GB2324935A - Prevention of unauthorised data download - Google Patents
Prevention of unauthorised data download Download PDFInfo
- Publication number
- GB2324935A GB2324935A GB9708911A GB9708911A GB2324935A GB 2324935 A GB2324935 A GB 2324935A GB 9708911 A GB9708911 A GB 9708911A GB 9708911 A GB9708911 A GB 9708911A GB 2324935 A GB2324935 A GB 2324935A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- validating
- download
- communications
- communicating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A system for the prevention of unauthorised data download comprises a client computer (101) capable of downloading data from a source computer (not shown), the client computer (101) having a store (212) for receiving a validation code other than from the source computer and being provided with an authorisation module (200) arranged to use the validating code so as to verify whether the client computer (101) is authorised to download the data from the source computer. The source computer enables the authorisation module (200) by transmitting or activating validating means, such as a Software Authorisation Agent where the data is software. The data can be text, images, music or other audio, and the infrastructure can be a cellular telephone (GSM), or UMTS, or infra red system.
Description
SYSTEM, METHOD AND APPARATUS FOR THE PREVENTION OF UNAUIHORISED DATA DOWNLOAD
Field of the Invention
The present invention relates to a system, method and apparatus for the prevention of unauthorised data download, in particular, the prevention of unauthorised software download.
Background of the Invention
It is known to download computer software from a source computer to a client computer via an infrastructure, for example, an Internet site, to a terminal. Such a system is described in US 4, 528, 643, which relates to any digital system where purchased software is downloaded to disk, or is already stored on disk, but can only be accessed with a decryption code received after electronic payment. However, bandwidth of the infrastructure is wasted if a user discovers subsequently that execution of the software is not authorised, thereby also reducing the capacity and so the effectiveness of the infrastructure. Also, the user is charged for any "air time" used to download the software, even though the software cannot be executed. Thus, once downloaded, the software is not executable by the user and so resources have been wasted. An additional inconvenience is also suffered by the user, since an un-user friendly delay will exist between initiation of the download of the software and the user becoming aware that execution of the software is not possible, especially if the software is large. These disadvantages are particularly pertinent when the software is downloaded via a radio frequency infrastructure.
DE-A1-4 404 327 discloses a system comprising a source computer and a client computer, both possessing a code. The code possessed by the source computer is transmitted to the client computer for comparison before data is downloaded from the source computer to the client computer.
A more sophisticated version of the above described code, known as a
Software Validation Certificate, can be used and can contain information relating to system privileges possessed by the software, for example, full access to all device hardware and software function, and ability to execute only with no access to other programs, data or hardware. The certificate, or the above-described codes, are downloaded with the software; the code (as described in relation to US 4,528,643 and DE-A1-4 404 327) or the certificate is transmitted to the client computer and so is susceptible to fraud, for example, an individual possessing equipment to receive the code can achieve execution of the software without payment.
It is therefore an object of the present invention to obviate or mitigate the above mentioned disadvantages relating to the downloading of data.
Summarv of the Invention
According to a first aspect of the present invention, there is provided a system for the prevention of unauthorised data download comprising a first communicating means capable of downloading data from a second communicating means, the first communicating means having a store for receiving a validation code and being provided with a validating means arranged to use the validating code so as to verify whether the first communicating means is authorised to download the data from the second communicating means.
According to a second aspect of the present invention, there is provided a method of preventing unauthorised download of data in a system having a first communications means capable of downloading data from a second communications means, the method comprising the steps of:
obtaining a validation code,
requesting download of data from the second communications means,
versifying that the first communications means is authorised to download the data using the validation code.
According to a third aspect of the present invention, there is provided a data terminal apparatus comprising a communicating means for receiving data from a second communicating means, a store for receiving a validation code other than from the second communicating means, and a validating means arranged to use the validating code to verify whether the first communications means is authorised to download data from the second communications means.
Other, preferred, features and advantages are set forth in dependent Claims 2 to 20, 23 to 29 and the following description and drawings.
It is thus possible to provide a system which, in terms of resources, increases the efficiency of the infrastructure (especially in the case of a radio frequency infrastructure), whilst preventing unauthorised reception, either directly or indirectly (by a third party), of the data downloaded. Also, it is possible to provide a reduced turn-around time between requesting download and denial of download; the turn-around time between requesting authorisation and authorisation should remain substantially unchanged.
Brief description of the Drawings
The invention will now be described in more detail, with reference to the accompanying drawings, in which:
FIG. 1 shows a system which is capable of constituting an embodiment of the present invention,
FIG. 2 is a schematic diagram of a computer constituting an embodiment of the present invention, and
FIG. 3 is a flow diagram of a method for use with the system and computer of FIG. 1 and FIG. 2.
Description of a Preferred Embodiment
Referring to FIG. 1, a system 100 comprises a client computer 101 located within a geographical area 107 and capable of communicating with a source computer 112. Although the client computer 101 is used in this example, other devices can be used, for example, any remote destination device. The client computer 101 is connected to a cellular telephone 102, which is in communication with a Base Transceiver Station (BTS) 106, via a radio interface 104. It is conceivable to combine the cellular telephone 102 with the client computer 101 in a single unit. The BTS is connected to a wire line infrastructure 110, for example, an Integrated Service Digital Network (ISDN), via a cellular infrastructure 108, for example, a Global System for
Mobile communication (GSM), the wire line infrastructure 110 being connected to the source computer 112 from which download of software is desired.
Although the source computer 112 has been described as being connected to the client computer 101 via a cellular infrastructure 108, other infrastructures are envisaged, for example, any wireless system, such as a
Universal Mobile Telephone System (UMTS) or an infra-red system.
Alternatively, the cellular telephone 102 and the cellular infrastructure 108 can be replaced with a modem (not shown) connected directly to the wire line infrastructure 110.
The client computer 101 possesses an I/O card 204 (FIG. 2) for interfacing the client computer 101 with the cellular telephone 102. The I/O card 204 is connected to a processing unit 206, the structure and function of which is known in the art. The structure of the processing unit 206 is not considered relevant to the present invention and so will not be described in any further detail. The processing unit 206 is connected to an authorisation module 200 and a download store 208 for storing downloaded data, including software.
The authorisation module 200 is also connected to the I/O card 204 via the processing unit 206. The download store 208, a certificate store 212 and a
Man Machine Interface (MMI) 210, for example, a keyboard and a display, a touch-screen or a voice recognition unit, the MMI 210 also being connected to the processing unit 206.
During normal operation (FIG. 3), a user is pre-provided with a Software
Validation Certificate (SVC) from the proprietor of the source computer 112 and which is stored in the certificate store 212. Optionally, a Device
Authorisation Certificate (DAC) can also be loaded into the certificate store 212 and used to determine whether the client computer 101 is licensed, or allowed, to execute the downloaded software. When the user wishes to download software from the source computer 112, for example pre-paid software, the user instructs the client computer 101 to contact the source computer 112 using the cellular telephone 102 (step 302).
Once the source computer 112 has been contacted, the source computer enables the authorisation module 200 (step 304). This is achieved by either transmitting a Software Authorisation Agent (SAA) to the client computer for storage in the authorisation module 200, or by having the SAA preresident in the authorisation module 200 and activating the SAA via a message from the source computer 112. Information relating to the SVC or
DAC is included within the SAA. Although, in this example, the SAA, is a computer program, or a suite of computer programs/processes, the SAA can be embodied by other techniques known in the art to validate the SVC, for example, an electronic circuit.
Once the SAA is enabled, or if appropriate, downloaded and enabled, the
SAA verifies whether the SVC is valid, and so download of the software is authorised or invalid and download should be denied (step 306). If the SVC is valid, the user is advised, via the MMI 210, that download of the software is authorised (step 310) and an encrypted message is sent to the source computer 112 (step 311), after which download of the software from the source computer 112 to the client computer 101 takes place (step 312), the downloaded software being stored in the download store 208. Optionally, the downloaded software can be encrypted and the SAA can be provided with a decryption key for decrypting the encrypted software. The decryption key can be a fiction of the SVC or the DAC. If desirable, the SAA can perform the decryption of the downloaded encrypted software. Additionally, the source computer 112 can interrogate the client computer 101 in order to ascertain what preferences , if any, relating to the software the user might have, for example, language, configuration, or version. The user is then free to execute the software. If, however, the SVC is not valid, the user is advised, via the MMI 210, that download of the software is denied (step 308) and the source computer 112 is sent a download denied message to this effect (step 314). The download denied message can be encrypted.
Optionally, the user can be advised, via the MMI 210, as to the reason for the download being denied and any possible recommended subsequent action which can be take by the user, for example, contacting the software licensor for authorisation.
Once the user has been advised that download is denied or download has been authorised and the software downloaded, the SAA can subsequently be deleted from the authorisation module 200.
The SAA can also be empowered to validate the DAC. The DAC can optionally be downloaded from the source computer 112 to the client computer 101 with the SAA. Other authorisation tests known in the art can also be carried out by the SAA, for example, the SAA can determine whether the client computer 101 is capable of handling a software watermark which can be present in the software to be downloaded.
Although the above example has been described in the context of downloading software, it is not intended that the present invention be limited to software alone, and should include the downloading of any data, for example, text, images or music and other audio information.
Additionally, even though the source computer has been charged with the task of sending the SAA and communicating with the SAA in the above example, it is not intended that the invention be limited to this example. It is envisaged that the infrastructure being used can also handle the transmission of and communication with the SAA.
It is also conceivable to implement the above invention in the context of other digital telecommunications systems than those mentioned above, for example, a Future Public/Private Land Mobile Telecommunications System (FPLMTS), a Personal Communications System (PCS), Cable Television system, or an Intelligent Transportation System (ITS).
The above embodiments can be implemented via the exchange of information between the SAA and a software environment which is resident in the client computer 101. The interface between the SAA and the software environment can be an Application Programmers Interface (API). The existence of APIs is known in the art.
Claims (31)
1. A system for the prevention of unauthorised data download comprising a first communicating means capable of downloading data from a second communicating means, the first communicating means having a store for receiving a validation code and being provided with a validating means arranged to use the validating code so as to verify whether the first communicating means is authorised to download the data from the second communicating means.
2. A system as claimed in Claim 1, wherein the validating means is preresident in the first communicating means.
3. A system as claimed in any one of the preceding claims, wherein the first communicating means is provided with the validating means by downloading the validating means to the first communicating means from the second communicating means.
4. A system as claimed in any one of the preceding claims, wherein the validating means is erasable.
5. A system as claimed in any one of the preceding claims, further comprising encryption means arranged to send an encrypted message from the first communicating means to the second communicating means.
6. A system as claimed in any one of the preceding claims, wherein the encrypted message is a function of the validation code.
7. A system as claimed in any one of the preceding claims, wherein the data is encrypted and the validating means is arranged to provide the first communicating means with a decryption key.
8. A system as claimed in Claim 7, wherein the data is decrypted by the validating means.
9. A system as claimed in any one of the preceding claims, wherein the encryption of the data is a function of the validating code.
10. A system as claimed in any one of the preceding claims, wherein the validating means is resident in the first communicating means and communicates with a software environment via an application programmers interface.
11. A system as claimed in any one of the preceding claims, wherein the validating code is a software validation certificate.
12. A system as claimed in any one of the preceding claims, wherein the validating code is a device authorisation certificate.
13. A system as claimed in any one of the preceding claims, wherein the validating means is a software authorisation agent.
14. A system as claimed in any one of the preceding claims, wherein the store is arranged to receive the validation code other than from the second communicating means.
15. A system as claimed in any one of the preceding claims, wherein the data includes computer software.
16. A system as claimed in any one of the preceding claims, wherein the data includes text.
17. A system as claimed in any one of the preceding claims, wherein the data includes image data.
18. A system as claimed in anyone of the preceding claims, wherein the data includes audio data.
19. A radio frequency communications system comprising the system as claimed in any one of the preceding claims.
20. A wire line communications system comprising the system as claimed in any one of Claims 1 to 18.
21. A system for the prevention of unauthorised data download substantially as hereinbefore described with reference to FIG. 1 and FIG. 2.
22. A method of preventing unauthorised download of data in a system having a first communications means capable of downloading data from a second communications means, the method comprising the steps of:
obtaining a validation code,
requesting download of data from the second communications means,
verifying that the first communications means is authorised to download the data using the validation code.
23. A method as claimed in Claim 22, further comprising downloading a validating means from the second communications means.
24. A method as claimed in Claim 22, further comprising providing a validating means pre-resident in the first communications means.
25. A method as claimed in any one of Claims 22 to 24, further comprising erasing the validating means one the verification as to whether the first communications means is authorised to download the data from the second communications means has taken place.
26. A method as claimed in any one of Claims 22 to 25, further comprising sending an encrypted message from the first communications means to the second communications means.
27. A method as claimed in any one of Claims 22 to 26, further comprising encrypting the data prior to downloading the data to the first communications means and providing the first communications means with a decryption key.
28. A method as claimed in any one of Claims 22 to 27, wherein the validation code is obtained other than from the second communications means.
29. A method as claimed in any one of Claims 23 to 28, wherein the validating means is resident in the first communicating means and communicates with a software environment via an application programmers interface.
30. A method of preventing unauthorised download of data in a system substantially as hereinbefore described with reference to FIG. 3.
31. A data terminal apparatus comprising a communicating means for receiving data from a second communicating means, a store for receiving a validation code other than from the second communicating means, and a validating means arranged to use the validating code to verify whether the first communications means is authorised to download data from the second communications means.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB9708911A GB2324935A (en) | 1997-05-01 | 1997-05-01 | Prevention of unauthorised data download |
| AU79104/98A AU7910498A (en) | 1997-05-01 | 1998-04-29 | System, method and apparatus for the prevention of unauthorised data download |
| PCT/EP1998/002591 WO1998050841A1 (en) | 1997-05-01 | 1998-04-29 | System, method and apparatus for the prevention of unauthorised data download |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB9708911A GB2324935A (en) | 1997-05-01 | 1997-05-01 | Prevention of unauthorised data download |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB9708911D0 GB9708911D0 (en) | 1997-06-25 |
| GB2324935A true GB2324935A (en) | 1998-11-04 |
Family
ID=10811686
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB9708911A Withdrawn GB2324935A (en) | 1997-05-01 | 1997-05-01 | Prevention of unauthorised data download |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU7910498A (en) |
| GB (1) | GB2324935A (en) |
| WO (1) | WO1998050841A1 (en) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2364139A (en) * | 1999-12-22 | 2002-01-16 | Ibm | Security Mechanism providing access control for locally-held data |
| EP1128643A3 (en) * | 2000-02-21 | 2003-10-15 | Sony Corporation | Control of a communication terminal |
| WO2002088911A3 (en) * | 2001-04-30 | 2003-12-18 | Nokia Corp | Protection of content reproduction using digital rights |
| US7065342B1 (en) | 1999-11-23 | 2006-06-20 | Gofigure, L.L.C. | System and mobile cellular telephone device for playing recorded music |
| US7548875B2 (en) * | 2001-06-27 | 2009-06-16 | John Mikkelsen | Media delivery platform |
| US9712582B2 (en) | 2001-06-27 | 2017-07-18 | Skky, Llc | Telephone initiated protocol-improved media delivery platform |
| CN109644130A (en) * | 2017-07-27 | 2019-04-16 | Oppo广东移动通信有限公司 | For controlling the method and terminal of shared device |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2241133A (en) * | 1990-02-14 | 1991-08-21 | Motorola Inc | Radiotelephone having removable memory means for storing radio user validation code |
| EP0456386A2 (en) * | 1990-05-11 | 1991-11-13 | International Computers Limited | Access control in a distributed computer system |
| US5349643A (en) * | 1993-05-10 | 1994-09-20 | International Business Machines Corporation | System and method for secure initial program load for diskless workstations |
| US5400403A (en) * | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
| US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
| US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
| AU678985B2 (en) * | 1992-09-21 | 1997-06-19 | Uniloc Corporation Pty Limited | System for software registration |
| US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
-
1997
- 1997-05-01 GB GB9708911A patent/GB2324935A/en not_active Withdrawn
-
1998
- 1998-04-29 WO PCT/EP1998/002591 patent/WO1998050841A1/en not_active Ceased
- 1998-04-29 AU AU79104/98A patent/AU7910498A/en not_active Abandoned
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2241133A (en) * | 1990-02-14 | 1991-08-21 | Motorola Inc | Radiotelephone having removable memory means for storing radio user validation code |
| EP0456386A2 (en) * | 1990-05-11 | 1991-11-13 | International Computers Limited | Access control in a distributed computer system |
| US5349643A (en) * | 1993-05-10 | 1994-09-20 | International Business Machines Corporation | System and method for secure initial program load for diskless workstations |
| US5400403A (en) * | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
Cited By (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8843947B2 (en) | 1999-11-23 | 2014-09-23 | Gofigure Media, Llc | Digital media distribution system and method |
| US7065342B1 (en) | 1999-11-23 | 2006-06-20 | Gofigure, L.L.C. | System and mobile cellular telephone device for playing recorded music |
| US7778636B2 (en) | 1999-11-23 | 2010-08-17 | Gofigure Media, Llc | Mobile advertising systems and methods |
| US8385912B2 (en) | 1999-11-23 | 2013-02-26 | Gofigure Media, Llc | Digital media distribution system |
| GB2364139B (en) * | 1999-12-22 | 2004-05-26 | Ibm | A security mechanism providing access control for locally-held data |
| GB2364139A (en) * | 1999-12-22 | 2002-01-16 | Ibm | Security Mechanism providing access control for locally-held data |
| EP1128643A3 (en) * | 2000-02-21 | 2003-10-15 | Sony Corporation | Control of a communication terminal |
| US6889043B2 (en) | 2000-02-21 | 2005-05-03 | Sony Corporation | Method of controlling a communication terminal having a plurality of functions, communication terminal apparatus, communication control system |
| US7130631B2 (en) | 2000-02-21 | 2006-10-31 | Sony Corporation | Method of controlling a communication terminal having a plurality of functions, communication terminal apparatus, communication control system |
| US7139572B2 (en) | 2000-02-21 | 2006-11-21 | Sony Corporation | Method of controlling a communication terminal having a plurality of functions, communication terminal apparatus, communication control system |
| US7162240B2 (en) | 2000-02-21 | 2007-01-09 | Sony Corporation | Method of controlling a communication terminal having a plurality of functions, communication terminal apparatus, communication control system |
| WO2002088911A3 (en) * | 2001-04-30 | 2003-12-18 | Nokia Corp | Protection of content reproduction using digital rights |
| US8892465B2 (en) | 2001-06-27 | 2014-11-18 | Skky Incorporated | Media delivery platform |
| US9124717B2 (en) | 2001-06-27 | 2015-09-01 | Skky Incorporated | Media delivery platform |
| US7548875B2 (en) * | 2001-06-27 | 2009-06-16 | John Mikkelsen | Media delivery platform |
| US8908567B2 (en) | 2001-06-27 | 2014-12-09 | Skky Incorporated | Media delivery platform |
| US8972289B2 (en) | 2001-06-27 | 2015-03-03 | Skky Incorporated | Media delivery platform |
| US9037502B2 (en) | 2001-06-27 | 2015-05-19 | Skky Incorporated | Media delivery platform |
| US9118693B2 (en) | 2001-06-27 | 2015-08-25 | Skky Incorporated | Media delivery platform |
| US8423427B2 (en) | 2001-06-27 | 2013-04-16 | John Mikkelsen | Media delivery platform |
| US9124718B2 (en) | 2001-06-27 | 2015-09-01 | Skky Incorporated | Media delivery platform |
| US9203870B2 (en) | 2001-06-27 | 2015-12-01 | Skky Incorporated | Media delivery platform |
| US9203956B2 (en) | 2001-06-27 | 2015-12-01 | Skky Incorporated | Media delivery platform |
| US9215310B2 (en) | 2001-06-27 | 2015-12-15 | Skky Incorporated | Media delivery platform |
| US9219810B2 (en) | 2001-06-27 | 2015-12-22 | Skky Incorporated | Media delivery platform |
| US9319516B2 (en) | 2001-06-27 | 2016-04-19 | Skky, Llc | Media delivery platform |
| US9712582B2 (en) | 2001-06-27 | 2017-07-18 | Skky, Llc | Telephone initiated protocol-improved media delivery platform |
| CN109644130A (en) * | 2017-07-27 | 2019-04-16 | Oppo广东移动通信有限公司 | For controlling the method and terminal of shared device |
Also Published As
| Publication number | Publication date |
|---|---|
| GB9708911D0 (en) | 1997-06-25 |
| WO1998050841A1 (en) | 1998-11-12 |
| AU7910498A (en) | 1998-11-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101409634B1 (en) | Methods and apparatus for content protection in a wireless network | |
| US7215779B2 (en) | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |
| EP1529371B1 (en) | Monitoring of digital content provided from a content provider over a network | |
| US7617158B2 (en) | System and method for digital rights management of electronic content | |
| CN100459780C (en) | Robust and Flexible Digital Rights Management Involving Tamper-Resistant Identity Modules | |
| JP4482451B2 (en) | Method for transmitting encrypted user data objects | |
| US20040266395A1 (en) | Process for securing a mobile terminal and applications of the process for executing applications requiring a high degree of security | |
| US20060107327A1 (en) | Methods and apparatus for enforcing application level restrictions on local and remote content | |
| CN100445925C (en) | Access control device, electronic device and access control method | |
| KR20010106325A (en) | Wireless pda ebook contents service method and system with user authentication function for the digital rights management | |
| KR20040028086A (en) | Contents copyright management system and the method in wireless terminal | |
| GB2324935A (en) | Prevention of unauthorised data download | |
| JP2002024178A (en) | Contents authentication system and method, and recording medium | |
| JP4987850B2 (en) | Security method and device for managing access to multimedia content | |
| KR101074068B1 (en) | Authentication method and apparatus for home network service | |
| KR100611119B1 (en) | DRM-based WIP Content Service Method and Apparatus | |
| KR100823677B1 (en) | DDR system and method for multimedia contents attached to multimedia messages | |
| CN101112040A (en) | Method for protecting digital rights file descriptions | |
| KR20090036669A (en) | Method and apparatus for sharing download content in portable terminal | |
| KR20060117786A (en) | DRM based multimedia content service method and device | |
| KR20060117778A (en) | DRM based video content service method and apparatus |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |