1. Field of the Invention
The disclosure relates generally to digital content management, and, more particularly to systems and methods that enhance the digital rights management for digital content, and related production methods for digital content.
2. Description of the Related Art
With electronic devices, such as computers or portable devices, being popular, digital content has become a major data recording type for the devices due to increased convenience of digital content. Moreover, content providers have been devoted to develop related applications for digital content. Since it is easy to copy and broadcast digital content, the DRM (Digital Rights Management) and the mass production of preloading for digital content has become one of the major developmental areas in the digital content management art.
In a conventional digital rights management mechanism, digital content can be stored in a hidden area of a memory device, and an application can be stored in a public area of the memory device. Additionally, an activation key is produced for the memory device, and stored in the hidden area of the memory device. Since the digital content is in the hidden area, users will not have direct access of the digital content. The digital content in the hidden area must be accessed via the application using the activation key.
In another conventional digital content management system, a key and a serial code are preloaded in a hidden area of a medium, such as a VCD, DVD, or SD card; while digital content are DRM treated, such as encrypted, and stored in public area of storing medium. When an end device, such as an MP3/MP4 player, or PDA wants to access content in the medium, it is determined whether or not the serial code is legally authorized. If the serial code is legally authorized, the content is decrypted using the key, and then accessed. In this manner, the management system requires involvement and handshaking of the end device and the content provider as only authorized end device manufacturer has the access of the key and the serial code. Thus, the management system is unpractical as the benefits of the two parties might not be the same.
Based on the above digital rights management mechanism, the production method for digital content in the art is to first provide the digital content and the application to a software processing team. The software processing team bundles the digital content and the application, and respectively generates an activation key for each production copy of the digital content. Then, the digital contents, the applications, and the corresponding activation keys are provided to a manufacturer. The manufacturer correspondingly performs a preloading procedure for mass production of the digital content. During the preloading procedure, the digital contents in the respective memory devices are encrypted, and the corresponding activation keys are respectively stored to the respective memory devices.
It is understood that since related data (the digital content, the application, and the corresponding activation key) is not protected when it is provided to the manufacturer for the preloading procedure, the related data can be easily copied or stolen, resulting in a deficiency in the digital rights management. Additionally, since the activation keys for the respective preloading copies of the digital content are different, the preloading procedures for the respective preloading copies must be performed separately, thus reducing the efficiency of the preloading procedures.
Digital content management systems and methods are provided.
An embodiment of a digital content management system comprises a management unit and a preloading unit. The management unit composes and encrypts one or multiple digital contents to obtain encrypted digital contents. The preloading unit obtains the encrypted digital contents, and stores the encrypted digital contents to at least one storage device. After the preloading unit stores the encrypted digital contents to the at least one storage device, the management unit respectively stores different dedicated identification data representing the digital content to the at least one storage device.
In an embodiment of a digital content management method, one or multiple digital contents are first composed and encrypted to obtain encrypted digital contents. Then, the encrypted digital contents are copied and stored to at least one storage device. After the encrypted digital contents are stored to the at least one storage device, different dedicated identification data representing the digital content is respectively stored to the at least one storage device.
In an embodiment of a digital content management method, identification data in a storage device is authenticated via a network. When the authentication of the identification data passes, a decryption mechanism is activated to decrypt encrypted digital content in the storage device to obtain the complete digital content for access or use.
In an embodiment of a preloading production method for use in a content processing end and a preloading end for mass production of the at least one digital content, the content processing end composes and encrypts at least one digital content to obtain the encrypted digital content. The content processing end produces a mother disc using the encrypted digital content, and provides the mother disc to the preloading end. Then, the preloading end copies the content of the mother disc to one or multiple preloading devices. After the content of the mother disc is copied to the preloading device, the preloading end transmits the mother disc to the content processing end. The preloading end performs a preloading procedure via the preloading device according to the content of the mother disc, thus to copy the content of the mother disc to the at least one storage device. When the preloading procedure is completed, the preloading end removes the content of the mother disc from the preloading device, and transmits the storage device to the content processing end. Then, the content processing end respectively stores identification data to the storage device.
Digital content management methods may take the form of a program code embodied in a tangible media. When the program code is loaded into and executed by a machine, the machine becomes an apparatus for practicing the disclosed method.
The invention will become more fully understood by referring to the following detailed description with reference to the accompanying drawings, wherein:
Digital content management systems and methods are provided.
The digital content management system 100 comprises a management unit 110 and a preloading unit 120. The management unit 110 can compose and encrypt one or multiple digital contents (not shown) and/or an application module (not shown). It is noted that any encryption mechanism can be applied in the application. It is understood that, in some embodiments, the application module can be used to access or use the digital contents. The management unit 110 can generate different identification data for the respective copies of the digital contents. The preloading unit 120 can copy and store the digital contents to at least one storage device, such as a flash memory/card. It is understood that, in some embodiments, the management unit 110 and the preloading unit 120 can be located in an electronic device, such as a computer system. However, in some embodiments, the management unit 110 and the preloading unit 120 can be respectively located in different electronic devices.
First, in step S210, the management unit 110 composes and encrypts one or multiple digital contents and/or an application module to obtain the encrypted digital contents and/or the encrypted application module. After the preloading unit 120 obtains the encrypted digital contents and/or the encrypted application module, in step S220, the preloading unit 120 copies and stores the encrypted digital contents and/or the encrypted application module to at least one storage device. Then, in step S230, the management unit 110 generates identification data for the respective copies of the digital contents, and respectively stores the identification data to the at least one storage device. It is noted that, in some embodiments, the management unit 110 can generate the identification data for the respective copies of the digital contents in advance. Additionally, in some embodiments, the management unit 110 respectively stores the identification data in a hidden area of the respective storage devices.
The digital content management system 300 comprises a management unit 310 and a use unit 320. The use unit 320 couples to the management unit 310 via a network 330, such as a LAN (Local Area Network), a WAN (Wide Area Network), an internet, a wireless network, and/or a telecommunication network. The use unit 320 comprises a storage device 321, such as a flash memory. The storage device 321 comprises identification data (not shown), a digital content in cipher (not shown), and/or an application module in cipher (not shown). In some embodiments, the use unit 320 may be an electronic device having identification data, such as a mobile phone. When the use unit 320 is a mobile phone, the identification data is the inner code of the mobile phone. The management unit 310 can receive the connection from the use unit 320 via the network 330, and perform the digital content management method of the application. Related details are discussed followed.
In step S410, the use unit 320 couples to the management unit 310 via the network 330, and transmits the identification data stored in the storage device 321 to the management unit 310. In step S420, the management unit 310 performs an authentication according to the identification data. It is understood that, in some embodiments, the authentication is to determine whether or not the identification data is a correct identification data accepted by the management unit 310, and/or determine whether or not the identification data has been authenticated in the management unit 310. If the authentication for the identification data does not pass (No in step S430), the procedure is terminated. If the authentication for the identification data passes (Yes in step S430), in step S440, the management unit 310 decrypts the digital content in cipher and/or the application module in cipher in the storage device to obtain the digital content in plaintext and/or the application module in plaintext. It is understood that any decryption mechanism can be applied in the application. In step S450, the application module bundles the digital content and the use unit 320, such that the digital content can be only accessed or used in the use unit 320. It is understood that, in some embodiments, the method to bundle the digital content and the use unit 320 is to record the identification data of the use unit 320 in the application module. It is noted that, in some embodiments, the application module can be used to access or use the digital content. When a specific device comprising the storage device wants to access or use the digital content, the application module will first obtain the identification data of the specific device, and determine whether or not the identification data of the specific device conforms to the identification data recorded in the application module. When the identification data of the specific device conforms to the identification data preloaded in the application module, the digital content is accessed or used. When the identification data of the specific device does not conform to the identification data recorded in the application module, the digital content is not allowed to be accessed or used.
It is noted that, the embodiments in
As shown in
The content processing end 510 and the preloading 520 transmits a mother disc and storage devices via a material flow 550.
After the storage devices having the identification data, the digital content and/or the application module are produced, the content processing end 510 can respectively deliver the storage devices to the supplier ends 532 and 534 via the material flows 562 and 564. User ends 542 and 544 can respectively obtain the storage devices from the supplier ends 532 and 534, thereby respectively generating the material flows 572 and 574 between the user ends 542 and 544 and the supplier ends 532 and 534. It is noted that, in some embodiments, the user ends must pay for the storage device, thereby respectively generating money flows 573 and 575 between the user ends 542 and 544 and the supplier ends 532 and 534. When the money flows 573 and 575 are generated, in some embodiments, the money flows 563 and 565 are also respectively generated between the content processing end 510 and the supplier ends 532 and 534 for related account management processes. After the user ends 542 and 544 respectively obtain the storage devices, connections to the content processing end 510 are respectively made using the corresponding electronic devices via information flows 582 and 584, for a subsequent authentication process for identification data of the storage devices, and decryption process for digital contents in the storage devices. It is understood that, the authentication process for identification data and the decryption process for digital contents are similar to the embodiment in
Therefore, the digital content management systems and methods first encrypt the digital contents, and then perform the subsequent preloading procedure for mass production of the digital contents, thereby reducing the risk of the digital contents to be stolen or manipulated during the preloading procedure. Additionally, since the manufacture does not need to store activation keys (identification data) to the storage devices, the efficiency of the preloading procedure is improved.
Digital content management methods, or certain aspects or portions thereof, may take the form of a program code (i.e., executable instructions) embodied in tangible media, such as products flash card, USB disk, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine thereby becomes an apparatus for practicing the methods.
While the invention has been described by way of example and in terms of preferred embodiment, it is to be understood that the invention is not limited thereto. Those who are skilled in this technology can still make various alterations and modifications without departing from the scope and spirit of this invention. Therefore, the scope of the present invention shall be defined and protected by the following claims and their equivalents.