[go: up one dir, main page]

GB2468862A - A method of protecting electronic content by encryption or deletion of consumed portions - Google Patents

A method of protecting electronic content by encryption or deletion of consumed portions Download PDF

Info

Publication number
GB2468862A
GB2468862A GB0904966A GB0904966A GB2468862A GB 2468862 A GB2468862 A GB 2468862A GB 0904966 A GB0904966 A GB 0904966A GB 0904966 A GB0904966 A GB 0904966A GB 2468862 A GB2468862 A GB 2468862A
Authority
GB
United Kingdom
Prior art keywords
data item
consumed
data
item
portions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0904966A
Other versions
GB0904966D0 (en
Inventor
Steven John Kennedy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0904966A priority Critical patent/GB2468862A/en
Publication of GB0904966D0 publication Critical patent/GB0904966D0/en
Priority to PCT/GB2010/050499 priority patent/WO2010109237A1/en
Publication of GB2468862A publication Critical patent/GB2468862A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A data item is consumed in sequence from start to finish and a pointer is maintained to show how much of the data item has been consumed, The data item may be an electronic representation of a book or may be an audio or audio-visual item. Portions of the data item that have already been consumed are made inaccessible or are degraded, preferably by deleting or encrypting them. Consumed portions may be deleted or encrypted if they exceed a threshold from the pointer and, if the data item represents a book, the threshold may correspond to a predetermined number of words, pages or chapters. Preferably the data item is provided in an encrypted form — although a current region may be unencrypted — and an encryption key associated with a user or user device is required to decrypt the data. Typically, the invention finds application in protecting a pay per read (PPR) or one-read electronic book.

Description

A METHOD OF AND APPARATUS FOR PROTECTING A DATA ITEM
FurLu OF THE INVENS1ON The present InventIon relates to a med od of and apparatus for proteeting a data ttem, and to a computer program fOr implementing the method on a programmable data processor.
BACKtjROt.JNm) OFT' tiE IN VENT1ON Music and films have moved into the digital age where such audio and video items are available for download. This has simplified distribution but has. made illegal copying more prevalcr:t. Books had not made such a mass transition due to the intimate nature of the. reading exocrience. However recently electronic readers, for example the SONY reader have become available which marry the convenience ol electronic &iownioad with a hook like reading experience.
S't_JMMAKY (F'FiTF, iNvEN'rION According to a first aspect of'le present invention there is provided a method of protecting a data item wicre, in usc, th.e data item is consumed. in a. sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them tna.cccssb le or to degrade diem.
Thus a user can consume the data item. if the data. item is a book, then "consumed" relates to reading, whereas fOr music and video "consumed" relates to listening and watching, respectively.
Iti.s thus possbic to provtdc a process by which a piece of' digitalized copy is encrypted into a. town, that can be downloaded onto a dcvtce that decrypts the copy allowing it to be read a predetermined number of' times (usually once) the copy is then degraded as
I
described below in order to protect it from reuse or reproduction.
According to a seconñ aspect of the present invention there is provided a computer program for causing a programmable data processor to operate in accordance with the method of the tirst aspect of the present invention.
According to a third aspect of the present invention there is provided a data processor and display device arranged to allow a user to consume a data item rcprcsentng a book, audio or audiovisual presentation, wherein the data processor is adapted to degrade portions of the data item that have already been consumed.
seri 2t io of a,rcf ei'rcd embo diment of he inscnt 10 in a preferred embodiment a digital data item representing, for example., a hook, is held or a merchant's sen'er and is available for patd download as a. one read hook. The "One read hook" is an cnerypte.d hook that is designed to he read once in its entirety roughly hum beginning to end.
in use, a use.r may enter the merchants website. and select a hook for download. Th server constructs a. one read book, I rbook, from a master copy of the book that is retained on a secure server. f he IrBook may only he decrypted by-a single. target reader and may only be read through a limited number of times (typically once) on thai-target reader.
f he IrBook may, for example, be held in any proprietary or ope.n source format so long as that fonriat allows the book to he held as a series of chscretc drunks (such as sections, chapters, pages or lines) and includes the necessary software for the presentation of and nav1gation of those chunks on the target reader.
in use the reader device keeps a pointer, which in the context of a one read hook can be thought of as a hookmark. and which is a. data. structure that idcntfes the readers current place in the hook.
The irRook may Rave embedded data dentfyig the number of times the hook may he read (typically once, the chunks kept behind the bookmark (i.e. portions which have already been read or consumed" and the number ol chunks decrypted ahead ot the bookmark. The unencrvpted chunks arc inferred to as the currenf chunks and the reader of the hook may view these at wilL This allows fiexibtljt on a per I rHook basis in die amount oflook ahead2 and look back2 that a reader is permitted when reading through the rBook.
The lrBook is, in use, read like any other eBook. When the reader passes a chunk boundary (by whatever means typically seroilng or selcel-ing "Next page'° or some such), chunks that have been read are deleted or reencrypted, This processing causes those portions which have been consumed to he made inaccessible, Similarly chunks that are yet to he read arc decrypted as necessary to ensure that the correct range of chunks are current.
Ii the reader aRcmnpts to access an encrypted ctiunk they may be provided wuli a "Uan1t read" page that may be specified witlu the irBook, The contents of this page would tzpicaily include options t) iiuchase another pay per read,PPR. of the book, a fid I electronic copy of the book, orto order a physical copy of the hook. A different page may opIonaily be presented fbr chunks already read and br chunks that have not vet Deen read.
Pay per read P11t advantageously uses a dual key encrypted exchange of inlormanon between tne supplier and the reader, Tnts assures that only the authorized reader can decrypt the trBook.
When the book is opened for reading, it is decrypted using the secret key associated with the reader. Such a key may be held in memor that is not normally accessible to users.
This encryption layer is distinct from the encryption used within the lrBook and does not consttutc part ot' this specifIcation although the reader public key is likely to be used by the encryption used within the IrBook to avoid unnecessary key generation.
Once the rBook is opened for reading. the bookmark key associated with the rBook decrypts the chunks of the hook that the bookmark identifies as current. The bookmark is protected such that it may be incremented bitt cannot be dccrerncnicd, or rot dccrcmentcd without a secure key, so the hook can be read in its entirety only once by the reader. If the book nay be read rnore'han once then ii is possiNe'o reset the bookmark to permit the specified number of reads after which the reset operation will fad displaying: the Cant rea& page (and in any event the material will have been deleted).
It is thus possible to provide a method of protecting electronic hooks from copying or 1mm unauthorized iiinltiple accesses.
Although the invention has been described in the context of a hook, it can he applied to any data kern, such as music or video.

Claims (8)

  1. CLAIMSA method of protecting a data item where, iii use, the data item is consumed in a sequence progressug hum a start to a finish, and wherein pOinter is maintained to show how much of the data item has been consumed, and wherein portions of the data item whrch have aLready been consumed are processed to make them inaccessible or to degrade them.
  2. 2 A method as clatmed in claim 1, in which portions that have been consumed by a user are deleted or encrypted.
  3. A methoa as clanned in claim 2, in w!ucn poilioris that exceea a trst threshold from the pointe.r are deleted or encrypted.
  4. 4 A method as claimed in claim 3. in which when the data item represents a book, the first threshold corresponds to a predetermined number of words, pages or chapters.
  5. A method as claimed in any of the preceding claims, in which the data. item is provtded in an encrypted form, and the encryption key associated with a user or a user device is recuirec1 to decrypt the dala item.
  6. 6 A method as claimed in any of the preceding claims in which a portion of the data item representing a "current region" is kept in unencrypted ibrm.
  7. 7 A method as claimed in any of the preceding claims in which the. data item is an electrouc representation of a book.
  8. 8 A method as claimed in any of the preceding claims in which the. data item is an audio or audiovisua item 9 A computer rograni for causing a programmable data proces.sor to operate in accordance with the method of any of claims ito 8.if) A data processor and dtspiay device arranged to allow a user to consume a dala item representing a hook, audio or audiovisua presentation, wherein the data rocessor is adapted to degrade portions of the data item wheh have airead been consumed.
GB0904966A 2009-03-24 2009-03-24 A method of protecting electronic content by encryption or deletion of consumed portions Withdrawn GB2468862A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0904966A GB2468862A (en) 2009-03-24 2009-03-24 A method of protecting electronic content by encryption or deletion of consumed portions
PCT/GB2010/050499 WO2010109237A1 (en) 2009-03-24 2010-03-24 A method of and apparatus for protecting a data item

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0904966A GB2468862A (en) 2009-03-24 2009-03-24 A method of protecting electronic content by encryption or deletion of consumed portions

Publications (2)

Publication Number Publication Date
GB0904966D0 GB0904966D0 (en) 2009-05-06
GB2468862A true GB2468862A (en) 2010-09-29

Family

ID=40640009

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0904966A Withdrawn GB2468862A (en) 2009-03-24 2009-03-24 A method of protecting electronic content by encryption or deletion of consumed portions

Country Status (2)

Country Link
GB (1) GB2468862A (en)
WO (1) WO2010109237A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2983606A1 (en) * 2011-12-02 2013-06-07 France Telecom Method for accessing digital content e.g. audio, in terminal, involves allowing digital contents to be changed before restitution when access rights are forfeited, and modifying access rights in progressive manner with each restitution

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022099A1 (en) * 1995-12-14 1997-06-19 Motorola Inc. System and method for limiting access to a book card

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7336788B1 (en) * 1992-12-09 2008-02-26 Discovery Communicatoins Inc. Electronic book secure communication with home subsystem
FR2816783B1 (en) * 2000-11-10 2003-10-17 Guillaume Dubost ELECTRONIC DEVICE, COMPUTER SYSTEM, AND METHOD FOR THE INSTANT PROVISION OF AUDIOVISUAL DATA
EP2357651A3 (en) * 2000-12-07 2013-06-26 SanDisk Technologies Inc. System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
US20080271076A1 (en) * 2007-04-27 2008-10-30 General Instrument Corporation Method and Apparatus for Switching Between Edge Device Resources in an SDV System

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022099A1 (en) * 1995-12-14 1997-06-19 Motorola Inc. System and method for limiting access to a book card

Also Published As

Publication number Publication date
GB0904966D0 (en) 2009-05-06
WO2010109237A1 (en) 2010-09-30

Similar Documents

Publication Publication Date Title
US8595488B2 (en) Apparatus, system and method for securing digital documents in a digital appliance
US8417966B1 (en) System and method for measuring and reporting consumption of rights-protected media content
US8826036B1 (en) Ebook encryption using variable keys
EP2188756B1 (en) Device and method for a backup of rights objects
US8359473B1 (en) System and method for digital rights management using digital signatures
US20090271319A1 (en) Embedded Licenses for Content
KR20070109813A (en) Method for moving rights object and electronic apparatus
US20150026456A1 (en) Apparatus and method for managing digital copyright on epub-based content, and apparatus and method for providing epub-based content according to user's right
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
CN102073826A (en) System and method for digital copyright management using lightweight digital watermark adding component
CN101719209B (en) General digital rights protection method on WINDOWS platform
EP1596269A2 (en) A system and method for rendering selective presentation of documents
CN109145617B (en) Block chain-based digital copyright protection method and system
US20070014403A1 (en) Controlling distribution of protected content
US20080010468A1 (en) Method and technique for enforcing transience and propagation constraints on data transmitted by one entity to another entity by means of data division and retention
CN100561396C (en) Method for modifying digital rights object and electronic device therefor
JP2006244486A (en) Method for forming right of use for item on bases of access right and computer readable medium
CN102449638A (en) Using a custom media library to secure digital media content
CN105760719B (en) Method and system for decrypting ciphertext data
GB2468862A (en) A method of protecting electronic content by encryption or deletion of consumed portions
US20040123126A1 (en) Method and apparatus for deterring piracy
WO2001031419A1 (en) User-known and personally valuable encryption key
WO2011043171A1 (en) Copyrighted work redistribution promotion system
AU2006343229B2 (en) A method for protecting digital content by encrypting and decrypting a memory card
US9152636B2 (en) Content protection system in storage media and method of the same

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)