Claims
- 1. A method of performing, on a consumer device, rights management of media content comprising:
identifying the media content with a steganographic identifier; packaging the identified media content in an encrypted package; and linking the media content to usage rules via the steganographic identifier.
- 2. The method according to claim 1, wherein said identifying step comprises digitally watermarking the media content to include an identifier.
- 3. The method according to claim 1, wherein said identifying step comprises digitally watermarking the media content to include an identifier comprising a content identifier and at least one of a distributor identifier, a retailer identifier and an owner identifier.
- 4. The method according to claim 1, wherein the usage rules comprises at least one of the following rules: copy control, usage limitations, rendering criteria, and playback restrictions.
- 5. The method according to claim 2, wherein the identifier includes copy protection bits.
- 6. The method according to claim 1 further comprising the step of tracking the media content based on the identifier.
- 7. The method according to claim 6, further comprising the step of incrementally tracking the content.
- 8. The method according to claim 2, further comprising the steps of digitally watermarking a plurality of location identifiers in the media content, each location identifier identifying a location in the content, and indexing into the media content with at least one of the location identifiers.
- 9. The method according to claim 2, further comprising the steps of identifying the content via the identifier when the content is found outside of the package, and accessing the usage rules with the content identifier to determine whether the content should be repackaged in at least one of an encryption package and digital rights management container.
- 10. The method according to claim 2, further comprising the step of restricting. distribution of the media content based on usage rules accessed by the identifiers.
- 11. A system for rights management comprising:
a personal computer including: a memory; and electronic processing circuitry in communication with said memory through a communications bus, wherein said memory includes computer executable software instructions stored therein for execution on said processor, the software instructions including instructions to: i) handle content including a content identifier steganographically embedded within the content; ii) decode the steganographically embedded content identifier from the content; iii) enable use of the content according to usage rules, the usage rules being associated with the content identifier; and iv) track the use of the content.
- 12. The system according to claim 11, further comprising at least one rendering device in communication with said computer, wherein the use comprises rendering of the content via the rendering device.
- 13. The system according to claim 12, further comprising at least one database in communication with said computer, wherein the database includes the usage rules, and wherein the computer executable software instructions further comprise instructions to communicates the content identifier from the computer to the database, wherein the database is interrogated with the identifier to obtain the usage rules associated with the content, and wherein said computer executable software instructions further comprise instructions to receive the usage rules when communicated to the computer from the database.
- 14. The system according to claim 13, wherein said enabling instructions restricts usage for the content based on the usage rules.
- 15. The system according to claim 14, wherein the steganographic embedding comprises digital watermarking.
- 16. The system according to claim 12, wherein a digital watermark component comprises the identifier.
- 17. The system according to claim 16, wherein said computer executable software instructions further comprise instructions to track usage of the content based on the content identifier.
- 18. The system according to claim 17, wherein the identifier comprises a plurality of identifiers, each corresponding to a location in the content.
- 19. The system according to claim 17, wherein said system further comprises a billing agency in communication with said computer, and wherein tracked content usage is communicated to the billing agency, and wherein the usage rules dictate whether content owners are to be paid for usage via the billing agency rather than blocking usage of the content.
- 20. A method to regulate a content distribution chain including a plurality of participants, said method comprising the steps of:
providing a unique identifier for a content item, the content item to be handled in the content distribution chain; associating a plurality of usage rule sets with the unique identifier, wherein each of the plurality of sets corresponds to at least one of the plurality of participants; and regulating the content item for a participant according to its respective usage rule set.
- 21. The method according to claim 20, wherein said unique identifier is embedded in the content item via digital watermarking.
- 22. The method according to claim 21, wherein the usage rule sets define the scope of permissive use of the content item, and wherein the scope of permissive use includes at least one of copying, viewing, rendering, distributing, reformatting, packing, transferring and printing.
- 23. The method according to claim 22, wherein the plurality of participants include at least one of a distributor, service provider and consumer.
- 24. The method according to claim 23, wherein the identifier comprises a content identification and at least one of an owner identification, a distributor identification and a retailer identification.
- 25. The method according to claim 22, wherein the content item comprises at least one of video or audio, and the usage rule set mandates that payment for the usage is to be made rather than blocking usage of the content.
- 26. A method of regulating distribution of digitally watermarked content comprising the steps of:
decoding a digital watermark in the digitally watermarked content, the digital watermark comprising at least one component related to copy usage and at least one component related to content identification; obtaining the copy usage component and the content identification component from the decoded digital watermark; and prohibiting the distribution of the digitally watermarked content according to the copy usage component unless a permission to distribute the content is received, and then a decision of whether to prohibit distribution of the digitally watermarked content is determined based on the permission instead of on the copy usage component.
- 27. The method of claim 26, further comprising the steps of:
communicating the content identification component to a database, the database using the content identification component to identify at least one of: i) billing information related to distribution of the content, and ii) the permission; and receiving the permission from the database.
- 28. The method of claim 27, wherein the permission is associated with a billing or payment for distribution of the content.
- 29. The method of claim 27, wherein the distribution comprises at least one of copying, transferring and rendering.
- 30. The method of claim 26, wherein the content identification component comprises the content usage component.
- 31. A distribution system to handle content including at least one identifier steganographically embedded therein, said system comprising:
a plurality of databases, wherein each of the plurality of databases is associated with a system participant; a central router to communicate with each of the plurality of databases; and at least one content database to communicate with the central router, wherein the content database communicates a unique set of usage rules associated with the content identifier to each of the plurality of databases via the central router, the unique sets of usage rules being determined at least in part on usage requirements for each of the databases.
- 32. A method to regulate content in a distribution chain, the content including an identifier, the method comprising the steps of:
for at least a first participant and a second participant in the distribution chain, storing a first set of usage rules and a second set of usage rules, respectively, at each of a first participant site and a second participant site; and at each of the first participant site and second participant site, respectively regulating use of the content in accordance with the first set of usage rules and second set of usage rules.
- 33. The method according to claim 32, wherein the sets of usage rules defines the permissive scope of use for the content.
- 34. The method according to claim 33, further comprising the step of associating the content to a set of usage rules via the identifier.
- 35. The method according to claim 34, wherein the identifier comprises a digital watermark component.
- 36. The method according to claim 35, further comprising the step of communicating an updated set of usage rules to at least the first participant site.
- 37. The method according to claim 36, wherein the updated set of usage rules is communicated through a central router.
- 38. The method according to claim 37, further comprising the step of reporting from the first participant site to the central router information corresponding to the usage of the content.
- 39. The method according to claim 38, further comprising the step of using the reported information to facilitate billing.
- 40. A method of repackaging content into an encryption container or digital rights management (DRM) container when the content is found outside of a container, the content comprising a digital watermark embedded therein, the digital watermark including a content identifier, said method comprising the steps of:
decoding the digital watermark from the content to obtain the content identifier, the content identifier identifying the content; providing the content identifier to a database, the database including usage rules associated with the content identifier, the usage rules comprising at least one rule regarding repackaging; based on the repackaging rule, determining whether the content should be repackaged in at least one of an encryption container and DRM container; and, if indicated by the determination, packaging the identified content in at least one of an encryption container and DRM container.
RELATED APPLICATION DATA
[0001] The present application is a continuation in part of copending U.S. patent application Ser. No. 10/017,679, filed Dec. 13, 2001. The Ser. No. 10/017,679 application claims the benefit of U.S. Provisional Application No. 60/256,628, filed Dec. 18, 2000 and No. 60/336,209, filed Oct. 30, 2001. The present application also claims the benefit of U.S. Patent Application No. 60/285,514, filed Apr. 20, 2001 and No. 60/315,569, filed Aug. 28, 2001. Each of the above-mentioned patent applications is herein incorporated by reference.
Provisional Applications (4)
|
Number |
Date |
Country |
|
60256628 |
Dec 2000 |
US |
|
60336209 |
Oct 2001 |
US |
|
60285514 |
Apr 2001 |
US |
|
60315569 |
Aug 2001 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10017679 |
Dec 2001 |
US |
Child |
10126921 |
Apr 2002 |
US |