WO1998050841A1 - System, method and apparatus for the prevention of unauthorised data download - Google Patents

System, method and apparatus for the prevention of unauthorised data download Download PDF

Info

Publication number
WO1998050841A1
WO1998050841A1 PCT/EP1998/002591 EP9802591W WO9850841A1 WO 1998050841 A1 WO1998050841 A1 WO 1998050841A1 EP 9802591 W EP9802591 W EP 9802591W WO 9850841 A1 WO9850841 A1 WO 9850841A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
validating
communications
communicating
download
Prior art date
Application number
PCT/EP1998/002591
Other languages
French (fr)
Inventor
William Neil Robinson
Original Assignee
Motorola Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Ltd. filed Critical Motorola Ltd.
Priority to AU79104/98A priority Critical patent/AU7910498A/en
Publication of WO1998050841A1 publication Critical patent/WO1998050841A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Definitions

  • the present invention relates to a system, method and apparatus for the prevention of unauthorised data download, in particular, the prevention of unauthorised software download.
  • DE-A1-4 404 327 discloses a system comprising a source computer and a client computer, both possessing a code.
  • the code possessed by the source computer is transmitted to the client computer for comparison before data is downloaded from the source computer to the client computer.
  • Software Validation Certificate can be used and can contain information relating to system privileges possessed by the software, for example, full access to all device hardware and software function, and ability to execute only with no access to other programs, data or hardware.
  • the certificate, or the above-described codes are downloaded with the software; the code (as described in relation to US 4, 528, 643 and DE-A1-4 404 327) or the certificate is transmitted to the client computer and so is susceptible to fraud, for example, an individual possessing equipment to receive the code can achieve execution of the software without payment.
  • a system for the prevention of unauthorised data download comprising a first communicating means capable of downloading data from a second communicating means, the first communicating means having a store for receiving a validation code and being provided with a validating means arranged to use the validating code so as to verify whether the first communicating means is authorised to download the data from the second communicating means.
  • a method of preventing unauthorised download of data in a system having a first communications means capable of downloading data from a second communications means comprising the steps of: obtaining a validation code, requesting download of data from the second communications means, verifying that the first communications means is authorised to download the data using the validation code.
  • a data terminal apparatus comprising a communicating means for receiving data from a second communicating means, a store for receiving a validation code other than from the second communicating means, and a validating means arranged to use the validating code to verify whether the first communications means is authorised to download data from the second communications means.
  • FIG. 1 shows a system which is capable of constituting an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a computer constituting an embodiment of the present invention.
  • FIG. 3 is a flow diagram of a method for use with the system and computer of FIG. l and FIG. 2.
  • a system 100 comprises a client computer 101 located within a geographical area 107 and capable of communicating with a source computer 112.
  • the client computer 101 is connected to a cellular telephone 102, which is in communication with a Base Transceiver Station (BTS) 106, via a radio interface 104. It is conceivable to combine the cellular telephone 102 with the client computer 101 in a single unit.
  • BTS Base Transceiver Station
  • the BTS is connected to a wire line infrastructure 110, for example, an Integrated Service Digital Network (ISDN), via a cellular infrastructure 108, for example, a Global System for Mobile communication (GSM), the wire line infrastructure 110 being connected to the source computer 112 from which download of software is desired.
  • a wire line infrastructure 110 for example, an Integrated Service Digital Network (ISDN)
  • ISDN Integrated Service Digital Network
  • GSM Global System for Mobile communication
  • source computer 112 has been described as being connected to the client computer 101 via a cellular infrastructure 108, other infrastructures are envisaged, for example, any wireless system, such as a Universal Mobile Telephone System (UMTS) or an infra-red system.
  • UMTS Universal Mobile Telephone System
  • the cellular telephone 102 and the cellular infrastructure 108 can be replaced with a modem (not shown) connected directly to the wire line infrastructure 110.
  • the client computer 101 possesses an I/O card 204 (FIG. 2) for interfacing the client computer 101 with the cellular telephone 102.
  • the I/O card 204 is connected to a processing unit 206, the structure and function of which is known in the art. The structure of the processing unit 206 is not considered relevant to the present invention and so will not be described in any further detail.
  • the processing unit 206 is connected to an authorisation module 200 and a download store 208 for storing downloaded data, including software.
  • the authorisation module 200 is also connected to the I/O card 204 via the processing unit 206.
  • the download store 208, a certificate store 212 and a Man Machine Interface (MMI) 210 for example, a keyboard and a display, a touch-screen or a voice recognition unit, the MMI 210 also being connected to the processing unit 206.
  • MMI Man Machine Interface
  • a user is pre-provided with a Software Validation Certificate (SVC) from the proprietor of the source computer 112 and which is stored in the certificate store 212.
  • SVC Software Validation Certificate
  • DAC Device Authorisation Certificate
  • the user instructs the client computer 101 to contact the source computer 112 using the cellular telephone 102 (step 302).
  • the source computer enables the authorisation module 200 (step 304). This is achieved by either transmitting a Software Authorisation Agent (SAA) to the client computer for storage in the authorisation module 200, or by having the SAA pre- resident in the authorisation module 200 and activating the SAA via a message from the source computer 112.
  • SAA Software Authorisation Agent
  • Information relating to the SVC or DAC is included within the SAA.
  • the SAA is a computer program, or a suite of computer programs/processes, the SAA can be embodied by other techniques known in the art to validate the SVC, for example, an electronic circuit.
  • the SAA verifies whether the SVC is valid, and so download of the software is authorised or invalid and download should be denied (step 306). If the SVC is valid, the user is advised, via the MMI 210, that download of the software is authorised (step 310) and an encrypted message is sent to the source computer 112 (step 311), after which download of the software from the source computer 112 to the client computer 101 takes place (step 312), the downloaded software being stored in the download store 208.
  • the downloaded software can be encrypted and the SAA can be provided with a decryption key for decrypting the encrypted software.
  • the decryption key can be a function of the SVC or the DAC.
  • the SAA can perform the decryption of the downloaded encrypted software.
  • the source computer 112 can interrogate the client computer 101 in order to ascertain what preferences , if any, relating to the software the user might have, for example, language, configuration, or version. The user is then free to execute the software. If, however, the SVC is not valid, the user is advised, via the MMI 210, that download of the software is denied (step 308) and the source computer 112 is sent a download denied message to this effect (step 314).
  • the download denied message can be encrypted.
  • the user can be advised, via the MMI 210, as to the reason for the download being denied and any possible recommended subsequent action which can be take by the user, for example, contacting the software licensor for authorisation.
  • the SAA can subsequently be deleted from the authorisation module 200.
  • the SAA can also be empowered to validate the DAC.
  • the DAC can optionally be downloaded from the source computer 112 to the client computer 101 with the SAA.
  • Other authorisation tests known in the art can also be carried out by the SAA, for example, the SAA can determine whether the client computer 101 is capable of handling a software watermark which can be present in the software to be downloaded.
  • the source computer has been charged with the task of sending the SAA and communicating with the SAA in the above example, it is not intended that the invention be limited to this example. It is envisaged that the infrastructure being used can also handle the transmission of and communication with the SAA.
  • FPLMTS Future Public Private Land Mobile Telecommunications System
  • PCS Personal Communications System
  • ITS Intelligent Transportation System
  • the above embodiments can be implemented via the exchange of information between the SAA and a software environment which is resident in the client computer 101.
  • the interface between the SAA and the software environment can be an Application Programmers Interface (API).
  • API Application Programmers Interface
  • the existence of APIs is known in the art.

Abstract

A system for the prevention of unauthorised data download comprises a client computer (101) capable of downloading data from a source computer (112), the client computer (101) having a store (212) for receiving a validation code other than from the source computer and being provided with an authorisation module (200) arranged to use the validating code so as to verify whether the client computer (101) is authorised to download the data from the source computer (112).

Description

SYSTEM, METHOD AND APPARATUS FOR THE PREVENTION OF UNAUTHORISED DATA DOWNLOAD
Field of the Invention
The present invention relates to a system, method and apparatus for the prevention of unauthorised data download, in particular, the prevention of unauthorised software download.
Background of the Invention
It is known to download computer software from a source computer to a client computer via an infrastructure, for example, an Internet site, to a terminal. Such a system is described in US 4, 528, 643, which relates to any digital system where purchased software is downloaded to disk, or is already stored on disk, but can only be accessed with a decryption code received after electronic payment. However, bandwidth of the infrastructure is wasted if a user discovers subsequently that execution of the software is not authorised, thereby also reducing the capacity and so the effectiveness of the infrastructure. Also, the user is charged for any "air time" used to download the software, even though the software cannot be executed. Thus, once downloaded, the software is not executable by the user and so resources have been wasted. An additional inconvenience is also suffered by the user, since an un-user friendly delay will exist between initiation of the download of the software and the user becoming aware that execution of the software is not possible, especially if the software is large. These disadvantages are particularly pertinent when the software is downloaded via a radio frequency infrastructure.
DE-A1-4 404 327 discloses a system comprising a source computer and a client computer, both possessing a code. The code possessed by the source computer is transmitted to the client computer for comparison before data is downloaded from the source computer to the client computer.
A more sophisticated version of the above described code, known as a
Software Validation Certificate, can be used and can contain information relating to system privileges possessed by the software, for example, full access to all device hardware and software function, and ability to execute only with no access to other programs, data or hardware. The certificate, or the above-described codes, are downloaded with the software; the code (as described in relation to US 4, 528, 643 and DE-A1-4 404 327) or the certificate is transmitted to the client computer and so is susceptible to fraud, for example, an individual possessing equipment to receive the code can achieve execution of the software without payment.
It is therefore an object of the present invention to obviate or mitigate the above mentioned disadvantages relating to the downloading of data.
Summary of the Invention
According to a first aspect of the present invention, there is provided a system for the prevention of unauthorised data download comprising a first communicating means capable of downloading data from a second communicating means, the first communicating means having a store for receiving a validation code and being provided with a validating means arranged to use the validating code so as to verify whether the first communicating means is authorised to download the data from the second communicating means.
According to a second aspect of the present invention, there is provided a method of preventing unauthorised download of data in a system having a first communications means capable of downloading data from a second communications means, the method comprising the steps of: obtaining a validation code, requesting download of data from the second communications means, verifying that the first communications means is authorised to download the data using the validation code.
According to a third aspect of the present invention, there is provided a data terminal apparatus comprising a communicating means for receiving data from a second communicating means, a store for receiving a validation code other than from the second communicating means, and a validating means arranged to use the validating code to verify whether the first communications means is authorised to download data from the second communications means.
Other, preferred, features and advantages are set forth in dependent Claims 2 to 20, 23 to 29 and the following description and drawings.
It is thus possible to provide a system which, in terms of resources, increases the efficiency of the infrastructure (especially in the case of a radio frequency infrastructure), whilst preventing unauthorised reception, either directly or indirectly (by a third party), of the data downloaded. Also, it is possible to provide a reduced turn-around time between requesting download and denial of download; the turn-around time between requesting authorisation and authorisation should remain substantially unchanged.
Brief description of the Drawings
The invention will now be described in more detail, with reference to the accompanying drawings, in which:
FIG. 1 shows a system which is capable of constituting an embodiment of the present invention,
FIG. 2 is a schematic diagram of a computer constituting an embodiment of the present invention, and
FIG. 3 is a flow diagram of a method for use with the system and computer of FIG. l and FIG. 2.
Description of a Preferred Embodiment
Referring to FIG. 1, a system 100 comprises a client computer 101 located within a geographical area 107 and capable of communicating with a source computer 112. Although the client computer 101 is used in this example, other devices can be used, for example, any remote destination device. The client computer 101 is connected to a cellular telephone 102, which is in communication with a Base Transceiver Station (BTS) 106, via a radio interface 104. It is conceivable to combine the cellular telephone 102 with the client computer 101 in a single unit. The BTS is connected to a wire line infrastructure 110, for example, an Integrated Service Digital Network (ISDN), via a cellular infrastructure 108, for example, a Global System for Mobile communication (GSM), the wire line infrastructure 110 being connected to the source computer 112 from which download of software is desired.
Although the source computer 112 has been described as being connected to the client computer 101 via a cellular infrastructure 108, other infrastructures are envisaged, for example, any wireless system, such as a Universal Mobile Telephone System (UMTS) or an infra-red system.
Alternatively, the cellular telephone 102 and the cellular infrastructure 108 can be replaced with a modem (not shown) connected directly to the wire line infrastructure 110.
The client computer 101 possesses an I/O card 204 (FIG. 2) for interfacing the client computer 101 with the cellular telephone 102. The I/O card 204 is connected to a processing unit 206, the structure and function of which is known in the art. The structure of the processing unit 206 is not considered relevant to the present invention and so will not be described in any further detail. The processing unit 206 is connected to an authorisation module 200 and a download store 208 for storing downloaded data, including software.
The authorisation module 200 is also connected to the I/O card 204 via the processing unit 206. The download store 208, a certificate store 212 and a Man Machine Interface (MMI) 210, for example, a keyboard and a display, a touch-screen or a voice recognition unit, the MMI 210 also being connected to the processing unit 206.
During normal operation (FIG. 3), a user is pre-provided with a Software Validation Certificate (SVC) from the proprietor of the source computer 112 and which is stored in the certificate store 212. Optionally, a Device Authorisation Certificate (DAC) can also be loaded into the certificate store 212 and used to determine whether the client computer 101 is licensed, or allowed, to execute the downloaded software. When the user wishes to download software from the source computer 112, for example pre-paid software, the user instructs the client computer 101 to contact the source computer 112 using the cellular telephone 102 (step 302).
Once the source computer 112 has been contacted, the source computer enables the authorisation module 200 (step 304). This is achieved by either transmitting a Software Authorisation Agent (SAA) to the client computer for storage in the authorisation module 200, or by having the SAA pre- resident in the authorisation module 200 and activating the SAA via a message from the source computer 112. Information relating to the SVC or DAC is included within the SAA. Although, in this example, the SAA, is a computer program, or a suite of computer programs/processes, the SAA can be embodied by other techniques known in the art to validate the SVC, for example, an electronic circuit.
Once the SAA is enabled, or if appropriate, downloaded and enabled, the SAA verifies whether the SVC is valid, and so download of the software is authorised or invalid and download should be denied (step 306). If the SVC is valid, the user is advised, via the MMI 210, that download of the software is authorised (step 310) and an encrypted message is sent to the source computer 112 (step 311), after which download of the software from the source computer 112 to the client computer 101 takes place (step 312), the downloaded software being stored in the download store 208. Optionally, the downloaded software can be encrypted and the SAA can be provided with a decryption key for decrypting the encrypted software. The decryption key can be a function of the SVC or the DAC. If desirable, the SAA can perform the decryption of the downloaded encrypted software. Additionally, the source computer 112 can interrogate the client computer 101 in order to ascertain what preferences , if any, relating to the software the user might have, for example, language, configuration, or version. The user is then free to execute the software. If, however, the SVC is not valid, the user is advised, via the MMI 210, that download of the software is denied (step 308) and the source computer 112 is sent a download denied message to this effect (step 314). The download denied message can be encrypted. Optionally, the user can be advised, via the MMI 210, as to the reason for the download being denied and any possible recommended subsequent action which can be take by the user, for example, contacting the software licensor for authorisation.
Once the user has been advised that download is denied or download has been authorised and the software downloaded, the SAA can subsequently be deleted from the authorisation module 200.
The SAA can also be empowered to validate the DAC. The DAC can optionally be downloaded from the source computer 112 to the client computer 101 with the SAA. Other authorisation tests known in the art can also be carried out by the SAA, for example, the SAA can determine whether the client computer 101 is capable of handling a software watermark which can be present in the software to be downloaded.
Although the above example has been described in the context of downloading software, it is not intended that the present invention be limited to software alone, and should include the downloading of any data, for example, text, images or music and other audio information.
Additionally, even though the source computer has been charged with the task of sending the SAA and communicating with the SAA in the above example, it is not intended that the invention be limited to this example. It is envisaged that the infrastructure being used can also handle the transmission of and communication with the SAA.
It is also conceivable to implement the above invention in the context of other digital telecommunications systems than those mentioned above, for example, a Future Public Private Land Mobile Telecommunications System (FPLMTS), a Personal Communications System (PCS), Cable Television system, or an Intelligent Transportation System (ITS).
The above embodiments can be implemented via the exchange of information between the SAA and a software environment which is resident in the client computer 101. The interface between the SAA and the software environment can be an Application Programmers Interface (API). The existence of APIs is known in the art.

Claims

Claims
1. A system for the prevention of unauthorised data download comprising a first communicating means capable of downloading data from a second communicating means, the first communicating means having a store for receiving a validation code and being provided with a validating means arranged to use the validating code so as to verify whether the first communicating means is authorised to download the data from the second communicating means.
2. A system as claimed in Claim 1, wherein the validating means is pre- resident in the first communicating means.
3. A system as claimed in Claim 1, wherein the first communicating means is provided with the validating means by downloading the validating means to the first communicating means from the second communicating means.
4. A system as claimed in Claim 1, wherein the validating means is erasable.
5. A system as claimed in Claim 1, further comprising encryption means arranged to send an encrypted message from the first communicating means to the second communicating means.
6. A system as claimed in Claim 1, wherein the encrypted message is a function of the validation code.
7. A system as claimed in Claim 1, wherein the data is encrypted and the validating means is arranged to provide the first communicating means with a decryption key.
8. A system as claimed in Claim 7, wherein the data is decrypted by the validating means.
9. A system as claimed in Claim 1, wherein the encryption of the data is a function of the validating code.
10. A system as claimed in Claim 1, wherein the validating means is resident in the first communicating means and communicates with a software environment via an application programmers interface.
11. A system as claimed in Claim 1, wherein the validating code is a software validation certificate.
12. A system as claimed in Claim 1, wherein the validating code is a device authorisation certificate.
13. A system as claimed in Claim 1, wherein the validating means is a software authorisation agent.
14. A system as claimed in Claim 1, wherein the store is arranged to receive the validation code other than from the second communicating means.
15. A system as claimed in Claim 1, wherein the data includes computer software.
16. A system as claimed in Claim 1, wherein the data includes text.
17. A system as claimed in Claim 1, wherein the data includes image data.
18. A system as claimed in Claim 1, wherein the data includes audio data.
19. A radio frequency communications system comprising the system as claimed in Claim 1.
20. A wire line communications system comprising the system as claimed in Claim 1.
21. A method of preventing unauthorised download of data in a system having a first communications means capable of downloading data from a second communications means, the method comprising the steps of: obtaining a validation code, requesting download of data from the second communications means, verifying that the first communications means is authorised to download the data using the validation code.
22. A method as claimed in Claim 21, further comprising downloading a validating means from the second communications means.
23. A method as claimed in Claim 21, further comprising providing a validating means pre-resident in the first communications means.
24. A method as claimed in Claim 21, further comprising erasing the validating means one the verification as to whether the first communications means is authorised to download the data from the second communications means has taken place.
25. A method as claimed in Claim 21, further comprising sending an encrypted message from the first communications means to the second communications means.
26. A method as claimed in Claim 21, further comprising encrypting the data prior to downloading the data to the first communications means and providing the first communications means with a decryption key.
27. A method as claimed in Claim 21, wherein the validation code is obtained other than from the second communications means.
29. A method as claimed in Claim 22, wherein the validating means is resident in the first communicating means and communicates with a software environment via an application programmers interface.
13. A data terminal apparatus comprising a communicating means for receiving data from a second communicating means, a store for receiving a validation code other than from the second communicating means, and a validating means arranged to use the validating code to verify whether the first communications means is authorised to download data from the second communications means.
PCT/EP1998/002591 1997-05-01 1998-04-29 System, method and apparatus for the prevention of unauthorised data download WO1998050841A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU79104/98A AU7910498A (en) 1997-05-01 1998-04-29 System, method and apparatus for the prevention of unauthorised data download

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9708911A GB2324935A (en) 1997-05-01 1997-05-01 Prevention of unauthorised data download
GB9708911.4 1997-05-01

Publications (1)

Publication Number Publication Date
WO1998050841A1 true WO1998050841A1 (en) 1998-11-12

Family

ID=10811686

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1998/002591 WO1998050841A1 (en) 1997-05-01 1998-04-29 System, method and apparatus for the prevention of unauthorised data download

Country Status (3)

Country Link
AU (1) AU7910498A (en)
GB (1) GB2324935A (en)
WO (1) WO1998050841A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7065342B1 (en) 1999-11-23 2006-06-20 Gofigure, L.L.C. System and mobile cellular telephone device for playing recorded music
GB2364139B (en) * 1999-12-22 2004-05-26 Ibm A security mechanism providing access control for locally-held data
JP4529233B2 (en) 2000-02-21 2010-08-25 ソニー株式会社 Control method of composite terminal and composite terminal device
EP1397734A2 (en) * 2001-04-30 2004-03-17 Nokia Corporation Protection of content reproduction using digital rights
US9712582B2 (en) 2001-06-27 2017-07-18 Skky, Llc Telephone initiated protocol-improved media delivery platform
CA2809894C (en) 2001-06-27 2017-12-12 Skky Incorporated Improved media delivery platform
CN110637444A (en) * 2017-07-27 2019-12-31 Oppo广东移动通信有限公司 Method and terminal for controlling sharing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4999806A (en) * 1987-09-04 1991-03-12 Fred Chernow Software distribution system
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
WO1993001550A1 (en) * 1991-07-01 1993-01-21 Infologic Software, Inc. License management system and method
WO1994007204A1 (en) * 1992-09-21 1994-03-31 Uniloc (Singapore) Private Limited System for software registration
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2241133A (en) * 1990-02-14 1991-08-21 Motorola Inc Radiotelephone having removable memory means for storing radio user validation code
DE69130461T2 (en) * 1990-05-11 1999-06-10 Int Computers Ltd Access control in a distributed computer system
US5349643A (en) * 1993-05-10 1994-09-20 International Business Machines Corporation System and method for secure initial program load for diskless workstations
US5400403A (en) * 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4999806A (en) * 1987-09-04 1991-03-12 Fred Chernow Software distribution system
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
WO1993001550A1 (en) * 1991-07-01 1993-01-21 Infologic Software, Inc. License management system and method
WO1994007204A1 (en) * 1992-09-21 1994-03-31 Uniloc (Singapore) Private Limited System for software registration
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement

Also Published As

Publication number Publication date
GB2324935A (en) 1998-11-04
AU7910498A (en) 1998-11-27
GB9708911D0 (en) 1997-06-25

Similar Documents

Publication Publication Date Title
KR101409634B1 (en) Methods and apparatus for content protection in a wireless network
US7215779B2 (en) Information providing apparatus and method, information processing apparatus and method, and program storage medium
EP1529371B1 (en) Monitoring of digital content provided from a content provider over a network
EP1530885B1 (en) Robust and flexible digital rights management involving a tamper-resistant identity module
JP4482451B2 (en) Method for transmitting encrypted user data objects
EP1769604B1 (en) System and method for digital rights management of electronic content
CN100445925C (en) Access control device and electronic device
US20040266395A1 (en) Process for securing a mobile terminal and applications of the process for executing applications requiring a high degree of security
US20060107327A1 (en) Methods and apparatus for enforcing application level restrictions on local and remote content
US20080288778A1 (en) Method for Generating and Verifying an Electronic Signature
WO2007143252A2 (en) Method and apparatus for effecting the return of a rights management object
JP4987850B2 (en) Security method and device for managing access to multimedia content
JP2002024178A (en) Contents authentication system and method, and recording medium
WO1998050841A1 (en) System, method and apparatus for the prevention of unauthorised data download
KR101074068B1 (en) Authentication method and apparatus for home network service
KR100431215B1 (en) Method for taking network service certification in a home gateway and method for relaying this certification
KR100611119B1 (en) Method and apparatus for providing wipi contents service using drm
WO2004071008A1 (en) Method for setting up a secure connection using public and private key generated in user terminal
KR20060117786A (en) Method and apparatus for providing multi-media contents service using drm
KR20090036669A (en) Apparatus and method for sharing download contents in potable terminal
KR20060117778A (en) Method and apparatus for providing multi-media contents service using drm
KR20020087656A (en) Method for certifying a right user using a wireless communication apparatus

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998547717

Format of ref document f/p: F