WO2012162739A1 - System and method for encrypted media distribution - Google Patents
System and method for encrypted media distribution Download PDFInfo
- Publication number
- WO2012162739A1 WO2012162739A1 PCT/AU2012/000605 AU2012000605W WO2012162739A1 WO 2012162739 A1 WO2012162739 A1 WO 2012162739A1 AU 2012000605 W AU2012000605 W AU 2012000605W WO 2012162739 A1 WO2012162739 A1 WO 2012162739A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- payload
- unique
- secure
- unique identifier
- distribution
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- a method for the acquisition and decryption of encrypted digital media content comprising the steps of:
- said acquisition code is generated by universal session server in response to a request from the gatekeeper device
- said distribution payload further comprises at least one unique vault key.
- the back or rear view of the card 14 comprises room for more artwork or information but also displays a unique identifier 15 that is to be used during the media registration process to ensure that media is registered for each separate purchase of an individual media card 14. Without a unique identifier for each piece of media sold there would be no way to track which registration of media is associated with each individual piece of USB card storage that is sold.
- the view also discloses the metal connectors 17 that are a feature of all USB storage devices and used for connecting and communicating with other devices.
- Figure 3 discloses key components in the operation of the example embodiment during and after the registration process.
- the registration process in the example embodiment is designed to ensure that the identity of the owner of the digital media is identified and that the person's identity is embedded in the media to enable copyright owners and purchasers to verify their respective rights and ownership.
- the components include executable and data files stored on the USB device 50, a computing device 51 used to execute the registration application and manage the registration process.
- the computer is connected to the copyright control and registration server 53 over the Internet 52.
- Figure 4 discloses the process of registration as used in the example embodiment.
- the process involves data and executables stored on a USB device 80, the execution of executable code on a computer 81 and a copy control and registration process running on a license management server 82 using a connection over the internet.
- media file watermarking is used to uniquely identify the usee and the transaction.
- An alternative embodiment could use any method of identifying digital data including but not limited to unique naming and partial encryption or scrambling.
- Payment server 1 1 may then send a request for a payment seourity code to the universal session server in the form of a digital media content owner server 109 along with the digital media identification number.
- the payment server 111 is part of universal session server.
- digital media content owner server 109 issues a unique payment security code to payment server 111.
- the digital media content owner server 109 may also generate a unique identifier associated with the unique watermark embedded in the digital media content.
- payment server 111 sends payment security code to point of sale interface 14 that then produces a payment security code 1 IS which is then given to the customer 115.
- Customer 115 may then use payment security code 118 to register digital media content.
- the digital media coment owner's system 901 in response to the notification, the digital media coment owner's system 901 generates a "random human-readable" acquisition code.
- the acquisition code is a minimum of twelve characters long.
- the digital media content owner's system 901 also amended the status of the UDMI to "active".
- a cryptographic hash value is calculated and compared to original hash value 804.
- the software will then decrypt the encrypted digital media content 813 using the content media key 810.
- step of activation 215 and the step of registration 219 will be effected at the same time at the same location. There will be other instances where these two steps are performed at different locations.
- database 213 will be in a secure or trusted environment and typically located remotely from the unsecured or untrusted environment where the secure payload may become engaged in an activation or registration step.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Apparatus for releasing a secure payload so as to convert said secure payload to a playable payload at or after point of sale; said apparatus including means to input a unique identifier associated with the secure payload; means to receive confirmation of a transaction associated with the secure payload sufficient to permit conditional transmission of the unique identifier to a database; means to receive a unique unlock key associated with the unique identifier from the database; said apparatus including processing means for processing data comprising the secure payload with the unique unlock key thereby to convert said data to a playable payload. In a preferred form the unique unlock code is unique to the secure payload associated with the unique identifier and thus entirely unique to the unique identifier.
Description
TITLE
System and Method for Encrypted Media Distribution TECHNICAL FIELD
[0001] The present invention relates to the acquisition of digital media content and, more particularly although not exclusively, to a system and method for permitting the licensing of digital media content when distributed across untrusted storage and communication networks. It specifically addresses the technical problem of unlocking data storage that is permitted to exist in an untrusted or insecure environment
BACKGROUND
[0002] The use of portable digital storage devices such as USB drives is a well known practice and popular in the art. Recently the use of portable storage devices in a credit card size form factor has also become popular as a means of sharing information. For example a businessman may share his address and contact details electronically in a digitally stored form as well as printed on the surface of the credit card shaped digital storage device.
[0003] Additionally portable storage devices such as USB drives represent a convenient means of distributing digital information due to the fact that no specific hardware is needed to play the media on the device compared to other media formats such as digital compact disc, Bluray or DVD disks which all need specific and rather more expensive hardware components to access the media files,
[0004] The general use of portable storage devices for the distribution of copyrighted materials such as music and video has not been widely practiced due to the fact that there is no inherent means of stopping widespread redistribution and uncontrolled copying of the copyrighted material.
[0005] More particularly there is a technical problem associated with how to unlock storage that contains protected data when the protected storage itself exists or is located in an un-trustcd or unsecure environment,
[0006] It is an object of the present invention to address or at least ameliorate some of the above disadvantages and problems.
Notes
[0007] The term "comprising" (and grammatical variations thereof) is used In this specification in the inclusive sense of "having" or "including", and not in the exclusive sense of "consisting only of.
[0008] The above discussion of the prior art in the Background of the invention, is not an admission that any information discussed therein is citable prior art or part of the common general knowledge of persons skilled in the art in any country.
SUMMARY OF INVENTION
[0009] Accordingly, in one broad form of the invention, there is provided apparatus for releasing a secure payload so as to convert said secure payload to a playable payload at or after point of sale; said apparatus including means to input a unique identifier associated with the secure payload; means to receive confirmation of a transaction associated with th secure payload sufficient to permit conditional transmission of the unique identifier to a database; means to receive a unique unlock key associated with the unique identifier from the database; said apparatus including processing means for processing data comprising the secure payload with the unique unlook key thereby to convert said data to a playable payload.
[00010] Preferably the unique unlock code is entirely unique to the secure payload associated with the unique identifier and thus entirely unique to the unique Identifier.
[00011] Preferably a secondary unique identifier is also associated with said secure payload.
[00012] Preferably the secondary unique identifier is incorporated in said secure payload and is retained in said playable payload after release from said secure payload.
[00013] In a further broad form of the invention there is provided a point-of-sale terminal for enabling distribution of digital content stored on a medium; the terminal including means to input a unique identifier associated with a secure payload; means to receive confirmation of a transaction associated with that secure payload sufficient to permit conditional transmission of the unique
identifier to a database; means to receive a unique unlock key associated with the unique identifier from the database.
(00014] Preferably the unique unlock code is unique to the secure payload associated with the unique identifier and thus entirely unique to the unique identifier,
[00015] Preferably a secondary unique identifier is also associated with said secure payload.
[00016] Preferably the secondary unique identifier is incorporated in said secure payload and is retained in said playable payload after release from said secure payload.
[00017] In yet a further broad form of the invention there is provided a method for release of a secure payload so as to provide a playable payload; said method comprising the steps of associating a unique identifier with a secure payload; permitting the secure payload with its associated unique identifier to exist in an insecure or um usted environment; in that environment, on satisfaction of predetermined criteria, then conditionally transmitting the unique identifier to a secure or trusted environment where a comparison is made to determine if a unique unlock key has previously been issued against the unique identifier and, if not, then issuing a unique unlock key from the secure or trusted environment; processing data comprising the secure payload with reference to the unique unlock key thereby to release the secure payload and convert the data to playable payload.
[00018] Preferably the unique unlock code is unique to the secure payload associated with the unique identifier and thus entirely unique to the unique identifier.
[0001 ] Preferably a secondary unique identifier is also associated with said secure payload.
[00020] Preferably the secondary unique identifier is incorporated in said secure payload and is retained in said playable payload after release from said secure payload.
[00021] Accordingly, in yet a further broad form of the invention, there is provided a system for the distribution of encrypted digital media content, the system comprising:
a distribution payload including encrypted digital media content,
at least one unique identifier associated with the encrypted digital media content, a gatekeeper device including means to communicate with a universal session server, the universal session server located remotely to the gatekeeper device,
wherein in use, the gatekeeper device permits the decryption of the encrypted digital media content if and only if the identity of the distribution payload is verified.
[00022] A method for the acquisition and decryption of encrypted digital media content, the method comprising the steps of:
preparing a distribution payload including encrypting digital media content thereon, distributing the distribution payload to a plurality of first verification locations, issuing an acquisition code specific to the distribution payload on verification of the identity of the distribution payload,
wherein decryption of the encrypted digital media content of the distribution payload is enabled by use of the acquisition code.
[00023] The apparatus of claim 29 wherein the acquisition code is entirely unique to the secure payload associated with the unique identifier and thus unique to the unique identifier
[00024] Preferably, following the verification of the identity of said distribution payload, the distribution payload is rendered accessible from a data storage device.
[00025] Preferably, said distribution payload is preloaded on the data storage device.
[00026] Preferably, said data storage device performs the functions of the gatekeeper device.
[00027] Preferably, said process of verification requires input of an acquisition code into the gatekeeper device.
[00028] Preferably, said acquisition code is generated by universal session server in response to a request from the gatekeeper device,
[00029] Preferably, said request is made only after at least one predetermined condition is satisfied.
[00030] Preferably, said predetermined condition is a signal from a payment server.
[00031] Preferably, said universal session server is in communication with a digital rights management industry server.
[00032] Preferably, said universal seesion server is in communication with a digital rights management independent server.
[00033] Preferably, said universal session server is in communication with an independent server.
[00034] Preferably, said distribution payload further comprises at least one unique vault key.
[00035] Preferably, said distribution payload further comprises a unique identifier.
[00036] Preferably, said distribution payload further comprises a unique watermark identifier.
[00037] Preferably, said distribution payload further comprises unique digital media identifiers.
[00038] Preferably, said distribution payload further comprises metadata.
[00039] Preferably, said distribution payload further comprises hash values.
[00040] Preferably, said distribution payload further comprises cross-platform software.
[00041] Preferably, said distribution payload further comprises preview media.
[00042] Prefeiably, a block cipher is utilised in said encryption of digital media content thereby to create the encrypted digital media content.
[00043] Preferably, a content media key is utilised in said encryption of digital media content thereby to create the encrypted digital media content.
[00044] Preferably, said universal session server further comprises a payment server. [00045] Preferably, said gatekeeper device is in the form of an interactive self service device. [00046] Preferably, said gatekeeper device is in the form a kiosk.
[00047] Preferably, a unique identifier associated with said encrypted digital media content is in the form of a barcode,
[00048] Preferably, a unique identifier associated with said encrypted digital media content is in the form of a magnetic strip.
[00049] Preferably, a unique identifier associated with said encrypted digital media content is in the form of an electronic Chip.
BRIEF DESCRIPTION OF DRAWINGS
[00050] Embodiments of the present invention will now be described with reference to the accompanying drawings wherein:
[00051] Figure 1 is a schematic diagram of a mass storage device;
[00052] Figure 2 is a schematic diagram representing components of the system;
[000S3] Figure 3 is a schematic diagram illustrating use of the components of Figure 2 during and after registration;
[00054] Figure 4 is a flow diagram illustrating the steps undertaken during a registration process;
[00055] Figures 5 is a flow diagram illustrating the steps involved in acquiring digital media content from a point of sale interface;
[00056] Figures 6 is a flow diagram illustrating the steps involved in acquiring digital media content from a gatekeeper device;
[00057] Figures 7 and 8 are flow diagrams illustrating the steps involved in preparing digital media content for use and distributing digital media content.
[00058] Figure 9 illustrates in diagram form a further summary embodiment of the present invention and
[00059] Figure 10 illustrates in diagram form yet a further summary embodiment of the present invention.
DESCRIPTION OF EMBODIMENTS
[00060] Figure 1 discloses an exemplary embodiment using a credit card sized form factor in three views 10, 14, 18. These views are front view 10, rear or flip side view 14, and a respective rear view 18 showing the USB media storage device 21 in a removed state from the main card 18.
[00061] The front view of the example embodiment 10 shows a removable media device 12 using the USB storage standard. It also features branding and infoimation 11 about the artist who is the creator or performer of the media stored on the USB device 12. In this example some artwork, the artists name and the name of the album of music are all printed on the front 11 of the card 10.
[00062] Additionally a notice is printed on the f ont of the card 13 warning the customer that they will need to use a valid credit card in order to register the media on the card before they can access it for listening or use on other storage devices.
[00063] The back or rear view of the card 14 comprises room for more artwork or information but also displays a unique identifier 15 that is to be used during the media registration process to ensure that media is registered for each separate purchase of an individual media card 14. Without a unique identifier for each piece of media sold there would be no way to track which registration of media is associated with each individual piece of USB card storage that is sold. The view also discloses the metal connectors 17 that are a feature of all USB storage devices and used for connecting and communicating with other devices.
[00064] The third view shows the card 18 with the removable USB device 21 removed from card 1 and ready for insertion into a standard USB interface of a USB compatible playback device or computer. The metal connectors 20 in this view are the same as the metal connectors 17 in the second view.
[00065] Figure 2 discloses key digital components in the operation of the example embodiment before it is registered for use by a purchaser. The system comprises a collection of executable code
and data stored on the USB storage device 30, and a copyright control and registration server 32 connected to the internet 31.
[00066] The files and applications stored on the USB storage include executables 35, 36, 37 that are designed to execute and manage (he registration process of the media to be registered. It also contains a set 33 of encrypted media files 34 each containing song data for the artist being promoted on the front of the card 11. Since the USB card could be connected to a computer or device that is running any one of a number of different operating systems, the USB device in the example embodiment contains executables for each of the major operating systems including a Microsoft Windows executable 35, an Apple Macintosh executable 36 and a Linux executable 37. The USB storage also includes auto-play files 38, 39, 40 for each of the operating systems to ensure that the registration process is executed automatically when the user first inserts the USB storage into the playback or registration device.
[00067] Figure 3 discloses key components in the operation of the example embodiment during and after the registration process. The registration process in the example embodiment is designed to ensure that the identity of the owner of the digital media is identified and that the person's identity is embedded in the media to enable copyright owners and purchasers to verify their respective rights and ownership.
[00068] The components include executable and data files stored on the USB device 50, a computing device 51 used to execute the registration application and manage the registration process. The computer is connected to the copyright control and registration server 53 over the Internet 52.
[00069] When the USB device is inserted into the computer 51 using a USB Interface, the operating system of the computer 51 automatically executes the auto-play file 55 for the executable 54 for the corresponding operating system of the computer 51. The executable 54 executes a registration process disclosed in Figure 4. During that process the executable communicates with the copyright control and registration server 53 over the internet 52. The executable also collects information from the user, if the process is successful the executable will modify the set of encrypted media files 56 including individually encrypted media files 57 and make a set 58 of unencrypted media files 59 that have embedded in them information identifying the user and purchase information for later verification of rights and ownership,
[00070] After a successful registration of the example embodiment the auto-play files 38, 39, 40 and the executables 35, 36, 37 and the set of encrypted media files 33 which are also disclosed in Figure 3 as a set of files 56 are stored in a directory so that the auto-play functionality of the registration executables is not invoked when the USB device is connected to other devices in the future but rather that the connected device will primarily see and use the set 58 of decrypted and watermarked media files 59.
[00071 ] Figure 4 discloses the process of registration as used in the example embodiment. The process involves data and executables stored on a USB device 80, the execution of executable code on a computer 81 and a copy control and registration process running on a license management server 82 using a connection over the internet.
[00072] Initially the USB device is inserted into the user's computer or device 83 , The operating system of the device looks for an auto-play executable 84 and then the appropriate executable program is run 65 to manage the registration process. During the registration process the user is asked to enter onto the screen information that identifies the user and licensee of the media as well as a unique code that identifies the specific media that was purchased by the purchaser. In the example embodiment a unique identifier printed on the distribution card 15 is used to identify the media and transaction and the users personal information and valid credit card details are used to identify the user. These two sets of information are collected on screen 86 by the executable running on the users computing device 1 and sent to the licensing server 82 which then checks that the credit card details are valid 87 and that the unique identifier 1 for the specific distribution card is not already registered or used 87.
[00073] If the registration is not successful the user is notified and given a chance to correct any problems detected and if still unsuccessful the registration process is terminated 93.
[00074] If the registration is successful, registration is then authorized 88 and the decryption and watermarking of the media files on the USB storage device is performed 1 , Also during this step the executable files and set of encrypted media files are stored 89 by the executable code running on the computer 81 in a new location 90 so that auto-play does not automatically occur when the USB device is connected with another device in the future.
[00075] During the decryption and watermarking process 91 , the set of encrypted media files 56 is decrypted and then identifying information about the user and the purchased media or transaction
are embedded or watermarked in the unencrypted media files that are (hen stored 92 back on the USB storage device 80 for use by the purchaser.
[00076] The example embodiment uses a credit card shaped distribution card with an enclosed USB storage device. An alternative embodiment could use any form of distribution media or packaging.
[00077] The example embodiment uses a USB device for the storage and distribution of the digital media. In an alternative embodiment, any portable storage device that is 'write' enabled can be used,
[00078] In the example embodiment media file watermarking is used to uniquely identify the usee and the transaction. An alternative embodiment could use any method of identifying digital data including but not limited to unique naming and partial encryption or scrambling.
[00079] The example embodiment uses a registration process running on a Microsoft Windows executable in Figure 3. Alternative embodiments could use any form of executable code running on any kind of executable platform.
[00080] The example embodiment uses executable code that is stored and distributed on a portable USB device and then executed from, the USB device to the connected computers memory. Alternative embodiments could use any configuration of executable code execution including but not limited to situations where the device itself executes the code, or where the executable is copied to another device before execution.
[00081] The example embodiment uses auto-play files to automatically initiate the registration process. Alternative embodiments may not use this feature but rely .on the user to find and execute the registration program.
[00082] The example embodiment uses a separate registration executable and set of encrypted media files. Any configuration of executable and data files including encrypted or non encrypted media files can be used in alternative embodiments.
[00083] The example embodiment uses a unique identifier to identify the individual piece of distribution media and media files, An alternative embodiment could use any means of identifying a specific piece of distribution media or set of media files including but not limited to device fingerprinting where imperfections or characteristics of the distribution device or media form are evaluated for unique identifiers.
[00084] Figure 5 illustrates a content acquisition process in accordance with a further embodiment of the current invention. Preferably customer 115 enters the store and selects digital media content in the form of a data storage device 117. The digital media content may include but is not limited to movies, music, downloaded books, games, ringtones, television programs, music videos and software. Data storage device 117 may be packaged with a unique identifier in the form of a digital media identification number. The digital media identification number may be in the form of a barcode, a magnetic strip, chip or other means suitable.
[00085] Customer 11 may then proceed to gatekeeper device in the form of a point of sale interface 114. In a preferred form, the point of sale interface 114 may be a store checkout counter. On receipt of payment, point of sale interface 114 then communicates the digital media identification number and payment details to payment server 111.
[00086] Payment server 1 1 may then send a request for a payment seourity code to the universal session server in the form of a digital media content owner server 109 along with the digital media identification number. In a further form, the payment server 111 is part of universal session server.
[00087] On verification of the digital media identification number, digital media content owner server 109 issues a unique payment security code to payment server 111.
[00088] On receipt of the unique payment security Code, payment server 111 may then dispatched to relevant payees 104, 105, 106, 107. Preferably, relevant payees 104, 105, 106, 107 may include but is not limited to the digital media content owner/s, the wholesaler, the retailer and the copyright owner.
[00089] The digital media content owner server 109 may also generate a unique identifier associated with the unique watermark embedded in the digital media content.
[00090] Preferably, payment server 111 sends payment security code to point of sale interface 14 that then produces a payment security code 1 IS which is then given to the customer 115. Customer 115 may then use payment security code 118 to register digital media content.
[00091 ] In one form, the gatekeeper device is in the form of a registration kiosk 116. When customer 115 inserts data storage device 117 into registration kiosk 116 to complete registration, registration kiosk 116 sends a request to the digital media content owner server 109.
[00092] The customer 115 may then be required to enter registration details into registration kiosk 116. Preferably registration details include the payment security code for verification by the digital media content owner server 109.
[00093] In a further form, the gatekeeper device is a digital communication device capable of wireless communication with digital media content owner server 1 9.
[00094] Digital media content owner server 109 will send relevant digital rights management information to DRM Industry Storage Server 108. If a unique watermark has been embedded in the digital media content, information relating to the unique watermark may also be sent.
[00095] Digital media content owner server 109 will send then relevant digital rights management information to DRM Independent Storage Server 110. Digital rights management information may include a customer identification number and the unique identifier.
[00096] Digital media content owner server 109 may also send required session key to registration kiosk 116 to enable the unlocking and decryption of the digital media content stored on data storage device 117.
[00097] In a further form, digital media content owner server 109 may also send sale records to independent servers 112. Independent servers 112 may monitor sales for restocking, and/or marketing information.
[00098] Figure 6 illustrates a content acquisition process in accordance with yet another embodiment of the current invention. Customer 115 approaches gatekeeper device, preferably in the form of an interactive self-service device 113. Customer may then select digital media content. The digital media content may include but is not limited to movies, music, downloaded books, games,
ringtones, television programs, music videos and software. Selected digital media content may be associated with a unique identifier. Preferably, the unique identifier is in the form of a digital media identification number. The digital media identification number may be in the form of a barcode, a magnetic strip, chip or other means suitable.
[00099] After customer U 5 selects digital media content for purchase, the interactive self- service device 113 may request payment. On receipt of payment, interactive self-service device 113 then communicates the digital media identification number and payment details to the universal session server. Preferably, the universal session server is in the form of a digital media content owner server 109. On verification of the digital media identification number, digital media content owner server 109 issues a unique payment security code, In addition, digital media content owner server 109 may also diepatch payment to relevant payees 104, 105, 106, 107. Preferably, relevant payees 104, 10S, 1 6, 107 may include but are not limited to the digital media content owner/s, the wholesaler, the retailer and the copyright owner.
[000100] To complete registration, interactive self-service device 113 may lequire customer 115 to provide registration details. Interactive self-service device 113 may also send relevant digital rights management information to DRM Industry Storage Server 108, DRM Independent Storage Server 11 and/or independent servers 112 used to monitor sales for restocking, and/or marketing information.
[000101] On completion of the registration process, interactive self-service device 113 may then provide registered digital media content to customer 15.
[000102] Referring to Figures 7 and 8, the original digital media for use in the system in accordance with another embodiment of the invention requires a scries of operations applied to it before distribution to resellers and/or customers.
[000103] Preferably, the digital media content owner prepares the original media content for digital distribution in distribution payload 801. Preferably, the digital media content can comprises one or more digital files 802. In a preferred embodiment the distribution payload 801 may include individual music tracks or multiple binary files for a single game.
[000104] The content of each distribution payload 801 requires a unique digital media identifier (UDMI) 803. Preferably, each individual payload regardless of content will have a different UDMI,
for example each music album of the same title will have a different UDMI. This identifier may be similar to a global unique identifier or a universally unique identifier,
[000105] Preferably, any associated information 804 about the digital media content will be linked to the UDMI. Associated information 804 may include a description, author, year, media format, license details, preview content and ownership details.
[000106] In a further form, an invisible digital watermark may also be encrypted and embedded into the digital media content. Preferably the content of this watermark may comprise a unique watermark identifier 805. The unique watermark identifier 805 can then be associated with the UDMI to allow the identification of future ownership and potentially inhibit the uses of the digital media content, which was not desired or intended, by the content owners and providers, This forms and fulfils the requirements for digital rights management. Preferably, the embedded unique watermark identifier 805 will not interfere or reduce the quality of the digital media content when utilised in the intended licensee's device.
[000107] Once the unique watermark identifier 805 is embedded, a secure cryptographic hash function may be applied to the digital media content to generate a cryptographic hash value 804, This can also be referred to as a message digest. The hash value is then associated with the UDMI for future quality checks and the detection of accidental or intentional modification of the digital media content once delivered to the licensee. In one form, the secure cryptographic hash algorithm is version SHA-1,
[000108] Preferably, embedding the unique watermark identifier 805 ensures the digital media content and the generated hash value is unique for every copy that is distributed to a licensee. Hence, digital media content that is not intentionally modified and illegally distributed can then be easily traced back to the UDMI. In some cases the unique watermark identifier 805 will survive any media transformation and changes without reapplying the watermark. For example, changing the video and music format to a lower sampling rate.
[000109] To ensure the digital media content is protected from unintentional use during the distribution and storage, the content is then encrypted using a tream or block cipher 806 and a symmetric key 807. In one form, the block cipher is an Advance Encryption Standard (AES) algorithm with a key size from 128 to 256 bits.
[000110] Preferably, a content media key 807 is generated ftom a pseudorandom number generator. In alternative forma, other random number generators may be used including physical entropy sources. The content media key 807 is then utilised with the block cipher 806 to encrypt the digital media content 802.
[000111 ] To allow a content media key 807 to be stored and transported securely, the content media key 807 may be further encrypted with a unique vault key 811 , In one form, the unique vault key may be encrypted using a block cipher (ABS 256 bits) 808. Preferably, only the holder of the unique vault key can decrypt the wrapped key 808 to obtain the content media key 807.
[000112] The content media key 807 used to encrypt the digital media content 802 is then discarded, as the content media key 807 is it securely encrypted in the wrapped key 808.
[000113] For distribution within untmsted storage devices and communication networks, a transport distdbutton payload 812 may be created.
[000114] In a prefenred embodiment, each distribution payload 812 may contain, encrypted digital media content 813, UDMI 817, unique vault key 811, cryptographic hash values of the encrypted and decrypted digital media content and media metadata 816, cross-platform software configured to perform the registration and decryption process and preview media 815. Previe media 815 may contain for example 30 seconds of each music track or a movie trailer.
[000115] The digital media content owner will maintain and control the information for each distributed payload in a trusted and secure environment Such information may comprise the encrypted content media key, registration and payment details of the customer or digital tights management information. Preferably, this information will be stored in database 902 or a file system that can be readily accessed with the appropriate authentication and authorisation.
[000116] The level of information gathered and stored by the digital media content owner will be determined by their business needs and laws controlling the privacy of information in their governing state and country. In a further form, wrapped key, registration, payment and digital rights management details may be stored and maintain separately. For example, resellers of the digital media content could maintain the metadata and encrypted content and the digital media content owner only controls the wrapped keys in a secure location.
[000117] To add another layer of protection a key encryption key can protect the wrapped keys. A hardware secure module may be required to protect the key encryption key and perform the necessary decryption within a secure digital media content owner environment.
/
[000118] The distribution payload 812 can then be copied or downloaded to any number of data storage devices 90S. Data storage devices 905 may include but is not limited to a Solid-State drive, a CD, a DVD or a magnetic disk.
[000 19] Data storage devices 90S may also include but is not limited USB mass storage devices 911 and 912, smartphones 914, personal PCs 915, kiosk or interactive self-service devices 913, tablets 915, web-servers 910, or cloud infrasti-ucture 909.
[000120] If the data storage device 90S is in the form of aUSB mass-storage device 911, preferably a unique identifier will be printed or embedded on a magnetic strip, barcode or smart chip. This unique identifier will then be associated and stored with the UDMI.
[000121] The process for a customer to obtain a valid digital media license from a digital media content owner includes, but it not limited to acquiring the distribution payload 812 from data storage device 205. Preferably, the data storage device 205 may be in the form of a USB mass- storage device, or a pubic kiosk wherein distribution payload is transferred to a customer-supplied device in the form of a USB mass storage device, or a memory card or smartphone or an online shopping site provided by an Internet connection wherein the distribution payload may be transferred to a customer-supplied device in the form of a personal computer or smartphone or tablet computer or eReader etc.
[000122] Based on the location and the type of the device containing the distribution payload 812, the customer will browse or search for one or more media titles.
[000123] In one form, when the data storage device 205 is in the form of a USB mass storage device 911, USB mass storage device 911 could be arranged in a physical shelf. When purchasing a USB mass storage device 911, from a point-of-sales counter the physical device may be scanned for its unique identifier. This unique identifier will uniquely match a UDMI in the digital media content owner's system 901. This association between the unique identifier and the UDMI is performed during the preparation of the digital media content,
[000124] Once the payment has been received by the point-of-sale system, the digital media content owner's system 901 will be notified electtOnically. In a further form, the digital media content owner's system 901 may also receive the unique identifier and/or UDMI.
[00012S] Preferably, in response to the notification, the digital media coment owner's system 901 generates a "random human-readable" acquisition code. Preferably, the acquisition code is a minimum of twelve characters long. In a further form, the digital media content owner's system 901 also amended the status of the UDMI to "active".
[000126] In one form, the acquisition code may be printed and handed to the customer. In a further form, the acquisition code may be provided as a plastic credit voucher. The customer will then have to enter the acquisition code manually. The customer will then be required run software contained in me distribution package 812 to commence the registration process.
[000127] In yet a further form, when the data storage device 205 is in the form of a kiosk, the customer may browse or search for a media title by the metadata associated with the digital media content. Preferably, the customer will add one or more media titles to a shopping cart. Once the customer has finalised their selection, the kiosk prompts the customer to purchase the media items from point-of-sales counter or via online payment gateway 908.
[000128] In the case of the purchase occuning at a point-of-sales counter the may return to the kiosk to complete the registration and activation, or alternatively complete this at home with their PC or wirelessly with their smartphone or tablet.
[000129] Preferably, when payment is made via online payment gateway 908, the acquisition code will be automatically transferred to the registration process.
[000130] Based on business requirements, the customer may be asked to enter details to fulfil the registration process. Such information may include but is not limited to the customers name, address, email, phone numbers and marketing information.
[000131] To verify the customer has purchased the digital media content, an acquisition code may be requested. When the purchase was performed in the same session (immediately after making the online payment) the acquisition code may be automatically provided.
[000132] In another form, a two-factor soft token from a mobile phone or email account may also be Vised to verify the identity of the purchaser.
[000133] Once the required information is obtained from the purchaser the digital media content owner's system will release the wrapped key 809. In a further form, a wrapped key 809 may only be issued once full payment is received and/or registration is completed.
[000134] The software will then use the unique vault key 811 contained In the distribution payload 812 to decrypt the wrapped key 809. The decrypted wrapped key will reveal the content media key 810.
[000135] Preferably, before decryption a cryptographic hash value is calculated and compared to original hash value 804. The software will then decrypt the encrypted digital media content 813 using the content media key 810.
[000136] In a further form, the decrypted digital media content is compared with the original cryptographic hash values to ensure contents have not been damaged or tampered with.
[000137] In the case of a web application server 910 the decryption may be performed remotely and the requested digital media content is downloaded to the customer using an authenticated session and a secure communication channel. This form of acquisition via a web application server 910 may be required when the device is unable to run the required software.
[000138] The digital media content is now available to be played, viewed or read by the customer.
[000139] Once a distribution payload 812 has been downloaded or transferred from a web application server 910, or kiosk 913, the software can request automatic re-stocking from the digital media content owner's system 901. This automatic on-demand re-stocking will dramatically reduce the size of the storage requirements and facilitate the adding of new or popular media titles without physically or remotely managing each web application server or kiosk, If the web application server 10, or kiosk 913 has access to a high-speed reliable broadband then it would be possible to request the distribution payload 812 in real-time.
[000140] Digital media content owners or the DRM Industry can now track this digital media content due to the invisible encrypted embedded watermark.
[000141] If the digital media content has not been acquired (e.g. purchased) for registration then the status is referred to as "inactive". Once the digital media content has been acquired then the status is changed to "active". On successful registration and media acquisition status is changed to "registered".
[000142] In use
With reference to figure 9 and by way of summary of features of the previously described embodiments there is shown a diagram of the functional components of a system 210 for distribution of digital media content in accordance with preferred embodiments of the present invention.
[000143] Broadly, a secure payload 211 has associated with it a unique identifier 212. The unique identifier 212 has been termed UDMI in earlier embodiments. The unique identifier 212 is not secured but is tangibly associated with secure payload 211. The secure payload 211 may be placed in an unsecured or untrusted environment such as a shop or vending machine. When a customer desires to purchase the secure payload a transaction is enacted so as to allow transmission of the unique identifier 212 to database 213, The database contains records 214 of unique identifiers 212 mat have been associated with secure payload 211 at time of manufacture. Eaoh unique identifier is unique to each secure payload. If the database 213 indicates that a given unique identifier has not previously been activated or registered then the secure payload associated with a unique identifier 212 can be activated at step 215 resulting in a conditional transmission of a unique unlock key 216.
[000144] The unique unlock key 216 is itself uniquely associated with unique identifier 212. That is there is one and only one unique unlock key 216 which will release the secure payload 11 associated with its particular unique identifier 212 thereby rendering the unique unlock key 216 entirely unique. The release step 217 entails rendering the payload contained within the secure payload 211 playable as playable payload 218. The step of releasing 217 results in transmission of this step to database 213 so as to indicate that the unique unlock key 216 has been used to unlock or release the secure payload 211. The payload associated with the unique identifier 211 is then recorded as having a status of registered 219 in record 214 of database 213. There will be embodiments were the step of activation 215 and the step of registration 219 will be effected at the same time at the same location. There will be other instances where these two steps are performed at different locations.
[00014S] In most instances database 213 will be in a secure or trusted environment and typically located remotely from the unsecured or untrusted environment where the secure payload may become engaged in an activation or registration step.
[000146] With reference to figure 10 there is illustrated a further embodiment wherein like components ate numbered as for the embodiment of figure 9. In the instance of the embodiment of figure 10, in addition to the unique identifier 212 there is further associated with each secure payload 211 secondary unique ID 220. Again, the secondary unique ID 220 key is unique to each secure payload 211 thus unique to the corresponding unique identifier 212.
[000147] In preferred forms of the secondary unique ID 220 is incorporated into the payload and continues to be incorporated into the playable payload. In a particular preferred form it functions as a watermark as has been described elsewhere in the specification.
[000148] In further preferred forms, in addition to its unique identifier data, it can incorporate additional data relating to the activation and registration steps with a view to maintaining a history of activation and registration of that particular payload.
[000149] The above describes only some embodiments of the present invention and modifications, obvious to those skilled in the art, can be made thereto without departing from the scope and spirit of the present invention.
[0001 SO] In particular it is to be noted that the payload can be derived from many sources, In the secure or a trusted environment it can exist embedded in a simple hardware carrier such as a USB stick. Alternatively it can exist embedded in a hard drive or other memory storage device in a distribution kiosk. In further alternative forms and without limitation it can be stored on a database accessible via a Web site forming part of an e-commerce platform.
Claims
1. A system for the distribution of encrypt
a distribution payload including encrypted digital media content,
at least one unique identifier associated with the encrypted digital media content, a gatekeeper device including means to communicate with a universal session server, the universal session server located remotely to the gatekeeper device,
wherein in use, the gatekeeper device permits the decryption of the encrypted digital media content if and only if the identity of the distribution payload is verified.
2. The system according to claim 1 wherein following the verification of t e identity of the distribution payload, the disttibutionpayload is rendered accessible from a data storage device.
3. The system according to claim 1 or claim 2 wherein the distribution payload is preloaded on the data storage device.
4. The system according to any one of claims 1 to 3 wherein the data storage device performs the functions ofthe gatekeeper device.
5. The system according to any one of claims 2 to 4 wherein the process of verification requires input of an acquisition code into the gatekeeper device.
6. The system according to claim 5 wherein the acquisition code is generated by universal session server in response to a request from the gatekeeper device.
7. The system according to claim 6 wherein the request is made only after at least one predetermined condition is satisfied.
8. The system according to claim 7 wherein a predetermined condition is a signal from a payment server.
9. The system according to any preceding claim wherein the universal session server is iti communication with a digital rights management industry server.
10. The system according to any preceding claim wherein the universal session server is in communication with a digital rights management independent server.
11. The system according to any preceding claim wherein the universal session server is in communication with an independent server.
12. The system according to any preceding claim wherein the distribution payload further comprises at least one unique vault key.
13. The system according to any preceding claim herein the distribution payload further comprises a unique identifier.
14. The system according to any preceding claim wherein the distribution payload further comprises a unique watermark identifier.
15. The system according to any preceding claim wherein the distribution payload further comprises a unique digital media identifiers.
16. The system according to any preceding claim wherein the distribution payload further comprises metadata.
17. The system according to any preceding claim wherein the distribution payload further comprises hash values.
18. The system according to any preceding claim wherein the distribution payload further comprises cross-platform software.
19. The system according to any preceding claim wherein the distribution payload further comprises preview media ,
20. The system according to any preceding claim wherein a block cipher is utilised in the encryption of digital media content thereby to create the encrypted digital media content.
21. The system according to any preceding claim wherein a content media key is utilised in the encryption of digital media content thereby to create the encrypted digital media content.
22. The system according to any preceding claim wherein the universal session server further comprises a payment server.
23. The system according to any preceding claim wherein the gatekeeper device is in the form of an interactive Self service device.
24. The system according to any one of claims 1 to 22 wherein the gatekeeper device is in the form a kiosk.
25. The system according to any one of claims 1 to 24 wherein a unique identifier associated with the encrypted digital media content is in the form of a barcode.
26. The system according to any one of olaims 1 to 24 wherein a unique identifier associated with the encrypted digital media content is in the form of a magnetic strip.
27. The system according to any one of claims 1 to 24 wherein a unique identifier associated with the encrypted digital media content is in the form of an electronic chip.
28. A method for the acquisition and decryption of encrypted digital media content, the method comprising the steps of:
preparing a distribution payload including encrypting digital media content thereon, distributing the distribution payload to a plurality of first verification locations, issuing an acquisition code specific to the distribution payload on verification of the identity of the distribution payload,
wherein decryption of the encrypted digital media content of the distribution payload is enabled by use of the acquisition code.
29. The apparatus of claim 29 wherein the acquisition code is entirely unique to the secure payload associated with the unique identifier and thus unique to the unique identifier
30. Apparatus for releasing a secure payload so as to convert said secure payload to a playable payload at or after point of sale; said apparatus including means to input a unique identifier associated with the secure payload; means to receive confirmation of a transaction associated with the secure payload sufficient to permit conditional transmission of the unique identifier to a database; means to receive a unique unlock key associated with the unique identifier from the database; said apparatus including processing means for processing data comprising the secure payioad with the unique unlock key thereby to convert said data to a playable payioad.
31. The apparatus of claim 29 wherein the unique unlock code is entirely unique to the secure payioad associated with the unique identifier and thus entirely unique to the unique identifier.
32. The apparatus of claims 30 or claim 31 wherein a secondary unique identifier is also associated with said secure payioad,
33. The apparatus of claim 2 wherein the secondary unique identifier is incorporated in said secure payioad and is retained in said playable payioad after release from said secure payioad.
34. A point-of-sale terminal for enabling distribution of digital content stored on a medium; the terminal including means to input a unique identifier associated with a secure payioad; means to receive confirmation of a transaction associated with that secure payioad sufficient to permit conditional transmission of the unique identifier to a database; means to receive a unique unlock key associated with the unique identifier from the database.
35. The terminal of claim 34 wherein the unique unlock code is unique to the secure payioad associated with the unique identifier and thus entirely unique to the unique identifier.
36. The terminal of claims 34 or claim 35 wherein a secondary unique identifier is also associated with said secure payioad.
37. The terminal of claim 36 wherein the secondary unique identifier is incorporated in said secure payioad and is retained in said playable payioad after release from said secure payioad.
38. A method for release of a secure payioad so as to provide a playable payioad; said method comprising the steps of associating a unique identifier with a secure payioad; permitting the secure payioad with its associated unique identifier to exist in an insecure or untrusted environment; in that environment, on satisfaction of predetermined criteria, then conditionally transmitting the unique identifier to a secure or trusted environment where a comparison is made to determine if a unique unlock key has previously been issued against the unique identifier and, if not, men issuing a unique unlock key from the secure or trusted environment; processing data comprising the secure payioad with reference to the unique unlock key thereby to release the secure payioad and convert the data to playable payioad.
39. The method of claim 38 wherein the unique unlock code is unique to the secure payload associated with the unique identifier and thus entirely unique to the unique identifier.
40. The method of claims 38 or claim 39 wherein a secondary unique identifier is also associated with said secure payload.
41. The method of claim 40 wherein the secondary unique identifier is incorporated in said secure payload and is retained in said playable payload after release from said secure payload.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2011902109 | 2011-05-31 | ||
AU2011902109A AU2011902109A0 (en) | 2011-05-31 | System for media distribution using portable storage devices |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012162739A1 true WO2012162739A1 (en) | 2012-12-06 |
Family
ID=47258160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2012/000605 WO2012162739A1 (en) | 2011-05-31 | 2012-05-31 | System and method for encrypted media distribution |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2012162739A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3007166A1 (en) * | 2013-06-17 | 2014-12-19 | France Telecom | METHOD, DEVICE, AND SYSTEM FOR PROTECTING AN IMAGE SIGNAL AGAINST COPY |
WO2015059669A1 (en) * | 2013-10-25 | 2015-04-30 | Stellenbosch University | System and method for monitoring third party access to a restricted item |
US9595034B2 (en) | 2013-10-25 | 2017-03-14 | Stellenbosch University | System and method for monitoring third party access to a restricted item |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099663A1 (en) * | 2000-11-01 | 2002-07-25 | Kenji Yoshino | Content delivery system and content delivery method |
US20060036549A1 (en) * | 2004-08-12 | 2006-02-16 | Bo Wu | Digital media distribution |
-
2012
- 2012-05-31 WO PCT/AU2012/000605 patent/WO2012162739A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099663A1 (en) * | 2000-11-01 | 2002-07-25 | Kenji Yoshino | Content delivery system and content delivery method |
US20060036549A1 (en) * | 2004-08-12 | 2006-02-16 | Bo Wu | Digital media distribution |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3007166A1 (en) * | 2013-06-17 | 2014-12-19 | France Telecom | METHOD, DEVICE, AND SYSTEM FOR PROTECTING AN IMAGE SIGNAL AGAINST COPY |
WO2015059669A1 (en) * | 2013-10-25 | 2015-04-30 | Stellenbosch University | System and method for monitoring third party access to a restricted item |
CN105849757A (en) * | 2013-10-25 | 2016-08-10 | 斯泰伦博斯大学 | System and method for monitoring third party access to restricted item |
US9595034B2 (en) | 2013-10-25 | 2017-03-14 | Stellenbosch University | System and method for monitoring third party access to a restricted item |
RU2656995C2 (en) * | 2013-10-25 | 2018-06-07 | Стелленбош Юниверсити | System and method for monitoring third party access to restricted item |
CN105849757B (en) * | 2013-10-25 | 2019-09-03 | Cmt研究私人有限公司 | System and method for monitoring access of the third party to restricted article |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7124304B2 (en) | Receiving device for securely storing a content item, and playback device | |
US8244639B2 (en) | Content identification, personal domain, copyright notification, metadata and e-Commerce | |
US7191153B1 (en) | Content distribution method and apparatus | |
US7444306B2 (en) | Method and apparatus for the rental or sale, and secure distribution of digital content | |
US6385596B1 (en) | Secure online music distribution system | |
EP1719038B1 (en) | Rfid protected media system and method that provides dynamic downloadable media | |
US7933837B2 (en) | Content information providing system, content information providing server, content reproduction apparatus, content information providing method, content reproduction method and computer program | |
US7571328B2 (en) | System and method for distributing digital content over a network | |
US20050004873A1 (en) | Distribution and rights management of digital content | |
US20060200865A1 (en) | System, service, and method for enabling authorized use of distributed content on a protected media | |
JP2002541528A (en) | Protected online music distribution system | |
US10586221B1 (en) | Regulating access to content using a multitiered rule base | |
JP2007510975A (en) | Digital rights management unit for digital rights management system | |
US20070250447A1 (en) | Method And Apparatus For Boostrapping Mobile A/V Jukeboxes | |
EP1086411B1 (en) | Method for verifying the execution of a software product | |
WO2012162739A1 (en) | System and method for encrypted media distribution | |
AU2008314487B2 (en) | Method, system and apparatus for distributing digital content | |
JP2001236403A (en) | Method, system, and device for distributing content composed of digital information and recording medium with distribution system recorded thereon | |
JP2001236326A (en) | Digital content distribution system | |
EP1626327A1 (en) | Distribution and rights management of digital content | |
KR100727085B1 (en) | System and method for providing off-line contents using digital right management | |
US20150120566A1 (en) | System and Method for Digital Media Rights Management | |
JP2002109105A (en) | System for distributing digital contents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12793277 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12793277 Country of ref document: EP Kind code of ref document: A1 |