Method and devices for managing data transfer

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S225000

Reexamination Certificate

active

06725271

ABSTRACT:

This invention relates to an information transfer management process and devices therefore.
RELATED ART
It will first be noted that the word <<program>> is used here to mean any type of digitally transmitted information, whether it be for example computer programs supplied over an Internet type of network, or cinema or television programs distributed via a cable or via terrestrial hertzian waves or via any other type of medium.
EP-A-0 778 512 describes a process enabling the provision, via a server to any a priori unauthorized third party, of a non executable version of a protected piece of software. After a possible authorization has been checked, a utility program which is also provided by the server, generates a version which is executable from the non executable version. This executable version only exists for the time necessary for its execution, and only in the volatile memory, such that the user cannot access it.
Yet, in this process as in any known process in connection with information transfer, programs and program drives, whether fixed or mobile, portable or not, are incapable of providing or managing identification or exploitation information in an interactive management way. For the content producer, this results in poorly traceable use of his productions when they are exploited.
Due to the multiplication of transmission means, along with the globalization of program providers, it is of importance to install within terminals, access principles the application processing capacity of which is more accurate, more secure and better adapted to the users' actual needs. Information service operators only have partial back access to the operations or applications which are not compatible with regard the medium, which is in contradiction with the information management techniques imposed by globalization. These clustering also effect in limiting access to programs and therefore in increasing their operation costs and amortization duration. Furthermore, pirate copies of some program elements on electronic medium for example cannot be efficiently traced back and controlled by eligible parties.
For example, in the television sector, whether it be pay-TV or not, there exists no a posteriori control means for program unit transactions. On the other hand, when transaction exchanges are activated, some confidential information is made available during the connection dialogue. Furthermore, it is impossible to allow program identification or to localize terminals, whatever the medium or information carrier used.
Current management systems are only partial systems which do not allow any hierarchised opening according to the related prerequisites, whether at the technical or legal level. Total traceability is unrealistic because neither the program nor the equipment are provided with an identifier and because the only available and prevailing access control with the terminal is an active or passive gate which operates with a simplified key. The use of terminals and the reading of the programs within geographical areas where the broadcaster has not acquired exploitation rights for the work is hence possible. This also represents an issue in the field of video program distribution, in which some legal obligations have to be met regarding the broadcasting chronology of the country where the work is exploited. For a program to be broadcast on a large scale, at the level of a continent or of the world, it should comprise its own identification information which should be managed by a locatable terminal in relation with an appropriate management center.
This invention aims at solving the above mentioned problems.
DESCRIPTION OF THE INVENTION
To achieve the above-mentioned goals, the invention is first related to a process for the management of information transfers from a transmission medium to a terminal drive, more specially a locatable drive, characterized in that it comprises the following steps:
provide customized encoding data to said terminal drive from a management center during an initialization procedure;
transmit encoded information on program reading authorizations from said management center to said terminal drive;
have said encoded information interpreted by said terminal drive by using said customized encoding data, when a program is presented to said terminal drive, carry out the terminal check to ensure that it is authorized to read the said program according to the interpreted information and to an identification code sent along with said program;
have the program read by said terminal drive if it is authorized to do so;
after the program has been read, provide information to said management center via said terminal on the carried out operations.
Encoding data which are shared by both the management center and the terminal drive are preferably personal and at least partially confidential for the user and are never fully exposed to the benefit of a third party. Part of these data at least are therefore supplied to the terminal before it is operated and apart from any open communication.
Transmissions between the terminal drive and the management center are usually carried out over a network the architecture of which can be exposed to any outside, hence non secure intervention.
Therefore, at least three security levels are provided.
Firstly, encoding data which are supplied to the terminal when it is initialized are known by the management center only. More particularly, they can take the terminal geographical location into account so that subsequently given authorization can depend on this location.
Furthermore, authorizations to read, which are usually transmitted on a punctual basis to the terminal over an open network, are themselves encoded and customized so that only one specific terminal can interpret them according to the encoding data it has been provided with.
Finally, each program is provided with an identifier which will allow a specific terminal to read it only if, on the one hand, the reading authorization has been provided by the management center and if, on the other hand, this authorization has been correctly interpreted by means of the encoding data.
Hence, the management center which has been informed, usually in a confidential manner, of the reading of a specific program will later be able to carry out invoicing and collection for the corresponding amount and then distribute the rights amongst the various eligible parties or concerned third parties. It should be noted that it is preferred that the terminal keeps record within its memory of the carried out actions so as to enable the on-site checking of the accuracy of the transactions.
Peripheral elements, whether fixed or mobile, can be served by the terminal's capacities with regards reading authorizations granted by eligible parties for this type of equipment.
The invention therefore enables electronic exchanges to be controlled, still maintaining the secrecy and anonymity character of the transaction, and this, whichever the medium used. The process according to the invention carries out a permanent management of data which are unknown to everybody but the management center so that the confidential information which is requested for the good operation are never available or exposed over the used communication media. Remaining information, which is exposed, then become unusable because it is only partial information and therefore inconsistent for any pirate. Any carried out transaction can therefore be authenticated by both the management center and the terminal.
The program contains identifying auxiliary equipment enabling services requested by the terminal user to be executed or not. The terminal matches its distribution capacities with the possible scenarios offered by the program and, if necessary, the access thereto which can be controlled by the management center. The terminal is provided with a secured memory the data processing capacities of which are for one part directly loaded during initialization so as to ensure matching with the management center. Should the manage

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and devices for managing data transfer does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and devices for managing data transfer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and devices for managing data transfer will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3236720

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.