secure content objects
US20020106081A1 (en) * 2000-12-28 2002-08-08 Ta-Kuang Yang Multiple registration system and method of using the same account for registering different device to a DRC server
US20020107806A1 (en) * 2001-02-02 2002-08-08 Akio Higashi Content usage management system and content usage management method
US20020146122A1 (en) * 2000-03-03 2002-10-10 Steve Vestergaard Digital media distribution method and system
US20020166056A1 (en) * 2001-05-04 2002-11-07 Johnson William C. Hopscotch ticketing
US20020198846A1 (en) * 2001-05-31 2002-12-26 Guillermo Lao Method and system for subscription digital rights management
US20030084332A1 (en) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Method for binding a software data domain to specific hardware
US20040034637A1 (en) * 2002-02-26 2004-02-19 Stephanie Riche Accessing a set of local or distant resources
US20040054891A1 (en) * 2002-08-27 2004-03-18 Hengeveld Thomas Andrew Secure encryption key distribution
US20040088541A1 (en) * 2002-11-01 2004-05-06 Thomas Messerges Digital-rights management system
US20040133785A1 (en) * 2002-11-07 2004-07-08 Masami Kugai Content utilizing method
US6792113B1 (en) * 1999-12-20 2004-09-14 Microsoft Corporation Adaptable security mechanism for preventing unauthorized access of digital data
US20040193364A1 (en) * 2000-09-18 2004-09-30 Robert Chojnacki Computing system with decryption functions and secure data product
US20040210762A1 (en) * 2002-04-15 2004-10-21 Yoji Kawamoto Information processing device, method, recording medium and program
US20040254886A1 (en) * 2003-03-31 2004-12-16 Peter Siepen Method and system for outputting protected data in a vehicle
US20050033994A1 (en) * 2003-06-30 2005-02-10 Sony Corporation Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
US20050071272A1 (en) * 1995-09-20 2005-03-31 Makoto Yoshioka Content sales period verifying system and content decryption key effective period verifying system
US6947910B2 (en) * 2001-10-09 2005-09-20 E-Cast, Inc. Secure ticketing
US6976210B1 (en) * 1999-08-31 2005-12-13 Lucent Technologies Inc. Method and apparatus for web-site-independent personalization from multiple sites having user-determined extraction functionality
US20060048232A1 (en) * 2004-08-26 2006-03-02 International Business Machines Corporation Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster
US20060063138A1 (en) * 2004-09-16 2006-03-23 Sap Aktiengesellschaft Methods and systems for adapting data from a user interface
US20060080545A1 (en) * 2004-10-12 2006-04-13 Bagley Brian B Single-use password authentication
US7062045B2 (en) * 2001-09-06 2006-06-13 Clwt, Llc Media protection system and method
US20060161502A1 (en) * 2005-01-18 2006-07-20 International Business Machines Corporation System and method for secure and convenient handling of cryptographic binding state information
US20060168580A1 (en) * 2003-02-21 2006-07-27 Shunji Harada Software-management system, recording medium, and information-processing device
US20060179489A1 (en) * 2001-06-22 2006-08-10 Joan-Maria Mas Ribes Conditional access system for digital data by key decryption and re-encryption
US7095854B1 (en) * 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20070033154A1 (en) * 2003-10-29 2007-02-08 Trainum Michael W System and method managing documents
US20070239883A1 (en) * 2006-04-10 2007-10-11 Flagpath Venture Vii, Llc Devices, systems, and methods for producing and distributing multiple variations of an instance of a media presentation
US20070294181A1 (en) * 2006-05-22 2007-12-20 Saurabh Chheda Flexible digital rights management with secure snippets
US7353388B1 (en) * 2004-02-09 2008-04-01 Avaya Technology Corp. Key server for securing IP telephony registration, control, and maintenance
US20080092240A1 (en) * 2006-10-11 2008-04-17 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance specific basis
US20080134346A1 (en) * 2004-08-05 2008-06-05 Yeong-Sub Cho Transactions Certification Method And System To Protect Privacy On Details Of Electronic Transactions
US20080148067A1 (en) * 2006-10-11 2008-06-19 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US20080275977A1 (en) * 2007-05-06 2008-11-06 Contec Innnovations Inc. Method and system for managing information feed delivery to a communications device
US7594274B2 (en) * 2002-02-25 2009-09-22 Markany, Inc. Method of authenticating an application for personal digital assistant using a unique ID based on a personal computer and system using thereof
US7930553B2 (en) * 2003-04-11 2011-04-19 Intel Corporation System and method for extending secure authentication using unique session keys derived from entropy generated by authentication method

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE33189E (en) 1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption
US6282653B1 (en) 1998-05-15 2001-08-28 International Business Machines Corporation Royalty collection method and system for use of copyrighted digital materials on the internet
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US8311946B1 (en) 1999-10-15 2012-11-13 Ebrary Method and apparatus for improved information transactions
US20010032312A1 (en) * 2000-03-06 2001-10-18 Davor Runje System and method for secure electronic digital rights management, secure transaction management and content distribution
FR2812781A1 (en) * 2000-08-04 2002-02-08 Thomson Multimedia Sa METHOD FOR SECURE DISTRIBUTION OF DIGITAL DATA REPRESENTATIVE OF MULTIMEDIA CONTENT
WO2002029509A2 (en) * 2000-10-03 2002-04-11 Vidius Inc. Secure distribution of digital content
US7181625B2 (en) * 2000-10-17 2007-02-20 Vidius Inc. Secure distribution of digital content
EP1220173A1 (en) * 2000-12-29 2002-07-03 THOMSON multimedia System and method for the secure distribution of digital content in a sharing network
US20020152393A1 (en) 2001-01-09 2002-10-17 Johannes Thoma Secure extensible computing environment
US7400729B2 (en) * 2001-12-28 2008-07-15 Intel Corporation Secure delivery of encrypted digital content
US7395438B2 (en) * 2002-04-16 2008-07-01 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
US7272858B2 (en) * 2002-04-16 2007-09-18 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on a relatively simple device
CN100508452C (en) 2002-04-17 2009-07-01 松下电器产业株式会社 System and devices for information input/output and key management
US20030204738A1 (en) * 2002-04-30 2003-10-30 Morgan Stephen Paul System and method for secure distribution of digital content via a network
US7440574B2 (en) 2003-06-11 2008-10-21 Hewlett-Packard Development Company, L.P. Content encryption using programmable hardware
US7444306B2 (en) * 2003-10-24 2008-10-28 Thomas Bryan Varble Method and apparatus for the rental or sale, and secure distribution of digital content
JP4634751B2 (en) 2004-07-08 2011-02-16 株式会社東芝 Storage medium processing method, storage medium processing apparatus, and program
CN101923613A (en) 2004-10-08 2010-12-22 松下电器产业株式会社 Authentication system
US8825551B2 (en) 2005-04-21 2014-09-02 Google Technology Holdings LLC Digital rights management for local recording and home network distribution
US8676711B2 (en) 2005-06-10 2014-03-18 Aniruddha Gupte Payment method and apparatus for use in digital distribution system
CA2550560C (en) 2005-06-17 2015-07-21 Kabushiki Kaisha Toshiba Information provision system, provision information copying device, user terminal device and user management device
US20070079342A1 (en) 2005-09-30 2007-04-05 Guideworks, Llc Systems and methods for managing local storage of on-demand content
JP3857717B1 (en) 2005-10-07 2006-12-13 株式会社クリエイティヴ・リンク Creation method, information introduction system, creation device, and computer program
US20080092239A1 (en) 2006-10-11 2008-04-17 David H. Sitrick Method and system for secure distribution of selected content to be protected
US10387674B2 (en) 2015-06-04 2019-08-20 Datchat, Inc. Systems and methods of transforming electronic content
US10645066B2 (en) 2016-11-19 2020-05-05 Alan Earl Swahn Rights controlled communication

Patent Citations (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5029207A (en) * 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5406626A (en) * 1993-03-15 1995-04-11 Macrovision Corporation Radio receiver for information dissemenation using subcarrier
US6026366A (en) * 1993-09-22 2000-02-15 Motorola, Inc. Method for providing software to a remote computer
US7095854B1 (en) * 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20050071272A1 (en) * 1995-09-20 2005-03-31 Makoto Yoshioka Content sales period verifying system and content decryption key effective period verifying system
US5870474A (en) * 1995-12-04 1999-02-09 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US6976210B1 (en) * 1999-08-31 2005-12-13 Lucent Technologies Inc. Method and apparatus for web-site-independent personalization from multiple sites having user-determined extraction functionality
US6792113B1 (en) * 1999-12-20 2004-09-14 Microsoft Corporation Adaptable security mechanism for preventing unauthorized access of digital data
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system
US20020146122A1 (en) * 2000-03-03 2002-10-10 Steve Vestergaard Digital media distribution method and system
US20020023217A1 (en) * 2000-08-04 2002-02-21 Wheeler Lynn Henry Manufacturing unique devices that generate digital signatures
US20040193364A1 (en) * 2000-09-18 2004-09-30 Robert Chojnacki Computing system with decryption functions and secure data product
US20020061185A1 (en) * 2000-11-17 2002-05-23 Hirotada Hirabayashi Apparatus and method for recording video data
US20020106081A1 (en) * 2000-12-28 2002-08-08 Ta-Kuang Yang Multiple registration system and method of using the same account for registering different device to a DRC server
US20020099947A1 (en) * 2001-01-19 2002-07-25 Xerox Corporation Secure content objects
US20020107806A1 (en) * 2001-02-02 2002-08-08 Akio Higashi Content usage management system and content usage management method
US20020166056A1 (en) * 2001-05-04 2002-11-07 Johnson William C. Hopscotch ticketing
US20020198846A1 (en) * 2001-05-31 2002-12-26 Guillermo Lao Method and system for subscription digital rights management
US20060179489A1 (en) * 2001-06-22 2006-08-10 Joan-Maria Mas Ribes Conditional access system for digital data by key decryption and re-encryption
US7062045B2 (en) * 2001-09-06 2006-06-13 Clwt, Llc Media protection system and method
US6947910B2 (en) * 2001-10-09 2005-09-20 E-Cast, Inc. Secure ticketing
US20030084332A1 (en) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Method for binding a software data domain to specific hardware
US7594274B2 (en) * 2002-02-25 2009-09-22 Markany, Inc. Method of authenticating an application for personal digital assistant using a unique ID based on a personal computer and system using thereof
US20040034637A1 (en) * 2002-02-26 2004-02-19 Stephanie Riche Accessing a set of local or distant resources
US20040210762A1 (en) * 2002-04-15 2004-10-21 Yoji Kawamoto Information processing device, method, recording medium and program
US20040054891A1 (en) * 2002-08-27 2004-03-18 Hengeveld Thomas Andrew Secure encryption key distribution
US20040088541A1 (en) * 2002-11-01 2004-05-06 Thomas Messerges Digital-rights management system
US20040133785A1 (en) * 2002-11-07 2004-07-08 Masami Kugai Content utilizing method
US20060168580A1 (en) * 2003-02-21 2006-07-27 Shunji Harada Software-management system, recording medium, and information-processing device
US20040254886A1 (en) * 2003-03-31 2004-12-16 Peter Siepen Method and system for outputting protected data in a vehicle
US7930553B2 (en) * 2003-04-11 2011-04-19 Intel Corporation System and method for extending secure authentication using unique session keys derived from entropy generated by authentication method
US20050033994A1 (en) * 2003-06-30 2005-02-10 Sony Corporation Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
US20070033154A1 (en) * 2003-10-29 2007-02-08 Trainum Michael W System and method managing documents
US7353388B1 (en) * 2004-02-09 2008-04-01 Avaya Technology Corp. Key server for securing IP telephony registration, control, and maintenance
US20080134346A1 (en) * 2004-08-05 2008-06-05 Yeong-Sub Cho Transactions Certification Method And System To Protect Privacy On Details Of Electronic Transactions
US20060048232A1 (en) * 2004-08-26 2006-03-02 International Business Machines Corporation Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster
US20060063138A1 (en) * 2004-09-16 2006-03-23 Sap Aktiengesellschaft Methods and systems for adapting data from a user interface
US20060080545A1 (en) * 2004-10-12 2006-04-13 Bagley Brian B Single-use password authentication
US20060161502A1 (en) * 2005-01-18 2006-07-20 International Business Machines Corporation System and method for secure and convenient handling of cryptographic binding state information
US20070239883A1 (en) * 2006-04-10 2007-10-11 Flagpath Venture Vii, Llc Devices, systems, and methods for producing and distributing multiple variations of an instance of a media presentation
US20070294181A1 (en) * 2006-05-22 2007-12-20 Saurabh Chheda Flexible digital rights management with secure snippets
US20080092240A1 (en) * 2006-10-11 2008-04-17 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance specific basis
US20080148067A1 (en) * 2006-10-11 2008-06-19 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US20080275977A1 (en) * 2007-05-06 2008-11-06 Contec Innnovations Inc. Method and system for managing information feed delivery to a communications device

Cited By (137)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110026609A1 (en) * 2000-11-27 2011-02-03 Sitrick David H Image tracking and substitution system and methodology
US9135954B2 (en) 2000-11-27 2015-09-15 Bassilic Technologies Llc Image tracking and substitution system and methodology for audio-visual presentations
US7827488B2 (en) 2000-11-27 2010-11-02 Sitrick David H Image tracking and substitution system and methodology for audio-visual presentations
US8549403B2 (en) 2000-11-27 2013-10-01 David H. Sitrick Image tracking and substitution system and methodology
US20070150964A1 (en) * 2002-02-21 2007-06-28 Adobe Systems Incorporated Application Rights Enabling
US7913314B2 (en) * 2002-02-21 2011-03-22 Adobe Systems Incorporated Application rights enabling
US8256016B2 (en) 2002-02-21 2012-08-28 Adobe Systems Incorporated Application rights enabling
US8151114B2 (en) 2002-11-27 2012-04-03 Adobe Systems Incorporated Dynamic enabling of functionality in electronic document readers
US8660960B2 (en) 2002-11-27 2014-02-25 Adobe Systems Incorporated Document digest allowing selective changes to a document
US11893089B1 (en) 2004-07-27 2024-02-06 Auctane, Inc. Systems and methods for protecting content when using a general purpose user interface application
US20070061889A1 (en) * 2005-09-12 2007-03-15 Sand Box Technologies Inc. System and method for controlling distribution of electronic information
US8321924B2 (en) * 2006-09-20 2012-11-27 Feitian Technologies Co., Ltd. Method for protecting software accessible over a network using a key device
US20080072297A1 (en) * 2006-09-20 2008-03-20 Feitian Technologies Co., Ltd. Method for protecting software based on network
US9384333B2 (en) 2006-10-11 2016-07-05 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US10176305B2 (en) 2006-10-11 2019-01-08 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US11003742B2 (en) 2006-10-11 2021-05-11 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US11868447B2 (en) 2006-10-11 2024-01-09 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US11461434B2 (en) 2006-10-11 2022-10-04 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US8619982B2 (en) 2006-10-11 2013-12-31 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance specific basis
US11664984B2 (en) 2006-10-11 2023-05-30 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US8719954B2 (en) 2006-10-11 2014-05-06 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US20190311088A1 (en) 2006-10-11 2019-10-10 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US20080092240A1 (en) * 2006-10-11 2008-04-17 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance specific basis
US10924272B2 (en) 2006-10-11 2021-02-16 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US20080148067A1 (en) * 2006-10-11 2008-06-19 David H. Sitrick Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US9679118B2 (en) 2006-10-11 2017-06-13 Ol Security Limited Liability Company Method and system for secure distribution of selected content to be protected
US20080098091A1 (en) * 2006-10-23 2008-04-24 Lucent Technologies,Inc. System and method for providing personalized multimedia broadcasting over a mobile telecommunications radio area network
US7941503B2 (en) * 2006-10-23 2011-05-10 Alcatel-Lucent Usa Inc. System and method for providing personalized multimedia broadcasting over a mobile telecommunications radio area network
US20080226079A1 (en) * 2007-03-14 2008-09-18 Samsung Electronics Co., Ltd. Method and apparatus for conditionally decrypting content
US20090019155A1 (en) * 2007-07-11 2009-01-15 Verizon Services Organization Inc. Token-based crediting of network usage
US9009309B2 (en) * 2007-07-11 2015-04-14 Verizon Patent And Licensing Inc. Token-based crediting of network usage
US20090031139A1 (en) * 2007-07-27 2009-01-29 Mohammed Alawi Geoffrey System and Method for Electronic Certification and Authentification
US9728107B1 (en) 2008-04-15 2017-08-08 Stamps.Com Inc. Systems and methods for protecting content when using a general purpose user interface application
US10339280B1 (en) 2008-04-15 2019-07-02 Stamps.Com Inc. Systems and methods for protecting content when using a general purpose user interface application
US10885153B1 (en) 2008-04-15 2021-01-05 Stamps.Com Inc. Systems and methods for protecting content when using a general purpose user interface application
US20100293058A1 (en) * 2008-04-30 2010-11-18 Intertrust Technologies Corporation Ad Selection Systems and Methods
US8660539B2 (en) 2008-04-30 2014-02-25 Intertrust Technologies Corporation Data collection and targeted advertising systems and methods
US10191972B2 (en) 2008-04-30 2019-01-29 Intertrust Technologies Corporation Content delivery systems and methods
US20100293050A1 (en) * 2008-04-30 2010-11-18 Intertrust Technologies Corporation Dynamic, Local Targeted Advertising Systems and Methods
US20090298480A1 (en) * 2008-04-30 2009-12-03 Intertrust Technologies Corporation Data collection and targeted advertising systems and methods
US10776831B2 (en) 2008-04-30 2020-09-15 Intertrust Technologies Corporation Content delivery systems and methods
US8281143B1 (en) * 2008-09-29 2012-10-02 Symantec Operating Corporation Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
US20130315396A1 (en) * 2009-02-24 2013-11-28 Beyond Broadband Technology, Llc Internet Communication System For Secure Restricted Access
US8479304B1 (en) 2009-03-31 2013-07-02 Symantec Corporation Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
US9118462B2 (en) 2009-05-20 2015-08-25 Nokia Corporation Content sharing systems and methods
WO2010135001A3 (en) * 2009-05-21 2011-02-03 Intertrust Technologies Corporation Content delivery systems and methods
US8965809B1 (en) * 2009-05-21 2015-02-24 Stamps.Com Inc. Restricted printing of postage with layout constraints in a browser
US20110066861A1 (en) * 2009-08-17 2011-03-17 Cram, Inc. Digital content management and delivery
US8775825B2 (en) * 2009-08-17 2014-07-08 Cram Worldwide Llc Digital content management and delivery
WO2011064672A1 (en) * 2009-11-24 2011-06-03 Ole Hansvold Method for transfer of access criteria for multi-domain and trans-domain distribution of video and other media content
US20110197144A1 (en) * 2010-01-06 2011-08-11 Terry Coatta Method And System Of Providing A Viewing Experience With Respect To A Document Having Read-only Content
US20110247085A1 (en) * 2010-03-30 2011-10-06 Hon Hai Precision Industry Co., Ltd. Electronic device and method of protecting software
US8375460B2 (en) * 2010-03-30 2013-02-12 Hon Hai Precision Industry Co., Ltd. Electronic device and method of protecting software
US10348497B2 (en) 2010-04-07 2019-07-09 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US20110252243A1 (en) * 2010-04-07 2011-10-13 Apple Inc. System and method for content protection based on a combination of a user pin and a device specific identifier
US9912476B2 (en) 2010-04-07 2018-03-06 Apple Inc. System and method for content protection based on a combination of a user PIN and a device specific identifier
US11263020B2 (en) * 2010-04-07 2022-03-01 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US10025597B2 (en) 2010-04-07 2018-07-17 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US8756419B2 (en) 2010-04-07 2014-06-17 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US8788842B2 (en) * 2010-04-07 2014-07-22 Apple Inc. System and method for content protection based on a combination of a user PIN and a device specific identifier
US9225755B2 (en) * 2011-05-06 2015-12-29 David H. Sitrick Systems and methodologies for collaboration relative to a background image
US8806352B2 (en) 2011-05-06 2014-08-12 David H. Sitrick System for collaboration of a specific image and utilizing selected annotations while viewing and relative to providing a display presentation
US8990677B2 (en) 2011-05-06 2015-03-24 David H. Sitrick System and methodology for collaboration utilizing combined display with evolving common shared underlying image
US8924859B2 (en) 2011-05-06 2014-12-30 David H. Sitrick Systems and methodologies supporting collaboration of users as members of a team, among a plurality of computing appliances
US9224129B2 (en) 2011-05-06 2015-12-29 David H. Sitrick System and methodology for multiple users concurrently working and viewing on a common project
US11611595B2 (en) 2011-05-06 2023-03-21 David H. Sitrick Systems and methodologies providing collaboration among a plurality of computing appliances, utilizing a plurality of areas of memory to store user input as associated with an associated computing appliance providing the input
US9330366B2 (en) 2011-05-06 2016-05-03 David H. Sitrick System and method for collaboration via team and role designation and control and management of annotations
US20120284645A1 (en) * 2011-05-06 2012-11-08 David H. Sitrick Systems And Methodologies Providing Controlled Voice And Data Communication Among A Plurality Of Computing Appliances Associated As Team Members Of At Least One Respective Team Or Of A Plurality Of Teams And Sub-Teams Within The Teams
US20120284643A1 (en) * 2011-05-06 2012-11-08 David H. Sitrick System And Methodology For Collaboration in Groups With Split Screen Displays
US8918722B2 (en) * 2011-05-06 2014-12-23 David H. Sitrick System and methodology for collaboration in groups with split screen displays
US8918724B2 (en) * 2011-05-06 2014-12-23 David H. Sitrick Systems and methodologies providing controlled voice and data communication among a plurality of computing appliances associated as team members of at least one respective team or of a plurality of teams and sub-teams within the teams
US8918723B2 (en) * 2011-05-06 2014-12-23 David H. Sitrick Systems and methodologies comprising a plurality of computing appliances having input apparatus and display apparatus and logically structured as a main team
US20120284642A1 (en) * 2011-05-06 2012-11-08 David H. Sitrick System And Methodology For Collaboration, With Selective Display Of User Input Annotations Among Member Computing Appliances Of A Group/Team
US8918721B2 (en) 2011-05-06 2014-12-23 David H. Sitrick Systems and methodologies providing for collaboration by respective users of a plurality of computing appliances working concurrently on a common project having an associated display
US8914735B2 (en) 2011-05-06 2014-12-16 David H. Sitrick Systems and methodologies providing collaboration and display among a plurality of users
US10402485B2 (en) 2011-05-06 2019-09-03 David H. Sitrick Systems and methodologies providing controlled collaboration among a plurality of users
US8875011B2 (en) 2011-05-06 2014-10-28 David H. Sitrick Systems and methodologies providing for collaboration among a plurality of users at a plurality of computing appliances
US20150172335A1 (en) * 2011-05-06 2015-06-18 David H. Sitrick System for collaboration of a specific image and utilizing selected annotations while viewing and relative to providing a display presentation
US8826147B2 (en) * 2011-05-06 2014-09-02 David H. Sitrick System and methodology for collaboration, with selective display of user input annotations among member computing appliances of a group/team
US20210042434A1 (en) * 2011-08-02 2021-02-11 Api Market, Inc. Rights-based system
US11599657B2 (en) * 2011-08-02 2023-03-07 Api Market, Inc. Rights-based system
US8792637B2 (en) * 2011-11-22 2014-07-29 Combined Conditional Access Development & Support, LLC Downloading of data to secure devices
US20130129086A1 (en) * 2011-11-22 2013-05-23 Combined Conditional Access Development And Support, Llc. Downloading of Data to Secure Devices
US11115201B2 (en) * 2011-11-22 2021-09-07 Combined Conditional Access Development And Support, Llc Downloading of data to secure devices
US20140376718A1 (en) * 2011-11-22 2014-12-25 Combined Conditional Access Development & Support Downloading of data to secure devices
US8799675B2 (en) 2012-01-05 2014-08-05 House Of Development Llc System and method for electronic certification and authentication of data
US20140351586A1 (en) * 2012-02-20 2014-11-27 Lock Box Pty Ltd Cryptographic method and system
US9444624B2 (en) * 2012-11-02 2016-09-13 Facebook, Inc. Providing user authentication
US20140129834A1 (en) * 2012-11-02 2014-05-08 Jacob Andrew Brill Providing User Authentication
US20160352519A1 (en) * 2012-11-02 2016-12-01 Facebook, Inc. Providing user authentication
US10110384B2 (en) * 2012-11-02 2018-10-23 Facebook, Inc. Providing user authentication
US20180041340A1 (en) * 2012-11-02 2018-02-08 Facebook, Inc. Providing user authentication
US9819492B2 (en) * 2012-11-02 2017-11-14 Facebook, Inc. Providing user authentication
US20140289195A1 (en) * 2013-03-21 2014-09-25 Nextbit Systems Inc. Configurable application state synchronization
US9563413B2 (en) * 2013-03-21 2017-02-07 Nextbit Systems Inc. Configurable application state synchronization
US10567853B2 (en) * 2013-08-14 2020-02-18 Amtel Corporation Smart grid appliance control
US20150067540A1 (en) * 2013-09-02 2015-03-05 Samsung Electronics Co., Ltd. Display apparatus, portable device and screen display methods thereof
US20170034554A1 (en) * 2014-04-11 2017-02-02 Television Broadcast Limited Method of delivering and protecting media content
US20150379276A1 (en) * 2014-06-27 2015-12-31 Freescale Semiconductor, Inc. System on a chip, controller and method for securing data
US20190384894A1 (en) * 2015-01-28 2019-12-19 IHP GmbH - Innovations for High Performance Microelectronics/Leibniz-Institut Fur Innovative Intrinsic authentication of program code
US11061996B2 (en) * 2015-01-28 2021-07-13 Ihr Gmbh—Innovations For High Performance Microelectronics Intrinsic authentication of program code
US20160224404A1 (en) * 2015-01-29 2016-08-04 Qualcomm Incorporated Selective block-based integrity protection techniques
US9830217B2 (en) * 2015-01-29 2017-11-28 Qualcomm Incorporated Selective block-based integrity protection techniques
US11463243B2 (en) 2015-08-26 2022-10-04 Alibaba Group Holding Limited Key generation method and apparatus using double encryption
US10693634B2 (en) 2015-08-26 2020-06-23 Alibaba Group Holding Limited Key generation method and apparatus using double encryption
US10387669B1 (en) 2015-09-17 2019-08-20 Nextlabs, Inc. Protecting documents with centralized and discretionary policies
US11797703B1 (en) 2015-09-17 2023-10-24 Next Labs, Inc. Protecting documents with centralized and discretionary policies
US11132459B1 (en) 2015-09-17 2021-09-28 Nextlabs, Inc. Protecting documents with centralized and discretionary policies
EP3217276A1 (en) * 2016-03-08 2017-09-13 Ricoh Company, Ltd. Information processing system, job processing method, data storage apparatus, information device, and carrier means
US20170270020A1 (en) * 2016-03-18 2017-09-21 Kabushiki Kaisha Toshiba Information processing device, information processing method and computer program product
US10521320B2 (en) * 2016-03-18 2019-12-31 Kabushiki Kaisha Toshiba Information processing device, information processing method and computer program product
CN106326761A (en) * 2016-09-05 2017-01-11 天脉聚源(北京)传媒科技有限公司 Encryption of SN number method and device
US10673647B2 (en) * 2016-09-28 2020-06-02 Digitalitaly S.r.l. Innovativa Digital mailbox
US10867278B2 (en) * 2017-03-01 2020-12-15 Cvs Pharmacy, Inc. Intelligent pre-processing and fulfillment of mixed orders
US20180253682A1 (en) * 2017-03-01 2018-09-06 Cvs Pharmacy, Inc. Intelligent Pre-Processing and Fulfillment of Mixed Orders
US11610179B2 (en) 2017-03-01 2023-03-21 Cvs Pharmacy, Inc. Intelligent pre-processing and fulfillment of mixed orders
US10476662B2 (en) * 2017-04-10 2019-11-12 City University Of Hong Kong Method for operating a distributed key-value store
US10833857B2 (en) * 2018-01-29 2020-11-10 International Business Machines Corporation Encryption key management in a data storage system communicating with asynchronous key servers
US20190319784A1 (en) * 2018-04-12 2019-10-17 Mastercard International Incorporated Method and system for managing centralized encryption and data format validation for secure real time multi-party data distribution
US10911227B2 (en) * 2018-04-12 2021-02-02 Mastercard International Incorporated Method and system for managing centralized encryption and data format validation for secure real time multi-party data distribution
US20220311609A1 (en) * 2018-05-25 2022-09-29 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption
US10891391B2 (en) * 2018-08-29 2021-01-12 International Business Machines Corporation Remote file storage with multiple access levels
US11263328B2 (en) * 2018-09-13 2022-03-01 Vmware, Inc. Encrypted log aggregation
US11126739B2 (en) 2018-12-12 2021-09-21 Advanced New Technologies Co., Ltd. Invoice access method and apparatus based on blockchain, and electronic device
WO2020119306A1 (en) * 2018-12-12 2020-06-18 阿里巴巴集团控股有限公司 Blockchain-based invoice access method and apparatus, and electronic device
US11934549B2 (en) 2018-12-12 2024-03-19 Advance New Technologies Co., Ltd. Invoice access method and apparatus based on blockchain, and electronic device
US11386426B2 (en) 2018-12-27 2022-07-12 Advanced New Technologies Co., Ltd. Invoice invalidation method and apparatus based on blockchain, and electronic device
US20220156411A1 (en) * 2019-08-29 2022-05-19 Google Llc Securing External Data Storage for a Secure Element Integrated on a System-on-Chip
US11032062B2 (en) * 2019-09-17 2021-06-08 Switchbit, Inc. Data processing permits system with keys
US20210297236A1 (en) * 2019-09-17 2021-09-23 Ketch Kloud, Inc. Data processing permits system with keys
US20210297237A1 (en) * 2019-09-17 2021-09-23 Ketch Kloud, Inc. Data processing permits system with keys
US11811907B2 (en) * 2019-09-17 2023-11-07 Ketch Kloud, Inc. Data processing permits system with keys
US11870882B2 (en) * 2019-09-17 2024-01-09 Salesforce, Inc. Data processing permits system with keys
GB2609621B (en) * 2021-08-05 2023-09-27 Olive Innovations Ltd Communication security module and method of secure communication
WO2023012444A1 (en) * 2021-08-05 2023-02-09 Olive Innovations Ltd Security module and method of scure communication
GB2609621A (en) * 2021-08-05 2023-02-15 Olive Innovations Ltd Communication security module and method of secure communication
CN114338154A (en) * 2021-12-28 2022-04-12 北京易华录信息技术股份有限公司 User identity authentication method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
US9679118B2 (en) 2017-06-13
US11868447B2 (en) 2024-01-09
US11461434B2 (en) 2022-10-04
US20170053123A1 (en) 2017-02-23
US20210232660A1 (en) 2021-07-29
US20230027550A1 (en) 2023-01-26
US20180129788A1 (en) 2018-05-10
US10176305B2 (en) 2019-01-08
US11003742B2 (en) 2021-05-11
US20190311088A1 (en) 2019-10-10

Similar Documents

Publication Publication Date Title
US11868447B2 (en) Method and system for secure distribution of selected content to be protected
US11664984B2 (en) Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US8619982B2 (en) Method and system for secure distribution of selected content to be protected on an appliance specific basis
US11366878B2 (en) Method and apparatus for delivering encoded content
TW514844B (en) Data processing system, storage device, data processing method and program providing media
JP4366037B2 (en) System and method for controlling and exercising access rights to encrypted media
KR101287518B1 (en) Apparatus and method for digital rights management for epub-based contents, and apparatus and method for providing epub-based contents according to user authority
US20060149683A1 (en) User terminal for receiving license
KR20130056343A (en) Improvements in watermark extraction efficiency
EP2466511B1 (en) Media storage structures for storing content and devices for using such structures
US6711553B1 (en) Method and apparatus for digital content copy protection
JP2007280180A (en) Electronic document
KR20020067663A (en) Data distribution system
WO2013075673A1 (en) Method, system, and server for digital copyright management
US20050060544A1 (en) System and method for digital content management and controlling copyright protection
JP2004318645A (en) Radio tag security extension method, id management computer system, proxy server device, their programs, and recording medium of programs
US20210303640A1 (en) Document management system, processing terminal device, and control device
KR101049472B1 (en) A portable USB security module device, a method of registering and querying a document file using the portable USB security module device, and a program recording medium for executing the method
JP4192738B2 (en) Electronic document editing device, electronic document editing program
JP2005175652A (en) Content distribution system
JP2000269953A (en) Generating method and browsing method for ciphered file
JP2000349749A (en) Secret key management device and computer readable recording medium
JP2000298622A (en) Method for generating and reading ciphered file, and electronic information exchanging method using the method

Legal Events

Date Code Title Description
AS Assignment

Owner name: SITRICK, DAVID H., ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLING, RUSSELL T.;REEL/FRAME:018410/0788

Effective date: 20061010

AS Assignment

Owner name: SITRICK, DAVID H., ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FLING, RUSSELL T.;REEL/FRAME:021665/0452

Effective date: 20081003

AS Assignment

Owner name: BASSILIC TECHNOLOGIES LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SITRICK, DAVID H.;REEL/FRAME:021763/0156

Effective date: 20080909

AS Assignment

Owner name: OL SECURITY LIMITED LIABILITY COMPANY, DELAWARE

Free format text: MERGER;ASSIGNOR:BASSILIC TECHNOLOGIES LLC;REEL/FRAME:037347/0270

Effective date: 20150826

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION