System and method for preventing unauthorized data copying...

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000

Reexamination Certificate

active

06681213

ABSTRACT:

BACKGROUND OF THE INVENTION
The present invention relates to a system and method for preventing unauthorized copying of digital audio data or other data using a communication network.
Various known systems for preventing unauthorized copying of digital data or the like employ a scrampling-based method where a transmitting-end unit encrypts digital audio data themselves as by a scrambling process and a receiving end decrypts the encrypted data to reproduce the original digital data, and an ID-based method where either the transmitting-end unit or the receiving-end unit determines, on the basis of ID information pre-added to the header or the like of digital data, whether the copying in question is an authorized or unauthorized one.
The scrampling-based method, however, is not satisfactory in that the transmitting-end unit always has to encrypt the data themselves while the receiving-end unit always has to perform the decrypting process for reproduction, as noted earlier; namely, the transmitting-end and receiving-end units both bear considerable load because of use of the data encryption scheme. The ID-based method is also not satisfactory in that unauthorized copying can not be effectively prevented on the basis of the ID information in cases where either the transmitting-end or receiving-end unit employs an unfair or unauthorized device to rewrite the ID information itself or the receiving-end unit employs an unfair or unauthorized device to ignore the ID information.
SUMMARY OF THE INVENTION
It is therefore an object of the present invention to provide an unauthorized copying preventing system and method which can prevent data communication with an unauthorized instrument without a need to always modify the data themselves through specific data processing such as an encrypting process.
It is another object of the present invention to provide a monitor node and transmission/reception node which can be efficiently used for such an unauthorized copying preventing system and method.
According to a first aspect of the present invention, there is provided a system for preventing unauthorized copying of data through a communication network, which comprises: one or more authorized nodes connected to the communication network, each of the authorized nodes having a normal mode for directly inputting and outputting digital data via the communication network without performing thereon specific data processing such as an encrypting process and a protected mode for preventing the digital data outputted from the authorized node from being received by an unauthorized node connected to the communication network, each of the authorized nodes normally performing a data input/output operation via the communication network in the normal mode but, when the protected mode is instructed, performing the data input/output operation via the communication network in the protected mode; and a monitor node connected to the communication network for monitoring to determine whether any unauthorized node is connected to the communication network, the monitor node instructing the authorized nodes to perform the data input/output operation in the protected mode upon detection of the unauthorized node.
Each of the authorized nodes has a normal mode and a protected mode for its data input/output operation. On a communication network constituted only by authorized nodes, each of the nodes is allowed to freely input and output (communicate) data in the normal mode. The monitor node, which is also connected to the communication network, detects when an unauthorized node is connected to the network, and then instructs each of the authorized nodes to input and output data in the protected mode. By thus communicating the data in the protected mode, unauthorized copying of the data by the unauthorized node can be effectively avoided. Because the normal mode does not require such an encrypting process although some encrypting process is employed in the protected mode, load on the system can be considerably reduced as a whole.
Preferably, the authorized nodes and monitor node are freely connectable and disconnectable to and from the communication network, and the monitor node determines whether each of the nodes connected to the communication network is an authorized node and identifies every node other than the authorized nodes as the unauthorized node. The monitor node may determine whether any unauthorized node is connected to the communication network on the basis of detection of an additional node newly connected to the communication network. Each of the authorized nodes may send a newly-connected-node-detection confirming signal to the monitor node via the communication network in response to detection of an additional node newly connected to the communication network, and in response to the newly-connected-node-detection confirming signal, the monitor node may determine whether any unauthorized node is connected to the communication network. Preferably, the monitor node determines whether any unauthorized node is connected to the communication network, when the monitor node itself is connected to the communication network. In the above-mentioned manner, the monitor node is allowed to properly detect presence of any unauthorized node.
In a preferred implementation of the present invention, the monitor node sends an encrypted secret code to the communication network and thereby receives replies from the authorized nodes that the authorized nodes are duly authorized instruments. On the basis of the replies from the authorized nodes, the monitor node determines whether any unauthorized node is connected to the communication network. By employing an encrypted secret code as a means for determining whether the node in question is authorized without being recognized by an unauthorized node, unauthorized copying can be prevented even more effectively.
The protected mode allows the digital data to be communicated only between the authorized nodes by inputting and outputting, via the communication network, the digital data having undergone a predetermined encrypting process. Thus, in the protected mode, digital data flowing on the communication network can be reliably protected from being read by any unauthorized node connected to the communication network. Alternatively, the protected mode may prevent the digital data from being received by the unauthorized node by inhibiting input/output of the digital data from being conducted via the communication network. If the digital data are to be exchanged between the authorized nodes, then a dedicated or private line may be used between the two.
According to another aspect of the present invention, there is provided a monitor node which is connected to a communication network with at least one of authorized and unauthorized nodes connected thereto for distinguishing between the authorized and unauthorized nodes. The monitor node comprises: an input/output device that sends the communication network a predetermined encrypted code decodable by the authorized node and receives, from the authorized node having received and decoded the encrypted code, a reply that the authorized node is duly authorized; and a detection processing device that determines, from presence/absence of the reply, whether the node connected to the communication network is an unauthorized node.
Using the encrypted code that can not be understood or decoded by an unauthorized node, the monitor node can effectively prevent unauthorized copying. Also, by sending the encrypted code to the communication network with the unauthorized node connected thereto, it is possible to readily detect presence of the unauthorized node.
Preferably, the input/output device includes means that detects whether any additional node is newly connected to the communication network and sends the predetermined encrypted code to the communication network in accordance with a determination result provided by that means. With this arrangement, the monitor node detects presence of an unauthorized node when one of authorized and unauthorized

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for preventing unauthorized data copying... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for preventing unauthorized data copying..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for preventing unauthorized data copying... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3233157

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.