GB2468862A - A method of protecting electronic content by encryption or deletion of consumed portions - Google Patents
A method of protecting electronic content by encryption or deletion of consumed portions Download PDFInfo
- Publication number
- GB2468862A GB2468862A GB0904966A GB0904966A GB2468862A GB 2468862 A GB2468862 A GB 2468862A GB 0904966 A GB0904966 A GB 0904966A GB 0904966 A GB0904966 A GB 0904966A GB 2468862 A GB2468862 A GB 2468862A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data item
- consumed
- data
- item
- portions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A data item is consumed in sequence from start to finish and a pointer is maintained to show how much of the data item has been consumed, The data item may be an electronic representation of a book or may be an audio or audio-visual item. Portions of the data item that have already been consumed are made inaccessible or are degraded, preferably by deleting or encrypting them. Consumed portions may be deleted or encrypted if they exceed a threshold from the pointer and, if the data item represents a book, the threshold may correspond to a predetermined number of words, pages or chapters. Preferably the data item is provided in an encrypted form — although a current region may be unencrypted — and an encryption key associated with a user or user device is required to decrypt the data. Typically, the invention finds application in protecting a pay per read (PPR) or one-read electronic book.
Description
A METHOD OF AND APPARATUS FOR PROTECTING A DATA ITEM
FurLu OF THE INVENS1ON The present InventIon relates to a med od of and apparatus for proteeting a data ttem, and to a computer program fOr implementing the method on a programmable data processor.
BACKtjROt.JNm) OFT' tiE IN VENT1ON Music and films have moved into the digital age where such audio and video items are available for download. This has simplified distribution but has. made illegal copying more prevalcr:t. Books had not made such a mass transition due to the intimate nature of the. reading exocrience. However recently electronic readers, for example the SONY reader have become available which marry the convenience ol electronic &iownioad with a hook like reading experience.
S't_JMMAKY (F'FiTF, iNvEN'rION According to a first aspect of'le present invention there is provided a method of protecting a data item wicre, in usc, th.e data item is consumed. in a. sequence progressing from a start to a finish, and wherein a pointer is maintained to show how much of the data item has been consumed, and wherein portions of the data item which have already been consumed are processed to make them tna.cccssb le or to degrade diem.
Thus a user can consume the data item. if the data. item is a book, then "consumed" relates to reading, whereas fOr music and video "consumed" relates to listening and watching, respectively.
Iti.s thus possbic to provtdc a process by which a piece of' digitalized copy is encrypted into a. town, that can be downloaded onto a dcvtce that decrypts the copy allowing it to be read a predetermined number of' times (usually once) the copy is then degraded as
I
described below in order to protect it from reuse or reproduction.
According to a seconñ aspect of the present invention there is provided a computer program for causing a programmable data processor to operate in accordance with the method of the tirst aspect of the present invention.
According to a third aspect of the present invention there is provided a data processor and display device arranged to allow a user to consume a data item rcprcsentng a book, audio or audiovisual presentation, wherein the data processor is adapted to degrade portions of the data item that have already been consumed.
seri 2t io of a,rcf ei'rcd embo diment of he inscnt 10 in a preferred embodiment a digital data item representing, for example., a hook, is held or a merchant's sen'er and is available for patd download as a. one read hook. The "One read hook" is an cnerypte.d hook that is designed to he read once in its entirety roughly hum beginning to end.
in use, a use.r may enter the merchants website. and select a hook for download. Th server constructs a. one read book, I rbook, from a master copy of the book that is retained on a secure server. f he IrBook may only he decrypted by-a single. target reader and may only be read through a limited number of times (typically once) on thai-target reader.
f he IrBook may, for example, be held in any proprietary or ope.n source format so long as that fonriat allows the book to he held as a series of chscretc drunks (such as sections, chapters, pages or lines) and includes the necessary software for the presentation of and nav1gation of those chunks on the target reader.
in use the reader device keeps a pointer, which in the context of a one read hook can be thought of as a hookmark. and which is a. data. structure that idcntfes the readers current place in the hook.
The irRook may Rave embedded data dentfyig the number of times the hook may he read (typically once, the chunks kept behind the bookmark (i.e. portions which have already been read or consumed" and the number ol chunks decrypted ahead ot the bookmark. The unencrvpted chunks arc inferred to as the currenf chunks and the reader of the hook may view these at wilL This allows fiexibtljt on a per I rHook basis in die amount oflook ahead2 and look back2 that a reader is permitted when reading through the rBook.
The lrBook is, in use, read like any other eBook. When the reader passes a chunk boundary (by whatever means typically seroilng or selcel-ing "Next page'° or some such), chunks that have been read are deleted or reencrypted, This processing causes those portions which have been consumed to he made inaccessible, Similarly chunks that are yet to he read arc decrypted as necessary to ensure that the correct range of chunks are current.
Ii the reader aRcmnpts to access an encrypted ctiunk they may be provided wuli a "Uan1t read" page that may be specified witlu the irBook, The contents of this page would tzpicaily include options t) iiuchase another pay per read,PPR. of the book, a fid I electronic copy of the book, orto order a physical copy of the hook. A different page may opIonaily be presented fbr chunks already read and br chunks that have not vet Deen read.
Pay per read P11t advantageously uses a dual key encrypted exchange of inlormanon between tne supplier and the reader, Tnts assures that only the authorized reader can decrypt the trBook.
When the book is opened for reading, it is decrypted using the secret key associated with the reader. Such a key may be held in memor that is not normally accessible to users.
This encryption layer is distinct from the encryption used within the lrBook and does not consttutc part ot' this specifIcation although the reader public key is likely to be used by the encryption used within the IrBook to avoid unnecessary key generation.
Once the rBook is opened for reading. the bookmark key associated with the rBook decrypts the chunks of the hook that the bookmark identifies as current. The bookmark is protected such that it may be incremented bitt cannot be dccrerncnicd, or rot dccrcmentcd without a secure key, so the hook can be read in its entirety only once by the reader. If the book nay be read rnore'han once then ii is possiNe'o reset the bookmark to permit the specified number of reads after which the reset operation will fad displaying: the Cant rea& page (and in any event the material will have been deleted).
It is thus possible to provide a method of protecting electronic hooks from copying or 1mm unauthorized iiinltiple accesses.
Although the invention has been described in the context of a hook, it can he applied to any data kern, such as music or video.
Claims (8)
- CLAIMSA method of protecting a data item where, iii use, the data item is consumed in a sequence progressug hum a start to a finish, and wherein pOinter is maintained to show how much of the data item has been consumed, and wherein portions of the data item whrch have aLready been consumed are processed to make them inaccessible or to degrade them.
- 2 A method as clatmed in claim 1, in which portions that have been consumed by a user are deleted or encrypted.
- A methoa as clanned in claim 2, in w!ucn poilioris that exceea a trst threshold from the pointe.r are deleted or encrypted.
- 4 A method as claimed in claim 3. in which when the data item represents a book, the first threshold corresponds to a predetermined number of words, pages or chapters.
- A method as claimed in any of the preceding claims, in which the data. item is provtded in an encrypted form, and the encryption key associated with a user or a user device is recuirec1 to decrypt the dala item.
- 6 A method as claimed in any of the preceding claims in which a portion of the data item representing a "current region" is kept in unencrypted ibrm.
- 7 A method as claimed in any of the preceding claims in which the. data item is an electrouc representation of a book.
- 8 A method as claimed in any of the preceding claims in which the. data item is an audio or audiovisua item 9 A computer rograni for causing a programmable data proces.sor to operate in accordance with the method of any of claims ito 8.if) A data processor and dtspiay device arranged to allow a user to consume a dala item representing a hook, audio or audiovisua presentation, wherein the data rocessor is adapted to degrade portions of the data item wheh have airead been consumed.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0904966A GB2468862A (en) | 2009-03-24 | 2009-03-24 | A method of protecting electronic content by encryption or deletion of consumed portions |
| PCT/GB2010/050499 WO2010109237A1 (en) | 2009-03-24 | 2010-03-24 | A method of and apparatus for protecting a data item |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0904966A GB2468862A (en) | 2009-03-24 | 2009-03-24 | A method of protecting electronic content by encryption or deletion of consumed portions |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0904966D0 GB0904966D0 (en) | 2009-05-06 |
| GB2468862A true GB2468862A (en) | 2010-09-29 |
Family
ID=40640009
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0904966A Withdrawn GB2468862A (en) | 2009-03-24 | 2009-03-24 | A method of protecting electronic content by encryption or deletion of consumed portions |
Country Status (2)
| Country | Link |
|---|---|
| GB (1) | GB2468862A (en) |
| WO (1) | WO2010109237A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2983606A1 (en) * | 2011-12-02 | 2013-06-07 | France Telecom | Method for accessing digital content e.g. audio, in terminal, involves allowing digital contents to be changed before restitution when access rights are forfeited, and modifying access rights in progressive manner with each restitution |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1997022099A1 (en) * | 1995-12-14 | 1997-06-19 | Motorola Inc. | System and method for limiting access to a book card |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7336788B1 (en) * | 1992-12-09 | 2008-02-26 | Discovery Communicatoins Inc. | Electronic book secure communication with home subsystem |
| FR2816783B1 (en) * | 2000-11-10 | 2003-10-17 | Guillaume Dubost | ELECTRONIC DEVICE, COMPUTER SYSTEM, AND METHOD FOR THE INSTANT PROVISION OF AUDIOVISUAL DATA |
| EP2357651A3 (en) * | 2000-12-07 | 2013-06-26 | SanDisk Technologies Inc. | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media |
| US20080271076A1 (en) * | 2007-04-27 | 2008-10-30 | General Instrument Corporation | Method and Apparatus for Switching Between Edge Device Resources in an SDV System |
-
2009
- 2009-03-24 GB GB0904966A patent/GB2468862A/en not_active Withdrawn
-
2010
- 2010-03-24 WO PCT/GB2010/050499 patent/WO2010109237A1/en not_active Ceased
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1997022099A1 (en) * | 1995-12-14 | 1997-06-19 | Motorola Inc. | System and method for limiting access to a book card |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0904966D0 (en) | 2009-05-06 |
| WO2010109237A1 (en) | 2010-09-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8595488B2 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
| US8417966B1 (en) | System and method for measuring and reporting consumption of rights-protected media content | |
| US8826036B1 (en) | Ebook encryption using variable keys | |
| EP2188756B1 (en) | Device and method for a backup of rights objects | |
| US8359473B1 (en) | System and method for digital rights management using digital signatures | |
| US20090271319A1 (en) | Embedded Licenses for Content | |
| KR20070109813A (en) | Method for moving rights object and electronic apparatus | |
| US20150026456A1 (en) | Apparatus and method for managing digital copyright on epub-based content, and apparatus and method for providing epub-based content according to user's right | |
| JP2005536951A (en) | Apparatus, system, and method for securing digital documents in a digital device | |
| CN102073826A (en) | System and method for digital copyright management using lightweight digital watermark adding component | |
| CN101719209B (en) | General digital rights protection method on WINDOWS platform | |
| EP1596269A2 (en) | A system and method for rendering selective presentation of documents | |
| CN109145617B (en) | Block chain-based digital copyright protection method and system | |
| US20070014403A1 (en) | Controlling distribution of protected content | |
| US20080010468A1 (en) | Method and technique for enforcing transience and propagation constraints on data transmitted by one entity to another entity by means of data division and retention | |
| CN100561396C (en) | Method for modifying digital rights object and electronic device therefor | |
| JP2006244486A (en) | Method for forming right of use for item on bases of access right and computer readable medium | |
| CN102449638A (en) | Using a custom media library to secure digital media content | |
| CN105760719B (en) | Method and system for decrypting ciphertext data | |
| GB2468862A (en) | A method of protecting electronic content by encryption or deletion of consumed portions | |
| US20040123126A1 (en) | Method and apparatus for deterring piracy | |
| WO2001031419A1 (en) | User-known and personally valuable encryption key | |
| WO2011043171A1 (en) | Copyrighted work redistribution promotion system | |
| AU2006343229B2 (en) | A method for protecting digital content by encrypting and decrypting a memory card | |
| US9152636B2 (en) | Content protection system in storage media and method of the same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |