GB2382160A - System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted - Google Patents
System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted Download PDFInfo
- Publication number
- GB2382160A GB2382160A GB0119427A GB0119427A GB2382160A GB 2382160 A GB2382160 A GB 2382160A GB 0119427 A GB0119427 A GB 0119427A GB 0119427 A GB0119427 A GB 0119427A GB 2382160 A GB2382160 A GB 2382160A
- Authority
- GB
- United Kingdom
- Prior art keywords
- blocks
- file
- subblocks
- keys
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The method and apparatus for storing and transmitting multimedia files disclosed splits the file in blocks and sub-blocks as required by the level of security requested. The encrypted blocks 11 are placed on separate severs 4 and the transfer order of the blocks is also encrypted. The blocks are decrypted on a continuous basis as required by the player 2 without the file 5 being stored as a complete encrypted form. The file could need to be completely downloaded before playback begins. Also some or all of the contents of the blocks could be encrypted. Also the encryption keys 8, 9 could be unique for each recipient/user and/or with a link to the media-player and/or with the device 2 to be used to playback the file.
Description
1 2382160
MECHANISM FOR STORING, TRANSFERRING, ENCRYPTING AND
LOCKING MULTI-MEDIA FILES
The present invention relates to a method and 5 apparatus for storing and transferring multi-media files in an encrypted form whereby the content is retained in a form that provides protection against unwanted copying and distribution.
Where it is desired to provide users with content in 10 the form of files written in a machine-readable format it is common that such files easily lend themselves to being copied, duplicated and distributed Whilst this is of significant benefit to the content provider during the initial provision of the content to the original customer 15 it can become a liability where the content provider seeks to ensure that copyright is not violated.
The present invention describes apparatus and a method for enabling this content to be stored and distributed electronically, for example over a network, 20 whilst ensuring that it remains in a form that protects against unauthorized copying, distribution and usage.
Where the multi-media data is decrypted and returned to a format that can be directly replayed it is passed immediately for playback and never stored in that format.
25 It is therefore significantly more difficult for the user to locate a file that exists in a format that may be copied and distributed without copyright control.
The system utilizes a technique of breaking the original file down into much smaller blocks. Just as a 30 jigsaw puzzle is only complete when all the pieces have been located and re-assembled in the correct order, the multi-media file is only complete when all the individual blocks have been re-assembled. In addition, it is possible to break down each block into sub-blocks and 35 similarly re-order the blocks.
Using this technique it is possible to unscramble the order of the various blocks and sub-blocks according to a pre-arranged scheme and an appropriate key and to
achieve this during the playback process thus avoiding the need to store the file in a decrypted format.
The technique is particularly useful where the information processing power of the playback machine is 5 limited. It is also possible to add various standard mathematical encryption techniques to a very small segment of the content, for instance it would be possible to encrypt one single sub-block within each block.
The innovation delivers a number of benefits to the 10 content provider by providing an inherently high level of security throughout the storage and delivery process and by integrating easily with existing techniques to significantly increase the level of security offered.
An example would be where it is desired to supply 15 high quality video to the user of a personal computing device. It may be envisaged that decrypting such a file during the playback may present the computer with an excessive load and cause playback to falter. It may also be envisaged that the re-ordering of the various blocks 20 and sub-blocks may be arranged to present a much lighter loading. The introduction of further mathematical
encryption on only a small selection of sub-blocks may increase the level of security offered whilst maintaining an acceptable level of performance.
25 This breaking down into blocks and sub-blocks also provides benefits to the supplier in that additional security may be provided at the point where the master copies are stored. As an example it is possible to distribute the various blocks and sub-blocks to different 30 locations, for instance on different servers distributed to different locations around a network or around the Internet Thus a single security violation at a server would only give the intruder access to a random selection of blocks from the file, the greater the number of 35 locations the higher the level of security. An intruder determined to steal an original copy of the file would need access to all the servers holding blocks for the
multi-media file and to all keys required to re-assemble and decrypt the data.
In accordance with the present invention, we provide apparatus for splitting the multi-media file into 5 numerous blocks and re-arranging, storing, transmitting and then re-assembling these blocks according to an algorithm and an associated key, as follows: a. generating a first key using a mathematical or random scheme; 10 b. splitting the multi-media file into numerous blocks according to an algorithm and the first key; c, generating a second key using a mathematical or random scheme; 15 d, encrypting the individual blocks and sub blocks according to the second key; e, generating a third key using a mathematical or random scheme; f. storing the numerous blocks and sub-blocks 20 in several places according to an algorithm and the third key; g. storing the various keys in different locations remote from the numerous blocks and sub-blocks of data; 25 h. providing the various keys to the authorised users at the appropriate time; i. downloading the numerous blocks and sub blocks to the user as indicated by third key; j, storing the numerous blocks and sub-blocks 30 on the target machine until required; k, obtaining any further authorization or keys from the content supplier as may be required; 1. retrieving the numerous blocks and sub 35 blocks in order as determined by the first key; m. decrypting the blocks and sub-blocks according to the second key; and
n. passing the multi-media data directly to the playback device.
Also, in accordance with the present invention, we provide a method for splitting the multi-media file into 5 numerous blocks and sub-blocks and re-arranging, storing, transmitting and then re-assembling these blocks and sub-
blocks according to an algorithm and an associated key, as follows: a. generating a first key using a 10 mathematical or random schemes b. splitting the multi-media file into numerous blocks and sub-blocks according to an algorithm and the first key; c. generating a second key using a 15 mathematical or random scheme; d. encrypting the individual blocks according to the second key; e. generating a third key using a mathematical or random scheme; 20 f. storing the numerous blocks and subblocks in several places according to an algorithm and the third key; g. storing the various keys in different locations remote from the numerous blocks and 25 sub-blocks of data; h. providing the various keys to the authorised users at the appropriate time; i. downloading the numerous blocks and sub blocks to the user as indicated by third key; 30 j. storing the numerous blocks and sub-blocks on the target machine until required; k. requesting the playback of the multi-media file from the Decryption Object; 1. obtaining any further authorization or 35 keys from the content supplier as may be required; m. retrieving the numerous blocks and sub blocks in order as determined by the first key;
n. decrypting the blocks and sub-blocks according to the second key; and o. passing the multi-media data directly to the playback device.
Examples of the present invention will now be described with reference to the accompanying drawings, in which: Figure 1 is a diagram of apparatus in a standard arrangement configured to replay multi-media files lo showing the flow of data; and Figure 2 is a diagram of apparatus operating in accordance with the present invention to replay multi-
media files showing the flow of data; and Figure 3 is a diagram representing a single file of 15 multi-media data in a standard arrangement; and Figure 4 is a diagram representing a multi-media file split into numerous blocks; and Figure 5 is a diagram representing a multi-media file split into numerous blocks and the order of the 20 blocks then re-arranged according to a scheme; and Figure 6 is a diagram representing a multi-media file split into numerous blocks and rearranged and showing as an example a single block split into sub-
blocks and re-arranged, all according to a scheme.
The apparatus Figure 1 is a diagram of apparatus operating conventionally to replay multi-media files. Multi-media 30 files may include various content for example video, audio, presentations, images, animations, games, software or more simple files such as text documents.
The multi-media file would normally be stored as a disk file 4 in the original multi-media format 5 which 3s can be played by an appropriate media player 2 and any associated codec (coder-decoder). The output to the user would be passed through an appropriate replay apparatus for example a screen, games console, loudspeakers etc.
It can be easily seen that anyone with the appropriate media player can copy the disk file and make unrestricted use of the same content. Thus a file may be copied and distributed extensively outside of the control 5 of the content provider.
Figure 2 is a diagram of apparatus operating in accordance with the current invention. The Decryption Object 6 receives a request from the Media Player 2 to provide the multi-media data. In turn, the Decryption 10 Object accesses the file in the encrypted format ll and decrypts this data according to the keys passed by the Key Manager 7. The keys from the key manager may be provided from various sources and linked to other factors as additional security, for example they may be linked to 15 hardware serial numbers 8, operating system serial numbers 9 or authorized from external sources lo such as the Internet.
The multi-media file is then passed on a continuous basis, such as streaming or in a similar manner, in the 20 native multi-media format 5.
It can be seen that the apparatus may be provided entirely as software to be loaded on to an information-
processing device or as hardware to be incorporated in or attached to such a device or as a combination of both.
25 Examples of such devices would include computers, personal computers, portable computers of various sizes and other devices incorporating such computing facilities such as Personal Digital Assistants, Personal Organisers and Schedulers, mobile telephone instruments etc. The method Figure 3 is a diagram representing a single multi-
media file with a start 20 and an end 21. The native format of the file is determined by the type of content 35 and will vary from file to file. This may include for example MPEG, WAV, MP3, AVI and MOV amongst others. This file is usually read by the file system from the disk store as required. It is commonly possible to copy such a
multi-media file and transfer it to another similar machine without regard to copyright restrictions.
Figure 4 shows a similar multi-media file split into blocks, with the letters identifying the correct order of 5 the blocks A to H. Figure 5 shows a similar multi-media file with the blocks rearranged according to some scheme. The blocks may be of uniform size or may vary in size from block to block. The key to identify the scheme being used and 10 therefore to unscramble the file may be included within the file or provided separately and may be suitably encrypted. Figure 6 shows the same multi-media file and illustrates the use of sub-blocks and a similar re 15 ordering process applied to these. Additional encryption may added to all blocks and sub-blocks or alternatively to a sub-set only. This has the advantage that the decryption process can be tailored to suit the power of the playback machine whilst still offering an adequate 20 level of protection to prevent the unauthorized playback of various formats of multi-media content.
The user will gain the following benefits from the system: the ability to access various material for 25 playback where the availability may be otherwise restricted due to copyright concerns; and an appropriate level of playback performance on computing machines that have 30 relatively restricted computing power.
The supplier of the product, service or information will gain the following benefits from the system: convenient distribution of material without 3s significant loss of copyright control; easily varied levels of security by varying block sizes;
optionally increased security by additional mathematical encryption to a variable number of block and sub-blocks; and increased market penetration due to 5 increased compatibility with existing lower power computing devices.
Appendix A Each of the major components will now be described in brief.
Replay device l The replay device l is used to physically present the multi-media content to the user and is likely to be part of the existing playback instrument, for instance a 10 screen or loudspeakers attached to computing device.
Multi-media player 2 The multi-media player 2 takes the data file presented to it in the native format 5 and replays it in 15 a form that can be presented to the replay device for presentation to the user. Conversion from the native format is achieved by use of an appropriate coder-decoder (codec) 3 to match the native format.
20 Codec 3 The coder-decoder (codec) 3 enables the decoding of the multimedia file's own native format. Various codecs may be utilised by the multi-media player to match the various native formats being played. Additional codecs 25 may be installed to suit new native formats as these become common.
Disk file 4 The disk file 4 is the bulk storage method most 30 commonly used with computing devices for long-term storage. In this example it is a data file located on a physical disk drive although this can be equally well applied to CD drives or memory arrays or other similar devices. Native format 5 The native file format 5 is any file format commonly used for multi-media files and this format may be used at
various points within the system. Examples of commonly used formats would include MPEG, AVI, MOV, MP3 and WAV.
Decryption object 6 5 The decryption object 6 is responsible for applying the various algorithms and schemes to the encrypted format ll in order to translate it back into the original native format 5. This is achieved with the help of various keys provided for the purpose. The encrypted 10 format file ll is read from the disk file 4 as required.
The translated multi-media file is provided to the multi media player on a continuous basis as it is required and is not stored as a complete file at any time thus there never exists a complete unencrypted file that may be 15 copied. The decryption object may exist as software or hardware or a combination of the two.
Key manager 7 The key manager 7 provides the keys from various 20 sources as required by the decryption object. The source of the various keys may vary with the application: Harware key 8 The hardware key 8 may be a number or identifier 25 related to the machine being used for playback. For example this might be a processor serial number or network board address or similar. In this way the playback of the multi-media can be locked to a specific playback device.
Software key 9 The software key 9 may be number or identifier related to a specific piece of software or data. For example this might be the operating system registration 35 number or similar.
External key lo The external key lo is any key or keys that may be supplied externally. For instance this may be the keys 5 supplied with the encrypted data file, keys subsequently provided in return for payment or various other keys entered manually or supplied automatically from a remote source such as a network or the Internet.
10 Encrypted format It The encrypted format.ll is that format supplied to the user. The encryption scheme will include the re-
arranged blocks and sub-blocks and may also include other mathematical encryption within a number of these blocks 15 and sub-blocks. The encrypted format file may also include various additional control and key information related to the decryption process and this additional data may itself be encrypted.
Claims (14)
1. A method of storing and electronically distributing multimedia files in encrypted format and playing them back comprising the steps of: splitting the files into blocks and subblocks according to the level of security required placing the blocks and subblocks onto different data servers such that no one server contains all the lo blocks required to reconstruct a file encrypting the transfer order of the blocks and subblocks according to keys and as required by the desired level of security decrypting the blocks and subblocks according to the 15 keys to present a multimedia file or files in native format to the multimedia player on a continuous basis as required by the player without it or them ever being stored as a complete unencrypted file.
20
2. A method according to Claim 1 whereby the
multimedia file to be played cannot be started until all the blocks and sub blocks comprising the file have been transferred in encrypted order to the playback device.
3. A method according to Claim 1 or Claim 2 whereby the contents of some of the blocks or subblocks are encrypted.
30
4. A method according to Claim 1 or Claim 2 whereby the contents of all of the blocks and subblocks are encrypted.
5. A method according to any of the preceding
claims whereby the keys determining the transfer order of the blocks and subblocks that comprise a multimedia file are different for different recipients.
5
6. A method according to any of the preceding claims whereby the keys determining the transfer order of the blocks and subblocks that comprise a multimedia file are unique for each recipient.
lo
7. A method according to any of the preceding claims whereby the keys that enable a multimedia file to be played are linked to a unique identifier of either the playback device and / or the user, thus preventing unauthorized 15 access to the media.
8. An apparatus for storing and electronically distributing multimedia files in encrypted format and playing them back comprising: 20 Means for splitting the files into blocks and subblocks according to the level of security required Means for placing the blocks and subblocks onto different data servers such that no one server 25 contains all the blocks required to reconstruct a file Means for encrypting the transfer order of the blocks and subblocks according to keys and as required by the desired level of security 30 Means for decrypting the blocks and subblocks according to the keys to present a multimedia file or files in native format to the multimedia player on a continuous basis as required by the player
without it or them ever being stored as a complete unencrypted file.
9. An apparatus according to Claim 8 comprising 5 means to decrypt the multimedia file such that decryption cannot be started until all the blocks and sub blocks comprising the file have been transferred in encrypted order to the playback device.
lo
10. An apparatus according to Claim 8 or Claim 9 comprising the means to encrypt the contents of some of the blocks or subblocks.
11. An apparatus according to Claim 8 or Claim IS 9 comprising the means to encrypt the contents of all of the blocks or subblocks.
12. An apparatus according to any of Claims 8 to 11 Comprising the means such that the keys 20 determining the transfer order of the blocks and subblocks that comprise a multimedia file are different for different recipients.
13. An apparatus according to any of Claims 8 25 to 11 comprising the means such that the keys determining the transfer order of the blocks and subblocks that comprise a multimedia file are unique for each recipient.
30
14. An apparatus according to any of Claims 8 to 13 comprising the means to enable the keys that enable a multimedia file to be played are linked to a unique identifier of either the playback device and /
or the user, thus preventing unauthorized access to the media.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0119427A GB2382160A (en) | 2001-08-09 | 2001-08-09 | System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted |
PCT/GB2002/003679 WO2003021907A1 (en) | 2001-08-09 | 2002-08-09 | Mechanism for storing, transferring, encrypting and locking multi-media files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0119427A GB2382160A (en) | 2001-08-09 | 2001-08-09 | System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0119427D0 GB0119427D0 (en) | 2001-10-03 |
GB2382160A true GB2382160A (en) | 2003-05-21 |
Family
ID=9920091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0119427A Withdrawn GB2382160A (en) | 2001-08-09 | 2001-08-09 | System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2382160A (en) |
WO (1) | WO2003021907A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7283587B2 (en) | 2003-12-18 | 2007-10-16 | Intel Corporation | Distortion measurement |
US7483485B2 (en) | 2005-01-24 | 2009-01-27 | Moderator Systems, Inc. | Wireless event authentication system |
US7496140B2 (en) | 2005-01-24 | 2009-02-24 | Winningstad C Norman | Wireless event authentication system |
FR2895183B1 (en) * | 2005-12-19 | 2008-02-15 | Canon Kk | METHODS OF STORING AND RECONSTITUTION OF DECOMPOSED CONTENT IN THE FORM OF INTERMEDIATE CONTENTS, COMPUTER PROGRAM PRODUCT, STORAGE MEDIUM AND CORRESPONDING NODES. |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5199066A (en) * | 1989-04-18 | 1993-03-30 | Special Effects Software, Inc. | Method and apparatus for protecting software |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
JP2000059355A (en) * | 1998-08-04 | 2000-02-25 | Dainippon Printing Co Ltd | Enciphering processing system |
JP2001290707A (en) * | 2000-04-05 | 2001-10-19 | Kazumi Mochizuki | Method and device for data processing and computer- readable storage medium with data processing program stored thereon |
EP1251425A2 (en) * | 2001-04-18 | 2002-10-23 | Fujitsu Limited | Very long instruction word information processing device and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5680400A (en) * | 1995-05-31 | 1997-10-21 | Unisys Corporation | System for high-speed transfer of a continuous data stream between hosts using multiple parallel communication links |
US5757922A (en) * | 1995-12-08 | 1998-05-26 | Nippon Telegraph & Telephone Corp. | Method and system for packet scrambling communication with reduced processing overhead |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
JP3625983B2 (en) * | 1997-03-12 | 2005-03-02 | 三菱商事株式会社 | Data management system |
US6339785B1 (en) * | 1999-11-24 | 2002-01-15 | Idan Feigenbaum | Multi-server file download |
-
2001
- 2001-08-09 GB GB0119427A patent/GB2382160A/en not_active Withdrawn
-
2002
- 2002-08-09 WO PCT/GB2002/003679 patent/WO2003021907A1/en not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5199066A (en) * | 1989-04-18 | 1993-03-30 | Special Effects Software, Inc. | Method and apparatus for protecting software |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
JP2000059355A (en) * | 1998-08-04 | 2000-02-25 | Dainippon Printing Co Ltd | Enciphering processing system |
JP2001290707A (en) * | 2000-04-05 | 2001-10-19 | Kazumi Mochizuki | Method and device for data processing and computer- readable storage medium with data processing program stored thereon |
EP1251425A2 (en) * | 2001-04-18 | 2002-10-23 | Fujitsu Limited | Very long instruction word information processing device and system |
Also Published As
Publication number | Publication date |
---|---|
GB0119427D0 (en) | 2001-10-03 |
WO2003021907A1 (en) | 2003-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11727376B2 (en) | Use of media storage structure with multiple pieces of content in a content-distribution system | |
JP4921966B2 (en) | Method and system for secure network-based content delivery | |
US6813711B1 (en) | Downloading files from approved web site | |
TWI294072B (en) | Method of communicating digital data, method of processing a data file and digital rights management module | |
US6917923B1 (en) | Approved web site file downloading | |
US20190147143A1 (en) | Decoupling rights in a digital content unit from download | |
US7170999B1 (en) | Method of and apparatus for encrypting and transferring files | |
US8595492B2 (en) | On-demand protection and authorization of playback of media assets | |
US20040125957A1 (en) | Method and system for secure distribution | |
JP2000267940A (en) | Device and method for ciphering digital file, and recording medium therefor | |
JP2008508595A (en) | System and method for enabling a device in response to rights protection | |
WO2004027622A2 (en) | Method and system for secure distribution | |
US10078737B2 (en) | System and method for securely retrieving and playing digital media | |
GB2382160A (en) | System for encrypting multimedia files for transmission or storage as a set of data blocks in which the re-assembly order has been encrypted | |
KR100320181B1 (en) | Encryption method for digital data file | |
JP2006511854A (en) | How to distribute information content | |
US20130232581A1 (en) | System and method for securely retrieving and playing digital media | |
KR100320182B1 (en) | Encryption method for digital data file | |
KR100320180B1 (en) | Encryption method for digital data file | |
WO2006000029A1 (en) | Content delivery system and player | |
KR20060065210A (en) | Encryption/decryption module for using multimedia data and contents management system program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |