On Tuesdays the USPTO issues new patents. Today's Spotlight Patents concern rights management. Assigned to Sony, the first patent concerns techniques for encoding copyright management on a CD-ROM. Assigned to Intarsia Software, the second patent concerns techniques for controlling database copyrights.
Data areas AR1 and AR2, lead-in areas LIN1 and LIN2, and lead-out areas LOUT1 and LOUT2 are provided on a disc. For example, in case of encrypting and recording data into the data area AR2, copyright management information R2 and key information K2 are recorded into the lead-out area LOUT2. Only information in a Q channel of a subcode is recorded in the lead-out area and this area is filled with dummy data. A position of the lead-out is obtained from TOC information. The fact that a light spot has entered the lead-out area can be judged from the information in the Q channel. The copyright management information and key information are recorded by using the lead-out area. The lead-out area is not rewritten or accessed by an ordinary CD player, so that the copyright management information and the key information can be safely held.
7,447,914, "Method for controlling database copyrights," assigned to Intarsia Software LLC.
In the present invention, copyrights of digital data in a database system including real time transmission of a digital picture are controlled. Permit keys including a crypt key, are used when data which is encrypted and supplied is displayed, edited, stored, copied and transferred. As necessary, one or more of a copyright control program, copyright information or copyright control message are used, in addition to the permit key. The copyright control program, the copyright information and the copyright control message are supplied together with the permit key, or together with the data, or a part of them is supplied together with the permit key and the other part of them is supplied together with the data. The permit key, the copyright control message, the copyright information and the copyright control program are supplied with encryption or without encryption. The data is transmitted with encryption and is decrypted to be used, and may be encrypted again when stored, copied or transferred.