BACKGROUND OF THE INVENTION Digital content, such as music, games and video, are becoming more and more central to the world economy. The transaction of digital content is a general transfer of data and data communications over a network, such as the Internet.
With regard to the rights to use the digital content, the prior art takes a defensive posture that is focused on guarding the digital content against unauthorized access, duplication and use. Limitations are placed on the use and distribution of a piece of digital content, and various means are used to attempt to enforce these limitations. Oftentimes, the limitations can be easily circumvented, and so enforcement can be difficult and therefore is mostly ineffective.
Present methods for attaining rights to use a piece of digital content are focused on resolving digital rights issues as they pertain to digital content delivery between an end desktop computer and a controlling server. Little has been done to generate a digital rights management system that operates at least in part over a data telephony network.
Therefore, there exists a need to provide a secured digital content data transmission system that allows recipients some secure control over transmission of digital content.
BRIEF SUMMARY OF THE INVENTION The present invention provides methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing.
In one embodiment, a method for deleting rights to one or more digital content items at a wireless user device in a digital rights management environment is provided. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.
In another embodiment, the server generates a new digital key and encrypts the new digital key, a previously generated random number, and an id string associated with the user device using a digital key previously confirmed by use of at least two distinct networks. The server also determines the digital content items the user has user rights for and encrypts one or more digital content keys associated using the new digital key based on the determination. The encrypted new digital key and the encrypted one or more digital content keys are sent to the user device.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING The preferred and alternative embodiments of the present invention are described in detail below with reference to the following drawings.
FIG. 1 illustrates a block diagram of an example system formed in accordance with an embodiment of the present invention;
FIG. 2 illustrates an exemplary diagram performed by some of the components shown inFIG. 1 for providing secure access between user devices and a digital rights management system;
FIG. 3 illustrates a process for delivery of digital content performed by some of the components shown inFIG. 1;
FIG. 4 illustrates a process for returning digital content in accordance with an embodiment of the present invention; and
FIG. 5 illustrates an example process for purchasing of used digital content in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing.
In one embodiment, a mobile phone enables a consumer to engage in a retail transaction to purchase digital content that is downloaded to their phone over the air, such that a copy of the content then resides persistently on their phone for their ongoing use. Any consumer so enabled with a mobile phone may give up their rights to and access to a piece of digital content to which they had previously purchased legitimate rights from an electronic store in exchange for credit or payment. Analogous to the buying and selling of used compact discs (physical media), the electronic buying and selling of used digital content would entail the exchange of a finite supply of unique entities, in this case sequences of digital information, with the following properties: 1) each entity is unique, 2) each entity is in the possession of only one individual or organization at a time, 3) entities may not be copied and then successfully exchanged as if they were originals to gain additional value, 4) only certain authorized organizations may generate new entities (i.e., unauthorized organizations can not generate useful counterfeit entities).
The content being bought and sold may take the form of music, pictures, ring tones, animations, video clips, icons, audio files, text information, multimedia combinations of any number of the previous types, or any other type of content for which a digital format may be defined.
As shown inFIG. 1, asystem20 performs secure transmission of digital content in order to allow for expanded commercial opportunities. Thesystem20 includes a plurality ofuser devices24 and26 that are in wireless communication with aserver28 via first andsecond data networks30 and32. Examples of the user devices include any of the number of various forms of wireless devices, such as cellular phones, personal data assistance, palmtop or laptop computers, etc. Theserver28 is a computer system with local memory that is also directly or indirectly in communication with one of a number of digital content provider/owners42 and one or morefinancial institutions44. In one embodiment, theserver28 is in communication with the digital content provider/owners42 and thefinancial institutions44 over anetwork40. Astore48 is in data communication with theuser devices24 and26 directly or indirectly over any of the networks or via theserver28.
Theuser devices24 and26 use thenetworks30 and32 to separately transmit different data associated with an encryption method to theserver28. Theserver28 authenticates eachuser device24 and26 based on the received data and provides each of theuser devices24 and26 with new secret encryption keys. The new secret encryption keys are used to decrypt digital content requested by theuser devices24 and26 that are sent from theserver28. Theserver28 either directly compensates digital content provider/owner for the sale of associated digital content to the users of theuser devices24 and26 or provides some other form of compensation (e.g., credit) with the aid of thefinancial institution44.
Information pertaining to users' rights to digital content is stored in a users'rights storage unit52 that is in direct or indirect or indirect data communication with theserver28 or thestore48.
Information pertaining to used digital content is stored in astorage unit50 that includes an inventory of used digital content or just a record of what digital content has been returned. Thestorage unit50 is in direct or indirect or indirect data communication with theserver28 or thestore48. The devices
In one embodiment, thenetworks30 and32 are distinct networks from each other, such as a wireless cellular data network and a short message service center (SMSC). The wireless cellular data network may be any one of a general packet radio service (GPRS), Code Division Multiple Access (CDMA), Enhanced Data GSM Environment (EDGE), Universal Mobile Telecommunications System (UMTS), Wideband Code Division Multiple Access (WCDMA), Wireless Fidelity (WIFI), Bluetooth or comparable network. Thenetwork40 is one of a private or public data network, such as the Internet.
In one embodiment, rights are attained according to the following process. As shown inFIG. 2, at ablock120, a user device generates a random number and a first key. At ablock122, the user device encrypts an identification (id) string associated with the user device and the random number using the first key. At ablock126, the encrypted id string and random number are sent to the server via a first transmission means, i.e., afirst network30. At ablock128, the random number and the first key are sent unencrypted to theserver28 via a second transmission means, i.e. thesecond network32. Then at ablock130, theserver28 decrypts the received encrypted message using the first key received via the second transmission means. At ablock134, theserver28 generates a second key, if the decrypted random number matches the random number received via the second transmission means. At ablock136, theserver28 encrypts the random number, the id string, and the second key using the first key and at ablock138, sends this new encrypted package to the user device. At ablock140, the user device decrypts the received package using the first key and saves the second key. At ablock144, theserver28 creates and saves a new user record using the id string and stores the second key in the record.
As shown inFIG. 3, at ablock200, auser device24 or26 sends a request for digital content to theserver28. At ablock202, theserver28 retrieves the requested digital content. Theserver28 may retrieve digital content from a local storage device or may retrieve it from the digital content provider/owners42 or from some other source over thenetwork40. At ablock204, theserver28 retrieves the second key stored for the user associated with the request, if the request is valid. At ablock206, theserver28 encrypts the requested digital content using a unique digital content key. At ablock208, theserver28 encrypts the unique digital content key using the retrieved second key and, at ablock210, sends the encrypted unique digital content key and digital content to the user device that made the digital content request. At ablock214, the user device decrypts the unique digital content key using the previously stored second key. At ablock216, the user device decrypts the digital content using the unique digital content key. At adecision block218, the user device determines if the entire digital content was received. If the entire digital content was not received, then atblock220, the user device requests that theserver28 resends and/or indicates an error. If the digital content was properly received, then atblock224 theserver28 completes a billing transaction. The steps of decrypting214 and216 may be performed when a user desires prentation of the digital content—afterblock218 or224.
FIG. 4 illustrates anexample process300 performed in accordance with an embodiment of the present invention. First at304, a user elects to return an item (digital content) to thestore48 on their wireless terminal (user device24). In one embodiment, the item was originally purchased from thestore48, however, the item could have been purchased through other means, such as another user or another store. At306, thestore48 receives the user's request via any network connection or a direct connection. At308, the store commands the database (unit52) to check for existence of the user's rights to the item and to delete if present. Rights information pertains to rights that the user has previously attained for the digital content. A confirmation of the deletion is returned to thestore48, at310. If thestore48 maintains inventory of used items at the used contentinventory storage unit50, the inventory for that related used item is increased by 1, at312. At316, the inventory update is complete and thestore48 is notified of the completed process. At318, thestore48 applies credit to an account balance associated to the user at thestorage unit52 and feedback is sent to thestore48, at320. At322, thestore48 resets the DRM client on theuser device24, invalidating all of the content keys stored on the phone. At324, the DRM client proceeds with re-initialization cycle. At326, re-initialization is complete, seeFIG. 2. At328, theuser device48 requests re-delivery of owned content keys. The owned content keys are digital content keys associated with the digital content that the user still has rights to use.
At330, a current key set is created based on the updated information in thestorage unit52 and sent to theuser device24 for completion; similar toFIG. 3. A new second key is created, encrypted, sent, and decrypted in accordance with blocks134-144,FIG. 2. Then, the unique or owned content keys are encrypted using the new second key, sent to the user device and decrypted using the new second key.
At332, theuser device24 requests credit balance and at334, thestore48 reports credit balance to the user.
In an alternate embodiment, when the user elects to return a digital content item, the user device deletes the unique content key associated with the elected digital content item.
FIG. 5 illustrates aprocess400 for purchasing digital content identified as used content and stored in the used contentinventory storage unit50. At404, a user browses the selection of available used content. At406, thestore48 receives request to view available used inventory based on a signal send from theuser device24. At408, thestore48 checks current inventory for the used content from the used contentinventory storage unit50 and results of the check are returned at410. At412, thestore48 sends a menu of the currently stored inventory of used digital content and prices to theuser device24 for presentation to the user. At416, a user selects one or more of the digital content items for purchase. At418, thestore48 deducts credit from user's balance in thestore48. If insufficient balance, user will be billed by a separate mechanism, such as a previously designated credit card. At420, results of payment method are returned to thestore48. At422,424, thestore48 subtracts one from the used content inventory for the just sold item. At426, thestore48 commands a database (user's rights storage unit52) to add the used item to the user's rights file. At428, the store238 receives confirmation of addition of the rights for the user. At430, the purchased used content and content key are delivered touser device24.
While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.