Abstract:
A method of enabling disintermediation in a business model, as well as an arrangement (100) therefor. Extra information related to the business model is embedded in content such as music, which is then distributed via a third party (202) to a rendering device (204). The rendering device (204) generates an audible signal (120) that can be picked up by a receiver (220) such as a mobile phone. The receiver (220) processes the signal (120) to obtain the embedded information, which is then used in the course of the business model.
Abstract:
The present invention relates to adding watermark information to film prints. This performed when duplicating an original film print (405) to an undeveloped copy film (407), where a surface of the original film print is positioned close to a surface of the undeveloped film. The surface of the undeveloped film is exposed with light transferred through the surface of the original film print. The watermark is obtained from a number of individually controllable light sources (411), such that the light transferred through the surface of the original film print (405) has a predefined pattern depending on how the light from the light source (409) is controlled. The invention further relates to a storage medium comprising instructions for performing the method of adding watermark information, a system for adding watermark information and a system for determining the legality of a film print copy.
Abstract:
A receiving device (110) for securely storing a content item (102) on a storage medium (111). The content item (102) is stored in a secure format, and has an associated license file. The license file (141) is encrypted using public key associated with a group of playback devices (120, 121), so that each playback device (121) in the group can decrypt the license file (141) and play the content item (102), but devices outside the group cannot. A playback device (121) can provide a device-specific public key to a Content Distribution Management System (CDMS). The CDMS then returns the secret key for the group encrypted with the public key of the playback device (121). The playback device (121) then securely obtains the secret key of the group and is subsequently able to decrypt the license file (141).
Abstract:
The present invention relates to a method and a system for performing digital rights management. The idea of the invention is that a master right associated with a content is stored at a first authorised device (211). An authorised device is a device which can be considered trusted and performs actions with contents according to the associated rights. These devices enforce rights that are bound to contents, and perform the security tasks of the DRM system employed. A subright is derived from the master right, which subright controls what type of access a second authorised device (261) is given to the associated content. Finally, the subright is distributed to the second authorised device, given that the second device complies with predetermined distribution criteria associated with the master right. The device distributing the subright authenticates the device which is to receive the subright, ensuring that the second device can be trusted.
Abstract:
A method of and device for controlling import of content into a domain comprising a number of devices. The method comprises checking for the presence of a domain watermark in the content, and if the domain watermark is found in the content, refusing import of the content into the domain, and if the domain watermark is not found in the content, allowing import of the content into the domain and causing the domain watermark to be embedded into the content. Optionally, re-importing into the "original" domain might be allowed. In this embodiment the method further comprises refusing import of the content into the domain if the domain watermark is found in the content unless the identifier matches an identifier for the domain. Other payloads in the domain watermark can be used to e.g. implement location- or time-based restrictions on import.
Abstract:
A system (100) comprising a plurality of interconnected devices (101-105) and being arranged to provide the devices (101-105) conditional access to protected content items, characterized in that the system (100) is arranged to restrict the number of simultaneous sessions involving said protected content items to a predetermined total limit. Preferably the system (100) restricts the number of content items that can be accessed simultaneously to the predetermined limit. Security modules (300) such as smart cards can be used for this purpose. Each security module (300) may be arranged to restrict the number of content items to which it provides access simultaneously to an individual limit, which can change over time. The system restricts the sum of the individual limits to the predetermined total limit. If the limit is reached, further sessions may be refused or allowed at reduced quality level.
Abstract:
Items of media information are stored in separately reusable blocks of memory. Items are split into a plurality of layers, so that the item can be represented at reduced quality by a subset of the layers without using a remainder of the layers. Each layer is stored in a respective one of the blocks. When information of a subsequent item is stored, a block for storing the information of the second item dependent on a number of blocks that is in use for storing information. An unused block is selected when the number of blocks that is in use is below a threshold number. When the number is above the threshold number a block is re-used that was previously used for storing a layer from said remainder. Preferably, when the layers are encrypted, different layers of the first item are encrypted independently of one another, so that each layer can be decrypted even if the remainder has been overwritten.
Abstract:
Items of media information are stored in separately reusable blocks of memory. Items are split into a plurality of layers, so that the item can be represented at reduced quality by a subset of the layers without using a remainder of the layers. Each layer is stored in a respective one of the blocks. When information of a subsequent item is stored, a block for storing the information of the second item dependent on a number of blocks that is in use for storing information. An unused block is selected when the number of blocks that is in use is below a threshold number. When the number is above the threshold number a block is re-used that was previously used for storing a layer from said remainder. Preferably, when the layers are encrypted, different layers of the first item are encrypted independently of one another, so that each layer can be decrypted even if the remainder has been overwritten.