Method for Providing Protected Audio/Video Content

Abstract
A method for providing protected content, wherein content usage rights information and/or usage state information is embedded into obtained primary data that serves as a basis for a content item to be provided thereby providing the primary data with the embedded content usage rights information and/or usage state information as the content item.
Description

In the following the present invention will be discussed in more detail by taking reference to the accompanying Figures.



FIG. 1 is a schematical diagram and elucidates an example of a consumer environment for audio-visual content acquisition and usage to which the present invention may be applied.



FIG. 2 is a schematical block diagram of a process for the generation of CPCM usage rights settings and CPCM content streams as a preferred embodiment of the present invention.



FIG. 3 is a flow chart, which describes processes which may take place in a preferred embodiment of the present invention and in particular in a usage rights converter.



FIG. 4, 4′, 4″ are tables Tab. 1, 1′ and 1″, respectively, which demonstrate a generic preferred coding of the set of usage properties.



FIG. 4
a is a table Tab. 1a, which shows a generic preferred coding of the set of usage properties, parameters, and arguments for the content management usage properties.



FIG. 4
b is a table Tab. 1b, which shows a generic preferred coding of the set of usage properties, parameters, and arguments for the propagation restriction usage properties.



FIG. 5 is a table Tab. 2 which shows a proposed coding/syntax for each usage state information property.



FIG. 5
a is a table Tab. 2a which shows a syntax for each usage state information property and the respective usage parameters and arguments of the content management usage properties.



FIG. 5
b is a table Tab. 2b which shows a syntax for each usage state information property and the respective usage parameters and arguments of the propagation restriction usage properties.



FIG. 6 is a table Tab. 3 which shows a preferred syntax of the usage state information descriptor in DVB SI.



FIG. 7 is a table Tab. 4 which shows a preferred syntax of the usage state information descriptor when applied to the MPEG-2 Systems copyright descriptor.



FIG. 8 is a schematical block diagram, which elucidates some basic aspects of an embodiment of the present invention.



FIG. 9 is a schematical block diagram, which elucidates some basic aspects of an embodiment of the present invention.



FIG. 10 is a schematical diagram illustrating the concepts of the various methods of defining the location of any device that includes the functionality of the CPCM system for which said content usage rights information CURI and/or usage state information USI is able to signal one or more propagation restrictions.



FIG. 11, 11a are schematical diagrams illustrating the hierarchy and structure of the content usage rights information CURI and/or the respective usage state information USI as proposed. The elements outlined in bold represent the actual usage properties that can be specified for any content item.



FIG. 12, 13 are a schematical diagrams illustrating the hierarchy and structure particularly of the propagation restriction usage rules and USI.






FIG. 8 is a flow chart describing some basic aspect of an embodiment of the inventive method for providing content. In a first process (a) primary data PDat are obtained as or being representative for a content item CI to be provided as or being representative for a pre-form thereof. Then, in a second process (b) content usage rights information CURI and/or usage state information USI which is descriptive for usage rights UR or the usage state US with respect to the content item CI to be provided are obtained, In a third process (c) said content usage rights information CURI and/or usage state information USI or a derivative thereof are embedded into said primary data PDat or a derivative thereof. Thereby, secondary data SDat are generated as or being representative for a content item CI to be provided. Finally, (d) said secondary data SDat or a derivative thereof are provided and/or presented as said content item CI together with the embedded content usage rights information CURI and/or usage state information USI.



FIG. 9 is a flow chart describing a basic aspect of another embodiment of the inventive method for providing content. In a first process (a′) secondary data SDat are obtained which comprise a content item CI as such as well as the respective content usage rights information CURI and/or the respective usage state information USI for the content item CI. In a following process (b′) said content usage rights information CURI and/or the respective usage state information USI for the content item CI is extracted, in particular without receiving or evaluating the content item as such. Then in a following process (c′) a . CURI/USI display item is generated from said secondary data SDat which is representative for said content usage rights information CURI and/or the respective usage state information USI for the content item CI. Finally, in a process (d′) said CURI/USI display item is display thereby informing a user with respect to said content usage rights information CURI and/or the respective usage state information USI for the content item CI even without evaluating said content item as such thereby achieving a high degree of user friendliness.



FIG. 1 is a schematical diagram illustrating an example of a consumer environment for audio-video content acquisition and usage to which the present invention can be applied. Within a network N certain devices d1 to d7 which have audio and/or video capabilities and/or functionalities are connected with respect to each other. Devices d1 and d7 have content rendering and/or display capabilities and/or functionalities and may receive respective content items CI from devices d2 to d6. Devices d3 to d6 may receive respective content items CI or primary and/or secondary data PDat and SDat, respectively, thereof e.g. from external sources. Device d2 has content recording and content playback capabilities.


Protected audio-video content can reach the consumer via many different channels, each having its own kind of protection system and content usage rules.



FIG. 10 is a schematical diagram illustrating the concepts of the various methods of defining the location of any device that includes the functionality of the CPCM system for which said content usage rights information CURI and/or usage state information USI is able to signal one or more propagation restrictions.


Area A1 is the authorized domain of a user or household, to which devices including the functionality of the CPCM system may be associated.


Area A2 is the immediate vicinity around any device including the functionality of the CPCM system, or any content item within the CPCM system, hence area A2 is referred to as the local environment.


Area A2a corresponds to the set of devices including the functionality of the CPCM system that are in the immediate vicinity and that belong to the same authorized domain, hence area A2a is referred to as the localized authorized domain. Area A2a is a subset of both area A1, the authorized domain, and area A2, the local environment.


Area A2b corresponds to the set of devices including the functionality of the CPCM system that are in the immediate vicinity but that either belong to a different authorized domain or that belong to no authorized domain, or are not equipped with the authorized domain membership part of the CPCM system functionality.


Area A1a corresponds to the set of devices including the functionality of the CPCM system in the authorized domain which are located within said geographic area A3, for example at the user's or household's main residence in the home region.


Area A1b corresponds to the set of devices including the functionality of the CPCM system in the authorized domain which are located outside said geographic area A3, for example at the user's or household's holiday or second home in a different region.


Area A3 corresponds to any geographic area or region within which it may be necessary to constrain the propagation of certain types of content.


Area A1, the authorized domain, is inherently orthogonal and managed independently to area A2, the local environment, and area A3, the geographic area. Area A3 is inherently a subset of area A3.


Due to the nature and inter-relationship of these different classes of area, it is feasible to define the hierarchy of outer and inner content propagation restrictions as described previously and the corresponding flexibility of specifying content usage rights information CURI and/or the respective usage state information USI with respect to these different areas.



FIG. 11 is a schematical diagram illustrating the hierarchy and structure of the content usage rights information CURI and/or the respective usage state information USI as proposed. The elements outlined in bold represent the actual usage properties that can be specified for any content item.



FIG. 12 is a schematical diagram illustrating the hierarchy and structure particularly of the propagation restriction usage rules and USI.



FIG. 1 shows a typical consumer environment consisting of a network of AV devices able to receive protected content from various channels.


In the realm of DRM, several Rights Expression Languages (REL) are established, even standardized, in the prior art, e.g. XrML [6], ODRL [7]. In a web-based computing environment it is advantageous to deploy such RELs based on XML, as much of the processing tools or software is generally already built into the devices (networked PC, browser). Also, the relatively inefficient data formats of XML-based RELs are not an issue when a single item of content is being delivered to a consumer, for example within an internet DRM system.


In a broadcast environment, however, many, even hundreds of services are available to the consumer in parallel. It is desirable to inform the user, via his receiving equipment, of any eventual content usage restrictions, or rights associated with content items, for currently available content, or scheduled future content in advance, for example as icons accompanying services generally listed in an on-screen EPG.


To deploy such an XML-based REL in a broadcast environment has the following disadvantages:

    • A relatively large proportion of the available data transmission capacity would be needed.
    • Many types of broadcast receiver are not equipped with functions and software generally needed for internet or web browser based operations, or the interpretation of XML format data.


Therefore it is the goal of the present invention to provide a method for carrying such USI in broadcast content streams in an efficient manner, and one more suitable for all types of broadcast receiver. This method can also be used to carry such USI within a CPCM system for the consumer environment, i.e. among AV storage, processing, and rendering devices in the home network.


An additional advantage of the present invention is that the method of embedding USI in an item of content provides a convenient tool for the interoperable exchange of content between different DRM or content protection systems. This is due to the fact that no additional data is required to be passed between such systems, apart from the item of content itself, which contains all necessary information (USI and auxiliary data) pertaining to its allowed usage in the compliant domain.


The method is summarized as providing:

    • Broadcast-friendly format for the carriage of content USI, i.e. within MPEG-2 Transport Streams, or MPEG-2 Program Streams, which can be utilized directly by broadcasters or content aggregators to signal USI for both currently available channels and transmissions in the future, in a consumer-side CPCM system.
    • Broadcast-friendly format for the carriage of content USI, i.e. within MPEG-2 Transport Streams, or MPEG-2 Program Streams, which can be utilized by content recording and/or playback devices in the consumer environment to convert from another protection system's USI format to the a common CPCM system USI format.
    • Tools to convert XML-based REL USI to the proposed broadcast-friendly format for insertion into the broadcast MPEG-2 Transport Stream, at the content aggregation or broadcast head-end equipment.
    • Tools to convert XML-based REL USI to the proposed broadcast-friendly format for a DRM client software at the consumer side which ingests protected content into a broadcast-oriented consumer CPCM system.


MPEG IPMP [1] is an ISO/IEC Standard defining a DRM framework for MPEG content. It includes the Extensible Rights Markup Language (XrML) [6] as the Rights Expression Language to provide the complete set of possible Usage Rules (UR) for IPMP content. However, this standard is too feature-rich and complicated to be used for the practical realization of an interoperable DRM framework encompassing all classes of consumer audio-visual devices. Indeed, an XML-based language is not suitable for the complete spectrum of consumer entertainment devices, due to the memory and processing resources necessary to work with it.


The Open Digital Rights Language (ODRL) [7] does indeed provide a simpler set of UR than XrML, but is still much too powerful for a common baseline approach for CPCM in the consumer environment.


Both XrML and ODRL are providing full DRM rights expression tools, covering all types of media, and commercial transactions and billing, for example. A CPCM system does not require such functionality and can omit such features from its pre-defined set of USI.


The TV-Anytime Forum (TVAF) recently published a specification for Rights Management and Protection for broadcast content [4]. RMPI and RMPI-MB are applicable to the same realm as the current invention, but the TVA/RMPI is not fully suitable for horizontal market interoperable CPCM frameworks and does not include all necessary tools required for such. Apart from that, some aspects also imply a greater burden of implementation for manufacturers of compliant consumer equipment. The present invention presents an alternative scheme to TVA RMPI, relying more on a fixed CPCM framework and regime for content protection management, thus providing a simpler and clearer framework for the consumer.


CPCM USI Format

The format suitable for broadcast and home network CPCM systems is some form of structured binary coded data that can be embedded repeatedly within the content data file or stream. The pre-defined structure and coding means that many of the often extensive header tags necessary with XML-based usage rule coding schemes can be omitted. Each coded usage rule setting that is translated then becomes a pre-defined 8-bit binary value, instead of text-form delimiters. Of course, eventual argument fields might not be able to be compressed.



FIG. 2 shows the general process of generating an AV content item or trans-port or broadcast stream of content for the CPCM system.


Process 1 yields the AV content to be managed and protected by the CPCM System. In the prior art, this content can have a content identifier obtained by process 2 and content usage rights associated with it and obtained by process 3, but often provided separately from the content item itself, in a separate file, or stored in a database.


In process 4 the usage rights converter involves the parsing and generation of the equivalent usage rights according to the CPCM System. Its output is the binary coded set of data corresponding to the CPCM System and broadcast friendly usage rights or USI data according to process 6. The USI data can also be generated directly by a usage rights generator tool or process 5.


Process 7, the auxiliary data embedder inserts the CPCM content usage rights, or USI, into the CPCM compliant content item CI stored data file according to process 8, or the CPCM compliant content stream according to process 9, depending on the application at hand. One feature of the invention is that such USI data is repeated regularly within the CPCM Content Item or CPCM compliant content stream, to facilitate the quick and correct interpretation of the content usage rights when the receiving device of such content performs random access to the content, for example during live broadcast while hopping channels on the broadcast receiver.


As is common with digital broadcast systems, many such individual content streams, or services, can be multiplexed (process 11) to form a content stream containing several services. The service multiplexer (process 10) collects the content identifiers (process 13) USI data (process 12) for all services to be carried in the multiplex. It can also collect this information relating to content scheduled in the future, in order to provide advance information about the usage rights in advance. Process 14 yields the resulting multiplex of content services including all USI for the services contained and scheduled content.



FIG. 3 shows the flow diagram of process 4 in the previous diagram, for the case when the input usage rights are in the form of a text format, for example one of the markup languages established in the prior art.


Each usage right, usually encoded with a “tag” section, is interpreted, and the equivalent usage right is generated on the basis of pre-defined mappings from the input format. Usage rights for which no mapping is defined in the CPCM USI are ignored.


When all input usage rights have been parsed and converted, the output CPCM usage rights data, or USI, is generated. This is input to the Auxiliary Data Embedder, which combines the USI with the content as described previously.


The Auxiliary Data Embedder could also consist of a multiplexer, which combines several content items, or streams, into a multiplexed content stream, as commonly used in broadcast systems, for example DVB.


The Auxiliary Data Embedder could also embed USI about content items available in the future.


The USI could form another component of already defined auxiliary data defined in the broadcast system, for example the Service Information [8] in the case of DVB. Such a preferred embodiment is described later.


One advantage of the present invention becomes evident when the decoding process in the consumer environment is considered, both at the point of first acquisition of CPCM complaint protected content, and after storage (if allowed by the USI) and subsequent retrieval by any rendering device in the home network. Because the USI has already been converted to the CPCM System compliant format, no renewed interaction with the originating DRM or CA system is necessary to establish the usage rights for that content. All CPCM devices accessing the content are able to process the content and abide by the usage rules because they are stored and embedded within the content file or stream in a format easily processable by those devices, in the DVB example, as an additional descriptor within the service's or content item's associated SI.


Another feature of the invention is the display of icons indicating the allowed or disallowed functionality with respect to the received content on the rendering device's graphical user interface, allowing the user to know in advance how he is able to use that content.


A typical feature of an EPG function is to show information about programming content, or events, in the future. In the same way, the accompanying USI in the SI can be used to indicate to the user his available options for that content item available in the future, alternatively the user interface could blank out functionality that is apparently disallowed by the USI.


Optimized, Minimal Set of USI

This section provides a definition of the set of Usage Rules (UR) for audio-visual content in the consumer environment, and methods of communication of this information with the associated content, both prior to content reception in a consumer's domain (in the delivery channel), and for the subsequent life of the content in the domain (on all devices which can use the content, networked devices in the home(s), also in the consumer's private vehicle(s) and on mobile handheld devices.


URs are communicated within the CPCM Framework by encoding them in a pre-defined scheme. Such data is referred to as “Usage State Information” (USI).


The complete set of Usage Rules for a CPCM Framework is defined here. The URs are defined as a set of Properties applied to an item of content. This set is deemed to be complete in terms of the minimum set of necessary controls with audio-visual content functionality in the consumer environment.


CPCM Framework Content Usage Rules (UR)

According to the invention, there are two kinds of UR Property, and hence derived Usage State Information (USI)—Mandatory and Assertive.


Mandatory USI: Any item of CPCM content must always have one of the Mandatory USI field's states applied to it.


Assertive USI: The presence of Assertive USI implies that the associated restriction/concession is being imposed/granted. If a particular Assertive USI field is not present with any item of content then that restriction/concession is not imposed/granted.


Assertive USI is orthogonal to the Mandatory USI, i.e. each Assertive USI field can be applied with any of the Mandatory USI field states.


In the case of content Copy, the generated new instance of content generally inherits the non-Copy USI of the original instance.


Each UR Property is described in the following sub-sections.


Copy Control

A simple model for copy control USI is already largely established in the prior art. It is adopted as forming one component of the CPCM Framework UR. This provides the options for marking content in one of five states:

    • Copy Never Zero Retention (CNZR)—no copy of such content is allowed, nor is a secure non user-accessible temporary buffer copy allowed for the purpose of pausing the playback.
    • Copy Never (CN)—no copy of such content is allowed, except for a secure non user-accessible temporary buffer copy for the purpose of pausing the playback.
    • Copy Once (C1)—exactly one single copy of the content can be created.
    • Copy One Generation (C1G)—the content can be copied repeatedly, but each copy is then marked “Copy No More”. An optional argument for the C1G state is the maximum number of copy instances allowed. In an actual CPCM System this could be left variable, to be set explicitly for each item of content, or not needed to be set and a global maximum value is enforced in that CPCM system.
    • Copy No More (CNM)—see above; no copies are allowed.
    • Copy Control Not Asserted (CCNA)—no restriction is placed upon copying of the content.


A Copy action on content bearing either the C1 or the C1G state produces a new instance of that content bearing the CNM state.


In the CPCM Framework, the Copy Control USI Property is Mandatory USI.


C=1 of {CNZR, CN, C1, C1G, CNM, CCNA}
Concurrent Render Count

Some content providers maintain the commercial requirement to be able to restrict the number of concurrent renderings of an item of content, e.g. the number of display devices rendering that content in the home. Thus the CPCM Framework includes this ability in the USI.


View/Consume+Count (Count=0 for non-viewable)

In the CPCM Framework, the USI Restrict Concurrent Rendering (RCR) is optional USI, and is always augmented by the maximum count of concurrent renderings allowed. If the RCR Property is not present in the USI then that content is viewable on any number of rendering devices (but also subject to the eventual propagation restriction specified in the USI, alternatively up to a generally valid maximum number of concurrent renderings which might be specified).


Alternatively, the RCR Property could have a parameter defined such as “restriction not asserted”. In this case RCR could also be a mandatory USI property.






V=RCR+Count, or






V=RCR+Not Asserted/Count


Time-Based Restriction of Content Usage

There is scope for time-based business models for content usage, for example online rental. The CPCM Framework thus includes USI to allow content usage within a specified time window only.


The Time-Based Restriction (TBR) UR is set by applying one or both of the “FROM” and “UNTIL” parameters in the TBR USI.


An alternative time-based UR is based on usage within a relative time after the content is received, by applying the “FOR” parameter.


The TBR UR could be assertive, or alternatively could be mandatory, if the parameter “restriction not asserted” is also defined in the USI.





T=1 or both of {FROM+date/time(absolute); UNTIL+date/time(absolute)} or {FOR+data/time(duration) or Not Asserted}


Disable Content Scrambling

Some content providers require, as a matter of principle or by regulation, to not protect their content by means of cryptographic tools, i.e. scrambling. The CPCM Framework includes such a USI tool, the “Do Not Scramble” USI (DNSC). This is optional USI. If not set then the content is scrambled by default within the CPCM Framework.





S=DNSC


Propagation Restriction

Some content providers maintain the commercial requirement to restrict the propagation of valuable content to within a certain realm, once the content has been acquired by a consumer.


The CPCM Framework offers a UR to characterize this property in content. The following usage properties are valid for the Propagation Restriction UR/USI:

    • Restrict to Content Protection and Copy Management System (RTCPCM)—an item of content with this state applied is to remain protected by the CPCM system, being the default propagation restriction setting for content to be protected.
    • Restrict to Authorized Domain (RTAD)—an item of content with this state applied will not be allowed to propagate beyond the set of CPCM-compliant equipment belonging to the user receiving the content, thus allowing the user to use the content at home, access it from a remote location, for example a second home or from a mobile handset.


Restrict to Localized Authorized Domain (RTLAD)—an item of content with this state applied will not be allowed to propagate by electronic transfer beyond the close vicinity of the point at which that content entered the consumer environment, within the respective Authorized Domain (AD). In practical terms this could mean the Local Area Network (LAN) in which the receiving device is connected, for example in the user's main dwelling, i.e. excluding live transfer to the secondary dwelling or to a mobile device.

    • Restrict to Geographic Area (RTGA)—an item of content with this state applied is not intended to propagate by electronic transfer outside the geographic area indicated.
    • Restrict to Local Environment (RTLE)—an item of content with this state applied will not be allowed to propagate by electronic transfer beyond the close vicinity of the point at which that content entered the consumer environment. In practical terms this could mean the Local Area Network (LAN) in which the receiving device is connected, for example in the user's main dwelling, i.e. excluding live transfer to the secondary dwelling or to a mobile device.
    • Controlled Export (CE)—an item of content can be either allowed or disallowed to propagate to a different protection system that is not implicitly and universally trusted by the CPCM system,
    • Usage by CPCM extension (EXT)—an item of content with this state applied is provided with distinct content management usage properties which apply within the realms of some known system which provides content protection and copy management functionality as an extension to the CPCM system,
    • Propagation Restriction Not Asserted (PRNA)—the item of content can be redistributed also outside of the CPCM Framework. In practical terms this would be the equivalent of allowing uncontrolled sharing of the content in unprotected form, like the present-day P2P sharing scenario.


In the CPCM Framework, the USI Propagation Restriction Property is Assertive USI. If no Propagation Restriction Property is given in a content item's USI, then that content shall be protected by the CPCM system but not restricted with regards to its movement within the CPCM system, subject to the settings of the content management USI for that content.


Alternatively, content within the CPCM framework can carry USI for various propagation restrictions, according to the aforementioned rules, whereby at least one default propagation restriction is given.





R=0 or 1 to n of {RTAD, RTLAD, RTGA, RTLE, CE, EXT, PRNA} according to the aforementioned hierarchy


Preferred Embodiments for USI

The prime area for application of the invention is with audio-visual content which is carried or stored in an MPEG-2 Transport Stream [5]. Content disseminated by digital television broadcast is already in this form. Some new forms of content delivery will also use the same format, e.g. video-on-demand over Internet Protocol (IP) services. It can also be applied to MPEG-2 Program Stream format, currently used for example for audio-visual content stored on a Digital Versatile Disk (DVD). The invention thus also allows seamless perpetuation of content URs when content might be converted between these two formats.


Currently digital television services carry MPEG-2 based audio and video content. In the future there will be increasing scope for other content formats, for example MPEG-4 AVC (video) and AAC (audio), but these services also use MPEG-2 Transport Streams as the method of carriage.


Embodiments Using MPEG-2 Systems Section Syntax

According to the present invention, USI is carried in the MPEG-2 Trans-port Stream along with the content whose URs the USI describes. It is however feasible that the same USI coding method be used to carry the USI separately from the content itself, for example within a Content License (CL), a secure set of data associated with the content in a content protection or DRM system.


The following table shows the generic syntax of USI, where the first set of content management usage properties specifies the USI for the content throughout the CPCM system. This need not be present if at least one propagation restriction entry follows, containing the respective content management USI. If the CPCM system-wide content management USI is present, then additional content management USI can be specified after each of the eventual propagation restriction entries. This is how different usage rules can be set for different realms of the CPCM system.















No.




of
Identi-


Syntax
bits
fier







generic_usage_state_information_coding_syntax( ){




 top_level_propagation_restriction_usage_property
8
uimsbf


 top_level_content_management_loop_length
8
uimsbf


 for (i=0;i<N;i++){


  content_management_usage_property


 }


 outer_propagation_restriction_loop_length
8
uimsbf


 for (i=0;i<M;i++){


  outer_propagation_restriction_usage_property


  outer_content_management_loop_length
8
uimsbf


  for (j=0;j<P;j++){


   outer_content_management_usage_property


  }


  inner_propagation_restriction_length
8
uimsbf


  inner_propagation_restriction_usage_property
8
uimsbf


  inner_content_management_loop_length
8
uimsbf


  for (j=0;j<Q;j++){


   inner_content_management_usage_property


  }


 }


}









There could be more than one GA realm specified, but there should only ever be one LE and/or one RTAD and/or one RTLAD propagation restriction set of USI specified.


Many combinations of realms and respective content management USI settings will not make sense, but the coding rules described earlier ensure that illogical combinations are avoided.


In general it can be expected, for example, that there should never be more restrictive content management rules specified for the smaller propagation realm, e.g. for the LE versus the GA, or for the RTLAD versus the AD.


Tab. 1 shows the generic preferred coding of the set of usage properties, parameters and arguments. This is applicable to both of the embodiments using MPEG-2 Systems (namely DVB SI, and copyright descriptor). N represents the number of usage state information properties contained in the instance applied to an item of content. Tab. 1 is also a schema for a decoder.


Tab. 2 shows the syntax for each usage state information property, and the respective usage parameters and arguments.


Protection of USI against manipulation: USI table contains a keyed hash of the USI information. In the case of encrypted content, this keyed hash shall preferably be encrypted using the content key.

    • also in CTA streams
    • The USI is to be repeated regularly within the content stream. This has two advantages over the situation where USI is communicated only once, for example at the start of the content stream:
    • Random access to the content by a consumer device is enabled, for example to enable the quick acquisition of the usage rules after the broadcast stream has been acquired during ongoing transmission (during TV channel hopping).
    • Additional security of the USI, as potentially every repetition of the USI would have to be manipulated in order to circumvent the URs conveyed.


Thus the usage state information is preferably included in data sections that are required to be repeated regularly in the content stream to which the information is associated.


Embodiment with DVB Service Information (SI)

DVB SI [8] defines a syntax for carrying data related to the audio-visual services carried in the DVB Transport Stream.


In this embodiment a new SI descriptor is defined, preferably called the “usage state information descriptor”, and is assigned a descriptor tag value.


The usage state information descriptor is carried preferably in the Event Information Table (EIT), indicating the usage state information for that event. The usage state information descriptor can be carried in all types of EIT, thus allowing the advanced indication of usage state information for future events using the same method of communication.


The usage state information descriptor is preferably duplicated in the Service Description Table (SDT), and either alternatively or in addition, in the Program Map Table (PMT), indicating the usage state information of the currently running event for that service.


Tab. 3 shows the preferred syntax of the usage state information descriptor in DVB SI. The previously described generic coding syntax is applied to the DVB SI descriptor structure.


Embodiment with ATSC Program and System Information Protocol (PSIP)

The invention can also be applied to ATSC [9] systems. Here, similarly to how the invention is applied to DVB systems, a new descriptor is defined to carry usage state information for the associated content.


Embodiment with MPEG Copyright Descriptor

MPEG-2 Systems [5] specifies the “copyright descriptor” as a tool for identifying associating a particular registration authority and content identifier to the content.


This preferred embodiment of the invention foresees the establishment of a new registration authority that might also define a corresponding CPCM or DRM system that would apply the copyright descriptor to associate the content with UR and corresponding USI as disclosed by the invention.


The “additional_copyright_info” field in the copyright descriptor is expanded to contain the coding of USI according to the present invention.


Tab. 4 shows the preferred syntax of the usage state information descriptor when applied to the MPEG-2 Systems copyright descriptor. The previously described generic coding syntax is applied to the copyright descriptor structure.


The copyright descriptor with usage state information according to the present invention can be applied to content carried in both streams defined in [5]:

    • MPEG-2 Transport Stream, where such copyright descriptor is inserted into every instance of the Transport Stream Program Map Section, as a program-info descriptor, in order to convey the usage rights of the associated content.
    • MPEG-2 Program Stream, where such copyright descriptor is inserted into every instance of the Program Stream Map, as a program-stream-info descriptor, in order to convey the usage rights of the associated content.


Embodiment Using an XML Schema

It is feasible to define an XML schema code fur CURML which indeed does have the same scope as the binary method of coding USI. Such a schema may be useful in certain content exchange environments.


ASPECTS OF THE INVENTION

The present invention covers the following aspects.

    • Method for the communication of audio/visual content usage rules in a content protection copy management system in a consumer environment.
    • Method to apply a practical, complete and flexible set of content usage rules within a CPCM system in the consumer environment, whereby:
    • Such usage rules settings are coded in binary form in order to achieve greater efficiency.
    • Such usage rules settings are inserted or embedded into the content item or stream to be protected.
    • Such usage rules settings are inserted or embedded in a similar format to other auxiliary data accompanying the content item or stream.
    • Such usage rules settings are repeated regularly within the content item or stream in order to facilitate quick acquisition of the rules when random access to the content item is exercised.
    • Method to convert content usage rule settings from one system (in particular any XML-based coding scheme) to an efficient coding method suitable for broadcast systems and a common CPCM system for the consumer environment.
    • Method of communicating the availability or non-availability of certain content processing functions in a graphical user interface according to the usage rule settings for that content, be that item of content already available for rendering, or one that will be available in the future.
    • Definition of Content Management and Propagation Restriction UR and USI.
    • Definition of a hierarchy of Propagation Restriction UR and USI that allows the flexible and efficient coding of all required content usage models.
    • Definition of Mandatory and Assertive UR and USI.
    • Definition of each of the UR properties—NB. Copy control USI, also known as Copy Control Information (CCI), is largely prior art; the same applies for time-based restriction to content usage. But the nature of the whole set of UR and USI is an important aspect of the invention.
    • Device or software which interprets said USI to derive compliant behavior for the respective content items.
    • Device or software which generates said USI in order to indicate or enforce the desired usage rules for the respective content items.
    • Tool to convert between the different USI encoding methods disclosed herein, for example when the XML schema is used during content authoring, to convert this USI to the SI table format.
    • CPCM or DRM system which implements the present UR and/or USI framework to signal and maintain content usage rights in the consumer environment.
    • Method of application of the invention to content carried in MPEG-2 Trans-port Stream.
    • Method of application of the invention to content carried in MPEG-2 Program Stream
    • Use of MPEG-2 Systems copyright descriptor to associate new RA and CRID, to carry USI with the content, providing a means for devices to acquire the URs for the content.
    • Definition of syntax for USI for use in DVB systems.
    • Definition of syntax for USI for use in ATSC systems.
    • Method whereby the USI is repeated regularly within the content stream, for the purposes of enhancing security and allowing a consumer device to randomly access the content, for example to quickly acquire the usage rules after the broadcast stream has been acquired (during TV channel hopping).
    • Method of XML-based coding of UR, resulting in an alternative encoding method which may be useful for certain applications, e.g. an XML schema.
    • Method for signaling UR for other content carried in the same delivery system, by using the same USI in program information, e.g. TV schedule data.
    • Method for signaling usage rights of content within a CPCM or DRM Content License.


REFERENCES



  • [1] ISO/IEC1318-11 IPMP on MPEG-2 Systems

  • [2] Background Article on DVB CPCM: http://www.dvb.org/documents/newsletters/DVB-SCENE-05.pdf

  • [3] DVB World Conference 2004, Dublin, Presentation on DVB CPCM

  • [4] TV-Anytime Forum TC211r3 Specification for the Semantics of TV-Anytime Rights Management and Protection Information for Micro-Broadcast: ftp://tva:tva@ftp.bbc.co.uk/pub/Plenary/TV211r4.zip

  • [5] ISO/IEC13818-1 MPEG-2 Systems

  • [6] Extensible Rights Markup Language (XrML), info at: http://www.xrml.org/get_XrML.asp

  • [7] Open Digital Rights Language (ODRL) Specification Version 1.1: http://www.w3.org/TR/odr1/

  • [8] ETSI EN 300 468—Digital Video Broadcast (DVB); Specification for Service Information in DVB Systems

  • [9] ATSC Standard A/65B: Program and System Information Protocol for Terrestrial Broadcast and Cable



ABBREVIATIONS



  • AD Authorized Domain

  • CPCM Content Protection and Copy Management

  • DRM Digital Rights Management

  • DVB Digital Video Broadcast

  • EPG Electronic Program Guide

  • GA Geographic Area

  • IP Internet Protocol

  • LAD Localized AD

  • LAN Local Area Network

  • LE Local Environment

  • RMPI (TV-Anytime) Rights Management and Protection Information

  • SI Service Information

  • TVA TV-Anytime

  • TVAF TV-Anytime Forum

  • UR (Content) Usage Rule(s)

  • USI Usage State Information

  • WAN Wide Area Network



REFERENCE SYMBOLS



  • CI content item

  • CURI content usage rights information

  • dj device; j=1, 2, 3,

  • N network

  • PDat primary data

  • SDat secondary data

  • UR usage right

  • US usage state

  • USI usage state information


Claims
  • 1: Method for providing protected audio/video content for a content protection and copy management system based on a network of devices, comprising processes of:(a) obtaining primary data (PDat) as or being representative for a content item (CI) to be provided,(b) obtaining content usage rights information (CURI) and/or usage state information (USI) which is descriptive for usage rights (UR) or the usage state (US) with respect to the content item (CI) to be provided,(c) embedding (S7) said content usage rights information (CURI) and/or usage state information (USI) or a derivative thereof into said primary data (PDat) or a derivative thereof, thereby generating secondary data (SDat) as or being representative for a content item (CI) to be provided and(d) providing said secondary data (SDat) or a derivative thereof as said content item (CI) to be provided with the embedded content usage rights information (CURI) and/or usage state information (USI), wherein said content usage rights information (CURI) and/or usage state information (USI) is embedded in a structured binary coded form within said primary data (PDat) or said derivative thereofin order to ensure efficiency, interoperability, and user friendliness with respect to said content usage rights information (CURI) and/or usage state information (USI) and its handling.
  • 2: Method for providing protected audio/video content for a content protection and copy management system based on a network of devices, comprising processes of,(a) obtaining primary data (PDat) as or being representative for a content item (CI) to be provided,(b) obtaining content usage rights information (CURI) and/or usage state information (USI) which is descriptive for usage rights (UR) or the usage state (US) with respect to the content item (CI) to be provided,(c) embedding (S7) said content usage rights information (CURI) and/or usage state information (USI) or a derivative thereof into said primary data (PDat) or a derivative thereof, thereby generating secondary data (SDat) as or being representative for a content item (CI) to be provided and(d) providing said secondary data (SDat) or a derivative thereof as said content item (CI) to be provided with the embedded content usage rights information (CURI) and/or usage state information (USI), wherein said content usage rights information (CURI) and/or usage state information (USI) is embedded in a structured binary coded for within said primary data (PDat) or said derivative thereof.
  • 3: Method according to claim 2, wherein efficiency, interoperability, and user friendliness with respect to said content usage rights information (CURI) and/or usage state information (USI) and its handling are ensured.
  • 4: Method according to claim 1, wherein said content usage rights information (CURI) and/or usage state information (USI) is embedded repeatedly—in particular regularly—within said primary data (PDat) or said derivative thereof.
  • 5: Method for providing protected audio/video content for a content protection and copy management system based on a network of devices, comprising processes of:(a) obtaining primary data (PDat) as or being representative for a content item (CI) to be provided.(b) obtaining content usage rights information (CURI) and/or usage state information (USI) which is descriptive for usage rights (UR) or the usage state (US) with respect to the content item (CI) to be provided,(c) embedding (S7) said content usage rights information (CURI) and/or usage state information (USI) or a derivative thereof into said primary data (PDat) or a derivative thereof, thereby generating secondary data (SDat) as or being representative for a content item (CI) to be provided and(d) providing said secondary data (SDat) or a derivative thereof as said content item (CI) to be provided with the embedded content usage rights information (CURI) and/or usage state information (USI wherein said content usage rights information (CURI) and/or usage state information (USI) is embedded repeatedly—in particular regularly—within said primary data (PDat) or said derivative thereofin order to ensure efficiency, interoperability, and user friendliness with respect to said content usage rights information (CURI) and/or usage state information (USI) and its handling.
  • 6: Method for providing protected audio/video content for a content protection and copy management system based on a network of devices, comprising processes of(a) obtaining primary data (PDat) as or being representative for a content item (CI) to be provided,(b) obtaining content usage rights information (CURI) and/or usage state information (USI) which is descriptive for usage rights (UR) or the usage state (US) with respect to the content item (CT) to be provided,(c) embedding (S7) said content usage rights information (CURI) and/or usage state info nation (USI) or a derivative thereof into said primary data (PDat) or a derivative thereof, thereby generating secondary data (SDat) as or being representative for a content item (CI) to be provided and(d) providing said secondary data (SDat) or a derivative thereof as said content item (CI) to be provided with the embedded content usage rights information (CURI) and/or usage state information (USI), wherein said content usage rights information (CURI) and/or usage state information (U SI) is embedded repeatedly—in particular regularly—within said primary data (PDat) or said derivative thereof.
  • 7: Method according to claim 6, wherein efficiency, interoperability, and user friendliness with respect to said content usage rights information (CURI) and/or usage state information (USI) and its handling are ensured.
  • 8: Method according to claim 5, wherein said content usage rights information (CURI) and or usage state information (USI) is embedded in a structured binary coded form within said primary data (PDat) or said derivative thereof.
  • 9: Method according to claim 1, wherein said process (a) of obtaining said primary data (PDat) comprises a sub-process of generating said primary data (PDat).
  • 10: Method according to wherein said process (a) of obtaining said primary data (PDat) comprises a sub-process (S1) of receiving said primary data (PDat) or a preform thereof, in particular from an external source.
  • 11: Method according to claim 1, wherein said process (b) of obtaining content usage rights information (CURI) and/or usage state information (USI) comprises a sub-process (S5) of generating said content usage rights information (CURI) and/or usage state information (USI), in particular in a given target format and/or in particular with a given target scope of rights.
  • 12: Method according to claim 1, wherein said process (b) of obtaining content usage rights Information (CURI) and/or usage state information (USI) comprises a sub-process (S3) of receiving said content usage rights information (CURI) and/or usage state information (USI), in particular from an external source and/or in a given input for at.
  • 13: Method according to claim 12, wherein one known format is used as said input format.
  • 14: Method according to claim 12, wherein said received content usage rights information (CURI) and/or usage state information (USI) subjected to a sub-process (S4) of usage rights for at conversion in order to convert the input format of said received content usage rights information (CURI) and/or usage state information (USI) to a given target format.
  • 15: Method according to claim 14, wherein in said sub-process (S4) of usage rights format conversion said content usage rights information (CURI) and/or usage state information (USI) is also converted in order to have all cover given a target scope of rights.
  • 16: Method according to claim 1, wherein a single data item is provided as said content item (CI) or as a part thereof, in particular a single file, a single image or the like.
  • 17: Method according to claim 1wherein a data stream is provided as said content item (CI) or as a part thereof, in particular a sequence of files, a sequence of images and/or sounds or the like.
  • 18: Method according to claim 1, comprising a process (S10) for multiplexing several content items (CI) or preforms thereof and in particular for multiplexing the respective content usage rights information (CURI) and/or usage state information (USI) of multiplexed content items (CI).
  • 19: Method according to claim 1, wherein the process (c) of embedding (S7) said content usage rights information (CURI) and/or usage state information (USI) or a derivative thereof into said primary data (PDat) or a derivative thereof is capable of a sub-process of multiplexing in order to combine primary data (PDat) of a plurality of content items (CI) to be provided into a common multiplexed content stream.
  • 20: Method according to claim 1, wherein the process (c) of embedding (S7) said content usage rights information (CURI) and/or usage state information (USI) or a derivative thereof into said primary data (PDat) or a derivative thereof is capable of embedding content usage rights information (CURI) and/or usage state information (USI) about content items (CI) available in the future.
  • 21: Method according to claim 1, wherein from said content usage rights information (CURI) and/or usage state information (USI) other components of auxiliary data already defined are formed.
  • 22: Method according to claim 1, wherein said process (c) of embedding (S7) the target for at for said content usage rights information (CURI) and/or usage state information (USI) and/or the target scope for said content usage rights information (CURI) and/or usage state information (USI) are chosen in accordance to an underlying content protection and copy management system or CPCM system.
  • 23: Method according to claim 1, wherein said process (c) of embedding (S7) the target format for said content usage rights information (CURI) and/or usage state information (USI) and/or the target scope for said content usage rights information (CURI) and/or usage state information (USI) are chosen in order to support and/to cover a minimal and/or optimized set of content usage rights information (CURI) and/or usage state information (USI) with respect to an underlying content protection and copy management system or CPCM system.
  • 24: Method according to claim 23, wherein said set of content usage rights information (CURI) and/or usage state information (USI) comprises a mandatory set of content usage rights information (CURI) and/or usage state information (USI) and an optional or assertive set of content usage rights information (CURI) and/or usage state information (USI).
  • 25: Method according to claim 24, wherein each content item (CT) to be provided is provided with at least one item of said mandatory set of content usage rights Information (CURI) and/or usage state information (USI).
  • 26: Method according to claim 1, wherein said set of content usage rights information (CURI) and/or usage state information (USI) comprises one or an arbitrary plurality of items of the group of items which consists of copy control—in particular as mandatory, propagation restriction—in particular as mandatory, concurrent render count, disable content scrambling and time-based content usage.
  • 27: Method according to claim 1, wherein said set of content usage rights information (CURI) and/or usage state information (USI) comprises one or an arbitrary plurality of items of the group of items which consists of content management properties—in particular as mandatory, and propagation restriction properties—in particular as assertive optional.
  • 28: Method according to wherein the usage state information (USI) for copy control is adapted in order to cover one of the items of the group of items which consists of: “copy never” (CN) according to which no copy of such content is allowed,“copy once” (C1) according to which exactly one single copy of the content can be created,“copy one generation” (C1G) according to which the content can be copied repeatedly, but each copy is then marked as copy no more,“copy no more” (CNM) according to which no copies are allowed,“copy control not asserted” (CCNA) according to which no restriction is placed upon copying of the content.
  • 29: Method according to claim 26, wherein the usage state information (USI) for copy control is adapted in order to cover one of the items of the group of items which consists of: “copy never, zero retention” (CNZR) according to which no copy of such content is allowed, not even a secure temporary non user-accessible copy for the purpose of time-shift buffer,“copy never” (CN) according to which no copy of such content is allowed, except for a secure temporary non user-accessible copy for the purpose of time-shift buffer,“copy once” (C1) according to which exactly one single copy of the content can be created,“copy one generation” (C1G) according to which the content can be copied repeatedly, but each copy is then marked as copy no more,“copy no more” (CNM) according to which no copies are allowed,“copy control not asserted” (CCNA) according to which no restriction is placed upon copying of the content.
  • 30: Method according to claim 26, wherein the usage state information (USI) for propagation restriction is adapted in order to cover one of the items of the group of items which consists of: “restrict to content protection and copy management system (CPCM)” (RTCPCM) according to which an item of content with this state applied is to remain protected by the CPCM system, being the default propagation restriction setting for content to be protected and/or, propagation is allowed to any other authorized domain (AD),“restrict to local environment” (RTLE) according to which an item of content with this state applied will not be allowed to propagate by electronic transfer beyond the close vicinity of the point at which that content entered the consumer environment, within a respective authorized domain (AD),“restrict to authorized domain (AD)” (RTAD) according to which an item of content with this state applied will not be allowed to propagate beyond the set of CPCM-compliant equipment belonging to the user receiving the content, thus allowing the user to use the content at home, access it from a remote location, for example a second home or from a mobile handset,“usage by CPCM extension” (EXT) according to which an item of content with this state applied can be provided with distinct content management usage properties within the realms of some known system which provides content protection and copy management functionality as an extension to the CPCM system,“controlled export” (CE) according to which an item of content with this state applied can either be allowed to propagate, or not allowed to propagate to a particular protection system (for such systems not implicitly and universally trusted by the CPCM system), “propagation restriction not asserted” (PRNA) according to which an item of content can be redistributed also outside of the content protection and copyright management system or CPCM framework.
  • 31: Method according to wherein the usage state information (USI) for propagation restriction is adapted in order to cover one of the items of the group of items which consists of: “restrict to content protection and copy management system (CPCM)” (RTCPCM) according to which an item of content with this state applied is to remain protected by the CPCM system, being the default propagation restriction setting for content to be protected,“restrict to local environment” (RTLE) according to which an item of content with this state applied will not be allowed to propagate by electronic transfer beyond the close vicinity of the point at which that content entered the consumer environment, within a respective authorized domain (AD)“restrict to authorized domain (AD)” (RTAD) according to which an item of content with this state applied will not be allowed to propagate beyond the set of CPCM-compliant equipment belonging to the user receiving the content, thus allowing the user to use the content at home, access it from a remote location, for example a second home or from a mobile handset,“usage by CPCM extension” (EXT) according to which an item of content with this state applied can be provided with distinct content management usage properties within the realms of some known system which provides content protection and copy management functionality as an extension to the CPCM system“controlled export” (CE) according to which an item of content with this state applied can either be allowed to propagate, or not allowed to propagate to a particular protection system (for such systems not implicitly and universally trusted by the CPCM system), “propagation restriction not asserted” (PRNA) according to which an item of content can be redistributed also outside of the content protection and copyright management system or CPCM framework.
  • 32: Method according to claim 26, wherein the usage state information (USI) is adapted in order to cover the items of “concurrent render count” in particular in order to be able to restrict the number of concurrent renderings of an item of content.
  • 33: Method according to claim 26, wherein the usage state information (USI) is adapted in order to cover the items of “disable content scrambling”, in particular in order to be able to not allow to protection of content by means of cryptographic tools, i.e. by scrambling.
  • 34: Method according to claim 26, wherein the usage state information (USI) is adapted in order to cover the items of “content scrambling not required”, in particular in order to be able to choose not to enforce the protection of content by means of cryptographic tools, i.e. by scrambling.
  • 35: Method according to one claim 26, wherein the usage state information (USI) is adapted in order to cover the items of “time-based restriction of content usage”, in particular in order to be able to allow a temporary usage of a given content item only.
  • 36: Method according to claim 1, wherein the generation and/or the display of icons is enabled which indicates allowed and/or disallowed functionalities with respect to the respective provided content item (CI).
  • 37: System or apparatus which is adapted and arranged and which comprises means for realizing the method for providing content according to claim 1 and the steps thereof.
  • 38: Computer program product comprising computer means which is adapted and arranged in order to realize the method for providing content according to claim 1, when it is executed on a computer or a digital signal processing means.
  • 39: Computer readable storage medium comprising a computer program product according to claim 38.
  • 40: Usage rights information (CURI) and/or usage state information (USI), in particular for protected audio/video content for a content protection and copy management system based on a network of devicescomprising mandatory items only once or an arbitrary plurality of items of the group of items which consists of copy control—in particular as mandatory, propagation restriction—in particular as mandatory, concurrent render count, disable content scrambling and time-based content usage.
  • 41: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, comprising one or an arbitrary plurality of items of the group of items which consists of copy control—in particular as mandatory, propagation restriction—in particular as mandatory, concurrent render count—in particular as assertive, disable content scrambling—in particular as assertive—and time-based content usage—in particular as assertive.
  • 42: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein the usage state information (USI) for copy control is adapted in order to cover one of the items of the group of items which consists of: “copy never” (CN) according to which no copy of such content is allowed,“copy once” (C1) according to which exactly one single copy of the content can be created,“copy one generation” (C1G) according to which the content can be copied repeatedly, but each copy is then marked as copy no more,“copy no more” (CNM) according to which no copies are allowed,“copy control not asserted” (CCNA) according to which no restriction is placed upon copying of the content.
  • 43: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein the usage state information (USI) for copy control is adapted in order to cover one of the items of the group of items which consists of: “copy never, zero retention” (CNZR) according to which no copy of such content is allowed,“copy never” (CN) according to which no copy of such content is allowed,“copy once” (C1) according to which exactly one single copy of the content can be created,“copy one generation” (C1G) according to which the content can be copied repeatedly, but each copy is then marked as copy no more,“copy no more” (CNM) according to which no copies are allowed,“copy control not asserted” (CCNA) according to which no restriction is placed upon copying of the content.
  • 44: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, which is adapted in order to cover one of the items of the group of items which consists of “restrict to content protection and copy management system (CPCM)” (RTCPCM) according to which an item of content with this state applied is to remain protected by the CPCM system, being the default propagation restriction setting for content to be protected,“restrict to local environment” (RTLE) according to which an item of content with this state applied will not be allowed to propagate by electronic transfer beyond the close vicinity of the point at which that content entered the consumer environment, within a respective authorized domain (AD),“restrict to authorized domain (AD)” (RTAD) according to which an item of content with this state applied will not be allowed to propagate beyond the set of CPCM-compliant equipment belonging to the user receiving the content, thus allowing the user to use the content at home, access it from a remote location, for example a second home or from a mobile handset,“restrict to content protection and copyright management system (CPCM)” (RTCPCM) according to which an item of content is to remain protected by the CPCM framework, but propagation is allowed to any other authorized domain (AD).“usage by CPCM extension” (EXT) according to which an item of content with this state applied can be provided with distinct content management usage properties within the realms of some known system which provides content protection and copy management functionality as an extension to the CPCM system,“controlled export” (CE) according to which an item of content with this state applied can either be allowed to propagate, or not allowed to propagate to a particular protection system (for such systems not implicitly and universally trusted by the CPCM system), “propagation restriction not asserted” (PRNA) according to which an item of content can be redistributed also outside of the content protection and copyright management system or CPCM framework.
  • 45. Usage rights information (CURI) and/or usage state information (USI) according to claim 40, which is adapted in order to cover the items of “concurrent render count”, in particular in order to be able to restrict the number of concurrent renderings of an item of content.
  • 46: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, which is adapted in order to cover the items of “disable content scrambling”, in particular in order to be able to not allow to protection of content by means of cryptographic tools, i.e. by scrambling.
  • 47: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, which is adapted in order to cover the items of “time-based restriction of content usage”, in particular in order to be able to allow a temporary usage of a given content item only.
  • 48: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a first or usage property information part (UProp) is used in order to indicate one of said usage rights information (CURI) and/or usage state information (USI) items andwherein a second or usage parameter information part (UPar) is used in order to further specify the usage rights information (CURI) and/or usage state information (USI) item indicated by said first or usage purpose information part (UPur).
  • 49: Usage rights information (CURI) and/or usage state information (USI) according to claim to 48, wherein said first or usage property information part (UProp) is mapped in a one-to-one relationship onto a first finite binary code, in particular consisting of four binary bits and/orwherein said second or usage parameter information part (UPar) is mapped in a one-to-one relationship onto a second finite binary code, in particular consisting of four binary bits.
  • 50: Usage rights information (CURI) and/or usage state information (USI) according to claim to 49, wherein said first or usage property information part (UProp) is embedded within said usage rights information (CURI) and/or usage state information (USI) as an ordered concatenation of the bits of said first finite binary code of the respective usage rights information (CURI) and or usage state information (USI) item and/orwherein said second or usage parameter information part (UPar) is embedded within said usage rights information (CURI) and/or usage state information (USI) as an ordered concatenation of the bits of said second finite binary code of the further specification of the respective usage rights information (CURI) and/or usage state information (USI) item.
  • 51: Usage rights information (CURI) and, or usage state information (USI) according to claim to 50, which is embedded within said usage rights information (CURI) and/or usage state information (USI) as an ordered concatenation of the bits of said first finite binary code of the respective usage rights information (CURI) and/or usage state information (USI) item for said first or usage property information part (UProp) and the bits of said second finite binary code of the further specification of the respective usage rights information (CURI) and/or usage state information (USI) item for said second or usage parameter information part (UPar).
  • 52: Usage rights information (CURI) and/or usage state information (USI) according to claim to 51, which is formed with respect to said bits of said first finite binary code of the respective usage rights information (CURI) and/or usage state information (USI) item for said first or usage property information part (UProp) and with respect to said bits of said second finite binary code of the further specification of the respective usage rights information (CURI) and/or usage state information (USI) item for said second or usage parameter information part (UPar) according to the following table
  • 53. Usage rights information (CURI) and/or usage state information (USI) according to claim to 51, which is formed with respect to said bits of said first finite binary code of the respective usage rights information (CURI) and/or usage state information (USI) item for said first or usage property information part (UProp) and with respect to said bits of said second finite binary code of the further specification of the respective usage rights information (CURI) and/or usage state information (USI) item for said second or usage parameter information part (UPar) according to the following tables
  • 54: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein in the USI data structure for an item of content a first section consisting of a mandatory content management USI is given which defines global content management usage rights for the content item, in particular throughout the CPCM system.
  • 55: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein said first section consisting of said mandatory content management USI is followed by a section defining the outer propagation restriction USI for the content item.
  • 56: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein said outer propagation restriction is given as any one of the propagation restriction usage properties.
  • 57: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein said outer propagation restriction is “propagation restriction not asserted” (PRNA),wherein no other propagation restriction should be specified, andwherein a first global content management USI comprises one of the group consisting of “copy control not asserted” (CCNA) and “do not scramble” (DNSC) with no other content management USI specified.
  • 58: Usage rights information (CUTI) and/or usage state information (USI) according to claim 55, wherein an outer propagation restriction is given for “controlled export” to be the only controlled export USI for the given content in order to realize controlled export as an effectively globally valid propagation restriction.
  • 59. Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein an outer propagation restriction USI is followed by an additional set of content management USI, in particular in order to specify a different set of content management usage rules for a given content item which shall apply only within the area corresponding to the foregoing outer propagation restriction USI.
  • 60: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein content management USI for an outer propagation restriction shall be less constrictive than a globally applicable content management USI.
  • 61: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein an outer propagation restriction USI and any respective content management USI section are followed by a section defining the inner propagation restriction USI for a given content item.
  • 62: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein an inner propagation restriction is one of the group of which comprises the propagation restriction usage properties “restrict to localized authorized domain (AD)” (RTLAD) and “restrict to local environment (LE)” (RTLE).
  • 63: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein an outer propagation restriction is “restrict to authorized domain (AD)” (RTAD)wherein only “restrict to localized authorized domain (AD)” (RTLAD) is valid as a corresponding inner propagation restriction USI.
  • 64: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein an outer propagation restriction is “restrict to geographic area” (RTGA) andwherein only “restrict to local environment (LE)” (RTLE) is valid as a corresponding inner propagation restriction USI.
  • 65: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein an inner propagation restriction UST is followed by an additional set of content management USI in order to specify a different set of content management usage rules for a given content item which shall apply only within the area corresponding to the foregoing inner propagation restriction USI.
  • 66: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein a content management USI for an inner propagation restriction is less constrictive than that for an associated outer propagation restriction.
  • 67: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein a content management USI specified for the localized authorized domain inner propagation restriction is less constrictive than that specified for a local environment, if both propagation restrictions are asserted for a content item.
  • 68: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein a propagation restriction “restrict to local environment” is one of an outer and an inner propagation restriction, but not both for the same content item.
  • 69: Usage rights information (CURI) and/or usage state information (USI) according to claim 55, wherein a content management USI usage property settings which are specified in a first globally valid section are also valid for outer and inner propagation restrictions unless the respective content management USI usage property contains a different setting for either the outer and/or the inner propagation restriction.
  • 70: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein said content management usage rights information and/or usage state information may be formed with respect to said bits of said first finite binary code of the respective usage rights information and/or usage state information item for said first or usage property information part and with respect to said bits of said second finite binary code of the further specification of the respective usage rights information and/or usage state information item for said second or usage parameter information part according to the following table
  • 71: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein said propagation restriction usage rights information and/or usage state information may be formed with respect to said bits of said first finite binary code of the respective usage rights information and/or usage state information item for said first or usage property information part and with respect to said bits of said second finite binary code of the further specification of the respective usage rights information and/or usage state information item for said second or usage parameter information part according to the following table
  • 72: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a basic set of USI consists of a propagation restriction usage property followed by a set of content management usage properties, which are valid within that propagation realm.
  • 73: Usage rights information (CURI) and or usage state information (USI) according to claim 40, wherein complete USI data structure for an item of content consist of one or more such basic sets of USI, depending on the intended propagation and management rules for that content.
  • 74: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein one basic unit of USI specified for an item of content is given,wherein the structure also allows more complex scenarios to be defined, whereby the complete USI data structure for an item of content consists of several basic units of USI, andwherein there are logical rules for the structuring of different propagation realms for an item of content.
  • 75: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein in the USI data structure for an item of content, a first section consisting of the default propagation and content management USI defines the top-level content management usage rights for the content item.
  • 76: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein if the content item is to have a propagation restriction within the CPCM system asserted with no propagation allowed outside of this restricted realm then that propagation restriction is the default top-level propagation restriction for that content item.
  • 77: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a first default section may optionally be followed by a section defining the outer propagation restriction USI for the content itemwherein in particular said outer propagation restriction is any one of the propagation restriction usage properties except “restrict to CPCM system”, which can only be the default propagation restriction, if present there.
  • 78: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein if the default or outer propagation restriction is “propagation restriction not asserted” (PRNA), then no other propagation restriction is specified,wherein in particular such a propagation restriction setting also implies that the first default content management USI comprises of the set of “copy control not asserted” (CCNA) and “do not scramble” (DNSC) with no other content management UST specified or asserted, andwherein said set of USI gives a suitable set of usage rules for content subject to Creative Commons or similar license, within the CPCM system.
  • 79: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein said usage rights information (CURI) and/or usage state information (USI) are formed with respect to said bits of said first finite binary code of the respective usage rights information (CURI) and/or usage state information (USI) item for said first or usage property information part (UProp) and with respect to said bits of said second finite binary code of the further specification of the respective usage rights information (CURI) and/or usage state information (USI) item for said second or usage parameter information part (UPar) according to the following tables
  • 80: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein in the USI data structure for an item of content a first section consisting of a top-level propagation restriction followed by associated content management USI is given which defines the default content management usage rights for the content item, for example throughout the CPCM system.
  • 81: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a top-level propagation restriction may be given as any one of the propagation restriction usage properties “restrict to CPCM system”, “restrict to authorized domain (AD)”, “restrict to geographic area” (RTGA) or “restrict to local environment (LE)” (RTLE).
  • 82: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a first section consisting of said mandatory top-level propagation restriction and content management USI may be followed by a section defining the outer propagation restriction USI for the content item.
  • 83: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein an outer propagation restriction is given as any one of the propagation restriction usage properties, except that specifying “restrict to CPCM system”, which can only be the default propagation restriction, if asserted.
  • 84: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein if a top-level propagation restriction is given as one of the propagation restriction usage properties “restrict to authorized domain (AD)”, “restrict to geographic area” (RTGA) or “restrict to local environment (LE)” (RTLE), then that constitutes also said outer propagation restriction for the content. In each case the content is not intended to propagate outside the indicated propagation realm.
  • 85: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a top-level or outer propagation restriction is “propagation restriction not asserted” (PRNA), in which case no further propagation restriction is specified, and the first top-level propagation restriction may be “restrict to CPCM system”, and the first top-level content management USI comprises one of the group consisting of “copy control not asserted” (CCNA) and “do not scramble” (DNSC), with no other content management USI specified.
  • 86: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein an outer propagation restriction is given for “controlled export,” to be the only controlled export USI for the given content in order to realize controlled export as an effectively globally valid propagation restriction.
  • 87: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein an outer propagation restriction is given for “usage by CPCM extension” to provide different USI for use with the given content within the realms of the specified known system as an extension to the CPCM system.
  • 88: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein for each such CPCM extension system, only one such outer propagation restriction for “usage by CPCM extension” is specified for the given content.
  • 89: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein there is more than one such outer propagation restriction for “usage by CPCM extension” whereby each one provides alternative content management usage properties for the respective CPCM extension system.
  • 90: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein an outer propagation restriction USI as any one of the propagation restriction usage properties “restrict to authorized domain (AD)” and “restrict to geographic area” (RTGA) is followed by an additional set of content management USI, in particular in order to specify a different set of content management usage rules for a given content item which shall apply only within the area corresponding to the foregoing outer propagation restriction USI.
  • 91: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein if the outer restriction is “restrict to authorized domain” then the optional inner restriction is “restrict to localized authorized domain”.
  • 92: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein if the outer restriction is “restrict to a geographic area” then the optional inner restriction is “restrict to local environment”.
  • 93: Usage rights information (CURI) and/or usage state information (USI) according to claim 91, which allows only restricted usage within a wider realm, and freer usage within an inner realm.
  • 94: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein an outer propagation is “restrict to AD” and content management there is “copy one generation” or “copy control not asserted”, and a second outer propagation is “restrict to local environment” and content management there is “copy never”.
  • 95: Usage rights information (CURI) and/or usage state information (USI) according to claim 94, wherein copying is allowed inside the AD, but members and/or devices of another, or no AD can only view the content if they are connected locally.
  • 96: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a “downloadable packaged media” model is given as an outer propagation “restrict to AD” and content management as “copy once”.
  • 97: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a “pay TV broadcast content” model is given as an outer propagation “restrict to AD” and content management as “copy control not asserted”.
  • 98: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a “free-to-air broadcast content” model is given as an outer propagation “restrict to LE” and content management as “copy control not asserted”.
  • 99: Usage rights information (CURI) and/or usage state information (USI) according to claim 40, wherein a “video-on-demand content” model is given as an outer propagation “restrict to LE” and content management as “copy never zero retention” plus“concurrent consumption count=1”.
Priority Claims (3)
Number Date Country Kind
04017019.3 Jul 2004 EP regional
05010686.3 May 2005 EP regional
05013393.3 Jun 2005 EP regional
PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/EP05/07801 7/18/2005 WO 00 1/19/2007