[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20030012385A1 - Data copyright management system - Google Patents

Data copyright management system Download PDF

Info

Publication number
US20030012385A1
US20030012385A1 US10/227,309 US22730902A US2003012385A1 US 20030012385 A1 US20030012385 A1 US 20030012385A1 US 22730902 A US22730902 A US 22730902A US 2003012385 A1 US2003012385 A1 US 2003012385A1
Authority
US
United States
Prior art keywords
data
key
secret
user
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/227,309
Inventor
Makoto Saito
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Piracy Protection LLC
Xylon LLC
Original Assignee
Mitsubishi Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/476,335 external-priority patent/US6449717B1/en
Application filed by Mitsubishi Corp filed Critical Mitsubishi Corp
Priority to US10/227,309 priority Critical patent/US20030012385A1/en
Publication of US20030012385A1 publication Critical patent/US20030012385A1/en
Assigned to INTARSIA SOFTWARE LLC reassignment INTARSIA SOFTWARE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MITSUBISHI CORPORATION
Assigned to INTARSIA SOFTWARE LLC reassignment INTARSIA SOFTWARE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MITSUBISHI CORPORATION
Assigned to MITSUBISHI CORPORATION reassignment MITSUBISHI CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOMIKI, SHUNICHI, SAITO, MAKOTO
Assigned to LF CAPITAL PARTNERS, LLC reassignment LF CAPITAL PARTNERS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASSETS 121 LLC
Assigned to PIRACY PROTECTION LLC reassignment PIRACY PROTECTION LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LF CAPITAL PARTNERS, LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/605Copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Definitions

  • the present invention relates to a system for managing copyrights for using, storing, copying, editing, or transferring digital data, particularly in multimedia applications.
  • Multimedia systems is an emerging technology of the future capable of simultaneously handling the data handled by computers and digitized picture data.
  • the inventors of the present invention proposed a system for copyright management, wherein a permit key is obtained from a key control center via a public telephone line in Japanese Patent Laid-Open No. 46419/1994 and Japanese Patent Laid-Open No. 141004/1994.
  • Japanese Patent Laid-Open No. 132916/1994 to the same inventors also discusses an apparatus for copyright management and control.
  • the database copyright management system of the prior applications use one or any combination of the copyright control program, the copyright information, and the copyright control message in addition to a permit key corresponding to a request.
  • the copyright control message is displayed on a screen and advises or warns the user if the data is utilized in a manner inconsistent with the user's request permission.
  • the copyright control program watches and controls data use so that the data is not utilized beyond the conditions of the user's request or permission.
  • the copyright control program, the copyright information and the copyright control message are supplied together with a permit key in some cases, but they may be supplied with data in other cases. It is also possible to supply a part of them together with the permit key, and to supply the other part with the data.
  • the permit key, the copyright control message, the copyright information, or the copyright control program there are the following three cases: they are transmitted in encrypted form and decrypted upon use; they are transmitted in encrypted form and decrypted only when they are displayed; or they not encrypted at all.
  • the present invention provides a data copyright management system comprising a database for storing original data, a key control center for managing a crypt key, a copyright management center for managing a data copyright.
  • a communication network is provided to connect the database, the key control center, and the copyright management center, wherein data from the database is encrypted and the user decrypts the data with a crypt key obtained from the key control center or the copyright management center.
  • a cryptographic system uses a copyright control program for managing data copyrights.
  • the data is encrypted by a crypt key, which is obtained from the key control center or from the copyright management center, or generated by the copyright control program.
  • the present invention can be applied to copyright control not only a single data value but also a plurality of data values from a single database or a plurality of data values supplied from a plurality of databases. Further, an apparatus is also proposed for performing data copyright management.
  • FIG. 1 illustrates a data copyright management system for embodiments 1, 2, and 3 of the present invention.
  • FIG. 2 illustrates a data copyright management system of embodiment 4 of the present invention.
  • FIG. 3 illustrates a data copyright management system for embodiments 5, 6, and 7 of the present invention.
  • FIG. 4 illustrates a data copyright management system for embodiments 8, 9, 10 and 11 of the present invention.
  • FIG. 5 illustrates a data copyright management system for embodiments 12 and 13 of the present invention.
  • FIG. 6 is an illustration for data editing.
  • FIG. 7 is an illustration showing a digital cash system.
  • FIG. 8 illustrates a digital cash system for embodiments 17 and 18 of the present invention.
  • FIG. 9 illustrates a video conference system for embodiment 19 of the present invention.
  • FIG. 10 illustrates an embodiment of a user terminal used for the data copyright management system of the present invention.
  • the present invention is a database copyright management system described with respect to multimedia applications.
  • numerous specific details are set forth to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention.
  • the cryptography system in general, includes a secret-key cryptosystem and a public-key cryptosystem.
  • the secret-key cryptosystem is a cryptosystem in which the same crypt key is used for encryption and decryption. Although this cryptosystem requires relatively shorter time for encryption or decryption, once the secret-key is known, the cryption can be cryptanalyzed.
  • the public-key cryptosystem is a cryptosystem which provides two keys: a key for encryption open to the public as a public-key and a key for decryption not open to the public.
  • the key for encryption is referred to as a public key and the key for decryption is referred to as a private key.
  • a party transferring information encrypts the information with a public-key of a receiving party and the receiving party decrypts the information with a private-key. While this cryptosystem requires relatively longer time for encryption or decryption, the private-key is hard to find and it is very difficult to cryptanalyze the cryption.
  • the cryptosystem used for the present invention uses a secret-key cryptosystem in which the same secret-key Ks is used for encryption and decryption, and a public-key cryptosystem in which a public-key Kb is used for encryption of a plaintext and a private-key Kv is used for decryption of a cryptogram.
  • the present invention applies the data copyright management method proposed in the Japanese Patent Application No. 64889/1994 to provide a data copyright management system.
  • FIG. 1 shows the first embodiment of the data copyright management system of the present invention.
  • the first embodiment uses the secret-key system as a cryptosystem.
  • FIG. 1 comprises database 1 in which text data, binary data serving as a computer graphic display or a computer program, digital audio data, and digital picture data are stored in encrypted form, space satellite 2 such as a communications satellite or a broadcasting satellite, data recorder 3 such as a CD-ROM or a flexible disk, communication network 8 such as a public telephone line offered by a communication enterprise or a CATV (cable TV) line offered by a cable television enterprise, primary user terminal 4 , key control center 9 for managing a secret-key, and copyright management center 10 for managing data copyrights.
  • space satellite 2 such as a communications satellite or a broadcasting satellite
  • data recorder 3 such as a CD-ROM or a flexible disk
  • communication network 8 such as a public telephone line offered by a communication enterprise or a CATV (cable TV) line offered by a cable television enterprise
  • primary user terminal 4 key control center 9 for managing a secret-key
  • copyright management center 10 for managing data copyrights.
  • Reference numerals 5 , 6 , and 7 represent a secondary user terminal, a tertiary user terminal, and n-order user terminal respectively
  • 11 , 12 , and 13 represent a secondary disk, tertiary disk, and n-order disk serving as a recording medium such as a flexible disk or CD-ROM respectively.
  • the symbol “n” represents an optional integer. When “n” is larger than 4, a corresponding user terminal and a corresponding disk are arranged between tertiary user terminal 6 and the n-order user terminal 7 and between the tertiary disk 12 and the n-order disk 13 respectively.
  • database 1 key control center 9 , copyright management center 10 , primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 , and n-order user terminal 7 are connected to communication network 8 .
  • the broken line indicates encrypted data flow
  • the solid line indicates requests from each user terminal
  • the one-dot chain line indicates authorization information corresponding to a utilization request and a secret-key are transferred.
  • the database utilization software includes not only normal communication software such as a data communication protocol but also a program for running a copyright control program.
  • Original data MO such as text data, binary data as a computer graphic display or computer program, digital audio data, or digital picture data stored in database 1 or data recording medium 3 is one-way supplied to primary user terminal 4 via the satellite 2 or recording medium 3 .
  • the data is encrypted with a first secret-key Ks 1 :
  • Japanese Patent Application No. 64889/1994 discloses that the data utilization includes not only displaying of data but also storing, editing, copying, and transferring of the data, and that a use permit key is prepared for one or several forms of use and its management is executed by the copyright control program. It is further described in the Japanese application that data is encrypted again by the copyright control program for storing, copying, editing and transferring of the data other than display and edit operations. Thus, the data is encrypted for distribution, and decrypting is performed only when for display or edit operations in a user terminal with a copyright handling capability.
  • a primary user who desires primary utilization of the encrypted data Cm 0 ks 1 makes a request by sending the original data name or the original data number to key management center 9 via communication network 8 from primary user terminal 4 .
  • the primary user must present information Iu 1 for primary user to key management center 9 .
  • Key management center 9 receiving the primary utilization request from primary user terminal 4 transfers the first secret-key Ks 1 for decrypting the encrypted original data Cm 0 ks 1 obtained from database 1 by the primary user and the second secret-key Ks 2 for re-encrypting the decrypted original data M 0 or edited data M 1 from the original data, together with a copyright control program P via communication network 8 to primary user terminal 4 .
  • the encrypted original data Cm 0 ks 1 is decrypted by using the copyright control program P and the first secret-key Ks 1 to use the decrypted original data M 0 directly or data M 1 as edited.
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the data M which can be the original data M 0 or edited data M 1
  • a memory or a built-in hard disk drive of primary user terminal 4 only the primary user can use the data.
  • the data M is copied to external recording medium 11 such as a flexible disk or transmitted to secondary user terminal 5 via communication network 8 , a copyright problem due to secondary utilization might occur.
  • the data M is encrypted by the second secret-key Ks 2 using the copyright control program P when the data M is stored, copied, or transferred. Thereafter, in primary user terminal 4 , the data M is decrypted and encrypted by the second secret-key Ks 2 :
  • M D(Ks 2 , Cmks 2 ).
  • the data M is moved from primary user terminal 4 to secondary user terminal 5 by external recording medium 11 or communication network 8 .
  • external recording medium 11 or communication network 8 When the data M is copied to external recording medium 11 or transmitted via communication network 8 , it is encrypted by the second secret-key Ks 2 .
  • a secondary user who desires secondary utilization of the encrypted data Cmks 2 copied or transmitted from a primary user must present original data name or data number to copyright management center 10 via communication network 8 by secondary user terminal 5 and also present the secondary user information Iu 2 to request secondary utilization of the data Cmks 2 to the center 10 .
  • the secondary user further presents the uncrypted primary user information Iu 1 added to the encrypted data Cmks 2 in order to clarify the relationship with the primary user.
  • Copyright management center 10 confirms that the primary user has received a regrant of the second secret-key Ks 2 for secondary utilization of the data, in accordance with the presented primary user information Iu 1 . Copyright management center 10 , then, transfers the second secret-key Ks 2 serving as a decryption key and the third secret-key Ks 3 serving as an encryption/decryption key to secondary user terminal 5 via communication network 8 .
  • M D(Ks 2 , Cmks 2 )
  • key control center 9 processes a primary utilization requests and copyright management center 10 processes a secondary utilization requests. While the data M supplied to a primary user is encrypted by the first secret-key Ks 1 , the data M supplied to a secondary user is encrypted by the second secret-key Ks 2 . Further, the first secret-key Ks 1 and the second secret-key Ks 2 are transferred to the primary user as crypt keys from key control center 9 .
  • the secondary user instead of the primary user, falsely makes a request for primary utilization to key control center 9 , the first secret-key Ks 1 for decryption and the second secret-key Ks 2 for encryption/decryption are transferred to the secondary user.
  • the secondary user cannot decrypt the encrypted data Cmks 2 by using the first secret-key Ks 1 transferred as a decryption key.
  • the data M is encrypted using the third secret-key Ks 3 by the copyright control program P and thereafter, the data is decrypted and encrypted by the third secret-key Ks 3 :
  • M D(Ks 3 , Cmks 3 ).
  • the fact that the secondary user receives a regrant of the third secret-key Ks 3 represents secondary utilization of data in which the data M has been copied to external recording medium 12 or transmitted to tertiary user terminal 6 via communication network 8 . Therefore, the fact is entered in copyright management center 10 and allows the secondary user for further data use.
  • the data M is moved from secondary user terminal 5 to tertiary user terminal 6 by external recording medium 12 or by communication network 8 .
  • the data M is copied to external recording medium 12 or transmitted via communication network 8 , it is encrypted by the third secret-key Ks 3 .
  • the second secret-key Ks 2 and the third secret-key Ks 3 in secondary user terminal 5 are disused.
  • the uncrypted secondary user information Iu 2 is added to the encrypted data Cmks 3 stored in secondary user terminal 5 , and when the encrypted data Cmks 3 is transmitted to a tertiary user, the secondary user information Iu 2 is also transferred.
  • a tertiary user who desires tertiary utilization of the encrypted data Cmks 3 copied or transmitted from the secondary user must present original data name or number to copyright management center 10 from a tertiary user terminal 6 via communication network 8 together with the tertiary user information Iu 3 to request tertiary utilization of the data.
  • the tertiary user further presents the uncrypted secondary user information Iu 2 added to the encrypted data Cmks 3 in order to show the relationship with the secondary user.
  • Copyright management center 10 confirms that the secondary user has received a regrant of the third secret-key Ks 3 for tertiary utilization of the data, in accordance with the presented secondary user information Iu 2 . Copyright management center 10 , then, transfers the third secret-key Ks 3 serving as a decryption key and the fourth secret-keyKs 4 serving as an encryption/decryption key to tertiary user terminal 6 via communication network 8 .
  • M D(Ks 3 , Cmks 3 )
  • the data M supplied to a primary user is encrypted by the first secret-key Ks 1 and the data M supplied to a secondary user is encrypted by the second secret-key Ks 2 , and the data M supplied to a tertiary user is encrypted by the third secret-key Ks 3 .
  • the second secret-key Ks 2 and the third secret-key Ks 3 are transferred to the tertiary user as a decryption key and an encryption/decryption key respectively.
  • database 1 key control center 9 , and copyright management center 10 are separately arranged. However, it is not always necessary to arrange them separately. It is also possible to arrange all of or two of them integrally.
  • original data is encrypted and supplied in a one-way communication to a user from a single database and the user selects desired data out of the original data.
  • the original data M 0 stored in database 1 is supplied in a one-way communication to primary user terminal 4 via the satellite 2 , recording medium 3 , or communication network 8 .
  • the data M 0 is encrypted by the first secret-key Ks 1 :
  • a primary user who desires primary utilization of the supplied encrypted data Cm 0 ks 1 sends a request for the primary utilization of the encrypted original data Cm 0 ks 1 to key control center 9 by using primary user terminal 4 and presenting an original data name or an original data number via communication network 8 .
  • the primary user must present the primary user information Iu 1 to key control center 9 .
  • the key management 9 receiving the request of the primary utilization of the encrypted original data Cm 0 ks 1 generates a secret-key Ksul unique to the primary user using the primary user information Iu 1 and transfers it to copyright management center 10 .
  • Copyright management center 10 receives the secret-key Ksu 1 and encrypts the copyright control program P by using the secret-key Ksu 1 which is unique to the primary user.
  • Cpksu 1 E(Ksu 1 , P)
  • Copyright management center 10 transfers the encrypted copyright control program Cpksu 1 to key control center 9 .
  • the encrypted copyright control program Cpksu 1 thus generated is unique to the primary user.
  • Key control center 9 transfers the first secret-key Ks 1 for decryption and the second secret-key Ks 2 for decryption/encryption to primary user terminal 4 via communication network 8 , together with the encrypted copyright control program Cpksu 1 received from copyright management center 10 .
  • database system software S previously distributed generates a primary user unique secret-key Ksu 1 in accordance with the primary user information Iu 1 :
  • Ksu 1 S(Iu 1 ),
  • An encrypted copyright control program Cpksu 1 is decrypted by the generated primary user unique secret-key Ksu 1 :
  • the encrypted original data Cm 0 ks 1 is decrypted by the first secret-key Ks 1 using the copyright control program P:
  • M 0 D(Ks 1 , Cm 0 ks 1 ),
  • M D(Ks 2 , Cmks 2 ).
  • the data M is moved from primary user terminal 4 to secondary user terminal 5 by external recording medium 11 or by communication network 8 .
  • the first secret-key Ks 1 and the second secret-key Ks 2 in primary user terminal 4 are disused.
  • the uncrypted information Iu 1 on a primary user is added to the encrypted data Cmks 2 stored in primary user terminal 4 . Therefore, when the encrypted data Cmks 2 is transmitted to a secondary user, the primary user information Iu 1 is also transferred to the user.
  • a secondary user who desires secondary utilization of the encrypted data Cmks 2 copied or transmitted from the primary user must designate a data name or number added to the original data to copyright management center 10 via communication network 8 by secondary user terminal 5 and also present a secondary user information Iu 2 to request for the secondary utilization of the data to the center 10 .
  • the secondary user further presents the uncrypted primary user information Iu 1 added to the encrypted data Cmks 2 in order to clarify the relationship with the primary user.
  • Copyright management center 10 confirms that the primary user has received a regrant of the secondary secret-key Ks 2 for secondary-utilizing the data in accordance with the presented primary user information Iu 1 and then, generates a secret-key Ksu 2 unique to the secondary user in accordance with the presented secondary user information Iu 2 .
  • Copyright management center 10 encrypts the copyright control program P by the secondary user unique secret-key Ksu 2
  • the information Iu 1 for a primary user may be added to the encrypted copyright control program Cpksu 2 .
  • database utilization software In secondary user terminal 5 receiving the second secret-key Ks 2 and the third secret-key Ks 3 , database utilization software generates a secondary user unique secret-key Ksu 2 in accordance with the secondary user information Iu 2
  • Ksu 2 S(Iu 2 )
  • the encrypted original data Cmks 2 is decrypted by the second secret-key Ks 2 using the decrypted copyright control program P
  • M D(Ks 2 , Cmks 2 ),
  • FIG. 2 shows a structure of embodiment 4 of the data copyright management system of the present invention.
  • encrypted data is one-way supplied via the satellite 2 , recording medium 3 , or communication network 8 .
  • encrypted data is supplied in a two-way communication in accordance with a request from the primary user 4 .
  • This embodiment uses the public-key cryptosystem as a crypt key system. It is possible that embodiment 2 can be applied for a satellite broadcast, ground wave broadcast, CATV broadcast or a recording medium other than a database as data supply means provided with advertisement requiring no charge or encryption.
  • reference numeral 1 represents a database
  • 4 represents a primary user terminal
  • 5 represents a secondary user terminal
  • 6 represents a tertiary user terminal
  • 7 represents an n-order user terminal.
  • Reference numeral 14 represents a secondary copyright management center
  • 15 represents a tertiary copyright management center
  • 16 represents an n-order copyright management center
  • 8 represents a communication network such as a public telephone line offered by a communication enterprise or a CATV line offered by a cable television enterprise.
  • database 1 primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 , n-order user terminal 7 , secondary copyright management center 14 , tertiary copyright management center 15 , and n-order copyright management center 16 are connected to communication network 8 . They can also be connected to each other.
  • the broken line represents a path for encrypted data
  • the solid line represents a path of requests from each user terminal
  • the one-dot chain line represents a path through which authorization information sent from each database corresponding to a utilization request and a crypt key are transferred
  • a two-dot chain line represents a path through which copyright information is transferred from the database or each copyright management center database to a next-order copyright management center database.
  • the database utilization software includes a program for decrypting an encrypted copyright control program in addition to normal communication software such as a data communication protocol.
  • a primary user To use database 1 , a primary user must prepare primary-user authentication data Au 1 , a first public-key Kb 1 , a first private-key Kvl corresponding to the first public-key Kb 1 , a second public-key Kb 2 , and a second private-key Kv 2 corresponding to the second public-key Kb 2 , and accesses database 1 from primary user terminal 4 via communication network 8 .
  • Database 1 receives the primary-user authentication data Au 1 , first public-key Kb 1 and second public-key Kb 2 from the primary user, confirms the primary-user authentication data Au 1 , and transfers the confirmed primary-user authentication data Au 1 to the secondary copyright management center 14 as the primary user information Iu 1 .
  • Database 1 prepares two secret-keys, i.e., the first secret-key Ks 1 and the second secret-key Ks 2 .
  • the two secret-keys may be prepared by using key control center 9 of embodiment 1 shown in FIG. 1.
  • the second secret-key Ks 2 is also previously transferred to the copyright management center 14 .
  • the primary user information Iu 1 corresponding to primary utilization, original copyright information Ic and the second secret-key Ks 2 are stored in the copyright management center 14 .
  • the original copyright information Ic is used for copyright royalties distribution.
  • the primary user retrieves in the data menu to select the data M.
  • the original copyright information Ic of the selected data M is transmitted to the copyright management center 14 .
  • the original data M 0 is read out of database 1 in accordance with a request of a primary user.
  • the original data M 0 is then encrypted by the first secret-key Ks 1 :
  • the encrypted data Cm 0 ks 1 is provided with the uncrypted original copyright information Ic.
  • the first secret-key Ks 1 is encrypted by the first public-key Kb 1 and the second secret-key Ks 2 is encrypted by the second public-key kb 2 :
  • the copyright control program P may not be encrypted by the second secret-key Ks 2 , but it may be encrypted by any other proper crypt key.
  • the encrypted original data Cm 0 ks 1 , encrypted copyright control program Cpks 2 , and two encrypted secret-keys Cks 1 kb 1 and Cks 2 kb 2 are transferred to primary user terminal 4 via communication network 8 , and the user is charged for the service, if necessary.
  • the primary user receiving the encrypted original data Cm 0 ks 1 , two encrypted secret-keys Cks 1 kb 1 and Cks 2 kb 2 , and encrypted copyright control program Cpks 2 from database 1 decrypts the encrypted first secret-key Cks 1 kb 1 by the database utilization software using the first private-key Kv 1 corresponding to the first public-key Kb 1 :
  • Ks 1 D(Kv 1 , Cks 1 kb 1 ),
  • Ks 2 D(Kv 2 , Cks 2 kb 2 ).
  • the primary user decrypts the encrypted copyright control program Cpks 2 using the decrypted second secret-key Ks 2 :
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the first private-key Kv 1 and second private-key Kv 2 are crypt keys prepared by the primary user, but the keys are not known to others. Therefore, even if a third party obtains the data M, it is impossible to use the encrypted data M by decrypting it.
  • the data M such as the original data M 0 or the edited data Ml is encrypted and decrypted by the second secret-key Ks 2 for operations such as store, copy, or transmit:
  • M D(Ks 2 , Cmks 2 ).
  • the decrypted second secret-key Ks 2 is thereafter used as a crypt key for encrypting/decrypting data for storing, copying, or transferring the data.
  • the first private-key Kv 1 and second private-key Kv 2 , the first secret-key Ks 1 and second secret-key Ks 2 , the data M, the copyright control program P, the original copyright information Ic, and also the original copyright information Ic and secondary copyright information Ic 1 for information of the primary user and the date and time of edit operations by the primary user are stored in primary user terminal 4 .
  • the encrypted data Cmks 2 is encrypted before distribution. Since the copyright information label provides a due to obtain the second secret-key Ks 2 which is the key for decryption, the second secret key Ks 2 cannot be obtained when the copyright information label is removed from the encrypted data Cmks 2 .
  • the second secret-key Ks 2 is stored in the terminal 4 .
  • the second secret-key Ks 2 is disused in order to prevent subsequent utilization of the data in primary user terminal 4 .
  • a primary user who is going to copy the data M to external recording medium 11 or transmit the data M via communication network 8 must prepare the second secret-key Ks 2 to encrypt the data M by this second secret-key Ks 2 before copying or transferring the data:
  • Cmks 2 E(Ks 2 , M).
  • a secondary user Before using a database, a secondary user, similar to the primary user, prepares authentication data Au 2 to authenticate the secondary user, a third public-key Kb 3 and a third private-key Kv 3 corresponding to the third public-key Kb 3 , a fourth public-key Kb 4 , and a fourth private-key Kv 4 corresponding to the fourth public-key Kb 4 .
  • a secondary user who desires secondary utilization of the copied or transmitted encrypted data Cmks 2 must designate original data name or number to the secondary copyright management center 14 to request secondary utilization to the center 14 from secondary user terminal 5 via communication network 8 .
  • the secondary user also transfers the third public-key Kb 3 and the fourth public-key Kb 4 as well as the secondary user authentication data Au 2 , original copyright information Ic and primary user copyright information Ic 1 .
  • the secondary copyright management center 14 receives the secondary utilization request from the secondary user, confirms the secondary-user authentication data Au 2 , and transfers confirmed secondary-user authentication data Au 2 to the tertiary copyright management center 15 as secondary user information.
  • the secondary copyright information Ic 1 of the primary user is transferred, the secondary copyright information Ic 1 is confirmed by the secondary copyright center 14 . The secondary copyright information Ic 1 is then transferred to the tertiary copyright management center 15 .
  • the secondary copyright management center 14 prepares a third secret-key Ks 3 .
  • the third secret-key Ks 3 can also be prepared by key control center 9 shown in embodiment 1.
  • the prepared third secret-key Ks 3 is transferred to and stored in the tertiary copyright management center 15 .
  • primary user copyright information Ic 1 primary user information Iu 1 , original copyright information Ic, secondary user information Iu 2 , and third secret-key Ks 3 are stored in the tertiary copyright management center 15 .
  • the primary user copyright information Ic 1 , and primary user information Iu 1 are used for copyright royalties distribution.
  • copyright information for secondary exploitation right Icn ⁇ 1 of (n ⁇ 1)-order user, primary user information Iu 1 , original copyright information Ic, n-order user information Iun, and n-th secret-key Ksn are stored in n-order copyright management center 16 .
  • the primary user information Iu 1 , original copyright information Ic and second secret-key Ks 2 are read out of the secondary copyright management center 14 .
  • the original copyright information Ic is used for copyright royalties distribution.
  • the copyright control program P is encrypted by the third secret-key Ks 3 and the third secret-key Ks 3 is encrypted by the fourth public-key Kb 4 :
  • the encrypted copyright control program Cpks 3 , encrypted second secret-key Cks 2 kb 3 , and encrypted third secret-key Cks 3 kb 4 are transferred to secondary user terminal 5 via communication network 8 . In this case, charging is performed, if necessary.
  • the secondary user receives two encrypted secret-keys Cks 2 kb 3 and Cks 3 kb 4 and the encrypted copyright control program Cpks 3 from the secondary copyright management center 14 , decrypts the encrypted second secret-key Cks 2 kb 3 by the third private-key Kv 3 , and decrypts the encrypted third secret-key Cks 3 kb 4 by the fourth private-key Kv 4 corresponding to the fourth public-key Kb 4 , using the database utilization software:
  • Ks 2 D(Kv 3 , Cks 2 kb 3 )
  • Ks 3 D(Kv 4 , Cks 3 kb 4 ).
  • the encrypted copyright control program Cpks 3 is decrypted by the decrypted third secret-key Ks 3 :
  • M D(Ks 2 , Cmks 2 ).
  • the third private-key Kv 3 and the fourth private-key Kv 4 are prepared by a secondary user, but they are not known to others. Therefore, even if a third party obtains the encrypted data Cmks 2 , it is impossible to use the data by decrypting it.
  • database 1 , secondary copyright management center 14 , tertiary copyright management center 15 , and n-order copyright management center 16 are separately arranged in order to avoid the congestion of utilization requests. However, if the congestion of utilization requests is not a critical issue, it is possible to combine all or some of these functions into one.
  • FIG. 3 shows the system structure of embodiment 5.
  • original data is encrypted and supplied in a one-way communication from a single database and a user selects necessary data out of the supplied original data to use it.
  • This embodiment uses a secret-key cryptosystem as its crypt key system.
  • reference numeral 1 represents a database in which text data, binary data serving as computer graphics display or computer program, digital audio data, and digital picture data are stored by being encrypted
  • 2 represents a space satellite such as a communication satellite or a broadcasting satellite
  • 3 represents a data recording medium such as a CD-ROM or a flexible disk
  • 8 represents a communication network such as a public telephone line offered y a communication enterprise or a CATV line offered by a cable television enterprise
  • 4 represents a primary user terminal.
  • Reference numeral 17 represents a copyright management center for managing the copyright on data
  • 5 , 6 , and 7 represent a secondary user terminal, tertiary user terminal, and n-order user terminal, respectively.
  • database 1 copyright management center 17 , primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 and n-order user terminal 7 can be connected with each other by communication network 8 .
  • Each user who uses this system is previously entered in the database system, and when entered in the system, database utilization software is given to the user.
  • This software includes a normal communication software program such as a data communication protocol.
  • the software for using the database system can be stored in a hard disk in a user terminal, it may be stored in a mask ROM, EPROM, or EEPROM in the user terminal.
  • a secret-key generation algorithm is stored in a user terminal in order to generate a secret-key from the user side.
  • the secret-key generation algorithm is not always secret, it is also possible to store the algorithm in the database utilization software supplied to a user when the user is entered for database utilization in the database system.
  • the broken line represents a path of encrypted data
  • the solid line represents a path requested from each user terminal
  • the one-dot chain line represents a path through which a crypt key corresponding to a utilization request is transferred.
  • the original data M 0 stored in database 1 or the data recording medium 3 is supplied to primary user terminal 4 through a cable transmission via communication network 8 , by broadcast waves via the satellite 2 or the like, or by recording medium 3 .
  • the data M 0 is encrypted by the first secret-key Ks 1 :
  • the second secret-key Ks 2 is used to encrypt the data:
  • a primary user obtaining the encrypted original data Cm 0 ks 1 designates an original data name or original data number from primary user terminal 4 to request the primary utilization of the encrypted original data Cm 0 ks 1 of the copyright management center 17 .
  • the copyright management center 17 receives the primary utilization request of the encrypted original data Cm 0 ks 1 from primary user terminal 4 and transfers the copyright control program P to primary user terminal 4 together with the first secret-key Ks 1 .
  • the copyright control program P includes a crypt program having a cryptographic algorithm, which generates a secret-key and decrypts or encrypts data.
  • Primary user terminal 4 receives the first secret-key Ks 1 and the copyright control program P, decrypts the encrypted original data Cm 0 ks 1 by the first secret-key Ks 1 using the crypt program
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the copyright control program P generates a second secret-key Ks 2 in accordance with the first secret-key Ks 1 :
  • Ks 2 P(Ks 1 ).
  • the data Cmks 2 encrypted by the second secret-key Ks 2 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with the original data name or original data number.
  • the secondary user obtaining the encrypted data Cmks 2 makes a request for the secondary utilization of the encrypted data Cmks 2 to the copyright management center 17 from the secondary terminal 5 by designating the original data name or original data number.
  • the copyright management center 17 receives the secondary utilization request of the encrypted data Cmks 2 , finds out the first secret-key Ks 1 in accordance with the original data name or original data number, generates the second secret-key Ks 2 by the first secret-key Ks 1 using the copyright control program P
  • Ks 2 P(Ks 1 ),
  • Secondary user terminal 5 receives the second secret-key Ks 2 and the copyright control program P, decrypts the data Cmks 2 encrypted by the second secret-key Ks 2 using the second secret-key Ks 2
  • M D(Ks 2 , Cmks 2 )
  • the decrypted data M is stored in secondary user terminal 5 , stored in the recording medium 12 , or transmitted to tertiary user terminal 6 via communication network 8 , the data M is encrypted by the second secret-key.
  • Ks 3 P(Ks 2 )
  • original data is encrypted and supplied in a one-way communication from a single database to a user and the user selects necessary data out of the original data to use it, similar to embodiment 5.
  • This embodiment uses a secret-key cryptosystem as its crypt key system and a second secret-key is generated in accordance with primary user information and a first secret-key.
  • the original data M 0 stored in database 0 . 1 is encrypted via communication network 8 , by broadcast waves via the satellite 2 , or by the recording medium 3 using the first secret-key Ks 1 :
  • a primary user obtaining the encrypted original data Cm 0 ks 1 makes a request for primary utilization of the encrypted original data Cm 0 ks 1 from primary user terminal 4 .
  • the primary user must designate an original data name or original data number and present the primary user information Iu 1 .
  • the copyright management center 17 receives the primary utilization request of the encrypted original data Cm 0 ks 1 from the primary user and supplies the first secret-key Ks 1 and the copyright control program P to primary user terminal 4 .
  • the copyright control program P includes a crypt program having a cryptographic algorithm, which generates a secret-key and thus performs decryption and encryption.
  • Primary user terminal 4 receives the first secret-key Ks 1 and the copyright control program P, decrypts the encrypted original data Cm 0 ks 1 by the first secret-key Ks 1 using the crypt program P
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the supplied copyright control program P generates the second secret-key Ks 2 in accordance with the primary user information Iu 1 or the primary user information Iu 1 and the first secret-key Ks 1 :
  • Ks 2 P(Iu 1 ) or
  • Cmks 2 E(Ks 2 , M).
  • the data Cmks 2 encrypted by the second secret-key Ks 2 is copied to the recording medium 11 or supplied to secondary user terminal 5 via communication network 8 together with its original data name or original data number and the primary user information Iu 1 .
  • a secondary user obtaining the encrypted data Cmks 2 makes a request for secondary utilization of the data M to the copyright management center 17 from secondary user terminal 5 .
  • the user must designate the original data name or original data number and present the primary user information Iu 1 .
  • the copyright management center 17 receives the secondary utilization request of the data M, finds out the first secret-key Ks 1 in accordance with the original data name or original data number, generates the second secret-key Ks 2 in accordance with either of the primary user information Iu 1 and first secret-key Ks 1 , or both, and supplies the generated second secret-key Ks 2 to secondary user terminal 5 together with the copyright control program P.
  • the secondary user receives the second secret-key Ks 2 and the copyright control program P and decrypts the encrypted data Cmks 2 by the second secret-key Ks 2 using the copyright control program P and in secondary user terminal 5 to use it:
  • M D(Ks 2 , Cmks 2 ).
  • Ks 3 P(Ks 2 )
  • original data is encrypted and supplied in a one-way communication to a user from a single database and the user selects necessary data out of the original data to use it, similar to the embodiments 5 and 6.
  • This embodiment uses a secret-key cryptosystem.
  • a second secret-key is generated in accordance with the use frequency of a copyright control program and with a first secret-key.
  • the original data M 0 stored in database 1 is encrypted by the first secret-key Ks 1 via communication network 8 , by broadcast waves via the satellite 2 , or by the recording medium 3 :
  • a primary user obtaining the encrypted original data Cm 0 ks 1 makes a request for primary utilization of the original data M 0 to the copyright management center 17 from primary user terminal 4 by designating an original data name or original data number.
  • the copyright management center 17 receives the primary utilization request of the original data M 0 and transfers the first secret-key Ks 1 and the copyright control program P to primary user terminal 4 .
  • the copyright control program P includes a crypt program having a cryptographic algorithm, in which a crypt key is generated and data is decrypted or encrypted. Further, a counter is attached to the copyright control program P to count the use frequency of the program P.
  • the primary user receives the first secret-key Ks 1 and the copyright control program P and decrypts the encrypted original data Cm 0 ks 1 by the first secret-key Ks 1 using the copyright control program P:
  • M 0 D(Ks 1 ,Cm 0 ks 1 )
  • the data M serving as the original data M 0 or edited data M 1 is stored in primary user terminal 4 , copied to the recording medium 11 , or transmitted to secondary user terminal 5 via communication network 8 in order to manage the copyright of data, the data is encrypted by the second secret-key Ks 2 using the copyright control program P.
  • the second secret-key Ks 2 used for this operation is generated in accordance with the use frequency N of the copyright control program and with the first secret-key Ks 1 :
  • Ks 2 P(N+Ks 1 ).
  • the second secret-key Ks 2 thus generated is based on the use frequency N of the copyright control program P and the first secret-key Ks 1 , the data M is encrypted by the latest second secret-key Ks 2 whenever it is used:
  • the data Cmks 2 encrypted by the second secret-key Ks 2 generated through the final utilization is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with its original data name or original data number and counter data N 1 .
  • the secondary user obtains the encrypted data Cmks 2 and designates the original data name or original data number and the counter data N 1 from secondary user terminal 5 to request the secondary utilization of the encrypted data Cmks 2 to the copyright management center 17 .
  • the copyright management center 17 receives the secondary utilization request of the encrypted data Cmks 2 , finds out the first secret-key Ks 1 in accordance with the designated original data name or original data number, generates the second secret-key Ks 2 in accordance with the counter data N 1 and the first secret-key Ks 1 , and supplies the second secret-key Ks 2 to secondary user terminal 5 together with the copyright control program P via communication network 8 .
  • the secondary user receives the second secret-key Ks 2 , and the copyright control program P decrypts the encrypted data Cmks 2 by the second secret-key Ks 2 using the copyright control program P:
  • M D(Ks 2 , Cmks 2 )
  • Cmks 2 E(ks 2 , M).
  • Ks 3 P(N 2 +Ks 2 ).
  • FIG. 4 shows the embodiment 8 of the present data copyright management system.
  • original data is supplied one-way to a user from a single database in accordance with a request of the user.
  • This embodiment uses a secret-key cryptosystem as its cryptosystem in which a second secret-key is generated in accordance with a first secret-key.
  • reference numeral 1 represents a database
  • 4 represents a primary user terminal
  • 5 represents a secondary user terminal
  • 6 represents a tertiary user terminal
  • 7 represents an n-order user terminal.
  • 18 represents a copyright management center
  • 8 represents a communication network such as a public telephone line provided by a telephone company or a CATV line offered by a cable television enterprise.
  • database 1 copyright management center 18 , primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 , and n-order user terminal 7 can be connected with each other by communication network 8 .
  • Each user who uses this system must previously be entered in a database system, and when entered in the system, database system software is given to the user.
  • This software includes a normal communication software such as a data communication protocol.
  • the database utilization software can be stored on a hard disk of a user terminal, or may be stored in a mask ROM, EPROM, or EEPROM in the user terminal.
  • a secret-key generation algorithm is stored in a user terminal in order to generate a secret-key from the user side.
  • the secret-key generation algorithm is not always secret, it is possible to store the algorithm in the database utilization software given to the user when the user is entered in a database system.
  • the broken line represents a path for encrypted data
  • the solid line represents a path requested from each user terminal
  • the one-dot chain line represents a path through which a key for allowing data utilization and a copyright control program together with a secret-key from the copyright management center to secondary and subsequent-order user.
  • database 1 stores text data, graphics data or binary data, audio data, and picture data which are not encrypted.
  • a primary user makes a request for utilization of the original data M 0 from primary user terminal 4 by designating an original data name or number to database 1 via communication network 8 .
  • Database 1 receives the utilization request of the original data M 0 from primary user terminal 4 , encrypts the original data M 0 by the first secret-key Ks 1 :
  • the copyright control program P includes a crypt program having a cryptographic algorithm which generates a secret-key and decrypts or encrypts data. Further, by making the cryptographic algorithm dependent on the first secret-key Ks 1 , it is possible to make the copyright control program P inherent in the original data M 0 .
  • Primary user terminal 4 receives the first secret-key Ks 1 and the copyright control program P together with the original data Cm 0 ks 1 encrypted by the first secret-key Ks 1 , decrypts the encrypted original data Cm 0 ks 1 by the first secret-key Ks 1 :
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the copyright control program P generates the second secret-key Ks 2 in accordance with the first secret-key Ks 1 :
  • Ks 2 P(Ks 1 ).
  • the encrypted data Cmks 2 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 , together with its original data name or original data number.
  • a secondary user obtains the encrypted data Cmks 2 and makes a request for secondary utilization of the data M as original data or edited data to the copyright management center 18 from secondary user terminal 5 by designating the original data name or number.
  • the secondary copyright management center 18 receives the secondary utilization request of the data M, finds out the first secret-key Ks 1 in accordance with the original data name or original data number to generate the second secret-key Ks 2 in accordance with the first secret-key Ks 1 :
  • Ks 2 P(Ks 1 )
  • Secondary user terminal 5 receives the second secret-key Ks 2 and the copyright control program P, decrypts the encrypted data Cmks 2 by the second secret-key Ks 2 using the copyright control program P:
  • M D(Ks 2 , Cmks 2 )
  • a third secret-key Ks 3 is generated by the copyright control program P in accordance with the second secret-key Ks 2 :
  • Ks 3 P(Ks 2 )
  • original data is supplied to a user from a single database in accordance with a request of the user, similarly to embodiment 8 in FIG. 4.
  • This embodiment uses a secret-key cryptosystem and user data in addition to the first secret-key used for embodiment 8 to generate a second secret-key.
  • Database 1 stores the original data M 0 which is not encrypted.
  • a primary user accesses database 1 from primary user terminal 4 , a data menu is transferred to the user. In this case, it is possible to display charge information together with the data menu.
  • the user retrieves the data menu to select the original data M 0 and requests primary utilization of the original data M 0 to database 1 by designating the original data name or the like of the selected original data M 0 .
  • the copyright control program P used here is common to entire database system, which includes a crypt program having a cryptographic algorithm. A crypt key is generated and data is decrypted or encrypted by this crypt program.
  • Primary user terminal 4 receives the first secret-key Ks 1 and the copyright control program P, decrypts the encrypted original data Cm 0 ks 1 by the first secret-key Ks 1 using the copyright control program P:
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the copyright control program P generates the second secret-key Ks 2 in accordance with a primary user information Iu 1 :
  • Ks 2 P(Iu 1 ).
  • the second secret-key Ks 2 may be generated in accordance with the first secret-key Ks 1 or the primary user data Iu 1 and the first secret-key Ks 1 instead of the primary user information Iu 1 :
  • Ks 2 P(Ks 1 )
  • Ks 2 P(Ks 1 +Iu 1 ).
  • Cmks 2 E(Ks 2 , M).
  • the data Cmks 2 encrypted by the second secret-key Ks 2 is provided with the original data name or original data number and then, copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 .
  • a secondary user obtains the data Cmks 2 encrypted by the second secret-key Ks 2 and makes a request for secondary utilization of the data M to the copyright management center 18 from secondary user terminal 5 .
  • the user designates the original data name or original data number and presents the uncrypted primary user information Iu 1 .
  • the copyright management center 18 receives the secondary utilization request of the data M, finds out the first secret-key Ks 1 in accordance with the designated original data name or original data number, generates the second secret-key Ks 2 in accordance with the presented primary user information Iu 1 and the found-out first secret-key Ks 1 by the copyright control program P, and supplies the key Ks 2 to secondary user terminal 5 together with the copyright control program P.
  • the secondary user obtains the second secret-key Ks 2 and the copyright control program P, decrypts the encrypted data Cmks 2 by the second secret-key Ks 2 using the copyright control program P in secondary user terminal 5 :
  • M D(Ks 2 , Cmks 2 )
  • the data M is stored in secondary user terminal 5 , copied to the recording medium 12 , or transmitted to tertiary user terminal 6 via communication network 8 , the data M is encrypted by the second secret-key Ks 2 using the copyright control program P:
  • Cmks 2 E(Ks 2 , M).
  • the copyright control program P generate the third secret-key Ks 3 in accordance with the primary user information Iu 1 , second secret-key Ks 2 , or primary user information Iu 1 and the second secret-key Ks 2 ,
  • Ks 3 P(Iu 1 )
  • Ks 3 P(Iu 1 +Ks 1 )
  • Ks 3 P(Ks 1 ).
  • the copyright control program P for generating the second secret-key Ks 2 is common to any database. Therefore, in any database, the same second secret-key Ks 2 is generated for the same original data as long as the primary user data Iu 1 and the first secret-key Ks 1 are not changed.
  • original data is supplied to a user from a single database in accordance with a request of the user similarly to the case of embodiment 8.
  • This embodiment uses a secret-key cryptosystem.
  • This embodiment uses the use frequency of a copyright control program instead of user information adopted for generating a second secret-key in embodiment 9.
  • Database 1 stores original data M 0 which is not encrypted.
  • a primary user accesses database 1 from primary user terminal 4 , a data menu is transferred to the user. In this case, charge information may be displayed together with the data menu.
  • the user retrieves the data menu to select the original data M 0 and makes a request for the primary utilization of the original data M 0 to database 1 by designating an original data name or the like via communication network 8 from primary user terminal 4 .
  • Database 1 receives the data utilization request from a primary user, encrypts the original data M 0 by a first secret-key Ks 1
  • the copyright control program P includes a crypt program having a cryptographic algorithm, which generates a crypt key and decrypts or encrypts data. Further, a counter is attached to the copyright control program P to count the use frequency N of the program P or the number of use times of original data.
  • the primary user receives the first secret-key Ks 1 and the copyright control program P, decrypts the encrypted original data Cm 0 ks 1 by the first secret-key Ks 1 using the copyright control program P
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the counter in the program performs counting and the copyright control program P generates the second secret-key Ks 2 in accordance with the counted value N and the first secret-key Ks 1 :
  • Ks 2 P(N+Ks 2 ).
  • the second secret-key Ks 2 is based on the use frequency N of the copyright control program P, the data M is encrypted by the new second secret-key Ks 2 whenever the data is used:
  • the data Cmks 2 encrypted by the generated second secret-key Ks 2 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with the original data name or original data number, the primary user information Iu 1 and the counter data N.
  • a secondary user obtains the data Cmks 2 encrypted by the second secret-key Ks 2 and designates the original data name or original data number, primary user information Iu 1 , and counter data N to request secondary utilization of the data M to the copyright management center 18 .
  • the copyright management center 18 receives the secondary utilization request of the encrypted data Cmks 2 , finds out the first secret-key Ks 1 in accordance with the original data name or original data number of the data, generates a second secret-key Ks 2 according to the first secret-key Ks 1 , and the presented primary user information Iu 1 and the counter data N, and transfers the generated second secret-key Ks 2 to secondary user terminal 5 together with the copyright control program P.
  • Secondary user terminal 5 receives the second secret-key Ks 2 and the copyright control program P, decrypts the encrypted data Cmks 2 by the second secret-key Ks 2 using the copyright control program P:
  • M D(Ks 2 , Cmks 2 )
  • the data is stored in secondary user terminal 5 , copied to the recording medium 12 , or transmitted to tertiary user terminal 6 via communication network 8 , the data is encrypted by the second secret-key using the copyright control program P. Further, it is possible that the copyright control program generates a third secret-key in accordance with the second secret-key.
  • one of the data utilization, edit operation includes not only editing a single data but also producing new data by combining a plurality of original data obtained from the same database and producing new data by combining a plurality of original data obtained from a plurality of databases.
  • a primary user produces new data by combining a plurality of original data stored in a single database. That is, the primary user produces new data by using first, second, and third original data stored in the database.
  • a plurality of original data are supplied to a user from a single database in response to a request of the user similarly to the case of embodiment 8 shown in FIG. 4.
  • This embodiment uses a secret-key cryptosystem.
  • Database 1 stores original data M 01 , M 02 and M 03 which are not encrypted.
  • a data menu is transferred to the user. In this case, charge information may be displayed together with the data menu.
  • the user retrieves the data menu to select the original data M 01 , M 02 and M 03 , makes a request for supply of the data M 01 , M 02 and M 03 to database 1 via communication network 8 by designating original data names or original data numbers of the first, second and third original data M 01 , M 02 and M 03 , and also presents the primary user information Iu 1 .
  • Database 1 receives the supply request of the first, second and third original data M 01 , M 02 and M 03 from the primary user, encrypts the first, second and third original data M 01 , M 02 and M 03 by first, second and third secret-keys Ks 01 , Ks 02 and Ks 03 respectively:
  • the copyright control program P includes a crypt program having a cryptographic algorithm, which generates a crypt key and decrypts or encrypts data.
  • Primary user terminal 4 receives the first encrypted original data Cm 01 ks 01 , second encrypted original data Cm 02 ks 02 , third encrypted original data Cm 03 ks 03 , first secret-key Ks 01 , second secret-key Ks 02 , third secret-key Ks 03 , and copyright control program P, decrypts the first, second and third encrypted original data Cm 01 ks 01 , Cm 02 ks 02 and Cm 03 ks 03 by the secret-keys Ks 01 , Ks 02 , and Ks 03 using the copyright control program P:
  • M 01 D(Ks 01 , Cm 01 ks 01 )
  • M 02 D(Ks 02 , Cm 02 ks 02 )
  • M 03 D(Ks 03 , Cm 03 ks 03 )
  • the copyright control program P produces a fourth secret-key Ks 4 in accordance with one or some of the first secret-key Ks 01 , second secret-key Ks 2 , third secret-key Ks 3 , and primary user data Iu 1 :
  • Ks 4 P(Ks 01 /Ks 02 /Ks 03 /Iu 1 ).
  • the encrypted edited data Cm 1 ks 4 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 , together with original data names or original data numbers and the primary user data Iu 1 .
  • a secondary user obtains the encrypted edited data Cm 1 ks 4 and makes a request for secondary utilization of the data Cm 1 ks 4 to the copyright management center 18 from secondary user terminal 5 .
  • the user designates data names or data numbers of the original data M 0 , M 02 and M 03 and presents the primary user information Iu 1 .
  • the copyright management center 18 receives the secondary utilization request of the encrypted edited data Cm 1 ks 4 from the secondary user, finds out the first secret-key Ks 01 in accordance with the data name or data number of the first original data M 01 , the second secret-key Ks 02 in accordance with the data name or number of the second original data M 02 , and the third secret-key Ks 03 in accordance with the data name or number of the third original data M 03 , generates fourth secret-key Ks 4 by one or some of the found-out first secret-key Ks 01 , second secret-key Ks 02 , third secret-key Ks 03 and primary user information Iu 1 using common copyright control program P:
  • Ks 4 P(Ks 01 /Ks 02 /Ks 03 /Iu 1 );
  • the secondary user receives the fourth secret-key Ks 4 and the common copyright control program P, decrypts the encrypted edited data Cm 1 ks 4 by the fourth secret-key Ks 4 using the copyright control program P
  • M 1 D(Ks 4 , Cm 1 ks 4 )
  • a copyright control program for generating a fourth secret-key is common to any database. Therefore, in any database, the same fourth secret-key is generated for the same original data as long as primary user data and a first secret-key are not changed.
  • the common copyright control program of this embodiment is supplied from the copyright management center 18 , it may be stored in a ROM in a user terminal or in software for using a database.
  • new data is produced by combining a plurality of original data supplied from a plurality of databases in response to a user's request.
  • This embodiment uses a secret-key cryptosystem.
  • reference numerals 19 , 20 , and 21 represent first, second and third databases storing text data, binary data as a computer graphics display or computer program, and audio data or picture data
  • 4 represents a primary user terminal
  • 5 represents a secondary user terminal
  • 6 represents a tertiary user terminal
  • 7 represents an n-order user terminal
  • 10 represents a copyright management center for managing data copyrights
  • 8 represents a communication network such as a public telephone line offered by a telephone company or a CATV line offered by a cable television enterprise.
  • the first, second and third databases 19 , 20 and 21 , copyright management center 10 , primary user terminal 4 , secondary user terminal 5 , tertiary user terminal 6 , and n-order user terminal 7 can be connected with each other by communication network 8 .
  • a user who desires to use this system must previously be entered in each database system, and when entered in the database system, database utilization software is supplied to the user.
  • the software includes a normal communication software program such as a data communication protocol.
  • the database utilization software may be stored on a hard disk of a user terminal, or may be stored in a mask ROM, EPROM, or EEPROM in the user terminal.
  • a crypt key generation algorithm is stored in a user terminal in order to generate a secret-key from the user side.
  • the crypt key generation algorithm is not necessarily secret, it is possible to store the algorithm in each database utilization software.
  • the broken line represents a path for encrypted data
  • the solid line represents a path of requests from each user terminal to each database and copyright management center
  • the one-dot chain line represents a path through which permit information corresponding to utilization requests, a copyright control program, and a crypt key are transferred from each database and copyright management center to each user terminal.
  • This embodiment uses a secret-key and a copyright control program which are different for each original data and are previously stored in each database and the copyright management center.
  • the first database 19 stores the first original data M 1 which is not encrypted.
  • a primary user accesses the first database 19 from the first user terminal 4 , a data menu is transferred to the user.
  • the user retrieves the data menu to select the first original data M 1 and makes a request for supply of the first original data M 1 to the first database 19 via communication network 8 from primary user terminal 4 by designating an original data name or original data number.
  • the user presents the primary user information Iu 1 .
  • the first database 19 receives the utilization request of the first original data M 1 from the primary user, encrypts the requested first original data M 1 by first secret-key Ks 1
  • the second database 20 stores the second original data M 2 which is not encrypted.
  • a data menu is transferred to the user.
  • the user retrieves the data menu to select the second original data M 2 and makes a request for supply of the second original data M 2 to the second database 20 via communication network 8 from primary user terminal 4 by designating an original data name or original data number.
  • the user presents the primary user information Iu 1 .
  • the second database 20 receives the utilization request of the second original data M 2 from the primary user, encrypts the requested second original data M 2 by second secret-key Ks 2
  • the third database 21 stores the third original data M 3 which is not encrypted.
  • a data menu is transferred to the user.
  • the user retrieves the data menu to select the third original data M 3 and requests for supply of the third original data M 3 to the third database 21 via communication network 8 from primary user terminal 4 by designating an original data name or original data number.
  • the user presents the primary user information Iu 1 .
  • the third database 21 receives the utilization request of the third original data M 3 from the primary user, encrypts the requested third original data M 3 by the third secret-key Ks 3
  • the primary user receives the first, second, and third encrypted original data Cm 1 ks 1 , Cm 2 ks 2 and Cm 3 ks 3 makes a request for primary utilization of the first, second, and third encrypted original data Cm 1 ks 1 , Cm 2 ks 2 and Cm 3 ks 3 to copyright management center 10 via communication network 8 from primary user terminal 4 by designating original data names or numbers.
  • Copyright management center 10 receives the primary utilization request of the first, second and third encrypted original data Cm 1 ks 1 , Cm 2 ks 2 and Cm 3 ks 3 from the primary user and supplies a first copyright control program P 1 , a second copyright control program P 2 , and a third copyright control program P 3 to primary user terminal 4 together with the first secret-key Ks 1 as a crypt key of the first original data M 1 , the second secret-key Ks 2 as a crypt key of the second original data M 2 , and the third secret-key Ks 3 as a crypt key of the third original data M 3 .
  • These copyright control programs P 1 , P 2 and P 3 include a crypt program having a cryptographic algorithm respectively, which generates new secret-keys and decrypts or encrypts data.
  • Primary user terminal 4 receives the first, second and third secret-keys Ks 1 , Ks 2 and Ks 3 , decrypts the first, second and third original data Cm 1 ks 1 , Cm 2 ks 2 and Cm 3 ks 3 encrypted by these secret-keys:
  • M 1 D(Ks 1 , Cm 1 ks 1 )
  • M 2 D(Ks 2 , Cm 2 ks 2 )
  • M 3 D(Ks 3 , Cm 3 ks 3 )
  • first copyright control program P 1 generates fourth secret-key Ks 4 in accordance with the first secret-key Ks 1
  • the second copyright control program P 2 generates fifth secret-key Ks 5 in accordance with the second secret-key Ks 2
  • third copyright control program P 3 generates sixth secret-key Ks 6 in accordance with the third secret-key Ks 3 :
  • Ks 4 P 1 (Ks 1 )
  • Ks 5 P 2 (Ks 2 )
  • Ks 6 P 3 (Ks 3 ).
  • the first original data M 1 or edited data M 4 is encrypted by the fourth secret-key Ks 4 using the first copyright control program P 1
  • the second original data M 2 or edited data M 5 is encrypted by the fifth secret-key Ks 5 using the second copyright management program P 2
  • the third original data M 3 or edited data M 6 is encrypted by the sixth secret-key Ks 6 using the third copyright control program P 3 :
  • the original data Cm 1 ks 4 , Cm 2 ks 5 and Cm 3 ks 6 or edited data Cm 4 ks 4 , Cm 5 ks 5 and Cm 6 ks 6 encrypted by the fourth, fifth and sixth secret-keys Ks 4 , Ks 5 and Ks 6 are copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with the first, second and third original data names or original data numbers and the primary user data Iu 1 .
  • Copyright management center 10 receives the secondary utilization request of the first, second and third original data M 1 , M 2 and M 3 or the edited data M 4 , M 5 and M 6 from secondary user terminal 5 and finds out the first secret-key Ks 1 and the first copyright control program P 1 in accordance with the first original data name or number, the second secret-key Ks 2 and the second copyright control program P 2 in accordance with the second original data name or number and the third secret-key Ks 3 and the third copyright control program P 3 in accordance with the third original data name or number, wherein the first copyright control program P 1 generates the fourth secret-key Ks 4 from the first secret-key Ks 1 , the second copyright control program P 2 generates the fifth secret-key Ks 5 from the second secret-key Ks 2 and the third copyright control program P 3 generates the sixth secret-key Ks 6 from the third secret-key Ks 3 :
  • Ks 4 P 1 (Ks 1 )
  • Ks 5 P 2 (Ks 2 )
  • Ks 6 P 3 (Ks 3 );
  • Copyright management center 10 supplies these secret-keys to secondary user terminal 5 together with the first, second and third copyright control programs P 1 , P 2 and P 3 .
  • the encrypted first original data Cm 1 ks 4 or edited data Cm 4 ks 4 is decrypted by the fourth secret-key Ks 4 using the first copyright control program P 1
  • the encrypted second original data Cm 2 ks 5 or edited data Cm 5 ks 5 is decrypted by the fifth secret-key Ks 5 using the second copyright control program P 2
  • the encrypted third original data Cm 3 ks 6 or edited data Cm 6 ks 6 is decrypted by the sixth secret-key Ks 6 using the third copyright control program P 3 :
  • M 4 D(Ks 4 , Cmks 4 )
  • M 5 D(Ks 5 , Cm 5 ks 5 )
  • M 6 D(Ks 6 , Cm 6 ks 6 )
  • the first, second and third original data M 1 , M 2 and M 3 or edited data M 4 , M 5 and M 6 are stored in secondary user terminal 5 , copied to the recording medium 12 , or transmitted to tertiary user terminal 6 via communication network 8
  • the first original data M 1 or edited data M 4 is encrypted by the fourth secret-key Ks 4 using the first copyright control program P 1
  • the second original data M 02 or edited data M 5 is encrypted by the fifth secret-key Ks 5 using the second copyright control program P 2
  • the third original data M 3 or edited data M 6 is encrypted by the sixth secret-key Ks 6 using the third copyright control program P 3 .
  • the first copyright control program P 1 generates a seventh secret-key Ks 7 in accordance with the fourth secret-key Ks 4
  • the second copyright control program P 2 generate an eighth secret-key Ks 8 in accordance with the fifth secret-key Ks 5
  • the third copyright control program P 3 generate a ninth secret-key Ks 9 in accordance with the sixth secret-key Ks 6 :
  • Ks 7 P 1 (Ks 4 )
  • Ks 8 P 2 (Ks 5 )
  • Ks 9 P 3 (Ks 6 )
  • the first, second and third copyright control programs P 1 , P 2 and P 3 encrypt the first, second and third original data M 1 , M 2 and M 3 or the edited data M 4 , M 5 and M 6 by the seventh, eighth and ninth secret-keys Ks 7 , Ks 8 and Ks 9 :
  • new data is produced by using a plurality of original data supplied from a plurality of databases in response to a user's request, similar to embodiment 12.
  • This embodiment uses a secret-key cryptosystem.
  • a counter is attached to a copyright control program, which counts the service frequency of the program or the number of times of using original data.
  • the fourth, fifth and sixth secret-keys Ks 4 , Ks 5 and Ks 6 are generated by the counter value N.
  • a secondary user presents the counter value N together with the original data name or original data number of each original data and primary user data to request secondary utilization of data to copyright management center 10 .
  • Copyright management center 10 receives the secondary utilization request of data, finds out the first, second and third secret-keys Ks 1 , Ks 2 and Ks 3 in accordance with the original data names or original data numbers, generates fourth, fifth and sixth secret-keys Ks 4 , Ks 5 and Ks 6 by the first, second and third secret-keys Ks 1 , Ks 2 and Ks 3 for each data, the primary user information Iu 1 and the first, second and third counter values N 1 , N 2 and N 3 using the first, second and third copyright control programs P 1 , P 2 and P 3 , and supplies the generated fourth, fifth and sixth secret-keys Ks 4 , Ks 5 and Ks 6 to secondary user together with the fourth, fifth and sixth copyright control programs P 1 , P 2 and P 3 .
  • the copyrights of data are managed by encrypting original data or edited data.
  • the copyright of data is managed without identifying original data or edited data, in the whole data or separating an original data part from an edited part in the whole edited data. Therefore, it is impossible to specify original data or owner from edited data.
  • Embodiment 14 makes it possible to separate original data for which only the original copyright applies from the edited data in which a secondary exploitation right also applies in addition to the original copyright, and manage the original copyright and the secondary exploitation right.
  • the secondary exploitation right described is managed by specifying original data and edit contents (further, an editor program when necessary) and managing them.
  • edited data [A′] is obtained by altering original data A
  • edited data [A+X] is obtained by adding data X to the original data A by a primary user
  • edited data [A′′] is obtained by dividing the original data A into original data elements A 1 , A 2 , A 3 , . . . and changing the arrangement of the elements to such as A 3 , A 2 and A 1
  • edited data [A 1 +X 1 +A 2 +X 2 +A 3 +X 3 . . . ] is obtained by dividing the original data A into original data elements A 1 , A 2 , A 3 . . . , also dividing the data X of the primary user into X 1 , X 2 , X 3 , . . . and arranging these elements.
  • edited data [A+B+C . . .] is obtained by simply combining original data A, B, C, . . . ;
  • edited data such as [A+X] is obtained by adding data X to the original data A, B, C, . . . ,;
  • edited data [A 1 +B 1 +C 1 + . . . +A 2 +B 2 +C 2 + . . . +A 3 +B 3 +C 3 + . . .] is obtained by dividing the original data A, B, C, . . . into original data elements A 1 , A 2 , A 3 , .
  • edited data [A 1 +B 1 +C 1 +X 1 + . . . +A 2 +B 2 +C 2 +X 2 + . . . +A 3 +B 3 +C 3 +X 3 + . . .] is obtained by dividing the original data A, B, C, . . . into original data elements A 1 , A 2 , A 3 , . . . , B 1 , B 2 , B 3 , . . . , and C 1 , C 2 , C 3 , . . . , combining the elements with primary user data X 1 , X 2 , X 3 , . . . , and changing their arrangements.
  • combination of a plurality of original data, combination of a plurality of original data with primary user data, division of a plurality of original data and change of the arrangements, and combination of a plurality of divided original data with the primary user data can respectively be provided with a secondary exploitation right, which needs to be protected.
  • the original copyright of the primary user is retained in the data X 1 , X 2 , X 3 , . . . added by the primary user.
  • FIG. 6 shows an example for producing new data D by using a plurality of original data A, B and C.
  • This method is known as the cut-and-paste technique in which data is edited by extracting (cutting out) elements “a”, “b” and “c” from original data A, B and C and attaching (pasting) the extracted elements “a”, “b” and “c” to form a piece of data D.
  • original data and primary user data are data
  • the editing process alteration of original data, arrangement change of original data, combination of original data with primary user data, division of original data and combination with primary user data, combination of a plurality of original data each other, combination of a plurality of original data with primary user data, division and arrangement change of a plurality of original data, and combination of a plurality of divided original data with primary user data, are also data.
  • the copyright of data are managed by encrypting original data or edited data. Further, noticing that editing process of data, such as arrangement of original data and process of editing, is also data, the secondary exploitation right on edited data can be protected by managing the primary copyright of the author on the original data and secondary copyright of the primary user on editing process data.
  • Editing process data or editor program may be called as scenario. That is, it is possible to ensure to manage the copyrights of the edited data as well as of the original data, if the edited data is constituted with original data, primary user data and editing process data, and thus, these original data, primary user data and editing process data are managed by the data copyright management system described in embodiments 1 to 13. In this case, an editor program used for editing data may be managed by the data copyright management system, if necessary.
  • agent-oriented software unlike the conventional one, is a program having autonomy, flexibility and cooperativeness, which is able to meet a user's request with its characteristics of autonomy, flexibility and cooperativeness in accordance with only a general instruction of the user without specifically giving every operation instructions to the software.
  • agent program By incorporating the agent program into a basic system of a data copyright management system so that the program monitors the database utilization of a user and information obtained through the monitoring is collected at the database or the copyright management center, it is possible to monitor the database utilization condition of the user at the database side or the copyright management center side and achieve more accurate copyright management.
  • agent program and data can also be protected and, therefore, are encrypted like original data.
  • the works with a copyright include those which make use of the copyright and those which do not make use of the copyright.
  • the works with no copyright include those to which no copyright is given by a law and those whose copyright duration has expired. All works except those which have no existing copyright have a copyright, and they are normally provided with a mark for indicating the copyright which prevents infringement of the copyright.
  • data is encrypted and a decryption key for decrypting the encrypted data is managed so as to perform encryption or decryption by a crypt key different from the decryption key when decrypted data is stored, copied, or transmitted.
  • the basic system means a software operating system such as DOS when the user terminal is a computer such as a personal computer or a hardware operating system stored in a ROM when the user terminal is a portable information terminal or STB (set top box).
  • DOS software operating system
  • STB set top box
  • Every processing and every data in the user terminal is under control of an operating system.
  • the operating system can store every processing and data information in the user terminal. Therefore, it is possible to make the copyright control program automatically manage the data copyright in accordance with a data utilization condition held by the operating system without resorting to a user instruction. According to the above arrangement, a user can easily use a data copyright and the data copyright can more completely be managed.
  • the copyright control program for managing the crypt key, data copyright information, the copyright label or the like is kept in a system area controlled by the operating system itself; i.e., the system area the user program cannot access.
  • a “has-a” link which is a parent and child relationship, is formed between the extracted data and the original data work with the copyright control program.
  • the digital cash is digital data used instead of cash in a computer connected to a communication network, which is encrypted and used.
  • the digital cash system which has been proposed so far is based on a secret-key cryptosystem.
  • the encrypted digital cash data is transferred from a bank account or a cash service of a credit company, and is stored in the IC card so that a terminal device for input/output is used to make a payment.
  • the digital cash system which uses the IC card as a cash-box can be used at any place such as shops or the like as long as the input/output terminal is available. However, the system cannot be used at places such as homes or the like where no input/output terminal is available.
  • any device can be used as the cash-box which stores digital cash data, in addition to the IC card, as long as the device can store encrypted data and transmit the data to the party to which the payment is made.
  • a terminal which can be specifically used as the cash-box, there are personal computers, intelligent television sets, portable telephone sets such as personal digital assistant (PDA), personal handy-phone system (PHS), intelligent telephone sets, and PC cards or the like which has the input/output function.
  • PDA personal digital assistant
  • PHS personal handy-phone system
  • PC cards or the like which has the input/output function.
  • the digital cash system can be actualized by replacing in the configuration of the data copyright control system, database 1 with a customer's bank, a first user terminal 4 with a customer, the second user terminal 5 with a retailer, copyright management center 18 with a retailer's bank and a third user terminal 6 with a wholesaler or a manufacturer.
  • the digital cash is processed as an object associated with data and functions instead of being simple data.
  • the common digital cash form becomes an object
  • the unentered digital cash form private for an owner becomes a class
  • the entry column of a digital cash form private for the owner becomes a slot
  • the instruction of handling digital cash becomes a message
  • the digital cash form private for the owner in which an amount of money is entered becomes an instance.
  • Digital cash data comprising the amount of money and the like is used as an argument. Then, the data is transferred and stored in a slot which is referred to as an instance variable by the message so that a new instance is made which is digital cash in which the amount of money is renewed.
  • FIG. 7 The digital cash which constitutes an object will be explained by using FIG. 7.
  • reference numerals 23 , 25 and 27 represent a digital cash form private for the customer in which the amount of money stored in a customer terminal is entered
  • 29 represents a digital cash form private for the retail shop in which the amount of money stored in a retail shop terminal is entered
  • 24 , 26 and 28 represents accounts of each customer's bank.
  • the payment data 32 of the digital cash which corresponds to the paid amount is transferred as an argument to the slot which is an entry column of the digital cash form 23 with the message instructing the subtraction from the amount in the entry column of the digital cash form 23 . Then payment data 32 of the digital cash is subtracted from the residual amount data 30 and the drawn out data 31 in the digital cash form 23 so that a new instance is created in which the amount of money in the entry column of the digital cash form 23 is changed.
  • the payment data 32 of the digital cash is transferred to the digital cash form 29 private for the retail shop.
  • a similar withdrawal processing and payment processing are performed by digital cash forms 25 and 27 for other customers.
  • the payment data 33 of the digital cash is transferred from the digital cash form 25
  • the payment data 34 of the digital cash is transferred from the digital cash form 27 to the digital cash form 29 private for the retail shop.
  • the residual amount data 35 of the digital cash is usually entered.
  • the payment data 32 of the digital cash, the payment data 33 of the digital cash, and the payment data 34 of the digital cash are transferred as arguments to the slot which is an entry column of the digital cash form 29 with the message instructing the addition to the residual amount data 35 of the digital cash so that the payment data 32 , 33 and 34 of the digital cash are added to the residual amount data 35 of the digital cash, and a new instance is created in which the amount of money in the entry column of the digital cash form 29 is changed.
  • FIG. 4 An embodiment of the transaction system will be explained in which the digital cash is transferred via a communication network by using FIG. 8.
  • the embodiment is a modification of embodiment 9 by using a system shown in FIG. 4.
  • reference numeral 36 represents a customer, 37 a bank of customer 36 , 38 a retail shop, 39 a bank of retail shop 38 , 40 a manufacturer, 41 a bank of manufacturer 40 , 8 a public line provided by a communication enterprise or a communication network such as CATV line provided by a cable television enterprise.
  • Customer 36 , customer's bank 37 , retail shop 38 , retail shop's bank 39 , manufacturer 40 , manufacturer's bank 41 can be mutually connected with communication network 8 .
  • customer 36 can use cash service offered by a credit company other than banks and he can also interpose appropriate number of wholesalers between the retail shop and the manufacturer.
  • 42 and 43 are either IC cards or PC cards in which digital cash data is stored. The cards are used when the communication network is not used.
  • the broken line represents a path of encrypted-digital cash data
  • the solid line represents a path of requests from the customer, the retail shop or the manufacturer
  • the one-dot chain line represents a path of the secret-key from each bank.
  • the first secret-key prepared by customer's bank 37 , the second secret-key generated by the customer, the third secret-key generated by the retail shop, and the fourth secret-key prepared by the manufacturer are used as crypt keys.
  • customer's bank 37 In this embodiment, customer's bank 37 , retail shop's bank 39 , and manufacturer's bank 41 are explained as separate entities. These can be considered as a financial system as a whole.
  • the digital cash management program P for encrypting and decrypting the digital cash data is preliminarily distributed to customer 36 and is stored in the user terminal. Further, it is possible to transfer the digital cash management program P together with data every time a transaction with the bank is executed. Further, it is desirable to install the common digital cash programs P in all banks.
  • Customer 36 uses the user terminal to designate the amount of money via communication network 8 to request a withdrawal from the account of customer's bank 37 to the bank. At this time, the terminal presents customer information Ic.
  • the first secret-key Ks 1 can be selected from what is preliminarily prepared by customer's bank 37 , and also may be generated by presentation of the customer information Ic at the time of withdrawal of the customer using the digital cash management program P on the basis of the customer information Ic:
  • the first secret-key Ks 1 can be private for customer 36 . At the same time, it is not necessary to transfer the first secret-key Ks 1 to customer 36 so that the security of the system can be heightened. Further, the first secret-key Ks 1 can be generated on the basis of the bank information Ibs of customer's bank 37 or on the basis of the bank information Ibs and the date of key generation.
  • the generated second secret-key Ks 2 is stored in the user terminal.
  • customer 36 uses the secret-key Ks 1 to decrypt the encrypted digital cash data Cm 0 ks 1 with the digital cash management program P:
  • M 0 D(Ks 1 , Cm 0 ks 1 )
  • the first secret-key Ks 1 is disused at this time.
  • M 0 D(Ks 2 , Cm 0 ks 2 )
  • the payment is made by transmitting the encrypted digital cash data Cm 1 ks 2 to the user terminal as a cash-box of retail shop 38 via communication network 8 .
  • the customer information Ic is also transmitted to the user terminal of retail shop 38 .
  • the residual amount digital cash data M 2 is encrypted by the second secret-key Ks 2 using the digital cash management program P:
  • Retail shop 38 to which the encrypted digital cash data Cm 1 ks 2 and the customer information Ic are transferred stores the transferred encrypted digital cash data Cm 1 ks 2 and customer information Ic in the user terminal.
  • the customer information Ic is presented to retail shop's bank 39 via communication network 8 for confirming the content and the transmission for decryption key is requested.
  • Retail shop's bank 39 which is requested by retail shop 38 to transmit the second secret-key Ks 2 transmits the request of the transmission of the second secret-key Ks 2 and the customer information Ic to customer's bank 37 .
  • Customer's bank 37 which is requested to transmit the second secret-key Ks 2 from retail shop's bank 39 generates the second secret-key Ks 2 according to the customer information Ic by the digital cash management program P in the case where the second secret-key Ks 2 is based only on the customer information Ic, or generates the second secret-key Ks 2 according to the customer information Ic and the first secret-key Ks 1 by the digital cash management program P in the case where the second secret-key Ks 2 is based on the customer information Ic and the first secret-key Ks 1 , and transmits the generated second secret-key Ks 2 to shop's bank 39 .
  • Retail shop's bank 39 to which the second secret-key Ks 2 is transmitted from the customer's bank 37 transmits the second secret-key Ks 2 to retail shop 38 via communication network 8 .
  • Retail shop 38 to which the second secret-key Ks 2 is transferred decrypts the encrypted digital cash data Cm 1 ks 2 by the second secret-key Ks 2 using the digital cash management program P:
  • M 1 D(Ks 2 , Cm 1 ks 2 )
  • retail shop 38 transfers the article to customer 36 .
  • retail shop 36 can directly request the transfer of the second secret-key Ks 2 to customer's bank 37 instead of retail shop's bank 39 .
  • Retail shop's bank 39 to which the encrypted digital cash data Cm 1 ks 2 and the customer information Ic are transferred requests the transfer of the second secret-key Ks 2 to customer's bank 37 by transmitting the customer information Ic.
  • Customer's bank 37 which is requested to transfer the second secret-key Ks 2 from retail shop's bank 39 , generates the second secret-key Ks 2 according to the customer's information Ic by the digital cash management program P when the second secret-key Ks 2 is only based on the customer's information Ic, or generates the second secret-key Ks 2 according to the customer's information Ic and the first secret-key Ks 1 by the digital cash management program P when the second secret-key Ks 2 is based on the customer's information Ic and the first secret-key Ks 1 , then the generated second secret-key Ks 2 is transferred to retail shop's bank 39 .
  • Retail shop's bank 39 to which the second secret-key Ks 2 is transferred from customer's bank 37 , decrypts the encrypted digital cash data Cm 1 ks 2 by the second secret-key Ks 2 using the digital cash management program P:
  • M 1 D(Ks 2 , Cm 1 ks 2 )
  • retail shop 38 stocks products from manufacturer 40 or from the whole sale shops which come between retail shop 38 and the manufacturer 40 . Then retail shop 38 sells the products to customer 36 . Consequently, a transaction form is present between customer 36 and retail shop 38 just as between retail shop 38 and manufacturer 40 .
  • the digital cash is handled through bank.
  • information such as the processed amount of the digital cash, date, and the secret-key demanding party information with respect to the handling of the digital cash is stored in the customer's bank, the residual amount and usage history can be obtained.
  • digital cash is added by the customer's information which may be accompanied by digital signature. Therefore, the digital cash in the embodiment can also have a function of settlement system for checques drawn by customers.
  • this system can be applied to various systems such as a negotiation of a draft by a letter of credit and a bill of lading in the international trading, which have been executed by documents.
  • a public-key and a private-key are used as crypt keys for encrypting the digital cash data.
  • the secret-key ks and customer information 1 c used in embodiment 17 is not used. Consequently, in this digital cash system, the digital cash is used in the same form as money.
  • the party which receives the digital cash from a bank, a customer, a retail shop or a manufacturer with respect to this digital cash system prepares the public-key and the private-key.
  • the public-key can be preliminarily sent to the party which is scheduled to make a payment, or can be sent to the party before a transaction is executed.
  • an explanation is made on the supposition that the key is preliminarily distributed.
  • Customer 36 requests to customer's bank 37 for withdrawing the money from the bank account via communication network 8 from a user terminal, by indicating an amount of the money.
  • M 0 D(Kvc, Cm 0 kbc)
  • M 2 D(Kvc, Cm 2 kbc) and encrypts the digital cash data M 3 corresponding to the required amount of money with the digital cash management program P by the retail shop public-key Kbs which is preliminarily sent:
  • the payment is made by transferring the digital cash data to the terminal of retail shop 38 via communication network 8 .
  • Retail shop 38 to which the encrypted digital cash data Cm 3 Kbs is transferred decrypts the digital cash data with the digital cash management program P by the retail shop private-key Kvs corresponding to the retail shop public-key Kbs:
  • M 3 D(Kvs, Cm 3 kbs)
  • Retail shop 38 confirms the content and changes the residual amount data to M 6 (M 5 +M 3 ) in the case where the residual amount data M 5 is present in the terminal. Then, the digital cash data M 6 in which the amount of money is changed is encrypted with the retail shop public-key Kbs with the digital cash management program P:
  • Retail shop 38 which is willing to settle the stock account of products to manufacturer 40 makes the settlement using the same manner.
  • retail shop 38 stocks products either from manufacturer 40 or the wholesaler placed between retail shop 38 and manufacturer 40 and sells the products to customer 36 . Consequently, a trade form similar to the trade form between customer 36 and retail shop 38 is present between retail shop 38 and manufacturer 40 .
  • Advanced video conference system shows a system in which a computer system is incorporated in the video conference system so that the quality of the voice and the picture are improved, and data can be handled simultaneously with the voice and the picture.
  • embodiment 19 is intended; when video conference participants perform secondary use, to secure the privacy of other participants and data security by using the aforementioned configuration of the data copyright management system.
  • This video conference data management system can be actualized, for example, by replacing database 1 in the data copyright management system configuration shown in FIG. 4 with a participant of the video conference, the first user terminal 4 with another participant of the video conference, and the second user terminal 5 with non-participant of the video conference.
  • Embodiment 19 will be explained by using FIG. 9.
  • reference numeral 44 represents a participant as a host of the video conference, 45 a participant of the video conference as a guest, 46 a non-participant of the video conference as a user, 47 a non-participant of the video conference as another user, 8 a communication network such as a public telephone line provided by the communication enterprise and a CA television line provided by the cable television enterprise or the like. Participant 44 of the video conference is connected to participant 45 of the video conference via communication network 8 .
  • participant 45 of the video conference can be connected to non-participant 46 of the video conference, and non-participant 46 of the video conference to non-participant 47 of the video conference, via communication network 8 .
  • Reference numeral 48 represents a data recording medium.
  • the broken line is a path of the encrypted video conference content
  • the solid line is a path requesting the crypt key from non-participants 46 and 47 of the television conference to participant of the television conference 44
  • the one-dot chain line is a path of crypt keys from participant of the video conference 44 to participant of the video conference 45 and non-participants of the video conference 46 and 47 .
  • a video conference data management program P for encryption/decryption of the video conference data is previously distributed to video conference participant 45 and video conference non-participants 46 and 47 , and is stored in each terminal.
  • the video conference data management program P may be transferred whenever a crypt key is transferred.
  • a first secret-key prepared by video conference participant 44 a second secret-key prepared by video conference participant 45 and a third secret-key prepared by video conference non-participant 46 are also used.
  • Video conference participant 44 and video conference participant 45 perform the video conference by transmitting audio, picture and data (referred to as video conference data on the whole) each other, using each terminal via communication network 8 . Before the video conference, video conference participant 44 generates or selects the first secret-key Ks 1 to transfer to video conference participant 45 prior to the start of the video conference.
  • Video conference participant 45 receives the first secret-key Ks 1 and generates the second secret-key Ks 2 by the first secret-key Ks 1 using the video conference data management program P:
  • Ks 2 P(Ks 1 ).
  • Participant 44 of the video conference encrypts the video conference data M 0 with the first secret-key Ks 1 in the video conference via communication network 8 :
  • Participant 45 of the video conference who receives the video conference data Cm 0 ks 1 encrypted by the first secret-key Ks 1 decrypts the video conference data Cm 0 ks 1 by the first secret-key Ks 1 :
  • M 0 D(ks 1 , Cm 0 ks 1 )
  • the second secret-key Ks 2 is generated based on the first secret-key Ks 1 with the video conference data management program P:
  • Ks 2 P(Ks 1 ).
  • the decrypted video conference data M 0 is stored in the terminal of participant 45 of the video conference, copied to data record medium 48 , or transferred to the non-participant of the video conference via communication network 8 , the data M is encrypted by the second secret-key Ks 2 using the video conference data management program P:
  • the encrypted data Cmks 2 is copied to record medium 48 or supplied to the non-participant of the video conference via communication network 8 , together with the video conference data name or the video conference data number.
  • Non-participant 46 of the television conference who obtains the encrypted data CmKs 2 makes a request to participant 44 for the secondary use of the video conference data M from the terminal by specifying the name or number of the video conference data.
  • Participant 44 of the video conference who receives the request for the second use of the data M finds out the first secret-key Ks 1 according to the name or the number of the video conference data name or number to generate the second secret-key Ks 2 based on the first secret-key Ks 1 :
  • Ks 2 P(Ks 1 )
  • Non-participant 46 of video conference who receives the second secret-key Ks 2 , decrypts the encrypted data Cmks 2 by the second secret-key Ks 2 by using the television conference data management program P:
  • M D(Ks 2 , Cmks 2 )
  • the video conference data M is stored in the terminal of non-participant 46 of the video conference, copied to record medium 49 , or transmitted to non-participant 47 of the video conference, the video conference data M is encrypted by the second secret-key Ks 2 using the video conference data management program P:
  • the third secret-key Ks 3 may be generated on the basis of the second secret-key Ks 2 with the television conference data management program P:
  • Ks 3 P(Ks 2 )
  • the data M can be encrypted with the video conference data management program P by this generated third secret-key Ks 3 :
  • each user who uses the system of the present invention must previously be entered in a database system, and when entered in the system, software for database is supplied to the user.
  • the software includes not only normal communication software such as a data communication protocol but also a program for decrypting a copyright control program by a first crypt key, it needs to be protected.
  • a first crypt key K 1 , a second crypt key K 2 , and a copyright control program P are transferred to each user in order to use data M. Therefore, each user must keep these keys and the program. Further, the copyright information label, user information, the public-key and private-key in the public-key cryptosystem and the program containing algorithm for generating the secret-key are kept when needed.
  • a hard disk drive is also unstable against losing or altering data though it is more stable than the flexible disk.
  • IC cards have become available in which an IC element is sealed in a card-like package.
  • PCMCIA Personal Computer Memory Card International Association
  • JEIDA JEIDA
  • FIG. 10 shows an embodiment of the database copyright management system of the present invention constituted by using the PC card.
  • reference numeral 50 represents a microprocessor of a user terminal
  • 51 represents a system bus
  • 52 represents a PC card in which a PC card microprocessor 53 , read-only memory 55 , and random-access memory 56 are sealed.
  • System bus 51 , microprocessor 53 , read-only memory 55 , random-access memory 56 are connected with each other by PC card microprocessor bus 54 .
  • Read-only memory 55 stores fixed information such as database software and user data as a database. Read-only memory 55 also-stores a first crypt key, a second crypt key, and a copyright control program supplied from key control center 9 or a copyright management center. Because data is also written in read-only memory 55 , it is the simplest to use an EEPROM for memory 55 .
  • microprocessor 50 of the user terminal uses the software, crypt key and copyright control program stored in read-only memory 55 of PC card 52 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

A data copyright management system comprises a database for storing original data, a key control center for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections. Data supplied from the database to users is encrypted and distributed. The users decrypts the encrypted data by crypt keys obtained from the key control center or copyright management center. To supply data to users, there are the following two methods: a one-way supplying of encrypted data to users by means of broadcasting or the like; and two-way supplying of encrypted data to users corresponding to users' requests. A crypt key system used for encrypting data uses a secret-key cryptosystem, a public-key cryptosystem or a cryptosystem combining a secret-key and a public-key and further uses a copyright control program to control data copyrights. When a user stores, copies, or transfers data, the data is encrypted by a crypt key different from a crypt key used for supplying the data. The former crypt key is supplied from the key control center or from the copyright management center, or generated by the copyright control program. The present invention can be applied to a data copyright management system for using not only single data but also a plurality of data supplied from a single database or a plurality of data supplied from a plurality of databases. Further, an apparatus to be used by the user to perform data copyright management is proposed.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0001]
  • The present invention relates to a system for managing copyrights for using, storing, copying, editing, or transferring digital data, particularly in multimedia applications. [0002]
  • 2. Background Art [0003]
  • In the information-oriented society of today, database systems are becoming wide spread in which it is possible to use various types of data, stored independently in each computer in the past, by connecting computers via communication lines. [0004]
  • In such a database system, the information handled up to this point has been conventionally coded information that can be processed by a computer, and that contains a relatively small amount of information and monochrome binary data, such as facsimile information at most. It is not possible to handle data containing a relatively large amount of information, such as data for natural pictures or animation. [0005]
  • With the rapid progress of digital processing technique for various electric signals, a technique is under development for digital processing of picture signals other than binary data, handled only as analog signals in the past. [0006]
  • By digitizing the picture signal, it is possible to handle a picture signal, e.g., a television signal, by a computer. “Multimedia systems” is an emerging technology of the future capable of simultaneously handling the data handled by computers and digitized picture data. [0007]
  • Because picture data contains an overwhelmingly large amount of information compared with character data and audio data, it is difficult to store or transfer or process the picture data by computer. For this reason, techniques for compressing or expanding picture data have been developed. Further, several standards for compression/expansion of picture data have been established. For example, the following standards have been established as common standards: JPEG (Joint Photographic image coding Experts Group) standards for still pictures, H.261 standards for video conferences, MPEG1 (Moving Picture image coding Experts Group 1) standards for picture accumulation, and MPEG2 standards for current television broadcasting and high definition television broadcasting. By using these new techniques, it is now possible to transmit digital picture data in real time. [0008]
  • For analog data, which has been widely used in the past, the control of copyrights during processing has not been an important issue because the quality of the analog data deteriorates each time the data is stored, copied, edited, or transferred, the editing of a copyright produced due to the above operation has not been a large problem. However, the quality of digital data does not deteriorate when the data is repeatedly stored, copied, edited, or transferred. Therefore, the management and control of copyrights during processing of digital data is an important issue. [0009]
  • Up to now, there has been no adequate method for management and control of copyrights for digital data. It has been managed and controlled merely by copyright law or by contracts. In copyright law, only compensation for digital sound or picture recording devices has been prescribed. [0010]
  • It is possible not only to refer to the content of a database, but also to effectively utilize the data obtained from the database by storing, copying, or editing the data, and also transferring the edited data to the database with the edited data registered as new data. Further, it is possible to transfer edited data to other persons via a communication link or by a proper recording medium. [0011]
  • In a conventional database system, only character data is handled. However, in multimedia systems, sound data and picture data originally generated as analog data, are digitized and used as part of the database in addition to the other data in the database such as character data. [0012]
  • Under such circumstances, it is an important question to determine how to handle copyrights of the data in the database. However, there are no means in the prior art for copyright management and control of such actions as copying, editing, transferring, etc. of data. [0013]
  • The inventors of the present invention proposed a system for copyright management, wherein a permit key is obtained from a key control center via a public telephone line in Japanese Patent Laid-Open No. 46419/1994 and Japanese Patent Laid-Open No. 141004/1994. Japanese Patent Laid-Open No. 132916/1994 to the same inventors also discusses an apparatus for copyright management and control. [0014]
  • The database copyright management system of the prior applications use one or any combination of the copyright control program, the copyright information, and the copyright control message in addition to a permit key corresponding to a request. [0015]
  • The copyright control message is displayed on a screen and advises or warns the user if the data is utilized in a manner inconsistent with the user's request permission. The copyright control program watches and controls data use so that the data is not utilized beyond the conditions of the user's request or permission. [0016]
  • The copyright control program, the copyright information and the copyright control message are supplied together with a permit key in some cases, but they may be supplied with data in other cases. It is also possible to supply a part of them together with the permit key, and to supply the other part with the data. [0017]
  • For the data, the permit key, the copyright control message, the copyright information, or the copyright control program, there are the following three cases: they are transmitted in encrypted form and decrypted upon use; they are transmitted in encrypted form and decrypted only when they are displayed; or they not encrypted at all. [0018]
  • SUMMARY OF THE INVENTION
  • The present invention provides a data copyright management system comprising a database for storing original data, a key control center for managing a crypt key, a copyright management center for managing a data copyright. A communication network is provided to connect the database, the key control center, and the copyright management center, wherein data from the database is encrypted and the user decrypts the data with a crypt key obtained from the key control center or the copyright management center. [0019]
  • For supplying data to a user, there are the following two methods: a one-way communication of encrypted data to the user such as by broadcasting; and a two-way communication of encrypted data to the user in accordance with the user's request. [0020]
  • Different schemes are available for a cryptographic system: a secret-key cryptosystem, a public-key cryptosystem, or a system combining a secret-key and a public-key. A cryptographic system further uses a copyright control program for managing data copyrights. [0021]
  • When a user stores, copies, or transmits data, the data is encrypted by a crypt key, which is obtained from the key control center or from the copyright management center, or generated by the copyright control program. [0022]
  • The present invention can be applied to copyright control not only a single data value but also a plurality of data values from a single database or a plurality of data values supplied from a plurality of databases. Further, an apparatus is also proposed for performing data copyright management. [0023]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a data copyright management system for [0024] embodiments 1, 2, and 3 of the present invention.
  • FIG. 2 illustrates a data copyright management system of [0025] embodiment 4 of the present invention.
  • FIG. 3 illustrates a data copyright management system for [0026] embodiments 5, 6, and 7 of the present invention.
  • FIG. 4 illustrates a data copyright management system for [0027] embodiments 8, 9, 10 and 11 of the present invention.
  • FIG. 5 illustrates a data copyright management system for [0028] embodiments 12 and 13 of the present invention.
  • FIG. 6 is an illustration for data editing. [0029]
  • FIG. 7 is an illustration showing a digital cash system. [0030]
  • FIG. 8 illustrates a digital cash system for [0031] embodiments 17 and 18 of the present invention.
  • FIG. 9 illustrates a video conference system for [0032] embodiment 19 of the present invention.
  • FIG. 10 illustrates an embodiment of a user terminal used for the data copyright management system of the present invention. [0033]
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention is a database copyright management system described with respect to multimedia applications. In the following description, numerous specific details are set forth to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail so as not to obscure the present invention. [0034]
  • The cryptography system, in general, includes a secret-key cryptosystem and a public-key cryptosystem. The secret-key cryptosystem is a cryptosystem in which the same crypt key is used for encryption and decryption. Although this cryptosystem requires relatively shorter time for encryption or decryption, once the secret-key is known, the cryption can be cryptanalyzed. [0035]
  • The public-key cryptosystem is a cryptosystem which provides two keys: a key for encryption open to the public as a public-key and a key for decryption not open to the public. The key for encryption is referred to as a public key and the key for decryption is referred to as a private key. A party transferring information encrypts the information with a public-key of a receiving party and the receiving party decrypts the information with a private-key. While this cryptosystem requires relatively longer time for encryption or decryption, the private-key is hard to find and it is very difficult to cryptanalyze the cryption. [0036]
  • In the cryptography, the encryption of a plaintext M with a crypt key K to obtain a cryptogram C is expressed as [0037]
  • C=E(K,M) [0038]
  • and the decryption of the cryptogram C with the cryptographic key K to obtain the plaintext M is expressed as [0039]
  • M=D(K,C). [0040]
  • The cryptosystem used for the present invention uses a secret-key cryptosystem in which the same secret-key Ks is used for encryption and decryption, and a public-key cryptosystem in which a public-key Kb is used for encryption of a plaintext and a private-key Kv is used for decryption of a cryptogram. [0041]
  • In Japanese Patent Application No. 64889/1994, the present inventors proposed a copyright management method for primary utilization of digital data such as display (including sound) or storage of the digital data in a database system including real-time transmission of a digital picture as well as secondary utilization of the digital data such as copying, editing, or transferring of the digital data. [0042]
  • The present invention applies the data copyright management method proposed in the Japanese Patent Application No. 64889/1994 to provide a data copyright management system. [0043]
  • [Embodiment 1][0044]
  • FIG. 1 shows the first embodiment of the data copyright management system of the present invention. The first embodiment uses the secret-key system as a cryptosystem. [0045]
  • The embodiment of FIG. 1 comprises database [0046] 1 in which text data, binary data serving as a computer graphic display or a computer program, digital audio data, and digital picture data are stored in encrypted form, space satellite 2 such as a communications satellite or a broadcasting satellite, data recorder 3 such as a CD-ROM or a flexible disk, communication network 8 such as a public telephone line offered by a communication enterprise or a CATV (cable TV) line offered by a cable television enterprise, primary user terminal 4, key control center 9 for managing a secret-key, and copyright management center 10 for managing data copyrights.
  • [0047] Reference numerals 5, 6, and 7 represent a secondary user terminal, a tertiary user terminal, and n-order user terminal respectively, and 11, 12, and 13 represent a secondary disk, tertiary disk, and n-order disk serving as a recording medium such as a flexible disk or CD-ROM respectively. The symbol “n” represents an optional integer. When “n” is larger than 4, a corresponding user terminal and a corresponding disk are arranged between tertiary user terminal 6 and the n-order user terminal 7 and between the tertiary disk 12 and the n-order disk 13 respectively.
  • In the above arrangement, database [0048] 1, key control center 9, copyright management center 10, primary user terminal 4, secondary user terminal 5, tertiary user terminal 6, and n-order user terminal 7 are connected to communication network 8.
  • In FIG. 1, the broken line indicates encrypted data flow, the solid line indicates requests from each user terminal, and the one-dot chain line indicates authorization information corresponding to a utilization request and a secret-key are transferred. [0049]
  • When the user is entered in the system, a database utilization software is given to the user. The database utilization software includes not only normal communication software such as a data communication protocol but also a program for running a copyright control program. [0050]
  • Original data MO such as text data, binary data as a computer graphic display or computer program, digital audio data, or digital picture data stored in database [0051] 1 or data recording medium 3 is one-way supplied to primary user terminal 4 via the satellite 2 or recording medium 3. In this case, the data is encrypted with a first secret-key Ks1:
  • Cm[0052] 0ks1=E(Ks1,M0).
  • Even if data is offered free of charge to public, it is necessary to encrypt the data in order to protect the copyright. [0053]
  • Japanese Patent Application No. 64889/1994 discloses that the data utilization includes not only displaying of data but also storing, editing, copying, and transferring of the data, and that a use permit key is prepared for one or several forms of use and its management is executed by the copyright control program. It is further described in the Japanese application that data is encrypted again by the copyright control program for storing, copying, editing and transferring of the data other than display and edit operations. Thus, the data is encrypted for distribution, and decrypting is performed only when for display or edit operations in a user terminal with a copyright handling capability. [0054]
  • This embodiment applies the method described above in the prior application. [0055]
  • A primary user who desires primary utilization of the encrypted data Cm[0056] 0ks1 makes a request by sending the original data name or the original data number to key management center 9 via communication network 8 from primary user terminal 4. In this case, the primary user must present information Iu1 for primary user to key management center 9.
  • [0057] Key management center 9 receiving the primary utilization request from primary user terminal 4 transfers the first secret-key Ks1 for decrypting the encrypted original data Cm0ks1 obtained from database 1 by the primary user and the second secret-key Ks2 for re-encrypting the decrypted original data M0 or edited data M1 from the original data, together with a copyright control program P via communication network 8 to primary user terminal 4.
  • In [0058] primary user terminal 4 receiving the first secret-key Ks1 as a decryption key and the second secret-key Ks2 as an encryption/decryption key, the encrypted original data Cm0ks1 is decrypted by using the copyright control program P and the first secret-key Ks1 to use the decrypted original data M0 directly or data M1 as edited.
  • M[0059] 0=D(Ks1, Cm0ks1)
  • When the data M, which can be the original data M[0060] 0 or edited data M1, is stored in a memory or a built-in hard disk drive of primary user terminal 4, only the primary user can use the data. However, when the data M is copied to external recording medium 11 such as a flexible disk or transmitted to secondary user terminal 5 via communication network 8, a copyright problem due to secondary utilization might occur.
  • When the original data M[0061] 0 obtained by a primary user is directly copied and supplied to a secondary user, the copyright of the primary user is not affected on the data M0 because the original data M0 is not modified at all. However, when the primary user produces new data M1 by editing the obtained data or by using other methods such as combining with other data, the copyright of the primary user, i.e., secondary exploitation right for secondary utilization of original data, is affected on the data M1.
  • Similarly, when a secondary user produces new data M[0062] 2 by editing the original data M0 or edited data M1 obtained from the primary user by methods such as combining with other data, the copyright of the secondary user; i.e., secondary exploitation right on the secondary user is also effected.
  • In this embodiment, in order to protect the copyrights, the data M is encrypted by the second secret-key Ks[0063] 2 using the copyright control program P when the data M is stored, copied, or transferred. Thereafter, in primary user terminal 4, the data M is decrypted and encrypted by the second secret-key Ks2:
  • Cmks[0064] 2=E(Ks2, M)
  • M=D(Ks[0065] 2, Cmks2).
  • It is also possible to limit the number of repeated operations by the copyright control program. [0066]
  • When the data M is copied to [0067] external recording medium 11 or transmitted via communication network 8, the first secret-key Ks1 and the second secret-key Ks2 in primary user terminal 4 are disused by the copyright control program P. Therefore, in order to reuse the data M, the primary user needs to request for utilization of the data M to key control center 9 to reobtain the second secret-key Ks2.
  • If the user receives the regrant of the second secret-key Ks[0068] 2, that represents secondary utilization of data in which the data M has been copied to external recording medium 11 or transmitted to secondary user terminal 5 via communication network 8. Therefore, the fact is registered in copyright management center 10 from key control center 9 and subsequent secondary utilization comes possible.
  • The data M is moved from [0069] primary user terminal 4 to secondary user terminal 5 by external recording medium 11 or communication network 8. When the data M is copied to external recording medium 11 or transmitted via communication network 8, it is encrypted by the second secret-key Ks2.
  • When the data M is copied to [0070] external recording medium 11 and transmitted via communication network 8, the first secret-key Ks1 and the second secret-key Ks2 in primary user terminal 4 are disused. In this case, uncrypted primary user information Iu1 is added to the encrypted data Cmks2 stored in primary user terminal 4 and when the encrypted data Cmks2 is transmitted to a secondary user, the primary user information Iu1 is also transferred.
  • A secondary user who desires secondary utilization of the encrypted data Cmks[0071] 2 copied or transmitted from a primary user must present original data name or data number to copyright management center 10 via communication network 8 by secondary user terminal 5 and also present the secondary user information Iu2 to request secondary utilization of the data Cmks2 to the center 10. In this case, the secondary user further presents the uncrypted primary user information Iu1 added to the encrypted data Cmks2 in order to clarify the relationship with the primary user.
  • [0072] Copyright management center 10 confirms that the primary user has received a regrant of the second secret-key Ks2 for secondary utilization of the data, in accordance with the presented primary user information Iu1. Copyright management center 10, then, transfers the second secret-key Ks2 serving as a decryption key and the third secret-key Ks3 serving as an encryption/decryption key to secondary user terminal 5 via communication network 8.
  • In [0073] secondary user terminal 5 receiving the second secret-key Ks2 and the third secret-key Ks3, the encrypted data Cmks2 is decrypted using the second secret-key Ks2 by the copyright control program P
  • M=D(Ks[0074] 2, Cmks2)
  • and is secondarily utilized for display or edit operations. [0075]
  • In this embodiment, [0076] key control center 9 processes a primary utilization requests and copyright management center 10 processes a secondary utilization requests. While the data M supplied to a primary user is encrypted by the first secret-key Ks1, the data M supplied to a secondary user is encrypted by the second secret-key Ks2. Further, the first secret-key Ks1 and the second secret-key Ks2 are transferred to the primary user as crypt keys from key control center 9.
  • Therefore, if the secondary user, instead of the primary user, falsely makes a request for primary utilization to [0077] key control center 9, the first secret-key Ks1 for decryption and the second secret-key Ks2 for encryption/decryption are transferred to the secondary user. However, the secondary user cannot decrypt the encrypted data Cmks2 by using the first secret-key Ks1 transferred as a decryption key.
  • Therefore, it is impossible to falsely request for data utilization and as a result, not only the original copyright of data but also the copyright of the primary user on the data are protected. [0078]
  • When storing, copying, or transferring of the data M other than displaying and displaying for editing is performed in [0079] secondary user terminal 5, the data M is encrypted using the third secret-key Ks3 by the copyright control program P and thereafter, the data is decrypted and encrypted by the third secret-key Ks3:
  • Cmks[0080] 3=E(Ks3, M)
  • M=D(Ks[0081] 3, Cmks3).
  • Further, it is free in principle that a secondary user displays and edits data to obtain the edited data M[0082] 2. In this case, it is possible to limit the repetitions of the operation by the copyright control program P.
  • When the data M is copied to [0083] external recording medium 12 or transmitted via communication network 8, the second secret-key Ks2 and the third secret-key Ks3 in secondary user terminal 5 are disused by the copyright control program P. Therefore, in order to reuse the data M, the secondary user makes a request for the utilization of the data to copyright management center 10 to reobtain the third secret-key Ks3.
  • The fact that the secondary user receives a regrant of the third secret-key Ks[0084] 3 represents secondary utilization of data in which the data M has been copied to external recording medium 12 or transmitted to tertiary user terminal 6 via communication network 8. Therefore, the fact is entered in copyright management center 10 and allows the secondary user for further data use.
  • The data M is moved from [0085] secondary user terminal 5 to tertiary user terminal 6 by external recording medium 12 or by communication network 8. When the data M is copied to external recording medium 12 or transmitted via communication network 8, it is encrypted by the third secret-key Ks3.
  • When the data M is copied to [0086] external recording medium 12 or transmitted to tertiary user terminal 6 via communication network 8, the second secret-key Ks2 and the third secret-key Ks3 in secondary user terminal 5 are disused. In this case, the uncrypted secondary user information Iu2 is added to the encrypted data Cmks3 stored in secondary user terminal 5, and when the encrypted data Cmks3 is transmitted to a tertiary user, the secondary user information Iu2 is also transferred.
  • For adding user information to data, there are the following two cases: every information is added to data whenever it is copied or transmitted; and the history updated whenever the data is copied or transmitted is stored in the copyright management center. [0087]
  • A tertiary user who desires tertiary utilization of the encrypted data Cmks[0088] 3 copied or transmitted from the secondary user must present original data name or number to copyright management center 10 from a tertiary user terminal 6 via communication network 8 together with the tertiary user information Iu3 to request tertiary utilization of the data. In this case, the tertiary user further presents the uncrypted secondary user information Iu2 added to the encrypted data Cmks3 in order to show the relationship with the secondary user.
  • [0089] Copyright management center 10 confirms that the secondary user has received a regrant of the third secret-key Ks3 for tertiary utilization of the data, in accordance with the presented secondary user information Iu2. Copyright management center 10, then, transfers the third secret-key Ks3 serving as a decryption key and the fourth secret-keyKs4 serving as an encryption/decryption key to tertiary user terminal 6 via communication network 8.
  • In [0090] tertiary user terminal 6 receiving the third secret-key Ks3 and the fourth secret-key Ks4, the encrypted data Cmks3 is decrypted using the third secret-key Ks3 by the copyright control program P
  • M=D(Ks[0091] 3, Cmks3)
  • and is tertiarily utilized for operations such as display or edit. [0092]
  • In this embodiment, the data M supplied to a primary user is encrypted by the first secret-key Ks[0093] 1 and the data M supplied to a secondary user is encrypted by the second secret-key Ks2, and the data M supplied to a tertiary user is encrypted by the third secret-key Ks3.
  • Therefore, if the tertiary user, instead of the primary user, falsely sends a request for primary utilization to [0094] key control center 9, the first secret-key Ks1 for decryption and the second secret-key Ks2 for encryption/decryption are transferred to the tertiary user. However, it is impossible to decrypt the encrypted data Cmks3 by the first secret-key Ks1 transferred as a decryption key. Further, if the tertiary user, instead of the secondary user, falsely sends a request for secondary utilization to key control center 9, the second secret-key Ks2 and the third secret-key Ks3 are transferred to the tertiary user as a decryption key and an encryption/decryption key respectively. However, it is impossible to decrypt the encrypted data CmKs3 by the second secret-key Ks2 transferred as a decryption key.
  • Therefore, it is impossible to falsely request data utilization. As a result, not only the original copyright of the data but also the copyrights of the primary and secondary users on the data are protected. [0095]
  • The same procedure is applied to quaternary and subsequent utilization. [0096]
  • In the above described embodiment, database [0097] 1, key control center 9, and copyright management center 10 are separately arranged. However, it is not always necessary to arrange them separately. It is also possible to arrange all of or two of them integrally.
  • Further, it is also possible to send a request for a regrant of a secondary crypt key from the primary user to [0098] copyright management center 10 instead of to key control center 9 as described in the above embodiment.
  • [Embodiment 2][0099]
  • Though the structure of this embodiment is mostly the same as that of the embodiment 1, a copyright control program and, if required, first and second secret-keys are encrypted and supplied. [0100]
  • Also in the case of this embodiment, similarly to the case of the first embodiment, original data is encrypted and supplied in a one-way communication to a user from a single database and the user selects desired data out of the original data. [0101]
  • Because the system structure used for the second embodiment is the same as that of embodiment 1 shown in FIG. 1, description of the system structure is omitted. [0102]
  • In this embodiment, the original data M[0103] 0 stored in database 1 is supplied in a one-way communication to primary user terminal 4 via the satellite 2, recording medium 3, or communication network 8. The data M0 is encrypted by the first secret-key Ks1:
  • Cm[0104] 0ks1=E(Ks1, M0).
  • A primary user who desires primary utilization of the supplied encrypted data Cm[0105] 0ks1 sends a request for the primary utilization of the encrypted original data Cm0ks1 to key control center 9 by using primary user terminal 4 and presenting an original data name or an original data number via communication network 8. In this case, the primary user must present the primary user information Iu1 to key control center 9.
  • The [0106] key management 9 receiving the request of the primary utilization of the encrypted original data Cm0ks1 generates a secret-key Ksul unique to the primary user using the primary user information Iu1 and transfers it to copyright management center 10.
  • [0107] Copyright management center 10 receives the secret-key Ksu1 and encrypts the copyright control program P by using the secret-key Ksu1 which is unique to the primary user.
  • Cpksu[0108] 1=E(Ksu1, P) Copyright management center 10 transfers the encrypted copyright control program Cpksu1 to key control center 9. The encrypted copyright control program Cpksu1 thus generated is unique to the primary user.
  • [0109] Key control center 9 transfers the first secret-key Ks1 for decryption and the second secret-key Ks2 for decryption/encryption to primary user terminal 4 via communication network 8, together with the encrypted copyright control program Cpksu1 received from copyright management center 10.
  • In [0110] primary user terminal 4 receiving the encrypted copyright control program Cpksu1, first secret-key Ks1, and second secret-key Ks2, database system software S previously distributed generates a primary user unique secret-key Ksu1 in accordance with the primary user information Iu1:
  • Ksu[0111] 1=S(Iu1),
  • An encrypted copyright control program Cpksu[0112] 1 is decrypted by the generated primary user unique secret-key Ksu1:
  • P=D(Ksu[0113] 1, Cpksu1),
  • the encrypted original data Cm[0114] 0ks1 is decrypted by the first secret-key Ks1 using the copyright control program P:
  • M[0115] 0=D(Ks1, Cm0ks1),
  • and the decrypted original data M[0116] 0 directly or edited data M1 is used.
  • When the data M such as the original data M[0117] 0 or edited data M1 is stored, copied, or transferred, it is encrypted by the copyright control program P using the secret-key Ks2, and thereafter the data M is decrypted and encrypted in primary user terminal 4 by the second secret-key Ks2:
  • Cmks[0118] 2=E(Ks2, M)
  • M=D(Ks[0119] 2, Cmks2).
  • When the data M is copied to [0120] external recording medium 11 or the data is transmitted via communication network 8, the first secret-key Ks1 and the second secret-key Ks2 in primary user terminal 4 are disused by the copyright control program P. Therefore, when the primary user uses the data M again, the user sends a request for utilization of the data M to key control center 9 to reobtain the second secret-key Ks2.
  • The fact that the primary user receives a regrant of the second secret-key Ks[0121] 2 represents secondary utilization of data in which the data M has been copied to external recording medium 11 or transmitted to secondary user terminal 5 via communication network 8. Therefore, this is entered in copyright management center 10 from key control center 9 and thereafter, secondary utilization of the data can be made.
  • The data M is moved from [0122] primary user terminal 4 to secondary user terminal 5 by external recording medium 11 or by communication network 8.
  • When the data M is copied to [0123] external recording medium 11 or transmitted via communication network 8, it is encrypted by the second secret-key Ks2.
  • When the data M is copied to [0124] external recording medium 11 or transmitted via communication network 8, the first secret-key Ks1 and the second secret-key Ks2 in primary user terminal 4 are disused. In this case, the uncrypted information Iu1 on a primary user is added to the encrypted data Cmks2 stored in primary user terminal 4. Therefore, when the encrypted data Cmks2 is transmitted to a secondary user, the primary user information Iu1 is also transferred to the user.
  • A secondary user who desires secondary utilization of the encrypted data Cmks[0125] 2 copied or transmitted from the primary user must designate a data name or number added to the original data to copyright management center 10 via communication network 8 by secondary user terminal 5 and also present a secondary user information Iu2 to request for the secondary utilization of the data to the center 10. In this case, the secondary user further presents the uncrypted primary user information Iu1 added to the encrypted data Cmks2 in order to clarify the relationship with the primary user.
  • [0126] Copyright management center 10 confirms that the primary user has received a regrant of the secondary secret-key Ks2 for secondary-utilizing the data in accordance with the presented primary user information Iu1 and then, generates a secret-key Ksu2 unique to the secondary user in accordance with the presented secondary user information Iu2.
  • [0127] Copyright management center 10 encrypts the copyright control program P by the secondary user unique secret-key Ksu2
  • Cpksu[0128] 2=E(Ksu2, P)
  • and transfers the encrypted copyright control program Cpksu[0129] 2, second secret-key Ks2 serving as a decryption key, and third secret-key Ks3 serving as an encryption/decryption key via communication network 8 to secondary user terminal 5.
  • Further, the information Iu[0130] 1 for a primary user may be added to the encrypted copyright control program Cpksu2.
  • In [0131] secondary user terminal 5 receiving the second secret-key Ks2 and the third secret-key Ks3, database utilization software generates a secondary user unique secret-key Ksu2 in accordance with the secondary user information Iu2
  • Ksu[0132] 2=S(Iu2),
  • and an encrypted copyright control program Cpksu[0133] 2 by the generated secondary user unique secret-key Ksu2
  • P=D(Ksu[0134] 2, Cpksu2),
  • the encrypted original data Cmks[0135] 2 is decrypted by the second secret-key Ks2 using the decrypted copyright control program P
  • M=D(Ks[0136] 2, Cmks2),
  • and the decrypted data M directly or by editing it is used. [0137]
  • Thus, by generating a crypt key unique to a user in accordance with the information of the user requests for utilization, and encrypting a copyright control program by the generated user unique crypt key, the security of a data copyright management system is improved. [0138]
  • Further, by encrypting each secret-key to be supplied to a user, using the user unique crypt key, the security of the data copyright management system can be further improved. [0139]
  • [Embodiment 3][0140]
  • As still another method for solving the copyright problem caused when the data M is copied to [0141] external recording medium 11 or transmitted via communication network 8 in the system shown in FIG. 1, it is possible to limit the primary utilization request by a user of primary user terminal 4 to only for permits of displaying, storing and editing so that other utilization such as copying and transferring cannot be authorized except by separate requests, and disuse the first secret-key Ks1 and the second secret-key Ks2 in primary user terminal 4 when the data M is copied to external recording medium 11 or transmitted to secondary user terminal 5 via communication network 8.
  • Thus, it is possible for [0142] copyright management center 10 to more securely control copy or transfer operations of the data M.
  • [Embodiment 4][0143]
  • FIG. 2 shows a structure of [0144] embodiment 4 of the data copyright management system of the present invention. In FIG. 1, encrypted data is one-way supplied via the satellite 2, recording medium 3, or communication network 8. In embodiment 2, however, encrypted data is supplied in a two-way communication in accordance with a request from the primary user 4.
  • This embodiment uses the public-key cryptosystem as a crypt key system. It is possible that [0145] embodiment 2 can be applied for a satellite broadcast, ground wave broadcast, CATV broadcast or a recording medium other than a database as data supply means provided with advertisement requiring no charge or encryption.
  • In the system shown in FIG. 2 similarly to the system shown in FIG. 1, reference numeral [0146] 1 represents a database, 4 represents a primary user terminal, 5 represents a secondary user terminal, 6 represents a tertiary user terminal, and 7 represents an n-order user terminal.
  • [0147] Reference numeral 14 represents a secondary copyright management center, 15 represents a tertiary copyright management center, 16 represents an n-order copyright management center, 8 represents a communication network such as a public telephone line offered by a communication enterprise or a CATV line offered by a cable television enterprise.
  • In the above arrangement, database [0148] 1, primary user terminal 4, secondary user terminal 5, tertiary user terminal 6, n-order user terminal 7, secondary copyright management center 14, tertiary copyright management center 15, and n-order copyright management center 16 are connected to communication network 8. They can also be connected to each other.
  • In FIG. 2, the broken line represents a path for encrypted data, the solid line represents a path of requests from each user terminal, the one-dot chain line represents a path through which authorization information sent from each database corresponding to a utilization request and a crypt key are transferred, and a two-dot chain line represents a path through which copyright information is transferred from the database or each copyright management center database to a next-order copyright management center database. [0149]
  • Each user who uses this system is previously entered in a database system and in this time, database utilization software is provided to the user. The database utilization software includes a program for decrypting an encrypted copyright control program in addition to normal communication software such as a data communication protocol. [0150]
  • To use database [0151] 1, a primary user must prepare primary-user authentication data Au1, a first public-key Kb1, a first private-key Kvl corresponding to the first public-key Kb1, a second public-key Kb2, and a second private-key Kv2 corresponding to the second public-key Kb2, and accesses database 1 from primary user terminal 4 via communication network 8.
  • Database [0152] 1 receives the primary-user authentication data Au1, first public-key Kb1 and second public-key Kb2 from the primary user, confirms the primary-user authentication data Au1, and transfers the confirmed primary-user authentication data Au1 to the secondary copyright management center 14 as the primary user information Iu1.
  • Database [0153] 1 prepares two secret-keys, i.e., the first secret-key Ks1 and the second secret-key Ks2. The two secret-keys may be prepared by using key control center 9 of embodiment 1 shown in FIG. 1.
  • In the prepared first secret-key Ks[0154] 1 and second secret-key Ks2, the second secret-key Ks2 is also previously transferred to the copyright management center 14.
  • As the result of the transfers, the primary user information Iu[0155] 1 corresponding to primary utilization, original copyright information Ic and the second secret-key Ks2 are stored in the copyright management center 14. In this case, the original copyright information Ic is used for copyright royalties distribution.
  • When a primary user who desires data utilization accesses database [0156] 1 from primary user terminal 4, a data menu is transferred to him. In this case, information for charges may be displayed together with the data menu.
  • When the data menu is transferred, the primary user retrieves in the data menu to select the data M. In this case, the original copyright information Ic of the selected data M is transmitted to the [0157] copyright management center 14.
  • The original data M[0158] 0 is read out of database 1 in accordance with a request of a primary user. The original data M0 is then encrypted by the first secret-key Ks1:
  • Cm[0159] 0ks1=E(Ks1, M0).
  • The encrypted data Cm[0160] 0ks1 is provided with the uncrypted original copyright information Ic.
  • The first secret-key Ks[0161] 1 is encrypted by the first public-key Kb1 and the second secret-key Ks2 is encrypted by the second public-key kb2:
  • Cks[0162] 1kb1=E(Kb1, Ks1)
  • Cks[0163] 2kb2=E(Kb2, Ks2).
  • While the copyright control program P is also encrypted by the second public-key Ks[0164] 2
  • CpKs[0165] 2=E(Ks2, P),
  • the copyright control program P may not be encrypted by the second secret-key Ks[0166] 2, but it may be encrypted by any other proper crypt key.
  • The encrypted original data Cm[0167] 0ks1, encrypted copyright control program Cpks2, and two encrypted secret-keys Cks1kb1 and Cks2kb2 are transferred to primary user terminal 4 via communication network 8, and the user is charged for the service, if necessary.
  • It is possible to store the encrypted copyright control program Cpks[0168] 2 in a storage device such as ROM in the user terminal 4 instead of being supplied from database 1.
  • The primary user receiving the encrypted original data Cm[0169] 0ks1, two encrypted secret-keys Cks1kb1 and Cks2kb2, and encrypted copyright control program Cpks2 from database 1 decrypts the encrypted first secret-key Cks1kb1 by the database utilization software using the first private-key Kv1 corresponding to the first public-key Kb1:
  • Ks[0170] 1=D(Kv1, Cks1kb1),
  • and decrypts the encrypted second secret-key Cks[0171] 2kb2 using the second private-key Kv2 corresponding to the second public-key Kb2:
  • Ks[0172] 2=D(Kv2, Cks2kb2).
  • The primary user decrypts the encrypted copyright control program Cpks[0173] 2 using the decrypted second secret-key Ks2:
  • P=D(Ks[0174] 2, Cpks2).
  • Finally, the primary user decrypts the encrypted data Cm[0175] 0ks1 by the decrypted copyright control program P using the decrypted first secret-key Ks1:
  • M[0176] 0=D(Ks1, Cm0ks1)
  • and uses the decrypted original data M[0177] 0 or data M1 as edited.
  • As described above, the first private-key Kv[0178] 1 and second private-key Kv2 are crypt keys prepared by the primary user, but the keys are not known to others. Therefore, even if a third party obtains the data M, it is impossible to use the encrypted data M by decrypting it.
  • Thereafter, the data M such as the original data M[0179] 0 or the edited data Ml is encrypted and decrypted by the second secret-key Ks2 for operations such as store, copy, or transmit:
  • Cmks[0180] 2=E(Ks2, M)
  • M=D(Ks[0181] 2, Cmks2).
  • The decrypted second secret-key Ks[0182] 2 is thereafter used as a crypt key for encrypting/decrypting data for storing, copying, or transferring the data.
  • The first private-key Kv[0183] 1 and second private-key Kv2, the first secret-key Ks1 and second secret-key Ks2, the data M, the copyright control program P, the original copyright information Ic, and also the original copyright information Ic and secondary copyright information Ic1 for information of the primary user and the date and time of edit operations by the primary user are stored in primary user terminal 4.
  • It is further protected by attaching the copyright information Ic[0184] 1 to the data as copyright information label, and adding the digital signature.
  • The encrypted data Cmks[0185] 2 is encrypted before distribution. Since the copyright information label provides a due to obtain the second secret-key Ks2 which is the key for decryption, the second secret key Ks2 cannot be obtained when the copyright information label is removed from the encrypted data Cmks2.
  • When the encrypted data Cmks[0186] 2 is stored in primary user terminal 4, the second secret-key Ks2 is stored in the terminal 4. However, when the encrypted data Cmks2 is not stored in primary user terminal 4 but is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8, the second secret-key Ks2 is disused in order to prevent subsequent utilization of the data in primary user terminal 4.
  • In this case, it is possible to set a limit on the number of repeated operations such as copy or transfer of the data so that the second secret-key Ks[0187] 2 is not disused within limited repetitions of copying and transferring of the data.
  • A primary user who is going to copy the data M to [0188] external recording medium 11 or transmit the data M via communication network 8 must prepare the second secret-key Ks2 to encrypt the data M by this second secret-key Ks2 before copying or transferring the data:
  • Cmks[0189] 2=E(Ks2, M).
  • The uncrypted original copyright information Ic and primary-user copyright information Ic[0190] 1 are added to the encrypted data Cmks2.
  • Before using a database, a secondary user, similar to the primary user, prepares authentication data Au[0191] 2 to authenticate the secondary user, a third public-key Kb3 and a third private-key Kv3 corresponding to the third public-key Kb3, a fourth public-key Kb4, and a fourth private-key Kv4 corresponding to the fourth public-key Kb4.
  • A secondary user who desires secondary utilization of the copied or transmitted encrypted data Cmks[0192] 2 must designate original data name or number to the secondary copyright management center 14 to request secondary utilization to the center 14 from secondary user terminal 5 via communication network 8. In this case, the secondary user also transfers the third public-key Kb3 and the fourth public-key Kb4 as well as the secondary user authentication data Au2, original copyright information Ic and primary user copyright information Ic1.
  • The secondary [0193] copyright management center 14 receives the secondary utilization request from the secondary user, confirms the secondary-user authentication data Au2, and transfers confirmed secondary-user authentication data Au2 to the tertiary copyright management center 15 as secondary user information.
  • When the secondary copyright information Ic[0194] 1 of the primary user is transferred, the secondary copyright information Ic1 is confirmed by the secondary copyright center 14. The secondary copyright information Ic1 is then transferred to the tertiary copyright management center 15.
  • The secondary [0195] copyright management center 14 prepares a third secret-key Ks3. The third secret-key Ks3 can also be prepared by key control center 9 shown in embodiment 1.
  • The prepared third secret-key Ks[0196] 3 is transferred to and stored in the tertiary copyright management center 15.
  • As the result of the transfers, primary user copyright information Ic[0197] 1, primary user information Iu1, original copyright information Ic, secondary user information Iu2, and third secret-key Ks3 are stored in the tertiary copyright management center 15. The primary user copyright information Ic1, and primary user information Iu1 are used for copyright royalties distribution.
  • Similarly, copyright information for secondary exploitation right Icn−1 of (n−1)-order user, primary user information Iu[0198] 1, original copyright information Ic, n-order user information Iun, and n-th secret-key Ksn are stored in n-order copyright management center 16.
  • The primary user information Iu[0199] 1, original copyright information Ic and second secret-key Ks2 are read out of the secondary copyright management center 14. The original copyright information Ic is used for copyright royalties distribution.
  • The second secret-key Ks[0200] 2 and third secret-key Ks3 are then encrypted by the third public-key Kb3 and fourth public-key Kb4 of the secondary user respectively:
  • Cks[0201] 2kb3=E(Kb3, Ks2)
  • Cks[0202] 3kb4=E(Kb4, Ks3).
  • The copyright control program P is encrypted by the third secret-key Ks[0203] 3 and the third secret-key Ks3 is encrypted by the fourth public-key Kb4:
  • Cpks[0204] 3=E(Ks3, P)
  • Cks[0205] 3kb4=E(Kb4, Ks3).
  • The encrypted copyright control program Cpks[0206] 3, encrypted second secret-key Cks2kb3, and encrypted third secret-key Cks3kb4 are transferred to secondary user terminal 5 via communication network 8. In this case, charging is performed, if necessary.
  • The secondary user receives two encrypted secret-keys Cks[0207] 2kb3 and Cks3kb4 and the encrypted copyright control program Cpks3 from the secondary copyright management center 14, decrypts the encrypted second secret-key Cks2kb3 by the third private-key Kv3, and decrypts the encrypted third secret-key Cks3kb4 by the fourth private-key Kv4 corresponding to the fourth public-key Kb4, using the database utilization software:
  • Ks[0208] 2=D(Kv3, Cks2kb3)
  • Ks[0209] 3=D(Kv4, Cks3kb4).
  • The encrypted copyright control program Cpks[0210] 3 is decrypted by the decrypted third secret-key Ks3:
  • P=D(Ks[0211] 3, Cpks3).
  • Then, the encrypted data Cmks[0212] 2 is decrypted for the decrypted copyright control program P and the decrypted second secret-key Ks2:
  • M=D(Ks[0213] 2, Cmks2).
  • As described above, the third private-key Kv[0214] 3 and the fourth private-key Kv4 are prepared by a secondary user, but they are not known to others. Therefore, even if a third party obtains the encrypted data Cmks2, it is impossible to use the data by decrypting it.
  • In the above described embodiment, database [0215] 1, secondary copyright management center 14, tertiary copyright management center 15, and n-order copyright management center 16 are separately arranged in order to avoid the congestion of utilization requests. However, if the congestion of utilization requests is not a critical issue, it is possible to combine all or some of these functions into one.
  • [Embodiment 5][0216]
  • FIG. 3 shows the system structure of [0217] embodiment 5. In embodiment 5, original data is encrypted and supplied in a one-way communication from a single database and a user selects necessary data out of the supplied original data to use it. This embodiment uses a secret-key cryptosystem as its crypt key system.
  • In FIG. 3, reference numeral [0218] 1 represents a database in which text data, binary data serving as computer graphics display or computer program, digital audio data, and digital picture data are stored by being encrypted, 2 represents a space satellite such as a communication satellite or a broadcasting satellite, 3 represents a data recording medium such as a CD-ROM or a flexible disk, 8 represents a communication network such as a public telephone line offered y a communication enterprise or a CATV line offered by a cable television enterprise, and 4 represents a primary user terminal. Reference numeral 17 represents a copyright management center for managing the copyright on data, and 5, 6, and 7 represent a secondary user terminal, tertiary user terminal, and n-order user terminal, respectively.
  • In the above arrangement, database [0219] 1, copyright management center 17, primary user terminal 4, secondary user terminal 5, tertiary user terminal 6 and n-order user terminal 7 can be connected with each other by communication network 8.
  • Each user who uses this system is previously entered in the database system, and when entered in the system, database utilization software is given to the user. This software includes a normal communication software program such as a data communication protocol. [0220]
  • Though the software for using the database system can be stored in a hard disk in a user terminal, it may be stored in a mask ROM, EPROM, or EEPROM in the user terminal. [0221]
  • In this system, a secret-key generation algorithm is stored in a user terminal in order to generate a secret-key from the user side. However, because the secret-key generation algorithm is not always secret, it is also possible to store the algorithm in the database utilization software supplied to a user when the user is entered for database utilization in the database system. [0222]
  • When original data is supplied free of charge because it is provided with advertisement, it may not be necessary to be encrypted. Even in this case, however, a procedure for using a copyright is necessary because the data is provided with a copyright. [0223]
  • In FIG. 3, the broken line represents a path of encrypted data, the solid line represents a path requested from each user terminal, and the one-dot chain line represents a path through which a crypt key corresponding to a utilization request is transferred. [0224]
  • The original data M[0225] 0 stored in database 1 or the data recording medium 3 is supplied to primary user terminal 4 through a cable transmission via communication network 8, by broadcast waves via the satellite 2 or the like, or by recording medium 3. The data M0 is encrypted by the first secret-key Ks1:
  • Cm[0226] 0ks1=E(Ks1, M0).
  • Similar to embodiments 1 to 4, in order to protect the copyright of the original data Cm[0227] 0ks1, which is encrypted to be supplied, when store, copy, or transfer operations, which is utilization other than display or display for editing, are applied to the original data M0 in primary user terminal 4, the second secret-key Ks2 is used to encrypt the data:
  • Cm[0228] 0ks2=E(Ks2,M0)
  • as disclosed in Japanese Patent Application No. 64889/1994 which is the prior application by the inventors of the present invention. In the subsequent utilization, the original data is encrypted/decrypted by the second secret-key Ks[0229] 2.
  • A primary user obtaining the encrypted original data Cm[0230] 0ks1 designates an original data name or original data number from primary user terminal 4 to request the primary utilization of the encrypted original data Cm0ks1 of the copyright management center 17.
  • The [0231] copyright management center 17 receives the primary utilization request of the encrypted original data Cm0ks1 from primary user terminal 4 and transfers the copyright control program P to primary user terminal 4 together with the first secret-key Ks1.
  • The copyright control program P includes a crypt program having a cryptographic algorithm, which generates a secret-key and decrypts or encrypts data. [0232]
  • [0233] Primary user terminal 4 receives the first secret-key Ks1 and the copyright control program P, decrypts the encrypted original data Cm0ks1 by the first secret-key Ks1 using the crypt program
  • M[0234] 0=D(Ks1, Cm0ks1)
  • and uses the decrypted original data M[0235] 0 directly or data M1 as edited.
  • The copyright control program P generates a second secret-key Ks[0236] 2 in accordance with the first secret-key Ks1:
  • Ks[0237] 2=P(Ks1).
  • When the data M as the original data M[0238] 0 or the edited data M1 is stored in primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5, the data is encrypted by the second secret-key Ks2 using the copyright control program P:
  • Cmks[0239] 2=E(Ks2, M).
  • The data Cmks[0240] 2 encrypted by the second secret-key Ks2 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with the original data name or original data number.
  • The secondary user obtaining the encrypted data Cmks[0241] 2 makes a request for the secondary utilization of the encrypted data Cmks2 to the copyright management center 17 from the secondary terminal 5 by designating the original data name or original data number.
  • The [0242] copyright management center 17 receives the secondary utilization request of the encrypted data Cmks2, finds out the first secret-key Ks1 in accordance with the original data name or original data number, generates the second secret-key Ks2 by the first secret-key Ks1 using the copyright control program P
  • Ks[0243] 2=P(Ks1),
  • and supplies the generated second secret-key Ks[0244] 2 to the secondary user terminal 15 together with the copyright control program P.
  • [0245] Secondary user terminal 5 receives the second secret-key Ks2 and the copyright control program P, decrypts the data Cmks2 encrypted by the second secret-key Ks2 using the second secret-key Ks2
  • M=D(Ks[0246] 2, Cmks2)
  • and uses the data by displaying or editing it. [0247]
  • When the decrypted data M is stored in [0248] secondary user terminal 5, stored in the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8, the data M is encrypted by the second secret-key.
  • Further, it is possible to make the copyright control program P generate the third secret-key Ks[0249] 3 in accordance with the second secret-key Ks2:
  • Ks[0250] 3=P(Ks2),
  • so that the data M is encrypted by the third secret-key Ks[0251] 3 using the copyright control program P when the data M is stored in secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8:
  • Cmks[0252] 3=E(Ks3, M).
  • [Embodiment 6][0253]
  • In [0254] embodiment 6, original data is encrypted and supplied in a one-way communication from a single database to a user and the user selects necessary data out of the original data to use it, similar to embodiment 5.
  • This embodiment uses a secret-key cryptosystem as its crypt key system and a second secret-key is generated in accordance with primary user information and a first secret-key. [0255]
  • Because the system structure of [0256] embodiment 6 is the same as that of embodiment 5 shown in FIG. 3, its description is omitted.
  • In the [0257] embodiment 6, the original data M0 stored in database 0.1 is encrypted via communication network 8, by broadcast waves via the satellite 2, or by the recording medium 3 using the first secret-key Ks1:
  • Cm[0258] 0ks1=E(Ks1, M0)
  • and supplied to [0259] primary user terminal 4.
  • A primary user obtaining the encrypted original data Cm[0260] 0ks1 makes a request for primary utilization of the encrypted original data Cm0ks1 from primary user terminal 4. The primary user must designate an original data name or original data number and present the primary user information Iu1.
  • The [0261] copyright management center 17 receives the primary utilization request of the encrypted original data Cm0ks1 from the primary user and supplies the first secret-key Ks1 and the copyright control program P to primary user terminal 4.
  • The copyright control program P includes a crypt program having a cryptographic algorithm, which generates a secret-key and thus performs decryption and encryption. [0262]
  • [0263] Primary user terminal 4 receives the first secret-key Ks1 and the copyright control program P, decrypts the encrypted original data Cm0ks1 by the first secret-key Ks1 using the crypt program P
  • M[0264] 0=D(Ks1, Cm0ks1)
  • and uses the decrypted original data M[0265] 0 or data M1 as edited.
  • The supplied copyright control program P generates the second secret-key Ks[0266] 2 in accordance with the primary user information Iu1 or the primary user information Iu1 and the first secret-key Ks1:
  • Ks[0267] 2=P(Iu1) or
  • Ks[0268] 2 P(Iu1+Ks1).
  • Because the generated second secret-key Ks[0269] 2 is based on the primary user information Iu1, it is impossible to generate the second secret-key Ks2 without the correct primary user information Iu1.
  • Further, it is possible to use primary user data generated in accordance with the primary user information Iu[0270] 1 or the terminal number of primary user terminal 4 instead of the primary user information Iu1.
  • When the data M serving as the original data M[0271] 0 or edited data M1 is stored in primary user terminal 4, copied to the recording medium 11, or supplied to secondary user terminal 5 via communication network 8, the data M is encrypted by the second secret-key Ks2 using the copyright control program P:
  • Cmks[0272] 2=E(Ks2, M).
  • The data Cmks[0273] 2 encrypted by the second secret-key Ks2 is copied to the recording medium 11 or supplied to secondary user terminal 5 via communication network 8 together with its original data name or original data number and the primary user information Iu1.
  • A secondary user obtaining the encrypted data Cmks[0274] 2 makes a request for secondary utilization of the data M to the copyright management center 17 from secondary user terminal 5. The user must designate the original data name or original data number and present the primary user information Iu1.
  • The [0275] copyright management center 17 receives the secondary utilization request of the data M, finds out the first secret-key Ks1 in accordance with the original data name or original data number, generates the second secret-key Ks2 in accordance with either of the primary user information Iu1 and first secret-key Ks1, or both, and supplies the generated second secret-key Ks2 to secondary user terminal 5 together with the copyright control program P.
  • The secondary user receives the second secret-key Ks[0276] 2 and the copyright control program P and decrypts the encrypted data Cmks2 by the second secret-key Ks2 using the copyright control program P and in secondary user terminal 5 to use it:
  • M=D(Ks[0277] 2, Cmks2).
  • When the data M is stored in [0278] secondary user terminal 5, copied to the recording medium 12, or supplied to tertiary user terminal 6 via communication network 8, the data is encrypted by the second secret-key Ks2.
  • Further, it is possible to make the copyright control program P generate the third secret-key Ks[0279] 3 in accordance with the second secret-key Ks2 using the copyright management program P.;
  • Ks[0280] 3=P(Ks2)
  • so that the data M is encrypted by the third secret-key Ks[0281] 3 when the data is stored in secondary user terminal 5, copied to the recording medium 12, or supplied to tertiary user terminal 6 via communication network 8.
  • It is further possible to make the secondary user present the secondary information Iu[0282] 2 when requesting secondary utilization to the copyright management center 17 so that the third secret-key Ks3 is generated in accordance with the presented secondary user information Iu2.
  • In this [0283] embodiment 6, if the copyright control program P for generating the second secret-key Ks2 can be used in entire database system in common, the same second secret-key Ks2 is generated for the same original data in any database system as long as the primary user information Iu1 or the first secret-key Ks1 is not changed.
  • [Embodiment 7][0284]
  • In [0285] embodiment 7, original data is encrypted and supplied in a one-way communication to a user from a single database and the user selects necessary data out of the original data to use it, similar to the embodiments 5 and 6. This embodiment uses a secret-key cryptosystem.
  • In this embodiment, a second secret-key is generated in accordance with the use frequency of a copyright control program and with a first secret-key. [0286]
  • Because the system structure of [0287] embodiment 7 is the same as that of embodiments 5 and 6 shown in FIG. 3, its description is omitted.
  • The original data M[0288] 0 stored in database 1 is encrypted by the first secret-key Ks1 via communication network 8, by broadcast waves via the satellite 2, or by the recording medium 3:
  • Cm[0289] 0ks1=E(Ks1,M0),
  • and supplied to [0290] primary user terminal 4.
  • A primary user obtaining the encrypted original data Cm[0291] 0ks1 makes a request for primary utilization of the original data M0 to the copyright management center 17 from primary user terminal 4 by designating an original data name or original data number.
  • The [0292] copyright management center 17 receives the primary utilization request of the original data M0 and transfers the first secret-key Ks1 and the copyright control program P to primary user terminal 4.
  • The copyright control program P includes a crypt program having a cryptographic algorithm, in which a crypt key is generated and data is decrypted or encrypted. Further, a counter is attached to the copyright control program P to count the use frequency of the program P. [0293]
  • The primary user receives the first secret-key Ks[0294] 1 and the copyright control program P and decrypts the encrypted original data Cm0ks1 by the first secret-key Ks1 using the copyright control program P:
  • M[0295] 0=D(Ks1,Cm0ks1)
  • to use the decrypted original data M[0296] 0 or data M1 as edited.
  • When the data M serving as the original data M[0297] 0 or edited data M1 is stored in primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5 via communication network 8 in order to manage the copyright of data, the data is encrypted by the second secret-key Ks2 using the copyright control program P. The second secret-key Ks2 used for this operation is generated in accordance with the use frequency N of the copyright control program and with the first secret-key Ks1:
  • Ks[0298] 2=P(N+Ks1).
  • Because the second secret-key Ks[0299] 2 thus generated is based on the use frequency N of the copyright control program P and the first secret-key Ks1, the data M is encrypted by the latest second secret-key Ks2 whenever it is used:
  • Cmks[0300] 2=E(Ks2,M).
  • The data Cmks[0301] 2 encrypted by the second secret-key Ks2 generated through the final utilization is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with its original data name or original data number and counter data N1.
  • The secondary user obtains the encrypted data Cmks[0302] 2 and designates the original data name or original data number and the counter data N1 from secondary user terminal 5 to request the secondary utilization of the encrypted data Cmks2 to the copyright management center 17.
  • The [0303] copyright management center 17 receives the secondary utilization request of the encrypted data Cmks2, finds out the first secret-key Ks1 in accordance with the designated original data name or original data number, generates the second secret-key Ks2 in accordance with the counter data N1 and the first secret-key Ks1, and supplies the second secret-key Ks2 to secondary user terminal 5 together with the copyright control program P via communication network 8.
  • The secondary user receives the second secret-key Ks[0304] 2, and the copyright control program P decrypts the encrypted data Cmks2 by the second secret-key Ks2 using the copyright control program P:
  • M=D(Ks[0305] 2, Cmks2)
  • and uses the decrypted data M directly or by editing the data M. [0306]
  • When the data M is stored in [0307] secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8, the data M is encrypted by the second secret-key Ks2 using the copyright control program P:
  • Cmks[0308] 2=E(ks2, M).
  • In this case, it is also possible to make the copyright control program P generate the third secret-key Ks[0309] 3 in accordance with a use frequency N2 of the copyright control program P in secondary user terminal 5 and with the secret-key Ks2:
  • Ks[0310] 3=P(N2+Ks2).
  • When the data M is stored in [0311] secondary user terminal 5, copied to the recording medium 12, or transmitted to the tertiary user 6 via communication network 8, the data M is encrypted by the third secret-key Ks3 using the copyright control program P:
  • Cmks[0312] 3=E(Ks3,M).
  • [Embodiment 8][0313]
  • FIG. 4 shows the [0314] embodiment 8 of the present data copyright management system. In this embodiment, original data is supplied one-way to a user from a single database in accordance with a request of the user. This embodiment uses a secret-key cryptosystem as its cryptosystem in which a second secret-key is generated in accordance with a first secret-key.
  • In FIG. 4, reference numeral [0315] 1 represents a database, 4 represents a primary user terminal, 5 represents a secondary user terminal, 6 represents a tertiary user terminal, and 7 represents an n-order user terminal. And 18 represents a copyright management center and 8 represents a communication network such as a public telephone line provided by a telephone company or a CATV line offered by a cable television enterprise.
  • In the above arrangement, database [0316] 1, copyright management center 18, primary user terminal 4, secondary user terminal 5, tertiary user terminal 6, and n-order user terminal 7 can be connected with each other by communication network 8.
  • Each user who uses this system must previously be entered in a database system, and when entered in the system, database system software is given to the user. This software includes a normal communication software such as a data communication protocol. [0317]
  • The database utilization software can be stored on a hard disk of a user terminal, or may be stored in a mask ROM, EPROM, or EEPROM in the user terminal. [0318]
  • In this system, a secret-key generation algorithm is stored in a user terminal in order to generate a secret-key from the user side. However, because the secret-key generation algorithm is not always secret, it is possible to store the algorithm in the database utilization software given to the user when the user is entered in a database system. [0319]
  • In case of original data provided with advertisement supplied to the user free of charge, it may not be necessary to encrypt the data. Even in this case, however, because the data has a copyright, a proper procedure must be followed to ensure copyright protection. [0320]
  • In FIG. 4, the broken line represents a path for encrypted data, the solid line represents a path requested from each user terminal, and the one-dot chain line represents a path through which a key for allowing data utilization and a copyright control program together with a secret-key from the copyright management center to secondary and subsequent-order user. [0321]
  • In FIG. 4, database [0322] 1 stores text data, graphics data or binary data, audio data, and picture data which are not encrypted. A primary user makes a request for utilization of the original data M0 from primary user terminal 4 by designating an original data name or number to database 1 via communication network 8.
  • Database [0323] 1 receives the utilization request of the original data M0 from primary user terminal 4, encrypts the original data M0 by the first secret-key Ks1:
  • Cm[0324] 0ks1=E(Ks1,M0)
  • and supplies the copyright control program P to [0325] primary user terminal 4 together with the encrypted original data Cm0ks1 and the first secret-key Ks1.
  • The copyright control program P includes a crypt program having a cryptographic algorithm which generates a secret-key and decrypts or encrypts data. Further, by making the cryptographic algorithm dependent on the first secret-key Ks[0326] 1, it is possible to make the copyright control program P inherent in the original data M0.
  • [0327] Primary user terminal 4 receives the first secret-key Ks1 and the copyright control program P together with the original data Cm0ks1 encrypted by the first secret-key Ks1, decrypts the encrypted original data Cm0ks1 by the first secret-key Ks1:
  • M[0328] 0=D(Ks1, Cm0ks1)
  • and uses the decrypted original data M[0329] 0 directly or data M1 as edited.
  • The copyright control program P generates the second secret-key Ks[0330] 2 in accordance with the first secret-key Ks1:
  • Ks[0331] 2=P(Ks1).
  • When the data M as decrypted original data or edited data is stored in [0332] primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5 via communication network 8, the data M is encrypted by the second secret-key Ks2 using the copyright control program P:
  • Cmks[0333] 2=E(Ks2, M).
  • The encrypted data Cmks[0334] 2 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8, together with its original data name or original data number.
  • A secondary user obtains the encrypted data Cmks[0335] 2 and makes a request for secondary utilization of the data M as original data or edited data to the copyright management center 18 from secondary user terminal 5 by designating the original data name or number.
  • The secondary [0336] copyright management center 18 receives the secondary utilization request of the data M, finds out the first secret-key Ks1 in accordance with the original data name or original data number to generate the second secret-key Ks2 in accordance with the first secret-key Ks1:
  • Ks[0337] 2=P(Ks1)
  • and supplies the generated second secret-key Ks[0338] 2 to secondary user terminal 5 together with the copyright control program P.
  • [0339] Secondary user terminal 5 receives the second secret-key Ks2 and the copyright control program P, decrypts the encrypted data Cmks2 by the second secret-key Ks2 using the copyright control program P:
  • M=D(Ks[0340] 2, Cmks2)
  • and uses the decrypted data M directly or by editing it. [0341]
  • A third secret-key Ks[0342] 3 is generated by the copyright control program P in accordance with the second secret-key Ks2:
  • Ks[0343] 3=P(Ks2)
  • so that the data M is encrypted by the generated third secret-key Ks[0344] 3 using the copyright control program P when the data M is stored in secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8:
  • Cmks[0345] 3=E(Ks3, M).
  • [Embodiment 9][0346]
  • In [0347] embodiment 9, original data is supplied to a user from a single database in accordance with a request of the user, similarly to embodiment 8 in FIG. 4. This embodiment uses a secret-key cryptosystem and user data in addition to the first secret-key used for embodiment 8 to generate a second secret-key.
  • Because the system structure of this embodiment is the same as that of [0348] embodiment 8, its description is omitted.
  • Database [0349] 1 stores the original data M0 which is not encrypted. When a primary user accesses database 1 from primary user terminal 4, a data menu is transferred to the user. In this case, it is possible to display charge information together with the data menu.
  • When the primary user receives the data menu, the user retrieves the data menu to select the original data M[0350] 0 and requests primary utilization of the original data M0 to database 1 by designating the original data name or the like of the selected original data M0.
  • In database [0351] 1 receiving the utilization request of the original data M0 from primary user terminal 4, the original data M0 is read and the original data M0 is encrypted by the first secret-key Ks1:
  • Cm[0352] 0ks1=E(Ks1, M0)
  • and the copyright control program P is supplied to [0353] primary user terminal 4 together with the encrypted original data Cm0ks1 and the first secret-key Ks1.
  • The copyright control program P used here is common to entire database system, which includes a crypt program having a cryptographic algorithm. A crypt key is generated and data is decrypted or encrypted by this crypt program. [0354]
  • [0355] Primary user terminal 4 receives the first secret-key Ks1 and the copyright control program P, decrypts the encrypted original data Cm0ks1 by the first secret-key Ks1 using the copyright control program P:
  • M[0356] 0=D(Ks1, Cm0ks1)
  • and uses the decrypted original data M[0357] 0 or data M1 as edited.
  • The copyright control program P generates the second secret-key Ks[0358] 2 in accordance with a primary user information Iu1:
  • Ks[0359] 2=P(Iu1).
  • The second secret-key Ks[0360] 2 may be generated in accordance with the first secret-key Ks1 or the primary user data Iu1 and the first secret-key Ks1 instead of the primary user information Iu1:
  • Ks[0361] 2=P(Ks1)
  • Ks[0362] 2=P(Ks1+Iu1).
  • When the data M serving as the original data M[0363] 0 or edited data M1 is stored in Primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5 via communication network 8, the data M is encrypted by the second secret-key Ks2 using the copyright control program P:
  • Cmks[0364] 2=E(Ks2, M).
  • The data Cmks[0365] 2 encrypted by the second secret-key Ks2 is provided with the original data name or original data number and then, copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8.
  • A secondary user obtains the data Cmks[0366] 2 encrypted by the second secret-key Ks2 and makes a request for secondary utilization of the data M to the copyright management center 18 from secondary user terminal 5. The user designates the original data name or original data number and presents the uncrypted primary user information Iu1.
  • The [0367] copyright management center 18 receives the secondary utilization request of the data M, finds out the first secret-key Ks1 in accordance with the designated original data name or original data number, generates the second secret-key Ks2 in accordance with the presented primary user information Iu1 and the found-out first secret-key Ks1 by the copyright control program P, and supplies the key Ks2 to secondary user terminal 5 together with the copyright control program P.
  • The secondary user obtains the second secret-key Ks[0368] 2 and the copyright control program P, decrypts the encrypted data Cmks2 by the second secret-key Ks2 using the copyright control program P in secondary user terminal 5:
  • M=D(Ks[0369] 2, Cmks2)
  • and uses the decrypted data M directly or by editing the data. [0370]
  • When the data M is stored in [0371] secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8, the data M is encrypted by the second secret-key Ks2 using the copyright control program P:
  • Cmks[0372] 2=E(Ks2, M).
  • In this case, it is also possible to make the copyright control program P generate the third secret-key Ks[0373] 3 in accordance with the primary user information Iu1, second secret-key Ks2, or primary user information Iu1 and the second secret-key Ks2,
  • Ks[0374] 3=P(Iu1)
  • Ks[0375] 3=P(Iu1+Ks1)
  • Ks[0376] 3=P(Ks1).
  • It is also possible to make the secondary user present the secondary user information Iu[0377] 2 when requesting secondary utilization so that the third secret-key is generated in accordance with the secondary user information Iu2 instead of the primary user information Iu1.
  • The data M is encrypted by the third secret-key Ks[0378] 3 using the copyright control program P:
  • Cmks=E(Ks[0379] 3, M).
  • In this embodiment, the copyright control program P for generating the second secret-key Ks[0380] 2 is common to any database. Therefore, in any database, the same second secret-key Ks2 is generated for the same original data as long as the primary user data Iu1 and the first secret-key Ks1 are not changed.
  • [Embodiment 10][0381]
  • In [0382] embodiment 10, original data is supplied to a user from a single database in accordance with a request of the user similarly to the case of embodiment 8. This embodiment uses a secret-key cryptosystem.
  • This embodiment uses the use frequency of a copyright control program instead of user information adopted for generating a second secret-key in [0383] embodiment 9.
  • Because the system structure of this embodiment is the same as that of [0384] embodiment 8, its description is omitted.
  • Database [0385] 1 stores original data M0 which is not encrypted. When a primary user accesses database 1 from primary user terminal 4, a data menu is transferred to the user. In this case, charge information may be displayed together with the data menu.
  • When the primary user receives the data menu, the user retrieves the data menu to select the original data M[0386] 0 and makes a request for the primary utilization of the original data M0 to database 1 by designating an original data name or the like via communication network 8 from primary user terminal 4.
  • Database [0387] 1 receives the data utilization request from a primary user, encrypts the original data M0 by a first secret-key Ks1
  • Cm[0388] 0ks1=E(Ks1, M0)
  • and supplies the copyright control program P to [0389] primary user terminal 4 together with the encrypted data Cm0ks1 and the first secret-key-Ks1.
  • The copyright control program P includes a crypt program having a cryptographic algorithm, which generates a crypt key and decrypts or encrypts data. Further, a counter is attached to the copyright control program P to count the use frequency N of the program P or the number of use times of original data. [0390]
  • Further, by making the cryptographic algorithm dependent on the first secret-key Ks[0391] 1, it is possible to make the copyright control program P inherent in the original data.
  • The primary user receives the first secret-key Ks[0392] 1 and the copyright control program P, decrypts the encrypted original data Cm0ks1 by the first secret-key Ks1 using the copyright control program P
  • M[0393] 0=D(Ks1, Cm0ks1)
  • and uses the decrypted original data M[0394] 0 directly or data M1 as edited.
  • To protect the copyright of data, when the data M as the original data M[0395] 0 or edited data M1 is stored in primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5 via communication network 8, the data M is encrypted by the copyright control program P. In other words, a copyright control program always runs whenever these types of utilization are made.
  • When the supplied copyright control program P is used, the counter in the program performs counting and the copyright control program P generates the second secret-key Ks[0396] 2 in accordance with the counted value N and the first secret-key Ks1:
  • Ks[0397] 2=P(N+Ks2).
  • Because the second secret-key Ks[0398] 2 is based on the use frequency N of the copyright control program P, the data M is encrypted by the new second secret-key Ks2 whenever the data is used:
  • Cmks[0399] 2=E(Ks2, M).
  • The data Cmks[0400] 2 encrypted by the generated second secret-key Ks2 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with the original data name or original data number, the primary user information Iu1 and the counter data N.
  • A secondary user obtains the data Cmks[0401] 2 encrypted by the second secret-key Ks2 and designates the original data name or original data number, primary user information Iu1, and counter data N to request secondary utilization of the data M to the copyright management center 18.
  • The [0402] copyright management center 18 receives the secondary utilization request of the encrypted data Cmks2, finds out the first secret-key Ks1 in accordance with the original data name or original data number of the data, generates a second secret-key Ks2 according to the first secret-key Ks1, and the presented primary user information Iu1 and the counter data N, and transfers the generated second secret-key Ks2 to secondary user terminal 5 together with the copyright control program P.
  • [0403] Secondary user terminal 5 receives the second secret-key Ks2 and the copyright control program P, decrypts the encrypted data Cmks2 by the second secret-key Ks2 using the copyright control program P:
  • M=D(Ks[0404] 2, Cmks2)
  • and uses the decrypted data M directly or by editing the data. [0405]
  • When the data is stored in [0406] secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8, the data is encrypted by the second secret-key using the copyright control program P. Further, it is possible that the copyright control program generates a third secret-key in accordance with the second secret-key.
  • Above-mentioned embodiments 1 to 10 are described with respect to using a single original data supplied from a database. However, one of the data utilization, edit operation, includes not only editing a single data but also producing new data by combining a plurality of original data obtained from the same database and producing new data by combining a plurality of original data obtained from a plurality of databases. [0407]
  • [Embodiment 11][0408]
  • In [0409] embodiment 11, a primary user produces new data by combining a plurality of original data stored in a single database. That is, the primary user produces new data by using first, second, and third original data stored in the database. In this embodiment, a plurality of original data are supplied to a user from a single database in response to a request of the user similarly to the case of embodiment 8 shown in FIG. 4. This embodiment uses a secret-key cryptosystem.
  • Because the system structure of this embodiment is the same as that of [0410] embodiment 8, its description is omitted.
  • Database [0411] 1 stores original data M01, M02 and M03 which are not encrypted. When the primary user accesses database 1 from primary user terminal 4, a data menu is transferred to the user. In this case, charge information may be displayed together with the data menu.
  • When the primary user receives the data menu, the user retrieves the data menu to select the original data M[0412] 01, M02 and M03, makes a request for supply of the data M01, M02 and M03 to database 1 via communication network 8 by designating original data names or original data numbers of the first, second and third original data M01, M02 and M03, and also presents the primary user information Iu1.
  • Database [0413] 1 receives the supply request of the first, second and third original data M01, M02 and M03 from the primary user, encrypts the first, second and third original data M01, M02 and M03 by first, second and third secret-keys Ks01, Ks02 and Ks03 respectively:
  • Cm[0414] 01ks01=E(Ks01, M0)
  • Cm[0415] 02ks02=E(Ks02, M02)
  • Cm[0416] 03ks03=E(Ks03, M03)
  • and supplies the first, second and third secret-keys Ks[0417] 01, Ks02 and Ks03 and the copyright control program P common to entire database and all original data to primary user terminal 4.
  • The copyright control program P includes a crypt program having a cryptographic algorithm, which generates a crypt key and decrypts or encrypts data. [0418]
  • [0419] Primary user terminal 4 receives the first encrypted original data Cm01ks01, second encrypted original data Cm02ks02, third encrypted original data Cm03ks03, first secret-key Ks01, second secret-key Ks02, third secret-key Ks03, and copyright control program P, decrypts the first, second and third encrypted original data Cm01ks01, Cm02ks02 and Cm03ks03 by the secret-keys Ks01, Ks02, and Ks03 using the copyright control program P:
  • M[0420] 01=D(Ks01, Cm01ks01)
  • M[0421] 02=D(Ks02, Cm02ks02)
  • M[0422] 03=D(Ks03, Cm03ks03)
  • and produces new data M[0423] 1 edited from the original data M0, M02 and M03.
  • The copyright control program P produces a fourth secret-key Ks[0424] 4 in accordance with one or some of the first secret-key Ks01, second secret-key Ks2, third secret-key Ks3, and primary user data Iu1:
  • Ks[0425] 4=P(Ks01/Ks02/Ks03/Iu1).
  • When the edited data M[0426] 1 is stored in primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5 via communication network 8, the data is encrypted by the fourth secret-key Ks4 using the copyright control program P:
  • Cm[0427] 1ks4=E(Ks4, M1).
  • The encrypted edited data Cm[0428] 1ks4 is copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8, together with original data names or original data numbers and the primary user data Iu1.
  • A secondary user obtains the encrypted edited data Cm[0429] 1ks4 and makes a request for secondary utilization of the data Cm1ks4 to the copyright management center 18 from secondary user terminal 5. In this case, the user designates data names or data numbers of the original data M0, M02 and M03 and presents the primary user information Iu1.
  • The [0430] copyright management center 18 receives the secondary utilization request of the encrypted edited data Cm1ks4 from the secondary user, finds out the first secret-key Ks01 in accordance with the data name or data number of the first original data M01, the second secret-key Ks02 in accordance with the data name or number of the second original data M02, and the third secret-key Ks03 in accordance with the data name or number of the third original data M03, generates fourth secret-key Ks4 by one or some of the found-out first secret-key Ks01, second secret-key Ks02, third secret-key Ks03 and primary user information Iu1 using common copyright control program P:
  • Ks[0431] 4=P(Ks01/Ks02/Ks03/Iu1);
  • and supplies the fourth secret-key Ks[0432] 4 to secondary user terminal 5 together with the common copyright control program P.
  • The secondary user receives the fourth secret-key Ks[0433] 4 and the common copyright control program P, decrypts the encrypted edited data Cm1ks4 by the fourth secret-key Ks4 using the copyright control program P
  • M[0434] 1=D(Ks4, Cm1ks4)
  • and uses the decrypted edited data M[0435] 1 directly or data M2 as edited.
  • When the edited data M[0436] 1 or re-edited data M2 is stored in secondary user terminal 5, copied to the recording medium 12 or transmitted to a tertiary user terminal 6 via communication network 8, a fifth secret-key Ks5 is generated in accordance with the fourth secret-key Ks4 by the copyright control program P, and the data is encrypted by the fifth secret-key Ks5 using the copyright control program P:
  • Cm[0437] 1ks5=E(Ks5, Cm1)
  • Cm[0438] 2ks5=E(Ks5, Cm2).
  • Further, it is possible to make the common copyright control program P generate a fifth secret-key Ks[0439] 5 by the fourth secret-key Ks4 for subsequent encryption or decryption by the generated fifth secret-key Ks5.
  • In this embodiment, a copyright control program for generating a fourth secret-key is common to any database. Therefore, in any database, the same fourth secret-key is generated for the same original data as long as primary user data and a first secret-key are not changed. [0440]
  • While the common copyright control program of this embodiment is supplied from the [0441] copyright management center 18, it may be stored in a ROM in a user terminal or in software for using a database.
  • [Embodiment 12][0442]
  • In [0443] embodiment 12, new data is produced by combining a plurality of original data supplied from a plurality of databases in response to a user's request. This embodiment uses a secret-key cryptosystem.
  • In FIG. 5, [0444] reference numerals 19, 20, and 21 represent first, second and third databases storing text data, binary data as a computer graphics display or computer program, and audio data or picture data, 4 represents a primary user terminal, 5 represents a secondary user terminal, 6 represents a tertiary user terminal, 7 represents an n-order user terminal, 10 represents a copyright management center for managing data copyrights, and 8 represents a communication network such as a public telephone line offered by a telephone company or a CATV line offered by a cable television enterprise.
  • In the above arrangement, the first, second and [0445] third databases 19, 20 and 21, copyright management center 10, primary user terminal 4, secondary user terminal 5, tertiary user terminal 6, and n-order user terminal 7 can be connected with each other by communication network 8.
  • A user who desires to use this system must previously be entered in each database system, and when entered in the database system, database utilization software is supplied to the user. The software includes a normal communication software program such as a data communication protocol. [0446]
  • The database utilization software may be stored on a hard disk of a user terminal, or may be stored in a mask ROM, EPROM, or EEPROM in the user terminal. [0447]
  • In this system, a crypt key generation algorithm is stored in a user terminal in order to generate a secret-key from the user side. However, because the crypt key generation algorithm is not necessarily secret, it is possible to store the algorithm in each database utilization software. [0448]
  • In case of original data provided with advertisement supplied to the user free of charge, it may not be necessary to encrypt the data. Even in this case, however, because the data has a copyright, a proper procedure must be followed to ensure copyright protection. [0449]
  • In FIG. 5, the broken line represents a path for encrypted data, the solid line represents a path of requests from each user terminal to each database and copyright management center, and the one-dot chain line represents a path through which permit information corresponding to utilization requests, a copyright control program, and a crypt key are transferred from each database and copyright management center to each user terminal. [0450]
  • This embodiment uses a secret-key and a copyright control program which are different for each original data and are previously stored in each database and the copyright management center. [0451]
  • The [0452] first database 19 stores the first original data M1 which is not encrypted. When a primary user accesses the first database 19 from the first user terminal 4, a data menu is transferred to the user.
  • When the primary user receives the data menu, the user retrieves the data menu to select the first original data M[0453] 1 and makes a request for supply of the first original data M1 to the first database 19 via communication network 8 from primary user terminal 4 by designating an original data name or original data number. In this case, the user presents the primary user information Iu1.
  • The [0454] first database 19 receives the utilization request of the first original data M1 from the primary user, encrypts the requested first original data M1 by first secret-key Ks1
  • Cm[0455] 1ks1=E(Ks1, M1)
  • and supplies the encrypted data to [0456] primary user terminal 4.
  • The [0457] second database 20 stores the second original data M2 which is not encrypted. When the primary user accesses the second database 20 from primary user terminal 4, a data menu is transferred to the user.
  • When the primary user receives the data menu, the user retrieves the data menu to select the second original data M[0458] 2 and makes a request for supply of the second original data M2 to the second database 20 via communication network 8 from primary user terminal 4 by designating an original data name or original data number. In this time, the user presents the primary user information Iu1.
  • The [0459] second database 20 receives the utilization request of the second original data M2 from the primary user, encrypts the requested second original data M2 by second secret-key Ks2
  • Cm[0460] 2ks2=E(Ks2, M2)
  • and supplies the encrypted data to [0461] primary user terminal 4.
  • The [0462] third database 21 stores the third original data M3 which is not encrypted. When the primary user accesses the third database 21 from primary user terminal 4, a data menu is transferred to the user.
  • When the primary user receives the data menu, the user retrieves the data menu to select the third original data M[0463] 3 and requests for supply of the third original data M3 to the third database 21 via communication network 8 from primary user terminal 4 by designating an original data name or original data number. In this case, the user presents the primary user information Iu1.
  • The [0464] third database 21 receives the utilization request of the third original data M3 from the primary user, encrypts the requested third original data M3 by the third secret-key Ks3
  • Cm[0465] 3ks3=E(ks3, M3)
  • and supplies the encrypted data to [0466] primary user terminal 4.
  • The primary user receives the first, second, and third encrypted original data Cm[0467] 1ks1, Cm2ks2 and Cm3ks3 makes a request for primary utilization of the first, second, and third encrypted original data Cm1ks1, Cm2ks2 and Cm3ks3 to copyright management center 10 via communication network 8 from primary user terminal 4 by designating original data names or numbers.
  • [0468] Copyright management center 10 receives the primary utilization request of the first, second and third encrypted original data Cm1ks1, Cm2ks2 and Cm3ks3 from the primary user and supplies a first copyright control program P1, a second copyright control program P2, and a third copyright control program P3 to primary user terminal 4 together with the first secret-key Ks1 as a crypt key of the first original data M1, the second secret-key Ks2 as a crypt key of the second original data M2, and the third secret-key Ks3 as a crypt key of the third original data M3.
  • These copyright control programs P[0469] 1, P2 and P3 include a crypt program having a cryptographic algorithm respectively, which generates new secret-keys and decrypts or encrypts data.
  • Further, by making these cryptographic algorithms dependent on the first, second and third secret-keys Ks[0470] 1, Ks2 and Ks3 respectively, it is possible to make the first, second and third copyright control programs P1, P2 and P3 inherent in the first, second and third original data M1, M2 and M3 respectively.
  • [0471] Primary user terminal 4 receives the first, second and third secret-keys Ks1, Ks2 and Ks3, decrypts the first, second and third original data Cm1ks1, Cm2ks2 and Cm3ks3 encrypted by these secret-keys:
  • M[0472] 1=D(Ks1, Cm1ks1)
  • M[0473] 2=D(Ks2, Cm2ks2)
  • M[0474] 3=D(Ks3, Cm3ks3)
  • and uses the decrypted original data M[0475] 1, M2, and M3 directly or by editing them.
  • And the first copyright control program P[0476] 1 generates fourth secret-key Ks4 in accordance with the first secret-key Ks1, the second copyright control program P2 generates fifth secret-key Ks5 in accordance with the second secret-key Ks2, and the third copyright control program P3 generates sixth secret-key Ks6 in accordance with the third secret-key Ks3:
  • Ks[0477] 4=P1(Ks1)
  • Ks[0478] 5=P2(Ks2)
  • Ks[0479] 6=P3(Ks3).
  • When the original data M[0480] 1, M2 and M3 or edited data M4, M5 and M6 are stored in primary user terminal 4, copied to the recording medium 11, or transmitted to secondary user terminal 5 via communication network 8; the first original data M1 or edited data M4 is encrypted by the fourth secret-key Ks4 using the first copyright control program P1, the second original data M2 or edited data M5 is encrypted by the fifth secret-key Ks5 using the second copyright management program P2, and the third original data M3 or edited data M6 is encrypted by the sixth secret-key Ks6 using the third copyright control program P3:
  • Cm[0481] 1ks4=E(Ks4, M1)
  • Cm[0482] 2ks5=E(Ks5, M2)
  • Cm[0483] 3ks6=E(Ks6, M3)
  • Cm[0484] 4ks4=E(Ks4, M4)
  • Cm[0485] 5ks5=E(Ks5, M5)
  • Cm[0486] 6ks6=E(Ks6, M6).
  • The original data Cm[0487] 1ks4, Cm2ks5 and Cm3ks6 or edited data Cm4ks4, Cm5ks5 and Cm6ks6 encrypted by the fourth, fifth and sixth secret-keys Ks4, Ks5 and Ks6 are copied to the recording medium 11 or transmitted to secondary user terminal 5 via communication network 8 together with the first, second and third original data names or original data numbers and the primary user data Iu1.
  • For [0488] secondary user terminal 5 receiving the first, second and third encrypted original data Cm1ks4, Cm2ks5 and Cm3ks6 or the encrypted edited data Cm4ks4, Cm5ks5 and Cm6ks6, secondary utilization of the first, second and third original data M1, M2 and M3 or edited data M4, M5 and M6 is requested to copyright management center 10 by designating the original data names or original data numbers.
  • [0489] Copyright management center 10 receives the secondary utilization request of the first, second and third original data M1, M2 and M3 or the edited data M4, M5 and M6 from secondary user terminal 5 and finds out the first secret-key Ks1 and the first copyright control program P1 in accordance with the first original data name or number, the second secret-key Ks2 and the second copyright control program P2 in accordance with the second original data name or number and the third secret-key Ks3 and the third copyright control program P3 in accordance with the third original data name or number, wherein the first copyright control program P1 generates the fourth secret-key Ks4 from the first secret-key Ks1, the second copyright control program P2 generates the fifth secret-key Ks5 from the second secret-key Ks2 and the third copyright control program P3 generates the sixth secret-key Ks6 from the third secret-key Ks3:
  • Ks[0490] 4=P1(Ks1)
  • Ks[0491] 5=P2(Ks2)
  • Ks[0492] 6=P3(Ks3);
  • [0493] Copyright management center 10 supplies these secret-keys to secondary user terminal 5 together with the first, second and third copyright control programs P1, P2 and P3.
  • In [0494] secondary user terminal 5 receiving the fourth, fifth and sixth secret-keys Ks4, Ks5 and Ks6 and the first, second and third copyright control programs P1, P2 and P3, the encrypted first original data Cm1ks4 or edited data Cm4ks4 is decrypted by the fourth secret-key Ks4 using the first copyright control program P1, the encrypted second original data Cm2ks5 or edited data Cm5ks5 is decrypted by the fifth secret-key Ks5 using the second copyright control program P2, and the encrypted third original data Cm3ks6 or edited data Cm6ks6 is decrypted by the sixth secret-key Ks6 using the third copyright control program P3:
  • M[0495] 4=D(Ks4, Cmks4)
  • M[0496] 5=D(Ks5, Cm5ks5)
  • M[0497] 6=D(Ks6, Cm6ks6)
  • and the decrypted data M[0498] 4, M5 and M6 are used directly or by editing them.
  • When the first, second and third original data M[0499] 1, M2 and M3 or edited data M4, M5 and M6 are stored in secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8, the first original data M1 or edited data M4 is encrypted by the fourth secret-key Ks4 using the first copyright control program P1, the second original data M02 or edited data M5 is encrypted by the fifth secret-key Ks5 using the second copyright control program P2, and the third original data M3 or edited data M6 is encrypted by the sixth secret-key Ks6 using the third copyright control program P3.
  • In this case, it is also possible to make the first copyright control program P[0500] 1 generate a seventh secret-key Ks7 in accordance with the fourth secret-key Ks4, the second copyright control program P2 generate an eighth secret-key Ks8 in accordance with the fifth secret-key Ks5 and the third copyright control program P3 generate a ninth secret-key Ks9 in accordance with the sixth secret-key Ks6:
  • Ks[0501] 7=P1(Ks4)
  • Ks[0502] 8=P2(Ks5)
  • Ks[0503] 9=P3(Ks6)
  • When the first, second and third original data M[0504] 1, M2 and M3 or edited data M4, M5 and M6 are stored in secondary user terminal 5, copied to the recording medium 12, or transmitted to tertiary user terminal 6 via communication network 8, the first, second and third copyright control programs P1, P2 and P3 encrypt the first, second and third original data M1, M2 and M3 or the edited data M4, M5 and M6 by the seventh, eighth and ninth secret-keys Ks7, Ks8 and Ks9:
  • Cm[0505] 1ks7=E(Ks7, M1)
  • Cm[0506] 2ks8=E(Ks9, M2)
  • Cm[0507] 3ks9=E(Ks9, M3)
  • Cm[0508] 4ks7=E(Ks7, M4)
  • Cm[0509] 5ks8=E(Ks8, M5)
  • Cm[0510] 6ks9=E(Ks9, M6)
  • [Embodiment 13][0511]
  • In [0512] embodiment 13, new data is produced by using a plurality of original data supplied from a plurality of databases in response to a user's request, similar to embodiment 12. This embodiment uses a secret-key cryptosystem.
  • The use frequency of copyright control programs is used to generate a crypt key for encryption/decryption, similar to the [0513] embodiments 7 and 11.
  • In this embodiment, a counter is attached to a copyright control program, which counts the service frequency of the program or the number of times of using original data. The fourth, fifth and sixth secret-keys Ks[0514] 4, Ks5 and Ks6 are generated by the counter value N.
  • A secondary user presents the counter value N together with the original data name or original data number of each original data and primary user data to request secondary utilization of data to [0515] copyright management center 10.
  • [0516] Copyright management center 10 receives the secondary utilization request of data, finds out the first, second and third secret-keys Ks1, Ks2 and Ks3 in accordance with the original data names or original data numbers, generates fourth, fifth and sixth secret-keys Ks4, Ks5 and Ks6 by the first, second and third secret-keys Ks1, Ks2 and Ks3 for each data, the primary user information Iu1 and the first, second and third counter values N1, N2 and N3 using the first, second and third copyright control programs P1, P2 and P3, and supplies the generated fourth, fifth and sixth secret-keys Ks4, Ks5 and Ks6 to secondary user together with the fourth, fifth and sixth copyright control programs P1, P2 and P3.
  • Because the system structure of [0517] embodiment 13 is the same as that of embodiment 12 except the above point, its detailed description is omitted.
  • [Embodiment 14][0518]
  • When a copy of original data obtained by a primary user is directly supplied to a secondary user, a copyright of the primary user is not affected on the data because the data is not provided with any value. However, when new data is produced from obtained original data, that is, when new data is produced from single original data or from a plurality of original data, a secondary copyright of the primary user; i.e., secondary exploitation right in editing the data is affected on the new data. [0519]
  • Because the copyright of the original copyright owner also applies for the original data used for edit, the original copyright of the original data of an author and the secondary copyright of the primary user who has edited data apply for the edited data. [0520]
  • As a copyright is a right having essential elements of a personal right, authors strongly insist on owning the copyright in many cases. Therefore, even when original data is edited, it is preferable that the original data or its copyright owner can easily be specified from the edited data. [0521]
  • In the data copyright management systems described in embodiments 1 to 13, the copyrights of data are managed by encrypting original data or edited data. For these systems, however, the copyright of data is managed without identifying original data or edited data, in the whole data or separating an original data part from an edited part in the whole edited data. Therefore, it is impossible to specify original data or owner from edited data. [0522]
  • [0523] Embodiment 14 makes it possible to separate original data for which only the original copyright applies from the edited data in which a secondary exploitation right also applies in addition to the original copyright, and manage the original copyright and the secondary exploitation right.
  • Because data is edited by using an editor program, thereby altering original data, the edited data can be reproduced as the original data and edit contents (further, the editor program when necessary) are specified. In other words, unless the original data and the edit contents (further, the editor program when necessary) are specified, it is impossible to reproduce the edited data. [0524]
  • In [0525] embodiment 14, the secondary exploitation right described is managed by specifying original data and edit contents (further, an editor program when necessary) and managing them.
  • To produce new data from single original data, there can be different cases: first, edited data [A′] is obtained by altering original data A; second, edited data [A+X] is obtained by adding data X to the original data A by a primary user; third, edited data [A″] is obtained by dividing the original data A into original data elements A[0526] 1, A2, A3, . . . and changing the arrangement of the elements to such as A3, A2 and A1; and fourth, edited data [A1+X1+A2+X2+A3+X3 . . . ] is obtained by dividing the original data A into original data elements A1, A2, A3 . . . , also dividing the data X of the primary user into X1, X2, X3, . . . and arranging these elements.
  • In these cases, alteration of original data, change of original data arrangement, combination of the original data with primary user data, and division of the original data and combination of it with the primary user data can respectively be provided with a secondary exploitation right, which needs to be protected. The original copyright of the primary user, of course, is retained in the data X added by the primary user. [0527]
  • To produce new data by combining a plurality of original data, there are different methods: first, edited data [A+B+C . . .] is obtained by simply combining original data A, B, C, . . . ; second, edited data such as [A+X] is obtained by adding data X to the original data A, B, C, . . . ,; third, edited data [A[0528] 1+B1+C1+ . . . +A2+B2+C2+ . . . +A3+B3+C3+ . . .] is obtained by dividing the original data A, B, C, . . . into original data elements A1, A2, A3, . . . , B1, B2, B3, . . . , and C1, C2, C3, . . . , combining them, and changing their arrangements; and fourth, edited data [A1+B1+C1+X1+ . . . +A2+B2+C2+X2+ . . . +A3+B3+C3+X3+ . . .] is obtained by dividing the original data A, B, C, . . . into original data elements A1, A2, A3, . . . , B1, B2, B3, . . . , and C1, C2, C3, . . . , combining the elements with primary user data X1, X2, X3, . . . , and changing their arrangements.
  • Also in these cases, combination of a plurality of original data, combination of a plurality of original data with primary user data, division of a plurality of original data and change of the arrangements, and combination of a plurality of divided original data with the primary user data can respectively be provided with a secondary exploitation right, which needs to be protected. Also, the original copyright of the primary user, of course, is retained in the data X[0529] 1, X2, X3, . . . added by the primary user.
  • FIG. 6 shows an example for producing new data D by using a plurality of original data A, B and C. This method is known as the cut-and-paste technique in which data is edited by extracting (cutting out) elements “a”, “b” and “c” from original data A, B and C and attaching (pasting) the extracted elements “a”, “b” and “c” to form a piece of data D. [0530]
  • While it is clear that original data and primary user data are data, the editing process: alteration of original data, arrangement change of original data, combination of original data with primary user data, division of original data and combination with primary user data, combination of a plurality of original data each other, combination of a plurality of original data with primary user data, division and arrangement change of a plurality of original data, and combination of a plurality of divided original data with primary user data, are also data. [0531]
  • In the above described embodiments 1 to 13, the copyright of data are managed by encrypting original data or edited data. Further, noticing that editing process of data, such as arrangement of original data and process of editing, is also data, the secondary exploitation right on edited data can be protected by managing the primary copyright of the author on the original data and secondary copyright of the primary user on editing process data. [0532]
  • Editing process data or editor program may be called as scenario. That is, it is possible to ensure to manage the copyrights of the edited data as well as of the original data, if the edited data is constituted with original data, primary user data and editing process data, and thus, these original data, primary user data and editing process data are managed by the data copyright management system described in embodiments 1 to 13. In this case, an editor program used for editing data may be managed by the data copyright management system, if necessary. [0533]
  • While the data edit operation of original data can be performed by using an editor program corresponding to the original data, by handling the original data as object-oriented software which has recently been focused on, it is possible to facilitate further editing of data and manage more preferably copyrights of data. [0534]
  • Further, by adopting agent-oriented software, a user can synthesize data with little labor. The agent-oriented software, unlike the conventional one, is a program having autonomy, flexibility and cooperativeness, which is able to meet a user's request with its characteristics of autonomy, flexibility and cooperativeness in accordance with only a general instruction of the user without specifically giving every operation instructions to the software. [0535]
  • By incorporating the agent program into a basic system of a data copyright management system so that the program monitors the database utilization of a user and information obtained through the monitoring is collected at the database or the copyright management center, it is possible to monitor the database utilization condition of the user at the database side or the copyright management center side and achieve more accurate copyright management. As described, these agent program and data can also be protected and, therefore, are encrypted like original data. [0536]
  • [Embodiment 15][0537]
  • The works with a copyright include those which make use of the copyright and those which do not make use of the copyright. The works with no copyright include those to which no copyright is given by a law and those whose copyright duration has expired. All works except those which have no existing copyright have a copyright, and they are normally provided with a mark for indicating the copyright which prevents infringement of the copyright. [0538]
  • The same is applied to data. In case of data with a copyright, indication of a copyright or an author mark is given to the data to be used or to the file header of the data in order to prevent the infringement of the copyright. [0539]
  • Further, by adding the copyright flag indicative of the data with copyright to the file, and by identifying the copyright flag in the user terminal, it is possible to prevent the infringement of the data copyright. [0540]
  • However, even if the indication on a copyright is given to data, when a user disregards the copyright of the data work, that results in the infringement of the copyright. To prevent the above case, in the above mentioned embodiments, data is encrypted and a decryption key for decrypting the encrypted data is managed so as to perform encryption or decryption by a crypt key different from the decryption key when decrypted data is stored, copied, or transmitted. [0541]
  • Even in this case, there may be the possibility of storing, copying, or transferring data without using a cryptographic key different from a decryption key by transferring the data to a memory other than the main memory of a user terminal while the data is present in the main memory of the user terminal. [0542]
  • To prevent the above case, it is the best to incorporate data copyright utilization software into a basic system of a user terminal, indicate the file of a data work to which a copyright is given with an attribute for making use of the copyright, make the basic system of the user terminal monitor the attribute for using the copyright of the data work, and make the data copyright utilization software manage the data work having the copyright using attributes. [0543]
  • The basic system means a software operating system such as DOS when the user terminal is a computer such as a personal computer or a hardware operating system stored in a ROM when the user terminal is a portable information terminal or STB (set top box). [0544]
  • To more completely manage a data copyright with the operating system, it is preferable to incorporate the data copyright utilization software into a higher-level operating system. [0545]
  • Every processing and every data in the user terminal is under control of an operating system. In other words, the operating system can store every processing and data information in the user terminal. Therefore, it is possible to make the copyright control program automatically manage the data copyright in accordance with a data utilization condition held by the operating system without resorting to a user instruction. According to the above arrangement, a user can easily use a data copyright and the data copyright can more completely be managed. [0546]
  • Further, it is desirable that the copyright control program for managing the crypt key, data copyright information, the copyright label or the like is kept in a system area controlled by the operating system itself; i.e., the system area the user program cannot access. [0547]
  • Even in this case, however, if part of a data work is extracted and used, it is difficult to manage the data copyright. Therefore, when an operating system detects such a situation, it is possible to manage the copyright of the extracted part of the data by configuring a system so as to add copyright information and the copyright using attributes owned by original data to the extracted part of the data by the copyright control program. [0548]
  • Further, to allow the extracted data to inherit the copyright of the original data work, a “has-a” link, which is a parent and child relationship, is formed between the extracted data and the original data work with the copyright control program. [0549]
  • With such a configuration, it is possible to allow the new data to inherit the copyright of each original data work in the case where the user extracts and incorporates his own desired portion from a plurality of copyright data to create new data. [0550]
  • [Embodiment 16][0551]
  • Because a copyright is a kind of property right, it is a matter of course that the charges for using the copyright occurs. Further, services such as offering of a secret-key and a copyright control program should be performed for charge. [0552]
  • The simplest method for paying these charges is a combination of a bill and payment. However, this method is complex in its operation and further may cause a trouble such as nonpayment even though the charge for using a copyright is directly paid. [0553]
  • There is a charge collection substitution method performed by, for example, a communication line enterprise, which is simple and has only a small risk of nonpayment because charges are collected by the communication line enterprise. However, it is necessary to pay a commission for charge collection substitution because charges are not directly collected. [0554]
  • To solve the above problem, there is a method for using digital cash. The digital cash is digital data used instead of cash in a computer connected to a communication network, which is encrypted and used. [0555]
  • [Embodiment 17][0556]
  • Further, the configuration of the data copyright management system described above can be applied not only to the data distribution but also to the distribution of the digital cash. [0557]
  • The digital cash system which has been proposed so far is based on a secret-key cryptosystem. The encrypted digital cash data is transferred from a bank account or a cash service of a credit company, and is stored in the IC card so that a terminal device for input/output is used to make a payment. The digital cash system which uses the IC card as a cash-box can be used at any place such as shops or the like as long as the input/output terminal is available. However, the system cannot be used at places such as homes or the like where no input/output terminal is available. [0558]
  • Since the digital cash is an encrypted data, any device can be used as the cash-box which stores digital cash data, in addition to the IC card, as long as the device can store encrypted data and transmit the data to the party to which the payment is made. As a terminal which can be specifically used as the cash-box, there are personal computers, intelligent television sets, portable telephone sets such as personal digital assistant (PDA), personal handy-phone system (PHS), intelligent telephone sets, and PC cards or the like which has the input/output function. [0559]
  • In transactions where such terminals are used as a cash-box for digital cash, the digital cash system can be actualized by replacing in the configuration of the data copyright control system, database [0560] 1 with a customer's bank, a first user terminal 4 with a customer, the second user terminal 5 with a retailer, copyright management center 18 with a retailer's bank and a third user terminal 6 with a wholesaler or a manufacturer.
  • Further, it is desirable that the digital cash is processed as an object associated with data and functions instead of being simple data. [0561]
  • In handling digital cash, there are a common digital cash form, an unentered digital cash form private for an owner, an entry column in the digital cash form private for the owner, digital cash data showing an amount of money, an instruction of handling digital cash, and a digital cash form private for the owner in which an amount of money is entered. In an object-oriented programming, the concepts such as an object, a class, a slot, a message and an instance are used. [0562]
  • In the corresponding relations, the common digital cash form becomes an object, the unentered digital cash form private for an owner becomes a class, the entry column of a digital cash form private for the owner becomes a slot, the instruction of handling digital cash becomes a message and the digital cash form private for the owner in which an amount of money is entered becomes an instance. Digital cash data comprising the amount of money and the like is used as an argument. Then, the data is transferred and stored in a slot which is referred to as an instance variable by the message so that a new instance is made which is digital cash in which the amount of money is renewed. [0563]
  • The digital cash which constitutes an object will be explained by using FIG. 7. In FIG. 7, reference numerals [0564] 23, 25 and 27 represent a digital cash form private for the customer in which the amount of money stored in a customer terminal is entered, 29 represents a digital cash form private for the retail shop in which the amount of money stored in a retail shop terminal is entered, and 24, 26 and 28 represents accounts of each customer's bank.
  • Customer [0565] 23 draws out necessary amount of money from the account 24 to use the digital cash, and transfers the data 31 of the digital cash to the digital cash form 23 which is stored in the terminal. In this case, residual amount data 30 of the digital cash is usually entered in the digital cash form 23. The digital cash form is not a class but an instance. The drawn out data 31 of the digital cash is transferred as an argument to the slot which is an entry column of the digital cash form 23 with the message instructing the addition to the residual amount data 30 of the digital cash. Then the drawn out data 31 of the digital cash is added to the residual amount data 30 of the digital cash in the digital cash form 23 so that a new instance is created in which the amount of money in the entry column of the digital cash form 23 is changed.
  • In the case where the customer makes a payment to the retail shop, the [0566] payment data 32 of the digital cash which corresponds to the paid amount is transferred as an argument to the slot which is an entry column of the digital cash form 23 with the message instructing the subtraction from the amount in the entry column of the digital cash form 23. Then payment data 32 of the digital cash is subtracted from the residual amount data 30 and the drawn out data 31 in the digital cash form 23 so that a new instance is created in which the amount of money in the entry column of the digital cash form 23 is changed.
  • Further, the [0567] payment data 32 of the digital cash is transferred to the digital cash form 29 private for the retail shop.
  • A similar withdrawal processing and payment processing are performed by digital cash forms [0568] 25 and 27 for other customers. The payment data 33 of the digital cash is transferred from the digital cash form 25, and the payment data 34 of the digital cash is transferred from the digital cash form 27 to the digital cash form 29 private for the retail shop.
  • In the case of the [0569] digital cash 29 private for the retail shop, the residual amount data 35 of the digital cash is usually entered. The payment data 32 of the digital cash, the payment data 33 of the digital cash, and the payment data 34 of the digital cash are transferred as arguments to the slot which is an entry column of the digital cash form 29 with the message instructing the addition to the residual amount data 35 of the digital cash so that the payment data 32, 33 and 34 of the digital cash are added to the residual amount data 35 of the digital cash, and a new instance is created in which the amount of money in the entry column of the digital cash form 29 is changed.
  • In a normal object-oriented programming, it is impossible that an argument is transferred to a slot with the message so that a new instance is created and the newly created instance as a whole is transferred. However, in the case of the digital cash, since the cryptosystem is used for security, an instance can be created in which the payment data of the digital cash is entered at the payer. This instance can be encrypted and transferred to the payee. [0570]
  • An embodiment of the transaction system will be explained in which the digital cash is transferred via a communication network by using FIG. 8. The embodiment is a modification of [0571] embodiment 9 by using a system shown in FIG. 4. In FIG. 4, reference numeral 36 represents a customer, 37 a bank of customer 36, 38 a retail shop, 39 a bank of retail shop 38, 40 a manufacturer, 41 a bank of manufacturer 40, 8 a public line provided by a communication enterprise or a communication network such as CATV line provided by a cable television enterprise. Customer 36, customer's bank 37, retail shop 38, retail shop's bank 39, manufacturer 40, manufacturer's bank 41 can be mutually connected with communication network 8. In this system, customer 36 can use cash service offered by a credit company other than banks and he can also interpose appropriate number of wholesalers between the retail shop and the manufacturer.
  • In addition, [0572] 42 and 43 are either IC cards or PC cards in which digital cash data is stored. The cards are used when the communication network is not used.
  • In FIG. 8, the broken line represents a path of encrypted-digital cash data, the solid line represents a path of requests from the customer, the retail shop or the manufacturer, and the one-dot chain line represents a path of the secret-key from each bank. [0573]
  • Further, in this embodiment, the first secret-key prepared by customer's [0574] bank 37, the second secret-key generated by the customer, the third secret-key generated by the retail shop, and the fourth secret-key prepared by the manufacturer are used as crypt keys.
  • In this embodiment, customer's [0575] bank 37, retail shop's bank 39, and manufacturer's bank 41 are explained as separate entities. These can be considered as a financial system as a whole.
  • The digital cash management program P for encrypting and decrypting the digital cash data is preliminarily distributed to [0576] customer 36 and is stored in the user terminal. Further, it is possible to transfer the digital cash management program P together with data every time a transaction with the bank is executed. Further, it is desirable to install the common digital cash programs P in all banks.
  • [0577] Customer 36 uses the user terminal to designate the amount of money via communication network 8 to request a withdrawal from the account of customer's bank 37 to the bank. At this time, the terminal presents customer information Ic.
  • Customer's [0578] bank 37 which receives the customer's request of withdrawal from the account selects or generates the first secret-key Ks1 so that the digital cash data M0 of the amount is encrypted by the first secret-key Ks1:
  • Cm[0579] 0ks1=E(Ks1, M0)
  • and the encrypted digital cash data Cm[0580] 0ks1 and the first secret-key Ks1 for a decrypting key are transferred to customer 36, and the customer information Ic and the first secret-key Ks1 are stored.
  • In this case, the first secret-key Ks[0581] 1 can be selected from what is preliminarily prepared by customer's bank 37, and also may be generated by presentation of the customer information Ic at the time of withdrawal of the customer using the digital cash management program P on the basis of the customer information Ic:
  • Ks[0582] 1=P(Ic).
  • In this manner, the first secret-key Ks[0583] 1 can be private for customer 36. At the same time, it is not necessary to transfer the first secret-key Ks1 to customer 36 so that the security of the system can be heightened. Further, the first secret-key Ks1 can be generated on the basis of the bank information Ibs of customer's bank 37 or on the basis of the bank information Ibs and the date of key generation.
  • [0584] Customer 36 to which the encrypted digital cash data Cm0ks1 and the first secret-key Ks1 are transferred generates the second secret-key Ks2 according to one or both of the customer information Ic and the first secret-key Ks1 using the digital cash management program P:
  • Ks[0585] 2=P(Ic)
  • The generated second secret-key Ks[0586] 2 is stored in the user terminal.
  • Further, [0587] customer 36 uses the secret-key Ks1 to decrypt the encrypted digital cash data Cm0ks1 with the digital cash management program P:
  • M[0588] 0=D(Ks1, Cm0ks1)
  • and the content is confirmed. When the decrypted digital cash data M[0589] 0 whose content is confirmed is stored in the user terminal which is a cash-box, the generated second secret-key Ks2 is used to encrypt the content by the digital cash management program P:
  • Cm[0590] 0Ks2=E(Ks2, M0).
  • The first secret-key Ks[0591] 1 is disused at this time.
  • [0592] Customer 36 who wishes to buy an article from retail shop 38 decrypts the encrypted digital cash data Cm0ks2 which is stored in the user terminal as a cash-box by the digital cash management program P by using the second secret-key Ks2:
  • M[0593] 0=D(Ks2, Cm0ks2)
  • and the digital cash data M[0594] 1 which corresponds to the necessary amount of money is encrypted by the second secret-key ks2 using the digital cash management program P:
  • Cm[0595] 1ks2=E(Ks2, M1)
  • and then, the payment is made by transmitting the encrypted digital cash data Cm[0596] 1ks2 to the user terminal as a cash-box of retail shop 38 via communication network 8.
  • At this time, the customer information Ic is also transmitted to the user terminal of [0597] retail shop 38.
  • Further, the residual amount digital cash data M[0598] 2 is encrypted by the second secret-key Ks2 using the digital cash management program P:
  • Cm[0599] 2ks2=E(Ks2, M2)
  • and stored in the user terminal of [0600] customer 36.
  • [0601] Retail shop 38 to which the encrypted digital cash data Cm1ks2 and the customer information Ic are transferred stores the transferred encrypted digital cash data Cm1ks2 and customer information Ic in the user terminal. At the same time, the customer information Ic is presented to retail shop's bank 39 via communication network 8 for confirming the content and the transmission for decryption key is requested.
  • Retail shop's [0602] bank 39 which is requested by retail shop 38 to transmit the second secret-key Ks2 transmits the request of the transmission of the second secret-key Ks2 and the customer information Ic to customer's bank 37.
  • Customer's [0603] bank 37 which is requested to transmit the second secret-key Ks2 from retail shop's bank 39 generates the second secret-key Ks2 according to the customer information Ic by the digital cash management program P in the case where the second secret-key Ks2 is based only on the customer information Ic, or generates the second secret-key Ks2 according to the customer information Ic and the first secret-key Ks1 by the digital cash management program P in the case where the second secret-key Ks2 is based on the customer information Ic and the first secret-key Ks1, and transmits the generated second secret-key Ks2 to shop's bank 39.
  • Retail shop's [0604] bank 39 to which the second secret-key Ks2 is transmitted from the customer's bank 37 transmits the second secret-key Ks2 to retail shop 38 via communication network 8. Retail shop 38 to which the second secret-key Ks2 is transferred decrypts the encrypted digital cash data Cm1ks2 by the second secret-key Ks2 using the digital cash management program P:
  • M[0605] 1=D(Ks2, Cm1ks2)
  • After confirming the amount of money, [0606] retail shop 38 transfers the article to customer 36.
  • In this case, [0607] retail shop 36 can directly request the transfer of the second secret-key Ks2 to customer's bank 37 instead of retail shop's bank 39.
  • In cases where the digital cash received by [0608] retail shop 38 is deposited in the account of retail shop's bank 39, the customer information Ic is transferred to retail shop's bank 39 together with the encrypted digital cash data Cm1ks2 via communication network 8.
  • Retail shop's [0609] bank 39 to which the encrypted digital cash data Cm1ks2 and the customer information Ic are transferred requests the transfer of the second secret-key Ks2 to customer's bank 37 by transmitting the customer information Ic.
  • Customer's [0610] bank 37, which is requested to transfer the second secret-key Ks2 from retail shop's bank 39, generates the second secret-key Ks2 according to the customer's information Ic by the digital cash management program P when the second secret-key Ks2 is only based on the customer's information Ic, or generates the second secret-key Ks2 according to the customer's information Ic and the first secret-key Ks1 by the digital cash management program P when the second secret-key Ks2 is based on the customer's information Ic and the first secret-key Ks1, then the generated second secret-key Ks2 is transferred to retail shop's bank 39.
  • Retail shop's [0611] bank 39, to which the second secret-key Ks2 is transferred from customer's bank 37, decrypts the encrypted digital cash data Cm1ks2 by the second secret-key Ks2 using the digital cash management program P:
  • M[0612] 1=D(Ks2, Cm1ks2)
  • and the decrypted digital cash data M[0613] 1 is deposited in the bank account of retail shop 39.
  • In the general trade system, [0614] retail shop 38 stocks products from manufacturer 40 or from the whole sale shops which come between retail shop 38 and the manufacturer 40. Then retail shop 38 sells the products to customer 36. Consequently, a transaction form is present between customer 36 and retail shop 38 just as between retail shop 38 and manufacturer 40.
  • The handling of the digital cash between [0615] retail shop 38 and manufacturer 40 is not basically different from the handling of the digital cash which is carried out between customer 36 and retail shop 38. Therefore, the explanation will be omitted for the sake of clarity.
  • In this digital cash system, the digital cash is handled through bank. As information such as the processed amount of the digital cash, date, and the secret-key demanding party information with respect to the handling of the digital cash is stored in the customer's bank, the residual amount and usage history can be obtained. [0616]
  • Even in the case where the user terminal which is a cash-box storing the digital cash data cannot be used owing to the loss or the breakage, it is possible to reissue the digital cash on the basis of the residual amount and usage history maintained in the customer's bank. [0617]
  • It is desirable to add a digital signature to the digital cash data for improve the security of the digital cash. In this embodiment, digital cash is added by the customer's information which may be accompanied by digital signature. Therefore, the digital cash in the embodiment can also have a function of settlement system for checques drawn by customers. [0618]
  • Also this system can be applied to various systems such as a negotiation of a draft by a letter of credit and a bill of lading in the international trading, which have been executed by documents. [0619]
  • [Embodiment 18][0620]
  • The digital cash in the digital cash system which is explained in [0621] embodiment 17 is always handled through bank. However, since it is possible to handle the digital cash without bank intervention, the digital cash system in which the bank does not intervene will be explained.
  • In the digital cash system, a public-key and a private-key are used as crypt keys for encrypting the digital cash data. The secret-key ks and customer information [0622] 1 c used in embodiment 17 is not used. Consequently, in this digital cash system, the digital cash is used in the same form as money.
  • Since other points are not different from the system configuration shown in [0623] embodiment 17, concrete explanation is omitted.
  • The party which receives the digital cash from a bank, a customer, a retail shop or a manufacturer with respect to this digital cash system prepares the public-key and the private-key. The public-key can be preliminarily sent to the party which is scheduled to make a payment, or can be sent to the party before a transaction is executed. Here an explanation is made on the supposition that the key is preliminarily distributed. [0624]
  • [0625] Customer 36 requests to customer's bank 37 for withdrawing the money from the bank account via communication network 8 from a user terminal, by indicating an amount of the money.
  • Customer's [0626] bank 37 which receives the request for withdrawing money from customer 36 encrypts the digital cash data M0 of the amount of money drawn by a customer public-key Kbc which is preliminarily sent, using the digital cash management program P
  • Cm[0627] 0kbc=E(Kbc, M0)
  • and transfers the encrypted digital cash data Cm[0628] 0kbc to customer 36.
  • [0629] Customer 36 to which the encrypted digital cash data Cm0kbc is transferred decrypts the digital cash data by the customer private-key Kvc which corresponds to the customer public-key Kbc using the digital cash management program P:
  • M[0630] 0=D(Kvc, Cm0kbc)
  • [0631] Customer 36 confirms the content and changes the residual amount to M2(=M0+M1) in the case where there is a residual amount data M1 in the terminal. Then, the digital cash data M2 the amount of which is changed is encrypted with the customer public-key Kbc with the digital cash management program P:
  • Cm[0632] 2kbc=E(Kbc, M2)
  • and stored in the terminal. [0633]
  • [0634] Customer 36 who wishes to buy products from retail shop 38 decrypts the encrypted digital cash data Cm2 Kbc stored in the terminal by the customer private-key Kvc using the digital cash management program P:
  • M[0635] 2=D(Kvc, Cm2kbc) and encrypts the digital cash data M3 corresponding to the required amount of money with the digital cash management program P by the retail shop public-key Kbs which is preliminarily sent:
  • Cm[0636] 3 kbs=E(Kbs, M3)
  • The payment is made by transferring the digital cash data to the terminal of [0637] retail shop 38 via communication network 8.
  • Further, the residual amount digital cash data M[0638] 4(=M2−M3) is encrypted by the customer public-key Kbc using the digital cash management program P:
  • Cm[0639] 4 kbc=E(Kbc, M4)
  • and stored in the terminal. [0640]
  • [0641] Retail shop 38 to which the encrypted digital cash data Cm3 Kbs is transferred decrypts the digital cash data with the digital cash management program P by the retail shop private-key Kvs corresponding to the retail shop public-key Kbs:
  • M[0642] 3=D(Kvs, Cm3 kbs) Retail shop 38 confirms the content and changes the residual amount data to M6(M5+M3) in the case where the residual amount data M5 is present in the terminal. Then, the digital cash data M6 in which the amount of money is changed is encrypted with the retail shop public-key Kbs with the digital cash management program P:
  • Cm[0643] 6 kbs=E(Kbs, M6)
  • and stored in the terminal. [0644]
  • [0645] Retail shop 38 which is willing to settle the stock account of products to manufacturer 40 makes the settlement using the same manner.
  • In the general trade system, [0646] retail shop 38 stocks products either from manufacturer 40 or the wholesaler placed between retail shop 38 and manufacturer 40 and sells the products to customer 36. Consequently, a trade form similar to the trade form between customer 36 and retail shop 38 is present between retail shop 38 and manufacturer 40.
  • Since the handling of the digital cash between [0647] retail shop 38 and manufacturer 40 is not basically different from the handling of digital cash between customer 36 and retail shop 38, an explanation is omitted for the sake of clarity.
  • In the [0648] embodiments 17 and 18, a configuration of a data copyright management system explained by using FIG. 4 is applied to actualize the digital cash system. Further, customer information is used and the secret-key to be used is altered in embodiment 17. The public-key and the private-key are used in embodiment 18.
  • However, as a system configuration for actualizing the digital cash system, the configuration of other copyright management systems such as any configuration of the data copyright management system shown in FIG. 1, 2, [0649] 3 and 5 can be applied. Further, as a cryptosystem used in the case, any of the cryptosystems explained in embodiments 1 through 13 using the non-altered secret-key, the public-key and the private-key, a combination of the secret-key, public-key and the private-key, and complex keying can be applied.
  • [Embodiment 19][0650]
  • In the video conference system, a television picture has been added to the conventional voice telephone set. Advanced video conference system shows a system in which a computer system is incorporated in the video conference system so that the quality of the voice and the picture are improved, and data can be handled simultaneously with the voice and the picture. [0651]
  • Under these circumstances, security against the violation of the user's privacy and the data leakage due to eavesdropping by persons other than the participants of the conference are protected by the cryptosystem using a secret-key. [0652]
  • However, since the conference content obtained by the participants themselves are decrypted, when participants themselves store the content of the conference and sometimes edit the content and further, use for secondary usage such as distribution to the persons other than the participants of the conference, the privacy of other participants of the video conference and data security remains unprotected. [0653]
  • In particular, as the compression technology of the transmission data is advanced and the volume of the data storage medium increases, it is possible that all the content of the video conference is copied to the data storage medium or transmitted via a network. [0654]
  • In view of the circumstances, [0655] embodiment 19 is intended; when video conference participants perform secondary use, to secure the privacy of other participants and data security by using the aforementioned configuration of the data copyright management system.
  • This video conference data management system can be actualized, for example, by replacing database [0656] 1 in the data copyright management system configuration shown in FIG. 4 with a participant of the video conference, the first user terminal 4 with another participant of the video conference, and the second user terminal 5 with non-participant of the video conference.
  • [0657] Embodiment 19 will be explained by using FIG. 9. Referring to FIG. 9, reference numeral 44 represents a participant as a host of the video conference, 45 a participant of the video conference as a guest, 46 a non-participant of the video conference as a user, 47 a non-participant of the video conference as another user, 8 a communication network such as a public telephone line provided by the communication enterprise and a CA television line provided by the cable television enterprise or the like. Participant 44 of the video conference is connected to participant 45 of the video conference via communication network 8. Further, participant 45 of the video conference can be connected to non-participant 46 of the video conference, and non-participant 46 of the video conference to non-participant 47 of the video conference, via communication network 8. Reference numeral 48 represents a data recording medium.
  • Referring to FIG. 9, the broken line is a path of the encrypted video conference content, the solid line is a path requesting the crypt key from [0658] non-participants 46 and 47 of the television conference to participant of the television conference 44, and the one-dot chain line is a path of crypt keys from participant of the video conference 44 to participant of the video conference 45 and non-participants of the video conference 46 and 47.
  • In this embodiment, a video conference data management system is described here only for the protection for data security and privacy in case of [0659] video conference participant 44 to simplify the explanation. However, it is of course, possible to protect for data security and privacy of the video conference participant 45.
  • A video conference data management program P for encryption/decryption of the video conference data is previously distributed to [0660] video conference participant 45 and video conference non-participants 46 and 47, and is stored in each terminal. The video conference data management program P may be transferred whenever a crypt key is transferred.
  • In this embodiment, further, a first secret-key prepared by [0661] video conference participant 44, a second secret-key prepared by video conference participant 45 and a third secret-key prepared by video conference non-participant 46 are also used.
  • [0662] Video conference participant 44 and video conference participant 45 perform the video conference by transmitting audio, picture and data (referred to as video conference data on the whole) each other, using each terminal via communication network 8. Before the video conference, video conference participant 44 generates or selects the first secret-key Ks1 to transfer to video conference participant 45 prior to the start of the video conference.
  • [0663] Video conference participant 45 receives the first secret-key Ks1 and generates the second secret-key Ks2 by the first secret-key Ks1 using the video conference data management program P:
  • Ks[0664] 2=P(Ks1).
  • The generated second secret-key Ks[0665] 2 is stored in the terminal.
  • [0666] Participant 44 of the video conference encrypts the video conference data M0 with the first secret-key Ks1 in the video conference via communication network 8:
  • Cm[0667] 0ks1=E(Ks1, M0)
  • and transfers the encrypted video conference data Cm[0668] 0ks1 to video conference participant 45.
  • [0669] Participant 45 of the video conference who receives the video conference data Cm0ks1 encrypted by the first secret-key Ks1 decrypts the video conference data Cm0ks1 by the first secret-key Ks1:
  • M[0670] 0=D(ks1, Cm0ks1)
  • and uses decrypted video conference data M[0671] 0.
  • Further, the second secret-key Ks[0672] 2 is generated based on the first secret-key Ks1 with the video conference data management program P:
  • Ks[0673] 2=P(Ks1).
  • In the case where the decrypted video conference data M[0674] 0 is stored in the terminal of participant 45 of the video conference, copied to data record medium 48, or transferred to the non-participant of the video conference via communication network 8, the data M is encrypted by the second secret-key Ks2 using the video conference data management program P:
  • Cmks[0675] 2=E(Ks2, M).
  • The encrypted data Cmks[0676] 2 is copied to record medium 48 or supplied to the non-participant of the video conference via communication network 8, together with the video conference data name or the video conference data number.
  • Non-participant [0677] 46 of the television conference who obtains the encrypted data CmKs2 makes a request to participant 44 for the secondary use of the video conference data M from the terminal by specifying the name or number of the video conference data.
  • [0678] Participant 44 of the video conference who receives the request for the second use of the data M finds out the first secret-key Ks1 according to the name or the number of the video conference data name or number to generate the second secret-key Ks2 based on the first secret-key Ks1:
  • Ks[0679] 2=P(Ks1)
  • and supplies the generated second secret-key Ks[0680] 2 to non-participant 46 of the video conference.
  • Non-participant [0681] 46 of video conference who receives the second secret-key Ks2, decrypts the encrypted data Cmks2 by the second secret-key Ks2 by using the television conference data management program P:
  • M=D(Ks[0682] 2, Cmks2)
  • and then, uses decrypted video conference data M. [0683]
  • In the case where the video conference data M is stored in the terminal of [0684] non-participant 46 of the video conference, copied to record medium 49, or transmitted to non-participant 47 of the video conference, the video conference data M is encrypted by the second secret-key Ks2 using the video conference data management program P:
  • Cmks[0685] 2=E(Ks2, M).
  • The third secret-key Ks[0686] 3 may be generated on the basis of the second secret-key Ks2 with the television conference data management program P:
  • Ks[0687] 3=P(Ks2)
  • The data M can be encrypted with the video conference data management program P by this generated third secret-key Ks[0688] 3:
  • Cmks[0689] 3=E(Ks3, M).
  • In [0690] embodiment 19 described above, the configuration of the data copyright management system which is explained by using FIG. 4 for realizing the video conference data management system is applied and alter the secret-key which has been used.
  • However, as a configuration of a system for realizing the video conference data system, other system configuration, for example, any of system configurations shown in FIG. 1, 2, [0691] 3, 4 and 5 can be applied. Further, as cryptosystem used in such a case, the non-altered secret-key, the public-key and the private-key, a combination of the secret-key, the public-key and the private-key, and the complex keying which is explained from embodiment 1 to 13 can be applied.
  • Further, in this explanation, it is supposed that the participant of the video conference as a guest stores and uses the video conference data, copies the data on the record medium and transfers the data via the communication network. It is also possible to limit these actions by disusing the crypt key used in the encryption process. [0692]
  • [Embodiment 20][0693]
  • As described above, each user who uses the system of the present invention must previously be entered in a database system, and when entered in the system, software for database is supplied to the user. [0694]
  • Because the software includes not only normal communication software such as a data communication protocol but also a program for decrypting a copyright control program by a first crypt key, it needs to be protected. [0695]
  • In the case of the present invention, a first crypt key K[0696] 1, a second crypt key K2, and a copyright control program P are transferred to each user in order to use data M. Therefore, each user must keep these keys and the program. Further, the copyright information label, user information, the public-key and private-key in the public-key cryptosystem and the program containing algorithm for generating the secret-key are kept when needed.
  • For keeping them, it is the simplest to use a flexible disk. However, in the flexible disk it is easy to lose or alter data. [0697]
  • A hard disk drive is also unstable against losing or altering data though it is more stable than the flexible disk. [0698]
  • Recently, IC cards have become available in which an IC element is sealed in a card-like package. Particularly, standardization of a PC card with a microprocessor sealed in it has progressed as a PCMCIA (Personal Computer Memory Card International Association) card or JEIDA card. [0699]
  • FIG. 10 shows an embodiment of the database copyright management system of the present invention constituted by using the PC card. In FIG. 10, [0700] reference numeral 50 represents a microprocessor of a user terminal, 51 represents a system bus, and 52 represents a PC card in which a PC card microprocessor 53, read-only memory 55, and random-access memory 56 are sealed. System bus 51, microprocessor 53, read-only memory 55, random-access memory 56 are connected with each other by PC card microprocessor bus 54.
  • Read-only [0701] memory 55 stores fixed information such as database software and user data as a database. Read-only memory 55 also-stores a first crypt key, a second crypt key, and a copyright control program supplied from key control center 9 or a copyright management center. Because data is also written in read-only memory 55, it is the simplest to use an EEPROM for memory 55.
  • As previously described, because data, the crypt key, and the copyright control program can be encrypted and supplied to the users, in order to use data it is necessary to decrypt these crypt key, copyright control program and the data. [0702]
  • To perform the above operations, [0703] microprocessor 50 of the user terminal uses the software, crypt key and copyright control program stored in read-only memory 55 of PC card 52.
  • In this case, however, there is a risk that these data information may be used illegally because they are transferred to the user terminal. To avoid the risk, it is necessary to make [0704] microprocessor 55 in PC card 52 perform every operation by using random-access memory 56 through CPU bus 54 and transfer results only to the user terminal for various types of utilization.
  • It is understood that particular embodiments described herein should not limit the present invention thereby. This invention can be practiced in connection with any data management system. For example, when the PC card is used, a different unit can be used as the user terminal. It is also possible to use a board or external unit having the above functions in addition to the PC card. [0705]
  • Thus, a database copyright control system has been described, which is applicable to multimedia system. [0706]

Claims (70)

1. A data copyright management system for managing the copyright of data which is encrypted and supplied from a database to a user, said data copyright management system having the database and a key control center;
wherein a key for decrypting said encrypted data is supplied from said key control center to said user;
said user uses said key for decrypting when said user displays or edits said data to decrypt said encrypted data; and
said data is re-encrypted when said user stores, copies or transfers said data or data which has been edited.
2. A data copyright management system according to claim 1 wherein said key used in said reencryption is different from said key for decryption.
3. A data copyright management system according to claims 1 or 2 wherein a copyright control program is further used for managing the copyright of said data.
4. A data copyright management system according to claim 3 wherein said data copyright control program is stored in a ROM of a device which said user uses.
5. A data copyright management system according to claim 3 wherein said data copyright control program is stored in system area controlled by an operating system of the device which said user uses.
6. A data copyright management system according to claims 1, 2, 4 or 5 wherein a copyright information which is not encrypted with respect to said data copyright is further used.
7. A data copyright management system according to claim 3 wherein a copyright information which is not encrypted with respect to said data copyright is further used.
8. A data copyright management system according to claims 1, 2, 4, 5 or 7 wherein said copyright information which is not encrypted added to said encrypted data as a copyright information label, said copyright information label being stored, copied or transmitted together with said data in the case where said data is stored, copied or transmitted.
9. A data copyright management system according to claim 3 wherein said copyright information which is not encrypted added to said encrypted data as a copyright information label, said copyright information label being stored, copied or transmitted together with said data in the case where said data is stored, copied or transmitted.
10. A data copyright management system according to claim 6 wherein said copyright information which is not encrypted added to said encrypted data as a copyright information label, said copyright information label being stored, copied or transmitted together with said data in the case where said data is stored, copied or transmitted.
11. A data copyright management system according to claim 8 wherein a digital signature is added to said copyright information label.
12. A data copyright management system according to claim 9 wherein a digital signature is added to said copyright information label.
13. A data copyright management system according to claim 10 wherein a digital signature is added to said copyright information label.
14. A data copyright management system for using data encrypted and supplied from a database to a user, said data copyright management system comprising the database, a key control center and a copyright management center,
wherein said data copyright management system uses secret-key, user information and copyright control program;
said database encrypts the data with first secret-key to distribute the data to a first user via communication network, communication and broadcasting satellite, and record medium;
said first user provides the first user information to said key control center to request the use;
said key control center transfers said first user information to said copyright management center;
said key control center transfers the copyright control program together with said first secret-key and second secret-key to said first user via said communication network;
said first user uses said first secret-key with said copyright control program to decrypt said encrypted data for use; and
said data decrypted is re-encrypted in the case where said decrypted data is stored, copied or transmitted with said copyright control program by using said second secret-key, and uncrypted first user information is added.
15. A data copyright management system according to claim 14 wherein said first secret-key and said second secret-key are disused with said copyright control program, when said decrypted data is copied or transmitted; and
said first user requests for the retransfer of said second secret-key for the reuse of said reencrypted data to said copyright management center so that said second secret-key is retransmitted.
16. A data copyright management system according to claim 15 wherein the copy or transmit of said encrypted data is registered in said copyright management center according to the retransfer of said second secret-key.
17. A data copyright management system according to claim 15 or 16 wherein second user presents said first user information to request the use to said copyright management center;
said copyright management center transfers said second secret-key and third secret-key, and said copyright control program to said second user after confirming the retransfer of said second secret-key to said first user;
said second user decrypts said encrypted data with said copyright control program by using said second secret-key; and
said data is reencrypted and redecrypted with said copyright control program by using said third secret-key when said decrypted data is stored, copied or transmitted.
18. A data copyright management system according to claims 14, 15, or 16 wherein said second secret-key is generated on the basis of any one or more of said first secret-key, said user information, and the usage frequency of said copyright control program with said copyright control program.
19. A data copyright management system according to claim 17 wherein said second secret-key is generated on the basis of any one or more of said first secret-key, said user information, and the usage frequency of said copyright control program with said copyright control program.
20. A data copyright management system for using data encrypted and supplied from a database to a user, said data copyright management system comprising a database, a key control center and a copyright management center;
wherein said data copyright management system uses secret-key, user information and copyright control program;
first user presents the first user information to the database to request the use of the data;
said database encrypts requested said data by using first secret-key and transfers it to said first user via said communication network together with said first secret-key, second secret-key and said copyright control program;
said key control center transfers said first user information to said copyright management center;
said key control center transfers the copyright control program together with said first and second secret-keys to said first user via said communication network;
said first user decrypts and uses said encrypted data with said copyright control program by using said first secret-key; and
said data decrypted is re-encrypted when said decrypted data is stored, copied or transmitted with said copyright control program by using said second secret-key, and uncrypted first user information is added.
21. A data copyright management system according to claim 20 wherein said first and second secret-keys are disused with said copyright control program when said decrypted data is copied or transmitted;
said first user requests retransfer of said second secret-key for the reuse of the reencrypted data to said copyright management center; and
said second secret-key is retransferred.
22. A data copyright management system according to claim 21 wherein the copy or transmit of said encrypted data is registered in said copyright management center according to the retransfer of said second secret-key.
23. A data copyright management system according to claim 21 or 22 wherein second user presents said first user information to request the use to said copyright management center;
said copyright management center transfers said second secret-key, third secret-key and said copyright control program to said second user after confirming the retransfer of said second secret-key to the first user;
said second user decrypts said encrypted data with said copyright control program by using said second secret-key; and
said data is reencrypted and redecrypted with said copyright control program by using said third secret-key in the case where said decrypted data is stored, copied or transmitted.
24. A data copyright management system according to claims 20, 21, or 22 wherein said second secret-key is generated on the basis of any one or more of said first secret-key, said user information, and the usage frequency of said copyright control program with said copyright control program.
25. A data copyright management system according to claim 23 wherein said second secret-key is generated on the basis of any one or more of said first secret-key, said user information, and the usage frequency of said copyright control program with said copyright control program.
26. A data copyright management system for using data encrypted and supplied from a database to a user, said data copyright management system comprising a database, a key control center and a copyright management center;
said data copyright management system uses secret-key, public-key and private-key;
first user presents first public-key, second public-key and first user information to request the use of the desired data to said key control center;
said database which receives the request for use encrypts said data by using first secret-key, encrypts said first secret-key by using said first public-key, and encrypts second secret-key by using said second public-key;
said encrypted data, said encrypted first secret-key, said encrypted second secret-key and said copyright control program are transmitted to said first user;
said first user decrypts said encrypted first secret-key by using first private-key, decrypts said encrypted data by using said decrypted first secret-key, and decrypts said encrypted second secret-key by using second private-key, with said copyright control program;
said data is encrypted and decrypted with said copyright control program by using the second secret-key in the case where said decrypted data is stored, copied or transmitted.
27. A data copyright management system according to claim 26 wherein said first and second secret-keys are disused with said copyright control program when said decrypted data is copied or transmitted;
said first user who reuses said encrypted data requests for the retransfer of said second secret-key for the reuse of said reencrypted data to said copyright management center; and
said second secret-key is retransferred.
28. A data copyright management system according to claim 27 wherein the copy or transmit of said encrypted data is registered in said copyright management center.
29. A data copyright management system according to claim 27 or 28 wherein second user presents said first user information to request the use to said copyright management center;
said copyright management center transfers said second secret-key, third secret-key, and said copyright control program to said second user after confirming the retransfer of said second secret-key to said first user;
said second user decrypts said encrypted data with said copyright control program by using said second secret-key; and
said data decrypted is reencrypted and redecrypted with said copyright control program by using said third secret-key in the case where said decrypted data is stored, copied or transmitted.
30. A data copyright management system according to claims 26, 27, or 28 wherein said second secret-key is generated on the basis of any one or more of said first secret-key, said user information, and the usage frequency of said copyright control program.
31. A data copyright management system according to claim 29 wherein said second secret-key is generated on the basis of any one or more of said first secret-key, said user information, and the usage frequency of said copyright control program.
32. A data copyright management system for using a plurality of data encrypted each by different secret-keys and supplied from database to a user, said system using a secret-key, user information and a copyright control program, said data copyright management system comprising:
first user obtaining from a copyright management center a plurality of copyright control programs unique to original said plurality of data and a plurality of first secret-keys to decrypt said plurality of original data with a plurality of said first secret-keys;
one or a plurality of second secret-keys being generated with a plurality of copyright control programs unique to said plurality of original data;
wherein said plurality of original data which are used or edited are encrypted with said one or a plurality of second secret-keys with said plurality of copyright control programs unique to said plurality of original data to be stored, copied or transmitted together with the edition process data; and
said plurality of original data or said plurality of edited data encrypted with said one or plurality of second secret-keys are decrypted with said one or plurality of second secret-keys and said plurality of copyright control programs obtained from said copyright management center for second user to use and edit by using said edition process.
33. A data copyright management system according to claim 32 wherein said second secret-key is generated with said copyright control program on the basis of any one or more of said first secret-keys and said user information.
34. A data copyright management system for using data encrypted and supplied from a database to a user, using a crypt key, user information and a copyright control program, comprising:
said user presenting user information to said database;
said database supplying said data encrypted with first crypt key to first user;
said first user generating a second crypt key based on said first crypt key with said copyright control program;
said encrypted data being decrypted by using said first crypt key in the case where said first user uses said encrypted data; and
said decrypted data being reencrypted by using said second crypt key in the case where said first user stores, copies or transmits said decrypted data.
35. A data copyright management system according to claim 34 wherein said crypt key is a secret-key.
36. A data copyright management system according to claim 34 wherein said crypt key is a public-key and a private-key.
37. A digital cash management system for using digital cash encrypted and supplied from a financial organization to first user, comprising:
said financial organization supplying a key for decrypting said encrypted digital cash data to said first user;
said digital cash data being decrypted by using said decrypting key in the case where said first user confirms said digital cash data; and
said data being reencrypted in the case where said first user stores said decrypted digital cash data, in the case where changed digital cash data is stored, or in the case where digital cash data is transmitted to said second user.
38. A digital cash management system according to claim 37 wherein the key used in said reencryption is a crypt key which is different from said decrypting key.
39. A digital cash management system according to claims 37 or 38 wherein a digital cash management program is further used for managing said digital cash.
40. A digital cash management system according to claims 37 or 38 wherein first user information which is not encrypted is further used.
41. A digital cash management system according to claim 39 wherein first user information which is not encrypted is further used.
42. A digital cash management system according to claims 37 or 38 wherein said first user information which is not encrypted is added to said encrypted digital cash data as the first user information label to be stored or transmitted together with said digital cash data in the case where said digital cash data is stored, in the case where changed digital cash data is stored, or in the case where said digital cash data is transmitted to the second user.
43. A digital cash management system according to claim 39 wherein said first user information which is not encrypted is added to said encrypted digital cash data as the first user information label to be stored or transmitted together with said digital cash data in the case where said digital cash data is stored, in the case where changed digital cash data is stored, or in the case where said digital cash data is transmitted to the second user.
44. A digital cash management system according to claim 40 wherein said first user information which is not encrypted is added to said encrypted digital cash data as the first user information label to be stored or transmitted together with said digital cash data in the case where said digital cash data is stored, in the case where changed digital cash data is stored, or in the case where said digital cash data is transmitted to the second user.
45. A digital cash management system according to claim 41 wherein said first user information which is not encrypted is added to said encrypted digital cash data as the first user information label to be stored or transmitted together with said digital cash data in the case where said digital cash data is stored, in the case where changed digital cash data is stored, or in the case where said digital cash data is transmitted to the second user.
46. A digital cash management system according to claim 42 wherein a digital signature is added to said first user information label.
47. A digital cash management system according to claim 43 wherein a digital signature is added to said first user information label.
48. A digital cash management system according to claim 44 wherein a digital signature is added to said first user information label.
49. A digital cash management system according to claim 45 wherein a digital signature is added to said first user information label.
50. A digital cash management system for using digital cash encrypted and supplied from a financial organization to a first user, said system using a crypt key, user information and digital cash management program, comprising:
said first user presenting the first user information to said financial organization;
said financial organization providing said first user with said digital cash data encrypted by the first crypt key;
wherein said first user generates a second crypt key on the basis of said first crypt key with said digital cash management program;
said encrypted digital cash data is decrypted by using said first crypt key in the case where said first user confirms said encrypted digital cash data;
said digital cash data decrypted is reencrypted by using said second crypt key to be stored said first user;
said decrypted digital cash data is reencrypted by using said second crypt key and said digital cash data reencrypted is transmitted to second user together with said first user information in the case where said decrypted digital cash data is transmitted to said second user;
said first user information is presented to said financial organization from said second user;
said financial organization generates said second crypt key based on said first user information and transfers said second crypt key to said second user; and
said second user decrypts said reencrypted digital cash data with said digital cash management program by using said second crypt key which is transferred.
51. A digital cash management system according to claim 50 wherein said crypt key is a secret-key.
52. A digital cash management system according to claim 50 wherein said crypt key is a public-key and a private-key.
53. A digital cash management system for using a digital cash encrypted and supplied from a financial organization to first user, said system using a public-key and a private-key, comprising:
said first user presenting first public-key to said financial organization;
said financial organization encrypting digital cash data with said first public-key to supply to said first user;
said first user decrypting said digital cash data by using first private-key;
second user presenting second public-key to said first user;
said first user encrypting said digital cash data which is decrypted with said second public-key to transfer to said second user; and
said second user decrypting said digital cash data by using second private-key.
54. A video conference data management system for using video conference data encrypted and supplied from first user to second user, comprising:
a key for decrypting said encrypted video conference data being supplied from said first user to said second user;
said encrypted video conference data being decrypted by using said decrypting key in the case where said second user uses said video conference data; and
said data being reencrypted in the case where said second user stores decrypted said video conference data, in the case where edited video conference data is stored, or in the case where said video conference data is transmitted to third user.
55. A video conference data management system according to claim 54 wherein a crypt key used for said re-encryption is different from said decrypting key.
56. A video conference data management system according to claims 54 or 55 wherein a video conference data management program for managing said video conference data is further used.
57. A video conference data management system according to claims 54 or 55 wherein first user information which is not encrypted is further used.
58. A video conference data management system according to claim 56 wherein first user information which is not encrypted is further used.
59. A video conference copyright management system according to claims 54 or 55 wherein said uncrypted first user information is added to said encrypted video conference data as the first user information label which is copied or transmitted together with said video conference data in the case where said video conference data is stored, in the case where the edited video conference data is stored, or in the case where the video conference data is transmitted to third user.
60. A video conference copyright management system according to claim 56 wherein said uncrypted first user information is added to said encrypted video conference data as the first user information label which is copied or transmitted together with said video conference data in the case where said video conference data is stored, in the case where the edited video conference data is stored, or in the case where the video conference data is transmitted to third user.
61. A video conference copyright management system according to claim 57 wherein said uncrypted first user information is added to said encrypted video conference data as the first user information label which is copied or transmitted together with said video conference data in the case where said video conference data is stored, in the case where the edited video conference data is stored, or in the case where the video conference data is transmitted to third user.
62. A video conference copyright management system according to claim 58 wherein said uncrypted first user information is added to said encrypted video conference data as the first user information label which is copied or transmitted together with said video conference data in the case where said video conference data is stored, in the case where the edited video conference data is stored, or in the case where the video conference data is transmitted to third user.
63. A video conference data management system according to claim 59 wherein a digital signature is added to said first user information label.
64. A video conference data management system according to claim 60 wherein a digital signature is added to said first user information label.
65. A video conference data management system according to claim 61 wherein a digital signature is added to said first user information label.
66. A video conference data management system according to claim 62 wherein a digital signature is added to said first user information label.
67. A video conference data management system for using video conference data encrypted and supplied from first user to second user, said system using a crypt key, user information, and video conference data management program:
wherein said second user presents second user information to said first user;
said first user supplies to said second user said video conference data encrypted with the first crypt key;
said second user uses said video conference data management program to generate the second crypt key based on said first crypt key;
said encrypted video conference data is decrypted by using said first crypt key in the case where said second user uses said encrypted video conference data; and
said decrypted video conference data is reencrypted by using said second crypt key in the case where said second user stores, copies or transmits said decrypted video conference data.
68. A video conference data management system according to claim 67 wherein said crypt key is a secret-key.
69. A video conference data management system according to claim 67 wherein said crypt key is a public-key and a private-key.
70. A data copyright management apparatus connected for use to a system bus in main body of user terminal, comprising a microprocessor, a read only memory, reading and writing memory and EEPROM connected to a microprocessor bus:
US10/227,309 1994-09-30 2002-08-26 Data copyright management system Abandoned US20030012385A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/227,309 US20030012385A1 (en) 1994-09-30 2002-08-26 Data copyright management system

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
JP23767394 1994-09-30
JP6-237673 1994-09-30
JP6-264199 1994-10-27
JP26419994 1994-10-27
JP6-269959 1994-11-02
JP26995994 1994-11-02
US08/536,747 US6069952A (en) 1994-09-30 1995-09-29 Data copyright management system
US09/476,335 US6449717B1 (en) 1994-09-30 2000-01-03 Data copyright management system
US10/227,309 US20030012385A1 (en) 1994-09-30 2002-08-26 Data copyright management system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/476,335 Continuation US6449717B1 (en) 1994-09-30 2000-01-03 Data copyright management system

Publications (1)

Publication Number Publication Date
US20030012385A1 true US20030012385A1 (en) 2003-01-16

Family

ID=27332495

Family Applications (2)

Application Number Title Priority Date Filing Date
US08/536,747 Expired - Lifetime US6069952A (en) 1994-09-30 1995-09-29 Data copyright management system
US10/227,309 Abandoned US20030012385A1 (en) 1994-09-30 2002-08-26 Data copyright management system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US08/536,747 Expired - Lifetime US6069952A (en) 1994-09-30 1995-09-29 Data copyright management system

Country Status (4)

Country Link
US (2) US6069952A (en)
EP (1) EP0704785B1 (en)
JP (1) JP4996666B2 (en)
DE (1) DE69532153T2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030145336A1 (en) * 2000-12-18 2003-07-31 Natsume Matsuzaki Encryption transmission system
US20080250238A1 (en) * 2003-05-21 2008-10-09 Hank Risan Method and system for controlled media sharing in a network
US20100125353A1 (en) * 2008-11-14 2010-05-20 Marc Petit-Huguenin Systems and methods for distributed conferencing
US10594502B1 (en) 2017-09-08 2020-03-17 8X8, Inc. Communication bridging among disparate platforms
US20200358598A1 (en) * 2019-05-08 2020-11-12 Beijing University Of Posts And Telecommunications Method, Device of Secret-Key Provisioning and Computer-Readable Storage Medium thereof
US11574307B2 (en) 2020-08-06 2023-02-07 Bank Of America Corporation Three party authentication using quantum key distribution

Families Citing this family (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
JPH07271865A (en) 1994-04-01 1995-10-20 Mitsubishi Corp Method for managing copyright of data base
US6744894B1 (en) * 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US7036019B1 (en) * 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
US5805706A (en) * 1996-04-17 1998-09-08 Intel Corporation Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format
US6741991B2 (en) 1994-09-30 2004-05-25 Mitsubishi Corporation Data management system
US7302415B1 (en) * 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
EP0715241B1 (en) 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
US6789197B1 (en) 1994-10-27 2004-09-07 Mitsubishi Corporation Apparatus for data copyright management system
DE69535013T2 (en) * 1994-10-27 2006-12-28 Intarsia Software LLC, Las Vegas Copyright data management system
US6424715B1 (en) 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
US6182218B1 (en) 1994-12-13 2001-01-30 Mitsubishi Corporation Digital content management system using electronic watermark
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US8639625B1 (en) 1995-02-13 2014-01-28 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
JPH08329011A (en) * 1995-06-02 1996-12-13 Mitsubishi Corp Data copyright management system
US8595502B2 (en) 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
US7801817B2 (en) 1995-10-27 2010-09-21 Makoto Saito Digital content management system and apparatus
GB9601924D0 (en) * 1996-01-31 1996-04-03 Certicom Corp Transaction verification protocol for smart cards
US6016348A (en) * 1996-11-27 2000-01-18 Thomson Consumer Electronics, Inc. Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data
US6073124A (en) * 1997-01-29 2000-06-06 Shopnow.Com Inc. Method and system for securely incorporating electronic information into an online purchasing application
JP3625983B2 (en) * 1997-03-12 2005-03-02 三菱商事株式会社 Data management system
JP4545240B2 (en) * 1997-04-30 2010-09-15 インターシア ソフトウェア エルエルシー Data content distribution system
JPH10326287A (en) * 1997-05-23 1998-12-08 Mitsubishi Corp System and device for digital content management
JP4053628B2 (en) * 1997-06-13 2008-02-27 インターシア ソフトウェア エルエルシー Digital content management system using digital watermark
US7496670B1 (en) * 1997-11-20 2009-02-24 Amdocs (Israel) Ltd. Digital asset monitoring system and method
JPH11341566A (en) * 1998-05-27 1999-12-10 Nec Corp Information providing system, its charging method and recording medium with its control program recorded
JP3565715B2 (en) * 1998-07-02 2004-09-15 松下電器産業株式会社 Broadcast system and broadcast transceiver
AU763294B2 (en) * 1998-07-22 2003-07-17 Panasonic Intellectual Property Corporation Of America Digital data recording device and method for protecting copyright and easily reproducing encrypted digital data and computer readable recording medium recording program
US6611812B2 (en) * 1998-08-13 2003-08-26 International Business Machines Corporation Secure electronic content distribution on CDS and DVDs
US6983371B1 (en) 1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content
US7110984B1 (en) 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6859791B1 (en) 1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region
US6317831B1 (en) * 1998-09-21 2001-11-13 Openwave Systems Inc. Method and apparatus for establishing a secure connection over a one-way data path
JP4763866B2 (en) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー Method and apparatus for protecting digital data by double re-encryption
AU760436B2 (en) * 1998-10-16 2003-05-15 Matsushita Electric Industrial Co., Ltd. Production protection system dealing with contents that are digital production
US20110258444A1 (en) * 1999-07-30 2011-10-20 Intel Corporation Network Controller Decryption
CA2348769A1 (en) * 1999-09-01 2001-03-08 Matsushita Electric Industrial Co., Ltd. Digital data copyright protection system
US20020114465A1 (en) * 2000-01-05 2002-08-22 Shen-Orr D. Chaim Digital content delivery system and method
US6636966B1 (en) 2000-04-03 2003-10-21 Dphi Acquisitions, Inc. Digital rights management within an embedded storage device
US6826546B1 (en) * 2000-08-17 2004-11-30 Ideaflood, Inc. Method and system for licensing a copy of a copyright protected work
US6978375B1 (en) 2000-09-08 2005-12-20 International Business Machines Corporation System and method for secure authentication of external software modules provided by third parties
JP2002091775A (en) * 2000-09-20 2002-03-29 Fujitsu Ltd Software distributing method
EP2357651A3 (en) * 2000-12-07 2013-06-26 SanDisk Technologies Inc. System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
TWI226776B (en) * 2000-12-18 2005-01-11 Koninkl Philips Electronics Nv Secure super distribution of user data
US20020091645A1 (en) * 2000-12-20 2002-07-11 Kagemoto Tohyama Software licensing system
US7181017B1 (en) 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US6965975B2 (en) * 2001-03-31 2005-11-15 Lg Electronics Inc. Apparatus and method for moving contents having a restricted number of copies between storage media
US7580988B2 (en) * 2001-04-05 2009-08-25 Intertrust Technologies Corporation System and methods for managing the distribution of electronic content
US7650314B1 (en) * 2001-05-25 2010-01-19 American Express Travel Related Services Company, Inc. System and method for securing a recurrent billing transaction
US20020188856A1 (en) * 2001-06-11 2002-12-12 Brian Worby Storage device with cryptographic capabilities
US20040218762A1 (en) * 2003-04-29 2004-11-04 Eric Le Saint Universal secure messaging for cryptographic modules
US9031880B2 (en) * 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7543738B1 (en) * 2001-07-10 2009-06-09 American Express Travel Related Services Company, Inc. System and method for secure transactions manageable by a transaction account provider
DE10135888A1 (en) * 2001-07-24 2003-03-13 Scm Microsystems Gmbh Process for the local recording of digital data for digital television
US20050080744A1 (en) * 2002-02-04 2005-04-14 Yoshiki Ashida Content management system in web link
US20030174838A1 (en) * 2002-03-14 2003-09-18 Nokia Corporation Method and apparatus for user-friendly peer-to-peer distribution of digital rights management protected content and mechanism for detecting illegal content distributors
US20040025185A1 (en) * 2002-04-29 2004-02-05 John Goci Digital video jukebox network enterprise system
SG145524A1 (en) * 2002-08-07 2008-09-29 Mobilastic Technologies Pte Lt Secure transfer of digital tokens
JP3881942B2 (en) * 2002-09-04 2007-02-14 松下電器産業株式会社 Semiconductor device having encryption unit
JP4349788B2 (en) * 2002-10-31 2009-10-21 パナソニック株式会社 Semiconductor integrated circuit device
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
JP2004328706A (en) * 2003-03-05 2004-11-18 Toshiba Corp Transmitter, receiver, transmission control program and reception control program
US7761921B2 (en) * 2003-10-31 2010-07-20 Caterpillar Inc Method and system of enabling a software option on a remote machine
WO2006022349A1 (en) * 2004-08-26 2006-03-02 Matsushita Electric Industrial Co., Ltd. Data recording/reproducing device and method
GB0421774D0 (en) 2004-09-30 2004-11-03 Ttp Communications Ltd Source code protection
JP2006108754A (en) * 2004-09-30 2006-04-20 Toshiba Corp Content managing method, recording/reproducing apparatus and recording medium
US8676711B2 (en) * 2005-06-10 2014-03-18 Aniruddha Gupte Payment method and apparatus for use in digital distribution system
US7567671B2 (en) * 2005-06-10 2009-07-28 Aniruddha Gupte Encryption method and apparatus for use in digital distribution system
US8341527B2 (en) * 2005-06-10 2012-12-25 Aniruddha Gupte File format method and apparatus for use in digital distribution system
US7814022B2 (en) * 2005-06-10 2010-10-12 Aniruddha Gupte Enhanced media method and apparatus for use in digital distribution system
US8219493B2 (en) * 2005-06-10 2012-07-10 Aniruddha Gupte Messaging method and apparatus for use in digital distribution systems
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8582954B2 (en) 2007-12-10 2013-11-12 Intel Corporation System and method for automatically creating a media archive from content on a recording medium
US8135761B2 (en) * 2007-12-10 2012-03-13 Realnetworks, Inc. System and method for automatically creating a media archive from content on a recording medium
US8555087B2 (en) * 2008-06-19 2013-10-08 Intel Corporation Systems and methods for content playback and recording
JP2008263644A (en) * 2008-06-23 2008-10-30 Mitsubishi Corp Key management method, and key management apparatus
US8875031B2 (en) 2010-05-12 2014-10-28 Blue Jeans Network, Inc. Systems and methods for shared multimedia experiences in virtual videoconference rooms
US9124757B2 (en) 2010-10-04 2015-09-01 Blue Jeans Networks, Inc. Systems and methods for error resilient scheme for low latency H.264 video coding
US9369673B2 (en) 2011-05-11 2016-06-14 Blue Jeans Network Methods and systems for using a mobile device to join a video conference endpoint into a video conference
US9300705B2 (en) 2011-05-11 2016-03-29 Blue Jeans Network Methods and systems for interfacing heterogeneous endpoints and web-based media sources in a video conference
FR3018369B1 (en) * 2014-03-10 2017-09-29 Alain Rosset MEANS FOR MANAGING RIGHTS OF SUITE FOR DIGITAL OBJECTS
US10043015B2 (en) 2014-11-20 2018-08-07 At&T Intellectual Property I, L.P. Method and apparatus for applying a customer owned encryption
US10348502B2 (en) * 2016-09-02 2019-07-09 Blackberry Limited Encrypting and decrypting data on an electronic device
US10341102B2 (en) * 2016-09-02 2019-07-02 Blackberry Limited Decrypting encrypted data on an electronic device
SK50242016A3 (en) * 2016-09-12 2018-09-03 Tomáš Bujňák Data processing system involvement and access to processed data at user hardware resources
EP3797525A1 (en) * 2018-05-23 2021-03-31 Koninklijke KPN N.V. Inserting secondary content in primary content in iptv

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1238427A (en) * 1984-12-18 1988-06-21 Jonathan Oseas Code protection using cryptography
US4977595A (en) * 1989-04-03 1990-12-11 Nippon Telegraph And Telephone Corporation Method and apparatus for implementing electronic cash
ZA907106B (en) * 1989-10-06 1991-09-25 Net 1 Products Pty Ltd Funds transfer system
JP2874916B2 (en) * 1989-11-21 1999-03-24 株式会社東芝 Portable encryption key storage device
FR2654851B1 (en) * 1989-11-23 1992-03-27 Schlumberger Ind Sa METHOD AND SYSTEM FOR SECURE OPERATION OF SOFTWARE.
JPH04181282A (en) * 1990-11-16 1992-06-29 Hitachi Ltd Cryptographic system for file
US5224162A (en) * 1991-06-14 1993-06-29 Nippon Telegraph And Telephone Corporation Electronic cash system
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
JPH06152587A (en) * 1992-11-05 1994-05-31 Nippon Telegr & Teleph Corp <Ntt> Method and device for digital communication
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature
US5410602A (en) * 1993-09-27 1995-04-25 Motorola, Inc. Method for key management of point-to-point communications
US5369702A (en) * 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
JPH08101867A (en) * 1994-09-30 1996-04-16 Fujitsu Ltd Software use permission system
DE69535013T2 (en) * 1994-10-27 2006-12-28 Intarsia Software LLC, Las Vegas Copyright data management system
US5651064A (en) * 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7359511B2 (en) 2000-12-18 2008-04-15 Matsushita Electric Industrial Co., Ltd. Encryption transmission system
US20030145336A1 (en) * 2000-12-18 2003-07-31 Natsume Matsuzaki Encryption transmission system
US8578502B2 (en) 2003-05-21 2013-11-05 Music Public Broadcasting, Inc. Method and system for controlled media sharing in a network
US20080250238A1 (en) * 2003-05-21 2008-10-09 Hank Risan Method and system for controlled media sharing in a network
US20080250239A1 (en) * 2003-05-21 2008-10-09 Hank Risan Method and system for controlled media sharing in a network
US20080282083A1 (en) * 2003-05-21 2008-11-13 Hank Risan Method and system for controlled media sharing in a network
US8713304B2 (en) * 2003-05-21 2014-04-29 Music Public Broadcasting, Inc. Method and system for controlled media sharing in a network
US8561202B2 (en) 2003-05-21 2013-10-15 Music Public Broadcasting, Inc. Method and system for controlled media sharing in a network
US9338221B2 (en) 2008-11-14 2016-05-10 8X8, Inc. Systems and methods for distributed conferencing
US8498725B2 (en) * 2008-11-14 2013-07-30 8X8, Inc. Systems and methods for distributed conferencing
US20100125353A1 (en) * 2008-11-14 2010-05-20 Marc Petit-Huguenin Systems and methods for distributed conferencing
US9762633B1 (en) 2008-11-14 2017-09-12 8×8, Inc. Systems and methods for distributed conferencing
US10348786B1 (en) 2008-11-14 2019-07-09 8X8, Inc. Systems and methods for distributed conferencing
US10659243B1 (en) 2017-09-08 2020-05-19 8X8, Inc. Management of communication bridges between disparate chat rooms
US10616156B1 (en) 2017-09-08 2020-04-07 8X8, Inc. Systems and methods involving communication bridging in a virtual office environment and chat messages
US10594502B1 (en) 2017-09-08 2020-03-17 8X8, Inc. Communication bridging among disparate platforms
US10999089B1 (en) 2017-09-08 2021-05-04 8X8, Inc. Communication bridging in a remote office environment
US11394570B1 (en) 2017-09-08 2022-07-19 8X8, Inc. Communication bridging among disparate platforms
US11405228B1 (en) 2017-09-08 2022-08-02 8X8, Inc. Management of communication bridges between disparate chat rooms
US11463271B1 (en) 2017-09-08 2022-10-04 8X8, Inc. Communication bridging in a remote office environment
US20200358598A1 (en) * 2019-05-08 2020-11-12 Beijing University Of Posts And Telecommunications Method, Device of Secret-Key Provisioning and Computer-Readable Storage Medium thereof
US11936777B2 (en) * 2019-05-08 2024-03-19 Beijing University Of Posts And Telecommunications Method, device of secret-key provisioning and computer-readable storage medium thereof
US11574307B2 (en) 2020-08-06 2023-02-07 Bank Of America Corporation Three party authentication using quantum key distribution

Also Published As

Publication number Publication date
DE69532153D1 (en) 2003-12-24
EP0704785B1 (en) 2003-11-19
JP4996666B2 (en) 2012-08-08
EP0704785A2 (en) 1996-04-03
DE69532153T2 (en) 2004-09-02
JP2010063130A (en) 2010-03-18
EP0704785A3 (en) 1999-08-25
US6069952A (en) 2000-05-30

Similar Documents

Publication Publication Date Title
US6069952A (en) Data copyright management system
US6449717B1 (en) Data copyright management system
US20070038575A1 (en) Data copyright management system
US9245260B2 (en) Data copyright management
USRE43599E1 (en) Data management system
US6789197B1 (en) Apparatus for data copyright management system
US6076077A (en) Data management system
JP4545240B2 (en) Data content distribution system
JPH08185448A (en) System and device for managing data copyright
JPH08288940A (en) Ciphering key system
JP4431306B2 (en) Terminal device, video conference data management method, and program
JP4030486B2 (en) Terminal device, digital cash management system
JP4512312B2 (en) Terminal device and program
JP2006325246A (en) Digital cache management system
JP4099461B2 (en) Data copyright management device
JP4845772B2 (en) Data management system
JP2008090849A (en) Data copyright management apparatus
JP2010193506A (en) Data content distribution system

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE

AS Assignment

Owner name: INTARSIA SOFTWARE LLC,NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:016630/0356

Effective date: 20050208

Owner name: INTARSIA SOFTWARE LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:016630/0356

Effective date: 20050208

AS Assignment

Owner name: INTARSIA SOFTWARE LLC,NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MITSUBISHI CORPORATION;REEL/FRAME:024015/0008

Effective date: 20050208

AS Assignment

Owner name: MITSUBISHI CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAITO, MAKOTO;MOMIKI, SHUNICHI;REEL/FRAME:025477/0835

Effective date: 19950825

AS Assignment

Owner name: LF CAPITAL PARTNERS, LLC, FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 121 LLC;REEL/FRAME:049425/0896

Effective date: 20181219

AS Assignment

Owner name: PIRACY PROTECTION LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LF CAPITAL PARTNERS, LLC;REEL/FRAME:051364/0522

Effective date: 20190911