The present invention relates to digital watermarking and more particularly relates to Digital Rights Management (DRM) based on multiple watermarks.
The number of online purchases of digital assets such as computer programs, video games, songs, movies, and the like has exponentially increased over the past several years. In a traditional transaction, a user purchases a copy of a digital asset and has the rights to access only that particular copy of the digital asset. However, this results in a point of contention between the purchaser and the distributor of the digital asset. Many purchasers feel that they should be able to access the digital asset in general and should not be limited to accessing only the particular copy that they purchased. This is particularly the case when the copy of a digital asset purchased by a user becomes lost or corrupted due to, for example, a hard-drive failure. In this scenario, it would be desirable for the user to be able to obtain a copy of the digital asset from a friend or some other source. Thus, there is a need for a system and method providing Digital Rights Management (DRM) in a manner that permits a user to access both the particular copy of a digital asset purchased by the user as well as copies of the digital asset purchased by other users.
The present invention relates to a system and method providing Digital Rights Management (DRM) using multiple watermarks. In one embodiment, upon purchase of a digital asset, a copy of the digital asset and a digital certificate providing access to the copy of the digital asset are generated and provided to the user. The copy of the digital asset is watermarked with a content specific watermark and a user, or purchaser, specific watermark. The digital certificate includes content specific watermark information and user specific watermark information corresponding to the watermarks in the copy of the digital asset. Access to the copy of the digital asset is controlled based on a comparison of the watermarks in the copy of the digital asset and the watermark information in the digital certificate.
The DRM technique of the present invention also enables sharing of a digital asset. More specifically, in one embodiment, a first user may purchase a copy of the digital asset having a content specific watermark that is common among all copies of the digital asset and a user specific watermark that is specific to the first user. The first user is issued a digital certificate including watermark information corresponding to the content specific watermark and the user specific watermark in the copy of the digital asset purchased by the first user. A second user may also purchase a copy of the same digital asset, where the copy of the digital asset purchased by the second user is watermarked with the same content specific watermark and a user specific watermark that is specific to the second user. The second user is issued a digital certificate including watermark information corresponding to the content specific watermark and the user specific watermark in the copy of the digital asset purchased by the second user. Thereafter, if the second user loses his copy of the digital asset, the second user may obtain the copy of the digital asset from the first user. Then, access to the copy of the digital asset obtained from the first user may be controlled based on a comparison of the watermark information in the digital certificate of the second user and the watermarks in the copy of the digital asset obtained from the first user.
Those skilled in the art will appreciate the scope of the present invention and realize additional aspects thereof after reading the following detailed description of the preferred embodiments in association with the accompanying drawing figures.
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the invention, and together with the description serve to explain the principles of the invention.
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the invention and illustrate the best mode of practicing the invention. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the invention and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
The central system 12 may be implemented using one or more servers. In this embodiment, the central system 12 includes a content distribution function 18 and a registration function 20. However, the central system 12 may alternatively include only the content distribution function 18 or only the registration function 20.
The content distribution function 18 may be implemented in software, hardware, or a combination of software and hardware. In general, the content distribution function 18 enables users such as user 22 of the user device 14 to purchase copies of digital assets such as, for example, software, video games, songs, movies, television programs, or the like. As discussed below, a digital asset is watermarked with a content specific watermark that is common to all copies of the digital asset distributed by the content distribution function 18. A watermark is data that is encoded into digital content. In general, watermarks may be encoded into the digital content in either the spatial domain or the frequency domain. When the user purchases a copy of a digital asset, the content distribution function 18 watermarks the digital asset with a user specific watermark identifying the user 22 such that the copy of the digital asset purchased by the user 22 is watermarked with both the content specific watermark and the user specific watermark. The content distribution function 18 also generates a digital certificate including watermark information corresponding to the content specific watermark and user specific watermark in the purchased copy of the digital asset. The copy of the digital asset and the digital certificate are provided to the user device 14. Thereafter, access to the copy of the digital asset is controlled based on a comparison of the watermark information in the digital certificate and the watermarks in the digital asset.
The registration function 20 may be implemented in software, hardware, or a combination of software and hardware. In general, a hard copy of a digital asset, such as a Compact Disc (CD) or Digital Versatile Disc (DVD), may be purchased by a user such as the user 22. In this case, the copy of the digital asset is already watermarked with a content specific watermark that is common to all copies of the digital asset and a unique watermark that is to be associated with the user 22 during the registration process. As discussed below, during registration, the registration function 20 associates the unique watermark with the user 22. In addition, the registration function 20 generates a digital certificate including watermark information corresponding to the content specific watermark and the unique watermark and provides the digital certificate to the user device 14. Thereafter, access to the copy of the digital asset is controlled based on a comparison of the watermark information in the digital certificate and the watermarks in the copy of the digital asset.
The user device 14 may be, for example, a personal computer, a mobile device such as a Personal Digital Assistant (PDA) or mobile phone, a portable media player such as Apple's iPod® or Microsoft's Zune™ personal media player, a DVD player, or the like. In this embodiment, the user device 14 stores or has local access to a purchased copy of a digital asset 24 and a digital certificate 26 enabling access to the copy of the digital asset 24. The copy of the digital asset 24 and the digital certificate 26 may be stored by, for example, one or more hard drives, memory, one or more removable memory devices, an optical disc readable by an optical drive of the user device 14, or the like. Note that, as discussed below, the digital certificate 26 may additionally or alternatively be stored in a remote database and/or one or more additional devices associated with the user 22.
In operation, the user device 14 may interact with the content distribution function 18 of the central system 12 via the network 16 to purchase and download the copy of the digital asset 24. The copy of the digital asset 24 is watermarked with a content specific watermark and a user specific watermark. Based on the digital certificate 26, access to the copy of the digital asset 24, or access to any other copy of the digital asset subsequently transferred to the user device 14, is controlled.
At some point either during or after the purchase transaction is complete, the content distribution function 18 generates the purchased copy of the digital asset 24 having the content specific watermark and the user specific watermark (step 102). In one embodiment, the digital asset may already include a content specific watermark. As such, the content distribution function 18 may further watermark the digital asset with the user specific watermark using any type of robust watermarking technique that is suitable for the digital asset such as, for example, a spatial domain watermarking technique or a frequency domain watermarking technique to provide the purchased copy of the digital asset 24. The user specific watermark generally includes information identifying the user 22, information identifying the user device 14, or a combination thereof. For example, the user specific watermark information may include information such as, but not limited to, the name of the user 22, the address of the user 22, the e-mail address of the user 22, a credit card number of a credit card issued to the user 22 and optionally used for the purchase transaction, an Internet Protocol (IP) address of the user device 14, a device serial number of the user device 14, or the like or any combination thereof.
The content distribution function 18 also generates a digital certificate including the content specific watermark information and the user, or purchaser, specific watermark information corresponding to the content specific watermark and the user specific watermark in the copy of the digital asset 24 to be provided to the user (step 104). In addition, the copy of the digital asset 24 provided to the user 22 may be encrypted using an encryption key that is common to all copies of the digital asset. As such, the digital certificate may also include a decryption key for decrypting any copy of the digital asset. The content distribution function 18 provides the purchased copy of the digital asset 24 and the digital certificate to the user device 14 of the user 22 (step 106).
As discussed below, access to the copy of the digital asset 24 at the user device 14 is controlled based on the digital certificate 26. Further, if the copy of the digital asset 24 is somehow corrupted or lost, the user 22 may obtain a new copy of the digital asset from the content distribution function 18 based on the digital certificate 26. Alternatively, the user 22 may obtain a copy of the digital asset from another user, where access to the other user's copy of the digital asset is controlled based on the digital certificate 26 issued to the user 22.
More specifically, at some point after purchasing the hard-copy of the digital asset 24, the user 22 or the user device 14 initiates a registration process with registration function 20 of the central system 12. At this point, the registration function 20 conducts the registration process (step 200). During the registration process, the registration function 18 obtains information identifying the user 22, the user device 14, or both. In addition, the registration function 20 obtains the unique watermark in the copy of the digital asset 24 purchased by the user. The registration function 18 then stores the information identifying the user 22 and/or the user device 14 in association with the unique watermark in a local or remote database associated with the central system 12. The information identifying the user 22 may include, for example, the user's name, the user's address, the user's e-mail address, a credit card number of a credit card issued to the user 22, or the like or any combination thereof. The information identifying the user device 14 may include, for example, the IP address of the user device 14, a device serial number of the user device, or the like or any combination thereof.
The registration function 20 also generates the digital certificate 26 including content specific watermark information and user, or purchaser, specific watermark information corresponding to the content specific watermark and the unique watermark in the copy of the digital asset 24 (step 202). Note that as used herein, a “user specific watermark” includes the unique watermark in a hard-copy of a purchased digital asset. In addition, the copy of the digital asset 24 purchased by the user 22 may be encrypted using an encryption key that is common to all copies of the digital asset. As such, the digital certificate 26 may also include a decryption key for decrypting any copy of the digital asset. The registration function 20 provides the digital certificate 26 to the user device 14 of the user 22 (step 204).
Access to the copy of the digital asset 24 is then controlled based on the comparison of the content specific and user specific watermarks and the content specific and user specific watermark information in the digital certificate 26 (step 304). For example, full access may be provided if both the content specific watermark and the user specific watermark match the watermark information in the digital certificate 26. In contrast, if the copy of the digital asset 24 is corrupted or lost and the user 22 obtains a copy of the digital asset from another user, the content specific watermark will match the content specific watermark information in the digital certificate 26 but the user specific watermark will not match the user specific watermark information in the digital certificate 26. As such, the user 22 may be provided limited or user specific access to the copy of the digital asset from the other user. For example, if the digital asset is a movie and associated bonus features normally stored on a DVD, access to a copy of the digital asset obtained from another user may be limited to the movie such that the user 22 does not have access to the bonus features. Still further, if the user 22 obtains a copy of a digital asset for which the user 22 has no digital certificate, access may be entirely prohibited. Alternatively, access to a demo mode or preview of the digital asset may be provided in order to promote sales of the digital asset. Still further, if the digital asset has, for example, a basic mode and a professional mode, the content specific watermark may be different for the two modes. As such, if the user obtains a copy of a digital asset, increased access may be provided if the digital certificate of the user is for the professional mode, whereas the original owner has access to only the basic mode.
Steps 300-304 may be performed by the user device 14 under the instruction of the copy of the digital asset 24 itself or performed by a software and/or hardware application of the user device 14. More specifically, the digital asset may be a software application such as, for example, Microsoft Windows, one of the suite of Microsoft Office applications, Norton Internet Security, or the like. The software application may include instructions for performing steps 300-304 at startup of the application. In contrast, if the digital asset is a media file such as a song or movie, the user device 14 may include a software and/or hardware application for performing steps 300-304 before access to the media file is granted.
The access rights are preferably defined by the distributor, manufacturer, or the like of the digital asset. Note that the distributor and manufacturer may or may not be the same entity. More specifically, the manufacturer or distributor of the digital asset preferably defines what access rights are to be provided when both watermarks in the copy of the digital asset 24 match the watermark information in the digital certificate 26, when only the content specific watermark matches the watermark information in the digital certificate 26, and when the user 22 has no digital certificate for the digital asset. In one embodiment, access rights may be defined by limiting access to various portions of the content of the digital asset. This may be desired for digital assets such as songs or movies. Access rights may be defined by watermarking various portions of the copy of the digital asset 24 with corresponding combinations of the content specific watermark and the user specific watermark. Portions of the copy of the digital asset 24 that are to be accessible only by the original purchaser may be watermarked with both the content specific watermark and the user specific watermark. Alternatively, they may be watermarked with only the user specific watermark. Portions of the copy of the digital asset 24 that are to be accessible by any user having a digital certificate including watermark information matching the content specific watermark may be watermarked with only the content specific watermark. Finally, portions of the copy of the digital asset 24 that may be accessible by any user regardless of whether the user has a digital certificate for the digital asset may not be watermarked with either the content specific watermark or the user specific watermark. This may be desirable to identify portions of the digital asset that are to be accessible to provide a preview or demo of the asset.
In another embodiment, access rights may be defined to control the type of access to provide for the copy of the digital asset 24. For example, this may be done by defining access rights for a full access mode, a limited access mode, and a demo or preview mode. The full access mode may more generally be referred to as a purchaser mode. The limited access mode may more generally be referred to as a guest mode. This type of DRM scheme may be desirable for digital assets such as software applications, but is not limited thereto. Thus, if both the content specific watermark and the user specific watermark match the digital certificate 26, the user 22 is identified as the purchaser, and the copy of the digital asset 24 enters the full access mode of operation where the full access rights of the purchaser are provided. If the content specific watermark matches the digital certificate 26 but the user specific watermark does not match the digital certificate 26, then the user 22 is identified as a guest, and the copy of the digital asset 24 enters the limited access mode of operation where limited access rights may be provided. For example, the limited access mode may limit the number of copies of a song to one copy such that the guest may not copy the song to another device, whereas the full access mode may allow ten copies. If the user 22 does not have a digital certificate for the digital asset, then access to the copy of the digital asset 24 may be prohibited or the copy of the digital asset 24 may enter a demo or preview mode of operation.
A receiver watermark is then inserted into the copy of the digital asset 24 (step 408). The receiver watermark may include the user specific watermark information from the second user's digital certificate or other information identifying the second user and/or the user device 28. In one embodiment, the receiver watermark information is added for traceability purposes. The user specific watermark of the copy of the digital asset 24 is maintained and used to control access to the copy of the digital asset 24. In another embodiment, the user specific watermark in the copy of the digital asset 24 may be replaced by the receiver watermark, where the receiver watermark is thereafter used to control access at the user device 28. The user specific watermark in the copy of the digital asset 24 may still be maintained for traceability.
In this embodiment, the user device 28 may also provide the receiver watermark to the user device 14 (step 410). In response, the user device 14 may add the receiver watermark to the digital certificate 26 such that distribution of the copy of the digital asset 24 can be tracked (step 412). Alternatively, as discussed below, the digital certificate 26 may be stored by a remote database. In this case, the user device 14 may modify the digital certificate 26 stored in the remote database. As another alternative, either the user device 14 or the user device 28 may provide the receiver watermark to a remote server associated with the remote database, where the remote server adds the receiver watermark to the digital certificate 26.
Note that the system 10 may provide a process by which the user 22 may thereafter unblock the digital certificate 26 and/or obtain a new copy of the digital asset by, for example, providing the receiver watermark to the central system 12. This may be desirable where, for example, the user 22 did not know that the second user did not have a digital certificate for the digital asset or the copy of the digital asset 24 was stolen from the user 22.
Note that the processes of
In one embodiment, the digital certificate database 30 operates as a backup mechanism. More specifically, in addition to storing the digital certificate for the copy of the digital asset 24 at the user device 14, the digital certificate is also stored in the digital certificate database 30. The digital certificate may be provided to the digital certificate database 30 by the content distribution function 18 or the registration function 20. Alternatively, the user device 14 may provide the digital certificate to the digital certificate database 30. Thereafter, the digital certificate database 30 may be used to replace a corrupted or lost digital certificate.
The digital certificate database 30 may also enable remote access to a digital asset at a user device other than the user device 14 of the user 22. For example, the user 22 may desire to access a copy of the digital asset stored on a remote device such as public device or a user device of another user. The user 22 may be required to enter, for example, a password enabling the remote device to obtain a temporary copy of the digital certificate 26 of the user 22 from the digital certificate database 30. Access to the copy of the digital asset at the remote device may then be controlled based on the temporary copy of the digital certificate. Note that the digital certificate database 30 may provide the temporary digital certificate in response to, for example, detecting that the request for the digital certificate came from an IP address other than the IP address of the user device 14 of the user 22. In contrast, if a request for the digital certificate 26 were to come from the user device 14, the digital certificate database 30 may provide a permanent copy of the digital certificate.
In another embodiment, the digital certificate database 30 operates as the permanent source of the digital certificates. In this embodiment, when the user 22 purchases or registers the copy of the digital asset 24, the digital certificate is generated and provided to the digital certificate database 30 for storage. Thereafter, when access to the copy of the digital asset 24 is desired, the user device 14 may obtain a temporary copy of the digital certificate from the digital certificate database 30 to be used to determine access rights in the manner described above. Alternatively, access rights may be determined in a collaborative fashion. For example, the user device 14 may interact with the digital certificate database 30 to obtain needed information such as the decryption key, the content specific watermark information, and the user specific watermark information from the digital certificate database 30. As yet another alternative, after decryption, the user device 14 may provide the content specific watermark and the user specific watermark to a server associated with the digital certificate database 30, where the server may perform the comparison of the watermarks and the watermark information from the digital certificate stored in the digital certificate database 30.
The digital certificate database 30 provides substantial benefits. First, as mentioned above, the digital certificate database 30 may be used to replace digital certificates that have been corrupted or lost due to, for example, a hard-drive failure. Using the user 22 as an example, if the hard-drive of the user device 14 fails, the user 22 may thereafter replace the digital certificate for the copy of the digital asset 24 and any other digital certificates issued to the user 22 from the digital certificate database 30. The user device 14 could then obtain a new copy of the purchased digital asset from the content distribution system 18; other user devices via, for example, a peer-to-peer (P2P) network; the user's own hard-copy of the digital asset; or a hard-copy of the digital asset owned by another user.
The digital certificate database 30 may be used to access digital certificates from a new or secondary user device associated with the user 22. The digital certificates may be downloaded to the new or secondary user device for permanent storage or may be accessible from the digital certificate database 30 when needed. Using the digital certificates, the new or secondary device may download copies of the purchased digital assets from the central system 12 or gain access to copies of the purchased digital assets from other users.
Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present invention. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.
Number | Name | Date | Kind |
---|---|---|---|
5613004 | Cooperman et al. | Mar 1997 | A |
5687236 | Moskowitz et al. | Nov 1997 | A |
5809139 | Girod et al. | Sep 1998 | A |
5905800 | Moskowitz et al. | May 1999 | A |
6141753 | Zhao et al. | Oct 2000 | A |
6282299 | Tewfik et al. | Aug 2001 | B1 |
6389541 | Patterson | May 2002 | B1 |
6567107 | Stannard | May 2003 | B1 |
6735699 | Sasaki et al. | May 2004 | B1 |
6738493 | Cox et al. | May 2004 | B1 |
6751670 | Patterson | Jun 2004 | B1 |
6804779 | Carroni et al. | Oct 2004 | B1 |
6975743 | Venkatesan et al. | Dec 2005 | B2 |
6987985 | Purkayastha et al. | Jan 2006 | B2 |
7065607 | England et al. | Jan 2006 | B2 |
7003131 | Watson et al. | Feb 2006 | B2 |
7016668 | Vaidyanathan et al. | Mar 2006 | B2 |
7020304 | Alattar et al. | Mar 2006 | B2 |
7036024 | Watson | Apr 2006 | B2 |
7167599 | Diehl | Jan 2007 | B1 |
7409556 | Wu et al. | Aug 2008 | B2 |
20010051996 | Cooper et al. | Dec 2001 | A1 |
20020010759 | Hitson et al. | Jan 2002 | A1 |
20020049580 | Kutaragi et al. | Apr 2002 | A1 |
20020054578 | Zhang et al. | May 2002 | A1 |
20020057799 | Kohno | May 2002 | A1 |
20020061029 | Dillon | May 2002 | A1 |
20020104003 | Iwamura | Aug 2002 | A1 |
20020104099 | Novak | Aug 2002 | A1 |
20020129367 | Devara | Sep 2002 | A1 |
20020144267 | Gutta et al. | Oct 2002 | A1 |
20020156842 | Signes et al. | Oct 2002 | A1 |
20020168082 | Razdan | Nov 2002 | A1 |
20030009769 | Hensgen et al. | Jan 2003 | A1 |
20030012403 | Rhoads et al. | Jan 2003 | A1 |
20030050055 | Ting et al. | Mar 2003 | A1 |
20030081580 | Vaidyanathan et al. | May 2003 | A1 |
20030093665 | Cooper et al. | May 2003 | A1 |
20030138127 | Miller et al. | Jul 2003 | A1 |
20030161268 | Larsson et al. | Aug 2003 | A1 |
20040008864 | Watson et al. | Jan 2004 | A1 |
20040010692 | Watson | Jan 2004 | A1 |
20040010694 | Collens et al. | Jan 2004 | A1 |
20040030798 | Andersson et al. | Feb 2004 | A1 |
20040042421 | Mahany | Mar 2004 | A1 |
20040070593 | Neely et al. | Apr 2004 | A1 |
20040083487 | Collens et al. | Apr 2004 | A1 |
20040086122 | Watson | May 2004 | A1 |
20040088549 | Ukai et al. | May 2004 | A1 |
20040088557 | Malcolm et al. | May 2004 | A1 |
20040117824 | Karaoguz et al. | Jun 2004 | A1 |
20040131184 | Wu et al. | Jul 2004 | A1 |
20040139047 | Rechsteiner et al. | Jul 2004 | A1 |
20040156528 | Joo et al. | Aug 2004 | A1 |
20040187005 | Molaro | Sep 2004 | A1 |
20040234099 | Venkatesan et al. | Nov 2004 | A1 |
20040248615 | Purkayastha et al. | Dec 2004 | A1 |
20040263941 | Chen et al. | Dec 2004 | A1 |
20040264372 | Huang | Dec 2004 | A1 |
20050008017 | Datta et al. | Jan 2005 | A1 |
20050034001 | Pontarelli | Feb 2005 | A1 |
20050050103 | Kesteloot et al. | Mar 2005 | A1 |
20050081042 | Venkatesan et al. | Apr 2005 | A1 |
20050086069 | Watson et al. | Apr 2005 | A1 |
20050097331 | Majidimehr et al. | May 2005 | A1 |
20050108769 | Arnold et al. | May 2005 | A1 |
20050120127 | Bradley et al. | Jun 2005 | A1 |
20050125405 | Watson et al. | Jun 2005 | A1 |
20050182989 | Zarnke et al. | Aug 2005 | A1 |
20050183120 | Jain et al. | Aug 2005 | A1 |
20050192987 | Marsh | Sep 2005 | A1 |
20050201726 | Malcolm et al. | Sep 2005 | A1 |
20050216942 | Barton | Sep 2005 | A1 |
20050220321 | Langelaar | Oct 2005 | A1 |
20050239497 | Bahl et al. | Oct 2005 | A1 |
20050286438 | Rajkotia | Dec 2005 | A1 |
20060010274 | Olson | Jan 2006 | A1 |
20060015735 | Kudo et al. | Jan 2006 | A1 |
20060047967 | Akhan et al. | Mar 2006 | A1 |
20060048185 | Alterman | Mar 2006 | A1 |
20060048186 | Alterman | Mar 2006 | A1 |
20060050880 | Taylor et al. | Mar 2006 | A1 |
20060053452 | Lee et al. | Mar 2006 | A1 |
20060056349 | Nakatugawa et al. | Mar 2006 | A1 |
20060059560 | Montulli | Mar 2006 | A1 |
20060072786 | Watson et al. | Apr 2006 | A1 |
20060075243 | Lakamp et al. | Apr 2006 | A1 |
20060085830 | Bruck et al. | Apr 2006 | A1 |
20060095401 | Krikorian et al. | May 2006 | A1 |
20060095471 | Krikorian et al. | May 2006 | A1 |
20060095472 | Krikorian et al. | May 2006 | A1 |
20060095792 | Hurtado et al. | May 2006 | A1 |
20060123235 | Vanstone | Jun 2006 | A1 |
20060127037 | Van Hoff et al. | Jun 2006 | A1 |
20060133644 | Wells et al. | Jun 2006 | A1 |
20060156003 | Zhang et al. | Jul 2006 | A1 |
20060161776 | Van Der Veen et al. | Jul 2006 | A1 |
20060165169 | Ng et al. | Jul 2006 | A1 |
20060173794 | Sellars et al. | Aug 2006 | A1 |
20060174128 | Yuval | Aug 2006 | A1 |
20060200416 | White et al. | Sep 2006 | A1 |
20070133673 | Imaizumi | Jun 2007 | A1 |
20080044087 | Levy et al. | Feb 2008 | A1 |
20090037388 | Cooper et al. | Feb 2009 | A1 |
20090287837 | Felsher | Nov 2009 | A1 |
Number | Date | Country |
---|---|---|
2306869 | May 1997 | GB |
2006046099 | May 2006 | WO |