Abstract:
Methods and arrangements for distributing computer programs and user licenses in a secure manner are disclosed, wherein licences and computer programs are distributed independently, and wherein the a protected computer program never is changed into a registered version, but where a Digital Rights Management agent installed on the computer of a user includes a database over computer programs that may be executed legally on the computer, and the necessary keys for decryption and executing encrypted functions in the program. The program is protected by a combination of encryption, coding and self-destructive code. Further, it is disclosed how keys are developed, how local information is protected in the DRM agent, and how the DRM agent is validated from the protected program.
Abstract:
A method and an arrangement for enforcement and control of copyright and/or policy of a data object being transferred in a communication network by generating an electronic fingerprint unique to the electronic element is disclosed. The fingerprint is compared with pre-generated electronic fingerprints stored in a database wherein each of said pre-generated fingerprints is linked to a certain policy and/or copyright concerning the fingerprint associated data object. If the electronic fingerprint matches one of the pre-generated electronic fingerprints, the policy and/or copyright restrictions linked thereto is/are enforced. The present invention is particularly useful in an MMS environment, and meets the requirements for content rights control in the MMS service network.
Abstract:
Methods and arrangements for distributing computer programs and user licenses in a secure manner are disclosed, wherein licences and computer programs are distributed independently, and wherein the a protected computer program never is changed into a registered version, but where a Digital Rights Management agent installed on the computer of a user includes a database over computer programs that may be executed legally on the computer, and the necessary keys for decryption and executing encrypted functions in the program. The program is protected by a combination of encryption, coding and self-destructive code. Further, it is disclosed how keys are developed, how local information is protected in the DRM agent, and how the DRM agent is validated from the protected program.
Abstract:
The present invention discloses an arrangement in messaging environments, in particular MMS environments, where value added content is to be charged end-users based upon content message transaction events. It introduces two new main components to the MMS infrastructure; a Content Home Locator (CHL) adapted to determine the home environment of the service provider that originally provided an MMS or an object thereof in transfer by investigating a home environment identity included in a policy reference of a policy associated with the data object, a Content Billing Protocol (CBP) having a billing interface being able to exchange policy and billing information concerning the data object with a counterpart CBP of the home environment of the data object determined by the CHL. Billing information provided by the CBP from the home environment of the data object is stored in an Accounting Module (AM) for charging the receiver in case of download or the sender in case of forwarding of the data object and for crediting the service provider. By means of the present invention, service providers are able to charge for value added data objects, e.g. MMSs, downloaded or transferred in environments outside the home environment of the data objects.
Abstract:
The present invention discloses an arrangement and a method for binding policies to MMS content to be distributed as MMS message transactions, and provides content policy enforcement on MMS message transactions by controlling, filtering and charging transaction-transfer in the mobile network. Further, the arrangement provides retention of content policy bindings when MMS messages re-enters the mobile network as new message transactions providing a trusted environment for policy and content rights handling. The present invention can be integrated in existing MMS architecture, and is compatible with all MMS content formats, being both existing and new formats.