US20070100753A1 - Information terminal device and content backup method - Google Patents
Information terminal device and content backup method Download PDFInfo
- Publication number
- US20070100753A1 US20070100753A1 US11/610,318 US61031806A US2007100753A1 US 20070100753 A1 US20070100753 A1 US 20070100753A1 US 61031806 A US61031806 A US 61031806A US 2007100753 A1 US2007100753 A1 US 2007100753A1
- Authority
- US
- United States
- Prior art keywords
- data
- encrypted content
- item
- stored
- storage medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Definitions
- This invention relates to an information terminal device having a function of backing up encrypted content data to an external storage medium and a content backup method which performs the above backup operation.
- DRM 2 Digital Rights Management Version 2
- content and a rights object containing information indicating the right of decrypting the content and key information are distributed separately.
- the rights object is associated with the content by use of an ID (ContentID) attached to the content. Decrypting of the content is performed by referring to the correct rights object.
- the rights object is independently bound with the terminal or bound with the terminal and user identity module (UIM) which the user has, and a specification which prevents decryption on an other terminal or the like is defined in the rights object.
- UAM user identity module
- the backup of the content is defined as “Off device storage of contents and rights objects” section in the above specification and requirements that the right object which requires the status management for the stateful rights should not be output or the like are defined, however, the right object which does not requires the status management for the rights, e.g. stateless rights can be output or the like.
- the right object which does not requires the status management for the rights e.g. stateless rights can be output or the like.
- technical information about the concrete storage method is not defined.
- the content and rights objects can be contained in different files in a file structural form and are separated on a file system. Therefore, in order to restore content and rights objects from an external storage medium in which plural sets of content and rights objects are backed up to an information terminal device, it becomes necessary to search for an ID which is used to recognize the correspondence relationship between the content and the rights objects.
- an information terminal device which deals with encrypted content data and rights data described in association with a right which decrypt the content data
- the device comprising: generating means which generates management data in which the correspondence relationship between the content data and the rights data is described when the content data and rights data are stored in an external storage medium, and write means which writes the content data, rights data and management data into the external storage medium.
- a content backup method which backs up encrypted content data and rights data described in association with a right which decrypt the content data into an external storage medium, the method comprising: generating management data in which the correspondence relationship between the content data and the rights data is described when the content data and rights data are backed up to the external storage medium, and writing the content data, rights data and management data into the external storage medium.
- FIG. 1 is a block diagram showing the configuration of the main portion of an information terminal device according to one embodiment of this invention
- FIG. 2 is a flowchart showing the processing procedure of a backup section in FIG. 1 ;
- FIG. 3 is a diagram showing one example of the storage state of data in an external media card of FIG. 1 ;
- FIG. 4 is a diagram showing one example of the storage state of data in the external media card of FIG. 1 ;
- FIG. 5 is a diagram showing one example of the storage state of data in the external media card of FIG. 1 ;
- FIG. 6 is a diagram showing one example of the storage state of data in the external media card of FIG. 1 ;
- FIG. 7 is a diagram showing a modification of an associated entry number in the external media card of FIG. 1 ;
- FIG. 8 is a diagram showing a modification of the associated entry number in the external media card of FIG. 1 ;
- FIG. 9 is a diagram showing a modification of the associated entry number in the external media card of FIG. 1 ;
- FIG. 10 is a diagram showing a modification of the associated entry number in the external media card of FIG. 1 .
- FIG. 1 is a block diagram showing the configuration of the main portion of an information terminal device 1 according to the present embodiment.
- the information terminal device 1 includes a communicating section 11 , content downloading section 12 , rights object downloading section 13 , internal memory 14 , management information generating section 15 , backup section 16 , card interface section 17 and restore section 18 .
- the information terminal device 1 can use an existing mobile telephone unit as basic hardware, for example.
- the content downloading section 12 , rights object downloading section 13 , management information generating section 15 , backup section 16 and restore section 18 can be realized by causing a processor mounted in the mobile telephone unit to execute a program.
- the information terminal device 1 can be realized by previously installing the program in the mobile telephone unit or realized by recording the program in a removable storage medium such as a memory card or distributing the program via a network and adequately installing the program in the mobile telephone unit.
- a storage device such as a RAM or flash memory provided in the mobile telephone unit can be utilized.
- the communicating section 11 makes communication via a network 2 containing a mobile communication network and the Internet, for example.
- the content downloading section 12 accesses a content issuing server 3 via the communicating section 11 and network 2 and downloads a digital content format (DCF) container.
- the DCF container contains content data in a format corresponding to the specification of OMA DRM 2 .
- ContentID is attached as a content ID.
- the rights object downloading section 13 accesses a rights issuing server 4 via the communicating section 11 and network 2 and downloads a rights object.
- rights data indicating the rights used to decrypt the content data received in the DCF container, and key data to decrypt the content data, are described.
- the internal memory 14 stores the DCF container and rights objects.
- the management information generating section 15 When the DCF container and rights objects stored in the internal memory 14 are backed up to the external media card 5 , the management information generating section 15 generates management information associated with the DCF container and rights objects to be backed up.
- the backup section 16 performs a process to write the DCF container and rights objects stored in the internal memory 14 to the external media card 5 via the card interface section 17 .
- the external media card 5 can be freely mounted in the card interface section 17 and a data write operation into the external media card 5 and a data read operation from the external media card 5 can be performed via the card interface section 17 .
- the restore section 18 acquires the DCF container and rights objects backed up to the external media card 5 via the card interface section 17 and restore the same to the internal memory 14 .
- the content downloading section 12 accesses the content issuing server 3 to download the DCF content and store the DCF content in the internal memory 14 .
- the thus downloaded DCF container is bound with the information terminal device and stored according to the specification of the OMA DRM 2 .
- the rights object downloading section 13 accesses the rights issuing server 4 to download the rights object.
- the information terminal device 1 transfers identification information indicating the information terminal device 1 to the rights issuing server 4 .
- the rights issuing server 4 encrypts the rights object by use of a public key of the information terminal device 1 .
- the rights object downloading section 13 stores the rights object in the internal memory 14 .
- the backup section 16 When the DCF container and the rights object corresponding to the DCF container are stored in the internal memory 14 and if the user requires to back up the DCF container and rights object, the backup section 16 performs a process as shown in FIG. 2 .
- step ST 1 the backup section 16 requests the management information generating section 15 to generate management information and acquires the thus generated management information from the management information generating section 15 .
- the operation for generating the management information by the management information generating section 15 is explained later.
- step ST 2 the backup section 16 searches management information already backed up in the external media card 5 for a DCF container having the same ContentID as a DCF container which is to be backed up.
- the above process may be performed by searching DCF containers backed up in the external media card 5 for a DCF container having the same ContentID as a DCF container which is to be backed up.
- step ST 3 the backup section 16 checks whether or not a corresponding DCF container is detect.
- step ST 4 the backup section 16 reads out the DCF container which is to be backed up in the present cycle from the internal memory 14 and writes a DCF file having attribute information or the like attached to the DCF container into the external media card 5 via the card interface section 17 . After this, the process of the backup section 16 proceeds to step ST 5 .
- step ST 2 If the corresponding DCF container is detected by the search process in step ST 2 , the process by the backup section 16 proceeds from step ST 3 to ST 5 . That is, in this case, the backup section 16 bypasses step ST 4 .
- step ST 5 the backup section 16 reads out a rights object which is to be backed up in the present cycle from the internal memory 14 and writes a rights file having attribute information or the like attached to the rights object into the external media card 5 via the card interface section 17 .
- the backup section 16 adds management information acquired in step ST 1 to the management file of the external media card 5 via the card interface section 17 in step ST 6 .
- the backup section 16 terminates the process of FIG. 2 .
- One set of a DCF file ( 1 ) and rights file ( 1 ) and a corresponding management information item ( 1 ) as shown in FIG. 3 are stored in the external media card 5 by the above process when only one set of the DCF container and rights object is backed up in the external media card 5 .
- management information contains various items of an entry number, content ID, rights file name, DCF file name, associated entry number and bind ID.
- an identification number issued to distinguish the management information from other management information items stored in the external media card 5 is described.
- ControlID attached to the DCF controller to be managed is described.
- a name attached to the rights file to be managed is described.
- a name attached to the DCF file having a DCF container to be managed is described.
- an entry number of another management information item which deals with a DCF container to be managed as a to-be-managed object is described.
- bind ID a terminal ID attached to the information terminal device with which the DCF container to be managed is bound is described.
- the management information generating section 15 describes “1” as the entry number, “CID( 1 )” which is ContentID of the DCF container ( 1 ) as the content ID, “RO( 1 )” which is the name of the rights file ( 1 ) as the rights file name, “DCF( 1 ) which is the name of the DCF file ( 1 ) containing the DCF container ( 1 ) as the DCF file name, “0” indicating that associated management information is not present as the associated entry number and “TID( 1 ) which is a terminal ID attached to the information terminal device 1 as the bind ID to generate management information as shown in the drawing.
- the external media card 5 can be removably mounted in the card interface section 17 , it can be removed from the information terminal device 1 , mounted in another information terminal device and used.
- a DCF container ( 2 ) and rights object ( 2 ) are newly backed up to the external media card 5 set in the state shown in FIG. 3 by use of an information terminal device having “TID( 2 )” attached thereto as the terminal ID.
- a DCF file ( 2 ) containing a DCF container ( 2 ) as shown in FIG. 4 is additionally stored in the external media card 5 and a rights file ( 2 ) containing a rights object ( 2 ) is stored in the external media card 5 .
- management information ( 2 ) which is formed in the same manner as the management information ( 1 ) in relation to the DCF container ( 2 ) and rights file ( 2 ) is added to the management file.
- “TID( 2 )” is described as the terminal ID.
- the associated entry number in the management information ( 3 ) “1,” which is the entry number of the management information ( 1 ) is described. Further, the associated entry number of the management information ( 1 ) is updated to “3,” which is the entry number of the management information ( 3 ).
- the associated entry number of the management information which is last generated among the management information items is dealt with as the entry number of the management information which is generated at the earliest time.
- the entry numbers of the other management information items the entry numbers of the management information items which are generated next to the respective management information items may be used. More specifically, if the management information ( 4 ) associated with the DCF container ( 1 ) is additionally provided in the state shown in FIG. 5 , the associated entry number of the management information ( 1 ) is set to “3”, the associated entry number of the management information ( 3 ) is set to “4” and the associated entry number of the management information ( 4 ) is set to “1” as shown in FIG. 6 .
- the associated entry number of the management information which is last added is set to “0” and the management information can be indicated as the last management information. More specifically, if the management information ( 4 ) associated with the DCF container ( 1 ) is additionally provided in the state shown in FIG. 5 , the associated entry number of the management information ( 1 ) is set to “3”, the associated entry number of the management information ( 3 ) is set to “4” and the associated entry number of the management information ( 4 ) is set to “0” as shown in FIG. 7 .
- the associated entry number of the management information which is later generated can be dealt with as the entry number of the newest management information which is already generated. For example, if three management information items ( 1 ), ( 3 ), ( 4 ) associated with the DCF container ( 1 ) are provided and generated in this order, the associated entry number of the management information ( 1 ) is set to “0”, the associated entry number of the management information ( 3 ) is set to “1” and the associated entry number of the management information ( 4 ) is set to “3” as shown in FIG. 8 .
- the associated entry number of the management information which is later generated is set as the entry number of the newest management information which is already generated
- the associated entry number of the first management information can be set as the last added entry number. For example, if three management information items ( 1 ), ( 3 ), ( 4 ) associated with the DCF container ( 1 ) are provided and generated in this order, the associated entry number of the management information ( 1 ) is set to “4”, the associated entry number of the management information ( 3 ) is set to “1” and the associated entry number of the management information ( 4 ) is set to “3” as shown in FIG. 9 .
- the associated entry number of the management information ( 1 ) is set to “3, 4”
- the associated entry number of the management information ( 3 ) is set to “1, 4”
- the associated entry number of the management information ( 4 ) is set to “1, 3” as shown in FIG. 10 .
- the restore section 18 the correspondence relationship between the rights object and the DCF container backed up in the external media card 5 can be confirmed by referring to the management information stored in the external media card 5 . Therefore, it is not necessary to perform the search operation for ContentID contained in the rights object and DCF container when the restore section 18 restore data items.
- the restore section 18 it is possible to determine an information terminal device with which the DCF container and rights object are bound by determining the bind ID of the management information. Therefore, the restore section 18 can be prevented from erroneously restoring rights objects which are created for another information terminal device.
- the restore section 18 it is possible to determine that different rights objects are associated with the single DCF container by referring to the management information. Therefore, the restore section 18 can restore the single DCF container as a DCF container which is associated with the different rights objects. As a result, since the single DCF container can be prevented from being repetitively stored in the external media card 5 , the number of steps of the process for writing the DCF container to the external media card 5 can be reduced and the capacity of the external media card 5 can be effectively used.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
A management information generating section generates management information in which the correspondence between content data and rights data is described when a Digital Content Format container containing encrypted content data and a rights object described in association with a right to decrypt the content data are stored in an external media card. A backup section writes the Digital Content Format container, rights object and management information into the external media card.
Description
- The present application is a Divisional Application of U.S. application Ser. No. 10/946,528, filed Sep. 20, 2004, which is based upon and claims the benefit of priority from prior Japanese Patent Application No. 2004-160049, filed May 28, 2004, the entire contents of which are incorporated herein by reference.
- 1. Field of the Invention
- This invention relates to an information terminal device having a function of backing up encrypted content data to an external storage medium and a content backup method which performs the above backup operation.
- 2. Description of the Related Art
- In the Open Mobile Alliance (OMA), Digital Rights Management Version 2 (DRM 2) has released a specification for managing the right to decrypt or use encrypted content.
- According to the above specification, content and a rights object containing information indicating the right of decrypting the content and key information are distributed separately. The rights object is associated with the content by use of an ID (ContentID) attached to the content. Decrypting of the content is performed by referring to the correct rights object. The rights object is independently bound with the terminal or bound with the terminal and user identity module (UIM) which the user has, and a specification which prevents decryption on an other terminal or the like is defined in the rights object.
- The backup of the content is defined as “Off device storage of contents and rights objects” section in the above specification and requirements that the right object which requires the status management for the stateful rights should not be output or the like are defined, however, the right object which does not requires the status management for the rights, e.g. stateless rights can be output or the like. However, in the above specification, technical information about the concrete storage method is not defined.
- The content and rights objects can be contained in different files in a file structural form and are separated on a file system. Therefore, in order to restore content and rights objects from an external storage medium in which plural sets of content and rights objects are backed up to an information terminal device, it becomes necessary to search for an ID which is used to recognize the correspondence relationship between the content and the rights objects.
- Further, it is required to make an attempt to parse and check whether or not the rights objects backed up in the external storage device or medium are bound with the information terminal device into which the rights objects are to be restored.
- In a case where single content is separately acquired together with different rights objects, the capacity of the external storage device or medium is uselessly suppressed if the above content is repetitively stored in the external storage device.
- Under this condition, it is desired to efficiently back up content data and rights data such as content and rights objects in OMA
DRM 2. - According to first aspect of the present invention, there is provided an information terminal device which deals with encrypted content data and rights data described in association with a right which decrypt the content data, the device comprising: generating means which generates management data in which the correspondence relationship between the content data and the rights data is described when the content data and rights data are stored in an external storage medium, and write means which writes the content data, rights data and management data into the external storage medium.
- According to second aspect of the present invention, there is provided a content backup method which backs up encrypted content data and rights data described in association with a right which decrypt the content data into an external storage medium, the method comprising: generating management data in which the correspondence relationship between the content data and the rights data is described when the content data and rights data are backed up to the external storage medium, and writing the content data, rights data and management data into the external storage medium.
- Additional objects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out hereinafter.
- The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate presently preferred embodiments of the invention, and together with the general description given above and the detailed description of the preferred embodiments given below, serve to explain the principles of the invention.
-
FIG. 1 is a block diagram showing the configuration of the main portion of an information terminal device according to one embodiment of this invention; -
FIG. 2 is a flowchart showing the processing procedure of a backup section inFIG. 1 ; -
FIG. 3 is a diagram showing one example of the storage state of data in an external media card ofFIG. 1 ; -
FIG. 4 is a diagram showing one example of the storage state of data in the external media card ofFIG. 1 ; -
FIG. 5 is a diagram showing one example of the storage state of data in the external media card ofFIG. 1 ; -
FIG. 6 is a diagram showing one example of the storage state of data in the external media card ofFIG. 1 ; -
FIG. 7 is a diagram showing a modification of an associated entry number in the external media card ofFIG. 1 ; -
FIG. 8 is a diagram showing a modification of the associated entry number in the external media card ofFIG. 1 ; -
FIG. 9 is a diagram showing a modification of the associated entry number in the external media card ofFIG. 1 ; and -
FIG. 10 is a diagram showing a modification of the associated entry number in the external media card ofFIG. 1 . - There will now be described one embodiment of this invention with reference to the accompanying drawings.
-
FIG. 1 is a block diagram showing the configuration of the main portion of aninformation terminal device 1 according to the present embodiment. - As shown in
FIG. 1 , theinformation terminal device 1 according to the present embodiment includes a communicatingsection 11,content downloading section 12, rightsobject downloading section 13,internal memory 14, managementinformation generating section 15,backup section 16,card interface section 17 and restoresection 18. - The
information terminal device 1 can use an existing mobile telephone unit as basic hardware, for example. Thecontent downloading section 12, rightsobject downloading section 13, managementinformation generating section 15,backup section 16 and restoresection 18 can be realized by causing a processor mounted in the mobile telephone unit to execute a program. At this time, theinformation terminal device 1 can be realized by previously installing the program in the mobile telephone unit or realized by recording the program in a removable storage medium such as a memory card or distributing the program via a network and adequately installing the program in the mobile telephone unit. As theinternal memory 14, a storage device such as a RAM or flash memory provided in the mobile telephone unit can be utilized. - The communicating
section 11 makes communication via anetwork 2 containing a mobile communication network and the Internet, for example. - The content downloading
section 12 accesses a content issuingserver 3 via the communicatingsection 11 andnetwork 2 and downloads a digital content format (DCF) container. The DCF container contains content data in a format corresponding to the specification of OMADRM 2. To the DCF container, ContentID is attached as a content ID. - The rights
object downloading section 13 accesses arights issuing server 4 via the communicatingsection 11 andnetwork 2 and downloads a rights object. In the rights object, rights data, indicating the rights used to decrypt the content data received in the DCF container, and key data to decrypt the content data, are described. - The
internal memory 14 stores the DCF container and rights objects. - When the DCF container and rights objects stored in the
internal memory 14 are backed up to the external media card 5, the managementinformation generating section 15 generates management information associated with the DCF container and rights objects to be backed up. - The
backup section 16 performs a process to write the DCF container and rights objects stored in theinternal memory 14 to the external media card 5 via thecard interface section 17. - The external media card 5 can be freely mounted in the
card interface section 17 and a data write operation into the external media card 5 and a data read operation from the external media card 5 can be performed via thecard interface section 17. - The
restore section 18 acquires the DCF container and rights objects backed up to the external media card 5 via thecard interface section 17 and restore the same to theinternal memory 14. - Next, the operation of the information terminal device with the above configuration is explained.
- When the user requires to acquire content via a user interface (not shown), the
content downloading section 12 accesses thecontent issuing server 3 to download the DCF content and store the DCF content in theinternal memory 14. The thus downloaded DCF container is bound with the information terminal device and stored according to the specification of the OMADRM 2. - When the user requires to acquire a rights object via the user interface (not shown), the rights
object downloading section 13 accesses therights issuing server 4 to download the rights object. At this time, theinformation terminal device 1 transfers identification information indicating theinformation terminal device 1 to therights issuing server 4. Based on the information, therights issuing server 4 encrypts the rights object by use of a public key of theinformation terminal device 1. The rightsobject downloading section 13 stores the rights object in theinternal memory 14. - When the DCF container and the rights object corresponding to the DCF container are stored in the
internal memory 14 and if the user requires to back up the DCF container and rights object, thebackup section 16 performs a process as shown inFIG. 2 . - In step ST1, the
backup section 16 requests the managementinformation generating section 15 to generate management information and acquires the thus generated management information from the managementinformation generating section 15. The operation for generating the management information by the managementinformation generating section 15 is explained later. - In step ST2, the
backup section 16 searches management information already backed up in the external media card 5 for a DCF container having the same ContentID as a DCF container which is to be backed up. In this case, the above process may be performed by searching DCF containers backed up in the external media card 5 for a DCF container having the same ContentID as a DCF container which is to be backed up. In step ST3, thebackup section 16 checks whether or not a corresponding DCF container is detect. - If the corresponding DCF container is not detected, the process by the
backup section 16 proceeds from step ST3 to ST4. In step ST4, thebackup section 16 reads out the DCF container which is to be backed up in the present cycle from theinternal memory 14 and writes a DCF file having attribute information or the like attached to the DCF container into the external media card 5 via thecard interface section 17. After this, the process of thebackup section 16 proceeds to step ST5. - If the corresponding DCF container is detected by the search process in step ST2, the process by the
backup section 16 proceeds from step ST3 to ST5. That is, in this case, thebackup section 16 bypasses step ST4. - In step ST5, the
backup section 16 reads out a rights object which is to be backed up in the present cycle from theinternal memory 14 and writes a rights file having attribute information or the like attached to the rights object into the external media card 5 via thecard interface section 17. After this, thebackup section 16 adds management information acquired in step ST1 to the management file of the external media card 5 via thecard interface section 17 in step ST6. Then, thebackup section 16 terminates the process ofFIG. 2 . - One set of a DCF file (1) and rights file (1) and a corresponding management information item (1) as shown in
FIG. 3 are stored in the external media card 5 by the above process when only one set of the DCF container and rights object is backed up in the external media card 5. - As shown in
FIG. 3 , management information contains various items of an entry number, content ID, rights file name, DCF file name, associated entry number and bind ID. In the item of the entry number, an identification number issued to distinguish the management information from other management information items stored in the external media card 5 is described. In the item of the contents ID, ControlID attached to the DCF controller to be managed is described. In the item of the rights file name, a name attached to the rights file to be managed is described. In the item of the DCF file name, a name attached to the DCF file having a DCF container to be managed is described. In the item of the associated entry number, an entry number of another management information item which deals with a DCF container to be managed as a to-be-managed object is described. In the item of the bind ID, a terminal ID attached to the information terminal device with which the DCF container to be managed is bound is described. - In the example of
FIG. 3 , the managementinformation generating section 15 describes “1” as the entry number, “CID(1)” which is ContentID of the DCF container (1) as the content ID, “RO(1)” which is the name of the rights file (1) as the rights file name, “DCF(1) which is the name of the DCF file (1) containing the DCF container (1) as the DCF file name, “0” indicating that associated management information is not present as the associated entry number and “TID(1) which is a terminal ID attached to theinformation terminal device 1 as the bind ID to generate management information as shown in the drawing. - Since the external media card 5 can be removably mounted in the
card interface section 17, it can be removed from theinformation terminal device 1, mounted in another information terminal device and used. - Now, consider a case wherein a DCF container (2) and rights object (2) are newly backed up to the external media card 5 set in the state shown in
FIG. 3 by use of an information terminal device having “TID(2)” attached thereto as the terminal ID. In this case, a DCF file (2) containing a DCF container (2) as shown inFIG. 4 is additionally stored in the external media card 5 and a rights file (2) containing a rights object (2) is stored in the external media card 5. Further, management information (2) which is formed in the same manner as the management information (1) in relation to the DCF container (2) and rights file (2) is added to the management file. As shown inFIG. 4 , in the management information (2), “TID(2)” is described as the terminal ID. - Next, consider a case wherein the external media card 5 set in the state of
FIG. 4 is set back into theinformation terminal device 1 to newly back up the DCF container (1) and rights object (3). In this case, since the DCF container (1) is already stored in the external media card 5, only a rights file (3) containing the rights object (3) is stored in the external media card 5. Further, management information (3) which is formed in the same manner as the management information (1) in relation to the DCF container (1) and rights object (3) is additionally provided in the management file. The management information (1) and management information (3) are each associated with the same DCF container (1). Therefore, as the associated entry number in the management information (3), “1,” which is the entry number of the management information (1) is described. Further, the associated entry number of the management information (1) is updated to “3,” which is the entry number of the management information (3). - In a case where three or more management information items associated with the same DCF container are provided, the associated entry number of the management information which is last generated among the management information items is dealt with as the entry number of the management information which is generated at the earliest time. As the associated entry numbers of the other management information items, the entry numbers of the management information items which are generated next to the respective management information items may be used. More specifically, if the management information (4) associated with the DCF container (1) is additionally provided in the state shown in
FIG. 5 , the associated entry number of the management information (1) is set to “3”, the associated entry number of the management information (3) is set to “4” and the associated entry number of the management information (4) is set to “1” as shown inFIG. 6 . - Further, in the associated entry number specifying method, the associated entry number of the management information which is last added is set to “0” and the management information can be indicated as the last management information. More specifically, if the management information (4) associated with the DCF container (1) is additionally provided in the state shown in
FIG. 5 , the associated entry number of the management information (1) is set to “3”, the associated entry number of the management information (3) is set to “4” and the associated entry number of the management information (4) is set to “0” as shown inFIG. 7 . - On the other hand, the associated entry number of the management information which is later generated can be dealt with as the entry number of the newest management information which is already generated. For example, if three management information items (1), (3), (4) associated with the DCF container (1) are provided and generated in this order, the associated entry number of the management information (1) is set to “0”, the associated entry number of the management information (3) is set to “1” and the associated entry number of the management information (4) is set to “3” as shown in
FIG. 8 . - Further, when the associated entry number of the management information which is later generated is set as the entry number of the newest management information which is already generated, the associated entry number of the first management information can be set as the last added entry number. For example, if three management information items (1), (3), (4) associated with the DCF container (1) are provided and generated in this order, the associated entry number of the management information (1) is set to “4”, the associated entry number of the management information (3) is set to “1” and the associated entry number of the management information (4) is set to “3” as shown in
FIG. 9 . - Further, it is possible to indicate a plurality of entry numbers for the associated entry number of one management information item. For example, if three management information items (1), (3), (4) associated with the DCF container (1) are provided, the associated entry number of the management information (1) is set to “3, 4”, the associated entry number of the management information (3) is set to “1, 4” and the associated entry number of the management information (4) is set to “1, 3” as shown in
FIG. 10 . - Thus, in the restore
section 18, the correspondence relationship between the rights object and the DCF container backed up in the external media card 5 can be confirmed by referring to the management information stored in the external media card 5. Therefore, it is not necessary to perform the search operation for ContentID contained in the rights object and DCF container when the restoresection 18 restore data items. - Further, in the restore
section 18, it is possible to determine an information terminal device with which the DCF container and rights object are bound by determining the bind ID of the management information. Therefore, the restoresection 18 can be prevented from erroneously restoring rights objects which are created for another information terminal device. - Further, in the restore
section 18, it is possible to determine that different rights objects are associated with the single DCF container by referring to the management information. Therefore, the restoresection 18 can restore the single DCF container as a DCF container which is associated with the different rights objects. As a result, since the single DCF container can be prevented from being repetitively stored in the external media card 5, the number of steps of the process for writing the DCF container to the external media card 5 can be reduced and the capacity of the external media card 5 can be effectively used. - A case wherein the DCF container and rights object defined by
OMA DRM version 2 are applied as the content data and rights data is shown as an example. However, the same process can be performed when content data and rights data which are not so defined are processed. - Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details and representative embodiments shown and described herein. Accordingly, various modifications may be made without departing from the spirit or scope of the general invention concept as defined by the appended claims and their equivalents.
Claims (18)
1. A removable storage medium which stores encrypted content data and rights data used for decrypting the encrypted content data, wherein the encrypted content data and the rights data are managed by an information terminal, said removable storage medium comprising:
a first area which stores an item of encrypted content data based on a request from the information terminal;
a second area which stores an item of rights data based on a request from the information terminal; and
a third area which stores one of first management data and second management data based on a request from the information terminal, wherein the first management data is generated by the information terminal when it is detected that the same encrypted content as an item of encrypted content data to be stored is not stored on the removable storage medium, and the first management data includes first identification information identifying the item of encrypted content data to be stored and second identification information identifying a corresponding item of rights data, and wherein the second management data is generated by the information terminal when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium, and the second management data includes third identification information identifying the item of encrypted content data already stored on the removable storage medium and the second identification information identifying the item of rights data.
2. The removable storage medium according to claim 1 , wherein both the first management data and the second management data include fourth identification information identifying the information terminal.
3. The removable storage medium according to claim 1 , wherein the second management data includes relational information that identifies a previously stored one of the first management data and the second management data.
4. A removable storage medium which stores encrypted content data and rights data used for decrypting the encrypted content data, wherein the encrypted content data and the rights data are managed by an information terminal, said removable storage medium comprising:
a first area which stores an item of encrypted content data transmitted from the information terminal;
a second area which stores an item of rights data transmitted from the information terminal; and
a third area which stores one of first management data and second management data transmitted from the information terminal, wherein the first management data is generated by the information terminal when it is detected that the same encrypted content as an item of encrypted content data to be stored is not stored on the removable storage medium, and the first management data includes first identification information identifying the item of encrypted content data to be stored and second identification information identifying a corresponding item of rights data, and wherein the second management data is generated by the information terminal when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium, and the second management data includes third identification information identifying the item of encrypted content data already stored on the removable storage medium and the second identification information identifying the item of rights data.
5. The removable storage medium according to claim 4 , wherein both the first management data and the second management data include fourth identification information identifying the information terminal.
6. The removable storage medium according to claim 4 , wherein the second management data includes relational information that identifies a previously stored one of the first management data and the second management data.
7. A removable storage medium which stores encrypted content data and rights data used for decrypting the encrypted content data, wherein the encrypted content data and the rights data are managed by an information terminal, said removable storage medium comprising:
means for storing an item of encrypted content data based on a request from the information terminal;
means for storing an item of rights data based on a request from the information terminal; and
means for storing one of first management data and second management data based on a request from the information terminal, wherein the first management data is generated by the information terminal when it is detected that the same encrypted content as an item of encrypted content data to be stored is not stored on the removable storage medium, and the first management data includes first identification information identifying the item of encrypted content data to be stored and second identification information identifying a corresponding item of rights data, and wherein the second management data is generated by the information terminal when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium, and the second management data includes third identification information identifying the item of encrypted content data already stored on the removable storage medium and the second identification information identifying the item of rights data.
8. The removable storage medium according to claim 7 , wherein both the first management data and the second management data include fourth identification information identifying the information terminal.
9. The removable storage medium according to claim 7 , wherein the second management data includes relational information that identifies a previously stored one of the first management data and the second management data.
10. A removable storage medium which stores encrypted content data and rights data used for decrypting the encrypted content data, wherein the encrypted content data and the rights data are managed by an information terminal, said removable storage medium comprising:
means for storing an item of encrypted content data transmitted from the information terminal;
means for storing an item of rights data transmitted from the information terminal; and
means for storing one of first management data and second management data transmitted from the information terminal, wherein the first management data is generated by the information terminal when it is detected that the same encrypted content as an item of encrypted content data to be stored is not stored on the removable storage medium, and the first management data includes first identification information identifying the item of encrypted content data to be stored and second identification information identifying a corresponding item of rights data, and wherein the second management data is generated by the information terminal when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium, and the second management data includes third identification information identifying the item of encrypted content data already stored on the removable storage medium and the second identification information identifying the item of rights data.
11. The removable storage medium according to claim 10 , wherein both the first management data and the second management data include fourth identification information identifying the information terminal.
12. The removable storage medium according to claim 10 , wherein the second management data includes relational information that identifies a previously stored one of the first management data and the second management data.
13. A method of storing, on a removable storage medium, encrypted content data and rights data used for decrypting the encrypted content data, wherein the encrypted content data and the rights data are managed by an information terminal, said method comprising:
storing, on the removable storage medium, one of first management data and second management data based on a request from the information terminal, wherein the first management data is generated by the information terminal when it is detected that the same encrypted content as an item of encrypted content to be stored is not stored on the removable storage medium, and the first management data includes first identification information identifying the item of encrypted content data to be stored and second identification information identifying a corresponding item of rights data, and wherein the second management data is generated by the information terminal when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium, and the second management data includes third identification information identifying the item of encrypted content data already stored on the removable storage medium and the second identification information identifying the item of rights data;
storing on the removable storage medium, based on a request from the information terminal, the item of encrypted content data to be stored, when it is detected that the same encrypted content as an item of encrypted content to be stored is not stored on the removable storage medium, and not storing the item of encrypted content data, when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium; and
storing on the removable storage medium, based on a request from the information terminal, the item of rights data corresponding to the item of encrypted content data to be stored.
14. The removable storage medium according to claim 13 , wherein both the first management data and the second management data include fourth identification information identifying the information terminal.
15. The removable storage medium according to claim 13 , wherein the second management data includes relational information that identifies a previously stored one of the first management data and the second management data.
16. A method of storing, on a removable storage medium, encrypted content data and rights data used for decrypting the encrypted content data, wherein the encrypted content data and the rights data are managed by an information terminal, said method comprising:
storing, on the removable storage medium, one of first management data and second management data transmitted from the information terminal, wherein the first management data is generated by the information terminal when it is detected that the same encrypted content as an item of encrypted content to be stored is not stored on the removable storage medium, and the first management data includes first identification information identifying the item of encrypted content data to be stored and second identification information identifying a corresponding item of rights data, and wherein the second management data is generated by the information terminal when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium, and the second management data includes third identification information identifying the item of encrypted content data already stored on the removable storage medium and the second identification information identifying the item of rights data;
storing, on the removable storage medium, the item of encrypted content data to be stored, which is transmitted from the information terminal, when it is detected that the same encrypted content as an item of encrypted content to be stored is not stored on the removable storage medium, and not storing the item of encrypted content data, when it is detected that the same encrypted content as the item of encrypted content data to be stored is stored on the removable storage medium; and
storing, on the removable storage medium, the item of rights data which corresponds to the item of encrypted content data to be stored and which is transmitted from the information terminal.
17. The removable storage medium according to claim 16 , wherein both the first management data and the second management data include fourth identification information identifying the information terminal.
18. The removable storage medium according to claim 16 , wherein the second management data includes relational information that identifies a previously stored one of the first management data and the second management data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/610,318 US20070100753A1 (en) | 2004-05-28 | 2006-12-13 | Information terminal device and content backup method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-160049 | 2004-05-28 | ||
JP2004160049A JP4213628B2 (en) | 2004-05-28 | 2004-05-28 | Information terminal equipment |
US10/946,528 US7181628B2 (en) | 2004-05-28 | 2004-09-20 | Information terminal device and content backup method |
US11/610,318 US20070100753A1 (en) | 2004-05-28 | 2006-12-13 | Information terminal device and content backup method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/946,528 Division US7181628B2 (en) | 2004-05-28 | 2004-09-20 | Information terminal device and content backup method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070100753A1 true US20070100753A1 (en) | 2007-05-03 |
Family
ID=34930574
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/946,528 Expired - Fee Related US7181628B2 (en) | 2004-05-28 | 2004-09-20 | Information terminal device and content backup method |
US11/610,318 Abandoned US20070100753A1 (en) | 2004-05-28 | 2006-12-13 | Information terminal device and content backup method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/946,528 Expired - Fee Related US7181628B2 (en) | 2004-05-28 | 2004-09-20 | Information terminal device and content backup method |
Country Status (5)
Country | Link |
---|---|
US (2) | US7181628B2 (en) |
EP (1) | EP1601214B1 (en) |
JP (1) | JP4213628B2 (en) |
CN (1) | CN100369004C (en) |
DE (1) | DE602004011604T2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223361A1 (en) * | 2007-10-15 | 2010-09-02 | Nxp B.V. | Method and service provider for managing expired or consumed applications being stored in mobile communication devices |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8156074B1 (en) | 2000-01-26 | 2012-04-10 | Synchronoss Technologies, Inc. | Data transfer and synchronization system |
US7505762B2 (en) * | 2004-02-27 | 2009-03-17 | Fusionone, Inc. | Wireless telephone data backup system |
US8620286B2 (en) | 2004-02-27 | 2013-12-31 | Synchronoss Technologies, Inc. | Method and system for promoting and transferring licensed content and applications |
US6671757B1 (en) | 2000-01-26 | 2003-12-30 | Fusionone, Inc. | Data transfer and synchronization system |
US7895334B1 (en) | 2000-07-19 | 2011-02-22 | Fusionone, Inc. | Remote access communication architecture apparatus and method |
US8073954B1 (en) | 2000-07-19 | 2011-12-06 | Synchronoss Technologies, Inc. | Method and apparatus for a secure remote access system |
US7818435B1 (en) | 2000-12-14 | 2010-10-19 | Fusionone, Inc. | Reverse proxy mechanism for retrieving electronic content associated with a local network |
US8615566B1 (en) | 2001-03-23 | 2013-12-24 | Synchronoss Technologies, Inc. | Apparatus and method for operational support of remote network systems |
JP4347123B2 (en) * | 2003-05-02 | 2009-10-21 | キヤノン株式会社 | Document processing system, document processing method, computer-readable storage medium, and program |
WO2005010715A2 (en) | 2003-07-21 | 2005-02-03 | Fusionone, Inc. | Device message management system |
US7302290B2 (en) * | 2003-08-06 | 2007-11-27 | Inovise, Medical, Inc. | Heart-activity monitoring with multi-axial audio detection |
US9542076B1 (en) | 2004-05-12 | 2017-01-10 | Synchronoss Technologies, Inc. | System for and method of updating a personal profile |
JP2008500750A (en) | 2004-05-12 | 2008-01-10 | フュージョンワン インコーポレイテッド | Advanced contact identification system |
JP4131964B2 (en) * | 2004-12-10 | 2008-08-13 | 株式会社東芝 | Information terminal equipment |
KR100666941B1 (en) * | 2005-01-07 | 2007-01-11 | 삼성전자주식회사 | How to manage duplicate downloads for the same content |
KR100765318B1 (en) | 2005-08-01 | 2007-10-09 | 삼성전자주식회사 | Digital rights management system using rights object encryption and its method |
US20070288752A1 (en) * | 2006-06-08 | 2007-12-13 | Weng Chong Chan | Secure removable memory element for mobile electronic device |
US7676615B2 (en) * | 2006-08-21 | 2010-03-09 | Panasonic Corporation | Contents data storage device and contents data update system |
CN1976517B (en) * | 2006-11-30 | 2010-08-11 | 华为技术有限公司 | mobile terminal |
JP4213754B2 (en) * | 2007-02-13 | 2009-01-21 | 株式会社東芝 | Information terminal equipment |
KR101404051B1 (en) * | 2007-06-18 | 2014-06-11 | 삼성전자주식회사 | Method and apparatus for preventing unauthorized use of digital rights management contents in portable terminals |
MX2010001683A (en) | 2007-08-17 | 2010-03-18 | Fraunhofer Ges Forschung | Device and method for a backup of rights objects. |
KR101453464B1 (en) * | 2007-11-09 | 2014-10-21 | 삼성전자주식회사 | Apparatus and method for management of contents right object in mobile communication terminal |
US8181111B1 (en) | 2007-12-31 | 2012-05-15 | Synchronoss Technologies, Inc. | System and method for providing social context to digital activity |
US9075957B2 (en) * | 2008-08-04 | 2015-07-07 | Sandisk Il Ltd. | Backing up digital content that is stored in a secured storage device |
US8255006B1 (en) | 2009-11-10 | 2012-08-28 | Fusionone, Inc. | Event dependent notification system and method |
US8943428B2 (en) | 2010-11-01 | 2015-01-27 | Synchronoss Technologies, Inc. | System for and method of field mapping |
JP6294021B2 (en) * | 2013-07-23 | 2018-03-14 | コイト電工株式会社 | Signal control apparatus and history data storage method |
US11681781B2 (en) * | 2018-02-21 | 2023-06-20 | Comcast Cable Communications, Llc | Systems and methods for content security |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4677653A (en) * | 1986-06-16 | 1987-06-30 | B/W Investments | Cellular mobile phone with a plurality of accessing telephone numbers for allowing access to the mobile phone by any one of the telephone numbers |
US20020194355A1 (en) * | 2001-04-19 | 2002-12-19 | Toshihiro Morita | Information processing apparatus and method, information processing system using the same, and recording medium and program used therewith |
US20030074569A1 (en) * | 2001-04-12 | 2003-04-17 | Kenichi Yamauchi | Data backup method and storage medium for use with content reproduction apparatus |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7426750B2 (en) * | 2000-02-18 | 2008-09-16 | Verimatrix, Inc. | Network-based content distribution system |
WO2001076126A1 (en) * | 2000-03-31 | 2001-10-11 | Sanyo Electric Co., Ltd. | Recorder and data distributing system comprising the same |
US7827112B2 (en) * | 2001-03-01 | 2010-11-02 | Sony Corporation | Digital signal processing apparatus, digital signal processing method, information center, and data delivery system |
JP3895940B2 (en) * | 2001-03-27 | 2007-03-22 | 三洋電機株式会社 | Information terminal equipment |
FR2824694B1 (en) * | 2001-05-14 | 2003-10-03 | Cit Alcatel | METHOD FOR MANAGING DATA STORED IN THE MEMORY OF A SIM CARD OF MOBILE EQUIPMENT |
KR20040007621A (en) * | 2001-05-29 | 2004-01-24 | 마쯔시다덴기산교 가부시키가이샤 | Rights management unit |
US7395245B2 (en) * | 2001-06-07 | 2008-07-01 | Matsushita Electric Industrial Co., Ltd. | Content usage management system and server used in the system |
EP1386493A1 (en) * | 2001-07-31 | 2004-02-04 | Matsushita Electric Industrial Co., Ltd. | System, apparatus, and method of contents distribution, and program and program recording medium directed to the same |
US20030079133A1 (en) * | 2001-10-18 | 2003-04-24 | International Business Machines Corporation | Method and system for digital rights management in content distribution application |
US7620820B2 (en) * | 2002-04-02 | 2009-11-17 | Sony Corporation | Content data processing method, recording device, and reproduction device |
US7502945B2 (en) * | 2002-06-28 | 2009-03-10 | Microsoft Corporation | Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system |
JP4213754B2 (en) * | 2007-02-13 | 2009-01-21 | 株式会社東芝 | Information terminal equipment |
-
2004
- 2004-05-28 JP JP2004160049A patent/JP4213628B2/en not_active Expired - Fee Related
- 2004-08-17 DE DE602004011604T patent/DE602004011604T2/en not_active Expired - Lifetime
- 2004-08-17 EP EP04254931A patent/EP1601214B1/en not_active Expired - Lifetime
- 2004-09-20 US US10/946,528 patent/US7181628B2/en not_active Expired - Fee Related
- 2004-09-27 CN CNB200410082693XA patent/CN100369004C/en not_active Expired - Fee Related
-
2006
- 2006-12-13 US US11/610,318 patent/US20070100753A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4677653A (en) * | 1986-06-16 | 1987-06-30 | B/W Investments | Cellular mobile phone with a plurality of accessing telephone numbers for allowing access to the mobile phone by any one of the telephone numbers |
US20030074569A1 (en) * | 2001-04-12 | 2003-04-17 | Kenichi Yamauchi | Data backup method and storage medium for use with content reproduction apparatus |
US20020194355A1 (en) * | 2001-04-19 | 2002-12-19 | Toshihiro Morita | Information processing apparatus and method, information processing system using the same, and recording medium and program used therewith |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223361A1 (en) * | 2007-10-15 | 2010-09-02 | Nxp B.V. | Method and service provider for managing expired or consumed applications being stored in mobile communication devices |
US8495175B2 (en) * | 2007-10-15 | 2013-07-23 | Nxp B.V. | Method and service provider for managing expired or consumed applications being stored in mobile communication devices |
US9329853B2 (en) | 2007-10-15 | 2016-05-03 | Nxp B.V. | Method and service provider for managing expired or consumed applications being stored in mobile communication devices |
Also Published As
Publication number | Publication date |
---|---|
EP1601214A1 (en) | 2005-11-30 |
CN100369004C (en) | 2008-02-13 |
EP1601214B1 (en) | 2008-01-30 |
US7181628B2 (en) | 2007-02-20 |
US20050267846A1 (en) | 2005-12-01 |
CN1702626A (en) | 2005-11-30 |
DE602004011604D1 (en) | 2008-03-20 |
JP2005339391A (en) | 2005-12-08 |
JP4213628B2 (en) | 2009-01-21 |
DE602004011604T2 (en) | 2009-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070100753A1 (en) | Information terminal device and content backup method | |
US20220407725A1 (en) | File storage method, terminal, and storage medium | |
US8321352B1 (en) | Fingerprinting for software license inventory management | |
US9451203B2 (en) | Downloading file reception process | |
US7853704B2 (en) | Content acquisition method | |
US7424034B2 (en) | Information converting apparatus | |
US10204235B2 (en) | Content item encryption on mobile devices | |
EP1698991A2 (en) | Method and computer-readable medium for generating usage rights for an item based upon access rights | |
KR20080005571A (en) | Apparatus, Method, and System for Recovering Files | |
US20040133632A1 (en) | Method and apparatus for supporting multiple digital-rights management systems | |
JP2000200208A (en) | File backup method, apparatus and program recording medium thereof | |
US9311633B2 (en) | Digital file processing for secondary sale | |
CN113641384B (en) | Method, device and system for upgrading management of probe | |
JP2002049436A (en) | Software download system | |
CN118689883A (en) | A method and device for updating supervision object data | |
US20240414014A1 (en) | Device for providing blockchain did-based multi cloud service and its operating method | |
WO2006031042A1 (en) | Method and apparatus for retrieving rights object from portable storage device using object identifier | |
CN114238240B (en) | Distributed multi-cluster data storage method and device and storage medium | |
US8850604B2 (en) | Content receiver, license server, content utilization system, and content viewing time limit management method | |
JP4213754B2 (en) | Information terminal equipment | |
CN114139119A (en) | User right management method, device, electronic equipment, medium and program product | |
JP3972593B2 (en) | IDENTIFICATION INFORMATION MANAGEMENT DEVICE, COMPUTER DATA COMMUNICATION SYSTEM, AND PROGRAM | |
EP2034420A1 (en) | A method and an apparatus for operating right | |
JP2023085225A (en) | Storing and retrieving media recordings in object store | |
CN110244976A (en) | Application program version switching method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |